Dan Wallach / Publications By Type

(download most Rice Seclab publications at pubs.cs.rice.edu)

Journal Papers

  1. Susan Bell, Josh Benaloh, Michael D. Byrne, Dana DeBeauvoir, Bryce Eakin, Gail Fisher, Philip Kortum, Neal McBurnett, Julian Montoya Michelle Parker, Olivier Pereira, Philip B. Stark, Dan S. Wallach, Michael Winn, STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System, USENIX Journal of Election Technology and Systems (JETS), vol. 1, no. 1, August 2013.
  2. Scott A. Crosby and Dan S. Wallach, High Throughput Asynchronous Algorithms for Message Authentication, currently in journal submission.
  3. Scott A. Crosby and Dan S. Wallach, Authenticated Dictionaries: Real-World Costs and Tradeoffs, ACM Transactions on Information and System Security (TISSEC), vol. 14, no. 2, September 2011.
  4. Scott A. Crosby, Rudolf H. Riedi, and Dan S. Wallach, Opportunities and Limits of Remote Timing Attacks, ACM Transactions on Information and Systems Security (TISSEC), vol. 12, no. 3, January 2009.
  5. Dan S. Wallach. Voting System Risk Assessment via Computational Complexity Analysis. William & Mary Bill of Rights Journal, vol. 17, December 2008.
  6. Robert M. Stein, Greg Vonnahme, Michael Byrne, and Dan S. Wallach, Voting Technology, Election Administration, and Voter Performance, Election Law Journal, vol. 7, no. 2, April 2008.
  7. Cristian Coarfa, Peter Druschel, and Dan S. Wallach, Performance Analysis of TLS Web Servers, ACM Transactions on Computer Systems, vol. 24, no. 1, February 2006.
  8. Eyal de Lara, Yogesh Chopra, Nilesh Vaghela, Rajnish Kumar, Dan S. Wallach, and Willy Zwaenepoel, Iterative Adaptation for Mobile Clients Using Existing APIs, IEEE Transactions on Parallel and Distributed Systems, vol. 16, no. 10, October 2005 (also appeared in IEEE Distributed Systems Online, vol. 6, no. 9, September 2005).
  9. Adam B. Stubblefield, Aviel D. Rubin, and Dan S. Wallach, Managing the Performance Impact of Web Security, Electronic Commerce Research Journal, vol 5, no. 1, February 2005.
  10. Andrew M. Ladd, Kostas E. Bekris, Algis Rudys, Lydia E. Kavraki, and Dan S. Wallach, Robotics-Based Location Sensing Using Wireless Ethernet, Wireless Networks, volume 11, number 1-2, January 2005, pp. 189-204.
  11. Andrew M. Ladd, Kostas E. Bekris, Algis P. Rudys, Dan S. Wallach, and Lydia E. Kavraki. On the Feasibility of Using Wireless Ethernet for Indoor Localization, IEEE Transactions on Robotics and Automation, volume 20, number 3, June 2004.
  12. Y. Charlie Hu, Weimin Yu, Alan Cox, Dan S. Wallach, and Willy Zwaenepoel, Runtime Support for Distributed Sharing in Safe Languages. ACM Transactions on Computer Systems, volume 21, number 1, pp. 1-35, February 2003.
  13. Algis Rudys and Dan S. Wallach, Termination in Language-based Systems, ACM Transactions on Information and System Security, volume 5, number 2, May 2002.
  14. Dan S. Wallach, Edward W. Felten, and Andrew W. Appel, The Security Architecture Formerly Known as Stack Inspection: A Security Mechanism for Language-based Systems, ACM Transactions on Software Engineering and Methodology, volume 9, number 4, October 2000.

