All Stories

  1. In Memoriam: Vicki L. Hanson
  2. Platforms of power The Age of Extraction: How Tech Platforms Conquered the Economy and Threaten Our Future Prosperity Tim Wu Knopf, 2025. 224 pp.
  3. A Simulated Reconstruction and Reidentification Attack on the 2010 U.S. Census
  4. Empire of the Sum: The Rise and Reign of the Pocket Calculator—Keith Houston (New York, NY, USA: Norton, 2023, 374 pp.)
  5. Differential Privacy, Firm-Level Data, and the Binomial Pathology
  6. In Memoriam: E. Allen Emerson
  7. Complete Delete: In Practice, Clicking 'Delete' Rarely Deletes. Should it?
  8. De-identifying government datasets:
  9. Comment to Muralidhar and Domingo-Ferrer (2023) – Legacy Statistical Disclosure Limitation Techniques Were Not An Option for the 2020 US Census of Population And Housing
  10. Sharpening Your Tools
  11. Sharpening Your Tools
  12. The 2020 Census Disclosure Avoidance System TopDown Algorithm
  13. More on computing's divided future
  14. The Philosophy of Differential Privacy
  15. In Memoriam: Ronald E. Anderson, 1941-2020
  16. Randomness Concerns when Deploying Differential Privacy
  17. Understanding database reconstruction attacks on public data
  18. Understanding Database Reconstruction Attacks on Public Data
  19. Issues Encountered Deploying Differential Privacy
  20. Privacy and Security Concerns When Social Scientists Work with Administrative and Operational Data
  21. Organizational practices in cryptographic development and testing
  22. Toward algorithmic transparency and accountability
  23. Comparing the Usability of Cryptographic APIs
  24. Picking up the trash: Exploiting generational GC for memory analysis
  25. Trustworthy Email
  26. Government Data De-Identification Stakeholder's Meeting June 29, 2016 Meeting Report
  27. Secure and Usable Enterprise Authentication: Lessons from the Field
  28. Privacy-Preserving IR 2016
  29. De-identification of personal information
  30. Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb
  31. The Prevalence of Encoded Digital Trace Evidence in the Nonfile Space of Computer Media,,
  32. Can We Sniff Wi-Fi?: Implications of Joffe v. Google
  33. Leaking Sensitive Information in Complex Document Files--and How to Prevent It
  34. Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus
  35. Detecting threatening insiders with lightweight media forensics
  36. Language translation for file paths
  37. Digital media triage with bulk data analysis and bulk_extractor
  38. Digital Forensics
  39. Distinct Sector Hashes for Target File Detection
  40. A general strategy for differential forensic analysis
  41. Lessons learned writing digital forensics tools and managing a 30TB digital evidence corpus
  42. The cybersecurity risk
  43. Digital forensics XML and the DFXML toolset
  44. Column: Factors Affecting Data Decay
  45. Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus
  46. Operations with Degraded Security
  47. Forensic carving of network packets and associated data structures
  48. Extending digital repository architectures to support disk image preservation and access
  49. Column: Every Last Byte
  50. Column: File Cabinet Forensics
  51. An Automated Solution to the Multiuser Carved Data Ascription Problem
  52. Wouldn't it be nice to have software labels
  53. CS expertise for institutional review boards
  54. Digital forensics research: The next 10 years
  55. Using purpose-built functions and block hashes to enable small block and sub-file forensics
  56. Institutional review boards and your research
  57. Global Analysis of Drive File Times
  58. Bringing science to digital forensics with standardized forensic corpora
  59. Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow
  60. File Fragment Classification-The Case for Specialized Approaches
  61. Automating Disk Forensic Processing with SleuthKit, XML and Python
  62. New XML-Based Files Implications for Forensics
  63. Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools
  64. Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage
  65. Information Of The World, Unite!
  66. Amazon S3 for science grids
  67. Sharp Figures, Fuzzy Purpose
  68. Document & Media Exploitation
  69. Carving contiguous and fragmented files with fast object validation
  70. Bitfrost
  71. Complete delete vs. time machine computing
  72. Guest Editors' Introduction: Data Surveillance
  73. Forensic feature extraction and cross-drive analysis
  74. Do security toolbars actually prevent phishing attacks?
  75. Standardizing digital evidence storage
  76. AFF
  77. Advanced Forensic Format: an Open Extensible Format for Disk Imaging
  78. Issues in Automatic Provenance Collection
  79. One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique
  80. RFID Privacy: An Overview of Problems and Proposed Solutions
  81. How to make secure email easier to use
  82. Johnny 2
  83. Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce
  84. Guest Editors' Introduction: Secure or Usable?
  85. Interface
  86. Email-based identification and authentication: an alternative to PKI?
  87. Leaderless resistance today
  88. Remembrance of data passed: a study of disk sanitization practices
  89. My net connection approaches light speed with cable, but that doesn't guarantee victory over DSL
  90. Public key cryptography
  91. Risks of social security numbers
  92. NeXTSTEP™ PROGRAMMING
  93. Viewpoint
  94. AIDS and the Soundex Code