Search Results - "Levin, Dave"
-
1
Surveilling the Masses with Wi-Fi-Based Positioning Systems
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19-05-2024)“…Wi-Fi-based Positioning Systems (WPSes) are used by modern mobile devices to learn their position using nearby Wi-Fi access points as landmarks. In this work,…”
Get full text
Conference Proceeding -
2
Blue Is the New Black (Market): Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones
Published in 2023 IEEE Symposium on Security and Privacy (SP) (01-05-2023)“…In the United States, items in police possession are often sold at auction if they are not claimed. This includes cellphones that the police obtained through…”
Get full text
Conference Proceeding -
3
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers
Published in 2017 IEEE Symposium on Security and Privacy (SP) (01-05-2017)“…Currently, no major browser fully checks for TLS/SSL certificate revocations. This is largely due to the fact that the deployed mechanisms for disseminating…”
Get full text
Conference Proceeding -
4
Investigating Influencer VPN Ads on YouTube
Published in 2022 IEEE Symposium on Security and Privacy (SP) (01-05-2022)“…One widespread, but frequently overlooked, source of security information is influencer marketing ads on YouTube for security and privacy products such as…”
Get full text
Conference Proceeding -
5
Surveilling the Masses with Wi-Fi-Based Positioning Systems
Published 23-05-2024“…Wi-Fi-based Positioning Systems (WPSes) are used by modern mobile devices to learn their position using nearby Wi-Fi access points as landmarks. In this work,…”
Get full text
Journal Article -
6
IPv6 Hitlists at Scale: Be Careful What You Wish For
Published 27-07-2023“…Today's network measurements rely heavily on Internet-wide scanning, employing tools like ZMap that are capable of quickly iterating over the entire IPv4…”
Get full text
Journal Article -
7
As Advertised? Understanding the Impact of Influencer VPN Ads
Published 18-06-2024“…Influencer VPN ads (sponsored segments) on YouTube often disseminate misleading information about both VPNs, and security & privacy more broadly. However, it…”
Get full text
Journal Article -
8
Reading Without Limits: A Practical Step-by-Step Guide for Helping Kids Become Lifelong Readers
Published 02-01-2012“…Imagine a classroom where all students are engaged in highly rigorous and fun learning every single day. That classroom can be yours starting tomorrow. You…”
Get full text
eBook -
9
Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks
Published in 2021 IEEE Security and Privacy Workshops (SPW) (01-05-2021)“…Nationwide Internet censorship threatens free and open access to communication and information for millions of users living inside of censoring regimes. In…”
Get full text
Conference Proceeding -
10
The End of the Canonical IoT Botnet: A Measurement Study of Mirai's Descendants
Published 03-09-2023“…Since the burgeoning days of IoT, Mirai has been established as the canonical IoT botnet. Not long after the public release of its code, researchers found many…”
Get full text
Journal Article -
11
Reading Without Limits: Teaching Strategies to Build Independent Reading for Life
Published 2013“…Imagine a classroom where all students are engaged in highly rigorous and fun learning every single day. That classroom can be yours starting tomorrow. You…”
Get full text
eBook Book -
12
I Know What You Imported Last Summer: A study of security threats in thePython ecosystem
Published 11-02-2021“…The popularity of Python has risen rapidly over the past 15 years. It is a major language in some of the most exciting technologies today. This popularity has…”
Get full text
Journal Article -
13
Measuring and Evading Turkmenistan's Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration Country
Published 17-04-2023“…Since 2006, Turkmenistan has been listed as one of the few Internet enemies by Reporters without Borders due to its extensively censored Internet and strictly…”
Get full text
Journal Article -
14
Build It, Break It, Fix It: Contesting Secure Development
Published 02-07-2019“…Typical security contests focus on breaking or mitigating the impact of buggy systems. We present the Build-it, Break-it, Fix-it (BIBIFI) contest, which aims…”
Get full text
Journal Article -
15
Build It, Break It, Fix It: Contesting Secure Development
Published 19-08-2016“…Typical security contests focus on breaking or mitigating the impact of buggy systems. We present the Build-it Break-it Fix-it BIBIFI contest which aims to…”
Get full text
Journal Article -
16
Systems-compatible incentives
Published in 2009 International Conference on Game Theory for Networks (01-05-2009)“…Selfish participants in a distributed system attempt to gain from the system without regard to how their actions may affect others. To maintain desirable…”
Get full text
Conference Proceeding