Simson Garfinkel
American academic and journalist
Simson Garfinkel's AcademicInfluence.com Rankings
Download Badge
Computer Science Physics
Simson Garfinkel's Degrees
- Bachelors Physics Columbia University
Why Is Simson Garfinkel Influential?
(Suggest an Edit or Addition)According to Wikipedia, Simson L. Garfinkel is the Chief Scientist of BasisTech, LLC in Somerville, Ma . He was previously a Program Scientist at AI2050, part of Schmidt Futures He has held several roles across government, including a Senior Data Scientist at the Department of Homeland Security , the US Census Bureau's Senior Computer Scientist for Confidentiality and Data Access. and a computer scientist at the National Institute of Standards and Technology . Prior to that, he was an associate professor at the Naval Postgraduate School in Monterey, California . In addition to his research, Garfinkel is a journalist, an entrepreneur, and an inventor; his work is generally concerned with computer security, privacy, and information technology.
Simson Garfinkel's Published Works
Published Works
- Digital forensics research: The next 10 years (2010) (628)
- Do security toolbars actually prevent phishing attacks? (2006) (621)
- Security and Usability: Designing Secure Systems that People Can Use (2005) (554)
- RFID privacy: an overview of problems and proposed solutions (2005) (548)
- Amazon S3 for science grids: a viable solution? (2008) (475)
- PGP: Pretty Good Privacy (1994) (449)
- Bringing science to digital forensics with standardized forensic corpora (2009) (371)
- An Evaluation of Amazon's Grid Computing Services: EC2, S3, and SQS (2007) (343)
- RFID: Applications, Security, and Privacy (2005) (269)
- Practical UNIX and Internet Security (1996) (251)
- Remembrance of Data Passed: A Study of Disk Sanitization Practices (2003) (239)
- Carving contiguous and fragmented files with fast object validation (2007) (238)
- Johnny 2: a user test of key continuity management with S/MIME and Outlook Express (2005) (212)
- Security and Usability (2005) (209)
- Comparing the Usability of Cryptographic APIs (2017) (177)
- Email-Based Identification and Authentication: An Alternative to PKI? (2003) (152)
- Practical UNIX Security (1991) (142)
- Forensic feature extraction and cross-drive analysis (2006) (136)
- Anti-Forensics: Techniques, Detection and Countermeasures (2007) (129)
- Secure Web Authentication with Mobile Phones (2004) (127)
- Usable Security: History, Themes, and Challenges (2014) (124)
- Design principles and patterns for computer systems that are simultaneously secure and usable (2005) (121)
- De-Identification of Personal Information (2015) (121)
- Digital media triage with bulk data analysis and bulk_extractor (2013) (119)
- Automating Disk Forensic Processing with SleuthKit, XML and Python (2009) (119)
- Issues in Automatic Provenance Collection (2006) (104)
- How to make secure email easier to use (2005) (103)
- Web Security, Privacy and Commerce (2001) (100)
- Digital forensics XML and the DFXML toolset (2012) (97)
- Using purpose-built functions and block hashes to enable small block and sub-file forensics (2010) (93)
- Evaluating Intrusion Detection Systems Without Attacking Your Friends: The 1998 DARPA Intrusion Detection Evaluation (1999) (89)
- Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow (2009) (84)
- Web security & commerce (1997) (82)
- Stopping Spam (1998) (78)
- Issues Encountered Deploying Differential Privacy (2018) (76)
- File Fragment Classification-The Case for Specialized Approaches (2009) (74)
- Database Nation (2000) (72)
- Commodity Grid Computing with Amazon's S3 and EC2 (2007) (63)
- Toward algorithmic transparency and accountability (2017) (62)
- A general strategy for differential forensic analysis (2012) (58)
- Lessons learned writing digital forensics tools and managing a 30TB digital evidence corpus (2012) (57)
- Forensic carving of network packets and associated data structures (2011) (56)
- Understanding Database Reconstruction Attacks on Public Data (2018) (55)
- Practical UNIX and internet security (2. ed.) (1996) (53)
- Web Security, Privacy & Commerce (2001) (53)
- Guest Editors' Introduction: Secure or Usable? (2004) (53)
- Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb (2015) (51)
- Distinct Sector Hashes for Target File Detection (2012) (51)
- The 1998 DARPA/AFRL Off-line Intrusion Detection Evaluation (1998) (51)
