Dan S. Wallach’s research while affiliated with Rice University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (156)


ACM TechBrief: Election Security: Risk Limiting Audits
  • Book

October 2022

·

2 Reads

Matthew Bernhard

·

Dan S. Wallach

Security score rubric Error Deduction
Comparison of mean functionality scores by group, study 1 (Tukey HSD).
Time on task, study 1.
Multiple linear regression, Solo and Duo security scores.
Bad Tools Hurt: Lessons for teaching computer security skills to undergraduates
  • Article
  • Full-text available

December 2021

·

65 Reads

International Journal of Computer Science Education in Schools

Understanding why developers continue to misuse security tools is critical to designing safer software, yet the underlying reasons developers fail to write secure code are not well understood. In order to better understand how to teach these skills, we conducted two comparatively large-scale usability studies with undergraduate CS students to assess factors that affect success rates in securing web applications against cross-site request forgery (CSRF) attacks. First, we examined the impact of providing students with example code and/or a testing tool. Next, we examined the impact of working in pairs. We found that access to relevant secure code samples gave significant benefit to security outcomes. However, access to the tool alone had no significant effect on security outcomes, and surprisingly, the same held true for the tool and example code combined. These results confirm the importance of quality example code and demonstrate the potential danger of using security tools in the classroom that have not been validated for usability. No individual differences predicted one’s ability to complete the task. We also found that working in pairs had a significant positive effect on security outcomes. These results provide useful directions for teaching computer security programming skills to undergraduate students.

Download

VAULT-Style Risk-Limiting Audits and the Inyo County Pilot

May 2021

·

31 Reads

·

1 Citation

IEEE Security and Privacy Magazine

·

Kammi Foote

·

·

[...]

·

Dan S. Wallach

In 2020, Inyo County, California partnered with nonprofit VotingWorks to pilot the use of the Verifiable Audits Using Limited Transparency technique (called VAULT) to conduct an efficient, privacy-preserving, publicly verifiable risk-limiting audit of seven contests in the November general election. We describe VAULT, the pilot, and the software implementation that made this pilot possible.


The Design and Implementation of a Verified File System with End-to-End Data Integrity

December 2020

·

79 Reads

Despite significant research and engineering efforts, many of today's important computer systems suffer from bugs. To increase the reliability of software systems, recent work has applied formal verification to certify the correctness of such systems, with recent successes including certified file systems and certified cryptographic protocols, albeit using quite different proof tactics and toolchains. Unifying these concepts, we present the first certified file system that uses cryptographic primitives to protect itself against tampering. Our certified file system defends against adversaries that might wish to tamper with the raw disk. Such an "untrusted storage" threat model captures the behavior of storage devices that might silently return erroneous bits as well as adversaries who might have limited access to a disk, perhaps while in transit. In this paper, we present IFSCQ, a certified cryptographic file system with strong integrity guarantees. IFSCQ combines and extends work on cryptographic file systems and formally certified file systems to prove that our design is correct. It is the first certified file system that is secure against strong adversaries that can maliciously corrupt on-disk data and metadata, including attempting to roll back the disk to earlier versions of valid data. IFSCQ achieves this by constructing a Merkle hash tree of the whole disk, and by proving that tampered disk blocks will always be detected if they ever occur. We demonstrate that IFSCQ runs with reasonable overhead while detecting several kinds of attacks.


How Human Factors Can Help Preserve Democracy in the Age of Pandemics

August 2020

·

41 Reads

·

9 Citations

Human Factors The Journal of the Human Factors and Ergonomics Society

Objective To describe user-centered voting systems that would support the safe conduct of voting in a pandemic environment. Background The COVID-19 pandemic has complicated our democratic processes. Voters and poll workers feel threatened by the potential dangers of voting in business-as-usual polling stations. Indeed, significant problems were encountered in the recent 2020 primary elections in Wisconsin, where the National Guard had to be mobilized because so few poll workers reported to work, and more than 90% of polling places had to remain closed. Method We describe a number of possible user-centered solutions that would help protect voters and poll workers in times of pandemic, and also report the results of a survey that asked voters and poll workers about what kinds of systems might make them willing to vote. Results Political as well as safety considerations will need to be considered as these safer voting solutions are designed since, surprisingly, the kinds of solutions preferred depend on the political affiliation of the voters. Conclusion Human factors professionals have a large role to play in realizing the safe, successful implementation of these user-centered systems. Good human factors analysis can help minimize the risk to voters and poll workers. Moreover, human factors methods can help safeguard democracy by creating safe and well-engineered environments that are conducive to voting in the age of pandemics. Application Creating safe and effective voting solutions that protect voters and poll workers during pandemic outbreaks is crucial to the preservation of democracy.


