Skip to main content

Showing 1–23 of 23 results for author: Wallach, D S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2012.07917  [pdf, other

    cs.CR cs.OS

    The Design and Implementation of a Verified File System with End-to-End Data Integrity

    Authors: Daniel W. Song, Konstantinos Mamouras, Ang Chen, Nathan Dautenhahn, Dan S. Wallach

    Abstract: Despite significant research and engineering efforts, many of today's important computer systems suffer from bugs. To increase the reliability of software systems, recent work has applied formal verification to certify the correctness of such systems, with recent successes including certified file systems and certified cryptographic protocols, albeit using quite different proof tactics and toolcha… ▽ More

    Submitted 14 December, 2020; originally announced December 2020.

    ACM Class: D.2.4; D.4.3; D.4.5; D.4.6

  2. arXiv:1912.06176  [pdf, other

    cs.CR cs.NI

    Investigating the effectiveness of web adblockers

    Authors: Clayton Drazner, Nikola Đuza, Hugo Jonker, Dan S. Wallach

    Abstract: We investigate adblocking filters and the extent to which websites and advertisers react when their content is impacted by these filters. We collected data daily from the Alexa Top-5000 web sites for 120 days, and from specific sites that newly appeared in filter lists for 140 days. By evaluating how long a filter rule triggers on a website, we can gauge how long it remains effective. We matched w… ▽ More

    Submitted 12 December, 2019; originally announced December 2019.

  3. arXiv:1908.01897  [pdf, ps, other

    cs.CR

    On the security of ballot marking devices

    Authors: Dan S. Wallach

    Abstract: A recent debate among election experts has considered whether electronic ballot marking devices (BMDs) have adequate security against the risks of malware. A malicious BMD might produce a printed ballot that disagrees with a voter's actual intent, with the hope that voters would be unlikely to detect this subterfuge. This essay considers how an election administrator can create reasonable auditing… ▽ More

    Submitted 12 December, 2019; v1 submitted 5 August, 2019; originally announced August 2019.

    Comments: Major revision relative to the August draft

  4. arXiv:1707.08619  [pdf, other

    cs.CR

    Public Evidence from Secret Ballots

    Authors: Matthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach

    Abstract: Elections seem simple---aren't they just counting? But they have a unique, challenging combination of security and privacy requirements. The stakes are high; the context is adversarial; the electorate needs to be convinced that the results are correct; and the secrecy of the ballot must be ensured. And they have practical constraints: time is of the essence, and voting systems need to be affordabl… ▽ More

    Submitted 4 August, 2017; v1 submitted 26 July, 2017; originally announced July 2017.

    Comments: To appear in E-Vote-Id '17

  5. arXiv:1705.00782  [pdf, other

    cs.CR

    Verification of STAR-Vote and Evaluation of FDR and ProVerif

    Authors: Murat Moran, Dan S. Wallach

    Abstract: We present the first automated privacy analysis of STAR-Vote, a real world voting system design with sophisticated "end-to-end" cryptography, using FDR and ProVerif. We also evaluate the effectiveness of these tools. Despite the complexity of the voting system, we were able to verify that our abstracted formal model of STAR-Vote provides ballot-secrecy using both formal approaches. Notably, ProVer… ▽ More

    Submitted 1 May, 2017; originally announced May 2017.

    Comments: 16 pages, 2 figures, submitted to iFM 2017 conference

  6. arXiv:1502.06577  [pdf, other

    cs.CR cs.CY

    An Empirical Study of Mobile Ad Targeting

    Authors: Theodore Book, Dan S. Wallach

    Abstract: Advertising, long the financial mainstay of the web ecosystem, has become nearly ubiquitous in the world of mobile apps. While ad targeting on the web is fairly well understood, mobile ad targeting is much less studied. In this paper, we use empirical methods to collect a database of over 225,000 ads on 32 simulated devices hosting one of three distinct user profiles. We then analyze how the ads a… ▽ More

    Submitted 23 February, 2015; originally announced February 2015.

    Comments: Submitted to USENIX Security 2015

  7. arXiv:1411.3777  [pdf, other

    cs.OS

    Glider: A GPU Library Driver for Improved System Security

    Authors: Ardalan Amiri Sani, Lin Zhong, Dan S. Wallach

    Abstract: Legacy device drivers implement both device resource management and isolation. This results in a large code base with a wide high-level interface making the driver vulnerable to security attacks. This is particularly problematic for increasingly popular accelerators like GPUs that have large, complex drivers. We solve this problem with library drivers, a new driver architecture. A library driver i… ▽ More

    Submitted 13 November, 2014; originally announced November 2014.

