Peer-reviewed research papers
7th International Joint Conference on Electronic Voting (E-Vote-ID ’22), October 2022
The Antrim County 2020 Election Incident: An Independent Forensic Investigation (original expert report)
31st USENIX Security Symposium, August 2022 — Best Paper Award
31st USENIX Security Symposium, August 2022 — Best Paper Award — Internet Defense Prize Winner
7th Workshop on Advances in Secure Electronic Voting, February 2022
6th International Joint Conference on Electronic Voting (E-Vote-ID ’21), October 2021
30th USENIX Security Symposium, August 2021
20th ACM Internet Measurement Conference (IMC), October 2020
20th Privacy Enhancing Technologies Symposium (PETS), July 2020
ACM SIGMETRICS 2020, June 2020
41st IEEE Symposium on Security and Privacy (Oakland ’20), May 2020 — Best Student Paper Award
26th ACM Conference on Computer and Communications Security (CCS ’19), November 2019
26th ACM Conference on Computer and Communications Security (CCS ’19), November 2019
4th International Joint Conference on Electronic Voting (E-Vote-ID ’19), October 2019
ACM Conference on Human Factors in Computing Systems (CHI ’19), May 2019
4th Workshop on Advances in Secure Electronic Voting (Voting ’19), February 2019
18th ACM Internet Measurement Conference (IMC ’18), October 2018
27th USENIX Security Symposium (Sec ’18), August 2018
39th IEEE Symposium on Security and Privacy (Oakland ’18), May 2018
17th ACM Internet Measurement Conference (IMC ’17), November 2017
2nd International Joint Conference on Electronic Voting (E-Vote-ID ’17), October 2017
7th USENIX Workshop on Free and Open Communications on the Internet (FOCI ’17), August 2017
26th World Wide Web Conference (WWW ’17), April 2017
24th Network and Distributed Systems Symposium (NDSS ’17), February 2017
24th Network and Distributed Systems Symposium (NDSS ’17), February 2017
14th IEEE Conference on Privacy, Security, and Trust (PST ’16), December 2016
14th IEEE Conference on Privacy, Security, and Trust (PST ’16), December 2016
14th IEEE Conference on Privacy, Security, and Trust (PST ’16), December 2016
16th ACM Internet Measurement Conference (IMC ’16), November 2016
16th ACM Internet Measurement Conference (IMC ’16), November 2016
2016 New Security Paradigms Workshop (NSPW ’16), September 2016
25th USENIX Security Symposium (Sec ’16), Austin, TX, August 2016 — Pwnie Award — Internet Defense Prize Finalist
46th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN ’16), Toulouse, June 2016
20th International Conference on Financial Cryptography and Data Security (FC ’16), Barbados, February 2016
22nd ACM Conference on Computer and Communications Security (CCS ’15), Denver, CO, October 2015 — Best Paper Award — Pwnie Award
Reprinted in Communications of the ACM, January 2019
22nd ACM Conference on Computer and Communications Security (CCS ’15), Denver, CO, October 2015
15th ACM Internet Measurement Conference (IMC ’15), Tokyo, Japan, October 2015 — IRTF Applied Networking Research Prize Winner
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election (blog post)
5th International Conference on E-voting and Identity (VoteID ’15), Bern, Switzerland, September 2015
1st Workshop on the Security of Cyberphysical Systems (WOS-CPS ’15), Vienna, Austria, September 2015
9th USENIX Workshop on Offensive Technologies (WOOT ’15), Washington, DC, August 2015
14th ACM Internet Measurement Conference (IMC ’14), Vancouver, BC, November 2014 — Best Paper Award
21st ACM Conference on Computer and Communications Security (CCS ’14), Scottsdale, AZ, November 2014
6th International Conference on Electronic Voting (EVOTE ’14), Lochau, Austria, October 2014
23rd USENIX Security Symposium (Sec ’14), San Diego, CA, August 2014
23rd USENIX Security Symposium (Sec ’14), San Diego, CA, August 2014
23rd USENIX Security Symposium (Sec ’14), San Diego, CA, August 2014
8th USENIX Workshop on Offensive Technologies (WOOT ’14), San Diego, CA, August 2014
8th USENIX Workshop on Offensive Technologies (WOOT ’14), San Diego, CA, August 2014
18th International Conference on Financial Cryptography and Data Security (FC ’14), March 2014
18th International Conference on Financial Cryptography and Data Security (FC ’14), March 2014
13th ACM Internet Measurement Conference (IMC ’13), Barcelona, Spain, October 2013
22nd USENIX Security Symposium (Sec ’13), Washington, DC, August 2013
7th USENIX Workshop on Offensive Technologies (WOOT ’13), Washington, DC, August 2013
3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI ’13), Washington, DC, August 2013
17th International Conference on Financial Cryptography and Data Security (FC ’13), Okinawa, Japan, April 2013
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices (website, extended paper)
21st USENIX Security Symposium (Sec ’12), Bellevue, WA, August 2012 — Best Paper Award — Test of Time Award (2022)
Named one of Computing Reviews’ Notable Computing Books and Articles of 2012.
