Rice Univesrity Logo
    • FAQ
    • Deposit your work
    • Login
    Search 
    •   Rice Scholarship Home
    • Faculty & Staff Research
    • George R. Brown School of Engineering
    • Computer Science
    • Search
    •   Rice Scholarship Home
    • Faculty & Staff Research
    • George R. Brown School of Engineering
    • Computer Science
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 21

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities 

    Liu, Yue; Bild, David R.; Dick, Robert P.; Mao, Z. Morley; Wallach, Dan S. (IEEE, 2015)
    Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many identities in order to gain disproportionate influence. Many defenses based on spatial variability of wireless channels exist, but depend either on detailed, multi-tap channel estimation-something not exposed on commodity 802.11 devices-or valid RSSI observations ...
    Thumbnail

    From Error to Error: Why Voters Could not Cast a Ballot and Verify Their Vote With Helios, Prêt à Voter, and Scantegrity II 

    Acemyan, Claudia Z.; Kortum, Philip; Byrne, Michael D.; Wallach, Dan S. (USENIX, 2015)
    The aim of this paper is to identify user errors, and the related potential design deficiencies, that contributed to participants failing to vote cast and vote verify across three end-to-end voting systems: Helios, Prêt à Voter, and Scantegrity II. To understand why voters could not cast a vote 42% of the time and verify that their ballots were cast ...
    Thumbnail

    Picking up the trash: Exploiting generational GC for memory analysis 

    Pridgen, Adam; Garfinkel, Simson; Wallach, Dan S. (Elsevier, 2017)
    Memory analysis is slowly moving up the software stack. Early analysis efforts focused on core OS structures and services. As this field evolves, more information becomes accessible because analysis tools can build on foundational frameworks like Volatility and Rekall. This paper demonstrates and establishes memory analysis techniques for managed ...
    Thumbnail

    A Related-Key Cryptanalysis of RC4 

    Grosul, Alexander; Wallach, Dan S. (2000-06-08)
    In this paper we present analysis of the RC4 stream cipher and show that for each 2048-bit key there exists a family of related keys, differing in one of the byte positions. The keystreams generated by RC4 for a key and its related keys are substantially similar in the initial hundred bytes before diverging. RC4 is most commonly used with a 128-bit ...
    Thumbnail

    Robotics-Based Location Sensing based on Wireless Ethernet 

    Bekris, Kostas E.; Kavraki, Lydia E.; Ladd, Andrew M.; Marceau, Guillaume; Rudys, Algis; (2002-04-25)
    A key subproblem in the construction of location-aware systems is the determination of the position of a mobile device. This paper describes the design, implementation and analysis of a system for determining position from measured RF signal strengths in the IEEE 802.11b wireless Ethernet network. Previous approaches in the location-aware field with ...
    Thumbnail

    Denial of Service via Algorithmic Complexity Attacks 

    Crosby, Scott A.; Wallach, Dan S. (2003-02-12)
    We present a new class of low-bandwidth denial of service attacks that exploit algorithmic deficiencies in many common applications' data structures. Frequently used data structures have "average-case'' expected running time that's far more efficient than the worst case. For example, both binary trees and hash tables can degenerate to linked lists ...
    Thumbnail

    Stones Unturned: Gaps in the Investigation of Sarasota's Disputed Congressional Election 

    Dill, David L.; Wallach, Dan S. (2007-04-13)
    The November 2006 race for Florida’s 13th Congressional District resulted in a 369 vote margin of victory for the winning candidate with more than 18,000 undervotes recorded on the ES&S iVotronic touch-screen voting machines used in Sarasota County. Since then, the losing candidate and a coalition of local voters have filed suit against the state and ...
    Thumbnail

    A Security Analysis of My.MP3.com and the Beam-it Protocol 

    Stubblefield, Adam; Wallach, Dan S. (2000-03-08)
    My.MP3.com is a service that streams audio in the MP3 format to its users. In order to resolve copyright concerns, the service first requires that a user prove he or she owns the right to listen to a particular CD. The mechanism used for the verification is a program called Beam-it which reads a random subset of an audio CD and interacts with the ...
    Thumbnail

    Termination in Language-Based Systems 

    Clements, John; Rudys, Algis; Wallach, Dan S. (2000-08-08)
    Language runtime systems are increasingly being embedded in systems to support runtime extensibility via mobile code. Such systems raise a number of concerns when the code running in such systems is potentially buggy or untrusted. While sophisticated access controls have been designed for mobile code and are shipping as part of commercial systems ...
    Thumbnail

    Puppeteer: Component-based Adaptation for Mobile Computing 

    Lara, Eyal de; Wallach, Dan S.; Zwaenepoel, Willy (2000-07-06)
    Puppeteer is a system for adapting component-based applications in mobile environments. Puppeteer takes advantage of the component-based nature of the applications to perform adaptation without modifying the applications. We illustrate the power of Puppeteer by demonstrating adaptations that would otherwise require significant modifications to the ...
    • previous page
    • 1
    • 2
    • 3
    • next page

    Home | FAQ | Contact Us | Privacy Notice | Accessibility Statement
    Managed by the Digital Scholarship Services at Fondren Library, Rice University
    Physical Address: 6100 Main Street, Houston, Texas 77005
    Mailing Address: MS-44, P.O.BOX 1892, Houston, Texas 77251-1892
    Site Map

     

    Browse

    Entire ArchiveCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsTypeThis CommunityBy Issue DateAuthorsTitlesSubjectsType

    My Account

    Login

    Context

    Export Search Metadata

    Discover

    Author
    Wallach, Dan S. (21)
    Crosby, Scott A. (4)Rudys, Algis (4)Zwaenepoel, Willy (3)Lara, Eyal de (2)Price, David W. (2)Pridgen, Adam (2)Stubblefield, Adam (2)Acemyan, Claudia Z. (1)Bannet, Jonathan (1)... View MoreSubjectHotSpot JVM (1)Java (1)Malware analysis (1)Managed runtimes (1)Memory forensics (1)... View MoreDate Issued2010 - 2017 (4)2000 - 2009 (15)1999 - 1999 (2)Has File(s)Yes (21)

    Home | FAQ | Contact Us | Privacy Notice | Accessibility Statement
    Managed by the Digital Scholarship Services at Fondren Library, Rice University
    Physical Address: 6100 Main Street, Houston, Texas 77005
    Mailing Address: MS-44, P.O.BOX 1892, Houston, Texas 77251-1892
    Site Map