  8. arXiv:1403.5871  [pdf, other

    cs.CR

    The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities

    Authors: Yue Liu, David R. Bild, Robert P. Dick, Z. Morley Mao, Dan S. Wallach

    Abstract: Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many identities in order to gain disproportionate influence. Many defenses based on spatial variability of wireless channels exist, but depend either on detailed, multi-tap channel estimation - something not exposed on commodity 802.11 devices - or valid RSSI observations from multiple trusted sources, e.g., corp… ▽ More

    Submitted 24 March, 2014; originally announced March 2014.

  9. arXiv:1403.4677  [pdf, other

    cs.NI

    Performance Analysis of Location Profile Routing

    Authors: David R. Bild, Yue Liu, Robert P. Dick, Z. Morley Mao, Dan S. Wallach

    Abstract: We propose using the predictability of human motion to eliminate the overhead of distributed location services in human-carried MANETs, dubbing the technique location profile routing. This method outperforms the Geographic Hashing Location Service when nodes change locations 2x more frequently than they initiate connections (e.g., start new TCP streams), as in applications like text- and instant-m… ▽ More

    Submitted 18 March, 2014; originally announced March 2014.

  10. arXiv:1402.2671  [pdf, other

    cs.SI physics.soc-ph

    Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph

    Authors: David R. Bild, Yue Liu, Robert P. Dick, Z. Morley Mao, Dan S. Wallach

    Abstract: Most previous analysis of Twitter user behavior is focused on individual information cascades and the social followers graph. We instead study aggregate user behavior and the retweet graph with a focus on quantitative descriptions. We find that the lifetime tweet distribution is a type-II discrete Weibull stemming from a power law hazard function, the tweet rate distribution, although asymptotical… ▽ More

    Submitted 11 February, 2014; originally announced February 2014.

    Comments: 17 pages, 21 figures

    Journal ref: ACM Trans. Internet Technol. 15, 1, Article 4 (February 2015), 24 pages

  11. arXiv:1307.6082  [pdf, other

    cs.CR

    A Case of Collusion: A Study of the Interface Between Ad Libraries and their Apps

    Authors: Theodore Book, Dan S. Wallach

    Abstract: A growing concern with advertisement libraries on Android is their ability to exfiltrate personal information from their host applications. While previous work has looked at the libraries' abilities to measure private information on their own, advertising libraries also include APIs through which a host application can deliberately leak private information about the user. This study considers a co… ▽ More

    Submitted 23 July, 2013; originally announced July 2013.

    Comments: 6 pages

  12. arXiv:1305.0245  [pdf, ps, other

    cs.CR cs.NI

    Automated generation of web server fingerprints

    Authors: Theodore Book, Martha Witick, Dan S. Wallach

    Abstract: In this paper, we demonstrate that it is possible to automatically generate fingerprints for various web server types using multifactor Bayesian inference on randomly selected servers on the Internet, without building an a priori catalog of server features or behaviors. This makes it possible to conclusively study web server distribution without relying on reported (and variable) version strings.… ▽ More

    Submitted 1 May, 2013; originally announced May 2013.

  13. arXiv:1303.0857  [pdf, other

    cs.CR

    Longitudinal Analysis of Android Ad Library Permissions

    Authors: Theodore Book, Adam Pridgen, Dan S. Wallach

    Abstract: This paper investigates changes over time in the behavior of Android ad libraries. Taking a sample of 100,000 apps, we extract and classify the ad libraries. By considering the release dates of the applications that use a specific ad library version, we estimate the release date for the library, and thus build a chronological map of the permissions used by various ad libraries over time. We find t… ▽ More

    Submitted 18 April, 2013; v1 submitted 4 March, 2013; originally announced March 2013.

    Comments: Most 2013

    Journal ref: Mobile Security Technologies (MoST), May 2013, San Francisco CA

  14. arXiv:1303.0597  [pdf

    cs.CY cs.IR cs.SI

    The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions

    Authors: Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach

    Abstract: Weibo and other popular Chinese microblogging sites are well known for exercising internal censorship, to comply with Chinese government requirements. This research seeks to quantify the mechanisms of this censorship: how fast and how comprehensively posts are deleted.Our analysis considered 2.38 million posts gathered over roughly two months in 2012, with our attention focused on repeatedly visit… ▽ More

    Submitted 9 July, 2013; v1 submitted 3 March, 2013; originally announced March 2013.

    Comments: arXiv admin note: substantial text overlap with arXiv:1211.6166

  15. arXiv:1211.6166  [pdf

    cs.IR cs.CR

    Tracking and Quantifying Censorship on a Chinese Microblogging Site

    Authors: Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach

    Abstract: We present measurements and analysis of censorship on Weibo, a popular microblogging site in China. Since we were limited in the rate at which we could download posts, we identified users likely to participate in sensitive topics and recursively followed their social contacts. We also leveraged new natural language processing techniques to pick out trending topics despite the use of neologisms, na… ▽ More

    Submitted 26 November, 2012; originally announced November 2012.

    ACM Class: H.3.3; H.3.5; I.2.7

  16. arXiv:1211.1904  [pdf, other

    cs.CR

    STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System

    Authors: Josh Benaloh, Mike Byrne, Philip Kortum, Neal McBurnett, Olivier Pereira, Philip B. Stark, Dan S. Wallach

    Abstract: In her 2011 EVT/WOTE keynote, Travis County, Texas County Clerk Dana DeBeauvoir described the qualities she wanted in her ideal election system to replace their existing DREs. In response, in April of 2012, the authors, working with DeBeauvoir and her staff, jointly architected STAR-Vote, a voting system with a DRE-style human interface and a "belt and suspenders" approach to verifiability. It pro… ▽ More

    Submitted 8 November, 2012; originally announced November 2012.

  17. arXiv:1202.4030  [pdf, other

    cs.OS

    AdSplit: Separating smartphone advertising from applications

    Authors: Shashi Shekhar, Michael Dietz, Dan S. Wallach

    Abstract: A wide variety of smartphone applications today rely on third-party advertising services, which provide libraries that are linked into the hosting application. This situation is undesirable for both the application author and the advertiser. Advertising libraries require additional permissions, resulting in additional permission requests to users. Likewise, a malicious application could simulate t… ▽ More

    Submitted 17 February, 2012; originally announced February 2012.

  18. arXiv:1109.6874  [pdf, other

    cs.CR cs.SI

    #h00t: Censorship Resistant Microblogging

    Authors: Dustin Bachrach, Christopher Nunu, Dan S. Wallach, Matthew Wright

    Abstract: Microblogging services such as Twitter are an increasingly important way to communicate, both for individuals and for groups through the use of hashtags that denote topics of conversation. However, groups can be easily blocked from communicating through blocking of posts with the given hashtags. We propose #h00t, a system for censorship resistant microblogging. #h00t presents an interface that is… ▽ More

    Submitted 30 September, 2011; originally announced September 2011.

    Comments: 10 pages, 4 figures. keywords: censorship resistance, twitter, microblogging, covert channels, group anonymity

  19. arXiv:1108.2718  [pdf, other

    cs.CR

    The BitTorrent Anonymity Marketplace

    Authors: Seth James Nielson, Dan S. Wallach

    Abstract: The very nature of operations in peer-to-peer systems such as BitTorrent exposes information about participants to their peers. Nodes desiring anonymity, therefore, often chose to route their peer-to-peer traffic through anonymity relays, such as Tor. Unfortunately, these relays have little incentive for contribution and struggle to scale with the high loads that P2P traffic foists upon them. We p… ▽ More

    Submitted 12 August, 2011; originally announced August 2011.

    Comments: 15 page, 6 figure, technical report

  20. arXiv:1108.2716  [pdf, other

    cs.GT cs.NI

    Building Better Incentives for Robustness in BitTorrent

    Authors: Seth James Nielson, Caleb E. Spare, Dan S. Wallach

    Abstract: BitTorrent is a widely-deployed, peer-to-peer file transfer protocol engineered with a "tit for tat" mechanism that encourages cooperation. Unfortunately, there is little incentive for nodes to altruistically provide service to their peers after they finish downloading a file, and what altruism there is can be exploited by aggressive clients like Bit- Tyrant. This altruism, called seeding, is alwa… ▽ More

    Submitted 12 August, 2011; originally announced August 2011.

    Comments: 14 pages, 11 figures, technical report

  21. arXiv:1108.2704  [pdf

    cs.CR

    Attacks on Local Searching Tools

    Authors: Seth James Nielson, Seth J. Fogarty, Dan S. Wallach

    Abstract: The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is t… ▽ More

    Submitted 12 August, 2011; originally announced August 2011.

    Comments: Previously unpublished technical report from December 2004

  22. arXiv:1107.3794  [pdf

    cs.CR

    An Analysis of Chinese Search Engine Filtering

    Authors: Tao Zhu, Christopher Bronk, Dan S. Wallach

    Abstract: The imposition of government mandates upon Internet search engine operation is a growing area of interest for both computer science and public policy. Users of these search engines often observe evidence of censorship, but the government policies that impose this censorship are not generally public. To better understand these policies, we conducted a set of experiments on major search engines empl… ▽ More

    Submitted 19 July, 2011; originally announced July 2011.

    Comments: 11 pages

  23. arXiv:1102.2445  [pdf, other

    cs.CR

    Quire: Lightweight Provenance for Smart Phone Operating Systems

    Authors: Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach

    Abstract: Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of network connections they receive. Even within the phone, different apps with different privileges can communicate with one another, allowing one app to trick another into improperly exercising its privileges (a Confused De… ▽ More

    Submitted 11 February, 2011; originally announced February 2011.