Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Smearing Fingerprints: Changing the Game of Web Tracking and Differential Privacy (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Moving Targets: Security and Rapid-Release in Firefox.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Going Bright: Wiretapping without Weakening Communications Infrastructure.
IEEE Secur. Priv., 2013
Collaborative Red Teaming for Anonymity System Evaluation.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012
The Casino and the OODA Loop - Why Our Protocols Always Eventually Fail.
Proceedings of the Security Protocols XX, 2012
Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System.
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Security Protocols XIX, 2011
Blood in the Water - Are there Honeymoon Effects Outside Software?
Proceedings of the Security Protocols XVIII, 2010
Blood in the Water (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010
Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Can they hear me now?: a security analysis of law enforcement wiretaps.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Security Evaluation of ES&S Voting Machines and Election Management System.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Bridging the Gap between Vulnerabilities and Threats in Electronic Voting - Abstract.
Proceedings of the Security Protocols XVI, 2008
Signaling Vulnerabilities in Wiretapping Systems.
IEEE Secur. Priv., 2005