Dan Seth Wallach
Home: 713-662-3331
Work: 713-348-6155
Fax: 713-348-5930

Professor, Department of Computer Science
Rice Scholar, Baker Institute for Public Policy

dwallach@cs.rice.edu
https://www.cs.rice.edu/~dwallach/
Department of Computer Science
Rice University
Duncan Hall 3122
6100 Main Street
Houston, TX 77005


Education

Princeton University (Princeton, NJ), Department of Computer Science,

Ph.D. Computer Science, January 1999.

M.A. Computer Science, May 1995.

U.C. Berkeley (Berkeley, CA), College of Engineering,

B.S. Electrical Engineering/Computer Science, May 1993.

Publications
[1] M. Bernhard, J. Sharman, C. Z. Acemyan, P. Kortum, D. S. Wallach, and J. A. Halderman. On the usability of HTTPS deployment. In ACM CHI Conference on Human Factors in Computing Systems, Glasgow, Scotland, May 2019. [ bib ]
[2] J. Lee, A. Chen, and D. S. Wallach. Total recall: Persistence of passwords in Android. In Network and Distributed Systems Security Symposium (NDSS '19), San Diego, CA, Feb. 2019. [ bib | .pdf ]
[3] B. Im, A. Chen, and D. S. Wallach. An historical analysis of the SEAndroid policy evolution. In Annual Computer Security Applications Conference (ACSAC) 2018, San Juan, Puerto Rico, Dec. 2018. [ bib | .pdf ]
[4] C. Z. Acemyan, P. Kortum, M. D. Byrne, and D. S. Wallach. Summative usability assessments of STAR-Vote: A cryptographically secure e2e voting system that has been empirically proven to be easy to use. Human Factors, page 0018720818812586, Dec. 2018. [ bib | DOI | arXiv | .pdf ]
[5] D. S. Wallach. We need to protect against vote tampering. Fort Worth Star-Telegram, Mar. 2018. [ bib | .html ]
[6] D. S. Wallach. Testimony for the Texas Senate Select Committee on Election Security, Feb. 2018. [ bib | .pdf ]
[7] J. Lee and D. S. Wallach. Removing secrets from Android's TLS. In Network and Distributed Systems Security Symposium (NDSS '18), San Diego, CA, Feb. 2018. [ bib | .pdf ]
[8] C. Z. Acemyan, P. Kortum, J. Xiong, and D. S. Wallach. 2FA might be secure, but it’s not usable: A summative usability assessment of google’s two-factor authentication (2FA) methods. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 62(1):1141--1145, 2018. [ bib | DOI | arXiv | .pdf ]
[9] M. Bernhard, J. A. Halderman, R. Rivest, P. Vora, P. Ryan, V. Teague, J. Benaloh, P. Stark, and D. S. Wallach. Public evidence from secret ballots. In The International Conference for Electronic Voting (E-Vote-ID '17), Bregenz, Austria, Oct. 2017. [ bib ]
[10] O. Pereira and D. S. Wallach. Clash attacks and the STAR-Vote system. In The International Conference for Electronic Voting (E-Vote-ID '17), Bregenz, Austria, Oct. 2017. [ bib | .pdf ]
[11] M. Moran and D. S. Wallach. Verification of STAR-Vote and evaluation of FDR and ProVerif. In 13th International Conference on Integrated Formal Methods (iFM 2017), Torino, Italy, Sept. 2017. [ bib | .pdf ]
[12] R. Tanash, Z. Chen, D. S. Wallach, and M. Marschall. The decline of social media censorship and the rise of self-censorship after the 2016 failed Turkish coup. In 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI '17), Vancouver, B.C., Canada, Aug. 2017. [ bib | .pdf ]
[13] D. S. Wallach. Up for debate: Is Harris County's vote safe from the Russians? Houston Chronicle, July 2017. [ bib | http ]
[14] A. Pridgen, S. Garfinkel, and D. S. Wallach. Picking up the trash: exploiting generational GC for memory analysis. In Proceedings of the Fourth Annual DFRWS Europe (DFWRS-EU '17), Lake Constance, Germany, Mar. 2017. [ bib | .pdf ]
[15] D. S. Wallach and J. Talbot-Zorn. Want secure elections? then maybe don't cut security funding. Wired, Feb. 2017. [ bib | http ]
[16] A. Pridgen, S. Garfinkel, and D. S. Wallach. Present but unreachable: reducing persistent latent secrets in HotSpot JVM. In Hawaii International Conference on System Sciences (HICSS-50), Jan. 2017. [ bib | .pdf ]
[17] S. Bell, J. Benaloh, M. D. Byrne, D. DeBeauvoir, B. Eakin, G. Fisher, P. Kortum, N. McBurnett, J. M. M. Parker, O. Pereira, P. B. Stark, D. S. Wallach, and M. Winn. STAR-Vote: A secure, transparent, auditable, and reliable voting system. In F. Hao and P. Y. A. Ryan, editors, Real-World Electronic Voting: Design, Analysis, and Deployment. CRC Press, Dec. 2016. [ bib | http ]
[18] D. S. Wallach. Testimony before the House Committee on Space, Science & Technology hearing, “Protecting the 2016 Elections from Cyber and Voting Machine Attacks”, Sept. 2016. [ bib | .pdf ]
[19] Z. Tao, A. Kokas, R. Zhang, D. S. Cohan, and D. S. Wallach. Inferring atmospheric particulate matter concentrations from Chinese social media data. PLOS One, Sept. 2016. [ bib | http ]
[20] M. S. Riazi, B. Chen, A. Shrivastava, D. S. Wallach, and F. Koushanfar. Sub-linear privacy-preserving search with untrusted server and semi-honest parties. CoRR, abs/1612.01835, 2016. [ bib | arXiv | http ]
[21] R. S. Tanash, A. Aydoga, Z. Chen, D. S. Wallach, M. Marschall, D. Subramanian, and C. Bronk. Detecting influential users and communities in censored tweets using data-flow graphs. In Proceedings of the 33rd Annual Meeting of the Society for Political Methodology (POLMETH 2016), Houston, TX, 2016. [ bib | .pdf ]
[22] R. S. Tanash, A. Aydoga, Z. Chen, D. S. Wallach, M. Marschall, D. Subramanian, and C. Bronk. The dynamics of social media censorship in transitioning democracies. In The 2016 APSA Conference (Divison of Political Elites and Social Media, and Information Technology and Politics), Philadelphia, PA, 2016. [ bib | http ]
[23] J. C. Dressler, C. Bronk, and D. S. Wallach. Exploiting military opsec through open-source vulnerabilities. In 2015 IEEE Military Communications Conference (MILCOM '15), Tampa, FL, Oct. 2015. [ bib | .pdf ]
[24] R. S. Tanash, Z. Chen, T. Thakur, D. S. Wallach, and D. Subramanian. Known unknowns: An analysis of Twitter censorship in Turkey. In Workshop on Privacy in the Electronic Society, Denver, CO, Oct. 2015. [ bib ]
[25] C. Z. Acemyan, P. Kortum, M. D. Byrne, and D. S. Wallach. From error to error: Why voters could not cast a ballot and verify their vote with Helios, Prêt à Voter, and Scantegrity II. USENIX Journal of Election Technology and Systems (JETS), 3(2), Aug. 2015. [ bib | .pdf ]
[26] Y. Liu, D. R. Bild, D. Adrian, G. Singh, R. P. Dick, D. S. Wallach, and Z. M. Mao. Performance and energy consumption analysis of a delay-tolerant network for censorship-resistant communications. In 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '15), June 2015. [ bib | http ]
[27] D. R. Bild, Y. Liu, R. P. Dick, Z. M. Mao, and D. S. Wallach. Aggregate characterization of user behavior in Twitter and analysis of the retweet graph. ACM Transactions on Internet Technologies, 15(1), Feb. 2015. [ bib | http ]
[28] A. Bates, K. Butler, M. Sherr, C. Shields, P. Traynor, and D. Wallach. Accountable Wiretapping -or- I Know They Can Hear You Now. Journal of Computer Security, 23:167--195, 2015. [ bib | .pdf ]
[29] Y. Liu, D. R. Bild, R. P. Dick, Z. M. Mao, and D. S. Wallach. The Mason test: A defense against Sybil attacks in wireless networks without trusted authorities. IEEE Transactions on Mobile Computing, 2015. in press. [ bib | .pdf ]
[30] C. Z. Acemyan, P. Kortum, M. D. Byrne, and D. S. Wallach. Users' mental models for three end-to-end voting systems: Helios, Prêt à Voter, and Scantegrity II. In Human Aspects of Information Security, Privacy, and Trust, volume 9190 of Lecture Notes in Computer Science. Springer International Publishing, 2015. [ bib | DOI | http ]
[31] T. Book and D. S. Wallach. An empirical study of mobile ad targeting. CoRR, abs/1502.06577, 2015. [ bib | http ]
[32] C. Z. Acemyan, P. Kortum, M. D. Byrne, and D. S. Wallach. Usability of voter verifiable, end-to-end voting systems: Baseline data for Helios, Prêt à Voter, and Scantegrity II. USENIX Journal of Election Technology and Systems (JETS), 2(3), July 2014. [ bib | http ]
[33] M. Dietz and D. S. Wallach. Hardening Persona: Improving federated web login. In Network and Distributed Systems Symposium (NDSS '14), San Diego, CA, Feb. 2014. [ bib | .pdf ]
[34] M. Rostami, M. Majzoobi, F. Koushanfar, D. S. Wallach, and S. Devadas. Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching. IEEE Transactions on Emerging Topics in Computing, 2014. [ bib | .pdf ]
[35] A. A. Sani, L. Zhong, and D. S. Wallach. Glider: A GPU library driver for improved system security. CoRR, abs/1411.3777, 2014. [ bib | http ]
[36] T. Book and D. S. Wallach. A case of collusion: a study of the interface between ad libraries and their apps. In Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones & Mobile Devices (SPSM '13), Berlin, Germany, Nov. 2013. [ bib | .pdf ]
[37] S. Bell, J. Benaloh, M. D. Byrne, D. DeBeauvoir, B. Eakin, G. Fisher, P. Kortum, N. McBurnett, J. M. M. Parker, O. Pereira, P. B. Stark, D. S. Wallach, and M. Winn. STAR-Vote: A secure, transparent, auditable, and reliable voting system. USENIX Journal of Election Technology and Systems (JETS), 1(1), Aug. 2013. [ bib | http ]
[38] T. Zhu, D. Phipps, A. Pridgen, J. Crandall, and D. S. Wallach. The velocity of censorship: High-fidelity detection of microblog post deletions. In USENIX Security Symposium, Washington, DC, Aug. 2013. [ bib | http ]
[39] T. Book, A. Pridgen, and D. S. Wallach. Longitudinal analysis of Android ad library permissions. In Mobile Security Technologies Workshop (MOST), San Francisco, CA, May 2013. [ bib | .pdf ]
