Security Analysis of the Democracy Live Online Voting System | 0 | 0.34 | 2021 |
The 2020 Election - Remote Voting, Disinformation, and Audit. | 0 | 0.34 | 2020 |
Can Voters Detect Malicious Manipulation of Ballot Marking Devices? | 0 | 0.34 | 2020 |
UnclearBallot - Automated Ballot Image Manipulation. | 0 | 0.34 | 2019 |
Let's Encrypt - An Automated Certificate Authority to Encrypt the Entire Web. | 3 | 0.43 | 2019 |
Conjure: Summoning Proxies from Unused Address Space | 1 | 0.37 | 2019 |
An ISP-Scale Deployment of TapDance. | 0 | 0.34 | 2018 |
Tracking Certificate Misissuance in the Wild | 4 | 0.41 | 2018 |
Understanding The Mirai Botnet | 41 | 1.41 | 2017 |
Measuring small subgroup attacks against Diffie-Hellman. | 0 | 0.34 | 2017 |
The Security Impact of HTTPS Interception. | 14 | 0.68 | 2017 |
Measuring the Security Harm of TLS Crypto Shortcuts. | 6 | 0.56 | 2016 |
Drown: Breaking Tls Using Sslv2 | 16 | 1.10 | 2016 |
Content-based security for the web. | 1 | 0.35 | 2016 |
Android UI Deception Revisited: Attacks and Defenses. | 1 | 0.35 | 2016 |
Towards a Complete View of the Certificate Ecosystem. | 18 | 0.77 | 2016 |
FTP: The Forgotten Cloud | 0 | 0.34 | 2016 |
An Internet-wide view of ICS devices. | 0 | 0.34 | 2016 |
Implementing Attestable kiosks. | 0 | 0.34 | 2016 |
A security analysis of police computer systems. | 0 | 0.34 | 2016 |
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice | 80 | 2.82 | 2015 |
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election. | 12 | 0.80 | 2015 |
Umbra: Embedded Web Security Through Application-Layer Firewalls. | 0 | 0.34 | 2015 |
Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security | 23 | 0.93 | 2015 |
A Search Engine Backed by Internet-Wide Scanning | 89 | 3.44 | 2015 |
An internet-wide view of internet-wide scanning | 28 | 1.55 | 2014 |
TapDance: end-to-middle anticensorship without flow blocking | 12 | 0.76 | 2014 |
Security analysis of a full-body scanner | 3 | 0.47 | 2014 |
Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing Security. | 11 | 0.80 | 2014 |
Security Analysis of the Estonian Internet Voting System | 40 | 1.42 | 2014 |
ZMap: fast internet-wide scanning and its security applications | 152 | 8.81 | 2013 |
CAge: Taming Certificate Authorities by Inferring Restricted Scopes. | 14 | 1.62 | 2013 |
Analysis of the HTTPS certificate ecosystem | 53 | 3.43 | 2013 |
Internet Censorship in Iran: A First Look. | 30 | 1.11 | 2013 |
Elliptic Curve Cryptography in Practice. | 11 | 0.86 | 2013 |
Illuminating the security issues surrounding lights-out server management | 6 | 0.68 | 2013 |
Attacking the Washington, D.C. Internet Voting System. | 14 | 1.10 | 2012 |
Mining your Ps and Qs: detection of widespread weak keys in network devices | 131 | 6.79 | 2012 |
Internet censorship in china: where does the filtering occur? | 44 | 3.42 | 2011 |
Telex: anticensorship in the network infrastructure | 64 | 2.81 | 2011 |
Ethical issues in e-voting security analysis | 2 | 0.43 | 2011 |
Absolute pwnage: a short paper about the security risks of remote administration tools | 1 | 0.45 | 2011 |
Security analysis of India's electronic voting machines | 26 | 1.54 | 2010 |
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs | 46 | 1.82 | 2010 |
Crawling BitTorrent DHTs for fun and profit | 12 | 0.87 | 2010 |
Sketcha: a captcha based on line drawings of 3D models | 21 | 0.81 | 2010 |
To Strengthen Security, Change Developers' Incentives | 3 | 0.76 | 2010 |
Lest we remember: cold-boot attacks on encryption keys | 339 | 17.75 | 2009 |
Can DREs provide long-lasting security? the case of return-oriented programming and the AVC advantage | 47 | 3.70 | 2009 |
Fingerprinting Blank Paper Using Commodity Scanners | 30 | 2.29 | 2009 |