Joseph Bonneau

ORCID: 0000-0002-6349-0145
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • User Authentication and Security Systems
  • Cryptography and Data Security
  • Blockchain Technology Applications and Security
  • Internet Traffic Analysis and Secure E-voting
  • Spam and Phishing Detection
  • Advanced Malware Detection Techniques
  • Privacy, Security, and Data Protection
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Advanced Steganography and Watermarking Techniques
  • Biometric Identification and Security
  • Security and Verification in Computing
  • Distributed systems and fault tolerance
  • Advanced Authentication Protocols Security
  • Cybersecurity and Cyber Warfare Studies
  • Personal Information Management and User Behavior
  • Peer-to-Peer Network Technologies
  • Intelligence, Security, War Strategy
  • Cryptographic Implementations and Security
  • Crime, Illicit Activities, and Governance
  • Complex Network Analysis Techniques
  • Psychedelics and Drug Studies
  • Access Control and Trust
  • Sexuality, Behavior, and Technology
  • Network Security and Intrusion Detection

New York University
2017-2024

Courant Institute of Mathematical Sciences
2024

Ithaca College
2023

State Key Laboratory of Cryptology
2023

Princeton University
2011-2021

Stanford University
2006-2017

Frontier Science & Technology Research Foundation
2015-2016

Palo Alto University
2015

University of Wisconsin–Madison
2015

University of Cambridge
2009-2014

Bit coin has emerged as the most successful cryptographic currency in history. Within two years of its quiet launch 2009, grew to comprise billions dollars economic value despite only cursory analysis system's design. Since then a growing literature identified hidden-but-important properties system, discovered attacks, proposed promising alternatives, and singled out difficult future challenges. Meanwhile large vibrant open-source community deployed numerous modifications extensions. We...

10.1109/sp.2015.14 article EN IEEE Symposium on Security and Privacy 2015-05-01

We evaluate two decades of proposals to replace text passwords for general-purpose user authentication on the web using a broad set twenty-five usability, deployability and security benefits that an ideal scheme might provide. The scope we survey is also extensive, including password management software, federated login protocols, graphical schemes, cognitive one-time passwords, hardware tokens, phone-aided schemes biometrics. Our comprehensive approach leads key insights about difficulty...

10.1109/sp.2012.44 article EN IEEE Symposium on Security and Privacy 2012-05-01

We report on the largest corpus of user-chosen passwords ever studied, consisting anonymized password histograms representing almost 70 million Yahoo! users, mitigating privacy concerns while enabling analysis dozens subpopulations based demographic factors and site usage characteristics. This large data set motivates a thorough statistical treatment estimating guessing difficulty by sampling from secret distribution. In place previously used metrics such as Shannon entropy entropy, which...

10.1109/sp.2012.49 article EN IEEE Symposium on Security and Privacy 2012-05-01

Today's Internet services rely heavily on text-based passwords for user authentication.The pervasiveness of these coupled with the difficulty remembering large numbers secure tempts users to reuse at multiple sites.In this paper, we investigate first time how an attacker can leverage a known password from one site more easily guess that user's other sites.We study several hundred thousand leaked eleven web sites and conduct survey reuse; estimate 43-51% same across further identify few...

10.14722/ndss.2014.23357 article EN 2014-01-01

Preventing adversaries from compiling significant amounts of user data is a major challenge for social network operators. We examine the difficulty collecting profile and graph information popular networking Website Facebook report two findings. First, we describe several novel ways in which can be extracted by third parties. Second, demonstrate efficiency these methods on crawled data. Our findings highlight how current protection personal inconsistent with user's expectations privacy.

10.1109/asonam.2009.45 article EN 2009-07-01

Theory on passwords has lagged practice, where large providers use back-end smarts to survive with imperfect technology.

10.1145/2699390 article EN Communications of the ACM 2015-06-25

The computer security community has advocated widespread adoption of secure communication tools to counter mass surveillance. Several popular personal (e.g., WhatsApp, iMessage) have adopted end-to-end encryption, and many new Signal, Telegram) been launched with as a key selling point. However it remains unclear if users understand what protection these offer, they value that protection. In this study, we interviewed 60 participants about their experience different perceptions the tools'...

10.1109/sp.2017.65 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2017-05-01

Motivated by recent revelations of widespread state surveillance personal communication, many solutions now claim to offer secure and private messaging. This includes both a large number new projects widely adopted tools that have added security features. The intense pressure in the past two years deliver quickly has resulted varying threat models, incomplete objectives, dubious claims, lack broad perspective on existing cryptographic literature communication. In this paper, we evaluate...

10.1109/sp.2015.22 article EN IEEE Symposium on Security and Privacy 2015-05-01

The popular social networking website Facebook exposes a "public view" of user profiles to search engines which includes eight the user's friendship links.We examine what interesting properties complete graph can be inferred from this public view.In experiments on real network data, we were able accurately approximate degree and centrality nodes, compute small dominating sets, find short paths between users, detect community structure.This work demonstrates that it is difficult safely reveal...

10.1145/1578002.1578005 article EN 2009-03-31

We have conducted the first in-depth empirical study of two important new web security features: strict transport (HSTS) and public-key pinning.Both been added to platform harden HTTPS, prevailing standard for secure browsing.While HSTS is further along, both features still very limited deployment at a few large websites long tail small, security-conscious sites.We find evidence that many developers do not completely understand these features, with substantial portion using them in invalid...

10.14722/ndss.2015.23162 article EN 2015-01-01
Coming Soon ...