Follow
J. Alex Halderman
J. Alex Halderman
University of Michigan, Computer Science & Engineering
Verified email at umich.edu - Homepage
Title
Cited by
Cited by
Year
Understanding the Mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
Proceedings of the 26th Usenix Security Symposium, 2017
23852017
Lest we remember: Cold-boot attacks on encryption keys
JA Halderman, SD Schoen, N Heninger, W Clarkson, W Paul, ...
Communications of the ACM 52 (5), 91-98, 2009
18212009
A search engine for 3D models
T Funkhouser, P Min, M Kazhdan, J Chen, JA Halderman, D Dobkin, ...
ACM Transactions on Graphics (TOG) 22 (1), 83-105, 2003
14662003
The matter of Heartbleed
Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ...
Proceedings of the 14th ACM Internet Measurement Conference, 2014
10342014
ZMap: Fast Internet-wide scanning and its security applications
Z Durumeric, E Wustrow, JA Halderman
Proceedings of the 22nd USENIX Security Symposium, 2013
10202013
Imperfect forward secrecy: How Diffie-Hellman fails in practice
D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ...
Proceedings of the 22nd ACM Conference on Computer and Communications Security, 2015
7162015
Mining your Ps and Qs: Detection of widespread weak keys in network devices
N Heninger, Z Durumeric, E Wustrow, JA Halderman
Proceedings of the 21st USENIX Security Symposium, 2012
6002012
Censys: A search engine backed by Internet-wide scanning
Z Durumeric, D Adrian, A Mirian, M Bailey, JA Halderman
Proceedings of the 22nd ACM Conference on Computer and Communications …, 2015
570*2015
Analysis of the HTTPS certificate ecosystem
Z Durumeric, J Kasten, M Bailey, JA Halderman
Proceedings of the 13th ACM Internet Measurement Conference, 291-304, 2013
4162013
Security analysis of the Estonian Internet voting system
D Springall, T Finkenauer, Z Durumeric, J Kitcat, H Hursti, M MacAlpine, ...
Proceedings of the 21st ACM Conference on Computer and Communications …, 2014
3962014
Elliptic curve cryptography in practice
JW Bos, JA Halderman, N Heninger, J Moore, M Naehrig, E Wustrow
Proceedings of the 18th International Conference on Financial Cryptography …, 2014
3692014
A convenient method for securely managing passwords
JA Halderman, B Waters, EW Felten
Proceedings of the 14th International World Wide Web Conference, 471-479, 2005
3392005
DROWN: Breaking TLS using SSLv2
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
Proceedings of the 25th USENIX Security Symposium, 2016
3102016
Internet censorship in China: Where does the filtering occur?
X Xu, Z Mao, JA Halderman
Proceedings of the 12th Passive and Active Measurement Conference, 133-142, 2011
2712011
Internet censorship in Iran: A first look
S Aryan, H Aryan, JA Halderman
Proceedings of the 3rd USENIX Workshop on Free and Open Communications on …, 2013
2702013
Security analysis of the Diebold AccuVote-TS voting machine
AJ Feldman, JA Halderman, EW Felten
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007
2642007
Security analysis of India's electronic voting machines
S Wolchok, E Wustrow, JA Halderman, HK Prasad, A Kankipati, ...
Proceedings of the 17th ACM Conference on Computer and Communications …, 2010
2602010
New client puzzle outsourcing techniques for DoS resistance
B Waters, A Juels, JA Halderman, EW Felten
Proceedings of the 11th ACM Conference on Computer and Communications …, 2004
2502004
Green lights forever: Analyzing the security of traffic infrastructure
B Ghena, W Beyer, A Hillaker, J Pevarnek, JA Halderman
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014
2352014
Telex: Anticensorship in the network infrastructure
E Wustrow, S Wolchok, I Goldberg, JA Halderman
Proceedings of the 20th USENIX Security Symposium, 2011
2342011
The system can't perform the operation now. Try again later.
Articles 1–20