• Publications
  • Influence
Digital forensics research: The next 10 years
TLDR
This paper argues that we have been in a “Golden Age of Digital Forensics” and that the Golden Age is quickly coming to an end. Expand
  • 551
  • 55
  • PDF
Do security toolbars actually prevent phishing attacks?
TLDR
We conducted two user studies of three security toolbars and other browser security indicators and found them all ineffective at preventing phishing attacks. Expand
  • 571
  • 36
  • PDF
Bringing science to digital forensics with standardized forensic corpora
TLDR
We present a taxonomy for describing corpora, and announce the availability of several forensic data sets that are needed to further forensic research. Expand
  • 311
  • 35
  • PDF
Carving contiguous and fragmented files with fast object validation
TLDR
We survey files from more than 300 hard drives acquired on the secondary market and show that the ability to reassemble fragmented files is an important requirement for forensic work. Expand
  • 216
  • 33
  • PDF
PGP: Pretty Good Privacy
TLDR
From the Publisher: Use of the Internet is expanding beyond anyone's expectations. Expand
  • 422
  • 32
  • PDF
RFID privacy: an overview of problems and proposed solutions
TLDR
As organizations aggressively deploy radio frequency identification systems, activists are increasingly concerned about RFID's potential to invade user privacy. Expand
  • 533
  • 21
  • PDF
Security and Usability: Designing Secure Systems that People Can Use
Covered in: ICS 243G, Ch. 11-16 in Stallings, & Ch. 7, 34 from Cranor-Garfinkel. • Authentication Applications and PKI • Certification and Revocaiton • Authentication and Key Distribution Protocols –Expand
  • 501
  • 19
  • PDF
An Evaluation of Amazon's Grid Computing Services: EC2, S3, and SQS
TLDR
Amazon.com’s Elastic Compute Cloud (EC2), Simple Storage Service (S3) and Simple Queue service (SQS) offer enterprise-class computing, storage and coordination facilities to any organization or individual in the world with a valid credit card. Expand
  • 327
  • 18
  • PDF
Comparing the Usability of Cryptographic APIs
TLDR
We examine how and why the design and resulting usability of different cryptographic libraries affects the security of code written with them, with the goal of understanding how to build effective future libraries. Expand
  • 127
  • 17
  • PDF
Digital forensics XML and the DFXML toolset
TLDR
Digital Forensics XML (DFXML) is an XML language designed to represent a wide range of forensic information and forensic processing results. Expand
  • 95
  • 16
  • PDF
...
1
2
3
4
5
...