Search Results - "Levin, Dave"

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Surveilling the Masses with Wi-Fi-Based Positioning Systems by Rye, Erik, Levin, Dave

    “…Wi-Fi-based Positioning Systems (WPSes) are used by modern mobile devices to learn their position using nearby Wi-Fi access points as landmarks. In this work,…”
    Get full text
    Conference Proceeding
  2. 2

    Blue Is the New Black (Market): Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones by Roberts, Richard, Poveda, Julio, Roberts, Raley, Levin, Dave

    “…In the United States, items in police possession are often sold at auction if they are not claimed. This includes cellphones that the police obtained through…”
    Get full text
    Conference Proceeding
  3. 3

    CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers by Larisch, James, Choffnes, David, Levin, Dave, Maggs, Bruce M., Mislove, Alan, Wilson, Christo

    “…Currently, no major browser fully checks for TLS/SSL certificate revocations. This is largely due to the fact that the deployed mechanisms for disseminating…”
    Get full text
    Conference Proceeding
  4. 4

    Investigating Influencer VPN Ads on YouTube by Akgul, Omer, Roberts, Richard, Namara, Moses, Levin, Dave, Mazurek, Michelle L.

    “…One widespread, but frequently overlooked, source of security information is influencer marketing ads on YouTube for security and privacy products such as…”
    Get full text
    Conference Proceeding
  5. 5

    Surveilling the Masses with Wi-Fi-Based Positioning Systems by Rye, Erik, Levin, Dave

    Published 23-05-2024
    “…Wi-Fi-based Positioning Systems (WPSes) are used by modern mobile devices to learn their position using nearby Wi-Fi access points as landmarks. In this work,…”
    Get full text
    Journal Article
  6. 6

    IPv6 Hitlists at Scale: Be Careful What You Wish For by Rye, Erik, Levin, Dave

    Published 27-07-2023
    “…Today's network measurements rely heavily on Internet-wide scanning, employing tools like ZMap that are capable of quickly iterating over the entire IPv4…”
    Get full text
    Journal Article
  7. 7

    As Advertised? Understanding the Impact of Influencer VPN Ads by Akgul, Omer, Roberts, Richard, Shroyer, Emma, Levin, Dave, Mazurek, Michelle L

    Published 18-06-2024
    “…Influencer VPN ads (sponsored segments) on YouTube often disseminate misleading information about both VPNs, and security & privacy more broadly. However, it…”
    Get full text
    Journal Article
  8. 8

    Reading Without Limits: A Practical Step-by-Step Guide for Helping Kids Become Lifelong Readers by Levin, Dave, Witter, Maddie

    Published 02-01-2012
    “…Imagine a classroom where all students are engaged in highly rigorous and fun learning every single day. That classroom can be yours starting tomorrow. You…”
    Get full text
    eBook
  9. 9

    Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks by Bock, Kevin, Bharadwaj, Pranav, Singh, Jasraj, Levin, Dave

    “…Nationwide Internet censorship threatens free and open access to communication and information for millions of users living inside of censoring regimes. In…”
    Get full text
    Conference Proceeding
  10. 10

    The End of the Canonical IoT Botnet: A Measurement Study of Mirai's Descendants by Böck, Leon, Sundermann, Valentin, Fusari, Isabella, Karuppayah, Shankar, Mühlhäuser, Max, Levin, Dave

    Published 03-09-2023
    “…Since the burgeoning days of IoT, Mirai has been established as the canonical IoT botnet. Not long after the public release of its code, researchers found many…”
    Get full text
    Journal Article
  11. 11

    Reading Without Limits: Teaching Strategies to Build Independent Reading for Life by Witter, Maddie

    Published 2013
    “…Imagine a classroom where all students are engaged in highly rigorous and fun learning every single day. That classroom can be yours starting tomorrow. You…”
    Get full text
    eBook Book
  12. 12

    I Know What You Imported Last Summer: A study of security threats in thePython ecosystem by Bagmar, Aadesh, Wedgwood, Josiah, Levin, Dave, Purtilo, Jim

    Published 11-02-2021
    “…The popularity of Python has risen rapidly over the past 15 years. It is a major language in some of the most exciting technologies today. This popularity has…”
    Get full text
    Journal Article
  13. 13

    Measuring and Evading Turkmenistan's Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration Country by Nourin, Sadia, Tran, Van, Jiang, Xi, Bock, Kevin, Feamster, Nick, Hoang, Nguyen Phong, Levin, Dave

    Published 17-04-2023
    “…Since 2006, Turkmenistan has been listed as one of the few Internet enemies by Reporters without Borders due to its extensively censored Internet and strictly…”
    Get full text
    Journal Article
  14. 14

    Build It, Break It, Fix It: Contesting Secure Development by Parker, James, Hicks, Michael, Ruef, Andrew, Mazurek, Michelle L, Levin, Dave, Votipka, Daniel, Mardziel, Piotr, Fulton, Kelsey R

    Published 02-07-2019
    “…Typical security contests focus on breaking or mitigating the impact of buggy systems. We present the Build-it, Break-it, Fix-it (BIBIFI) contest, which aims…”
    Get full text
    Journal Article
  15. 15

    Build It, Break It, Fix It: Contesting Secure Development by Ruef, Andrew, Hicks, Michael, Parker, James, Levin, Dave, Mazurek, Michelle L, Mardziel, Piotr

    Published 19-08-2016
    “…Typical security contests focus on breaking or mitigating the impact of buggy systems. We present the Build-it Break-it Fix-it BIBIFI contest which aims to…”
    Get full text
    Journal Article
  16. 16

    Systems-compatible incentives by Levin, D., Spring, N., Bhattacharjee, B.

    “…Selfish participants in a distributed system attempt to gain from the system without regard to how their actions may affect others. To maintain desirable…”
    Get full text
    Conference Proceeding