Skip to main content

Showing 1–30 of 30 results for author: Wallach, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.02616  [pdf, other

    cs.HC

    Designing for Passengers' Information Needs on Fellow Travelers: A Comparison of Day and Night Rides in Shared Automated Vehicles

    Authors: Lukas A. Flohr, Martina Schuß, Dieter P. Wallach, Antonio Krüger, Andreas Riener

    Abstract: Shared automated mobility-on-demand promises efficient, sustainable, and flexible transportation. Nevertheless, security concerns, resilience, and their mutual influence - especially at night - will likely be the most critical barriers to public adoption since passengers have to share rides with strangers without a human driver on board. As related work points out that information about fellow tra… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

  2. arXiv:2012.07917  [pdf, other

    cs.CR cs.OS

    The Design and Implementation of a Verified File System with End-to-End Data Integrity

    Authors: Daniel W. Song, Konstantinos Mamouras, Ang Chen, Nathan Dautenhahn, Dan S. Wallach

    Abstract: Despite significant research and engineering efforts, many of today's important computer systems suffer from bugs. To increase the reliability of software systems, recent work has applied formal verification to certify the correctness of such systems, with recent successes including certified file systems and certified cryptographic protocols, albeit using quite different proof tactics and toolcha… ▽ More

    Submitted 14 December, 2020; originally announced December 2020.

    ACM Class: D.2.4; D.4.3; D.4.5; D.4.6

  3. Fairness and Decision-making in Collaborative Shift Scheduling Systems

    Authors: Alarith Uhde, Nadine Schlicker, Dieter P. Wallach, Marc Hassenzahl

    Abstract: The strains associated with shift work decrease healthcare workers' well-being. However, shift schedules adapted to their individual needs can partially mitigate these problems. From a computing perspective, shift scheduling was so far mainly treated as an optimization problem with little attention given to the preferences, thoughts, and feelings of the healthcare workers involved. In the present… ▽ More

    Submitted 6 February, 2020; v1 submitted 16 January, 2020; originally announced January 2020.

    Comments: 10 pages, 3 figures, to be published at CHI'20

  4. arXiv:1912.06176  [pdf, other

    cs.CR cs.NI

    Investigating the effectiveness of web adblockers

    Authors: Clayton Drazner, Nikola Đuza, Hugo Jonker, Dan S. Wallach

    Abstract: We investigate adblocking filters and the extent to which websites and advertisers react when their content is impacted by these filters. We collected data daily from the Alexa Top-5000 web sites for 120 days, and from specific sites that newly appeared in filter lists for 140 days. By evaluating how long a filter rule triggers on a website, we can gauge how long it remains effective. We matched w… ▽ More

    Submitted 12 December, 2019; originally announced December 2019.

  5. arXiv:1908.01897  [pdf, ps, other

    cs.CR

    On the security of ballot marking devices

    Authors: Dan S. Wallach

    Abstract: A recent debate among election experts has considered whether electronic ballot marking devices (BMDs) have adequate security against the risks of malware. A malicious BMD might produce a printed ballot that disagrees with a voter's actual intent, with the hope that voters would be unlikely to detect this subterfuge. This essay considers how an election administrator can create reasonable auditing… ▽ More

    Submitted 12 December, 2019; v1 submitted 5 August, 2019; originally announced August 2019.

    Comments: Major revision relative to the August draft

  6. An Historical Analysis of the SEAndroid Policy Evolution

    Authors: Bum** Im, Ang Chen, Dan Wallach

    Abstract: Android adopted SELinux's mandatory access control (MAC) mechanisms in 2013. Since then, billions of Android devices have benefited from mandatory access control security policies. These policies are expressed in a variety of rules, maintained by Google and extended by Android OEMs. Over the years, the rules have grown to be quite complex, making it challenging to properly understand or configure… ▽ More

    Submitted 3 December, 2018; originally announced December 2018.