Refereed Conference Papers

  1. Tao Zhu, David Phipps, Adam Pridgen, Jedidiah Crandall, and Dan S. Wallach, The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions, in USENIX Security Symposium (Washington, DC), August, 2013.
  2. Peiyou Song, Anhei Shu, David Phipps, Dan S. Wallach, Mohit Tiwari, Jedidiah Crandall, George Lugar. Language Without Words: A Pointillist Model for Natural Language Processing. 6th International Conference on Soft Computing and Intelligent Systems (SCIS-ISIS 2012) (Kobe, Japan), December 2012.
  3. Alexei Czeskis, Michael Dietz, Tadayoshi Kohno, Dan S. Wallach, and Dirk Balfanz. Strengthening user authentication through opportunistic cryptographic identity assertions. 19th ACM Conference on Computer and Communications Security (CCS '12) (Raleigh, NC), October 2012.
  4. Peiyou Song, Anhei Shu, Anyu Zhou, Dan Wallach, and Jedidiah R. Crandall. A Pointillism Approach for Natural Language Processing of Social MediaProceedings of the 2012 International Conference on Natural Language Processing and Knowledge Engineering (NLP-KE'12) (Hefei, China), September 2012. —best paper award
  5. Michael Dietz, Alexei Czeskis, Dirk Balfanz, and Dan S. Wallach. Origin-bound certificates: a fresh approach to strong client authentication for the Web. 21st USENIX Security Symposium (Bellevue, WA), August 2012.
  6. Shashi Shekhar, Michael Dietz, and Dan S. Wallach. AdSplit: Separating smartphone advertising from applications. 21st USENIX Security Symposium (Bellevue, WA), August 2012.
  7. Adam Bates, Kevin Butler, Micah Sherr, Clay Shields, Patrick Traynor, and Dan S. Wallach. Accountable Wiretapping, or I Know They Can Hear You Now, 19th Network and Distributed Systems Symposium (NDSS '12) (San Diego, CA), February 2012.
  8. Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, and Dan S. Wallach, Quire: Lightweight Provenance for Smartphone Operating Systems, 21st USENIX Security Symposium (San Francisco, CA), August 2011.
  9. Tsuen-Wan "Johnny" Ngan, Roger Dingledine, and Dan S. Wallach, Building Incentives into Tor, Proceedings of Financial Cryptography (FC '10) (Tenerife, Canary Islands), January 2010.
    best paper award
  10. Scott Crosby and Dan S. Wallach, Super-efficient Aggregating History-independent Persistent Authenticated Dictionaries, 14th European Symposium on Research in Computer Security (Saint Malo, France), September 2009.
  11. Scott Crosby and Dan S. Wallach, Efficient Data Structures for Tamper Evident Logging. 18th USENIX Security Symposium (Montreal, Canada), August 2009.
  12. Daniel R. Sandler, Kyle Derr, and D. S. Wallach, VoteBox: A Tamper-Evident, Verifiable Electronic Voting System. 17th USENIX Security Symposium (USENIX Security ’08) (San Jose, California), August 2008.
  13. Sarah P. Everett, Kristen K. Greene, Michael D. Byrne, Dan S. Wallach, Kyle Derr, Daniel Sandler, and Ted Torous, Electronic Voting Machines versus Traditional Methods: Improved Preference, Similar Performance, Human Factors in Computing Systems: Proceedings of CHI 2008 (Florence, Italy), April 2008.
  14. Atul Singh, Tsuen-Wan "Johnny" Ngan, Peter Druschel, and Dan S. Wallach, Eclipse Attacks on Overlay Networks: Threats and Defenses, IEEE INFOCOM '06 (Barcelona, Spain), April 2006.
  15. Animesh Nandi, Tsuen-Wan "Johnny" Ngan, Atul Singh, Peter Druschel, and Dan S. Wallach, Scrivener: Providing Incentives in Cooperative Content Distribution Systems, ACM/IFIP/USENIX 6th International Middleware Conference (Middleware 2005) (Grenoble, France), November 2005.
  16. Andreas Haeberlen, Eliot Flannery, Andrew M. Ladd, Algis Rudys, Dan S. Wallach, and Lydia E. Kavraki, Practical Robust Localization over Large-Scale 802.11 Networks, Tenth ACM International Conference on Mobile Computing and Networking (MOBICOM 2004) (Philadelphia, Pennsylvania), September 2004.
  17. Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, and Dan S. Wallach, Analysis of an Electronic Voting System, 2004 IEEE Symposium on Security and Privacy (Oakland, California), May 2004.
  18. Scott Crosby and Dan S. Wallach, Denial of Service via Algorithmic Complexity Attacks, 12th Usenix Security Symposium (Washington, D.C.), August 2003.
  19. David W. Price, Algis Rudys, and Dan S. Wallach, Garbage Collector Memory Accounting in Language-Based Systems, 2003 IEEE Symposium on Security and Privacy (Oakland, California), May 2003.
  20. Eyal de Lara, Rajnish Kumar, Dan S. Wallach, and Willy Zwaenepoel, Collaboration and Multimedia Authoring on Mobile Devices, First International Conference on Mobile Systems, Applications, and Services (MobiSys '03) (San Francisco, California), May 2003.
  21. Miguel Castro, Peter Druschel, Ayalvadi Ganesh, Antony Rowstron and Dan S. Wallach, Security for Peer-to-Peer Routing Overlays. Fifth Symposium on Operating Systems Design and Implementation (OSDI '02) (Boston, Massachusetts), December 2002.
  22. Andrew M. Ladd, Kostas E. Bekris, Guillaume Marceau, Algis Rudys, Dan S. Wallach, and Lydia E. Kavraki, Using Wireless Ethernet for Localization. 2002 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2002) (Lausanne, Switzerland), October 2002.
  23. Andrew M. Ladd, Kostas E. Bekris, Guillaume Marceau, Algis Rudys, Lydia E. Kavraki, and Dan S. Wallach, Robotics-Based Location Sensing using Wireless Ethernet. Eighth ACM International Conference on Mobile Computing and Networking (MOBICOM 2002) (Atlanta, Georgia), September
  24. Algis Rudys and Dan S. Wallach, Transactional Rollback for Language-Based Systems, The 2002 International Conference on Dependable Systems and Networks (DSN-2002) (Washington, D.C.), June 2002.
  25. Cristian Coarfa, Peter Druschel, and Dan S. Wallach, Performance Analysis of TLS Web Servers, Network and Distributed Systems Security Symposium (San Diego, California), February 2002.
  26. Eyal de Lara, Dan S. Wallach, and Willy Zwaenepoel, HATS: Hierarchical Adaptive Transmission Scheduling, Multimedia Computing and Networking 2002 (MMCN02) (San Jose, California), January 2002.
  27. Jason Flinn, Eyal de Lara, M. Satyanarayanan, Dan S. Wallach, and Willy Zwaenepoel, Reducing the Energy Usage of Office Applications, IFIP/ACM International Conference on Distributed Systems Platforms - Middleware 2001 (Heidelberg, Germany), November 2001.
  28. Scott A. Craver, Min Wu, Bede Liu, Adam Stubblefield, Ben Swartzlander, Dan S. Wallach, Drew Dean, and Edward W. Felten, Reading Between the Lines: Lessons from the SDMI Challenge, 10th Usenix Security Symposium (Washington, D.C.), August 2001.
  29. Eyal de Lara, Dan S. Wallach and Willy Zwaenepoel, Puppeteer: Component-based Adaptation for Mobile Computing, 3rd Usenix Symposium on Internet Technologies and Systems (USITS '01) (San Francisco, California), March 2001.
  30. Algis Rudys, John Clements, and Dan S. Wallach, Termination in Language-based Systems, Network and Distributed Systems Security Symposium (San Diego, California), February 2001.
  31. Eyal de Lara, Dan S. Wallach, and Willy Zwaenepoel, Opportunities for Bandwidth Adaptation in Microsoft Office Documents, 4th Usenix Windows Systems Symposium (Seattle, Washington), August 2000.
  32. Dan S. Wallach and Edward W. Felten, Understanding Java Stack Inspection, 1998 IEEE Symposium on Security and Privacy (Oakland, California), May 1998, pp. 52-63.
  33. Dan S. Wallach, Dirk Balfanz, Drew Dean, and Edward W. Felten, Extensible Security Architectures for Java, 16th Symposium on Operating Systems Principles (Saint-Malo, France), October 1997, pp. 116-128.
    outstanding paper award
  34. Edward W. Felten, Dirk Balfanz, Drew Dean, and Dan S. Wallach, Web Spoofing: An Internet Con Game, 20th National Information Systems Security Conference (Baltimore, Maryland), October 1996.
  35. Drew Dean, Edward W. Felten, and Dan S. Wallach, Java Security: From HotJava to Netscape and Beyond, 1996 IEEE Symposium on Security and Privacy (Oakland, California), May 1996, pp. 190-200.
  36. Dan S. Wallach, Sharma Kunapalli and Michael F. Cohen, Accelerated MPEG Compression of Dynamic Polygonal Scenes, Computer Graphics, SIGGRAPH 1994 (Orlando, Florida), August 1994, pp. 193-196.