- Architects of the Information Society: 35 Years of the Laboratory for Computer Science at Mit (1999) (44)
- Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools (2009) (42)
- The cybersecurity risk (2012) (40)
- Practical Unix & Internet Security, 3rd Edition (2003) (39)
- Advanced Forensic Format: An Open, Extensible Format for Disk Imaging (2006) (37)
- AFF: a new format for storing hard drive images (2006) (36)
- Enabling Email Confidentiality through the use of Opportunistic Encryption (2003) (34)
- New XML-Based Files Implications for Forensics (2009) (31)
- Disk Imaging with the Advanced Forensic Format , Library and Tools (2006) (31)
- Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus (2011) (31)
- Architects of the Information Society: Thirty-Five Years of the Laboratory for Computer Science at MIT (1999) (29)
- IRBs and Security Research: Myths, Facts and Mission Creep (2008) (28)
- VoIP and Skype Security (2005) (27)
- Creating Realistic Corpora for Security and Forensic Education (2011) (27)
- Census TopDown: Differentially Private Data, Incremental Schemas, and Consistency with Public Knowledge (2019) (27)
- Public key cryptography (1996) (26)
- Leaderless resistance today (2003) (25)
- Extending digital repository architectures to support disk image preservation and access (2011) (23)
- Bitfrost: the one laptop per child security model (2007) (23)
- Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage (2008) (22)
- Finding and Archiving the Internet Footprint (2009) (20)
- Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce (2005) (18)
- Creating Realistic Corpora for Forensic and Security Education (2011) (17)
- Unix Power Tools (1993) (17)
- Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers (2017) (16)
- Institutional review boards and your research (2010) (16)
- Secure and Usable Enterprise Authentication: Lessons from the Field (2016) (15)
- NeXTSTEP Programming: STEP ONE: Object-Oriented Applications (1992) (14)
- Privacy-Preserving IR 2016: Differential Privacy, Search, and Social Media (2016) (14)
- Understanding database reconstruction attacks on public data (2019) (14)
- UNIX System Security Tools (1999) (14)
- The Web's Unelected Government. (1998) (13)
- An Automated Solution to the Multiuser Carved Data Ascription Problem (2010) (13)
- Risks of social security numbers (1995) (13)
- Leaking Sensitive Information in Complex Document Files--and How to Prevent It (2014) (13)
- Fast Disk Analysis with Random Sampling (2010) (12)
- Column: Factors Affecting Data Decay (2012) (12)
- Guest Editors' Introduction: Data Surveillance (2006) (12)
- Randomness Concerns when Deploying Differential Privacy (2020) (11)
- Stopping spam - stamping out unwanted email and news postings (1998) (10)
- The Unix-Haters Handbook (1994) (9)
- The documents in the case (1999) (9)
- Picking up the trash: Exploiting generational GC for memory analysis (2017) (9)
- One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique (2006) (9)
- Present but Unreachable: Reducing Persistentlatent Secrets in HotSpot JVM (2017) (9)
- De-Identifying Government Datasets (2016) (8)
- Passive TCP Reconstruction and Forensic Analysis with tcpflow (2013) (8)
- Forensic Corpora: a Challenge for Forensic Research 1 Computer Forensics and Today's Forensic Tools (2007) (8)
- Programs to the people (1991) (8)
- PGP - pretty good privacy: encryption for everyone (2. ed.) (1995) (8)
- An Uncertainty Principle is a Price of Privacy-Preserving Microdata (2021) (7)
- WHY DRIVER PRIVACY MUST BE A PART OF ITS (1996) (7)
- Challenges in Monitoring Cyberarms Compliance (2011) (7)
- Be Prepared: How US Government Experts Think About Cybersecurity (2017) (6)
- First Workshop on Video Analytics in Public Safety | NIST (2017) (6)
- Privacy Protection and RFID (2006) (6)
- Law and Policy for the Quantum Age (2021) (6)
- Finding suspicious activity on computer systems (2012) (6)
- Why Patents Are Bad for Software 1 Patents can ’ t protect or invigorate the computer software industry (2010) (6)
- Building Cocoa applications - a step-by-step guide (2002) (6)
- IEEE Security & Privacy: Data Forensics - Rememberance of Data Passed: A Study of Disk Sanitization Practices (2003) (5)
- Information of the world, unite! (2008) (5)
- Why Patents Are Bad for Software Patents can ' t protect or invigorate the computer software (5)
