Name
Papers
Collaborators
J. ALEX HALDERMAN
62
167
Citations 
PageRank 
Referers 
2301
149.67
4936
Referees 
References 
1193
635
Search Limit
1001000
Title
Citations
PageRank
Year
Security Analysis of the Democracy Live Online Voting System00.342021
The 2020 Election - Remote Voting, Disinformation, and Audit.00.342020
Can Voters Detect Malicious Manipulation of Ballot Marking Devices?00.342020
UnclearBallot - Automated Ballot Image Manipulation.00.342019
Let's Encrypt - An Automated Certificate Authority to Encrypt the Entire Web.30.432019
Conjure: Summoning Proxies from Unused Address Space10.372019
An ISP-Scale Deployment of TapDance.00.342018
Tracking Certificate Misissuance in the Wild40.412018
Understanding The Mirai Botnet411.412017
Measuring small subgroup attacks against Diffie-Hellman.00.342017
The Security Impact of HTTPS Interception.140.682017
Measuring the Security Harm of TLS Crypto Shortcuts.60.562016
Drown: Breaking Tls Using Sslv2161.102016
Content-based security for the web.10.352016
Android UI Deception Revisited: Attacks and Defenses.10.352016
Towards a Complete View of the Certificate Ecosystem.180.772016
FTP: The Forgotten Cloud00.342016
An Internet-wide view of ICS devices.00.342016
Implementing Attestable kiosks.00.342016
A security analysis of police computer systems.00.342016
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice802.822015
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election.120.802015
Umbra: Embedded Web Security Through Application-Layer Firewalls.00.342015
Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security230.932015
A Search Engine Backed by Internet-Wide Scanning893.442015
An internet-wide view of internet-wide scanning281.552014
TapDance: end-to-middle anticensorship without flow blocking120.762014
Security analysis of a full-body scanner30.472014
Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing Security.110.802014
Security Analysis of the Estonian Internet Voting System401.422014
ZMap: fast internet-wide scanning and its security applications1528.812013
CAge: Taming Certificate Authorities by Inferring Restricted Scopes.141.622013
Analysis of the HTTPS certificate ecosystem533.432013
Internet Censorship in Iran: A First Look.301.112013
Elliptic Curve Cryptography in Practice.110.862013
Illuminating the security issues surrounding lights-out server management60.682013
Attacking the Washington, D.C. Internet Voting System.141.102012
Mining your Ps and Qs: detection of widespread weak keys in network devices1316.792012
Internet censorship in china: where does the filtering occur?443.422011
Telex: anticensorship in the network infrastructure642.812011
Ethical issues in e-voting security analysis20.432011
Absolute pwnage: a short paper about the security risks of remote administration tools10.452011
Security analysis of India's electronic voting machines261.542010
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs461.822010
Crawling BitTorrent DHTs for fun and profit120.872010
Sketcha: a captcha based on line drawings of 3D models210.812010
To Strengthen Security, Change Developers' Incentives30.762010
Lest we remember: cold-boot attacks on encryption keys33917.752009
Can DREs provide long-lasting security? the case of return-oriented programming and the AVC advantage473.702009
Fingerprinting Blank Paper Using Commodity Scanners302.292009
  • 1
  • 2