    Comments: 16 pages, 11 figures, published in ACSAC '18

  7. arXiv:1707.08619  [pdf, other

    cs.CR

    Public Evidence from Secret Ballots

    Authors: Matthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach

    Abstract: Elections seem simple---aren't they just counting? But they have a unique, challenging combination of security and privacy requirements. The stakes are high; the context is adversarial; the electorate needs to be convinced that the results are correct; and the secrecy of the ballot must be ensured. And they have practical constraints: time is of the essence, and voting systems need to be affordabl… ▽ More

    Submitted 4 August, 2017; v1 submitted 26 July, 2017; originally announced July 2017.

    Comments: To appear in E-Vote-Id '17

  8. arXiv:1705.00782  [pdf, other

    cs.CR

    Verification of STAR-Vote and Evaluation of FDR and ProVerif

    Authors: Murat Moran, Dan S. Wallach

    Abstract: We present the first automated privacy analysis of STAR-Vote, a real world voting system design with sophisticated "end-to-end" cryptography, using FDR and ProVerif. We also evaluate the effectiveness of these tools. Despite the complexity of the voting system, we were able to verify that our abstracted formal model of STAR-Vote provides ballot-secrecy using both formal approaches. Notably, ProVer… ▽ More

    Submitted 1 May, 2017; originally announced May 2017.

    Comments: 16 pages, 2 figures, submitted to iFM 2017 conference

  9. arXiv:1612.01835  [pdf, other

    cs.CR cs.DB cs.IR

    Sub-Linear Privacy-Preserving Near-Neighbor Search

    Authors: M. Sadegh Riazi, Beidi Chen, Anshumali Shrivastava, Dan Wallach, Farinaz Koushanfar

    Abstract: In Near-Neighbor Search (NNS), a new client queries a database (held by a server) for the most similar data (near-neighbors) given a certain similarity metric. The Privacy-Preserving variant (PP-NNS) requires that neither server nor the client shall learn information about the other party's data except what can be inferred from the outcome of NNS. The overwhelming growth in the size of current dat… ▽ More

    Submitted 17 October, 2019; v1 submitted 6 December, 2016; originally announced December 2016.

  10. arXiv:1504.05967  [pdf, other

    cs.CR

    Finding Tizen security bugs through whole-system static analysis

    Authors: Daniel Song, Jisheng Zhao, Michael Burke, Dragoş Sbîrlea, Dan Wallach, Vivek Sarkar

    Abstract: Tizen is a new Linux-based open source platform for consumer devices including smartphones, televisions, vehicles, and wearables. While Tizen provides kernel-level mandatory policy enforcement, it has a large collection of libraries, implemented in a mix of C and C++, which make their own security checks. In this research, we describe the design and engineering of a static analysis engine which dr… ▽ More

    Submitted 22 April, 2015; originally announced April 2015.

  11. arXiv:1502.06577  [pdf, other

    cs.CR cs.CY

    An Empirical Study of Mobile Ad Targeting

    Authors: Theodore Book, Dan S. Wallach

    Abstract: Advertising, long the financial mainstay of the web ecosystem, has become nearly ubiquitous in the world of mobile apps. While ad targeting on the web is fairly well understood, mobile ad targeting is much less studied. In this paper, we use empirical methods to collect a database of over 225,000 ads on 32 simulated devices hosting one of three distinct user profiles. We then analyze how the ads a… ▽ More

    Submitted 23 February, 2015; originally announced February 2015.

    Comments: Submitted to USENIX Security 2015

  12. arXiv:1411.3777  [pdf, other

    cs.OS

    Glider: A GPU Library Driver for Improved System Security

    Authors: Ardalan Amiri Sani, Lin Zhong, Dan S. Wallach

    Abstract: Legacy device drivers implement both device resource management and isolation. This results in a large code base with a wide high-level interface making the driver vulnerable to security attacks. This is particularly problematic for increasingly popular accelerators like GPUs that have large, complex drivers. We solve this problem with library drivers, a new driver architecture. A library driver i… ▽ More

    Submitted 13 November, 2014; originally announced November 2014.

  13. arXiv:1403.5871  [pdf, other

    cs.CR

    The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities

    Authors: Yue Liu, David R. Bild, Robert P. Dick, Z. Morley Mao, Dan S. Wallach

    Abstract: Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many identities in order to gain disproportionate influence. Many defenses based on spatial variability of wireless channels exist, but depend either on detailed, multi-tap channel estimation - something not exposed on commodity 802.11 devices - or valid RSSI observations from multiple trusted sources, e.g., corp… ▽ More

    Submitted 24 March, 2014; originally announced March 2014.

  14. arXiv:1403.4677  [pdf, other

    cs.NI

    Performance Analysis of Location Profile Routing

    Authors: David R. Bild, Yue Liu, Robert P. Dick, Z. Morley Mao, Dan S. Wallach

    Abstract: We propose using the predictability of human motion to eliminate the overhead of distributed location services in human-carried MANETs, dubbing the technique location profile routing. This method outperforms the Geographic Hashing Location Service when nodes change locations 2x more frequently than they initiate connections (e.g., start new TCP streams), as in applications like text- and instant-m… ▽ More

    Submitted 18 March, 2014; originally announced March 2014.

  15. arXiv:1402.2671  [pdf, other

    cs.SI physics.soc-ph

    Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph

    Authors: David R. Bild, Yue Liu, Robert P. Dick, Z. Morley Mao, Dan S. Wallach

    Abstract: Most previous analysis of Twitter user behavior is focused on individual information cascades and the social followers graph. We instead study aggregate user behavior and the retweet graph with a focus on quantitative descriptions. We find that the lifetime tweet distribution is a type-II discrete Weibull stemming from a power law hazard function, the tweet rate distribution, although asymptotical… ▽ More

    Submitted 11 February, 2014; originally announced February 2014.

    Comments: 17 pages, 21 figures

    Journal ref: ACM Trans. Internet Technol. 15, 1, Article 4 (February 2015), 24 pages

  16. arXiv:1307.6082  [pdf, other

    cs.CR

    A Case of Collusion: A Study of the Interface Between Ad Libraries and their Apps

    Authors: Theodore Book, Dan S. Wallach

    Abstract: A growing concern with advertisement libraries on Android is their ability to exfiltrate personal information from their host applications. While previous work has looked at the libraries' abilities to measure private information on their own, advertising libraries also include APIs through which a host application can deliberately leak private information about the user. This study considers a co… ▽ More

    Submitted 23 July, 2013; originally announced July 2013.

    Comments: 6 pages

  17. arXiv:1305.0245  [pdf, ps, other

    cs.CR cs.NI

    Automated generation of web server fingerprints

    Authors: Theodore Book, Martha Witick, Dan S. Wallach

    Abstract: In this paper, we demonstrate that it is possible to automatically generate fingerprints for various web server types using multifactor Bayesian inference on randomly selected servers on the Internet, without building an a priori catalog of server features or behaviors. This makes it possible to conclusively study web server distribution without relying on reported (and variable) version strings.… ▽ More

    Submitted 1 May, 2013; originally announced May 2013.

  18. arXiv:1303.0857  [pdf, other

    cs.CR

    Longitudinal Analysis of Android Ad Library Permissions

    Authors: Theodore Book, Adam Pridgen, Dan S. Wallach

    Abstract: This paper investigates changes over time in the behavior of Android ad libraries. Taking a sample of 100,000 apps, we extract and classify the ad libraries. By considering the release dates of the applications that use a specific ad library version, we estimate the release date for the library, and thus build a chronological map of the permissions used by various ad libraries over time. We find t… ▽ More

    Submitted 18 April, 2013; v1 submitted 4 March, 2013; originally announced March 2013.

    Comments: Most 2013

    Journal ref: Mobile Security Technologies (MoST), May 2013, San Francisco CA

  19. arXiv:1303.0597  [pdf

    cs.CY cs.IR cs.SI

    The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions

    Authors: Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach

    Abstract: Weibo and other popular Chinese microblogging sites are well known for exercising internal censorship, to comply with Chinese government requirements. This research seeks to quantify the mechanisms of this censorship: how fast and how comprehensively posts are deleted.Our analysis considered 2.38 million posts gathered over roughly two months in 2012, with our attention focused on repeatedly visit… ▽ More

    Submitted 9 July, 2013; v1 submitted 3 March, 2013; originally announced March 2013.

    Comments: arXiv admin note: substantial text overlap with arXiv:1211.6166

  20. arXiv:1212.3228  [pdf

    cs.CL cs.IR cs.SI

    Language Without Words: A Pointillist Model for Natural Language Processing

    Authors: Peiyou Song, Anhei Shu, David Phipps, Dan Wallach, Mohit Tiwari, Jedidiah Crandall, George Luger

    Abstract: This paper explores two separate questions: Can we perform natural language processing tasks without a lexicon?; and, Should we? Existing natural language processing techniques are either based on words as units or use units such as grams only for basic classification tasks. How close can a machine come to reasoning about the meanings of words and phrases in a corpus without using any lexicon, bas… ▽ More

    Submitted 11 December, 2012; originally announced December 2012.

    Comments: 5 pages, 2 figures

    ACM Class: I.2.7; H.2.8; H.3.1

    Journal ref: The 6th International Conference on Soft Computing and Intelligent Systems (SCIS-ISIS 2012) Kobe, Japan

  21. arXiv:1211.6166  [pdf

    cs.IR cs.CR

    Tracking and Quantifying Censorship on a Chinese Microblogging Site

    Authors: Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach

    Abstract: We present measurements and analysis of censorship on Weibo, a popular microblogging site in China. Since we were limited in the rate at which we could download posts, we identified users likely to participate in sensitive topics and recursively followed their social contacts. We also leveraged new natural language processing techniques to pick out trending topics despite the use of neologisms, na… ▽ More

    Submitted 26 November, 2012; originally announced November 2012.

    ACM Class: H.3.3; H.3.5; I.2.7

  22. arXiv:1211.1904  [pdf, other

    cs.CR

    STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System

    Authors: Josh Benaloh, Mike Byrne, Philip Kortum, Neal McBurnett, Olivier Pereira, Philip B. Stark, Dan S. Wallach

    Abstract: In her 2011 EVT/WOTE keynote, Travis County, Texas County Clerk Dana DeBeauvoir described the qualities she wanted in her ideal election system to replace their existing DREs. In response, in April of 2012, the authors, working with DeBeauvoir and her staff, jointly architected STAR-Vote, a voting system with a DRE-style human interface and a "belt and suspenders" approach to verifiability. It pro… ▽ More

    Submitted 8 November, 2012; originally announced November 2012.

  23. arXiv:1206.4958  [pdf

    cs.IR cs.CL cs.SI

    A Pointillism Approach for Natural Language Processing of Social Media

    Authors: Peiyou Song, Anhei Shu, Anyu Zhou, Dan Wallach, Jedidiah R. Crandall

    Abstract: The Chinese language poses challenges for natural language processing based on the unit of a word even for formal uses of the Chinese language, social media only makes word segmentation in Chinese even more difficult. In this document we propose a pointillism approach to natural language processing. Rather than words that have individual meanings, the basic unit of a pointillism approach is trigra… ▽ More

    Submitted 21 June, 2012; originally announced June 2012.

    Comments: 8 pages, 5 figures

  24. arXiv:1202.4030  [pdf, other

    cs.OS

    AdSplit: Separating smartphone advertising from applications

    Authors: Shashi Shekhar, Michael Dietz, Dan S. Wallach

    Abstract: A wide variety of smartphone applications today rely on third-party advertising services, which provide libraries that are linked into the hosting application. This situation is undesirable for both the application author and the advertiser. Advertising libraries require additional permissions, resulting in additional permission requests to users. Likewise, a malicious application could simulate t… ▽ More

    Submitted 17 February, 2012; originally announced February 2012.

  25. arXiv:1109.6874  [pdf, other

    cs.CR cs.SI

    #h00t: Censorship Resistant Microblogging

    Authors: Dustin Bachrach, Christopher Nunu, Dan S. Wallach, Matthew Wright

    Abstract: Microblogging services such as Twitter are an increasingly important way to communicate, both for individuals and for groups through the use of hashtags that denote topics of conversation. However, groups can be easily blocked from communicating through blocking of posts with the given hashtags. We propose #h00t, a system for censorship resistant microblogging. #h00t presents an interface that is… ▽ More

    Submitted 30 September, 2011; originally announced September 2011.

    Comments: 10 pages, 4 figures. keywords: censorship resistance, twitter, microblogging, covert channels, group anonymity

  26. arXiv:1108.2718  [pdf, other

    cs.CR

    The BitTorrent Anonymity Marketplace

    Authors: Seth James Nielson, Dan S. Wallach

    Abstract: The very nature of operations in peer-to-peer systems such as BitTorrent exposes information about participants to their peers. Nodes desiring anonymity, therefore, often chose to route their peer-to-peer traffic through anonymity relays, such as Tor. Unfortunately, these relays have little incentive for contribution and struggle to scale with the high loads that P2P traffic foists upon them. We p… ▽ More

    Submitted 12 August, 2011; originally announced August 2011.

    Comments: 15 page, 6 figure, technical report

  27. arXiv:1108.2716  [pdf, other

    cs.GT cs.NI

    Building Better Incentives for Robustness in BitTorrent

    Authors: Seth James Nielson, Caleb E. Spare, Dan S. Wallach

    Abstract: BitTorrent is a widely-deployed, peer-to-peer file transfer protocol engineered with a "tit for tat" mechanism that encourages cooperation. Unfortunately, there is little incentive for nodes to altruistically provide service to their peers after they finish downloading a file, and what altruism there is can be exploited by aggressive clients like Bit- Tyrant. This altruism, called seeding, is alwa… ▽ More

    Submitted 12 August, 2011; originally announced August 2011.

    Comments: 14 pages, 11 figures, technical report

  28. arXiv:1108.2704  [pdf

    cs.CR

    Attacks on Local Searching Tools

    Authors: Seth James Nielson, Seth J. Fogarty, Dan S. Wallach

    Abstract: The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is t… ▽ More

    Submitted 12 August, 2011; originally announced August 2011.

    Comments: Previously unpublished technical report from December 2004

  29. arXiv:1107.3794  [pdf

    cs.CR

    An Analysis of Chinese Search Engine Filtering

    Authors: Tao Zhu, Christopher Bronk, Dan S. Wallach

    Abstract: The imposition of government mandates upon Internet search engine operation is a growing area of interest for both computer science and public policy. Users of these search engines often observe evidence of censorship, but the government policies that impose this censorship are not generally public. To better understand these policies, we conducted a set of experiments on major search engines empl… ▽ More

    Submitted 19 July, 2011; originally announced July 2011.

    Comments: 11 pages

  30. arXiv:1102.2445  [pdf, other

    cs.CR

    Quire: Lightweight Provenance for Smart Phone Operating Systems

    Authors: Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach

    Abstract: Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of network connections they receive. Even within the phone, different apps with different privileges can communicate with one another, allowing one app to trick another into improperly exercising its privileges (a Confused De… ▽ More

    Submitted 11 February, 2011; originally announced February 2011.