Share This Author
Practical robust localization over large-scale 802.11 wireless networks
- Andreas Haeberlen, Eliot Flannery, Andrew M. Ladd, A. Rudys, D. Wallach, L. Kavraki
- Computer ScienceMobiCom '04
- 26 September 2004
The system is sufficiently robust to enable a variety of location-aware applications without requiring special-purpose hardware or complicated training and calibration procedures, and can be adapted to work with previously unknown user hardware.
Secure routing for structured peer-to-peer overlay networks
This paper studies attacks aimed at preventing correct message delivery in structured peer-to-peer overlays and presents defenses to these attacks, and describes and evaluates techniques that allow nodes to join the overlay, to maintain routing state, and to forward messages securely in the presence of malicious nodes.
QUIRE: Lightweight Provenance for Smart Phone Operating Systems
- Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, D. Wallach
- Computer ScienceUSENIX Security Symposium
- 11 February 2011
Quire tracks the call chain of on-device IPCs, allowing an app the choice of operating with the reduced privileges of its callers or exercising its full privilege set by acting explicitly on its own behalf.
Robotics-Based Location Sensing Using Wireless Ethernet
- Andrew M. Ladd, Kostas E. Bekris, A. Rudys, L. Kavraki, D. Wallach, G. Marceau
- Computer ScienceMobiCom '02
- 23 September 2002
By applying recent advances in probabilistic inference of position and sensor fusion from noisy signals, it is shown that the RF emissions from base stations as measured by off-the-shelf wireless Ethernet cards are sufficiently rich in information to permit a mobile device to reliably track its location.
Analysis of an electronic voting system
- T. Kohno, A. Stubblefield, A. Rubin, D. Wallach
- Computer Science, EconomicsIEEE Symposium on Security and Privacy…
- 9 May 2004
It is shown that voters, without any insider privileges, can cast unlimited votes without being detected by any mechanisms within the voting terminal software, and that any paperless electronic voting system might suffer similar flaws, despite any certification it could have otherwise received.
Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching
- M. Majzoobi, M. Rostami, F. Koushanfar, D. Wallach, S. Devadas
- Computer Science, MathematicsIEEE Symposium on Security and Privacy Workshops
- 24 May 2012
Slender PUF protocol is lightweight and does not require costly additional error correction, fuzzy extractors, and hash modules suggested in most previously known PUF-based robust authentication techniques, and has the great advantage of an inbuilt PUF error tolerance.
Denial of Service via Algorithmic Complexity Attacks
A new class of low-bandwidth denial of service attacks that exploit algorithmic deficiencies in many common applications' data structures, and it is shown how modern universal hashing techniques can yield performance comparable to commonplace hash functions while being provably secure against these attacks.
AdSplit: Separating Smartphone Advertising from Applications
AdSplit is described, where Android is extended to allow an application and its advertising to run as separate processes, under separate user-ids, eliminating the need for applications to request permissions on behalf of their advertising libraries, and providing services to validate the legitimacy of clicks, locally and remotely.
AP3: cooperative, decentralized anonymous communication
- A. Mislove, Gaurav Oberoi, A. Post, C. Reis, P. Druschel, D. Wallach
- Computer ScienceEW 11
- 19 September 2004
This paper describes a cooperative overlay network that provides anonymous communication services for participating users and uses AP3's primitives to build novel anonymous group communication facilities (multicast and anycast), which shield the identity of both publishers and subscribers.
Java security: from HotJava to Netscape and beyond
- Drew Dean, E. Felten, D. Wallach
- Computer ScienceProceedings IEEE Symposium on Security and…
- 6 May 1996
This work examines the Java language and both the HotJava and Netscape browsers which support it, and finds a significant number of flaws which compromise their security.