Articles, Book Chapters, Etc.

  1. Dan S. Wallach, Viewpoint: Rebooting the CS Publication Process, Communications of the ACM, vol. 54, no. 10, October 2011. Longer version available as a technical report, 2010.
  2. Dan S. Wallach, Smartphone Security: Trends and Predictions, Secure Application Development (SecAppDev 2011) (Leuven, Belgium), February 2011.
  3. Scott A. Crosby and Dan S. Wallach, Algorithmic Denial of Service, Encyclopedia of Cryptography and Security, 2nd. ed., Springer-Verlag, 2010.
  4. Dan S. Wallach, Native Client: A Clever Alternative, Communications of the ACM, vol. 53, no. 1, January 2010, p. 90.
  5. Dan S. Wallach, Polling place burglary raises specter of fraud, Houston Chronicle (op-ed), December 10, 2009.
  6. Dan S. Wallach, Technical Perspective: Tools for Information to Flow Securely and Swift-ly, Communications of the ACM, vol. 52, no. 2, February 2009, p. 78.
  7. Chris Bronk, Dan Castro, and Dan Wallach, Group Effort Needed to Secure Cyberspace, Houston Chronicle, June 2009.
  8. Dan S. Wallach, Texas Must Confront Voting Systems' Flaws, Austin American-Statesman, September 2004.
  9. Jonathan Bannet, David W. Price, Algis Rudys, Justin Singer, and Dan S. Wallach, Hack-a-Vote: Demonstrating Security Issues with Electronic Voting Systems, IEEE Security & Privacy Magazine, volume 2, number 1, January/February 2004, pp. 32-37. Also reprinted by ComputerUser, March 2004.
  10. Dan S. Wallach, Copy Protection Technology is Doomed, IEEE Computer, volume 34, number 10, October 2001, pp. 48-49.
  11. Drew Dean, Edward W. Felten, Dan S. Wallach, and Dirk Balfanz, Java Security: Web Browsers and Beyond, Internet Beseiged: Countering Cyberspace Scofflaws, D. E. Denning and P. J. Denning, Eds. ACM Press, New York, Oct. 1997, pp. 241-269.

PhD Dissertation

Dan S. Wallach, A New Approach to Mobile Code Security, PhD Dissertation, Princeton University, January 1999.
Advised by Edward W. Felten and Andrew Appel

Workshop Papers

  1. Theodore Book, Adam Pridgen, and Dan S. Wallach, Longitudinal Analysis of Android Ad Library Permissions, Mobile Security Technologies (MOST 2013), San Francisco, CA, May 2013.
  2. Nicholas Aase, Jedidiah R. Crandall, Alvaro Diaz, Jeffrey Knockel, Jorge Ocana Molinero, Jared Saia, Dan S. Wallach, and Tao Zhu. Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations. 2nd USENIX Workshop on Free and Open Communications on the Internet. (FOCI 2012) (Bellevue, Washington), August 2012.
  3. Mehrdad Majzoobi, Masoud Rostami, Farinaz Koushanfar, Srinivas Devadas, and Dan S. Wallach. Slender PUF protocol: a lightweight, robust, and secure strong authentication by substring matching. International Workshop on Trustworthy Embedded Devices (TrustED 2012) (San Francisco, CA), May 2012.
  4. Yue Liu, David R. Bild, Robert P. Dick, Z. Morley Mao, and Dan S. Wallach, Using predictable mobility patterns to support scalable and secure MANETs of handheld devices, 6th ACM International Workshop on Mobility in the Evolving Internet Architecture (MobiArch '11) (Washington, D.C.), June 2011.
  5. Dan S. Wallach, End-to-end crypto works. Now what? NIST End-to-End Voting Systems Workshop (Washington, D.C.), October 2009.
  6. Ersin Öksüzoğlu and Dan S. Wallach, VoteBox Nano: A Smaller, Stronger FPGA-based Voting Machine, 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE ‘09) (Montreal, Canada), August 2009.
  7. Chris Grier, Samuel T. King, and Dan S. Wallach, How I Learned to Stop Worrying and Love Plugins, Workshop on Web 2.0 Security and Privacy (W2SP '09) (Oakland, California), May 2009.
  8. Daniel R. Sandler and Dan S. Wallach. Birds of a FETHR: Open, Decentralized Micropublishing. 8th International Workshop on Peer-to-Peer Systems (IPTPS ’09) (Boston, Massachusetts), April 2009.
  9. Daniel R. Sandler and Dan S. Wallach, The Case for Networked Remote Voting Precincts. 3rd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '08) (San Jose, California), August 2008.
  10. Daniel R. Sandler and Dan S. Wallach. <input type="password"> must die! Web 2.0 Security & Privacy (W2SP 2008) (Oakland, California), May 2008.
  11. Daniel R. Sandler, Kyle Derr, Scott Crosby, and Dan S. Wallach. Finding the evidence in tamper-evident logs. Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE’08) (Oakland, California), May 2008.
  12. Daniel Sandler and Dan S. Wallach, Casting Votes in the Auditorium, 2nd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '07) (Boston, Massachusetts), August 2007.
  13. Seth James Nielson, Scott A. Crosby, and Dan S. Wallach, A Taxonomy of Rational Attacks, Fourth International Workshop on Peer-to-Peer Systems (IPTPS '05) (Ithaca, New York), February 2005.
  14. Alan Mislove, Gaurav Oberoi, Ansley Post, Charles Reis, Peter Druschel, and Dan S. Wallach, AP3: Cooperative, Decentralized Anonymous Communication, 11th ACM SIGOPS European Workshop (Leuven, Belgium), September 2004.
  15. Tsuen-Wan "Johnny" Ngan, Animesh Nandi, Atul Singh, Dan S. Wallach, and Peter Druschel, Designing Incentives-Compatible Peer-to-Peer Systems, 2nd Bertinoro Workshop on Future Directions in Distributed Computing (FuDiCo 2004) (Bertinoro, Italy), June 2004.
  16. Tsuen-Wan "Johnny" Ngan, Dan S. Wallach, and Peter Druschel, Incentives-Compatible Peer-to-Peer Multicast, 2nd Workshop on Economics of Peer-to-Peer Systems (Cambridge, Massachusetts), June 2004.
  17. Ping Tao, Algis Rudys, Andrew Ladd, and Dan S. Wallach, Wireless LAN Location Sensing for Security Applications, ACM Workshop on Wireless Security (WiSe 2003) (San Diego, California), September 2003.
  18. Andrew Fuqua, Tsuen-Wan "Johnny" Ngan, and Dan S. Wallach, Economic Behavior of Peer-to-Peer Storage Networks, Workshop on Economics of Peer-to-Peer Systems (Berkeley, California), June 2003.
  19. Alan Mislove, Charles Reis, Ansley Post, Paul Willmann, Peter Druschel, Dan S. Wallach, Xavier Bonnaire, Pierre Sens, Jean-Michel Busca, and Luciana Arantes-Bezerra, POST: A Secure, Resilient, Cooperative Messaging System, 9th Workshop on Hot Topics in Operating Systems (HotOS IX) (Lihue, Hawaii), May 2003.
  20. Nathanael Paul, David Evans, Aviel D. Rubin, and Dan S. Wallach, Authentication for Remote Voting, Workshop on Human-Computer Interaction and Security Systems (Fort Lauderdale, Florida), April 2003.
  21. Tsuen-Wan "Johnny" Ngan, Dan S. Wallach, and Peter Druschel, Enforcing Fair Sharing of Peer-to-Peer Resources, 2nd International Workshop on Peer-to-Peer Systems (IPTPS '03) (Berkeley, California), February 2003.
  22. Algis Rudys and Dan S. Wallach, Enforcing Java Run-Time Properties Using Bytecode Rewriting, International Symposium on Software Security (Tokyo, Japan), November 2002.
  23. Dan S. Wallach, A Survey of Peer-to-Peer Security Issues, International Symposium on Software Security (Tokyo, Japan), November 2002.
  24. Yuri Dotsenko, Eyal de Lara, Dan S. Wallach, and Willy Zwaenepoel, Extensible Adaptation via Constraint Solving, 4th IEEE Workshop on Mobile Computing Systems & Applications (Callicoon, New York), June 2002.
  25. Eyal de Lara, Rajnish Kumar, Dan S. Wallach, and Willy Zwaenepoel, Collaboration and Document Editing on Bandwidth-Limited Devices, Proceedings of the Workshop on Application Models and Programming Tools for Ubiquitous Computing (UbiTools '01) (Atlanta, Georgia), September 2001.
  26. Eyal de Lara, Dan S. Wallach, and Willy Zwaenepoel, Position Summary: Architectures for Adaptation Systems, Eighth IEEE Workshop on Hot Topics in Operating Systems (HotOS-VIII) (Schloss Elmau, Germany), May 2001.
  27. Y. Charie Hu, Weimin Yu, Alan L. Cox, Dan S. Wallach, and Willy Zwaenepoel, Runtime Support for Distributed Sharing in Typed Languages, Proceedings of LCR2000: the Fifth Workshop on Languages, Compilers, and Run-time Systems for Scalable Computers (Rochester, New York), May 2000.
  28. Dan S. Wallach, Jim A. Roskind, and Edward W. Felten, Flexible, Extensible Java Security Using Digital Signatures, Network Threats (New Brunswick, New Jersey), December 1996, R. N. Wright and P. G. Neumann, Eds., vol. 38 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, pp. 59-74.

Tech Reports / Miscellaneous

  1. Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, and Dan S. Wallach. Tracking and Quantifying Censorship on a Chinese Microblogging Site. arXiv CoRR (abs/1211.6166), November 2012.
  2. Josh Benaloh, Mike Byrne, Philip Kortum, Neal McBurnett, Olivier Pereira, Philip B. Stark, and Dan S. Wallach. STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System. arXiv CoRR (abs/1211.1904), November 2012.
  3. Tao Zhu, Chris Bronk, and Dan S. Wallach. An Analysis of Chinese Search Engine Filtering, arXiv CoRR (abs/1107.3794), July 2011.
  4. Dustin Bachrach, Christopher Nunu, Dan S. Wallach, and Matthew Wright. #h00t: Censorship-Resistant Microblogging, arXiv CoRR (abs/1109.6874), September 2011.
  5. Seth J. Nielson and Dan S. Wallach. The BitTorrent Anonymity Marketplace. arXiv CoRR (abs/1108.2718), August 2011.
  6. Seth J. Nielson, Caleb E. Spare, and Dan S. Wallach. Building better incentives for robustness in BitTorrent. arXiv CoRR (abs/1108.2716), August 2011.
  7. Scott A. Crosby and Dan S. Wallach. High throughput asynchronous algorithms for message authentication. Department of Computer Science, Rice University, Technical Report #CS TR10-15, December 2010.
  8. Scott A. Crosby and Dan S. Wallach. Authenticated dictionaries: Real-world costs and tradeoffs. Department of Computer Science, Rice University, Technical Report #CS TR10-14, December 2010.
  9. Dan S. Wallach, Polling place burglary raises specter of fraud. Houston Chronicle (op-ed), December 10, 2009.
  10. Dan S. Wallach, Testimony Before the Texas Senate Committee on State Affairs (Austin, Texas), October 2008.
  11. Dan S. Wallach, Testimony Before the Texas House Committee on Elections (Austin, Texas), June 2008.
  12. Dan S. Wallach, Testimony Before the Tennessee Advisory Commission on Intergovernmental Relations (Nashville, Tennessee), September 2007.
  13. Srinivas Inguva, Eric Rescorla, Hovav Shacham, and Dan S. Wallach, Source Code Review of the Hart InterCivic Voting System, California Secretary of State's "Top to Bottom" Review, July 2007.
  14. David L. Dill and Dan S. Wallach, Stones Unturned: Gaps in the Investigation of Sarasota's Disputed Congressional Election, April 2007.
  15. Dan S. Wallach, Testimony before the U.S. Senate Committee on Rules and Administration, February 7, 2007.
  16. Dan S. Wallach, "Expert Report in Conroy v. Dennis" (portions redacted), September 2006.
  17. Dan S. Wallach, "Security and Reliability of Webb County’s ES&S Voting System and the March ‘06 Primary Election" (Expert Report in Flores v. Lopez), May 2006.
  18. Seth Nielson, Seth J. Fogarty, and Dan S. Wallach, Attacks on Local Searching Tools, Technical Report TR-04-445, Department of Computer Science, Rice University, December 2004.
  19. Dan S. Wallach, Testimony for the NIST/EAC Technical Guidelines Development Committee (Gaithersburg, Maryland), September 2004.
  20. Dan S. Wallach, Testimony for the Texas Senate Committee on State Affairs (Austin, Texas), May 2004.
  21. Dan S. Wallach, Testimony for the Texas House Elections Committee (Austin, Texas), March 2004.
  22. Dan S. Wallach, Testimony for the Ohio Joint Committee on Ballot Security (Columbus, Ohio), March 2004.
  23. Jonathan Bannet, David W. Price, Algis Rudys, Justin Singer, and Dan S. Wallach, Hack-a-Vote: Demonstrating Security Issues with Electronic Voting Systems. Technical Report TR-03-427, Department of Computer Science, Rice University, November 2003.
  24. Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, and Dan S. Wallach, Analysis of an Electronic Voting System, Johns Hopkins Information Security Institute Technical Report TR-2003-19, July 2003.
  25. David L. Dill, Rebecca Mercuri, Peter G. Neumann, and Dan S. Wallach, Frequently Asked Questions about DRE Voting Systems (web page, also submitted to Santa Clara County board of supervisors), February 2003.
  26. David W. Price, Algis Rudys, and Dan S. Wallach, Garbage Collector Memory Accounting in Language-Based Systems, Technical Report TR-02-407, Department of Computer Science, Rice University, December 2002.
  27. Adam B. Stubblefield and Dan S. Wallach, Dagster: Censorship-Resistant Publishing Without Replication, Technical Report TR01-380, Department of Computer Science, Rice University, July 2001.
  28. Alex Grosul and Dan S. Wallach, A Related-Key Cryptanalysis of RC4, Technical Report TR-00-358, Department of Computer Science, Rice University, June 2000.
  29. Adam B. Stublefield and Dan S. Wallach, A Security Analysis of My.MP3.com and the Beam-it Protocol, Technical Report TR-00-353, Department of Computer Science, Rice University, February 2000.
  30. Eyal de Lara, Dan S. Wallach, and Willy Zwaenepoel, A Characterization of Compound Documents on the Web, Technical Report TR-99-351, Department of Computer Science, Rice University, November 1999.

Invited Panels

  1. Alec Yasinsac, et al., Voting System Risk Assessment: Election Process Models and Voting System Models, University of South Alabama, November 2009.
  2. Steve Ansolabehere, et al., Workshop on Developing a Research Agenda for Electronic Voting Technologies, American Association for the Advancement of Science (AAAS), September 2004.
  3. Darleen Fisher, et al., NSF Workshop on Security and Privacy (Berkeley, California), February 2002. Publication pending.
  4. Gary McGraw, et al., Attacking Malicious Code: A Report from the Infosec Research Council (San Antonio, Texas), April, 2000. Report published in IEEE Software 17(5), pp. 33-40.

Dan Wallach, CS Department, Rice University
Last modified: Thu 18-Jun-2009 10:55