- Institutional Review Boards and Your Research: A Proposal for Improving the Review Procedures for Research Projects that Involve Human Subjects and Their Associated Identifiable Private Information (2010) (5)
- A Survey of XOR as a Digital Obfuscation Technique in a Corpus of Real Data (2014) (5)
- Global Analysis of Drive File Times (2010) (5)
- Detecting threatening insiders with lightweight media forensics (2013) (5)
- De-Identifying Government Datasets (2nd Draft) (2016) (5)
- Document & Media Exploitation (2007) (4)
- Language translation for file paths (2013) (4)
- Pretty Good Privacy (PGP) (2009) (4)
- Cryptography and the Web (1997) (4)
- Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices (2013) (4)
- Trustworthy email (2019) (4)
- Organizational practices in cryptographic development and testing (2017) (4)
- Digital Forensics Innovation: Searching A Terabyte of Data in 10 minutes (2013) (4)
- Parallelizing SHA-256, SHA-1 and MD5 and AES on the Cell Broadband Engine (2010) (3)
- Complete delete vs. time machine computing (2007) (3)
- Privacy and Security Concerns When Social Scientists Work with Administrative and Operational Data (2018) (3)
- A comparative analysis of file carving software (2011) (3)
- bulk_extractor: A Stream-Based Forensics Tool (2011) (3)
- Disk Imaging (2019) (3)
- The Johnny 2 Standardized Secure Messaging Scenario (2005) (3)
- The One Laptop per Child Security Model (2007) (3)
- Patterns for Aligning Security and Usability (2005) (3)
- Proposal for Thesis Research in Partial Fulfillment Of the Requirements for the Degree of Doctor of Philosophy Title: Usable Security: Design Principles for Creating Systems that are Simultaneously Usable and Secure (2004) (3)
- Vewpoint Institutional Review Boards and Your Research (2010) (3)
- Differential Privacy and the 2020 US Census (2022) (3)
- Bulk Extractor 1.4 User's Manual (2013) (3)
- The Philosophy of Differential Privacy (2021) (3)
- The Expanding World of Digital Forensics (2015) (3)
- A Prime Patent (1995) (3)
- Database nation (book excerpts) (2000) (2)
- inside risks The Cybersecurity risk (2012) (2)
- Embedded with Facebook: DoD Faces Risks from Social Media (2011) (2)
- NIST Special Publication 800-177: Trustworthy Email (2016) (2)
- Digital signatures (1996) (2)
- Web security and commerce - risks, technologies, and strategies (1997) (2)
- Bezpečnost v UNIXu a Internetu v praxi : počítačová ochrana. (1998) (1)
- Operations with Degraded Security (2011) (1)
- Method for determining hard drive contents through statistical drive sampling / U. S. Patents (2013) (1)
- Is there a future in privacy: encryption and digital signatures (1996) (1)
- Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus (2014) (1)
- RFID Security and Privacy (2005) (1)
- Document and media exploitation (2007) (1)
- Column: Every Last Byte (2011) (1)
- A Peek at Proprietary Algorithms (2017) (1)
- Forensics Visualizations with Open Source Tools (2013) (1)
- Implementing AES on the CellBE (2009) (1)
- Measuring Systematic and Random Error in Digital Forensics | NIST (2015) (1)
- Invisible HCI-SEC: ways of re-architecting the operating system to increase usability and security (2009) (1)
- The Prevalence of Encoded Digital Trace Evidence in the Nonfile Space of Computer Media*†‡ (2014) (1)
- Can We Sniff Wi-Fi?: Implications of Joffe v. Google (2014) (1)
- ACM TechBrief: Quantum Computing and Simulation (2022) (1)
- Programming Unicode (2012) (1)
- Computer Forensics: Technology, Policy and Countermeasures (2007) (1)
- ENTER THE DRAGON (1998) (1)
- AFF: An Open Extensible Format for Disk Imaging (2006) (1)
- Secure CGI/API programming (1997) (1)
- TR-08-07 : An Evaluation of Amazon ’ s Grid Computing Services : EC 2 (2007) (1)
- Finding privacy leaks and stolen data with bulk data analysis and optimistic decoding (2013) (0)
- Beyond IRBs: Designing Ethical Review Processes for Big Data Research | NIST (2017) (0)
- Usable Security (2014) (0)
- Methods for Creating Realistic Disk Images for Forensics Tool Testing and Education (2009) (0)
- Creating an Application Without Interface Builder (1993) (0)
- TCP analysis with tcpflow; packet carving with bulk_extractor (2013) (0)
- Saving, Loading, and Printing (1993) (0)
- In Memoriam: Edmund M. Clarke (1945–2020) (2021) (0)
- Challenges to Consensus and Consistency in DF Education (2014) (0)
- Draw Yourself: All About NeXTSTEP Views (1993) (0)
- Steps towards Monitoring Cyberarms Compliance (2011) (0)
- Delegation and Resizing (1993) (0)
- Aligning Security with Usability (2009) (0)
- Bulk Data Analysis With Optimistic Decompression and Sector Hashing (2013) (0)
- Rigor in Experimentation (2017) (0)
- Zooming and Saving Graphics Files (1993) (0)
- DIGITAL & MULTIMEDIA SCIENCES (2014) (0)
- FOUNTAIN OF IDEAS (1999) (0)
- Document Media (2007) (0)
- Spawning Multiple Processes and the Text Object (1993) (0)
- Events and Responders (1993) (0)
- Introduction to the NeXTSTEP Graphical User Interface (1993) (0)
- Naval Postgraduate School - Cyber Summit (2009) (0)
- Automated Digital Forensics and Media Exploitation : NPS Cybersecurity Seminar 1 of 5, with Prof. Simson Garfinkel [video] (2009) (0)
- Jack Minker (1927---2021) (2021) (0)
- The Cyber Security Mess (2013) (0)
- Using Distinct Sectors in Media Sampling and Full Media Analysis to Detect Presence of Documents from a Corpus (2011) (0)
- Lessons learned managing a 60TB digital evidence corpus and writing digital forensics tools (2013) (0)
- Trustworthy Email (2nd Draft) (2017) (0)
- CDX : Cyber Defense Exercise [video] (2010) (0)
- AIDS and the Soundex code. (1988) (0)
- Living with Insecurity Operations with Degraded Security (2011) (0)
- A File System For '''Trite-Once Media (1986) (0)
- Government Data De-Identification Stakeholder's Meeting June 29, 2016 Meeting Report (2016) (0)
- Fran Allen (2020) (0)
- Nibs and Icons (1993) (0)
- The Pasteboard and Services (1993) (0)
- Creating a Simple Application With Interface Builder (1993) (0)
- Building a Project: A Four Function Calculator (1993) (0)
- Wouldn't it be nice to have software labels (2010) (0)
- GraphPaper: A Multi-Threaded Application with a Display List (1993) (0)
- Sharpening Your Tools: Updating bulk_extractor for the 2020s (2022) (0)
- Sharp Figures, Fuzzy Purpose (2008) (0)
- Right on Time? The Security Implications of the HumbleComputer Clock (2009) (0)
- Used Disk Drives (2004) (0)
- Bulk Data Analysis With Optimistic Decoding and Sector Hashing (2014) (0)
- Working with Computer Forensics Data July 20, 2011 (SOUPS 2011 Tutorial) (2011) (0)
- A File System For Write-Once Media (2020) (0)
- Text and Rich Text (1993) (0)
- MathPaper and Multiple Windows (1993) (0)
- Digital Forensics Overview (2014) (0)
- NeXTSTEP Development Tools (1993) (0)
- The Cybersecurity Mess (2013) (0)
- Computing Outside the Box (2019) (0)
- SIGINFO: Everything Is a Punch Card (2020) (0)
- Column: File Cabinet Forensics (2011) (0)
- Mach and the Window Server (1993) (0)
- Book Reviews: Sharp Figures, Fuzzy Purpose (2008) (0)
- Designing a write-once file system (1990) (0)
- Naval Postgraduate School Monterey, California Thesis a Study of Topic and Topic Change in Conversational Threads Report Documentation Page (2009) (0)
- Bulk Extractor 1.4 Programmers Manual for Developing Scanner Plugs-Ins (2013) (0)
- My net connection approaches light speed with cable, but that doesn't guarantee victory over DSL (2000) (0)
- Measuring Systematic and Random Error in Digital Forensics [abstract] (2015) (0)
- SIGINFO: The Tricky Cryptographic Hash Function (2020) (0)
- Drawing with Display PostScript (1993) (0)
- The big dig (1998) (0)
- Sharpening Your Tools (2023) (0)
- Digital Forensics Analysis and Forensic Implications New Xml-based Files Ownership Attribution and Unique Identifiers (0)
- Practical Unix and internet security - securing Solaris, Mac OS X, Linux and FreeBSD: extensivley revised (3. ed.) (2003) (0)
- Views of MIT's Project Athena: Innovation or Invention? (1987) (0)
- Quantum Technologies and Possible Futures (2021) (0)
- Implementation of the Dual Query Algorithm | NIST (2016) (0)
- A Field Study of an Iris Identification System (2008) (0)
- Cyber Security, Featuring Prof. Simson Garfinkel [video] (2010) (0)
- FBI uses hackers ' toclIs to sniff out hacker ' s lair (2003) (0)
- Preferences and Defaults (1993) (0)
- View Resizing and Mouse Tracking (1993) (0)
- CS Expertise for Institutional Review Boards. Authors' reply (2010) (0)
- Optimal sector sampling for drive triage (2012) (0)
- In Memoriam (2022) (0)
This paper list is powered by the following services:
Other Resources About Simson Garfinkel
What Schools Are Affiliated With Simson Garfinkel?
Simson Garfinkel is affiliated with the following schools: