Follow
J. Alex Halderman
J. Alex Halderman
University of Michigan, Computer Science & Engineering
Verified email at umich.edu - Homepage
Title
Cited by
Cited by
Year
Understanding the Mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
Proceedings of the 26th Usenix Security Symposium, 2017
26992017
Lest we remember: Cold-boot attacks on encryption keys
JA Halderman, SD Schoen, N Heninger, W Clarkson, W Paul, ...
Communications of the ACM 52 (5), 91-98, 2009
18942009
A search engine for 3D models
T Funkhouser, P Min, M Kazhdan, J Chen, JA Halderman, D Dobkin, ...
ACM Transactions on Graphics (TOG) 22 (1), 83-105, 2003
14912003
ZMap: Fast Internet-wide scanning and its security applications
Z Durumeric, E Wustrow, JA Halderman
Proceedings of the 22nd USENIX Security Symposium, 2013
11212013
The matter of Heartbleed
Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ...
Proceedings of the 14th ACM Internet Measurement Conference, 2014
11142014
Imperfect forward secrecy: How Diffie-Hellman fails in practice
D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ...
Proceedings of the 22nd ACM Conference on Computer and Communications Security, 2015
7652015
Censys: A search engine backed by Internet-wide scanning
Z Durumeric, D Adrian, A Mirian, M Bailey, JA Halderman
Proceedings of the 22nd ACM Conference on Computer and Communications …, 2015
630*2015
Mining your Ps and Qs: Detection of widespread weak keys in network devices
N Heninger, Z Durumeric, E Wustrow, JA Halderman
Proceedings of the 21st USENIX Security Symposium, 2012
6282012
Analysis of the HTTPS certificate ecosystem
Z Durumeric, J Kasten, M Bailey, JA Halderman
Proceedings of the 13th ACM Internet Measurement Conference, 291-304, 2013
4432013
Security analysis of the Estonian Internet voting system
D Springall, T Finkenauer, Z Durumeric, J Kitcat, H Hursti, M MacAlpine, ...
Proceedings of the 21st ACM Conference on Computer and Communications …, 2014
4202014
Elliptic curve cryptography in practice
JW Bos, JA Halderman, N Heninger, J Moore, M Naehrig, E Wustrow
Proceedings of the 18th International Conference on Financial Cryptography …, 2014
4082014
A convenient method for securely managing passwords
JA Halderman, B Waters, EW Felten
Proceedings of the 14th International World Wide Web Conference, 471-479, 2005
3532005
DROWN: Breaking TLS using SSLv2
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
Proceedings of the 25th USENIX Security Symposium, 2016
3332016
Internet censorship in Iran: A first look
S Aryan, H Aryan, JA Halderman
Proceedings of the 3rd USENIX Workshop on Free and Open Communications on …, 2013
2962013
Internet censorship in China: Where does the filtering occur?
X Xu, Z Mao, JA Halderman
Proceedings of the 12th Passive and Active Measurement Conference, 133-142, 2011
2852011
Security analysis of India's electronic voting machines
S Wolchok, E Wustrow, JA Halderman, HK Prasad, A Kankipati, ...
Proceedings of the 17th ACM Conference on Computer and Communications …, 2010
2742010
Security analysis of the Diebold AccuVote-TS voting machine
AJ Feldman, JA Halderman, EW Felten
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007
2692007
New client puzzle outsourcing techniques for DoS resistance
B Waters, A Juels, JA Halderman, EW Felten
Proceedings of the 11th ACM Conference on Computer and Communications …, 2004
2632004
An Internet-wide view of Internet-wide scanning
Z Durumeric, M Bailey, JA Halderman
Proceedings of the 23rd USENIX Security Symposium, 2014
2532014
Green lights forever: Analyzing the security of traffic infrastructure
B Ghena, W Beyer, A Hillaker, J Pevarnek, JA Halderman
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014
2472014
The system can't perform the operation now. Try again later.
Articles 1–20