David A. Wagner
#11,710
Most Influential Person Now
American computer scientist
David A. Wagner's AcademicInfluence.com Rankings
David A. Wagnercomputer-science Degrees
Computer Science
#760
World Rank
#783
Historical Rank
#409
USA Rank
Database
#457
World Rank
#479
Historical Rank
#190
USA Rank
Download Badge
Computer Science
David A. Wagner's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Computer Science Stanford University
Similar Degrees You Can Earn
Why Is David A. Wagner Influential?
(Suggest an Edit or Addition)According to Wikipedia, David A. Wagner is a professor of computer science at the University of California, Berkeley and a well-known researcher in cryptography and computer security. He is a member of the Election Assistance Commission's Technical Guidelines Development Committee, tasked with assisting the EAC in drafting the Voluntary Voting System Guidelines. He is also a member of the ACCURATE project.
David A. Wagner's Published Works
Published Works
- Towards Evaluating the Robustness of Neural Networks (2016) (5940)
- Practical techniques for searches on encrypted data (2000) (3550)
- Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples (2018) (2499)
- TinySec: a link layer security architecture for wireless sensor networks (2004) (1907)
- Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods (2017) (1522)
- Android permissions demystified (2011) (1476)
- Intercepting mobile communications: the insecurity of 802.11 (2001) (1099)
- Android permissions: user attention, comprehension, and behavior (2012) (1085)
- Analyzing inter-application communication in Android (2011) (882)
- Private Circuits: Securing Hardware against Probing Attacks (2003) (874)
- Audio Adversarial Examples: Targeted Attacks on Speech-to-Text (2018) (872)
- A survey of mobile malware in the wild (2011) (861)
- Privacy and security in library RFID: issues, practices, and architectures (2004) (781)
- Mimicry attacks on host-based intrusion detection systems (2002) (774)
- Intrusion detection via static analysis (2001) (771)
- Secure verification of location claims (2003) (771)
- A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities (2000) (735)
- Security in wireless sensor networks (2004) (629)
- A Generalized Birthday Problem (2002) (620)
- The Boomerang Attack (1999) (602)
- Timing Analysis of Keystrokes and Timing Attacks on SSH (2001) (576)
- Real Time Cryptanalysis of A5/1 on a PC (2000) (541)
- Hidden Voice Commands (2016) (514)
- Tweakable Block Ciphers (2002) (509)
- Analysis of the SSL 3.0 protocol (1996) (503)
- A secure environment for untrusted helper applications confining the Wily Hacker (1996) (500)
- Homomorphic Signature Schemes (2002) (480)
- Improved Cryptanalysis of Rijndael (2000) (470)
- Side Channel Cryptanalysis of Product Ciphers (1998) (457)
- MOPS: an infrastructure for examining security properties of software (2002) (450)
- Detecting Format String Vulnerabilities with Type Qualifiers (2001) (442)
- Resilient aggregation in sensor networks (2004) (441)
- Integral Cryptanalysis (2002) (419)
- Security and Privacy Issues in E-passports (2005) (372)
- Measuring user confidence in smartphone security and privacy (2012) (370)
- Security considerations for IEEE 802.15.4 networks (2004) (362)
- Control-Flow Bending: On the Effectiveness of Control-Flow Integrity (2015) (356)
- Slide Attacks (1999) (348)
- A Secure Environment for Untrusted Helper Applications (1996) (334)
- ROP is Still Dangerous: Breaking Modern Defenses (2014) (331)
- The Effectiveness of Application Permissions (2011) (317)
- A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags (2005) (312)
- AdDroid: privilege separation for applications and advertisers in Android (2012) (311)
- Defensive Distillation is Not Robust to Adversarial Examples (2016) (298)
- I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns (2012) (291)
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES (1996) (282)
- Cryptanalytic Attacks on Pseudorandom Number Generators (1998) (276)
- Advanced Slide Attacks (2000) (271)
- Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA (1997) (260)
- The EAX Mode of Operation (2004) (257)
- Privacy-enhancing technologies for the Internet (1997) (237)
- Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs (2009) (233)
- The Twofish encryption algorithm: a 128-bit block cipher (1999) (227)
- Towards Efficient Second-Order Power Analysis (2004) (226)
- Smart Locks: Lessons for Securing Commodity Internet of Things Devices (2016) (222)
- MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples (2017) (211)
- The Performance Cost of Shadow Stacks and Stack Canaries (2015) (203)
- Security flaws in 802.11 data link protocols (2003) (198)
- The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks (2005) (196)
- Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption (2000) (186)
- Model Checking One Million Lines of C Code (2004) (179)
- Android Permissions Remystified: A Field Study on Contextual Integrity (2015) (176)
- Private Circuits II: Keeping Secrets in Tamperable Circuits (2006) (173)
- Algebraic and Slide Attacks on KeeLoq (2008) (164)
- Protocol Interactions and the Chosen Protocol Attack (1997) (162)
- Are You Ready to Lock? (2014) (156)
- Cryptographic Voting Protocols: A Systems Perspective (2005) (155)
- Choice Architecture and Smartphone Privacy: There's a Price for That (2012) (152)
- Dynamic pharming attacks and locked same-origin policies for web browsers (2007) (151)
- Finding User/Kernel Pointer Bugs with Type Inference (2004) (145)
- How to Ask for Permission (2012) (135)
- SLIP: Self-supervision meets Language-Image Pre-training (2021) (133)
- Analyzing internet voting security (2004) (131)
- Defeating UCI: Building Stealthy and Malicious Hardware (2011) (125)
- An Empirical Study of Vulnerability Rewards Programs (2013) (124)
- The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences (2017) (121)
- Secure Applications of Low-Entropy Keys (1997) (121)
- Performance Comparison of the AES Submissions (1999) (115)
- Privacy Attitudes of Smart Speaker Users (2019) (112)
- Joe-E: A Security-Oriented Subset of Java (2010) (110)
- An Evaluation of the Google Chrome Extension Security Architecture (2012) (103)
- Cryptanalysis of an Algebraic Privacy Homomorphism (2003) (103)
- Setuid Demystified (2002) (98)
- Related-Key Cryptanalysis of 3-WAY (1997) (98)
- Cryptanalysis of a provably secure CRT-RSA algorithm (2004) (97)
- Building PRFs from PRPs (1998) (93)
- Hidden Markov Model Cryptanalysis (2003) (89)
- Mod n Cryptanalysis, with Applications Against RC5P and M6 (1999) (86)
- Efficient character-level taint tracking for Java (2009) (80)
- TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web (1998) (77)
- Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract) (2007) (77)
- Bifocals: Analyzing WebView Vulnerabilities in Android Applications (2013) (76)
- Reducing attack surfaces for intra-application communication in android (2012) (75)
- Model checking an entire Linux distribution for security violations (2005) (71)
- Truncated Differentials and Skipjack (1999) (69)
- Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2) (1999) (67)
- Conditioned-safe ceremonies and a user study of an application to web authentication (2009) (67)
- An Empirical Study on the Effectiveness of Security Code Review (2013) (66)
- The effect of developer-specified explanations for permission requests on smartphone user behavior (2014) (66)
- Stateful Detection of Black-Box Adversarial Attacks (2019) (64)
- Detecting Credential Spearphishing in Enterprise Settings (2017) (63)
- Risks of e-voting (2007) (63)
- Tamper-evident, history-independent, subliminal-free data structures on PROM storage -or- how to store ballots on a voting machine (2006) (60)
- Detecting and Characterizing Lateral Phishing at Scale (2019) (59)
- Do Android users write about electric sheep? Examining consumer reviews in Google Play (2013) (57)
- Privacy for RFID through trusted computing (2005) (56)
- Portably Solving File TOCTTOU Races with Hardness Amplification (2008) (55)
- Contextualizing Privacy Decisions for Better Prediction (and Protection) (2018) (55)
- Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights (2015) (53)
- Verifiable functional purity in java (2008) (53)
- Catchconv : Symbolic execution and run-time type inference for integer conversion errors (2007) (52)
- Cryptanalysis of a Cognitive Authentication Scheme (2006) (49)
- Evidence-Based Elections (2012) (48)
- Large-scale analysis of format string vulnerabilities in Debian Linux (2007) (47)
- A Critique of CCM (2003) (46)
- EAX: A Conventional Authenticated-Encryption Mode (2003) (46)
- Multiplicative Differentials (2002) (46)
- On the Robustness of Deep K-Nearest Neighbors (2019) (46)
- Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers (2017) (44)
- From Weak to Strong Watermarking (2007) (43)
- Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences (2017) (43)
- Cryptanalysis of ORYX (1998) (42)
- Adversarially Robust Malware Detection Using Monotonic Classification (2018) (41)
- Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors (2014) (40)
- Fine-grained privilege separation for web applications (2010) (40)
- Cryptanalysis of the Cellular Encryption Algorithm (1997) (39)
- Minority Reports Defense: Defending Against Adversarial Patches (2020) (38)
- Cryptanalysis of the cellular message encryption algorithm (1997) (38)
- Information Disclosure Concerns in The Age of Wearable Computing (2016) (38)
- A Usability Evaluation of Tor Launcher (2017) (37)
- Short paper: location privacy: user behavior in the field (2012) (37)
- Prerendered User Interfaces for Higher-Assurance Electronic Voting (2006) (37)
- When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources (2013) (37)
- Improving Adversarial Robustness Through Progressive Hardening (2020) (36)
- Towards a Unifying View of Block Cipher Cryptanalysis (2004) (35)
- A Graph Approach to Quantitative Analysis of Control-Flow Obfuscating Transformations (2009) (34)
- The EAX Mode of Operation (A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency) (2004) (33)
- Clipped BagNet: Defending Against Sticker Attacks with Clipped Bag-of-features (2020) (32)
- Security considerations for incremental hash functions based on pair block chaining (2006) (32)
- Proofs of Security for the Unix Password Hashing Algorithm (2000) (31)
- A Conventional Authenticated-Encryption Mode (2003) (30)
- A Cryptanalysis of the High-Bandwidth Digital Content Protection System (2001) (30)
- On the Structure of Skipjack (2001) (29)
- Building reliable voting machine software (2007) (29)
- On voting machine design for verification and testability (2009) (26)
- Fault attacks on dual-rail encoded systems (2005) (25)
- Defending Against Adversarial Examples with K-Nearest Neighbor (2019) (24)
- A Large-Scale Study of Modern Code Review and Security in Open Source Projects (2017) (24)
- Diesel: applying privilege separation to database access (2011) (23)
- Integral Cryptanalysis (Extended abstract) (2002) (23)
- On the Twofish Key Schedule (1998) (23)
- Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation (1998) (23)
- Proceedings of the 20th USENIX conference on Security (2011) (23)
- Architectural considerations for cryptanalytic hardware (1997) (22)
- Detecting Credential Spearphishing Attacks in Enterprise Settings (2017) (22)
- The Ninja Jukebox (1999) (21)
- Towards a privacy measurement criterion for voting systems (2005) (20)
- Verifying security properties in electronic voting machines (2007) (20)
- Radio Frequency Identification and Privacy with Information Goods (2004) (18)
- Generic On-Line/Off-Line Threshold Signatures (2006) (18)
- Attestation Transparency: Building secure Internet services for legacy clients (2016) (18)
- SAT (2021) (17)
- Background Class Defense Against Adversarial Examples (2018) (16)
- Markov Truncated Differential Cryptanalysis of Skipjack (2002) (16)
- Static Analysis and Software Assurance (2001) (16)
- Radio frequency Id and privacy with information goods (2004) (15)
- The Murky Issue of Changing Process Identity: Revising "Setuid Demystified" (2008) (15)
- Risk Perceptions for Wearable Devices (2015) (15)
- Replayable Voting Machine Audit Logs (2008) (14)
- Breaking active-set backward-edge CFI (2017) (14)
- On Compressing Encrypted Data without the Encryption Key (2004) (14)
- Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks (2021) (13)
- Defending against Adversarial Patches with Robust Self-Attention (2021) (13)
- You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems (2008) (13)
- SAT: Improving Adversarial Training via Curriculum-Based Loss Smoothing (2020) (12)
- A "bump in the stack" encryptor for MS-DOS systems (1996) (12)
- Security of the WEP algorithm (Wired Equivalent Privacy) (2002) (12)
- Portably solving file races with hardness amplification (2008) (11)
- Class properties for security review in an object-capability subset of Java: (short paper) (2010) (10)
- Cryptanalysis of FROG (1998) (10)
- Comments on Twofish as an AES Candidate (2000) (10)
- Learning Security Classifiers with Verified Global Robustness Properties (2021) (9)
- Efficient User-Guided Ballot Image Verification (2010) (9)
- Minimum-Norm Adversarial Examples on KNN and KNN based Models (2020) (9)
- Privacy controls for always-listening devices (2019) (8)
- SEAT: Similarity Encoder by Adversarial Training for Detecting Model Extraction Attack Queries (2021) (8)
- Human factors in web authentication (2009) (8)
- Object capabilities for security (2006) (8)
- E-ABS: Extending the Analysis-By-Synthesis Robust Classification Model to More Complex Image Domains (2020) (8)
- A User Study Design for Comparing the Security of Registration Protocols (2008) (7)
- Cryptanalysis of TWOPRIME (1998) (7)
- Tor’s Usability for Censorship Circumvention (2015) (7)
- Automated Analysis of Election Audit Logs (2012) (7)
- Operator-Assisted Tabulation of Optical Scan Ballots (2012) (6)
- A Note on NSA's Dual Counter Mode of Encryption (2001) (6)
- Demystifying the Adversarial Robustness of Random Transformation Defenses (2022) (6)
- Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for Auditing (2009) (6)
- Detecting Phone Theft Using Machine Learning (2018) (6)
- Verification with small and short worlds (2012) (6)
- Cryptanalysis of the Yi-Lam Hash (2000) (6)
- Lightweight model checking for improving software security (2004) (5)
- TinySec: Security for TinyOS (2002) (5)
- Model-Agnostic Defense for Lane Detection against Adversarial Attack (2021) (5)
- An Analysis of Write-in Marks on Optical Scan Ballots (2011) (5)
- Symbolic software model validation (2013) (5)
- TAZ servers and the rewebber network (1998) (5)
- Cryptanalysis of SPEED (1998) (5)
- Improved Support for Machine-assisted Ballot-level Audits (2013) (4)
- A Programmable Plaintext Recognizer (1994) (4)
- Efficient filtering support for high-speed network intrusion detection (2005) (4)
- Spoofing 2D Face Detection: Machines See People Who Aren't There (2016) (4)
- Preventing Secret Leakage from fork(): Securing Privilege-Separated Applications (2006) (4)
- Technical Perspective: Fairness and the coin flip (2016) (4)
- Dynamically Regulating Mobile Application Permissions (2018) (4)
- Dynamic test generation for large binary programs (2009) (4)
- Hopper: Modeling and Detecting Lateral Movement (2021) (4)
- Security Weaknesses in a Randomized Stream Cipher (2000) (3)
- Side Channel Cryptanalysis of Produ t (1998) (3)
- Relating cryptography and cryptographic protocols (2001) (3)
- Further Observations on the Key Schedule of Twosh (1999) (3)
- Verifying security properties using type-qualifier inference (2006) (3)
- Securing Recognizers for Rich Video Applications (2016) (3)
- Cryptographic Protocols for Electronic Voting (2006) (3)
- Bridging the gap between people and policies in security and privacy (2006) (2)
- Differential Cryptanalysis of KHF (1998) (2)
- Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams (2020) (2)
- The EAX mode of operation - eScholarship (2004) (2)
- Part-Based Models Improve Adversarial Robustness (2022) (2)
- Improving the Accuracy-Robustness Trade-Off for Dual-Domain Adversarial Training (2021) (2)
- An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography (2005) (2)
- REAP: A Large-Scale Realistic Adversarial Patch Benchmark (2022) (1)
- New Results on the Two sh Encryption Algorithm (1999) (1)
- Security and Machine Learning (2017) (1)
- Inferring Phone Location State (2018) (1)
- Tweakable block ciphers - eScholarship (2002) (1)
- A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts (2020) (1)
- Generic on-line/off-line threshold signatures - eScholarship (2006) (1)
- Hopper: Modeling and Detecting Lateral Movement (Extended Report) (2021) (1)
- Randomness and the Netscape Browser January 1996 (2009) (1)
- Re: RIN 1400-AB93 Electronic Passport (2005) (0)
- MITIGATING ADVERSARIAL TRAINING INSTABILITY (2021) (0)
- An Evaluation of the Security of CipherUnicorn-E Against Certain Attacks (2003) (0)
- Recovering High-Value Secrets with SGX and Social Authentication (2016) (0)
- Dynamically Regulating Mobile Application Permissions Primal (2017) (0)
- Symmetric-Key Cryptography CS 161 : Computer Security Prof (2014) (0)
- Symmetric-Key Cryptography 1 Overview (2019) (0)
- Homomorphi Signature S (2002) (0)
- Opening Remarks, Awards, and Keynote Address (2011) (0)
- Fault Tolerance Middleware for a Multi-Core System (2012) (0)
- Exploring Notice and Choice: Design Guidelines for a User-Centered Permission Model for Personalized Services (2013) (0)
- Pushdown Model Checking for Security (2005) (0)
- Security Weaknesses in Maurer-Like Randomized Stream Ciphers (2000) (0)
- CS 161 Computer Security 2 / 21 Symmetric-Key Cryptography 1 Overview (0)
- Analysis of the Russian Presidential Election 2012 Using Experiments (2013) (0)
- THIRD ADVANCED ENCRYPTION STANDARD CANDIDATE (2001) (0)
- Complexity of Uid-setting System Calls (2007) (0)
- Cool security trends (2002) (0)
- On-line / Off-line Threshold Signatures Without Trusted Dealers (2005) (0)
- SEAT (2021) (0)
- Towards Characterizing Model Extraction Queries and How to Detect Them (2021) (0)
- DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection (2023) (0)
- Towards Evaluating and Understanding the Adversarial Robustness of Random Transformation Defenses (2021) (0)
- Cryptanalysis, with Applications Against RC5P and M6 (1999) (0)
- Diierential Cryptanalysis of Khf (0)
- On the Two sh Key Schedule (1998) (0)
- Published at ICLR 2021 Workshop on Security and Safety in Machine Learning Systems (2021) (0)
- Paxson Spring 2013 CS 161 Computer Security 3 / 12 Symmetric-Key Cryptography (0)
- Continuous Learning for Android Malware Detection (2023) (0)
- Can Humans Detect Malicious Always-Listening Assistants? A Framework for Crowdsourcing Test Drives (2022) (0)
This paper list is powered by the following services:
Other Resources About David A. Wagner
What Schools Are Affiliated With David A. Wagner?
David A. Wagner is affiliated with the following schools: