Rice
FIS

FIS image header
  •  
  •  
  •  
  •  
  •  
Download 
Scholarly Interest Report
         
Dan Seth Wallach
Professor
Professor of Computer Science and in Electrical & Computer Engineering
 
e-mail:dwallach@rice.edu
 
  • B.S. (1993) University of California at Berkeley
  • M.A. (1995) Princeton University
  • Ph.D. (1998) Princeton University
 
Primary Department
   Department of Computer Science
Picture
 
Department Affiliations
 
  • Center for Multimedia Communication
  • Ken Kennedy Institute for Information Technology
  •  
    Websites
     http://www.cs.rice.edu/~dwallach/
     
    Research Areas
     Computer security; distributed systems; electronic voting systems
     
    Teaching Areas
     Systems security, data structures
     
    Selected Publications
     Abstracts
     

    E. de Lara, Y. Choopra, N. Vaghela, R. Kumar, D. Wallach, W. Zwaenepoel "Iterative adaptation for mobile clients using existing APIs." IEEE Distributed systems Online, vol 6, no 9 (September 2005)

     
     

    E. de Lara, Y. Choopra, N. Vaghela, R. Kumar, D. Wallach, W. Zwaenepoel "Iterative adaption for mobile clients using existing APIs." IEEE Transactions on Parallel and Distributed Systems, v16, no 10 (October 2005)

     
     Refereed articles
     

    A. Ladd, K. Bekris, A. Rudys, L. Kavraki, D. Wallach "Robotics-Based Location Sension Using Wireless Ethernet." Wireless Networks, v 11, no 1-2 (January 2005) : pp 189-204.

     
     

    A. Stubblefield, A. D. Rubin, D. Wallach "Managing the performance impact of web security." Electronic Commerce Research Journal (February 2005)

     
     

    C. Coarfa, P. Druschel, D. S. Wallach "Performance analysis of TLS web servers." ACM Transactions on Computer Systems (2005) In Press

     
     

    Adam B. Stubblefield, Aviel D. Rubin, and Dan S. Wallach "Managing the Performance Impact of Web Security." Journal of Electronic Commerce Research (2004) In Press

     
     

    Andrew M. Ladd, ostas E. Bekris, Guillaume Marceau, Algis Rudys, Lydia E. Kavraki, and Dan S. Wallach "Robotics-Based Location Sensing using Wireless Ethernet." ACM Mobile Applications and networks (MONET) Journal (2004) In Press

     
     

    Andrw M. Ladd, Kostas E. Bekris, Algis P. Rudys, Dan S. Wallach, and Lydia E. Kavrakia "On the Feasibility of Using Wireless Ethernet for Indoor Localization." Transactions on Robotics and Automation, 20, No. 3 (June 2004)

     
     

    Tsuen-Wan "Designing Incentives-Compatible Peer-to-Peer Systems." 2nd Bertinoro Workshop on Future Directions in Distributed Computing (FuDiCo 2004) (June 2004)

     
     

    Alan Mislove, Charles Reis, Ansley Post, Paul Willmann, Peter Druschel, Dan S. Wallach, Xavier Bonnaire, Pierre Sens, Jean-Michel Busca, and Luciana Arantes-Bezerra "POST: A Secure, Resilient, Cooperative Messaging System." Workshop on Hot Topics in Operating Systems (HotOS IX) (May 2003)

     
     

    Andrew M. Ladd, Kostas E. Bekris, Guillaume Marceau, Algis Rudys, Lydia E. Kavraki, and Dan S. Wallach "Robotics-Based Location Sensing using Wireless Ethernet." Mobile Applications & Networks (MONET) Journal (2003) In Press

     
     

    Tsuen-Wan "Johnny" Ngan, Dan S. Wallach, and Peter Druschel "Enforcing Fair Sharing of Peer-to-Peer Resources." 2nd International Workshop on Peer-to-Peer Systems (IPTPS '03) (Feb 2003)

     
     

    Y. Charlie Hu, Weimin Yu, Alan Cox, & Dan S. Wallach "Runtime Support for Distributed Sharing in Safe Languages." Transactions on Computer Systems, 1, Number 1 (Feb 2003) : 1-35.

     
     

    Algis Rudys and D. S. Wallach "Termination in Language-based Systems." ACM Transactions on Information and System Security, Vol.5, No. 2 (May 2002)

     
     

    Miguel Castro, Peter Druschel, Ayalvadi Ganesh, Antony Rowstron, and D. S. Wallach "Security for Peer-to-Peer Routing Overlays." Fifth Symposium on Operating Systems Design and Implementation (OSDI '02) (December 2)

     
     

    Y. Hu, W. Yu, A. Cox, W. Zwaenepoel, D.S. Wallach "Runtime Support for distributed sharing in Safe Languages." ACM Transactions on Computer Science (2002) In Press

     
     Articles
     

    Scott A. Crosby and Dan S. Wallach, High Throughput Asynchronous Algorithms for Message Authentication, currently in journal submission

     
     

    Susan Bell, Josh Benaloh, Michael D. Byrne, Dana DeBeauvoir, Bryce Eakin, Gail Fisher, Philip Kortum, Neal McBurnett, Julian Montoya Michelle Parker, Olivier Pereira, Philip B. Stark, Dan S. Wallach, Michael Winn, STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System, USENIX Journal of Election Technology and Systems (JETS), vol. 1, no. 1, August 2013.

     
     

    Communications of the ACM, vol. 54, no. 10, October 2011

     
     Book chapters
     

    Secure Application Development (SecAppDev 2011) (Leuven, Belgium), February 2011.

     
     Refereed conference papers
     

    Tao Zhu, David Phipps, Adam Pridgen, Jedidiah Crandall, and Dan S. Wallach, The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions, in USENIX Security Symposium (Washington, DC), August, 2013.

     
     

    19th Network and Distributed Systems Symposium (NDSS '12) (San Diego, CA), February 2012.

     
     

    Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, and Dan S. Wallach "Quire: Lightweight Provenance for Smartphone Operating Systems,."  (Aug 2011) Submitted

     
     

    Tao Zhu, Chris Bronk, and Dan S. Wallach "An Analysis of Chinese Search Engine Filtering." Submitted

     
     

    Tsuen-Wan "Johnny" Ngan, Roger Dingledine, and Dan S. Wallach "Building Incentives into Tor,."  (Jan 2010) Submitted

     
     

    Yue Liu, David Bild, Robert Dick, Z. Morley Mao, and Dan S. Wallach "he Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities." Submitted

     
     

    A. Nandi, T-W Ngan,A. Singh, P. Druschel, D. Wallach "Scrivener: Providing incentives in cooperative content distribution systems." Proceedings of ACM/IFIP/USENIX 6th Int'l Middleware Conf (November 2005)

     
     

    A. Singh, T-W Ngan, P. Druschel, D. Wallach "Eclipse Attacks on Overlay Networks: Threats and Defenses." Proceedings of IEEE INFOCOM '06 (April 2006) Submitted

     
     

    Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, and Dan S. Wallach "Analysis of an Electronic Voting System." 1004 IEEE Symposium on Security and Privacy (May 2004)

     
     

    andreas haeberlen, Eliot Flannery, Andrew M. Ladd, Algis Rudys, Dan S. Wallach, and Lydia E. Kavraki "Practical Robust Localization over Large-Scale 802.11 Networks." ACM Tenth International Conference on Mobile Computing and Networking (MOBICOM 2004) (Sept 2004)

     
     

    Andrew Fuqua, Tsuen-Wan "Economic Behavior of Peer-to-Peer Storage Networks." Workshop on Economics of Peer-to-Peer Systems (June 2003)

     
     

    David W. Price, Algis Rudys, and Dan S. Wallach "Garbage Collector Memory Accounting in Language-Based Systems." 2003 IEEE Symposium n Security and Privacy (May 2003)

     
     

    Nathaniel Paul, David Evans, Aviel D. Rubin, and Dan S. Wallach "Authentication for Remote Voting." Workshop on Human-Computer Interaction and Security Systems (Apr 2003)

     
     

    Ping Tao, Algis Rudys, Andrew Ladd, and Dan S. Wallach "Wireless LAN Location Sensing for Security Applications." Workshop on Wireless Security (WiSe 2003) (Sept 2003)

     
     

    Scott Crosby and Dan S. Wallach "Denial of Service via Algorithmic Complexity Attacks." 12th Usenix Security Symposium (Aug 2003)

     
     

    "Collaboration and Multimedia Authoring on Mobile Devices." First International Conference on Mobile Systems, Applications, and Services (MobiSys '03) (May 2003)

     
     

    A. Rudys, D.S. Wallach "Enforcing Java Run-Time Properties Using Bytecode Rewriting." International Symposium on Software Security (2002)

     
     

    Algis Rudys and D. S. Wallach "Transactional Rollback for Language-Based Systems." The 2002 International Conference on Dependable Systems and Networks (DSN-2002) (June 2002)

     
     

    Andrew M. Ladd, Kostas E. Bekris, Guillaume Marceau, Algis Rudys, D. S. Wallach, and Lydia E. Kavraki "Using Wireless Ethernet for Localization." 2002 IEEE/RSJ International Conference on Intelligent Robots and Systems (October 20)

     
     

    Andrew M. Ladd, Kostas E. Bekris, Guillaume Marceau, Algis Rudys, Lydia E. Kavraki, and D.S. Wallach "Robotics-Based Location Sensing using Wireless Ethernet." Eighth ACM International Conference on Mobile Computing and Networking (MOBICOM 2002) (September)

     
     

    D.S. Wallach "A Survey of Peer-to-Peer Security Issues." International Symposium on Software Security (2002)

     
     Other
     

    Theodore Book, Adam Pridgen, and Dan S. Wallach, Longitudinal Analysis of Android Ad Library Permissions, Mobile Security Technologies (MOST 2013), San Francisco, CA, May 2013.

     
     

    ACM Transactions on Information and System Security (TISSEC), vol. 14, no. 2, September 2011.

     
     

     High Throughput Asynchronous Algorithms for Message Authentication, currently in journal submission.

     
     

    Jonathan Bannet, David W. Price, Algis Rudys, Justin Singer, and Dan S. Wallach "Hack-a-Vote: Demonstrating Security Issues with Electronic Voting Systems." IEEE Security and Privacy Magazine, 2, No. 1 (Jan/Feb 04) : 32-37.

     
     

    Tsuen-Wan "Johnny" Ngan, Dan S. Wallach, and Peter Druschel "Incentives-Compatible Peer-to-Peer Multicast." 2nd Workshop on Economics of Peer-to-Peer Systems (June 2004)

     
     

    Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, & Dan s. Wallach "Analysis of an Electronic Voting System." Technical Report TR-2003-19 (July 2003)

     
     

    Cristian Coarfa, Peter Druschel, and D. S. Wallach "Performance Analysis of TLS Web Servers." Network and Distributed Systems Security Symposium (February 2002)

     
     

    D. Price, A. Rudys, D.S. Wallach "Garbage Collector Memory in Language-Based Systems." Technical Report, Rice University, Department of Computer Science (2002)

     
     

    Eyal de Lara, D. S. Wallach, and Willy Zwaenepoel "HATS: Hierarchical Adaptive Transmission Scheduling." Multimedia Computing and Networking 2002 (MMCN02) (January 2002)

     
     

    Yuri Dotsenko, Eyal de Lara, D. S. Wallach, and Willy Zwaenepoel "Extensible Adaptation via Constraint Solving." 4th IEEE Workshop on Mobile Computing Systems and Applications (June 2002)

     
     

    (Invited) Dan S. Wallach "Copy Protection Technology is Doomed." IEEE Computer, 34, 10 (October 2001) : 48-49.

     
     

    Adam B. Stubblefield and Dan S. Wallach "Dagster: Censorship-Resistant Publishg Without Replication." Technical Report TR01-380, Department of Computer Science, Rice University (July 2001)

     
     

    Algis Rudys, John Clements, and Dan S. Wallach "Termination in Language-based Systems." Network and Distributed Systems Security Symposium (February 2001)

     
     

    Cristian Coarfa, Peter Druschel, and Dan S. Wallach "Performance Analysis of TLS Web Servers ." Network and Distributed Systems Security Symposium (February 2002)

     
     

    Eyal de Lara, Dan S. Wallach, and Willy Zwaenepoel "HATS: Hierarchical Adaptive Transmission Scheduling ." Multimedia Computing and Networking 2002 (MMCN02) (2002)

     
     

    Eyal de Lara, Dan S. Wallach, and Willy Zwaenepoel "Position Summary: Architectures for Adaptation Systems." Eighth ILEEE Workshop on Hot Topics in Operating Systems (HotOS-VIII) (May 2001)

     
     

    Eyal de Lara, Dan S. Wallach, and Willy Zwaenepoel "Puppeteer: Componeng-based Adaptation for Mobile Computing." 3rd Usenix Symposium on Internet Technologies and Systems (USITS'01) (March 2001)

     
     

    Eyal de Lara, Rajnish Kumar, Dan S. Wallach, and Willy Zwaenepoel "Collaboration and Document Editing on Bandwidth-Limited Devices." Proceedings of the Workshop on Application Models and Programming Tools for Ubiquitous Computing (UbiTools'01) (September 2001)

     
     

    Jason Flinn, Eyal de Lara, M. Satyanarayanan, Dan S. Wallach, and Willy Zwaenepoel "Reducing the Energy Usage of Office Applications." IFIP/ACM International Conference on Distributed Systems Platforms - Middleware 2001 (November 2001)

     
     

    Scott A. Craver, Min Wu, Bede Liu, Adam Stubblefield, Ben Swartzlander, Dan S. Wallach, Drew Dean, and Edward W. Felten "Reading Between the Lines: Lessons from the SDMI Challenge." 10th Usenix Security Symposium (March 2001)

     
     

    Adam S. Stublefield and Dan S. Wallach "A Security Analysis of My MP3.com and the Beam-it Protocol." Department of Computer Science, Rice University, Technical Report TR-00-353 (February 2000)

     
     

    Alex Grosul and Dan S. Wallach "A Related-Key Cryptanalysis of RC4." Department of Computer Science, Rice University, Technical Report TR-00-358 (June 2000)

     
     

    Algis Rudys, John Clements, and Dan S. Wallach "Termination in Language-Based Systems." Department of Computer Science, Rice University, Technical Report TR-00-363 (August 2000)

     
     

    Dan S. Wallach, Edward W. Felten, and Andrew W. Appel "The Security Architecture Formerly Known as Stack Inspection: A Security Mechanism for Language-based Systems." Transactions on Software Engineering and Methodology (2000)

     
     

    Eyal de Lara, Dan S. Wallach, and Willy Zwaenepoel "Opportunities for Bandwidth Adaptation in Microsoft Office Documents." 4th Usenix Windows Systems Symposium (August 2000)

     
     

    Eyal de Lara, Dan S. Wallach, and Willy Zwaenepoel "Puppeteer: Component-based Adaptation for Mobile Computing." Department of Computer Science, Rice University, Technical Report TR-00-360 (July 2000)

     
     

    Gary McGraw, Dan S. Wallach et al "Attacking Malicious Code: A Report from the Infosec Research Council." IEEE Software, 17(5) (2000) : 33-40.

     
     

    Y. Charlie Hu, Weimin Yu, Alan L. Cox, Dan S. Wallach, and Willy Zwaenepoel "Runtime Support for Distributed Sharing in Typed Languages." Proceedings of LCR2000: the Fifth Workshop on Languages, Compilers, and Run-time Systems for Scalable Computers (2000)

     
     

    Dan S. Wallach and Edward W. Felten "Understanding Java Stack Inspection." 1998 IEEE Symposium on Security and Privacy (May 1998)

     
     

    Dan S. Wallach, Dirk Balfanz, Drew Dean, and Edward W. Felten "Extensible Security Architectures for Java." 16th Symposium on Operating Systems Principles (October 1997) : 116-128.

     
     

    Dan S. Wallach, Jim A. Roskind, and Edward W. Felten "Flexible, Extensible Java Security Using Digital Signatures." Network Threats (1996)

     
     

    Dan S. Wallach, Sharma Kunapalli, and Michael F. Cohen "Accelerated MPEG Compression of Dynamic Polygonal Scenes." Computer Graphics, SIGGRAPH 1994 (August 1994) : 193-196.

     
     

    Drew Dean, Edward W. Felten, Dan S. Wallach, and Dirk Balfanz "Java Security: Web Browsers and Beyond." Internet Beseiged: Countering Cyberspace Scofflaws (October 1997)

     
     

    Drew Dean, Edward W. Felten, and Dan S. Wallach "Java Security: From HotJava to Netscape and Beyond." 1996 IEEE Symposium on Security and Privacy (May 1996) : 190-200.

     
     

    Edward W. Felten, Dirk Balfanz, Drew Dean, and Dan S. Wallach "Web Spoofing: An Internet Con Game." 10th National Information Systems Security Conference (October 1997)

     
    Presentations
     Invited Talks
     

    Quire: Lightweight Provenance for Smart Phone Operating Systems." Technischen Universitšt Darmstadt, Darmstadt, German. (July 2011)

     
     

    VoteBox: A Verifiable, Tamper-Evident, Electronic Voting System." Distinguished Lecture, Universitť du Luxembourg, (July 2011)

     
     

    "Crypto and e-Voting: Homomorphisms, Zero-Knowledge Proofs, and Other Tricks of the Trade,." Leuven Center on Information Communication and Technology (LICT) Distinguished Lecture , Leuven, Belgium. (March 2011)

     
     

    "Thoughts on Travis County's Next-Generation Voting System, Travis County Election Study Group (Austin, Texas)." Austin. (October 2011)

     
     

    "Adventures in Electronic Voting Research." Google, Mountain View, CA. (December 2007)

     
     

    "Real-world Electronic Voting." National Lawyers Council: National Leadership Convention, Washington, D.C.. (November 2007)

     
     

    "Real-world Electronic Voting." Clain Domocracy Conference, Washington, D.C.. (November 2007)

     
     

    "Results from the California Top-to-Bottom Voting Systems Review." Schloss Dagstuhl's Frontiers of Electronic Voting, Wadern, Germany. (August 2007) With J. Alex Halderman

     
     

    "Testimony Before the Senate Committee on Rules and Administration, Hearing on Electronic Election Reform." Washington, D.C.. (February 2007)

     
     

    "Testimony Before the Tennessee Advisory Commission on Intergovernmental Relations." Nashiville, TN. (September')

     
     

    "Trade Secret and Confidential Information." Panel at the ABA National Institute on Computing and the Law, San Francisco, CA. (June 2007) With Michael E. Clark, Joseph E. Savage, Peter Toren

     
     

    "Electronic Voting Machine / Registration Systems." Testimony for the Carter-Baker Commission on Federal Election Reform, Houston, TX. (June 2005)

     
     

    "The Risks of Electronic Voting." Tarrant County Democratic Party Meeting, Hurst, TX. (July 2005)

     
     

    "The Risks of Electronic Voting." CASSIS: Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, Nice, France. (March 2005)

     
     

    "The Risks of Electronic Voting." NSF Workshop on Cyberinfrastructure and the Social Sciences, Arlington, VA. (March 2005)

     
     

    "The Risks of Electronic Voting." Virginia Joint Committee Studying Voting Equipment, Richmond, VA. (August 2005)

     
     

    "Hack-a-Vote: Demonstrating Security Issues with Electronic Voting Machines." DIMACS Workshop on Electronic Voting - Theory and Practice, Piscataway, New Jersey. (May 2004)

     
     

    "Panel: Electronic Voting Security." IEEE Symposum on Security and Privacy, Oakland, California. (May 2004)

     
     

    "The Risks of Electronic Voting." DIMACS Workshop on Cryptography: Theory Meets Practice, Piscataway, New Jersey. (October 2004)

     
     

    "The Risks of Electronic Voting." CST's 31st Annual Computer Security Conference, Washington, D.C.. (November 2004)

     
     

    "The Risks of Electronic Voting." Fermi National Accelerator Lab, Batavia, Illinois. (August 2004)

     
     

    "Adventures in Copy Protection Research." The Hockaday School, Dallas, Texas. (April 2003)

     
     

    "O.S. Security Semantics for Language-based Systems." Belgium Java User's Group: JavaPolis, Antwerp, Belgium. (December 2003 (scheduled))

     
     

    "Peer-to-Peer Security." Stanford University, Department of Computer Science, Stanford, California. (May 2003)

     
     

    "Peer-to-Peer Security." UW/MSR/CMU Software Security Summer Institute, Stevenson, Washington. (June 2003)

     
     

    "The Risks of Electronic Voting." University of Arizona, Department of Computer Science, Tucson, Arizona. (September 2003)

     
     

    "The Risks of Electronic Voting." Cornell University, Department of Computer Science, Ithaca, New York. (November 2003)

     
     

    "The Risks of Electronic Voting." Duke University, Department of Computer Science, Durham, North Carolina. (October 2003)

     
     

    "Language-Based Security." Invited, Summer School on Foundations of Internet Security, Duszniki Zdroj, Poland. (June 2002)

     
     

    "Mobile Code Security Through Program Transformations." Invited, Mathematical Foundations of Programming Semantics, New Orleans, Louisiana. (March 2002)

     
     

    "Peer-to-Peer Security." Invited, Oregon Graduate Institute, Portland, Oregon. (March 2002)

     
     Lectures
     

    (Multiple lectures), SecVote Summer School (Schloss Dagstühl, Germany),  July 2012

     
     

    CS Alumni Panel, UC Berkeley, May 2012

     
     

    Future of E-Voting (Panel), E-Voting: Risk and Opportunity, Princeton, Nov 2012

     
     

    Future of Voting Systems (Panel,  IACREOT Annual Meeting, Albuquerque, NM, June 2012

     
     

    Privacy and Tracking on the Internet, Federal Trade Commission, Washington, D.C, Dec 2012

     
     

    Security Architectures for Smartphones, National Security Agency (Ft. Meade, Maryland), June 2012

     
     

    Security Architectures for Smartphones, UC Berkeley, May 2012

     
     

    Security Architectures for Smartphones, University of Luxembourg, Nov 2012

     
     

    Security Architectures for Smartphones, University of New Mexico, April 2012

     
     

    USENIX Financial Case Stud,  Publication Culture in Computing Research (Schloss Dagstühl, Germany), Nov 2012

     
     

    "Software Engineering for Security." 4th International School: Network Security Impact on Quality Software Engineering, Vina del Mar & Valparaiso, Chile. (October 2007)

     
     Other
     

    #h00t: Censorship-Resistant Microblogging, arXiv CoRR (abs/1109.6874), September 2011.

     
     

    "Software Engineering for Security." Secure Application Development, Leuven, Belgium. (February 2007)

     
     

    "Adventures in Copy Protection Research." (Invited) Houston Copyright Town Hall Meeting, Houston, Texas. (April 2001)

     
     

    "Adventures in Copy Protection Research." (Invited) Open Group Meeting, Austin, Texas. (July 2001)

     
     

    "Code Security Through Program Transformations." (Invited) University of California-Berkeley, Berkeley, California. (March 2001)

     
     

    "Language-Based Security." (Invited) The Summer School on Foundations of Internet Security, Duszniki Zdroj, Poland. (2002)

     
     

    "The Risks of E-Voting Machines." (Invited) Bay Area New Democrats, Houston, Texas. (November 2001)

     
     

    "The Risks of Electronic Voting Systems." (Invited) Testimony before the Houston City Council, Houston, Texas. (July 2001)

     
     

    "An Overview of Computer Security (Invited)." Law Practice Management Section of the Houston Bar Association, Houston, Texas. (May 2000)

     
     

    "The Security of My.MP3.com and Other "Beaming" Technologies (Invited)." MP3 Summit, San Diego, California. (June 2000) With with John DeRose

     
     

    "Java Security." Instituto Politocnico Nacional, Mexico City, Mexico. (October 1999)

     
     

    "Java Security." Instituto Tecnologico Autonomo de Mexico, Mexico City, Mexico. (October 1999)

     
     

    "Java Security." Universidad Naiconal Autonoma de Mexico, Mexico City, Mexico. (October 1999)

     
     

    "Java Security." Universidad Autonoma Metropolitana - Iztapalapa, Mexico City, Mexico. (October 1999)

     
     

    "Java Security." Instituto Tecnologico Y De Estudios Superiores de Monterrey, Mexico City, Mexico. (October 1999)

     
     

    "Posgrados y Estancias Sabaticas." Instituto Tecnologico Autonomo de Mexico, Mexico City, Mexico. (October 1999) With Eyal de Lara

     
     

    "Posgrados y Estancias Sabaticas." Instituto Tecnologico Y De Estudios Superiores de Monterrey, Mexico City, Mexico. (October 1999) With Eyal de Lara

     
     

    "Posgrados y Estancias Sabaticas." Universidad Autonoma Metropolitana - Iztapalapa, Mexico City, Mexico. (October 1999) With Eyal de Lara

     
     

    "Posgrados y Estancias Sabaticas." Universidad Nacional Autonoma de Mexico, Mexico City, Mexico. (October 1999) With Eyal de Lara

     
     

    "Posgrados y Estancias Sabaticas." Instituto Politocnico Nacional, Mexico City, Mexico. (October 1999) With Eyal de Lara

     
     Panelist
     

    "Electronic Voting Technology." First Annual Legislative and Public Policy Conference, TSU Thurgood Marshall School of Law, Houston, TX. (October 2005) With E. Hanson Winn

     
     

    "Threat Discussion on Trojan Horses, Backdoors, and Other Voting System Software-Related Problems." NIST Workshop on Threats to Voting Systems, Gaithersburg, MD. (October 2005) With P. Craft, D. Jones, J. Kelsey, R. Rivest, M. Shamos, D. Tokaji

     
     Workshops
     

     Peiyou Song, Anhei Shu, David Phipps, Dan S. Wallach, Mohit Tiwari, Jedidiah Crandall, George Lugar. Language Without Words: A Pointillist Model for Natural Language Processing6th International Conference on Soft Computing and Intelligent Systems (SCIS-ISIS 2012) (Kobe, Japan), December 2012.

     
     

    Peiyou Song, Anhei Shu, Anyu Zhou, Dan Wallach, and Jedidiah R. Crandall. A Pointillism Approach for Natural Language Processing of Social MediaProceedings of the 2012 International Conference on Natural Language Processing and Knowledge Engineering (NLP-KE'12) (Hefei, China), September 2012. —best paper award

     
     

    Adam Bates, Kevin Butler, Micah Sherr, Clay Shields, Patrick Traynor, and Dan S. Wallach. Accountable Wiretapping, or I Know They Can Hear You Now19th Network and Distributed Systems Symposium (NDSS '12) (San Diego, CA), February 2012.

     
     

    Nicholas Aase, Jedidiah R. Crandall, Alvaro Diaz, Jeffrey Knockel, Jorge Ocana Molinero, Jared Saia, Dan S. Wallach, and Tao Zhu. Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations. 2nd USENIX Workshop on Free and Open Communications on the Internet. (FOCI 2012) (Bellevue, Washington), August 2012

     
     

    Shashi Shekhar, Michael Dietz, and Dan S. Wallach. AdSplit: Separating smartphone advertising from applications21st USENIX Security Symposium (Bellevue, WA), August 2012.

     
     

    Michael Dietz, Alexei Czeskis, Dirk Balfanz, and Dan S. Wallach. Origin-bound certificates: a fresh approach to strong client authentication for the Web21st USENIX Security Symposium (Bellevue, WA), August 2012.

     
     

     Alexei Czeskis, Michael Dietz, Tadayoshi Kohno, Dan S. Wallach, and Dirk Balfanz. Strengthening user authentication through opportunistic cryptographic identity assertions19th ACM Conference on Computer and Communications Security (CCS '12) (Raleigh, NC), October 2012.

     
     

    6th ACM International Workshop on Mobility in the Evolving Internet Architecture (MobiArch '11) (Washington, D.C.), June 2011.

     
     

    "Seguridad Informática, Tendencias y Aplicaciones (Information Security Trends and Applications

     ." Technology, Connectivity and Internet Workshop, Consejo Federal de Inversiones , Buenos Aires, Argentina. (February 2011)

     
     

    Daniel R. Sandler and Dan S. Wallach. Birds of a FETHR: Open, Decentralized Micropublishing. 8th International Workshop on Peer-to-Peer Systems (IPTPS ’09) (Boston, Massachusetts), April 2009.

     
     

    Chris Grier, Samuel T. King, and Dan S. Wallach, How I Learned to Stop Worrying and Love Plugins, Workshop on Web 2.0 Security and Privacy (W2SP '09) (Oakland, California), May 2009.

     
     

    Dan S. Wallach, End-to-end crypto works. Now what? NIST End-to-End Voting Systems Workshop (Washington, D.C.), October 2009.

     
     

    Ersin Öksüzoğlu and Dan S. Wallach, VoteBox Nano: A Smaller, Stronger FPGA-based Voting Machine, 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE ‘09) (Montreal, Canada), August 2009.

     
     

    Daniel R. Sandler, Kyle Derr, Scott Crosby, and Dan S. Wallach. Finding the evidence in tamper-evident logs. Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE’08) (Oakland, California), May 2008.

     
     

    Daniel R. Sandler and Dan S. Wallach. <input type="password"> must die! Web 2.0 Security & Privacy (W2SP 2008) (Oakland, California), May 2008.

     
     

    Daniel R. Sandler and Dan S. Wallach, The Case for Networked Remote Voting Precincts. 3rd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '08) (San Jose, California), August 2008.

     
     

    "Casting Votes in the Auditorium." 2nd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '07), Boston, MA. (August 2007)

     
     

    "A taxonomy of rational attacks." 4th Int'l Workshsop on peer-to-peer systems (IPTPS'05), Ithaca, NY. (February 2005) With S. Nielson, S. Crosby

     
    Editorial Positions
     Member of the Editorial Board, IEEE Internet Computing. (2005 - 2005)

     Member of the Editorial Board, International Journal of Information Security. (2002 - 2002)

     Member of the Editorial Board, International Journal of information Security. (2003 - 2003)

     Other, Int'll Journal of Information Security. (2005 - 2005)

     Member of the Editorial Board, Int'l Journal of Information and Computer Security. (2005 - 2005)

     Member of the Editorial Board, Int'l Journal of Infonomics. (2005 - 2005)

    Supervised Theses & Dissertations
     Eric Ethan Allen, Master of Science Efficient Implementation of Run-time Generic Types for Java. (2002) (Thesis Committee Member)

     Brian Stoler, Master of Science A Framework for Building Pedagogic Java Programming Envilronments. (2002) (Thesis Committee Member)

     Cristian Coarfa, Master of Science Performance Analysis of TLS Web Servers. (2002) (Thesis Committee Member)

     Yuri Dotsenko, Masters Extensible Adaptation via Constraint Solving. (2002) (Thesis Committee Member)

     Dennis Lu, Master of Science Dr.C#: A Pedagogic IDE for C# Featuring a Real-Eval-Print Loop. (2003) (Thesis Committee Member)

     Algis Rudys, Masters Termination and Rollback in Language-Based Systems. (2003) (Thesis Director)

     Atul Singh, Master of Science The Eclipse Attack. (2004) (Thesis Committee Member)

     Animesh Nandi, Master of Science LALA: Location Aware Load Aware Overlay Anycast. (2004) (Thesis Committee Member)

     Master of Science Incentives and Fair Sharing in Peer-to-Peer Systems. (2004) (Thesis Director)

     Jonathan Bannet, Master of Science Soft Boundaries for Statically Enforceable Protection Domains. (2004) (Thesis Director)

     Alan Mislove, Master of Science POST: A Decentralized Platform for Reliable Collaborative Applications. (2004) (Thesis Committee Member)

     Ping Tao, Master of Science Golden-Eye: A Server-Side Location-Sensing Systems for Wireless LANs. (2004) (Thesis Director)

     Scott A. Crosby, Master of Science Algorithmic Attacks and Timing Leaks in Distributed Systems. (2005) (Thesis Director)

     Algis Rudys, Ph. D. Operating System-Style Protections for Language-Based Systems. (2007) (Thesis Director)

     Guohui Wang, Master of Science On the Design Principles of Network Coordinates Systems. (2008) (Thesis Committee Member)

     Doctor of Philosophy Providing Incentives to Peer-to-Peer Applications. (2008) (Thesis Director)

     Atul Singh, Doctor of Philosophy Understanding, Evaluating, and Improving the Availability of BFT Protocols. (2009) (Thesis Committee Member)

     Animesh Nandi, Doctor of Philosophy Exploring the design space of cooperative streaming multicast. (2009) (Thesis Committee Member)

     Cai Zheng, Master of Science Design and Implementation of the Maestro Network Control Platform. (2009) (Thesis Committee Member)

     Daniel Sandler, Doctor of Philosophy VoteBox: a verifiable, tamper-evident electronic voting systems. (2009) (Thesis Director)

     Andreas Haeberlen, Doctor of Philosophy Accountability for Distributed Systems. (2009) (Thesis Committee Member)

     Seth James Nielson, Doctor of Philosophy Designing Incentives for Peer-to-Peer Systems. (2010) (Thesis Director)

     Ersin Oksuzoglu, Master of Science VoteBox Nano: A Smaller, Stronger FPGA-based Voting Machine. (2010) (Thesis Director)

     Scott Alexander Crosby, Doctor of Philosophy Efficient Tamper-Evident Data Structures for Untrusted Servers. (2010) (Thesis Director)

     Michael Dietz, Master of Science QUIRE: Lightweight Provenance for Smart Phone Operating Systems. (2011) (Thesis Director)

     Judson Dressler, PhD Analyzing the Use of Cyber in Warfare at the Strategic, Operational and Tactical. (2015) (Thesis Director)

     Theodore Book, PhD Privacy Concerns in Android Advertising Libraries. (2016) (Thesis Director)

    Awards, Prizes, & Fellowships
     Microsoft Faculty Research Award, Microsoft

     Best Paper Award (Natural Language Processing and Knowledge Engineering),

     National Centers of Academic Excellence in Information Assurance Research (CAE-R), (2011)

     2010 Best Paper Award (Financial Cryptography), (2010)

     2009 Google Research Award, Google Research (2009)

     2008 Defense Science Study Group (DSSG), class of 2008-2009, Defense Science Study Group (DSSG) (2008)

     2008 VoteRescue "Champion of Election Integrity" Award, VoteRescue (2008)

     2008 Kavli Frontiers of Science Fellow, Kavli Frontiers of Science Fellow (2008)

     Top 40 Under 40, ComputerWorld, ComputerWorld (2007)

     Program Committee Chair, Usenix Security Symposium 2001 (2001)

     Program Committee, Usenix Annual Conference 2001: Network and Distributed Systems Security Symposium (2002)

     Program Committee, ACM Role-Based Access Control Workshop 4 and 5 (2001)

     Program Committee, Usenix Security Symposium (2001)

     Program Committee, IEEE Workshop on Mobile Computing Systems and Applications (2002)

     Program Commmittee, Usenix Annual Conference 2001 (2000)

     Program Committee, ACM Role-Based Access Control Workshop 5 (2000)

     Program Committee, WWW9 (2000)

     Program Committee, Usenix Security Symposium 2000 (2000)

     Chair, Program Committee, Usenix Security Symposium 2001 (2000)

     Program Committee, Usenix Security Symposium 2000 (1999)

     Program Committee, WWW9 (1999)

    Positions Held
     Program Committee Chair, USENIX Journal of Election Technology and Systems (JETS). (2013 - 2013)

     Program Committee, Network and Distributed systems Security symposium. (2002 - 2002)

     Program Committee, IEEE Workshop on Mobile Computing Systems and Applications. (2002 - 2002)

     Program Committee, Usenix Symposium on Internet Technologies and systems. (2002 - 2002)

     Program Committee, HotOS Workshop. (2002 - 2002)

     Program Committee, NSF Trusted Computing Panel. (2002 - 2002)

     Invited Talks Coordinator, Usenix Security symposium. (2002 - 2002)