[40] P. Song, A. Shu, D. Phipps, D. S. Wallach, M. Tiwari, J. Crandall, and G. Lugar. Language without words: A pointillist model for natural language processing. In 6th International Conference on Soft Computing and Intelligent Systems (SCIS-ISIS 2012), Kobe, Japan, Dec. 2012. [ bib | .pdf ]
[41] A. Czeskis, M. Dietz, T. Kohno, D. S. Wallach, and D. Balfanz. Strengthening user authentication through opportunistic cryptographic identity assertions. In 19th ACM Conference on Computer and Communications Security (CCS '12), Raleigh, NC, Oct. 2012. [ bib | http ]
[42] P. Song, A. Shu, A. Zhou, D. S. Wallach, and J. R. Crandall. A pointillism approach for natural language processing of social media. In Proceedings of the 2012 International Conference on Natural Language Processing and Knowledge Engineering (NLP-KE'12), Hefei, China, Sept. 2012. best paper award. [ bib | .pdf ]
[43] M. Dietz, A. Czeskis, D. Balfanz, and D. S. Wallach. Origin-bound certificates: a fresh approach to strong client authentication for the web. In USENIX Security Symposium, Bellevue, WA, Aug. 2012. [ bib | http ]
[44] S. Shekhar, M. Dietz, and D. S. Wallach. Adsplit: Separating smartphone advertising from applications. In USENIX Security Symposium, Bellevue, WA, Aug. 2012. [ bib | http ]
[45] M. Majzoobi, M. Rostami, F. Koushanfar, D. S. Wallach, and S. Devadas. Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching. In International Workshop on Trustworthy Embedded Devices, May 2012. [ bib | DOI | .pdf ]
[46] A. Bates, K. Butler, M. Sherr, C. Shields, P. Traynor, and D. S. Wallach. Accountable wiretapping -or- I know they can hear you now. In 19th ISOC Network and Distributed System Security Symposium (NDSS 2012), San Diego, CA, Feb. 2012. [ bib | http ]
[47] N. Aase, J. R. Crandall, A. Diaz, J. Knockel, J. O. Molinero, J. Saia, D. Wallach, and T. Zhu. Whiskey, weed, and wukan on the World Wide Web: On measuring censors' resources and motivations. In FOCI 12: Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012. [ bib | http ]
[48] D. S. Wallach. Viewpoint: Rebooting the cs publication process. Communications of the ACM, 54(10), Oct. 2011. [ bib | .pdf ]
[49] S. A. Crosby and D. S. Wallach. Authenticated dictionaries: Real-world costs and trade-offs. ACM Transactions on Information Systems Security (TISSEC), 14(2):17:1--17:30, Sept. 2011. [ bib | DOI | http ]
[50] M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. Quire: Lightweight provenance for smart phone operating systems. In 21st USENIX Security Symposium, San Francisco, CA, Aug. 2011. [ bib | .html ]
[51] D. R. Bild, Y. Liu, R. P. Dick, Z. M. Mao, and D. S. Wallach. Using predictable mobility patterns to support scalable and secure MANETs of handheld devices. In Sixth International Workshop on Mobility in the Evolving Internet Architecture (MobiArch '11), June 2011. [ bib | http ]
[52] D. S. Wallach. Smartphone security: Trends and predictions. In Secure Application Development (SecAppDev 2011), Leuven, Belgium, Feb. 2011. [ bib | .pdf ]
[53] T. Zhu, C. Bronk, and D. S. Wallach. An analysis of chinese search engine filtering. CoRR, abs/1107.3794, 2011. [ bib | http ]
[54] D. Bachrach, C. Nunu, D. S. Wallach, and M. K. Wright. #h00t: Censorship resistant microblogging. CoRR, abs/1109.6874, 2011. [ bib | http ]
[55] S. J. Nielson and D. S. Wallach. The bittorrent anonymity marketplace. CoRR, abs/1108.2718, 2011. [ bib | http ]
[56] S. J. Nielson, C. E. Spare, and D. S. Wallach. Building better incentives for robustness in bittorrent. CoRR, abs/1108.2716, 2011. [ bib | http ]
[57] S. A. Crosby and D. S. Wallach. High throughput asynchronous algorithms for message authentication. Technical Report CS TR10-15, Rice University, Houston, TX, Dec. 2010. [ bib | .pdf ]
[58] T.-W. J. Ngan, R. Dingledine, and D. S. Wallach. Building incentives into Tor. In Proceedings of Financial Cryptography (FC '10), Tenerife, Canary Islands, Jan. 2010. best paper award. [ bib | .pdf ]
[59] S. A. Crosby and D. S. Wallach. Encyclopedia of Cryptography and Security, chapter Algorithmic Denial of Service. Springer-Verlag, 2 edition, 2010. [ bib ]
[60] D. S. Wallach. Native client: A clever alternative. Communications of the ACM, 53(1), Jan. 2010. [ bib | http ]
[61] D. S. Wallach. Polling place burglary raises specter of fraud. Houston Chronicle, Dec. 2009. [ bib | http ]
[62] S. A. Crosby and D. S. Wallach. Super-efficient aggregating history-independent persistent authenticated dictionaries. In Proceedings of ESORICS 2009, Saint Malo, France, Sept. 2009. [ bib | .pdf ]
[63] S. A. Crosby and D. S. Wallach. Efficient data structures for tamper-evident logging. In Proceedings of the 18th USENIX Security Symposium, Montreal, Canada, Aug. 2009. [ bib | .pdf ]
[64] E. Öksüzoğlu and D. S. Wallach. VoteBox Nano: A smaller, stronger, FPGA-based voting machine. In Electronic Voting Technology/Workshop on Trustworthy Elections 2009, Montreal, Canada, Aug. 2009. [ bib | .pdf ]
[65] C. Bronk, D. Castro, and D. S. Wallach. Group effort needed to secure cyberspace. Houston Chronicle, June 2009. [ bib | .pdf ]
[66] D. R. Sandler and D. S. Wallach. Birds of a FETHR: Open, decentralized micropublishing. In 8th International Workshop on Peer-to-Peer Systems (IPTPS '09), Boston, MA, Apr. 2009. [ bib | .pdf ]
[67] D. S. Wallach. Technical perspective: Tools for information to flow securely and swift-ly. Communications of the ACM, 52(2), Feb. 2009. [ bib | .pdf ]
[68] S. A. Crosby, R. H. Riedi, and D. S. Wallach. Opportunities and limits of remote timing attacks. ACM Transactions on Information and Systems Security (TISSEC), 12(3), Jan. 2009. [ bib | .pdf ]
[69] D. S. Wallach. Voting system risk assessment via computational complexity analysis. William and Mary Bill of Rights Journal, 17, Dec. 2008. [ bib | .pdf ]
[70] D. R. Sandler and D. S. Wallach. The case for networked remote voting precincts. In 3rd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '08), San Jose, CA, Aug. 2008. [ bib | .pdf ]
[71] D. R. Sandler, K. Derr, and D. S. Wallach. VoteBox: A tamper-evident, verifiable electronic voting system. In Proceedings of the 17th USENIX Security Symposium (Security '08), San Jose, CA, July 2008. [ bib | .pdf ]
[72] D. R. Sandler and D. S. Wallach. <input type=“password”> must die! In Web 2.0 Security & Privacy (W2SP 2008), Oakland, CA, May 2008. [ bib | .pdf ]
[73] S. Everett, K. Greene, M. Byrne, D. Wallach, K. Derr, D. Sandler, and T. Torous. Is newer always better? The usability of electronic voting machines versus traditional methods. In Proceedings of CHI 2008, Florence, Italy, Apr. 2008. [ bib | .html ]
[74] R. M. Stein, G. Vonnahme, M. Byrne, and D. S. Wallach. Voting technology, election administration, and voter performance. Election Law Journal, 7(2), Apr. 2008. [ bib | .pdf ]
[75] D. Sandler, K. Derr, S. Crosby, and D. S. Wallach. Finding the evidence in tamper-evident logs. In Proceedings of the 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE '08), pages 69--75, 2008. [ bib | DOI | http ]
[76] D. R. Sandler and D. S. Wallach. Casting votes in the Auditorium. In Proceedings of the 2nd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '07), Boston, MA, Aug. 2007. [ bib | .pdf ]
[77] S. Inguva, E. Rescorla, H. Shacham, and D. S. Wallach. Source Code Review of the Hart InterCivic Voting System. California Secretary of State's “Top to Bottom” Review, July 2007. [ bib | .pdf ]
[78] D. L. Dill and D. S. Wallach. Stones Unturned: Gaps in the Investigation of Sarasota's Disputed Congressional Election, Apr. 2007. [ bib | .html ]
[79] D. S. Wallach. Security and Reliability of Webb County's ES&S Voting System and the March '06 Primary Election. Expert Report in Flores v. Lopez, May 2006. [ bib | .pdf ]
[80] A. Singh, T.-W. J. Ngan, P. Druschel, and D. S. Wallach. Eclipse attacks on overlay networks: Threats and defenses. In IEEE INFOCOM '06, Barcelona, Spain, Apr. 2006. [ bib | .pdf ]
[81] C. Coarfa, P. Druschel, and D. S. Wallach. Performance analysis of tls web servers. ACM Transactions on Computer Systems, 24(1), Feb. 2006. [ bib | .pdf ]
[82] A. Nandi, T.-W. J. Ngan, A. Singh, P. Druschel, and D. S. Wallach. Scrivener: Providing incentives in cooperative content distribution systems,. In ACM/IFIP/USENIX 6th International Middleware Conference (Middleware 2005), Grenoble, France, Nov. 2005. [ bib | .html ]
[83] E. de Lara, Y. Chopra, R. Kumar, N. Vaghela, D. S. Wallach, and W. Zwaenepoel. Iterative adaptation for mobile clients using existing APIs. IEEE Transactions on Parallel and Distributed Systems (TPDS), 16(10), Oct. 2005. [ bib | .html ]
[84] S. J. Nielson, S. A. Crosby, and D. S. Wallach. A taxonomy of rational attacks. In 4th International Workshop on Peer-to-Peer Systems (IPTPS '05), Ithaca, NY, Feb. 2005. [ bib | .html ]
[85] A. B. Stubblefield, A. D. Rubin, and D. S. Wallach. Managing the performance impact of web security. Electronic Commerce Research Journal, 5(1), Feb. 2005. [ bib | .pdf ]
[86] A. M. Ladd, K. E. Bekris, A. Rudys, L. E. Kavraki, and D. S. Wallach. Robotics-based location sensing using wireless Ethernet. Wireless Networks, 11(1-2), Jan. 2005. [ bib | http ]
[87] A. Haeberlen, E. Flannery, A. M. Ladd, A. Rudys, D. S. Wallach, and L. E. Kavraki. Practical robust localization over large-scale wireless Ethernet networks. In Tenth ACM International Conference on Mobile Computing and Networking (MOBICOM 2004), Philadelphia, PA, Sept. 2004. [ bib | .pdf ]
[88] A. Mislove, G. Oberoi, A. Post, C. Reis, P. Druschel, and D. S. Wallach. AP3: Cooperative, decentralized anonymous communication. In 11th ACM SIGOPS European Workshop, Leuven, Belgium, Sept. 2004. [ bib | .html ]
