J. Alex Halderman [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
The Antrim County 2020 Election Incident: An Independent Forensic Investigation USENIX Security-2022 - Boston, MA Measurement II: Auditing & Best Practices
Keynote :Recount 2016: A Security Audit of the Presidential Election NDSS-2017 - california,usa
Measuring small subgroup attacks against Diffie-Hellman NDSS-2017 - california,usa
The Security Impact of HTTPS Interception NDSS-2017 - california,usa
Recount 2016: An Uninvited Security Audit of the U.S. Presidential Election CCC-2016 - hamburg,germany
DROWN: Breaking TLS Using SSLv2 USENIX-2016 - austin,usa
Internet Voting: What Could Go Wrong? Enigma-2016 - san francisco,usa
Logjam: Diffie-Hellman, discrete logs, the NSA, and you CCC-2015 - hamburg,germany
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election Jets-2015 - washington,USA
Security Analysis of Estonia's Internet Voting System CCC-2014 - Hamburg,Germany
Security Analysis of the Estonian Internet Voting System CCS-2014 - Scottsdale,USA
An Internet-Wide View of Internet-Wide Scanning usenix-2014 - san diego,usa
TapDance: End-to-Middle Anticensorship without Flow Blocking usenix-2014 - san diego,usa
Security Analysis of a Full-Body Scanner usenix-2014 - san diego,usa
Green Lights Forever: Analyzing the Security of Traffic Infrastructure Woot-2014 - san diego,usa
Zippier ZMap: Internet-Wide Scanning at 10 Gbps Woot-2014 - san diego,usa
Elliptic Curve Cryptography in Practice FinanCryptandInfoSec-2014 - Accra,Barbados
ZMap: Fast Internet-wide Scanning and Its Security Applications USENIX-2013 - Washington, D.C.
Internet Censorship in Iran: A First Look FOCI-2013 - New Jersey, Washington
Illuminating the Security Issues Surrounding Lights-Out Server Management WOOT-2013 - Washington, DC
Attacking the Washington, D.C. Internet Voting System Financial Cryptography and Data Security-2013 - Bonaire,Netherlands
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices USENIX-2012 - Washington, D.C.
Crawling Bittorrent Dhts For Fun And Profit 4th USENIX Workshop on Offensive Technologies -2010 - Washington DC, USA Security
Lest We Remember: Cold Boot Attacks On Encryption Keys 17th USENIX Security Symposium-2008 - San Jose, USA Security