16th Intl. Conference on Financial Cryptography and Data Security (FC ’12), Bonaire, February 2012
20th USENIX Security Symposium (Sec ’11), San Francisco, CA, August 2011 — Runner-up for 2012 PET Award
12th Passive and Active Measurement Conference (PAM ’11), Atlanta, GA, March 2011
15th International Financial Cryptography Conference (FC ’11), February 2011
2nd Workshop on Ethics in Computer Security Research (WECSR ’11), March 2011
17th ACM Conference on Computer and Communications Security (CCS ’10), Chicago, IL, October 2010
4th USENIX Workshop on Offensive Technologies (WOOT ’10), Washington, DC, August 2010
19th International World Wide Web Conference (WWW ’10), Raleigh, NC, April 2010
17th Network and Distributed System Security Symposium (NDSS ’10), San Diego, CA, February-March 2010
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage (website and video)
2009 USENIX/ACCURATE/IAVoSS Electronic Voting Technology Workshop (EVT ’09), Montreal, QC, August 2009
30th IEEE Symposium on Security and Privacy (Oakland ’09), Oakland, CA, May 2009
17th USENIX Security Symposium (Sec ’08), San Jose, CA, July 2008 — Best Student Paper Award — Pwnie Award
Reprinted in Communications of the ACM, May 2009
2008 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT ’08), San Jose, CA, July 2008
2008 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT ’08), San Jose, CA, July 2008
14th ACM Conference on Computer and Communications Security (CCS ’07), Washington, DC, October 2007
2007 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT ’07), Boston, MA, August 2007
Security Analysis of the Diebold AccuVote-TS Voting Machine (initial public version, website and videos)
2007 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT ’07), Boston, MA, August 2007
15th USENIX Security Symposium (Sec ’06), Vancouver, BC, August 2006
14th International World Wide Web Conference (WWW ’05), Chiba, Japan, May 2005
2004 ACM Workshop on Privacy in the Electronic Society (WPES ’04), Washington, DC, October 2004
11th ACM Conference on Computer and Communications Security (CCS ’04), Washington, DC, October 2004
8th International Conference on 3D Web Technology (Web3D ’03), March 2003 — Best Paper Award
ACM Workshop on Digital Rights Management (DRM ’02), Washington, DC, November 2002
Selected other publications
Public comments in response to U.S. EAC VVSG 2.0 annual review, June 6, 2023
Written testimony to the Michigan House Committee on Elections regarding H.B. 4210, May 9, 2023
Remarks delivered at his memorial service, March 4, 2023
Oct. 2022
CISA/ICS-CERT (ICSA-22-154-01), June 3, 2022
Newsweek, September 27, 2021
Expert report submitted on behalf of plaintiffs Donna Curling, et al. in Curling v. Raffensperger, Civil Action No. 1:17-CV-2989-AT, U.S. District Court for the Northern District of Georgia, Atlanta Division, July 1, 2021
Expert report prepared for the State of Michigan, March 26, 2021
Barrons, January 4, 2021
Report prepared for the State of Michigan, October 2020
Slate, January 15, 2020
Congressional Testimony Regarding Federal Funding for Election Cybersecurity(written statement, oral statement, video)
Testimony before the U.S. House Appropriations Subcommittee on Financial Service and General Government, Election Security: Ensuring the Integrity of U.S. Election Systems, February 27, 2019
Video op/ed in collaboration with The New York Times, April 5, 2018
Testimony before the U.S. Senate Select Committee on Intelligence, June 21, 2017
The Washington Post, June 21, 2017
In Feng Hao and Peter Y. A. Ryan (Eds.), Real-World Electronic Voting: Design, Analysis and Deployment, pages 145–171, CRC Press, December 2016
Posted on Medium, November 23, 2016. (Read by over a million people.)
IEEE Spectrum, November 3, 2016
University of Michigan Technical Report, May 2014
Foreign Affairs, October 23, 2013
IEEE Security and Privacy, March/April 2010
University of Michigan Technical Report, June 11, 2009
Princeton University Computer Science Technical Report TR-816-08, March 8, 2008
Part of the California Secretary of State’s “Top-to-Bottom” Voting Systems Review, July 2007
IEEE Security and Privacy, January/February 2006
Princeton University Computer Science Technical Report TR-679-03, October 2003
No comments:
Post a Comment