Technical Reports & Presentations
- Zachary Marois, Ron Peterson, Cory Cornelius, Jacob Sorber, David Kotz and Shrirang Mare, "Vocal resonance as a biometric for pervasive wearable devices", Technical Report TR2014-747, Dartmouth Computer Science
- Emma Smithayer, "Sensor-based system for verifying blood-pressure measurement position", Technical Report TR2012-720, Dartmouth Computer Science, June, 2012
- Cory Cornelius, "Usable Security for Wireless Body-Area Networks", Dartmouth Technical Report TR2013-741
Ph.D Dissertation. Advisor: David Kotz
- S Sinclair, "Access Control In and For the Real World", Dartmouth Technical Report TR2013-745
- Sean Smith, Y. Wang and Andrew Gettinger, "Access Control Hygiene and the Empathy Gap in Medical IT", Dartmouth Computer Science Technical Report TR2012-713, (2012).
Also In Proceedings of the USENIX Workshop on Health Security and Privacy
3rd USENIX Workshop on Health Security and Privacy
Bellevue, WA
Published
August 6-7, 2012.
- Anna Shubina, Sean Smith, Rebecca Shapiro, Sergey Bratus, Michael Locasto, Jason Reeves and Julian Bangert, "ELFbac: Using the Loader Format for Intent-Level Semantics and Fine-Grained Protection ", Dartmouth Technical Report TR2013-727
- Shloka Kini, "Please Take My Survey: Compliance with smartphone-based EMA/ESM studies", Dartmouth Technical Report TR2013-734. Senior Honors Thesis. Advisors: David Kotz and Shrirang Mare.
- David Kotz, Minho Shin, Jacob Sorber, Cory Cornelius and Shrirang Mare, "Hide-n-Sense: Privacy-aware secure mHealth sensing", Dartmouth Computer Science Technical Report TR2011-702
- Joseph Cooley and Sean Smith, "Privacy-Preserving Screen Capture: Closing the Loop for Medical Informatics Usability", Department of Computer Science, Dartmouth Technical Report TR2012-725, July 2012
- S Sinclair and Sean Smith, "Access Control Realities As Observed in a Clinical Medical Setting", Department of Computer Science, Dartmouth Technical Report TR2012-714, April 2012
- Keren Tan, "A Large-scale Wireless Local-area Network Measurement and Privacy Analysis", Department of Computer Science, Dartmouth Technical Report TR2011-703, August 2011
- Guanhua Yan, David Kotz, Keren Tan and Jihwang Yeo, "Privacy Analysis of User Association Logs in a Large-Scale Wireless LAN", Computer Science Department, Dartmouth Technical Report TR2011-679, January 2011
- Phil Fazio, "Effects of network trace sampling methods on privacy and utility metrics", Department of Computer Science, Dartmouth College TR2011-697, June 2011
- Joseph Cooley, "Screen Capture for Sensitive Systems", Department of Computer Science, Dartmouth College TR2011-690, May 2011.
- David Kotz, Keren Tan, Guanhua Yan and Jihwang Yeo, "Privacy Analysis of User Association Logs in a Large-scale Wireless LAN", Department of Computer Science, Dartmouth Technical Report TR2011-679
- Apu Kapadia, Nikos Triandopoulos, Minho Shin, David Kotz, Cory Cornelius and Daniel Peebles, "AnonyTL Specification", Dartmouth Computer Science Technical Report TR2010-660, January 2010
- David Kotz, Sergey Bratus, Chrisil Arackaparambil and Anna Shubina, "On the Reliability of Wireless Fingerprinting using Clock Skews", Department of Computer Science, Dartmouth Technical Report TR2010-661, January 2010.
- Sean Smith, Rouslan V. Solomakhin and Patrick P. Tsang, "Authenticated Streamwise On-line Encryption", Department of Computer Science, Dartmouth Technical Report TR2009-640, March 2009.
- Gabriel Weaver, "Semantic and Visual Encoding of Diagrams", Department of Computer Science, Dartmouth Technical Report TR2009-654, August 2009.
- Anna Shubina, Joshua Brody, Sergey Bratus and Chrisil Arackaparambil, "Distributed Monitoring of Conditional Entropy for Network Anomaly Detection", Department of Computer Science, Dartmouth Technical Report TR2009-653, July 2009.
- Scott Rea, Gabriel Weaver and Sean Smith, "A Computational Framework for Certificate Policy Operations", Department of Computer Science, Dartmouth Technical Report, TR2009-650, June 2009.
- Sean Smith, Patrick P. Tsang, Man Ho Au and Apu Kapadia, "BLAC: Revoking Repeatedly Misbehaving Anonymous Users Without Relying on TTPs", Department of Computer Science, Dartmouth Technical Report TR2008-635, October 1, 2008
- Sergey Bratus, Axel Hansen and Anna Shubina, "LZfuzz: a fast compression-based fuzzer for poorly documented protocols", Department of Computer Science, Dartmouth Technical Report TR2008-634, September 16, 2008
- Apu Kapadia, Katelin Bailey, Sean Smith and Linden Vongsathorn, "TwoKind Authentication: Protecting Private Information in Untrustworthy Environments (Extended Version)", Department of Computer Science, Dartmouth Technical Report TR2008-632, August 2008
- M Johnson, "Lighting and Optical Tools for Image Forensics", Department of Computer Science, Dartmouth Technical Report TR2008-629, July 2008
- David Kotz, Daniel Peebles, Cory Cornelius and Sergey Bratus, "Active behavioral fingerprinting of wireless devices", Department of Computer Science, Dartmouth Technical Report TR2008-610, March 25, 2008
- Patrick P. Tsang and Sean Smith, "PPAA: Peer-to-Peer Anonymous Authentication", Department of Computer Science, Dartmouth Technical Report TR2008-615, April 8, 2008
- Patrick P. Tsang, Sean Smith, Apu Kapadia and Man Ho Au, "Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs (Extended Version)", Department of Computer Science, Dartmouth Technical Report TR2007-601, September 2007
- Sean Smith, Tim Williamson and Denise Anthony, "The Quality of Open Source Production: Zealots and Good Samaritans in the Case of Wikipedia", Department of Computer Science, Dartmouth Technical Report TR2007-606, September 2007
- Sean Smith and Patrick P. Tsang, "YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems", Department of Computer Science, Dartmouth Technical Report, TR2007-603, September 2007
- J.B. Woodward and H Farid, "Video Stabilization and Enhancement ", Department of Computer Science, Dartmouth Technical Report, TR2007-605, 2007
- Nihal D'Cunha, "Exploring the Integration of Memory Mangement and Trusted Computing", Department of Computer Science, Dartmouth College, Technical Report TR2007-594, May 2007
- S Sinclair, Kwang-Hyun Baek, Sergey Bratus and Sean Smith, "Dumbots: Unexpected Botnets through Networked Embedded Devices", Department of Computer Science, Technical Report TR2007-591, May 2007
- Evan Sparks, "A Security Assessment of Trusted Platform Modules", Department of Computer Science, Dartmouth Technical Report TR2007-597, June 2007
- Zhenhui Jiang, David Kotz and Soumendra Nanda, "A Combined Routing Method for Wireless Ad Hoc Networks", Department of Computer Science, Dartmouth Technical Report TR2007-588, June 2007
- David Kotz, Nikos Triandopoulos, Peter Johnson and Apu Kapadia, "People-Centric Urban Sensing: Security Challenges for the New Paradigm", Dartmouth Computer Science Technical Report, TR2007-586, February 2007
- Punch Taylor, Meiyuan Zhao, John Marchesini, Sung Kim, Nicholas Goffee and Sean Smith, "Greenpass: Flexible and Scalable Authorization for Wireless Networks", Dartmouth Computer Science Technical Report, TR2004-484, January 7, 2004
- Sean Smith, Eileen Ye and Yougu Yuan, "Web Spoofing 2001", Dartmouth Computer Science Technical Report, TR2001-409, July 2001
- Eileen Ye, Sean Smith and Yougu Yuan, "Web Spoofing Revisited: SSL and Beyond", Dartmouth Computer Science Technical Report, TR2002-417, February 1, 2002
- John Marchesini, O Wild, Rich MacDonald and Sean Smith, "Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear", Dartmouth Computer Science Technical Report, TR2003-476, December 2003
- Weibo Gong, Don Towsley and Cliff Changchun Zou, "Email Virus Propagation Modeling and Analysis", University of Massachusetts, Amherst, Department of Computer Science Technical Report TR-CSE-03-04
- Naren Ramakrishnan and Chris Bailey-Kellogg, "Ambiguity-Directed Sampling for Qualitative Analysis of Sparse Data from Spatially-Distributed Physical Systems", Dartmouth Computer Science Technical Report, TR2001-384, 2001
- Sergey Bratus, Javed Aslam, David Kotz, Ron Peterson and Daniela Rus, "Kerf: Machine Learning to Aid Intrusion Analysts", Proceedings of the 13th USENIX Security Symposium, San Diego, CA, 9-13 August 2004
- Sean Smith, Rich MacDonald, John Marchesini and O Wild, "Bear: An Open-Source Virtual Secure Coprocessor based on TCPA", Department of Computer Science, Dartmouth Technical Report TR2003-471, August 2003
- H Farid, "Digital Image Ballistics from JPEG Quantization", Dartmouth Computer Science Technical Report, TR2006-583, September 2006
- M Johnson and H Farid, "Metric Measurements on a Plane from a Single Image", Dartmouth Computer Science Technical Report, TR2006-579, August 2006
- Technical Analysis Group (TAG), "Examining the Cyber Capabilities of Islamic Terrorist Groups", November 2003
- Meiyuan Zhao, "Performance Evaluation of Distributed Security Protocols Using Discrete Event Simulation", Dartmouth Computer Science Technical Report TR2005-559, October 2005
- Guanhua Yan, "Improving Large-Scale Network Traffic Simulation with Multi-Resolution Models", Dartmouth Computer Science Technical Report TR2005-558, September 2005
- Guofei Jiang, George Cybenko and Valentino Crespi, "The Theory of Trackability with Applications to Sensor Networks", Dartmouth Computer Science Technical Report TR2005-555, August 2005
- Guanling Chen and David Kotz, "Application-Controlled Loss-Tolerant Data Dissemination", Dartmouth Computer Science Technical Report TR2004-488, February 2004
- George Cybenko, Vincent Berk and Annarita Giani, "Detection of Covert Channel Encoding in Network Packet Delays", Dartmouth Computer Science Technical Report TR2005-536, August 2005, revised November 2005
- David Kotz and K Minami, "Secure context-sensitive authorization", Dartmouth Computer Science Technical Report TR2004-529, December 2004
- A Iliev and Sean Smith, "Towards Tiny Trusted Third Parties", Dartmouth Computer Science Technical Report TR2005-547, July 2005
- A Iliev and Sean Smith, "More Efficient Secure Function Evaluation Using Tiny Trusted Third Parties", Dartmouth Computer Science Technical Report TR2005-551, July 2005
- Sean Smith, David Nicol and Meiyuan Zhao, "Aggregated Path Authentication for Efficient BGP Security", Department of Computer Science, Dartmouth Technical Report TR2005-541, May 2005
- John Marchesini and Sean Smith, "SHEMP: Secure Hardware Enhanced MyProxy", Dartmouth Computer Science TR2005-532
- Kwang-Hyun Baek, Sean Smith and David Kotz, "A Survey of WPA and 802.11i RSN Authentication Protocols", Dartmouth Computer Science Technical Report TR2004-524. November 2004
- George Bakos, "Honeypots in the Enterprise - Intelligence Based Risk Management", New York State Cyber Security Conference, Albany, NY, April 21-22, 2004
- H Farid, "Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act", Department of Computer Science, Dartmouth Technical Report TR2004-518
- H Farid and A Popescu, "Exposing Digital Forgeries by Detecting Duplicated Image Regions", Technical Report, TR2004-515, Dartmouth College, Computer Science
- Kevin O'Shea, "Cyber Attack Investigative Tools and Technologies", TAG Presentation at HTCIA, Silicon Valley, May 7 2003
- Wayne Chung, Yong Sheng, Han Li, Guofei Jiang, Diego Hernando, Robert Gray, George Cybenko, Valentino Crespi and Vincent Berk, "Process Query Systems for Surveillance and Awareness", Thayer School of Engineering
- George Bakos and Jay Beale, "How a Honeypot Can Add Value to Your Organization", Counter-Intelligence in Internet Security: Honeypot Best Practices, LasVegas, November 7-8, 2002
- George Bakos, "Internet Worms and the Dartmouth ICMP BCC: System", 5th Annual NYS Information Security Conference, Albany, NY, April 10-11, 2002
- Vincent Berk and George Cybenko, "File Sharing Protocols: A Tutorial on Gnutella", March 2001
- H Farid, "Detecting Steganographic Messages in Digital Images", Technical Report, TR2001-412, Dartmouth College, Computer Science
- Dennis McGrath, "Unauthorized Access via the IRIX Telnetd Exploit in a College Computer Laboratory", November 21, 2000
- Brett Tofel, Sergey Bratus, Javed Aslam, Ron Peterson, David Kotz and Daniela Rus, "The Kerf Toolkit for Intrusion Analysis", Department of Computer Science and the Institute for Security Technology Studies, Dartmouth College, March 12, 2004
- Fillia Makedon, Heather Wishart, Andrew Saykin, Tilmann Steinberg, Li Shen and James Ford, "Evaluation Metrics for User-Centered Ranking of Content in METADLs", Fourth DELOS Workshop on Evaluation of Digital Libraries: Testbeds, Measurements, and Metrics, Budapest, Hungary, May 2002
- John Marchesini, B Yee, C Hawblitzel, Sean Smith, David Nicol and E Feustel, "Survivable Trust for Critical Infrastructure", Internet2 Collaborative Computing in Higher Education: Peer-to-Peer and Beyond. January 2002
- Javed Aslam, David Kotz and Daniela Rus, "Sawmill: Infrastructure for Distributed Collaboration in Detecting Network Attacks", Feb. 2002