Seth Hall

Learn More
Bovine spongiform encephalopathy (BSE) is a transmissible spongiform encephalopathy (TSE) of cattle and was first detected in 1986 in the United Kingdom. It is the most likely cause of variant Creutzfeldt-Jakob disease (CJD) in humans. The origin of BSE remains an enigma. Here we report an H-type BSE case associated with the novel mutation E211K within the(More)
Much of the Internet's end-to-end security relies on the SSL protocol along with its underlying certificate infrastructure. We offer an in-depth study of real-world SSL and X.509 deployment characteristics from an unprecedented vantage point, based on a data set of more than 1.4 billion SSL sessions collected at the border of five operational sites. Our(More)
Much of the Internet's end-to-end security relies on the SSL/TLS protocol along with its underlying X.509 certificate infrastructure. However, the system remains quite brittle due to its liberal delegation of signing authority: a single compromised certification authority undermines trust globally. Several recent high-profile incidents have demonstrated(More)
Much of the Internet's end-to-end security relies on the SSL protocol along with its underlying X.509 certificate infrastructure. However, the system remains quite brittle due to its liberal delegation of signing authority: a single compromised certification authority undermines trust globally. We present a novel notary service that helps clients to(More)
For network intrusion detection systems it is becoming increasingly difficult to reliably report today's complex attacks without having external context at hand. Unfortunately, however, today's IDS cannot readily integrate intelligence, such as dynamic blacklists, into their operation. In this work, we introduce a fundamentally new capability into IDS(More)
Goals and Significance This research is aimed at increasing our understanding of the basic perceptual properties of the tactual system and developing improved strategies for encoding and displaying speech and other sounds that will lead to improved tactual communication devices. Research was conducted in four general areas: (1) Basic studies of hand(More)
statistics represent a key primitive for profiling and protecting operational networks. Many network operators routinely measure properties such as throughput, traffic mix, and heavy hitters. Likewise, security monitoring often deploys statistical anomaly detectors that trigger, e.g., when a source scans the local IP address range, or exceeds a threshold of(More)
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors or originators and do not necessarily reflect the views of the National Science Foundation. Abstract Deep packet inspection systems (DPI) process wire format network data from untrusted sources, collecting semantic information from a variety of(More)
Current speech recognition software allows exam-specific standard reports to be prepopulated into the dictation field based on the radiology information system procedure code. While it is thought that prepopulating reports can decrease the time required to dictate a study and the overall number of errors in the final report, this hypothesis has not been(More)