Halderman

Results: 78



#Item
1Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
2Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

Add to Reading List

Source URL: benjaminvandersloot.com

Language: English - Date: 2018-09-18 11:06:16
3Cryptography / Algebra / Abstract algebra / Group theory / Computational hardness assumptions / DiffieHellman key exchange / Cyclic group / Logjam / Generating set of a group / Subgroup / Whitfield Diffie / Computational DiffieHellman assumption

Measuring small subgroup attacks against Diffie-Hellman Luke Valenta∗ , David Adrian† , Antonio Sanso‡ , Shaanan Cohney∗ , Joshua Fried∗ , Marcella Hastings∗ , J. Alex Halderman† , Nadia Heninger∗ ∗ Uni

Add to Reading List

Source URL: www.seas.upenn.edu

Language: English - Date: 2017-09-13 08:39:05
4Computer security / Computing / Computer network security / Security engineering / Information and communications technology / Crime prevention / Cryptography / National security / Virtual private network / SCADA / FBI Criminal Justice Information Services Division / Computer network

A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗ J. Alex Halderman

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
5Computer network security / Computing / Firewall software / Information and communications technology / Computer security / Data security / Internet censorship in China / Human rights in China / Firewall / Stateful firewall / Internet censorship / Router

Internet Censorship in China: Where Does the Filtering Occur? Xueyang Xu, Z. Morley Mao, and J. Alex Halderman Department of Computer Science and Engineering, University of Michigan, 2260 Hayward Street, Ann Arbor, MI 48

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2011-03-10 12:58:06
6Botnets / Cybercrime / Computing / Cyberwarfare / Denial-of-service attacks / Linux malware / Computer network security / Mirai / BASHLITE / Internet of things / TR-069 / Denial-of-service attack

Understanding the Mirai Botnet Manos Antonakakis⇧ Tim April‡ Michael Bailey† Matthew Bernhard/ Elie Bursztein Jaime Cochran. Zakir Durumeric/ J. Alex Halderman/ Luca Invernizzi Michalis Kallitsis§ Deepak Kumar†

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2018-01-19 09:59:23
7Voting / Politics / Elections / Group decision-making / Electronic voting / Election technology / Electoral fraud / Voter-verified paper audit trail / Scantegrity / ThreeBallot / Election audits / Postal voting

Public Evidence from Secret Ballots Matthew Bernhard/ Josh Benaloh† J. Alex Halderman/ Ronald L. Rivest Peter Y. A. Ryan◦ Philip B. Stark‡ Vanessa Teague. Poorvi L. Vora§ Dan S. Wallach? † Microsoft Research /

Add to Reading List

Source URL: mbernhard.com

Language: English - Date: 2017-08-03 23:20:50
8Microsoft Windows / Computer security / System software / Cryptographic software / Disk encryption / Trusted computing / Kiosks / Windows Vista / Kiosk software / Trusted Platform Module / Interactive kiosk / Next-Generation Secure Computing Base

1 Implementing Attestable Kiosks Matthew Bernhard† Gabe Stocco? J. Alex Halderman† †

Add to Reading List

Source URL: mbernhard.com

Language: English - Date: 2016-09-21 15:16:43
9Botnets / Computing / Cybercrime / Cyberwarfare / Denial-of-service attacks / Linux malware / Computer network security / Mirai / BASHLITE / Internet of things / TR-069 / Denial-of-service attack

Understanding the Mirai Botnet Manos Antonakakis Tim April‡ Michael Bailey† Matthew Bernhard/ Elie Bursztein◦ Jaime Cochran. Zakir Durumeric/ J. Alex Halderman/ Luca Invernizzi◦ Michalis Kallitsis§ Deepak Kumar

Add to Reading List

Source URL: mbernhard.com

Language: English - Date: 2017-08-15 20:35:58
10

Understanding the Mirai Botnet Manos Antonakakis Tim April‡ Michael Bailey† Matthew Bernhard/ Elie Bursztein◦ Jaime Cochran. Zakir Durumeric/ J. Alex Halderman/ Luca Invernizzi◦ Michalis Kallitsis§ Deepak Kumar

Add to Reading List

Source URL: nsrg.ece.illinois.edu

Language: English - Date: 2018-06-11 12:51:20
    UPDATE