See my Google Scholar for more up-to-date details, or my full CV.

  1. arxiv
    Robust, Privacy-Preserving, Transparent, and Auditable On-Device Blocklisting
    Kurt Thomas, Sarah Meiklejohn, Michael A. Specter, Xiang Wang, Xavier Llorà, Stephan Somogyi, and David Kleidermacher
    Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries
    Jenny Blessing, Michael A. Specter, and Daniel J. Weitzner
    In Proceedings of the 19th ACM Asia Conference on Computer and Communications Security , 2024
  3. arxiv
    The Android Platform Security Model (2023)
    René Mayrhofer, Jeffrey Vander Stoep, Chad Brubaker, Dianne Hackborn, Bram Bonné, Güliz Seray Tuncay, Roger Piqueras Jover, and Michael A. Specter
  4. Oxford JoC
    A systematization of voter registration security
    Jack Cable, Andrés Fábrega, Sunoo Park, and Michael A. Specter
    Journal of Cybersecurity, Jun 2023
  5. Oxford JoC
    Going from bad to worse: from Internet voting to blockchain voting
    Sunoo Park, Michael A. Specter, Neha Narula, and Ronald L Rivest
    Oxford Journal of Cybersecurity, Feb 2021
    Security Analysis of the Democracy Live Online Voting System
    Michael A. Specter, and J. Alex Halderman
    In 30th USENIX Security Symposium (USENIX Security 21) , Feb 2021
    KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures
    Michael A. Specter, Sunoo Park, and Matthew Green
    In 30th USENIX Security Symposium (USENIX Security 21) , Feb 2021
    The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in US Federal Elections
    Michael A. Specter, James Koppel, and Daniel Weitnzer
    In 29th USENIX Security Symposium (USENIX Security 20) , Feb 2020
  9. PACT
    The PACT Protocol Specification
    Ronald L. Rivest, Jon Callas, Ran Canetti, Kevin Esvelt, Daniel Kahn Gillmor, Yael Tauman Kalai, Anna Lysyanskaya, Adam Norige, Ramesh Raskar, Adi Shamir, Israel Shen, Michael A. Specter, Vanessa Teague, Ari Trachtenberg, Mayank Varia, and 4 more authors
    Feb 2020
  10. The Economics of Cryptographic Trust: Understanding Certificate Authorities
    Michael A. Specter
    Massachusetts Institute of Technology , Feb 2016
  11. CACM
    Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications
    Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I Schiller, Bruce Schneier, Michael A. Specter, and Daniel J. Weitzner
    Journal of Cybersecurity, Feb 2015
    Published in: Oxford University Press, and the Communications of the ACM
    Names listed alphabetically.
    Press: The New York Times, TechCrunch, Ars Technica, MIT Technology Review, Cited by Congresswoman Anna Eshoo & Senator Ron Wyden,
  12. Security Analysis of Wearable Fitness Devices (Fitbit)
    Britt Cyr, Webb Horn, Daniela Miao, and Michael A. Specter
    Massachusetts Institute of Technology, Feb 2014
  13. DSAA
    Explaining Explanations: An Overview of Interpretability of Machine Learning
    Leilani H. Gilpin, David Bau, Ben Z. Yuan, Ayesha Bajwa, Michael A. Specter, and Lalana Kagal
    In 2018 IEEE 5th International Conference on data science and advanced analytics (DSAA) , Feb 2014
    Acceptance Rate: 20%