default search action
Simson L. Garfinkel
Person information
- affiliation: U.S. Department of Homeland Security, Washington, DC, USA
- affiliation: U.S. Census Bureau, Center for Disclosure Avoidance Research, Suitland, MD, USA
- affiliation: National Institute of Standards and Technology, Gaithersberg, MD, USA
- affiliation: Naval Postgraduate School, Washington, DC, USA
- affiliation: Massachusetts Institute of Technology, CSAIL, Cambridge, MA, USA
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j63]Simson L. Garfinkel, Eugene H. Spafford:
In Memoriam: Niklaus Wirth. Commun. ACM 67(3): 20 (2024) - [j62]Simson L. Garfinkel, Eugene H. Spafford:
In Memoriam: Gordon Bell. Commun. ACM 67(7): 17 (2024) - 2023
- [j61]Simson L. Garfinkel, Eugene H. Spafford:
In Memoriam: Frederick P. Brooks, Jr. 1931-2022. Commun. ACM 66(1): 21-22 (2023) - [j60]Simson L. Garfinkel, Eugene H. Spafford:
In Memoriam: William A. Wulf. Commun. ACM 66(6): 20-23 (2023) - [j59]Simson L. Garfinkel, Jon Stewart:
Sharpening Your Tools. Commun. ACM 66(8): 44-52 (2023) - [j58]Simson L. Garfinkel, Jon Stewart:
Sharpening Your Tools: Updating bulk_extractor for the 2020s. ACM Queue 21(1): 30-56 (2023) - [i7]John M. Abowd, Tamara Adams, Robert Ashmead, David Darais, Sourya Dey, Simson L. Garfinkel, Nathan Goldschlag, Daniel Kifer, Philip Leclerc, Ethan Lew, Scott Moore, Rolando A. Rodríguez, Ramy N. Tadros, Lars Vilhuber:
The 2010 Census Confidentiality Protections Failed, Here's How and Why. CoRR abs/2312.11283 (2023) - 2022
- [j57]Simson L. Garfinkel, Eugene H. Spafford:
In memoriam: Juris Hartmanis 1928-2022. Commun. ACM 65(10): 14-15 (2022) - [i6]John M. Abowd, Robert Ashmead, Ryan Cumings-Menon, Simson L. Garfinkel, Micah Heineck, Christine Heiss, Robert Johns, Daniel Kifer, Philip Leclerc, Ashwin Machanavajjhala, Brett Moran, William Sexton, Matthew Spence, Pavel Zhuravlev:
The 2020 Census Disclosure Avoidance System TopDown Algorithm. CoRR abs/2204.08986 (2022) - [i5]Simson L. Garfinkel, Jonathan Stewart:
Sharpening Your Tools: Updating bulk_extractor for the 2020s. CoRR abs/2208.01639 (2022) - 2021
- [j56]Simson L. Garfinkel, Eugene H. Spafford:
Edmund M. Clarke (1945 - 2020). Commun. ACM 64(3): 23-24 (2021) - [j55]Simson L. Garfinkel, Eugene H. Spafford:
Jack Minker (1927 - 2021). Commun. ACM 64(6): 17 (2021) - [j54]Simson L. Garfinkel, Eugene H. Spafford:
Charles M. Geschke (1939-2021). Commun. ACM 64(7): 22 (2021) - [c29]John M. Abowd, Robert Ashmead, Ryan Cumings-Menon, Simson L. Garfinkel, Daniel Kifer, Philip Leclerc, William Sexton, Ashley Simpson, Christine Task, Pavel Zhuravlev:
An Uncertainty Principle is a Price of Privacy-Preserving Microdata. NeurIPS 2021: 11883-11895 - [i4]John M. Abowd, Robert Ashmead, Ryan Cumings-Menon, Simson L. Garfinkel, Daniel Kifer, Philip Leclerc, William Sexton, Ashley Simpson, Christine Task, Pavel Zhuravlev:
An Uncertainty Principle is a Price of Privacy-Preserving Microdata. CoRR abs/2110.13239 (2021) - 2020
- [j53]Simson L. Garfinkel, Eugene H. Spafford:
Fran Allen: 1932-2020. Commun. ACM 63(10): 18-19 (2020) - [j52]Simson L. Garfinkel:
SIGINFO: Everything Is a Punch Card. login Usenix Mag. 45(3) (2020) - [j51]Simson L. Garfinkel:
SIGINFO: The Tricky Cryptographic Hash Function. login Usenix Mag. 45(4) (2020) - [c28]Simson L. Garfinkel, Philip Leclerc:
Randomness Concerns when Deploying Differential Privacy. WPES@CCS 2020: 73-86 - [i3]Simson L. Garfinkel, J. Spencer Love:
A File System For Write-Once Media. CoRR abs/2004.00402 (2020) - [i2]Simson L. Garfinkel, Philip Leclerc:
Randomness Concerns When Deploying Differential Privacy. CoRR abs/2009.03777 (2020)
2010 – 2019
- 2019
- [j50]Simson L. Garfinkel, John M. Abowd, Christian Martindale:
Understanding database reconstruction attacks on public data. Commun. ACM 62(3): 46-53 (2019) - 2018
- [j49]Simson L. Garfinkel, John M. Abowd, Christian Martindale:
Understanding Database Reconstruction Attacks on Public Data. ACM Queue 16(5): 50 (2018) - [c27]Simson L. Garfinkel, John M. Abowd, Sarah Powazek:
Issues Encountered Deploying Differential Privacy. WPES@CCS 2018: 133-137 - [i1]Simson L. Garfinkel, John M. Abowd, Sarah Powazek:
Issues Encountered Deploying Differential Privacy. CoRR abs/1809.02201 (2018) - 2017
- [j48]Simson L. Garfinkel, Jeanna N. Matthews, Stuart S. Shapiro, Jonathan M. Smith:
Toward algorithmic transparency and accountability. Commun. ACM 60(9): 5 (2017) - [j47]Adam Pridgen, Simson L. Garfinkel, Dan S. Wallach:
Picking up the trash: Exploiting generational GC for memory analysis. Digit. Investig. 20 Supplement: S20-S28 (2017) - [c26]Julie M. Haney, Simson L. Garfinkel, Mary Frances Theofanos:
Organizational practices in cryptographic development and testing. CNS 2017: 1-9 - [c25]Adam Pridgen, Simson L. Garfinkel, Dan S. Wallach:
Present but Unreachable: Reducing Persistentlatent Secrets in HotSpot JVM. HICSS 2017: 1-10 - [c24]Yasemin Acar, Michael Backes, Sascha Fahl, Simson L. Garfinkel, Doowon Kim, Michelle L. Mazurek, Christian Stransky:
Comparing the Usability of Cryptographic APIs. IEEE Symposium on Security and Privacy 2017: 154-171 - [c23]Christian Stransky, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Doowon Kim, Elissa M. Redmiles, Michael Backes, Simson L. Garfinkel, Michelle L. Mazurek, Sascha Fahl:
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. CSET @ USENIX Security Symposium 2017 - 2016
- [j46]Mary Theofanos, Simson L. Garfinkel, Yee-Yin Choong:
Secure and Usable Enterprise Authentication: Lessons from the Field. IEEE Secur. Priv. 14(5): 14-21 (2016) - [c22]Grace Hui Yang, Ian Soboroff, Li Xiong, Charles L. A. Clarke, Simson L. Garfinkel:
Privacy-Preserving IR 2016: Differential Privacy, Search, and Social Media. SIGIR 2016: 1247-1248 - 2015
- [j45]Simson L. Garfinkel, Michael McCarrin:
Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb. Digit. Investig. 14 Supplement 1: S95-S105 (2015) - [j44]Simson L. Garfinkel:
The Expanding World of Digital Forensics. login Usenix Mag. 40(6) (2015) - 2014
- [b9]Simson L. Garfinkel, Heather Richter Lipford:
Usable Security: History, Themes, and Challenges. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2014, ISBN 978-3-031-01215-0 - [j43]Simson L. Garfinkel:
Leaking Sensitive Information in Complex Document Files-and How to Prevent It. IEEE Secur. Priv. 12(1): 20-27 (2014) - [j42]Simson L. Garfinkel, Michael McCarrin:
Can We Sniff Wi-Fi?: Implications of Joffe v. Google. IEEE Secur. Priv. 12(4): 22-28 (2014) - [c21]Carolina Zarate, Simson L. Garfinkel, Aubin Heffernan, Scott Horras, Kyle Gorak:
Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus. IFIP Int. Conf. Digital Forensics 2014: 117-132 - 2013
- [j41]Simson L. Garfinkel:
Digital media triage with bulk data analysis and bulk_extractor. Comput. Secur. 32: 56-72 (2013) - [j40]Neil C. Rowe, Riqui Schwamm, Simson L. Garfinkel:
Language translation for file paths. Digit. Investig. 10(Supplement): S78-S86 (2013) - [j39]Simson L. Garfinkel:
Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. J. Digit. Forensics Secur. Law 8(4): 65-68 (2013) - 2012
- [j38]Simson L. Garfinkel:
The cybersecurity risk. Commun. ACM 55(6): 29-32 (2012) - [j37]Joel Young, Kristina Foster, Simson L. Garfinkel, Kevin D. Fairbanks:
Distinct Sector Hashes for Target File Detection. Computer 45(12): 28-35 (2012) - [j36]Simson L. Garfinkel:
Digital forensics XML and the DFXML toolset. Digit. Investig. 8(3-4): 161-174 (2012) - [j35]Simson L. Garfinkel, Alex J. Nelson, Joel Young:
A general strategy for differential forensic analysis. Digit. Investig. 9(Supplement): S50-S59 (2012) - [j34]Simson L. Garfinkel:
Lessons learned writing digital forensics tools and managing a 30TB digital evidence corpus. Digit. Investig. 9(Supplement): S80-S89 (2012) - [j33]Kevin D. Fairbanks, Simson L. Garfinkel:
Column: Factors Affecting Data Decay. J. Digit. Forensics Secur. Law 7(2): 7-10 (2012) - [j32]Simson L. Garfinkel:
Programming Unicode. login Usenix Mag. 37(2) (2012) - 2011
- [j31]Robert Beverly, Simson L. Garfinkel, Greg Cardwell:
Forensic carving of network packets and associated data structures. Digit. Investig. 8(Supplement): S78-S89 (2011) - [j30]Simson L. Garfinkel, George W. Dinolt:
Operations with Degraded Security. IEEE Secur. Priv. 9(6): 43-48 (2011) - [j29]Neil C. Rowe, Simson L. Garfinkel, Robert Beverly, Panayotis A. Yannakogeorgos:
Challenges in Monitoring Cyberarms Compliance. Int. J. Cyber Warf. Terror. 1(2): 35-48 (2011) - [j28]Simson L. Garfinkel:
Column: Every Last Byte. J. Digit. Forensics Secur. Law 6(2): 7-8 (2011) - [j27]Simson L. Garfinkel:
Column: File Cabinet Forensics. J. Digit. Forensics Secur. Law 6(4): 7-10 (2011) - [c20]Neil C. Rowe, Simson L. Garfinkel:
Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus. ICDF2C 2011: 115-130 - [c19]Kam Woods, Christopher A. Lee, Simson L. Garfinkel:
Extending digital repository architectures to support disk image preservation and access. JCDL 2011: 57-66 - 2010
- [j26]Simson L. Garfinkel, Lorrie Faith Cranor:
Institutional review boards and your research. Commun. ACM 53(6): 38-40 (2010) - [j25]Simson L. Garfinkel, Alex J. Nelson, Douglas White, Vassil Roussev:
Using purpose-built functions and block hashes to enable small block and sub-file forensics. Digit. Investig. 7(Supplement): S13-S23 (2010) - [j24]Simson L. Garfinkel:
Digital forensics research: The next 10 years. Digit. Investig. 7(Supplement): S64-S73 (2010) - [j23]Simson L. Garfinkel, Aleatha Parker-Wood, Daniel Huynh, James J. Migletz:
An Automated Solution to the Multiuser Carved Data Ascription Problem. IEEE Trans. Inf. Forensics Secur. 5(4): 868-882 (2010) - [c18]Neil C. Rowe, Simson L. Garfinkel:
Global Analysis of Drive File Times. SADFE 2010: 97-108 - [c17]Elizabeth Fong, Paul E. Black, Richard F. Leslie, Simson L. Garfinkel, Larry Wagoner, Gary McGraw, Jeff Williams:
Wouldn't it be nice to have software labels. SIGAda 2010: 31-32
2000 – 2009
- 2009
- [j22]Simson L. Garfinkel, Paul F. Farrell Jr., Vassil Roussev, George W. Dinolt:
Bringing science to digital forensics with standardized forensic corpora. Digit. Investig. 6(Supplement): S2-S11 (2009) - [j21]Michael Cohen, Simson L. Garfinkel, Bradley L. Schatz:
Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow. Digit. Investig. 6(Supplement): S57-S68 (2009) - [j20]Simson L. Garfinkel, James J. Migletz:
New XML-Based Files Implications for Forensics. IEEE Secur. Priv. 7(2): 38-44 (2009) - [j19]Simson L. Garfinkel:
Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools. Int. J. Digit. Crime Forensics 1(1): 1-28 (2009) - [c16]Vassil Roussev, Simson L. Garfinkel:
File Fragment Classification-The Case for Specialized Approaches. SADFE 2009: 3-14 - [c15]Simson L. Garfinkel:
Automating Disk Forensic Processing with SleuthKit, XML and Python. SADFE 2009: 73-84 - [c14]Simson L. Garfinkel:
Invisible HCI-SEC: ways of re-architecting the operating system to increase usability and security. SOUPS 2009 - 2008
- [j18]Simson L. Garfinkel:
Sharp Figures, Fuzzy Purpose. IEEE Secur. Priv. 6(2): 5 (2008) - [c13]Paul F. Farrell Jr., Simson L. Garfinkel, Douglas White:
Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage. ACSAC 2008: 13-22 - [c12]Simson L. Garfinkel:
IRBs and Security Research: Myths, Facts and Mission Creep. UPSEC 2008 - 2007
- [j17]Simson L. Garfinkel:
Carving contiguous and fragmented files with fast object validation. Digit. Investig. 4(Supplement): 2-12 (2007) - [j16]Simson L. Garfinkel:
Document & Media Exploitation. ACM Queue 5(7): 22-30 (2007) - [j15]Simson L. Garfinkel:
Complete delete vs. time machine computing. ACM SIGOPS Oper. Syst. Rev. 41(1): 42-44 (2007) - [j14]Simson L. Garfinkel:
Commodity Grid Computing with Amazon's S3 and EC2. login Usenix Mag. 32(1) (2007) - [c11]Ivan Krstic, Simson L. Garfinkel:
Bitfrost: the one laptop per child security model. SOUPS 2007: 132-142 - 2006
- [j13]Simson L. Garfinkel:
AFF: a new format for storing hard drive images. Commun. ACM 49(2): 85-87 (2006) - [j12]Simson L. Garfinkel:
Forensic feature extraction and cross-drive analysis. Digit. Investig. 3(Supplement): 71-81 (2006) - [j11]Simson L. Garfinkel, Michael D. Smith:
Guest Editors' Introduction: Data Surveillance. IEEE Secur. Priv. 4(6): 15-17 (2006) - [c10]Min Wu, Robert C. Miller, Simson L. Garfinkel:
Do security toolbars actually prevent phishing attacks? CHI 2006: 601-610 - [c9]Simson L. Garfinkel, David J. Malan, Karl-Alexander Dubec, Christopher C. Stevens, Cecile Pham:
AFF: An Open Extensible Format for Disk Imaging. IFIP Int. Conf. Digital Forensics 2006: 13-27 - [c8]Uri Braun, Simson L. Garfinkel, David A. Holland, Kiran-Kumar Muniswamy-Reddy, Margo I. Seltzer:
Issues in Automatic Provenance Collection. IPAW 2006: 171-183 - [c7]Simson L. Garfinkel, David J. Malan:
One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique. Privacy Enhancing Technologies 2006: 135-151 - 2005
- [b8]Simson L. Garfinkel:
Design principles and patterns for computer systems that are simultaneously secure and usable. Massachusetts Institute of Technology, Cambridge, MA, USA, 2005 - [j10]Simson L. Garfinkel, Ari Juels, Ravikanth Pappu:
RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Secur. Priv. 3(3): 34-43 (2005) - [c6]Simson L. Garfinkel, David Margrave, Jeffrey I. Schiller, Erik Nordlander, Robert C. Miller:
How to make secure email easier to use. CHI 2005: 701-710 - [c5]Simson L. Garfinkel, Jeffrey I. Schiller, Erik Nordlander, David Margrave, Robert C. Miller:
Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce. Financial Cryptography 2005: 188-202 - [c4]Simson L. Garfinkel, Robert C. Miller:
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express. SOUPS 2005: 13-24 - 2004
- [j9]Lorrie Faith Cranor, Simson L. Garfinkel:
Guest Editors' Introduction: Secure or Usable? IEEE Secur. Priv. 2(5): 16-18 (2004) - [c3]Simson L. Garfinkel:
Used Disk Drives. LISA 2004 - 2003
- [b7]Simson L. Garfinkel, Gene Spafford, Alan Schwartz:
Practical Unix and internet security - securing Solaris, Mac OS X, Linux and FreeBSD: extensivley revised (3. ed.). O'Reilly 2003, ISBN 978-0-596-00323-4, pp. I-XXIX, 1-954 - [j8]Simson L. Garfinkel, Abhi Shelat:
IEEE Security & Privacy: Data Forensics - Rememberance of Data Passed: A Study of Disk Sanitization Practices. IEEE Distributed Syst. Online 4(2) (2003) - [j7]Simson L. Garfinkel:
Leaderless resistance today. First Monday 8(3) (2003) - [j6]Simson L. Garfinkel, Abhi Shelat:
Remembrance of Data Passed: A Study of Disk Sanitization Practices. IEEE Secur. Priv. 1(1): 17-27 (2003) - [j5]Simson L. Garfinkel:
Email-Based Identification and Authentication: An Alternative to PKI? IEEE Secur. Priv. 1(6): 20-26 (2003) - [c2]Simson L. Garfinkel:
Enabling Email Confidentiality through the use of Opportunistic Encryption. DG.O 2003 - 2002
- [b6]Simson L. Garfinkel, Michael K. Mahoney:
Building Cocoa applications - a step-by-step guide. O'Reilly 2002, ISBN 978-0-596-00235-0, pp. I-XXV, 1-620 - 2001
- [b5]Simson L. Garfinkel:
Database nation - the death of privacy in the 21th century. O'Reilly 2001, ISBN 978-0-596-00105-6, pp. I-VII, 1-326 - 2000
- [j4]Simson L. Garfinkel:
Database nation (book excerpts). Ubiquity 2000(February): 9 (2000) - [c1]Simson L. Garfinkel:
My net connection approaches light speed with cable, but that doesn't guarantee victory over DSL. CFP 2000: 129-135
1990 – 1999
- 1998
- [b4]Alan Schwartz, Simson L. Garfinkel:
Stopping spam - stamping out unwanted email and news postings. O'Reilly 1998, ISBN 978-1-56592-388-1, pp. I-X, 1-191 - 1997
- [b3]Simson L. Garfinkel, Gene Spafford:
Web security and commerce - risks, technologies, and strategies. O'Reilly 1997, ISBN 978-1-56592-269-3, pp. I-XX, 1-483 - [j3]Simson L. Garfinkel, Gene Spafford:
Cryptography and the Web. World Wide Web J. 2: 113-126 (1997) - [j2]Simson L. Garfinkel, Gene Spafford:
Secure CGI/API programming. World Wide Web J. 2: 187-200 (1997) - 1996
- [b2]Simson L. Garfinkel, Gene Spafford:
Practical UNIX and internet security (2. ed.). O'Reilly 1996, ISBN 978-1-56592-148-1, pp. I-XXIX, 1-971 - 1995
- [b1]Simson L. Garfinkel:
PGP - pretty good privacy: encryption for everyone (2. ed.). O'Reilly 1995, ISBN 978-1-56592-098-9, pp. I-XXXIII, 1-393 - [j1]Simson L. Garfinkel:
Risks of Social Security Numbers. Commun. ACM 38(10): 146 (1995)
Coauthor Index
aka: Gene Spafford
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint