J. Alex Halderman
#18,224
Most Influential Person Now
American computer scientist
J. Alex Halderman's AcademicInfluence.com Rankings
J. Alex Haldermancriminal-justice Degrees
Criminal Justice
#83
World Rank
#97
Historical Rank
#42
USA Rank
Cyber Security
#20
World Rank
#22
Historical Rank
#8
USA Rank
J. Alex Haldermancomputer-science Degrees
Computer Science
#1488
World Rank
#1541
Historical Rank
#732
USA Rank
Cybersecurity
#15
World Rank
#16
Historical Rank
#8
USA Rank
Database
#1471
World Rank
#1546
Historical Rank
#387
USA Rank
Download Badge
Criminal Justice Computer Science
J. Alex Halderman's Degrees
- PhD Computer Science Princeton University
- Masters Computer Science Princeton University
- Bachelors Computer Science Georgia Tech
Similar Degrees You Can Earn
Why Is J. Alex Halderman Influential?
(Suggest an Edit or Addition)According to Wikipedia, J. Alex Halderman is professor of computer science and engineering at the University of Michigan, where he is also director of the Center for Computer Security & Society. Halderman's research focuses on computer security and privacy, with an emphasis on problems that broadly impact society and public policy.
J. Alex Halderman's Published Works
Published Works
- Lest we remember: cold-boot attacks on encryption keys (2008) (1353)
- Understanding the Mirai Botnet (2017) (1303)
- A search engine for 3D models (2003) (1074)
- ZMap: Fast Internet-wide Scanning and Its Security Applications (2013) (665)
- The Matter of Heartbleed (2014) (622)
- Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice (2015) (425)
- Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices (2012) (412)
- A Search Engine Backed by Internet-Wide Scanning (2015) (370)
- Analysis of the HTTPS certificate ecosystem (2013) (300)
- Security Analysis of the Estonian Internet Voting System (2014) (246)
- A convenient method for securely managing passwords (2005) (239)
- Elliptic Curve Cryptography in Practice (2014) (227)
- Security Analysis of the Diebold AccuVote-TS Voting Machine (2007) (205)
- Security analysis of India's electronic voting machines (2010) (197)
- New client puzzle outsourcing techniques for DoS resistance (2004) (192)
- Telex: Anticensorship in the Network Infrastructure (2011) (179)
- Internet Censorship in China: Where Does the Filtering Occur? (2011) (179)
- Internet Censorship in Iran: A First Look (2013) (165)
- DROWN: Breaking TLS Using SSLv2 (2016) (153)
- An Internet-Wide View of Internet-Wide Scanning (2014) (153)
- Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs (2010) (143)
- The Security Impact of HTTPS Interception (2017) (136)
- Green Lights Forever: Analyzing the Security of Traffic Infrastructure (2014) (136)
- Attacking the Washington, D.C. Internet Voting System (2012) (124)
- Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security (2015) (110)
- Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage (2009) (105)
- Fingerprinting Blank Paper Using Commodity Scanners (2009) (100)
- The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election (2015) (94)
- Towards a Complete View of the Certificate Ecosystem (2016) (77)
- Early experiences with a 3D model search engine (2003) (77)
- Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web (2019) (74)
- An Internet-wide view of ICS devices (2016) (73)
- TapDance: End-to-Middle Anticensorship without Flow Blocking (2014) (72)
- Tracking Certificate Misissuance in the Wild (2018) (60)
- Public Evidence from Secret Ballots (2017) (58)
- Sketcha: a captcha based on line drawings of 3D models (2010) (53)
- Zippier ZMap: Internet-Wide Scanning at 10 Gbps (2014) (52)
- Security Challenges in an Increasingly Tangled Web (2017) (50)
- Lessons from the Sony CD DRM Episode (2006) (49)
- Android UI Deception Revisited: Attacks and Defenses (2016) (47)
- CAge: Taming Certificate Authorities by Inferring Restricted Scopes (2013) (46)
- Quack: Scalable Remote Measurement of Application-Layer Censorship (2018) (45)
- Source Code Review of the Diebold Voting System (2007) (44)
- Crawling BitTorrent DHTs for Fun and Profit (2010) (40)
- Digital rights management, spyware, and security (2006) (37)
- Privacy management for portable recording devices (2004) (33)
- Illuminating the Security Issues Surrounding Lights-Out Server Management (2013) (30)
- Can Voters Detect Malicious Manipulation of Ballot Marking Devices? (2020) (30)
- Measuring small subgroup attacks against Diffie-Hellman (2017) (30)
- Evaluating New Copy-Prevention Techniques for Audio CDs (2002) (30)
- 403 Forbidden: A Global View of CDN Geoblocking (2018) (30)
- Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing Security (2014) (29)
- Measuring the Security Harm of TLS Crypto Shortcuts (2016) (29)
- Investigating Large Scale HTTPS Interception in Kazakhstan (2020) (23)
- FTP: The Forgotten Cloud (2016) (22)
- An ISP-Scale Deployment of TapDance (2018) (21)
- Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits (2018) (20)
- Security Analysis of a Full-Body Scanner (2014) (20)
- Harvesting verifiable challenges from oblivious online sources (2007) (19)
- Named Data Networking Next Phase (NDN-NP) Project May 2014 - April 2015 Annual Report (2015) (19)
- Practical Attacks on Real-World E-Voting (2016) (16)
- In Defense of Pseudorandom Sample Selection (2008) (15)
- Content-based security for the web (2016) (14)
- Security Analysis of the Democracy Live Online Voting System (2021) (13)
- Initial measurements of the cuban street network (2017) (13)
- You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems (2008) (13)
- Conjure: Summoning Proxies from Unused Address Space (2019) (12)
- On the Usability of HTTPS Deployment (2019) (11)
- U.S. Senate Select Committee on Intelligence (2017) (10)
- To Strengthen Security, Change Developers' Incentives (2010) (10)
- Characterizing Transnational Internet Performance and the Great Bottleneck of China (2020) (9)
- Imperfect forward secrecy (2018) (9)
- Ethical Issues in E-Voting Security Analysis (2011) (9)
- Analysis of the MediaMax CD3 Copy-Prevention System (8)
- Running Refraction Networking for Real (2020) (8)
- OpenVPN is Open to VPN Fingerprinting (2022) (6)
- Replication Prohibited: Attacking Restricted Keyways with 3D-Printing (2015) (4)
- Characterizing Transnational Internet Performance and the Great Bottleneck of China (2020) (3)
- UnclearBallot: Automated Ballot Image Manipulation (2019) (3)
- Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration Tools (2011) (2)
- Tales From the Crypto Community (2013) (1)
- Challenges in cybersecurity: Lessons from biological defense systems (2021) (1)
- A security analysis of police computer systems (2016) (1)
- Conjure (2019) (1)
- Analysis of the Antrim County, Michigan, November 2020 Election Incident (2021) (1)
- The Antrim County 2020 Election Incident: An Independent Forensic Investigation (2022) (1)
- Provable Secured Hash Password Authentication (2017) (0)
- Session details: Attacks on secure hardware (2010) (0)
- Improving the Accuracy of Ballot Scanners Using Supervised Learning (2021) (0)
- Securing Early Software Development (2012) (0)
- Internet Voting: What Could Go Wrong? (2016) (0)
- Session details: Device security (2008) (0)
- SECURITY STORAGE SYSTEM FOR CLOUD USER USING OSD WITH A SELF-DESTRUCTING DATA (2014) (0)
- Improved Method for Election Auditing (2011) (0)
- Thesis title: Security Failures in Nontraditional Computing Environments (2008) (0)
- Umbra: Embedded Web Security Through Application-Layer Firewalls (2015) (0)
- Embedded and Real-time Systems (2019) (0)
- RemoteVote and SAFE Vote: Towards Usable End-to-End Verification for Vote-by-Mail (2021) (0)
- Session details: Attacks II (2009) (0)
- Implementing Attestable kiosks (2016) (0)
- 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, EVT/WOTE '12, Bellevue, WA, USA, August 6-7, 2012 (2012) (0)
- Logic and Accuracy Testing: A Fifty-State Review (2022) (0)
- Characterizing Transnational Internet Performance and the Great Bottleneck of China (2020) (0)
- Proceedings of the 2012 international conference on Electronic Voting Technology/Workshop on Trustworthy Elections (2012) (0)
This paper list is powered by the following services:
Other Resources About J. Alex Halderman
What Schools Are Affiliated With J. Alex Halderman?
J. Alex Halderman is affiliated with the following schools: