I'm an engineer at Stripe.
Before that, I co-founded the first medical device security company, …
Before that, I was a postdoc at the University of Washington, …
Before that, I was a Ph.D. student in computer science at UMass Amherst …
I've consulted on threat modeling, cryptographic protocols, regulatory compliance, ultra wideband communications, and RFID.
I've also had many papers rejected, come up with terrible ideas that didn't work out, and grappled with impostor syndrome. Like most people!
I'm the proud
adoptive parent of ſ, the Unicode character U+017F
Latin small letter long s
.
Publications
Generated from my BibTeX file with bibble; most recent first. Also see my Google Scholar profile.
2017
June |
Cybersecurity and medical devices: A Practical guide for cardiac electrophysiologists.
Pacing and Clinical Electrophysiology. |
March |
Powering the Next Billion Devices with Wi-Fi.
Communications of the ACM 60(3). journal |
手机ssr搭建教程 December |
Powering the Next Billion Devices with Wi-Fi.
ACM CoNEXT. Best Paper nominee; Popular Science Best of What's New 2015 Winner. 几鸡ssr官网 bbc popsci techreview wired |
October |
SAP: an Architecture for Selectively Approximate Wireless Communication.
免费ssr节点2021. |
June |
A Simpler, Safer Programming and Execution Model for Intermittent Systems.
自建梯子教程:vultr+ssr+SwitchyOmega - BBSMAX:2021-11-9 · 自建梯子教程:vultr+ssr+SwitchyOmega 1 综述 在饱受蓝灯挂掉之苦半个月后,终于决定自己搭建VPS服务器FQ了.虽然网上VPS服务器教程很多,但是我按照那些教程弄好VPS服务器总是不稳定,用着用着就不能用了.这应该是这次GFW升级带来的后遗症 .... conference |
几鸡机场ssr官网 |
Powering the Next Billion Devices with Wi-Fi.
手机上怎么使用ssr. |
April |
WISPCam: A Battery-Free RFID Camera.
IEEE RFID. Best Paper nominee. conference |
January |
ACCEPT: A Programmer-Guided Compiler Framework for Practical Approximate Computing.
Technical Report Netflix奈飞中文社区:2021-12-10 · 使用以下教程,请先参阅以上说明,并已具备以下条件: 1. 有能支持解锁Netflix的代理 (如无请查看 国内怎么看netflix?) 2. chrome浏览器(Chrome内核能安装chrome插件的也可以) 教程: 第一步:安装chrome插件 (需代理) [点击前往安装] 第二步:获取. |
2014
June |
Nonvolatile Memory is a Broken Time Machine.
ACM SIGPLAN Workshop on Memory Systems Performance and Correctness. workshop |
March |
Approximate Semantics for Networked Applications.
Workshop on Approximate Computing Across the System Stack. workshop |
2013
September |
Current Events: Identifying Webpages by Tapping the Electrical Outlet.
Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS). conference abstract...
Computers plugged into power outlets leak identifiable information by drawing variable amounts of power when performing different tasks. This work examines the extent to which this side channel leaks private information about web browsing to an observer taking measurements at the power outlet. Using direct measurements of AC power consumption with an instrumented outlet, we construct a classifier that correctly identifies unlabeled power traces of webpage activity from a set of 51 candidates with 99% precision and 99% recall. The classifier rejects samples of $441$ pages outside the corpus with a false-positive rate of less than 2%. It is also robust to a number of variations in webpage loading conditions, including encryption. When trained on power traces from two computers loading the same webpage, the classifier correctly labels further traces of that webpage from either computer. We identify several reasons for this consistently recognizable power consumption, including system calls, and propose countermeasures to limit the leakage of private information. Characterizing the AC power side channel may help lead to practical countermeasures that protect user privacy from an untrustworthy power infrastructure.
|
几鸡机场ssr官网 |
WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices.
USENIX Workshop on Health Information Technologies. workshop abstract...
Embedded systems are ubiquitous, connect to networks, and increasingly use off-the-shelf operating systems vulnerable to malware. Yet, strict validation processes make it difficult or too costly to use anti-virus software or automated operating system updates in embedded systems such as medical devices. Our WattsUpDoc system uses a traditionally undesirable side channel of power consumption to enable run-time malware detection. Our measurements show that WattsUpDoc can detect previously known malware with at least 94% accuracy and previously unknown malware with at least 85% accuracy on the devices we tested. While the detection rates are similar to that of conventional malware-detection systems, WattsUpDoc requires no hardware or software modification or network communication.
|
January |
Transiently Powered Computers.
玩机大学 - CCCiTU:微信在今天提示虫子菌,公众号 玩个机吧 该年审了,在付了每年都是 300元的年审费后,我将 玩个机吧网 改为了 CCC … . |
BAT: Backscatter Anything-to-Tag Communication.
几鸡农场SSR Wirelessly Powered Sensor Networks and Computational RFID. book abstract...
Computational RFID prototypes are limited by networking abstractions that impose narrow preconceptions about topologies and applications. These prototypes support programmability and integrate a wide array of sensors, which open the door to more varied applications. Implementing these on constrained platforms will need primitives that seamlessly support communication among tags and also with other devices. While overlays on top of existing protocols are possible, they introduce inefficiency because of packet formats designed explicitly for the tag inventory paradigm. This paper presents BAT, a networked system designed from the ground up to enable non-supply-chain RFID applications while carefully considering the unique constraints under which these platforms operate.
|
|
Design Challenges for Secure Implantable Medical Devices.
Chapter in Security and Privacy for Implantable Medical Devices. book |
|
2012
August |
Potentia est Scientia: Security and Privacy Implications of Energy-Proportional Computing.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security (HotSec '12). workshop abstract...
The trend toward energy-proportional computing, in which power consumption scales closely with workload, is making computers increasingly vulnerable to information leakage via whole-system power analysis. Saving energy is an unqualified boon for computer operators, but this trend has produced an unintentional side effect: it is becoming easier to identify computing activities in power traces because idle-power reduction has lowered the effective noise floor. This paper offers preliminary evidence that the analysis of AC power traces can be both harmful to privacy and beneficial for malware detection, the latter of which may benefit embedded (e.g., medical) devices.
|
几鸡机场ssr官网 |
(shadowrocket福利)全网最新最全ssr节点公益机场集合:2021-2-15 · 注意: 1、内网指的是无需vpn即可访问的网站,外网则需要借助VPN等上网工具才可正常访问。 2、小火箭(shadowrocket客户端下载请到以下公众号) 扫码回复关键字:ssr 一、只分享节点且.
Technical Report UM-CS-2011-030, Department of Computer Science, University of Massachusetts Amherst. |
手机ssr搭建教程 |
简单几步让App Store绑定支付宝,购买App从未如此简单:2021-11-1 · 文章频道 iPhone教程 点赞数 你现在的位置: 首页 > iPhone > iPhone教程 很早之前,Apple Store就已经支持Apple Pay、微信支付和支付宝这3种付款方式了。但是相比之下App Store则要落后得多,一直以来都只能用银行卡付款,剁只手都那么累。难道说Apple ....
PLoS ONE 7(7). journal |
June |
Design Challenges for Secure Implantable Medical Devices.
Proceedings of the 49th Design Automation Conference (DAC '12). 比较好的付费ssr节点 slides conference |
2011
免费ssr节点2021 |
They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices.
Proceedings of ACM SIGCOMM. Best Paper award. 几鸡机场ssr官网 小火箭ssr永久免费节点 |
June |
Moo: A Batteryless Computational RFID and Sensing Platform.
Technical Report UM-CS-2011-020, Department of Computer Science, University of Massachusetts Amherst. 手机ssr搭建教程 |
March |
Mementos: System Support for Long-Running Computation on RFID-Scale Devices.
Proceedings of the 16th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '11). conference slides abstract...
Transiently powered computing devices such as RFID tags, kinetic energy harvesters, and smart cards typically rely on programs that complete a task under tight time constraints before energy starvation leads to complete loss of volatile memory. Mementos is a software system that transforms general-purpose programs into interruptible computations that are protected from frequent power losses by automatic, energy-aware state checkpointing. Mementos comprises a collection of optimization passes for the LLVM compiler infrastructure and a linkable library that exercises hardware support for energy measurement while managing state checkpoints stored in nonvolatile memory. We evaluate Mementos against diverse test cases in a trace-driven simulator of transiently powered RFID-scale devices. Although Mementos's energy checks increase run time when energy is plentiful, they allow Mementos to safely suspend execution when energy dwindles, effectively spreading computation across zero or more power failures. This paper's contributions are: a study of the runtime environment for programs on RFID-scale devices; an energy-aware state checkpointing system for these devices that is implemented for the MSP430 family of microcontrollers; and a trace-driven simulator of transiently powered RFID-scale devices.
|
2010
October |
Mementos: System Support for Long-Running Computation on RFID-Scale Devices (Technical Report).
Technical Report UM-CS-2010-060, Department of Computer Science, University of Massachusetts Amherst. |
April |
A Rudimentary Bootloader for Computational RFIDs.
Technical Report UM-CS-2010-061, Department of Computer Science, University of Massachusetts Amherst. |
2009
October |
Clinically Significant Magnetic Interference of Implanted Cardiac Devices by Portable Headphones.
Heart Rhythm Journal 6(10). abstract journal npr |
August |
CCCP: Secure Remote Storage for Computational RFIDs.
Proceedings of the 18th USENIX Security Symposium. conference new scientist abstract...
Passive RFID tags harvest their operating energy from an interrogating reader, but constant energy shortfalls severely limit their computational and storage capabilities. We propose Cryptographic Computational Continuation Passing (CCCP), a mechanism that amplifies programmable passive RFID tags' capabilities by exploiting an often overlooked, plentiful resource: low-power radio communication. While radio communication is more energy intensive than flash memory writes in many embedded devices, we show that the reverse is true for passive RFID tags. A tag can use CCCP to checkpoint its computational state to an untrusted reader using less energy than an equivalent flash write, thereby allowing it to devote a greater share of its energy to computation. Security is the major challenge in such remote checkpointing. Using scant and fleeting energy, a tag must enforce confidentiality, authenticity, integrity, and data freshness while communicating with potentially untrustworthy infrastructure. Our contribution synthesizes well-known cryptographic and low-power techniques with a novel flash memory storage strategy, resulting in a secure remote storage facility for an emerging class of devices. Our evaluation of CCCP consists of energy measurements of a prototype implementation on the batteryless, MSP430-based WISP platform. Our experiments show that---despite cryptographic overhead---remote checkpointing consumes less energy than checkpointing to flash for data sizes above roughly 64 bytes. CCCP enables secure and flexible remote storage that would otherwise outstrip batteryless RFID tags' resources.
|
2008
December |
Getting Things Done on Computational RFIDs with Energy-Aware Checkpointing and Voltage-Aware Scheduling.
用SSR给外服游戏加速教程-夜河资源网:2021-11-20 · 标签:SS SSR SSR加速游戏 SSR网游加速 外服游戏加速 未经允许不得转载: 作者: admin , 转载或复制请以 超链接形式 并注明出处 夜河资源网 。 原文地址: 《用SSR给外服游戏加速教程》 发 …. ieee spectrum slides workshop |
November |
Electromagnetic Interference (EMI) of Implanted Cardiac Devices by MP3 Player Headphones.
Circulation 118(18 Supplement). Abstract 662, 2008 American Heart Association Annual Scientific Sessions. abstract ap medgadget reuters us news world report 几鸡ssr官网 |
May |
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses.
Proceedings of the 29th Annual IEEE Symposium on Security and Privacy. Outstanding Paper award. Test of Time award (2019). boston globe 几鸡农场SSR medgadget nytimes risks schneier slashdot wsj |
几鸡ssr安卓
- sllurp (GitHub), a Python implementation of the Low Level Reader Protocol (LLRP) for controlling RFID readers
- Abbot, an XMPP personal assistant
- Other useful tools on GitHub
Research Resources
- A pdfLaTeX Makefile that understands version control and distills nice PDFs.
- OmniGraffle tools for computer science with Daniel Halperin.