J. Alex Halderman
J. Alex Halderman
University of Michigan, Computer Science & Engineering
Verifierad e-postadress på eecs.umich.edu - Startsida
TitelCiteras avÅr
Lest we remember: Cold-boot attacks on encryption keys
JA Halderman, SD Schoen, N Heninger, W Clarkson, W Paul, ...
Communications of the ACM 52 (5), 91-98, 2009
13072009
A search engine for 3D models
T Funkhouser, P Min, M Kazhdan, J Chen, JA Halderman, D Dobkin, ...
ACM Transactions on Graphics (TOG) 22 (1), 83-105, 2003
12892003
The matter of Heartbleed
Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ...
Proceedings of the 14th ACM Internet Measurement Conference, 2014
5002014
ZMap: Fast Internet-wide scanning and its security applications
Z Durumeric, E Wustrow, JA Halderman
Proceedings of the 22nd USENIX Security Symposium, 2013
4942013
Understanding the Mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
Proceedings of the 26th Usenix Security Symposium, 2017
4252017
Imperfect forward secrecy: How Diffie-Hellman fails in practice
D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ...
Proceedings of the 22nd ACM Conference on Computer and Communications Security, 2015
3852015
Mining your Ps and Qs: Detection of widespread weak keys in network devices
N Heninger, Z Durumeric, E Wustrow, JA Halderman
Proceedings of the 21st USENIX Security Symposium, 2012
3792012
A convenient method for securely managing passwords
JA Halderman, B Waters, EW Felten
Proceedings of the 14th International World Wide Web Conference, 471-479, 2005
2792005
Analysis of the HTTPS certificate ecosystem
Z Durumeric, J Kasten, M Bailey, JA Halderman
Proceedings of the 13th ACM Internet Measurement Conference, 291-304, 2013
2472013
Censys: A search engine backed by Internet-wide scanning
Z Durumeric, D Adrian, A Mirian, M Bailey, JA Halderman
Proceedings of the 22nd ACM Conference on Computer and Communications …, 2015
227*2015
Security analysis of the Diebold AccuVote-TS voting machine
AJ Feldman, JA Halderman, EW Felten
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007
2152007
New client puzzle outsourcing techniques for DoS resistance
B Waters, A Juels, JA Halderman, EW Felten
Proceedings of the 11th ACM Conference on Computer and Communications …, 2004
2132004
Security analysis of the Estonian Internet voting system
D Springall, T Finkenauer, Z Durumeric, J Kitcat, H Hursti, M MacAlpine, ...
Proceedings of the 21st ACM Conference on Computer and Communications …, 2014
2022014
Elliptic curve cryptography in practice
JW Bos, JA Halderman, N Heninger, J Moore, M Naehrig, E Wustrow
Proceedings of the 18th International Conference on Financial Cryptography …, 2014
1812014
Telex: Anticensorship in the network infrastructure
E Wustrow, S Wolchok, I Goldberg, JA Halderman
Proceedings of the 20th USENIX Security Symposium, 2011
1762011
Security analysis of India's electronic voting machines
S Wolchok, E Wustrow, JA Halderman, HK Prasad, A Kankipati, ...
Proceedings of the 17th ACM Conference on Computer and Communications …, 2010
1552010
Internet censorship in China: Where does the filtering occur?
X Xu, Z Mao, JA Halderman
Proceedings of the 12th Passive and Active Measurement Conference, 133-142, 2011
1522011
Defeating Vanish with low-cost Sybil attacks against large DHTs.
S Wolchok, OS Hofmann, N Heninger, EW Felten, JA Halderman, ...
Proceedings of the 17th Network and Distributed System Security Symposium, 2010
1332010
DROWN: Breaking TLS using SSLv2
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
Proceedings of the 25th USENIX Security Symposium, 2016
1312016
Green lights forever: Analyzing the security of traffic infrastructure
B Ghena, W Beyer, A Hillaker, J Pevarnek, JA Halderman
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014
1222014
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20