[1] D. S. Wallach. We need to protect against vote tampering. Fort Worth Star-Telegram, Mar. 2018. [ bib | .html ]
[2] D. S. Wallach. Testimony for the Texas Senate Select Committee on Election Security, Feb. 2018. [ bib | .pdf ]
[3] J. Lee and D. S. Wallach. Removing secrets from Android's TLS. In Network and Distributed Systems Security Symposium (NDSS '18), San Diego, CA, Feb. 2018. [ bib | .pdf ]
[4] M. Bernhard, J. A. Halderman, R. Rivest, P. Vora, P. Ryan, V. Teague, J. Benaloh, P. Stark, and D. S. Wallach. Public evidence from secret ballots. In The International Conference for Electronic Voting (E-Vote-ID '17), Bregenz, Austria, Oct. 2017. [ bib ]
[5] O. Pereira and D. S. Wallach. Clash attacks and the STAR-Vote system. In The International Conference for Electronic Voting (E-Vote-ID '17), Bregenz, Austria, Oct. 2017. [ bib ]
[6] M. Moran and D. S. Wallach. Verification of STAR-Vote and evaluation of FDR and ProVerif. In 13th International Conference on Integrated Formal Methods (iFM 2017), Torino, Italy, Sept. 2017. [ bib ]
[7] R. Tanash, Z. Chen, D. S. Wallach, and M. Marschall. The decline of social media censorship and the rise of self-censorship after the 2016 failed Turkish coup. In 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI '17), Vancouver, B.C., Canada, Aug. 2017. [ bib ]
[8] D. S. Wallach. Up for debate: Is Harris County's vote safe from the Russians? Houston Chronicle, July 2017. [ bib | http ]
[9] A. Pridgen, S. Garfinkel, and D. S. Wallach. Picking up the trash: exploiting generational GC for memory analysis. In Proceedings of the Fourth Annual DFRWS Europe (DFWRS-EU '17), Lake Constance, Germany, Mar. 2017. [ bib | .pdf ]
[10] D. S. Wallach and J. Talbot-Zorn. Want secure elections? then maybe don't cut security funding. Wired, Feb. 2017. [ bib | http ]
[11] A. Pridgen, S. Garfinkel, and D. S. Wallach. Present but unreachable: reducing persistent latent secrets in HotSpot JVM. In Hawaii International Conference on System Sciences (HICSS-50), Jan. 2017. [ bib | .pdf ]
[12] S. Bell, J. Benaloh, M. D. Byrne, D. DeBeauvoir, B. Eakin, G. Fisher, P. Kortum, N. McBurnett, J. M. M. Parker, O. Pereira, P. B. Stark, D. S. Wallach, and M. Winn. Star-vote: A secure, transparent, auditable, and reliable voting system. In F. Hao and P. Y. A. Ryan, editors, Real-World Electronic Voting: Design, Analysis, and Deployment. CRC Press, Dec. 2016. [ bib | http ]
[13] D. S. Wallach. Testimony before the House Committee on Space, Science & Technology hearing, “Protecting the 2016 Elections from Cyber and Voting Machine Attacks”, Sept. 2016. [ bib | .pdf ]
[14] Z. Tao, A. Kokas, R. Zhang, D. S. Cohan, and D. S. Wallach. Inferring atmospheric particulate matter concentrations from Chinese social media data. PLOS One, Sept. 2016. [ bib | http ]
[15] M. S. Riazi, B. Chen, A. Shrivastava, D. S. Wallach, and F. Koushanfar. Sub-linear privacy-preserving search with untrusted server and semi-honest parties. CoRR, abs/1612.01835, 2016. [ bib | arXiv | http ]
[16] R. S. Tanash, A. Aydoga, Z. Chen, D. S. Wallach, M. Marschall, D. Subramanian, and C. Bronk. Detecting influential users and communities in censored tweets using data-flow graphs. In Proceedings of the 33rd Annual Meeting of the Society for Political Methodology (POLMETH 2016), Houston, TX, 2016. [ bib | .pdf ]
