Seth Hall

Learn More
Bovine spongiform encephalopathy (BSE) is a transmissible spongiform encephalopathy (TSE) of cattle and was first detected in 1986 in the United Kingdom. It is the most likely cause of variant Creutzfeldt-Jakob disease (CJD) in humans. The origin of BSE remains an enigma. Here we report an H-type BSE case associated with the novel mutation E211K within the(More)
Much of the Internet's end-to-end security relies on the SSL protocol along with its underlying certificate infrastructure. We offer an in-depth study of real-world SSL and X.509 deployment characteristics from an unprecedented vantage point, based on a data set of more than 1.4 billion SSL sessions collected at the border of five operational sites. Our(More)
Much of the Internet's end-to-end security relies on the SSL/TLS protocol along with its underlying X.509 certificate infrastructure. However, the system remains quite brittle due to its liberal delegation of signing authority: a single compromised certification authority undermines trust globally. Several recent high-profile incidents have demonstrated(More)
For network intrusion detection systems it is becoming increasingly difficult to reliably report today's complex attacks without having external context at hand. Unfortunately, however, today's IDS cannot readily integrate intelligence, such as dynamic blacklists, into their operation. In this work, we introduce a fundamentally new capability into IDS(More)
Much of the Internet's end-to-end security relies on the SSL protocol along with its underlying X.509 certificate infrastructure. However, the system remains quite brittle due to its liberal delegation of signing authority: a single compromised certification authority undermines trust globally. We present a novel notary service that helps clients to(More)
—With the rapid advances in mobile technology many mobile devices are capable of capturing high quality images and video with their embedded camera. This paper investigates techniques for real-time processing of the resulting images, particularly on-device utilizing a graphical processing unit. Issues and limitations of image processing on mobile devices(More)
statistics represent a key primitive for profiling and protecting operational networks. Many network operators routinely measure properties such as throughput, traffic mix, and heavy hitters. Likewise, security monitoring often deploys statistical anomaly detectors that trigger, e.g., when a source scans the local IP address range, or exceeds a threshold of(More)
Current speech recognition software allows exam-specific standard reports to be prepopulated into the dictation field based on the radiology information system procedure code. While it is thought that prepopulating reports can decrease the time required to dictate a study and the overall number of errors in the final report, this hypothesis has not been(More)
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors or originators and do not necessarily reflect the views of the National Science Foundation. Abstract Deep packet inspection systems (DPI) process wire format network data from untrusted sources, collecting semantic information from a variety of(More)
A realtime feature point detection algorithm called ColourFAST is introduced. ColourFAST extracts vector-based feature strength and direction measures from the colour channels of any pixel in an image. The extracted information is applied to create an effective feature point tracker. These feature point and tracker algorithms have a pipeline design(More)