[89] D. S. Wallach. Texas must confront voting systems' flaws. Austin American-Statesman, Sept. 2004. [ bib | .pdf ]
[90] T.-W. J. Ngan, A. Nandi, A. Singh, D. S. Wallach, and P. Druschel. Designing incentives-compatible peer-to-peer systems. In 2nd Bertinoro Workshop on Future Directions in Distributed Computing (FuDiCo 2004), Bertinoro, Italy, June 2004. [ bib | .html ]
[91] A. M. Ladd, K. E. Bekris, A. Rudys, D. S. Wallach, and L. E. Kavraki. On the feasibility of using wireless Ethernet for localization. IEEE Transactions on Robotics and Automation, 20(3):555--559, June 2004. [ bib | .pdf ]
[92] T.-W. J. Ngan, D. S. Wallach, and P. Druschel. Incentives-compatible peer-to-peer multicast. In 2nd Workshop on Economics of Peer-to-Peer Systems, Cambridge, MA, June 2004. [ bib | .html ]
[93] D. S. Wallach. Testimony for the Texas Senate Committee on State Affairs, May 2004. [ bib | .pdf ]
[94] D. S. Wallach. Testimony for the Texas House Committee on Elections, Mar. 2004. [ bib | .pdf ]
[95] D. S. Wallach. Testimony for the Ohio Joint Committee on Ballot Security, Mar. 2004. [ bib | .pdf ]
[96] T. Kohno, A. Stubblefield, A. D. Rubin, and D. S. Wallach. Analysis of an electronic voting system. In Proceedings of the 2004 IEEE Symposium on Security and Privacy, Oakland, CA, 2004. [ bib | http ]
[97] J. Bannet, D. W. Price, A. Rudys, J. Singer, and D. S. Wallach. Hack-a-Vote: Demonstrating security issues with electronic voting systems. IEEE Security and Privacy Magazine, 2(1):32--37, January / February 2004. Also reprinted by ComputerUser, March 2004. [ bib | .pdf ]
[98] P. Tao, A. Rudys, A. Ladd, and D. S. Wallach. Wireless LAN location sensing for security applications. In ACM Workshop on Wireless Security (WiSe 2003), San Diego, CA, Sept. 2003. [ bib | .html ]
[99] S. Crosby and D. S. Wallach. Denial of service via algorithmic complexity attacks. In 12th Usenix Security Symposium, Washington, D.C., Aug. 2003. [ bib | .pdf ]
[100] A. C. Fuqua, T.-W. J. Ngan, and D. S. Wallach. Economic behavior of peer-to-peer storage networks. In Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, June 2003. [ bib | .html ]
[101] D. W. Price, A. Rudys, and D. S. Wallach. Garbage collector memory accounting in language-based systems. In Proceedings of the 2003 IEEE Symposium on Security and Privacy, Oakland, CA, May 2003. [ bib | .html ]
[102] A. Mislove, A. Post, C. Reis, P. Willmann, P. Druschel, D. S. Wallach, X. Bonnaire, P. Sens, J.-M. Busca, and L. Arantes-Bezerra. POST: A secure, resilient, cooperative messaging system. In 9th Workshop on Hot Topics in Operating Systems (HotOS IX), Lihue, Hawaii, May 2003. [ bib | .html ]
[103] E. de Lara, R. Kumar, D. S. Wallach, and W. Zwaenepoel. Collaboration and multimedia authoring on mobile devices. In First International Conference on Mobile Systems, Applications, and Services (MobiSys '03), San Francisco, CA, May 2003. [ bib | .pdf ]
[104] N. Paul, D. Evans, A. D. Rubin, and D. S. Wallach. Authentication for remote voting. In Workshop on Human-Computer Interaction and Security Systems, Fort Lauderdale, FL, Apr. 2003. [ bib | .html ]
[105] T.-W. J. Ngan, D. S. Wallach, and P. Druschel. Enforcing fair sharing of peer-to-peer resources. In Proceedings of the Second International Workshop on Peer-to-Peer Systems, Berkeley, CA, Feb. 2003. [ bib | .html ]
[106] Y. C. Hu, W. Yu, A. L. Cox, D. S. Wallach, and W. Zwaenepoel. Runtime support for distributed sharing in safe languages. ACM Transactions on Computer Systems, 21(1), 2003. [ bib | .pdf ]
[107] M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Security for structured peer-to-peer overlay networks. In Fifth Symposium on Operating Systems Design and Implementation (OSDI '02), Boston, MA, Dec. 2002. [ bib | .html ]
[108] A. Rudys and D. S. Wallach. Enforcing Java run-time properties using bytecode rewriting. In International Symposium on Software Security, Tokyo, Japan, Nov. 2002. [ bib | .html ]
[109] D. S. Wallach. A survey of peer-to-peer security issues. In International Symposium on Software Security, Tokyo, Japan, Nov. 2002. [ bib | .html ]
[110] A. M. Ladd, K. E. Bekris, G. Marceau, A. Rudys, D. S. Wallach, and L. E. Kavraki. Using wireless Ethernet for localization. In 2002 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2002), Lausanne, Switzerland, Oct. 2002. [ bib | .pdf ]
[111] A. M. Ladd, K. E. Bekris, G. Marceau, A. Rudys, L. E. Kavraki, and D. S. Wallach. Robotics-based location sensing using wireless Ethernet. In Eighth ACM International Conference on Mobile Computing and Networking (MOBICOM 2002), Atlanta, Georgia, Sept. 2002. [ bib | .pdf ]
[112] Y. Dotsenko, E. de Lara, D. S. Wallach, and W. Zwaenepoel. Extensible adaptation via constraint solving. In Proceedings of the 4th IEEE Worwshop on Mobile Computing Systems and Applications, Callicoon, NY, June 2002. [ bib | http ]
[113] A. Rudys and D. S. Wallach. Transactional rollback for language-based systems. In 2002 International Conference on Dependable Systems and Networks, Washington, D.C., June 2002. [ bib | .html ]
[114] A. Rudys and D. S. Wallach. Termination in language-based systems. ACM Transactions on Information and System Security, 5(2), May 2002. [ bib | .html ]
[115] C. Coarfa, P. Druschel, and D. S. Wallach. Performance analysis of TLS Web servers. In Proceedings of the 2002 Network and Distributed System Security Symposium, San Diego, CA, Feb. 2002. [ bib | .html ]
[116] E. de Lara, D. S. Wallach, and W. Zwaenepoel. HATS: Hierarchical adaptive transmission scheduling. In Proceedings of the 2002 Multimedia Computing and Networking Conference (MMCN'02), San Jose, CA, Jan. 2002. [ bib | http ]
[117] J. Flinn, E. de Lara, M. Satyanarayanan, D. S. Wallach, and W. Zwaenepoel. Reducing the energy usage of Office applications. In Proceedings of IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), Heidelberg, Germany, Nov. 2001. [ bib | http ]
[118] D. S. Wallach. Copy protection technology is doomed. IEEE Computer, 34(10):48--49, Oct. 2001. [ bib | .pdf ]
[119] S. A. Craver, M. Wu, B. Liu, A. Stubblefield, B. Swartzlander, D. S. Wallach, D. Dean, and E. W. Felten. Reading between the lines: Lessons from the SDMI challenge. In 10th Usenix Security Symposium, Washington, D.C., Aug. 2001. [ bib | .pdf ]
[120] A. Stubblefield and D. S. Wallach. Dagster: Censorship-resistant publishing without replication. Technical Report TR01-380, Rice University, July 2001. [ bib | .pdf ]
[121] E. de Lara, D. S. Wallach, and W. Zwaenepoel. Puppeteer: Component-based adaptation for mobile computing. In Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS), San Francisco, CA, Mar. 2001. [ bib | http ]
[122] A. Rudys, J. Clements, and D. S. Wallach. Termination in language-based systems. In Network and Distributed Systems Security Symposium, San Diego, CA, Feb. 2001. [ bib | .html ]
[123] D. S. Wallach, E. W. Felten, and A. W. Appel. The security architecture formerly known as stack inspection: A security mechanism for language-based systems. ACM Transactions on Software Engineering and Methodology, 9(4):341--378, Oct. 2000. [ bib | .html ]
[124] E. de Lara, D. S. Wallach, and W. Zwaenepoel. Opportunities for bandwidth adaptation in Microsoft Office documents. In Proceedings of the Fourth USENIX Windows Symposium, Seattle, Washington, Aug. 2000. [ bib | http ]
[125] A. Grosul and D. S. Wallach. A related-key cryptanalysis of RC4. Technical Report TR-00-358, Department of Computer Science, Rice University, Houston, TX, June 2000. [ bib | .pdf ]
[126] A. B. Stublefield and D. S. Wallach. A security analysis of My.MP3.com and the Beam-it protocol. Technical Report TR-00-353, Department of Computer Science, Rice University, Houston, TX, Feb. 2000. [ bib | .html ]
[127] D. S. Wallach. A New Approach to Mobile Code Security. PhD thesis, Princeton University, Princeton, NJ, Jan. 1999. [ bib | .html ]
[128] D. S. Wallach and E. W. Felten. Understanding Java stack inspection. In Proceedings of the 1998 IEEE Symposium on Security and Privacy, pages 52--63, Oakland, CA, May 1998. [ bib | .html ]
[129] E. W. Felten, D. Balfanz, D. Dean, and D. S. Wallach. Web spoofing: An Internet con game. In 20th National Information Systems Security Conference, Baltimore, Maryland, Oct. 1997. [ bib | .html ]
[130] D. Dean, E. W. Felten, D. S. Wallach, and D. Balfanz. Java security: Web browsers and beyond. In D. E. Denning and P. J. Denning, editors, Internet Besieged: Countering Cyberspace Scofflaws, pages 241--269. ACM Press, New York, NY, Oct. 1997. [ bib | .html ]
[131] D. S. Wallach, D. Balfanz, D. Dean, and E. W. Felten. Extensible security architectures for Java. In Proceedings of the Sixteenth ACM Symposium on Operating System Principles, Saint-Malo, France, Oct. 1997. outstanding paper award. [ bib | .html ]
[132] D. S. Wallach, J. A. Roskind, and E. W. Felten. Flexible, extensible Java security using digital signatures. In DIMACS Workshop on Network Threats, DIMACS Series in Discrete Mathematics and Theoretical Computer Science. American Mathematical Society, Dec. 1996. [ bib ]
[133] D. Dean, E. W. Felten, and D. S. Wallach. Java security: From HotJava to Netscape and beyond. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 190--200, Oakland, CA, May 1996. [ bib | .html ]
[134] D. S. Wallach, S. Kunapalli, and M. F. Cohen. Accelerated MPEG compression of dynamic polygonal scenes. In Computer Graphics (Proceedings of SIGGRAPH 1994), Orlando, FL, July 1994. [ bib | http ]
Teaching

Courses at Rice:

Comp215: Introduction to Program Design (Fall 2014-2019)

Comp327 / 427: Introduction to Computer Security (Spring 2011-2019)

Comp527: Computer Systems Security (Spring 1999, Fall and Spring 2000, Fall 2001-2006, 2008-2013)

Comp435: Election Systems, Technology, and Administration (Fall 2006, Fall 2008, Fall 2012, Fall 2016)

Comp314: Applied Algorithms and Data Structures (Fall 1999, Spring 2001, 2002, 2004-2006, 2008-2010)

Comp620: Seminar in Secure Systems (Fall 1998)

Short courses and tutorials:

Dan S. Wallach, SecVote Summer School (Schloss Dagstühl, Germany), July 2012.

Dan S. Wallach, Software Engineering for Security (a one-week intensive short course), presented at Secure Application Development (Leuven, Belgium), February 2016, (also February 2011 and February 2007).

Dan S. Wallach, Software Engineering for Security (lectures), presented at 4th International School: Network Security Impact on Quality Software Engineering (Viña del Mar & Valparaíso, Chile), October 2007.

Dan S. Wallach, Language-Based Security (a one-week intensive short course), presented at The ACM Summer School on Foundations of Internet Security (Duszniki Zdrój, Poland), June 2002.

Dan S. Wallach and Drew Dean, Java and Security (a one-week intensive short course), Katholieke Universiteit Leuven (Leuven, Belgium), March 1997.

Teaching assistant positions at Princeton:

Introduction to Computer Systems (Spring 1996)

Computer Graphics (Fall 1993, Fall 1994, and Fall 1995)

Advanced Programming Techniques (Spring 1994)

Professional
Service

Research management:

Associate Director, ACCURATE (NSF-funded research center), 2005-2010
Acting Director (ACCURATE), 2010-2011

National service / advisory boards:

Air Force Science Advisory Board (2011-2015)
USENIX Association, Board of Directors (2012-2013)
USENIX Security, Steering Committee (2014-2018)
Army Research Lab, Technical Assessment Board (2018)
Technical Guidelines Development Committee (IEEE Representative), Elections Assistance Commission (2019-present)
Election Security Advisory Commission, State of Michigan (2019-present)

Program committees:

ACM Conference on Computer and Communications Security (CCS) 2004, 2005, 2008, 2009
ACM Conference on Electronic Commerce 2007
ACM International Systems and Storage Conference (SYSTOR) 2017
ACM Role-Based Access Control Workshop 1999 and 2000
ACM SIGPLAN Third Workshop on Programming Languages and Analysis for Security (PLAS) 2008
Applied Cryptography and Network Security (ACNS) 2005
AsiaCCS 2019
Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH) 2008
European Symposium on Research in Computer Security (ESORICS) 2009
Google Native Client (NaCl) Security Contest 2009
HotOS Workshop 2003, 2009, 2011
HotSec Workshop 2006
IEEE International Conference on Distributed Computing Systems (ICDCS) 2007
IEEE Security and Privacy 1999, 2004, 2005, 2007-2012, 2018
IEEE Workshop on Mobile Computing Systems and Applications (WMCSA) 2002 and 2004
3rd International Conference on Electronic Voting 2008
Second International Joint Conference on Electronic Voting (E-Vote-ID) 2017
International Peer-to-Peer Symposium (IPTPS) 2004 and 2006
International Symposium on Engineering Secure Software and Systems (ESSoS) 2010
Network and Distributed Systems Security Symposium (NDSS) 2002-2004, 2006, and 2012
NSF grant panels 2002, 2004, 2005, 2006, 2007, 2010, 2013, 2018
South Central Information Security Symposium (SCISS) 2003-2006
USENIX Electronic Voting Technology Workshop/Workshop on Technology for Elections (EVT/WOTE) 2006-2010
USENIX Annual Technical Conference 2001
USENIX Security Symposium 1999-2003, 2005, 2011, 2012, 2014, 2018
USENIX Symposium on Internet Technologies and Systems (USITS) 2003
VOTE-ID / E-Vote-ID 2009, 2016, 2017
Workshop on Economics in Peer-to-Peer Systems 2004
Workshop on Secure Execution of Untrusted Code (SecuCode) 2009
Workshop on Technology for Elections (WOTE) 2008
Workshop on Web 2.0 Security & Privacy (W2SP) 2007-2010
WWW Conference 1999, 2000, 2003, 2004, 2006-2008, 2011, 2014

Program committee chair / journal editorship:

International Symposium on Engineering Secure Software and Systems (ESSoS) 2010
USENIX Security Symposium 2001
USENIX Journal of Election Technology and Systems (JETS) (2013-2015)
WWW Conference, Co-Chair of Security, Privacy, Reliability, and Ethics Track 2007 and 2008

Invited talks committee:

USENIX Security Symposium 2002 and 2011

Panel moderator/organizer (electronic voting security):

USENIX Security Symposium 2003
IEEE Symposium on Security and Privacy 2004

Workshop organizer / co-chair:

International Symposium on Engineering Secure Software and Systems (ESSoS) 2010
South Central Information Security Symposium (SCISS) 2003-2006
USENIX/ACCURATE Electronic Voting Technology Workshop (EVT) 2006
Workshop on Web 2.0 Security & Privacy (W2SP) 2007-2011

Editorial and advisory board memberships:

Election Assistance Commission - Voting System Risk Analysis (EAC VSRA) panel (2008-2009)
Election Science Institute (VoteWatch)
IEEE Internet Computing (2004-2006)
International Journal of Information Security
International Journal of Information and Computer Security
International Journal for Infonomics
National Committee for Voting Integrity
SAFECode
Verified Voting Foundation / VerifiedVoting.org

University committees:

Advisor for MCS Students (2000-2001)
CS Graduate Admissions (1998-2005, 2014-present)
CS Curriculum Committee (occasional involvement)
CS Facilities (occasional involvement)
KTRU (Rice Radio) Friendly Committee (2005-dissolution of committee)
Rice Childcare Advisory Committee (2005-2006)
University IT Security Committee (2002-dissolution of committee; restarted in 2018)
Distinguished Alumni Award Selection Commitee (2009)
University Benefits Committee (2011-present)
University Graduate Honor Council (2016-present)
Search Committee for Dean of Undergradautes (2018)
Search Committee for Dean of Social Sciences (2019)

Other university service:

Divisional advisor and faculty associate, Martel College (2001-present)
Rice Social Dance Society: faculty sponsor, instructor, workshop organizer, etc. (2001-2006)

External university service:

University of Cyprus, CS faculty search, external commitee member (2015)

Honors and Awards

2013 Microsoft SEIF Faculty Research Award

2012 Best Paper Award (Natural Language Processing and Knowledge Engineering)

2011 National Centers of Academic Excellence in Information Assurance Research (CAE-R)

2010 Best Paper Award (Financial Cryptography)

2009 Google Research Award

2008 Kavli Frontiers of Science Fellow

2008 VoteRescue "Champion of Election Integrity" Award

2008 Defense Science Study Group (DSSG), class of 2008-2009

2007 ComputerWorld "40 Under 40" Award

2000 NSF CAREER Award

2000 IBM University Partnership Award

1997 Outstanding Paper Award (Symposium on Operating Systems Principles)

Related student awards

2011 National Physical Sciences Consortium (NPSC) Fellowship - Adam Pridgen

2009 Usenix Security Grand Challenge (Capture the Flag) Contest - Mike Dietz

2002 CRA Outstanding Undergraduate Award - Adam Stubblefield

Grants

Dan S. Wallach and Phil Kortum, TWC: TTP Option: Medium: Voting Systems Architectures for Security and Usability, NSF CNS-1409401 (March 2014).

Dan S. Wallach and Jedidiah R. Crandall, TWC: Medium: Collaborative: Measurement and Analysis Techniques for Internet Freedom on IP and Social Networks, NSF CNS-1314492 (July 2013).

Dan S. Wallach, TC: Small: Security Architectures for Smartphones, NSF CNS-1117943 (July 2011).

Robert Dick, Z. Morley Mao, and Dan S. Wallach, TC: Medium: Collaborative Research: WHISPER - Wireless Handheld Infrastructureless, Secure Communications System for the Prevention of Eavesdropping and Reprisal, NSF CNS-0964566 (February 2010).

Aviel D. Rubin, Dan S. Wallach, Michael Byrne, Douglas W. Jones, David Dill, Dan Boneh, David A. Wagner, Dierdre Mulligan, Drew Dean, and Peter G. Neumann, CT-CS: A Center for Correct, Usable, Reliable, Auditable, and Transparent Elections (ACCURATE), NSF CNS-0524211 (October 2005).

Dan S. Wallach and Peter Druschel, CSR/PDOS: Security and Incentives for Overlay Network Infrastructure, NSF CNS-0509297 (August 2005).

Dan S. Wallach and Mike Dahlin, Resource Management for Safe Deployment of Edge Services, Texas Advanced Technology Program #003604-0053-2001 (October 2001).

Dan S. Wallach, Security and Resource Management in Type-Safe Language Environments, NSF CAREER CCR-9985332 (March 2000).

Behnaam Aazhang, Richard G. Baraniuk, Joseph R. Cavallaro, Edward W. Knightly, and Dan S. Wallach, Seamless Multitier Wireless Networks for Multimedia Applications, NSF Special Projects ANI-9979465 (April 1999).

Industrial gifts and support:

Samsung research contract (September 2012)
Houston Infraguard (September 2010)
Google gift (November 2009)
Microsoft gift (November 2002)
Schlumberger gift (February 2002)
IBM University Partnership Program (June 2000)
Microsoft gift (July 2000)

Related support:

2011 National Physical Sciences Consortium (NPSC) Fellowship - Adam Pridgen

USENIX Student Scholarship for Adam Stubblefield (May 2001)

Invited Talks and Panels
  1. Dan S. Wallach, Adventures in Electronic Voting Research, Invited Talk, IC Research Day, École polytechnique fédérale de Lausanne (EPFL) (Lausanne, Switzerland), June 2019.
  2. Dan S. Wallach, GitHub Classroom and Rice University’s Comp215 (Introduction to Software Design), Invited Talk, SIGCSE 2019 (Minneapolis, MN), Mar. 2019.
  3. Dan S. Wallach, Daniel Kreiss, and Moon Duchin, 2018-2019 Arthur Miller Lecture on Science and Ethics: Elections and Technology, MIT (Cambridge, MA), Nov. 2018.
  4. Dan S. Wallach, STAR-Vote: A Secure, Transaprent, Auditable, and Reliable Voting System. University of Texas, Austin, Oct. 2018
  5. Dana DeBeauvior, Joseph Lorenzo Hall, and Dan S. Wallach, Election Integrity 2018: What Could Go Wrong? Baker Institute for Public Policy, Rice University (Houston, TX), Sept. 2018.
  6. Dan S. Wallach, STAR-Vote: A Secure, Transaprent, Auditable, and Reliable Voting System. Houston Infraguard Chapter Meeting (Houston, TX), Sept. 2018.
  7. Ryan Kennedy, Bobby Hsu, and Dan S. Wallach, Democracy, Privacy, and the Internet, Cyber Transform: Thinking on Computing and Information in a Global City, University of Houston (Houston, TX), Sept. 2018.
  8. Dan S. Wallach, Testimony for the Texas Senate Select Committee on Election Security (Austin, TX), February 2018.
  9. Roger Dingledine, Simson L. Garfinkel, Phillipa Gill, Daniela Oliveria and Dan S. Wallach, Security and Privacy for Democracy Panel, Computing Research: Addressing National Priorities and Societal Needs, Computing Research Association (Washington, D.C.), October 2017.
  10. Dan S. Wallach, STAR-Vote: A Secure, Transaprent, Auditable, and Reliable Voting System.Summer Research Institute (SuRI) (École Polytechnic Fédérale de Lausanne, Lausanne, Switzerland), June 2017.
  11. Dan S. Wallach, What, exactly, is different or new about mobile security? Kenote speech, Workshop on Mobile Security Technologies (MoST), San Jose, CA, May 2017.
  12. Dan S. Wallach, STAR-Vote: A Secure, Transaprent, Auditable, and Reliable Voting System. Jersey Village High School (Houston, TX), May 2017.
  13. Dan S. Wallach, STAR-Vote: A Secure, Transaprent, Auditable, and Reliable Voting System. League of Women Voters (Houston, TX), May 2017.
  14. Dan S. Wallach, STAR-Vote: A Secure, Transaprent, Auditable, and Reliable Voting System. Dartmouth College (Hannover, NH), April 2017.
  15. Dan S. Wallach, STAR-Vote: A Secure, Transaprent, Auditable, and Reliable Voting System. Scientia Privacy Lecture Series, Rice University (Houston, TX), March 2017.
  16. Dan S. Wallach, STAR-Vote: A Secure, Transaprent, Auditable, and Reliable Voting System. Two Sigma (Houston, TX), October 2016.
  17. Dan S. Wallach, Testimony before the House Committee on Space, Science & Technology hearing, "Protecting the 2016 elections from cyber and voting machine attacks", Washington, DC, Sept. 2016.
  18. Dan S. Wallach, Internet Application Censorship: Studies of Weibo in China and Twitter in Turkey, Houston Kiwanis (Houston, TX), July 2016.
  19. Dan S. Wallach, Internet Application Censorship: Studies of Weibo in China and Twitter in Turkey, Stanford University (Stanford, CA), June 2016.
  20. Dan S. Wallach, Internet Application Censorship: Studies of Weibo in China and Twitter in Turkey, OWASP Meeting, K.U. Leuven (Leuven, Belgium), February 2016.
  21. Dan S. Wallach, Security Architectures for Smartphones, University of Texas, at Dallas (Dallas, TX), October 2015.
  22. Dan S. Wallach, Tracking, Privacy, and Network Neutrality, Houston Kiwanis (Houston, TX), September 2015.
  23. Harley Geiger, Andrew Napolitano, David Leebron, and Dan S. Wallach, Privacy in the Digital Age, Baker Institute for Public Policy, Rice University (Houston, TX), April 2015.
  24. Dan S. Wallach, Android WebView security and the mobile advertising marketplace, Google Security Summit (Mountain View, CA), March 2015..
  25. Dan S. Wallach, Rice Tizen Analysis for Security, Tizen Developers Conference (San Francisco, CA), June 2014.
  26. Dan S. Wallach, STAR-Vote: A Secure, Transaprent, Auditable, and Reliable Voting System. National Science Foundation (Arlington, VA), May 2014.
  27. Dan S. Wallach, STAR-Vote: A Secure, Transaprent, Auditable, and Reliable Voting System. Electronic Voting Network Conference (San Diego, CA), March 2014.
  28. Dan S. Wallach, Security Architectures for Smartphones, Korea Advanced Institute for Science and Technology (KAIST) (Daejeon, South Korea), August 2013.
  29. Dan S. Wallach, Security Analysis of LLVM Bitcode Files for Mobile Platforms, Tizen Developers Conference (San Francisco, CA), May 2013.
  30. Dan S. Wallach, STAR-Vote: A Secure, Transaprent, Auditable, and Reliable Voting System. Mid-Atlantic Collegiate Cyber Defense Competition (Laurel, MD), April 2013.
  31. Dan S. Wallach, STAR-Vote: A Secure, Transaprent, Auditable, and Reliable Voting System. Verifiable Voting Schemes Workshop (Luxembourg), March 2013.
  32. Dan S. Wallach, Privacy and Tracking on the Internet, FTC Workshop on The Big Picture: Comprehensive Data Collection (Washington, D.C.), December 2012.
  33. Dan S. Wallach, David Wagner, Philip B. Stark, and Philip Kortum. The Future of E-Voting - Remote, Internet-Based, and Secure? E-Voting: Risk and Opportunity (Center for Information Technology Policy at Princeton University - Webcast Seminar), November 2012.
  34. Dan S. Wallach, Security Architectures for Smartphones, University of Luxembourg, November 2012.
  35. Dan S. Wallach, The USENIX Association: A Financial Case Study for Open Access.Perspectives Workshop: Publication Culture in Computing Research (Schloss Dagstühl, Germany), November 2012.
  36. Dan S. Wallach, Security Architectures for Smartphones, National Security Agency (Ft. Meade, Maryland), June 2012.
  37. Dana DeBeauvoir, Dan S. Wallach, et al. Future of Voting Systems, International Association of Clerks, Recorders, Election Officials, and Treasurers, Annual Conference (Albuquerque, New Mexico), June 2012.
  38. Dan S. Wallach, Security Architectures for Smartphones, University of California, at Berkeley (Berkeley, California), May 2012.
  39. Jonathan Blow, Adam Glass, Piaw Na, and Dan S. Wallach. CS Alumni Panel, University of California, at Berkeley (Berkeley, California), May 2012.
  40. Dan S. Wallach, Security Architectures for Smartphones, University of New Mexico (Albequerque, New Mexico), April 2012.
  41. Dan S. Wallach, Thoughts on Travis County's Next-Generation Voting System, Travis County Election Study Group (Austin, Texas), October 2011.
  42. Pamela Smith, Dan S. Wallach, Ian S. Piper, and Carolyn Crnich, Panel: The Present, Election Integrity: Past, Present, and Future - Caltech/MIT Voting Technology Project (Cambridge, Massachusetts), October 2011.
  43. Dan S. Wallach, Quire: Lightweight Provenance for Smart Phone Operating Systems, Technischen Universität Darmstadt (Darmstadt, Germany), July 2011.
  44. Dan S. Wallach, VoteBox: A Verifiable, Tamper-Evident, Electronic Voting System, Distinguished Lecture, Université du Luxembourg, July 2011.
  45. Dan S. Wallach, Crypto and e-Voting: Homomorphisms, Zero-Knowledge Proofs, and Other Tricks of the Trade, Leuven Center on Information Communication and Technology (LICT) Distinguished Lecture (Leuven, Belgium), March 2011.
  46. Dan S. Wallach, Seguridad Informática, Tendencias y Aplicaciones (Information Security Trends and Applications), Technology, Connectivity and Internet Workshop, Consejo Federal de Inversiones (Buenos Aires, Argentina), February 2011.
  47. Dan S. Wallach, Electronic Voting Systems: Failures and Research Opportunities, Rice University - Sciencia Lecture Series (Houston, Texas), October 2010.
  48. Ann Harris Bennett, Don Cook, Stan Stanart, Harris County Clerk Debate, sponsored by the Houston League of Women Voters and Rice University, moderated by Dan S. Wallach, October 2010.
  49. Dan S. Wallach, The Wørd, 4th Electronic Voting Technology Workshop / Worshop on Trusted Elections (EVT/WOTE '10) (Washington, D.C.), August 2010.
  50. Dan S. Wallach, Adventures in Electronic Voting Research, Texas A&M University (College Station, Texas), October 2009.
  51. Dan S. Wallach, Adventures in Electronic Voting Research, Swiss Federal Institute of Technology (ETH) (Zürich, Switzerland), May 2009.
  52. Jeremy Epstein, Douglas W. Jones, E. John Sebes, David Wagner, Dan Wallach, Electronic Voting Panel, RSA Conference (San Francisco, California), May 2009.
  53. Dan S. Wallach, Adventures in Electronic Voting Research, Bay Area Association of Democratic Women (Clear Lake, Texas), April 2009.
  54. Dan S. Wallach, Testimony Before the Colorado Election Reform Commission (Denver, Colorado), December 2008.
  55. Dan S. Wallach, Adventures in Electronic Voting Research, National Academy of Science - Kavli Frontiers of Science Symposium (Irvine, California), November 2008.
  56. Dan S. Wallach, Adventures in Electronic Voting Research, Duke University, October 2008.
  57. Dan S. Wallach, Testimony Before the Texas Senate Committee on State Affairs (Austin, Texas), October 2008.
  58. Dan S. Wallach et al., Experts Meeting – E-voting in the 2008 U.S. Elections. The Carter Center (Atlanta, Georgia), September 2008.
  59. David Beirne, Doug Chapin, Dana DeBeauvoir, Anne McGeehan, Rosemary Rodriguez, Dan S. Wallach. Voting System Integrity: Can We Be Confident in the Accuracy of the Results? LBJ School of Public Affairs, UT Austin (Austin, Texas), September 2008.
  60. Chandler Davidson, Bob Stein, Dan S. Wallach, Tova Wang. Democracy, Disenfranchisement, and November 2008 (Constitution Day Panel). Rice University (Houston, Texas), September 2008.
  61. Dan S. Wallach, Testimony Before the Texas House Committee on Elections (Austin, Texas), June 2008.
  62. Dan S. Wallach, Adventures in Electronic Voting Research, Invited Talk,West University Democrats, April 2008.
  63. Dan S. Wallach, Adventures in Electronic Voting Research, Invited Talk, How We Vote Conference, Institute of the Bill of Rights, College of William & Mary (Williamsburg, Virginia), March 2008.
  64. Dan S. Wallach, Adventures in Electronic Voting Research, Invited Talk, Hanzen-Martel Lecture Series, Rice University (Houston, Texas), February 2008.
  65. Dan S. Wallach, Adventures in Electronic Voting Research, Invited Talk, Alumni College Weekend, Rice University (Houston, Texas), February 2008.
  66. Dan S. Wallach, Adventures in Electronic Voting Research, Invited Talk, Google (Mountain View, California), December 2007.
  67. Dan S. Wallach, Real-world Electronic Voting, National Lawyers Council: National Leadership Convention (Washington, D.C.), November 2007.
  68. Dan S. Wallach, Real-world Electronic Voting, Claim Democracy Conference (Washington, D.C.), November 2007.
  69. Dan S. Wallach, Testimony Before the Tennessee Advisory Commission on Intergovernmental Relations (Nashville, Tennessee), September 2007.
  70. Dan S. Wallach and J. Alex Halderman, Results from the California Top-to-Bottom Voting Systems Review, Presentation at Schloss Dagstuhl's Frontiers of Electronic Voting (Wadern, Germany), August 2007.
  71. Michael E. Clark, Joseph E. Savage, Peter Toren, and Dan S. Wallach, Trade Secret and Confidential Information, Panel at the ABA National Institute on Computing and the Law (San Francisco, California), June 2007.
  72. Dan S. Wallach, Testimony Before the Senate Committee on Rules and Administration, Hearing on Electronic Election Reform (Washington, D.C.), February 2007.
  73. Dan S. Wallach, Electronic Voting: Risks and Research, Institute for Security Technology Studies Distinguished Speaker Series, Dartmouth College (Hannover, New Hampshire), October 2006.
  74. Dan S. Wallach, Electronic Voting: Risks and Research, Max Planck Institute for Software Systems (Saarbrücken, Germany), October 2006.
  75. Dan S. Wallach, Electronic Voting: Risks and Research, , Chaire Internationale en Sécurité Informatique, Institut Eurécom (Sophia Antipolis, France), October 2006.
  76. Dan S. Wallach, Electronic Voting: Risks and Research, University of Texas at Austin (Austin, TX), September 2006.
  77. Dan S. Wallach, The Risks of Electronic Voting, Election Protection Summit (Washington, D.C.), June 2006.
  78. Dan S. Wallach, Computer Security Education at Rice, Workshop on Information Assurance Education (Houston, Texas), May 2006.
  79. Dan S. Wallach, The Risks of Electronic Voting, Georgia Institute of Technology (Atlanta, Georgia), March 2006.
  80. Dan S. Wallach, Testimony for the California Senate Elections, Reapportionment & Constitutional Amendments Committee (Menlo Park, California), February 2006.
  81. Elizabeth Hanshaw Winn and Dan S Wallach, Panel: Electronic Voting Technology, First Annual Legislative and Public Policy Conference, TSU Thurgood Marshall School of Law (Houston, Texas), October 2005.
  82. Paul Craft, Douglas Jones, John Kelsey, Ronald Rivest, Michael Shamos, Dan Tokaji, Dan S. Wallach, Panel: Threat Discussion on Trojan Horses, Backdoors, and Other Voting System Software-Related Problems, NIST Workshop on Threats to Voting Systems (Gaithersburg, Maryland), October 2005.
  83. Dan S. Wallach, The Risks of Electronic Voting, Virginia Joint Committee Studying Voting Equipment (Richmond, Virginia), August 2005.
  84. Dan S. Wallach, The Risks of Electronic Voting, Tarrant County Democratic Party Meeting (Hurst, Texas), July 2005.
  85. Dan S. Wallach, Electronic Voting Machine / Registration Systems, Testimony for the Carter-Baker Commission on Federal Election Reform (Houston, Texas), June 2005.
  86. Dan S. Wallach, The Risks of Electronic Voting, NSF Workshop on Cyberinfrastructure and the Social Sciences (Arlington, Virginia), March 2005.
  87. Dan S. Wallach, The Risks of Electronic Voting, CASSIS: Construction and Analysis of Safe, Secure, and Interoperable Smart Devices (Nice, France), March 2005.
  88. Dan S. Wallach, The Risks of Electronic Voting, University of Massachusetts, Amherst, Five Colleges Information Assurance Lecture Series (Ahmerst, Massachusetts), December 2004.
  89. Dan S. Wallach, The Risks of Electronic Voting, University of Iowa, Department of Computer Science (Iowa City, Iowa), December 2004.
  90. Dan S. Wallach, The Risks of Electronic Voting, CSI's 31st Annual Computer Security Conference (Washington, D.C.), November 2004.
  91. Hans Klein, Eugene Spafford, Donald Moynihan, Dan S. Wallach, and Jim Reis, Panel: E-Voting Policies and Perils, Association for Public Policy Analysis and Management (APPAM) (Atlanta, Georgia), October 2004.
  92. Dan S. Wallach, The Risks of Electronic Voting, Seventh Workshop on Languages, Compilers, and Run-time Support for Scalable Systems (Houston, Texas), October 2004.
  93. Dan S. Wallach, The Risks of Electronic Voting, Symposium on the 2004 Presidential Election, John J. Marshall Law School (Chicago, Illinois), October 2004.
  94. Chris Bell, Dan S. Wallach, and Tony J. Servello III, Panel: Electronic Voting, Science Café (Houston, Texas), October 2004.
  95. Dan S. Wallach, The Risks of Electronic Voting, The Integrity of the Electrion Process, U. of Toledo Law School (Toledo, Ohio), October 2004.
  96. Dan S. Wallach, The Risks of Electronic Voting, Princeton University, Department of Computer Science (Princeton, New Jersey), October 2004.
  97. Dan S. Wallach, The Risks of Electronic Voting, DIMACS Workshop on Cryptography: Theory Meets Practice (Piscataway, New Jersey), October 2004.
  98. Dan S. Wallach, Michael I. Shamos, Eugene Spafford, and Michael E. Lavelle, Panel: Who Can Plug Into E-Voting Machines?, E-lection 2004: Is E-Voting Ready for Prime Time?, John Marshall Law School (Chicago, Illinois), October 2004.
  99. Dan S. Wallach, Testimony for the NIST/EAC Technical Guidelines Development Committee (Gaithersburg, Maryland), September 2004.
  100. Dan S. Wallach, The Risks of Electronic Voting, DiverseWorks: The Voting Machine (Houston, Texas), September 2004.
  101. Dan S. Wallach, The Risks of Electronic Voting, Baker Institute Forum on Electronic Voting (Houston, Texas), September 2004.
  102. Dan S. Wallach, The Risks of Electronic Voting, League of Women Voters General Meeting (Houston, Texas), September 2004.
  103. Dan S. Wallach, The Risks of Electronic Voting, Simposio acerca de Urnas Electrónicas para la Emisión del Voto Ciudadano (Mexico City, Mexico), September 2004.
  104. Dan S. Wallach, The Risks of Electronic Voting, Fermi National Accelerator Lab (Batavia, Illinois), August 2004.
  105. Dan S. Wallach, The Risks of Electronic Voting, TrueMajority "National Day of Action" (Austin, Texas), July 2004.
  106. Dan S. Wallach, The Risks of Electronic Voting, 10th Annual County and District Clerks' Association of Texas Conference (Lake Conroe, Texas), June 2004.
  107. Dan S. Wallach, The Risks of Electronic Voting, Texas State Democratic Party Convention, Progressive Populist Caucus (Houston, Texas), June 2004.
  108. Dan S. Wallach, Hack-a-Vote: Demonstrating Security Issues with Electronic Voting Machines, DIMACS Workshop on Electronic Voting - Theory and Practice (Piscataway, New Jersey), May 2004.
  109. Dan S. Wallach, Testimony for the Texas Senate Committee on State Affairs (Austin, Texas), May 2004.
  110. Josh Benaloh, Dana DeBeauvoir, and Dan S. Wallach. Panel: Electronic Voting Security, IEEE Symposium on Security and Privacy (Oakland, California), May 2004.
  111. Dan S. Wallach, The Risks of Electronic Voting, Harris County Democrats (Houston, Texas), April 2004.
  112. Dan S. Wallach, The Risks of Electronic Voting, North Brazoria County Democrats (Pearland, Texas), April 2004.
  113. Dana DeBeauvoir, Ann McGeehan, Dan S. Wallach, Panel on the Security of Electronic Voting, League of Women Voters (Austin, Texas), April 2004.
  114. Dan S. Wallach, The Risks of Electronic Voting, Guest lecture in "Texas Political Parties and Elections" (Government 335N, University of Texas, Austin), March 2004.
  115. Dan S. Wallach, Testimony for the Texas House Elections Committee (Austin, Texas), March 2004.
  116. Dan S. Wallach, The Risks of Electronic Voting, Bell County Republican Convention (Belton, Texas), March 2004.
  117. Dan S. Wallach, Testimony for the Ohio Joint Committee on Ballot Security (Columbus, Ohio), March 2004.
  118. Dan S. Wallach, The Risks of Electronic Voting, Houston Peace Forum (First Unitarian Universalist Church, Houston, Texas), March 2004.
  119. Ben Cohen and Dan S. Wallach, TrueMajority Press Event (Washington, D.C.) February, 2004.
  120. Dan S. Wallach, The Risks of Electronic Voting, European Commision eDemocracy Seminar (Brussels, Belgium), February, 2004.
  121. Dana DeBeauvoir, Dan S. Wallach, Ann McGeehan, Bill Stotesbery, Adina Levin, Electronic Voting: Benefits & Risks, First Unitarian Universalist Church of Austin (panel co-sponsored by Travis County Green Party and Austin Democracy Coalition) (Austin, Texas), January 2004.
  122. Dan S. Wallach, The Risks of Electronic Voting, Texas IMPACT / United Methodist Women (Austin, Texas), January 2004.
  123. Dan S. Wallach, The Risks of Electronic Voting, River Oaks Democratic Women (Houston, Texas), January 2004.
  124. Dan S. Wallach, The Risks of Electronic Voting, University of Michigan, Department of Computer Science (Ann Arbor, Michigan), January 2004.
  125. Dan S. Wallach, The Risks of Electronic Voting, EFF-Austin Policy Roundtable (Austin, Texas), December 2003.
  126. Dan S. Wallach, O.S. Security Semantics for Language-based Systems, Katholieke Universiteit Leuven (Leuven, Belgium), December 2003.
  127. Dan S. Wallach, O.S. Security Semantics for Language-based Systems, Belgium Java User's Group: JavaPolis (Antwerp, Belgium), December 2003.
  128. Dan S. Wallach, The Risks of Electronic Voting, Austin Pastoral Center (Austin, Texas), November 2003.
  129. Dan S. Wallach, Peer-to-Peer Security, Cornell University, Department of Computer Science (Ithaca, New York), November 2003.
  130. Dan S. Wallach, The Risks of Electronic Voting, Duke University, Department of Computer Science (Durham, North Carolina), October 2003.
  131. Dan S. Wallach, The Risks of Electronic Voting, University of Arizona, Department of Computer Science (Tucson, Arizona), September 2003.
  132. Dan S. Wallach, Peer-to-Peer Security, UW/MSR/CMU Software Security Summer Institute (Stevenson, Washington), June 2003.
  133. Dan S. Wallach, Peer-to-Peer Security, Stanford University, Department of Computer Science (Stanford, California), May 2003.
  134. Dan S. Wallach, Adventures in Copy Protection Research, The Hockaday School (Dallas, Texas), April 2003.
  135. Dan S. Wallach, Adventures in Copy Protection Research, Formal Techniques for Networked and Distributed Systems (Houston, Texas), November 2002.
  136. Dan S. Wallach, Peer-to-Peer Security, Oregon Graduate Institute (Portland, Oregon), March 2002.
  137. Dan S. Wallach, Mobile Code Security Through Program Transformations, Mathematical Foundations of Programming Semantics (New Orleans, Louisiana), March 2002.
  138. Dan S. Wallach, The Risks of E-Voting Machines, Bay Area New Democrats (Houston, Texas), November 2001.
  139. Dan S. Wallach, Testimony before the Houston City Council on the risks of electronic voting systems, July 2001.
  140. Dan S. Wallach, Adventures in Copy Protection Research, Open Group Meeting (Austin, Texas), July 2001.
  141. Dan S. Wallach, Adventures in Copy Protection Research, Houston Copyright Town Hall Meeting (Houston, Texas), April, 2001.
  142. Dan S. Wallach, Mobile Code Security Through Program Transformations, U.C. Berkeley (Berkeley, California), March 2001.
  143. Dan S. Wallach, Mobile Code Security Through Program Transformations, University of Texas (Austin, Texas), November 2000.
  144. Dan S. Wallach, Mobile Code Security Through Program Transformations, International Workshop on Mobile Objects/Code and Security (Tokyo, Japan), October 2000.
  145. Dan S. Wallach and John DeRose, The Security of My.MP3.com and Other ``Beaming'' Technologies, MP3 Summit (San Diego, California), June 2000.
  146. Dan S. Wallach, An Overview of Computer Security, Law Practice Management Section of the Houston Bar Association (Houston, Texas), May 2000.
  147. - Wallach has also spoken to visiting groups of high school students via a Rice outreach program organized by Jen Overton.
Advisees

Completed PhDs:

Theodore Book (Square)
Scott Crosby (Two Sigma)
Mike Dietz (Google)
Judson Dressler (USAF)
Eyal de Lara (University of Toronto) (Prof. Willy Zwaenepoel was de Lara's advisor of record)
Tsuen Wan "Johnny" Ngan (Google)
Seth Nielson (Crimson Vista)
Adam Pridgen (Visa International)
Algis Rudys (Google)
Daniel Sandler (Google)
Anhei Shu (Google)
Rima Tanash (Amazon)

Completed Postdocs:

Murat Moran (Giresun University, Turkey)
Peiyou Song (Google)

Completed Masters:

Anwis Das (Google)
Ersin Öksüzoğlu (Intel)
Shashi Shekhar (Google)
Ping Tao (TI)

Current graduate & post-doctoral researcher collaborators:

Bumjin Im
Jaeho Lee
Jonathan Sharman
Daniel Song

Consulting

Private Consulting:

Galois (July 2019, electronic voting system research)
SRI International (June 2016, May-July 2018, computer security research)
Solve Media (March 2012, security architecture review)
Authus
(May 2009, security architecture review)
State of California (Summer 2007, "Top to Bottom" Voting System Review)
AT&T Research (Fall 2001, collaborating with Avi Rubin on security research)
GalleryFurniture (August 2001, post-attack web site audit and reinstall)
Curl (December 2000, security architecture review)
Quaadros Technologies (October 2000, design review)
Cloakware (September 2000 and August 2001, design review)
Coral Technologies (December 1999, security audit)
MetaCreations (March 2000, security audit)
CenterPoint Ventures (ongoing, technical evaluations of startups)
Rho Ventures (ongoing, technical evaluations of startups)

Legal Consulting (Election-related):

Secretary of Labor vs. Association of Professional Flight Attendants (June 2017, expert for plaintiffs)
Secretary of Labor vs. Allied Pilots Association (September 2015, expert for plaintiffs)
Jennings v. Buchanan (November 2006, expert for plaintiffs)
Conroy et al. v. Dennis (Colorado Sec. of State) (September 2006, expert for plaintiffs)
Santana et al. v. Williams (Texas Sec. of State) and DeBeauvoir (Travis County Clerk) (July 2006, expert for plaintiffs)
Taylor et al. v. Cortés (Pennsylvania Sec. of Commonwealth) (April 2006, expert for plaintiffs)
Bruni v. Valdes and Benavides (April 2006, expert for Bruni)
Flores v. Lopez (April 2006, expert for Flores)
ACLU v. Connor (Texas Sec. of State) (February 2005, expert for the ACLU)

Legal Consulting (Other):

Federal Trade Commission (July 2013)
Eolas v. Perot Systems (March 2011, expert for Perot Systems)
Bedrock v. Google (November 2010, consultant for Google)
TiVo v. AT&T (June 2010, expert for AT&T)
Finjan v. Secure Computing (August 2007, expert for Secure Computing)
Autobytel v. Dealix (May 2005, expert for Dealix)
Soverain v. Amazon.com (April 2005, expert for Amazon.com)
Uniloc v. Microsoft (November 2004, expert witness for Microsoft)
Nash v. Microsoft (May 2004, expert witness for Microsoft)
Recruitsoft v. Hire.com (August 2003, expert witness for Hire.com)
DirecTV v. NDS (April 2003, expert witness for DirecTV)
RIAA v. MP3.com (February 2000, wrote declaration for MP3.com)

Employment History Rice University, Professor, Department of Computer Science, beginning October 1998. (Promoted from assistant professor in May 2005; promoted from associate professor in 2012.)
1/07 - 12/07 Stanford University, Department of Computer Science, visiting professor / SRI Computer Science Laboratory, visiting researcher
9/93 - 10/98 Princeton University, Graduate student, Department of Computer Science. Supported by grants from NSF, Sun Microsystems, Intel, Microsoft, and others.
6/97 - 8/97 Netscape Communications Corporation, Mountain View, California.
Integrated Java with SSL. Audited the CORBA and RMI implementations for security bugs. Wrote a CORBA demonstration (a chat server).
6/96 - 8/96 Netscape Communications Corporation, Mountain View, California.
Designed and implemented a privilege-based security mechanism and user interface to enable digitally-signed Java applets. Participated in design reviews of several Netscape and JavaSoft technologies.
6/95 - 8/95 Microsoft Corporation, Redmond, Washington.
Wrote a converter from Softimage to a RenderMorphics-based system (V-Chat). Designed and implemented a polygonal model compression system for virtual reality applications.
6/94 - 8/94 David Sarnoff Research Center, Princeton, New Jersey.
Wrote a microcode-level simulator for parallel video processing engine. Wrote design documents for the client side of a future video-on-demand system.
6/93 - 8/93 Berkeley Systems, Berkeley, California.
Ported a screen-reading system (allowing blind people to use graphical user interfaces) from Microsoft Windows to X.
9/92 - 6/93 U.C. Berkeley, Research Assistant for Dr. Larry Rowe.
Implemented parts of a MPEG-1 video encoder. Wrote the audio support for a real-time distributed media-on-demand system.