[17] R. S. Tanash, A. Aydoga, Z. Chen, D. S. Wallach, M. Marschall, D. Subramanian, and C. Bronk. The dynamics of social media censorship in transitioning democracies. In The 2016 APSA Conference (Divison of Political Elites and Social Media, and Information Technology and Politics), Philadelphia, PA, 2016. [ bib | http ]
[18] J. C. Dressler, C. Bronk, and D. S. Wallach. Exploiting military opsec through open-source vulnerabilities. In 2015 IEEE Military Communications Conference (MILCOM '15), Tampa, FL, Oct. 2015. [ bib | .pdf ]
[19] R. S. Tanash, Z. Chen, T. Thakur, D. S. Wallach, and D. Subramanian. Known unknowns: An analysis of Twitter censorship in Turkey. In Workshop on Privacy in the Electronic Society, Denver, CO, Oct. 2015. [ bib ]
[20] C. Z. Acemyan, P. Kortum, M. D. Byrne, and D. S. Wallach. From error to error: Why voters could not cast a ballot and verify their vote with Helios, Prêt à Voter, and Scantegrity II. USENIX Journal of Election Technology and Systems (JETS), 3(2), Aug. 2015. [ bib | .pdf ]
[21] Y. Liu, D. R. Bild, D. Adrian, G. Singh, R. P. Dick, D. S. Wallach, and Z. M. Mao. Performance and energy consumption analysis of a delay-tolerant network for censorship-resistant communications. In 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '15), June 2015. [ bib | http ]
[22] D. R. Bild, Y. Liu, R. P. Dick, Z. M. Mao, and D. S. Wallach. Aggregate characterization of user behavior in Twitter and analysis of the retweet graph. ACM Transactions on Internet Technologies, 15(1), Feb. 2015. [ bib | http ]
[23] A. Bates, K. Butler, M. Sherr, C. Shields, P. Traynor, and D. Wallach. Accountable Wiretapping -or- I Know They Can Hear You Now. Journal of Computer Security, 23:167--195, 2015. [ bib | .pdf ]
[24] Y. Liu, D. R. Bild, R. P. Dick, Z. M. Mao, and D. S. Wallach. The mason test: A defense against sybil attacks in wireless networks without trusted authorities. IEEE Transactions on Mobile Computing, 2015. in press. [ bib | .pdf ]
[25] C. Z. Acemyan, P. Kortum, M. D. Byrne, and D. S. Wallach. Users' mental models for three end-to-end voting systems: Helios, Prêt à Voter, and Scantegrity II. In Human Aspects of Information Security, Privacy, and Trust, volume 9190 of Lecture Notes in Computer Science. Springer International Publishing, 2015. [ bib | DOI | http ]
[26] T. Book and D. S. Wallach. An empirical study of mobile ad targeting. CoRR, abs/1502.06577, 2015. [ bib | http ]
[27] C. Z. Acemyan, P. Kortum, M. D. Byrne, and D. S. Wallach. Usability of voter verifiable, end-to-end voting systems: Baseline data for Helios, Prêt à Voter, and Scantegrity II. USENIX Journal of Election Technology and Systems (JETS), 2(3), July 2014. [ bib | http ]
[28] M. Dietz and D. S. Wallach. Hardening Persona: Improving federated web login. In Network and Distributed Systems Symposium (NDSS '14), San Diego, CA, Feb. 2014. [ bib | .pdf ]
[29] M. Rostami, M. Majzoobi, F. Koushanfar, D. S. Wallach, and S. Devadas. Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching. IEEE Transactions on Emerging Topics in Computing, 2014. [ bib | .pdf ]
[30] A. A. Sani, L. Zhong, and D. S. Wallach. Glider: A GPU library driver for improved system security. CoRR, abs/1411.3777, 2014. [ bib | http ]
[31] T. Book and D. S. Wallach. A case of collusion: a study of the interface between ad libraries and their apps. In Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones & Mobile Devices (SPSM '13), Berlin, Germany, Nov. 2013. [ bib | .pdf ]
[32] S. Bell, J. Benaloh, M. D. Byrne, D. DeBeauvoir, B. Eakin, G. Fisher, P. Kortum, N. McBurnett, J. M. M. Parker, O. Pereira, P. B. Stark, D. S. Wallach, and M. Winn. Star-vote: A secure, transparent, auditable, and reliable voting system. USENIX Journal of Election Technology and Systems (JETS), 1(1), Aug. 2013. [ bib | http ]
[33] T. Zhu, D. Phipps, A. Pridgen, J. Crandall, and D. S. Wallach. The velocity of censorship: High-fidelity detection of microblog post deletions. In USENIX Security Symposium, Washington, DC, Aug. 2013. [ bib | http ]
[34] T. Book, A. Pridgen, and D. S. Wallach. Longitudinal analysis of Android ad library permissions. In Mobile Security Technologies Workshop (MOST), San Francisco, CA, May 2013. [ bib | .pdf ]
[35] P. Song, A. Shu, D. Phipps, D. S. Wallach, M. Tiwari, J. Crandall, and G. Lugar. Language without words: A pointillist model for natural language processing. In 6th International Conference on Soft Computing and Intelligent Systems (SCIS-ISIS 2012), Kobe, Japan, Dec. 2012. [ bib | .pdf ]
[36] A. Czeskis, M. Dietz, T. Kohno, D. S. Wallach, and D. Balfanz. Strengthening user authentication through opportunistic cryptographic identity assertions. In 19th ACM Conference on Computer and Communications Security (CCS '12), Raleigh, NC, Oct. 2012. [ bib | http ]
[37] P. Song, A. Shu, A. Zhou, D. S. Wallach, and J. R. Crandall. A pointillism approach for natural language processing of social media. In Proceedings of the 2012 International Conference on Natural Language Processing and Knowledge Engineering (NLP-KE'12), Hefei, China, Sept. 2012. best paper award. [ bib | .pdf ]
[38] M. Dietz, A. Czeskis, D. Balfanz, and D. S. Wallach. Origin-bound certificates: a fresh approach to strong client authentication for the web. In USENIX Security Symposium, Bellevue, WA, Aug. 2012. [ bib | http ]
[39] S. Shekhar, M. Dietz, and D. S. Wallach. Adsplit: Separating smartphone advertising from applications. In USENIX Security Symposium, Bellevue, WA, Aug. 2012. [ bib | http ]
[40] M. Majzoobi, M. Rostami, F. Koushanfar, D. S. Wallach, and S. Devadas. Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching. In International Workshop on Trustworthy Embedded Devices, May 2012. [ bib | DOI | .pdf ]
[41] A. Bates, K. Butler, M. Sherr, C. Shields, P. Traynor, and D. S. Wallach. Accountable wiretapping -or- I know they can hear you now. In 19th ISOC Network and Distributed System Security Symposium (NDSS 2012), San Diego, CA, Feb. 2012. [ bib | http ]
[42] N. Aase, J. R. Crandall, A. Diaz, J. Knockel, J. O. Molinero, J. Saia, D. Wallach, and T. Zhu. Whiskey, weed, and wukan on the World Wide Web: On measuring censors' resources and motivations. In FOCI 12: Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012. [ bib | http ]
[43] D. S. Wallach. Viewpoint: Rebooting the cs publication process. Communications of the ACM, 54(10), Oct. 2011. [ bib | .pdf ]
[44] S. A. Crosby and D. S. Wallach. Authenticated dictionaries: Real-world costs and trade-offs. ACM Transactions on Information Systems Security (TISSEC), 14(2):17:1--17:30, Sept. 2011. [ bib | DOI | http ]
[45] M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. Quire: Lightweight provenance for smart phone operating systems. In 21st USENIX Security Symposium, San Francisco, CA, Aug. 2011. [ bib | .html ]
[46] D. R. Bild, Y. Liu, R. P. Dick, Z. M. Mao, and D. S. Wallach. Using predictable mobility patterns to support scalable and secure MANETs of handheld devices. In Sixth International Workshop on Mobility in the Evolving Internet Architecture (MobiArch '11), June 2011. [ bib | http ]
[47] D. S. Wallach. Smartphone security: Trends and predictions. In Secure Application Development (SecAppDev 2011), Leuven, Belgium, Feb. 2011. [ bib | .pdf ]
[48] T. Zhu, C. Bronk, and D. S. Wallach. An analysis of chinese search engine filtering. CoRR, abs/1107.3794, 2011. [ bib | http ]
[49] D. Bachrach, C. Nunu, D. S. Wallach, and M. K. Wright. #h00t: Censorship resistant microblogging. CoRR, abs/1109.6874, 2011. [ bib | http ]
[50] S. J. Nielson and D. S. Wallach. The bittorrent anonymity marketplace. CoRR, abs/1108.2718, 2011. [ bib | http ]
[51] S. J. Nielson, C. E. Spare, and D. S. Wallach. Building better incentives for robustness in bittorrent. CoRR, abs/1108.2716, 2011. [ bib | http ]
[52] S. A. Crosby and D. S. Wallach. High throughput asynchronous algorithms for message authentication. Technical Report CS TR10-15, Rice University, Houston, TX, Dec. 2010. [ bib | .pdf ]
[53] T.-W. J. Ngan, R. Dingledine, and D. S. Wallach. Building incentives into Tor. In Proceedings of Financial Cryptography (FC '10), Tenerife, Canary Islands, Jan. 2010. best paper award. [ bib | .pdf ]
[54] S. A. Crosby and D. S. Wallach. Encyclopedia of Cryptography and Security, chapter Algorithmic Denial of Service. Springer-Verlag, 2 edition, 2010. [ bib ]
[55] D. S. Wallach. Native client: A clever alternative. Communications of the ACM, 53(1), Jan. 2010. [ bib | http ]
[56] D. S. Wallach. Polling place burglary raises specter of fraud. Houston Chronicle, Dec. 2009. [ bib | http ]
[57] S. A. Crosby and D. S. Wallach. Super-efficient aggregating history-independent persistent authenticated dictionaries. In Proceedings of ESORICS 2009, Saint Malo, France, Sept. 2009. [ bib | .pdf ]
[58] S. A. Crosby and D. S. Wallach. Efficient data structures for tamper-evident logging. In Proceedings of the 18th USENIX Security Symposium, Montreal, Canada, Aug. 2009. [ bib | .pdf ]
[59] E. Öksüzoğlu and D. S. Wallach. VoteBox Nano: A smaller, stronger, FPGA-based voting machine. In Electronic Voting Technology/Workshop on Trustworthy Elections 2009, Montreal, Canada, Aug. 2009. [ bib | .pdf ]
[60] C. Bronk, D. Castro, and D. S. Wallach. Group effort needed to secure cyberspace. Houston Chronicle, June 2009. [ bib | .pdf ]
[61] D. R. Sandler and D. S. Wallach. Birds of a FETHR: Open, decentralized micropublishing. In 8th International Workshop on Peer-to-Peer Systems (IPTPS '09), Boston, MA, Apr. 2009. [ bib | .pdf ]
[62] D. S. Wallach. Technical perspective: Tools for information to flow securely and swift-ly. Communications of the ACM, 52(2), Feb. 2009. [ bib | .pdf ]
[63] S. A. Crosby, R. H. Riedi, and D. S. Wallach. Opportunities and limits of remote timing attacks. ACM Transactions on Information and Systems Security (TISSEC), 12(3), Jan. 2009. [ bib | .pdf ]
[64] D. S. Wallach. Voting system risk assessment via computational complexity analysis. William and Mary Bill of Rights Journal, 17, Dec. 2008. [ bib | .pdf ]
[65] D. R. Sandler and D. S. Wallach. The case for networked remote voting precincts. In 3rd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '08), San Jose, CA, Aug. 2008. [ bib | .pdf ]
[66] D. R. Sandler, K. Derr, and D. S. Wallach. VoteBox: A tamper-evident, verifiable electronic voting system. In Proceedings of the 17th USENIX Security Symposium (Security '08), San Jose, CA, July 2008. [ bib | .pdf ]
[67] D. R. Sandler and D. S. Wallach. <input type=“password”> must die! In Web 2.0 Security & Privacy (W2SP 2008), Oakland, CA, May 2008. [ bib | .pdf ]
[68] S. Everett, K. Greene, M. Byrne, D. Wallach, K. Derr, D. Sandler, and T. Torous. Is newer always better? The usability of electronic voting machines versus traditional methods. In Proceedings of CHI 2008, Florence, Italy, Apr. 2008. [ bib | .html ]
[69] R. M. Stein, G. Vonnahme, M. Byrne, and D. S. Wallach. Voting technology, election administration, and voter performance. Election Law Journal, 7(2), Apr. 2008. [ bib | .pdf ]
[70] D. Sandler, K. Derr, S. Crosby, and D. S. Wallach. Finding the evidence in tamper-evident logs. In Proceedings of the 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE '08), pages 69--75, 2008. [ bib | DOI | http ]
[71] D. R. Sandler and D. S. Wallach. Casting votes in the Auditorium. In Proceedings of the 2nd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '07), Boston, MA, Aug. 2007. [ bib | .pdf ]
[72] S. Inguva, E. Rescorla, H. Shacham, and D. S. Wallach. Source Code Review of the Hart InterCivic Voting System. California Secretary of State's “Top to Bottom” Review, July 2007. [ bib | .pdf ]
[73] D. L. Dill and D. S. Wallach. Stones Unturned: Gaps in the Investigation of Sarasota's Disputed Congressional Election, Apr. 2007. [ bib | .html ]
[74] D. S. Wallach. Security and Reliability of Webb County's ES&S Voting System and the March '06 Primary Election. Expert Report in Flores v. Lopez, May 2006. [ bib | .pdf ]
[75] A. Singh, T.-W. J. Ngan, P. Druschel, and D. S. Wallach. Eclipse attacks on overlay networks: Threats and defenses. In IEEE INFOCOM '06, Barcelona, Spain, Apr. 2006. [ bib | .pdf ]
[76] C. Coarfa, P. Druschel, and D. S. Wallach. Performance analysis of tls web servers. ACM Transactions on Computer Systems, 24(1), Feb. 2006. [ bib | .pdf ]
[77] A. Nandi, T.-W. J. Ngan, A. Singh, P. Druschel, and D. S. Wallach. Scrivener: Providing incentives in cooperative content distribution systems,. In ACM/IFIP/USENIX 6th International Middleware Conference (Middleware 2005), Grenoble, France, Nov. 2005. [ bib | .html ]
[78] E. de Lara, Y. Chopra, R. Kumar, N. Vaghela, D. S. Wallach, and W. Zwaenepoel. Iterative adaptation for mobile clients using existing APIs. IEEE Transactions on Parallel and Distributed Systems (TPDS), 16(10), Oct. 2005. [ bib | .html ]
[79] S. J. Nielson, S. A. Crosby, and D. S. Wallach. A taxonomy of rational attacks. In 4th International Workshop on Peer-to-Peer Systems (IPTPS '05), Ithaca, NY, Feb. 2005. [ bib | .html ]
[80] A. B. Stubblefield, A. D. Rubin, and D. S. Wallach. Managing the performance impact of web security. Electronic Commerce Research Journal, 5(1), Feb. 2005. [ bib | .pdf ]
[81] A. M. Ladd, K. E. Bekris, A. Rudys, L. E. Kavraki, and D. S. Wallach. Robotics-based location sensing using wireless Ethernet. Wireless Networks, 11(1-2), Jan. 2005. [ bib | http ]
[82] A. Haeberlen, E. Flannery, A. M. Ladd, A. Rudys, D. S. Wallach, and L. E. Kavraki. Practical robust localization over large-scale wireless Ethernet networks. In Tenth ACM International Conference on Mobile Computing and Networking (MOBICOM 2004), Philadelphia, PA, Sept. 2004. [ bib | .pdf ]
[83] A. Mislove, G. Oberoi, A. Post, C. Reis, P. Druschel, and D. S. Wallach. AP3: Cooperative, decentralized anonymous communication. In 11th ACM SIGOPS European Workshop, Leuven, Belgium, Sept. 2004. [ bib | .html ]
[84] D. S. Wallach. Texas must confront voting systems' flaws. Austin American-Statesman, Sept. 2004. [ bib | .pdf ]
[85] T.-W. J. Ngan, A. Nandi, A. Singh, D. S. Wallach, and P. Druschel. Designing incentives-compatible peer-to-peer systems. In 2nd Bertinoro Workshop on Future Directions in Distributed Computing (FuDiCo 2004), Bertinoro, Italy, June 2004. [ bib | .html ]
[86] A. M. Ladd, K. E. Bekris, A. Rudys, D. S. Wallach, and L. E. Kavraki. On the feasibility of using wireless Ethernet for localization. IEEE Transactions on Robotics and Automation, 20(3):555--559, June 2004. [ bib | .pdf ]
[87] T.-W. J. Ngan, D. S. Wallach, and P. Druschel. Incentives-compatible peer-to-peer multicast. In 2nd Workshop on Economics of Peer-to-Peer Systems, Cambridge, MA, June 2004. [ bib | .html ]
[88] D. S. Wallach. Testimony for the Texas Senate Committee on State Affairs, May 2004. [ bib | .pdf ]
[89] D. S. Wallach. Testimony for the Texas House Committee on Elections, Mar. 2004. [ bib | .pdf ]
[90] D. S. Wallach. Testimony for the Ohio Joint Committee on Ballot Security, Mar. 2004. [ bib | .pdf ]
[91] T. Kohno, A. Stubblefield, A. D. Rubin, and D. S. Wallach. Analysis of an electronic voting system. In Proceedings of the 2004 IEEE Symposium on Security and Privacy, Oakland, CA, 2004. [ bib | http ]
[92] J. Bannet, D. W. Price, A. Rudys, J. Singer, and D. S. Wallach. Hack-a-Vote: Demonstrating security issues with electronic voting systems. IEEE Security and Privacy Magazine, 2(1):32--37, January / February 2004. Also reprinted by ComputerUser, March 2004. [ bib | .pdf ]
[93] P. Tao, A. Rudys, A. Ladd, and D. S. Wallach. Wireless LAN location sensing for security applications. In ACM Workshop on Wireless Security (WiSe 2003), San Diego, CA, Sept. 2003. [ bib | .html ]
[94] S. Crosby and D. S. Wallach. Denial of service via algorithmic complexity attacks. In 12th Usenix Security Symposium, Washington, D.C., Aug. 2003. [ bib | .pdf ]
[95] A. C. Fuqua, T.-W. J. Ngan, and D. S. Wallach. Economic behavior of peer-to-peer storage networks. In Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, June 2003. [ bib | .html ]
[96] D. W. Price, A. Rudys, and D. S. Wallach. Garbage collector memory accounting in language-based systems. In Proceedings of the 2003 IEEE Symposium on Security and Privacy, Oakland, CA, May 2003. [ bib | .html ]
[97] A. Mislove, A. Post, C. Reis, P. Willmann, P. Druschel, D. S. Wallach, X. Bonnaire, P. Sens, J.-M. Busca, and L. Arantes-Bezerra. POST: A secure, resilient, cooperative messaging system. In 9th Workshop on Hot Topics in Operating Systems (HotOS IX), Lihue, Hawaii, May 2003. [ bib | .html ]
[98] E. de Lara, R. Kumar, D. S. Wallach, and W. Zwaenepoel. Collaboration and multimedia authoring on mobile devices. In First International Conference on Mobile Systems, Applications, and Services (MobiSys '03), San Francisco, CA, May 2003. [ bib | .pdf ]
[99] N. Paul, D. Evans, A. D. Rubin, and D. S. Wallach. Authentication for remote voting. In Workshop on Human-Computer Interaction and Security Systems, Fort Lauderdale, FL, Apr. 2003. [ bib | .html ]
[100] T.-W. J. Ngan, D. S. Wallach, and P. Druschel. Enforcing fair sharing of peer-to-peer resources. In Proceedings of the Second International Workshop on Peer-to-Peer Systems, Berkeley, CA, Feb. 2003. [ bib | .html ]
[101] Y. C. Hu, W. Yu, A. L. Cox, D. S. Wallach, and W. Zwaenepoel. Runtime support for distributed sharing in safe languages. ACM Transactions on Computer Systems, 21(1), 2003. [ bib | .pdf ]
[102] M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Security for structured peer-to-peer overlay networks. In Fifth Symposium on Operating Systems Design and Implementation (OSDI '02), Boston, MA, Dec. 2002. [ bib | .html ]
[103] A. Rudys and D. S. Wallach. Enforcing Java run-time properties using bytecode rewriting. In International Symposium on Software Security, Tokyo, Japan, Nov. 2002. [ bib | .html ]
[104] D. S. Wallach. A survey of peer-to-peer security issues. In International Symposium on Software Security, Tokyo, Japan, Nov. 2002. [ bib | .html ]
[105] A. M. Ladd, K. E. Bekris, G. Marceau, A. Rudys, D. S. Wallach, and L. E. Kavraki. Using wireless Ethernet for localization. In 2002 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2002), Lausanne, Switzerland, Oct. 2002. [ bib | .pdf ]
[106] A. M. Ladd, K. E. Bekris, G. Marceau, A. Rudys, L. E. Kavraki, and D. S. Wallach. Robotics-based location sensing using wireless Ethernet. In Eighth ACM International Conference on Mobile Computing and Networking (MOBICOM 2002), Atlanta, Georgia, Sept. 2002. [ bib | .pdf ]
[107] Y. Dotsenko, E. de Lara, D. S. Wallach, and W. Zwaenepoel. Extensible adaptation via constraint solving. In Proceedings of the 4th IEEE Worwshop on Mobile Computing Systems and Applications, Callicoon, NY, June 2002. [ bib | http ]
[108] A. Rudys and D. S. Wallach. Transactional rollback for language-based systems. In 2002 International Conference on Dependable Systems and Networks, Washington, D.C., June 2002. [ bib | .html ]
[109] A. Rudys and D. S. Wallach. Termination in language-based systems. ACM Transactions on Information and System Security, 5(2), May 2002. [ bib | .html ]
[110] C. Coarfa, P. Druschel, and D. S. Wallach. Performance analysis of TLS Web servers. In Proceedings of the 2002 Network and Distributed System Security Symposium, San Diego, CA, Feb. 2002. [ bib | .html ]
[111] E. de Lara, D. S. Wallach, and W. Zwaenepoel. HATS: Hierarchical adaptive transmission scheduling. In Proceedings of the 2002 Multimedia Computing and Networking Conference (MMCN'02), San Jose, CA, Jan. 2002. [ bib | http ]
[112] J. Flinn, E. de Lara, M. Satyanarayanan, D. S. Wallach, and W. Zwaenepoel. Reducing the energy usage of Office applications. In Proceedings of IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), Heidelberg, Germany, Nov. 2001. [ bib | http ]
[113] D. S. Wallach. Copy protection technology is doomed. IEEE Computer, 34(10):48--49, Oct. 2001. [ bib | .pdf ]
[114] S. A. Craver, M. Wu, B. Liu, A. Stubblefield, B. Swartzlander, D. S. Wallach, D. Dean, and E. W. Felten. Reading between the lines: Lessons from the SDMI challenge. In 10th Usenix Security Symposium, Washington, D.C., Aug. 2001. [ bib | .pdf ]
[115] A. Stubblefield and D. S. Wallach. Dagster: Censorship-resistant publishing without replication. Technical Report TR01-380, Rice University, July 2001. [ bib | .pdf ]
[116] E. de Lara, D. S. Wallach, and W. Zwaenepoel. Puppeteer: Component-based adaptation for mobile computing. In Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS), San Francisco, CA, Mar. 2001. [ bib | http ]
[117] A. Rudys, J. Clements, and D. S. Wallach. Termination in language-based systems. In Network and Distributed Systems Security Symposium, San Diego, CA, Feb. 2001. [ bib | .html ]
[118] D. S. Wallach, E. W. Felten, and A. W. Appel. The security architecture formerly known as stack inspection: A security mechanism for language-based systems. ACM Transactions on Software Engineering and Methodology, 9(4):341--378, Oct. 2000. [ bib | .html ]
[119] E. de Lara, D. S. Wallach, and W. Zwaenepoel. Opportunities for bandwidth adaptation in Microsoft Office documents. In Proceedings of the Fourth USENIX Windows Symposium, Seattle, Washington, Aug. 2000. [ bib | http ]
[120] A. Grosul and D. S. Wallach. A related-key cryptanalysis of RC4. Technical Report TR-00-358, Department of Computer Science, Rice University, Houston, TX, June 2000. [ bib | .pdf ]
[121] A. B. Stublefield and D. S. Wallach. A security analysis of My.MP3.com and the Beam-it protocol. Technical Report TR-00-353, Department of Computer Science, Rice University, Houston, TX, Feb. 2000. [ bib | .html ]
[122] D. S. Wallach. A New Approach to Mobile Code Security. PhD thesis, Princeton University, Princeton, NJ, Jan. 1999. [ bib | .html ]
[123] D. S. Wallach and E. W. Felten. Understanding Java stack inspection. In Proceedings of the 1998 IEEE Symposium on Security and Privacy, pages 52--63, Oakland, CA, May 1998. [ bib | .html ]
[124] E. W. Felten, D. Balfanz, D. Dean, and D. S. Wallach. Web spoofing: An Internet con game. In 20th National Information Systems Security Conference, Baltimore, Maryland, Oct. 1997. [ bib | .html ]
[125] D. Dean, E. W. Felten, D. S. Wallach, and D. Balfanz. Java security: Web browsers and beyond. In D. E. Denning and P. J. Denning, editors, Internet Besieged: Countering Cyberspace Scofflaws, pages 241--269. ACM Press, New York, NY, Oct. 1997. [ bib | .html ]
[126] D. S. Wallach, D. Balfanz, D. Dean, and E. W. Felten. Extensible security architectures for Java. In Proceedings of the Sixteenth ACM Symposium on Operating System Principles, Saint-Malo, France, Oct. 1997. outstanding paper award. [ bib | .html ]
[127] D. S. Wallach, J. A. Roskind, and E. W. Felten. Flexible, extensible Java security using digital signatures. In DIMACS Workshop on Network Threats, DIMACS Series in Discrete Mathematics and Theoretical Computer Science. American Mathematical Society, Dec. 1996. [ bib ]
[128] D. Dean, E. W. Felten, and D. S. Wallach. Java security: From HotJava to Netscape and beyond. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 190--200, Oakland, CA, May 1996. [ bib | .html ]
[129] D. S. Wallach, S. Kunapalli, and M. F. Cohen. Accelerated MPEG compression of dynamic polygonal scenes. In Computer Graphics (Proceedings of SIGGRAPH 1994), Orlando, FL, July 1994. [ bib | http ]

This file was generated by bibtex2html 1.98.