Fig. 1. Payment Roles -Dashed lines represent periodic transactions (rare), thin double lines indicate micropayment channels (used at the beginning and end of circuit lifetime), and thick double lines indicate a nanopayment channel (handling nanopayments during the lifetime of the circuit). The dashed outline around the intermediary represents a notion of payment anonymity for the end-users. Connections to the ledger and to the intermediary are protected by an internal Tor circuit.
Fig. 3. Protocol Execution Time -Time to finish each protocol step split across interactions with each of the three relays. The simulation includes 100 relays, 2 authorities, 1 ledger authority, 10 intermediaries and 1000 Tor clients scaled down from the public consensus file '2018-02-03-00-00-00-consensus'.
Fig. 5. Data collection from 5 old and stable exit relays with a cumulative bandwidth of ≈50 MiB/s
Fig. 6. Prioritized Scheduling -CDF download times for superimposed web and bulk clients where premium status is enforced only via scheduling. Almost no priority is observed.
Fig. 7. Queue Temporal Profile (60 seconds) -Size of the scheduling buffer over time at a single exit relay in terms of number of cells. Colors group cells belonging to the same circuit.
Scaling Up Anonymous Communication with Efficient Nanopayment Channels

July 2020

·

134 Reads

·

4 Citations

Proceedings on Privacy Enhancing Technologies

Tor, the most widely used and well-studied traffic anonymization network in the world, suffers from limitations in its network diversity and performance. We propose to mitigate both problems simultaneously through the introduction of a premium bandwidth market between clients and relays. To this end, we present moneTor: incentivizing nodes to join and support Tor by giving them anonymous payments from Tor users. Our approach uses efficient cryptographic nanopayments delivered alongside regular Tor traffic. Our approach also gives a degree of centralized control, allowing Tor’s managers to shape the economy created by these payments. In this paper, we present a novel payment algorithm as well as a data-driven simulation and evaluation of its costs and benefits. The results show that moneTor is both feasible and flexible, offering upwards of 100% improvements in differentiated bandwidth for paying users with near-optimal throughput and latency overheads.


Investigating the effectiveness of web adblockers

December 2019

·

26 Reads

We investigate adblocking filters and the extent to which websites and advertisers react when their content is impacted by these filters. We collected data daily from the Alexa Top-5000 web sites for 120 days, and from specific sites that newly appeared in filter lists for 140 days. By evaluating how long a filter rule triggers on a website, we can gauge how long it remains effective. We matched websites with both a regular adblocking filter list (EasyList) and with a specialized filter list that targets anti-adblocking logic (Nano Defender). From our data, we observe that the effectiveness of the EasyList adblocking filter decays a modest 0.13\% per day, and after around 80 days seems to stabilize. We found no evidence for any significant decay in effectiveness of the more specialized, but less widely used, anti-adblocking removal filters.


On the security of ballot marking devices

August 2019

·

13 Reads

A recent debate among election experts has considered whether electronic ballot marking devices (BMDs) have adequate security against the risks of malware. A malicious BMD might produce a printed ballot that disagrees with a voter's actual intent, with the hope that voters would be unlikely to detect this subterfuge. This essay considers how an election administrator can create reasonable auditing procedures to gain confidence that their fleet of BMDs is operating correctly, allowing voters to benefit from the usability and accessibility features of BMDs while the overall election still benefits from the same security and reliability properties we expect from hand-marked paper ballots.


On the Usability of HTTPS Deployment

April 2019

·

24 Reads

·

17 Citations

HTTPS and TLS are the backbone of Internet security, however setting up web servers to run these protocols is a notoriously difficult process. In this paper, we perform two live subjects usability studies on the deployment of HTTPS in a real-world setting. Study 1 is a within subjects comparison between traditional HTTPS configuration (purchasing a certificate and installing it on a server) and Let's Encrypt, which automates much of the process. Study 2 is a between subjects study looking at the same two systems, examining why users encounter usability issues. Overall we confirm past results that HTTPS is difficult to deploy, and we find some evidence that suggests Let's Encrypt is an easier, more efficient method for deploying HTTPS.



Citations (84)


... According to the findings, all 17 PM applications examined were found to disclose information that facilitated the retrieval of user passwords. A similar research in Lee et al. (2019) presented an analysis of Android applications, including 4 PMs, on the persistence of passwords in system memory even after they are not needed, finding that all tested apps are vulnerable. Based on their results, one of the main components responsible for leaking private information is UI widgets. ...

Reference:

Unmasking the hidden credential leaks in password managers and VPN clients
Total Recall: Persistence of Passwords in Android
  • Citing Conference Paper
  • January 2019

... Moreover, tightened control on the overall network features and behavior makes many improvements feasible to deploy and succeed, such as incentives schemes [18], [32], [30] and path selection performance improvements [23] requiring the whole network to be compliant. ...

Scaling Up Anonymous Communication with Efficient Nanopayment Channels

Proceedings on Privacy Enhancing Technologies

... Otherwise, the focus ranges from macrolevel issues such as government-civil society relations [42] to micro-level case studies such as particular surveillance technologies [43]. Some, but not all papers, provide prescriptions for dealing with the outlined challenge [44]. While most papers in this category are essays or conceptual papers with empirical examples, one review article also exists on democratic accountability [45]. ...

How Human Factors Can Help Preserve Democracy in the Age of Pandemics
  • Citing Article
  • August 2020

Human Factors The Journal of the Human Factors and Ergonomics Society

... There will be messiness in any real-world deployment of a new technical standard (e.g., HTTPS [6]) as a result of uneven adoption, differences in implementation, and potential malicious and evasive actors [109]. Thus, we expect that the provenance chains of a non-trivial quantity of media would be incomplete or invalid in some way [19,20] for a significant period of time after initial launch. ...

On the Usability of HTTPS Deployment
  • Citing Conference Paper
  • April 2019

... show that STAR-Vote successfully strikes the right equilibrium between robust cryptographic security and user-friendly design, allowing voters to easily comprehend and utilize the voting process. The article emphasizes the value of usefulness in electronic voting systems and offers insights into STAR-Vote's successful integration of security and ease of use (Acemyan et al., 2022). The research examines how cloud computing might improve the voting system's flexibility, dependability, and availability. ...

Summative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use
  • Citing Article
  • December 2018

Human Factors The Journal of the Human Factors and Ergonomics Society

... Two-factor Authentication is intended to enhance security and help detect unauthorized access. However, studies have shown various usability issues with 2FA login and setup processes (Acemyan et al., 2018;Pandey et al., 2019;Reynolds et al., 2018). Many users failed to set up 2FA (Acemyan et al., 2018) or set up a service they did not intend to (Pandey et al., 2019). ...

2FA Might Be Secure, But It’s Not Usable: A Summative Usability Assessment of Google’s Two-factor Authentication (2FA) Methods
  • Citing Article
  • September 2018

Proceedings of the Human Factors and Ergonomics Society Annual Meeting

... Lee and Wallach analyzed the lifetime of the TLS master secret in Android applications [LW18]. For finding the master secret in main memory, they use a format based approach that uses knowledge about the surrounding data in the SSL_Session structure of BoringSSL, which allows them to locate the master secret in seconds from gigabytes of a memory image. ...

Removing Secrets from Android's TLS
  • Citing Conference Paper
  • January 2018

... A calibração consiste em verificar se com a string criada os estudos definidos como controle, aqueles estudos principais relacionados com o tema pesquisado, são retornados. Para o contexto desse MS os estudos de [Heiderich et al. 2011], [Zhou et al. 2016], [Pereira and Wallach 2017], [Sebé et al. 2010]. Depois de calibrada a seguinte string de busca foi utilizada para a busca por estudos relevantes: (("security"OR"secure") AND ("issue"OR "breach"OR "gap"OR "threat") AND ("e-voting"OR "electronic voting")). ...

Clash Attacks and the STAR-Vote System
  • Citing Conference Paper
  • October 2017

Lecture Notes in Computer Science

... Ensuring fairness, security, and individual privacy in election processes is a delicate and complex challenge. Voting systems must uphold fairness by withholding partial election results until the conclusion of the voting session to prevent undue influence on subsequent voters [14]. They must also enable verifiability by allowing independent verification of the tally's accuracy while safeguarding privacy [15]. ...

Public Evidence from Secret Ballots
  • Citing Conference Paper
  • October 2017

Lecture Notes in Computer Science