<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>SPDR Lab Publications</title><description>Publications from the SPDR Lab</description><link>https://spdr.cc.gatech.edu/</link><item><title>Security and Privacy Analysis of Tile&apos;s Location Tracking Protocol</title><link>https://arxiv.org/abs/2510.00350</link><guid isPermaLink="true">https://arxiv.org/abs/2510.00350</guid><description>Work by Akshaya Kumar, Anna Raymaker, Michael Specter. At 35th USENIX Security Symposium (USENIX Security 26).</description><pubDate>Thu, 01 Jan 2026 00:00:00 GMT</pubDate></item><item><title>Papers, Please: A First Look at Age Verification on the Web</title><link>https://mikespecter.com/assets/pdf/AgeVerification.pdf</link><guid isPermaLink="true">https://mikespecter.com/assets/pdf/AgeVerification.pdf</guid><description>Work by Shreyas Minocha, Isaac Sheridan, Harry Oppenheimer, Paul Pearce, Michael A. Specter. At 2026 IEEE Symposium on Security and Privacy.</description><pubDate>Thu, 01 Jan 2026 00:00:00 GMT</pubDate></item><item><title>Fingerprinting SDKs for Mobile Apps and Where to Find Them: Understanding the Market for Device Fingerprinting</title><link>https://arxiv.org/abs/2506.22639</link><guid isPermaLink="true">https://arxiv.org/abs/2506.22639</guid><description>Work by Michael A. Specter, Mihai Christodorescu, Abbie Farr, Bo Ma, Robin Lassonde. At Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS `25).</description><pubDate>Wed, 01 Jan 2025 00:00:00 GMT</pubDate></item><item><title>Robust, Privacy-Preserving, Transparent, and Auditable On-Device Blocklisting</title><link>http://arxiv.org/abs/2304.02810</link><guid isPermaLink="true">http://arxiv.org/abs/2304.02810</guid><description>Work by Kurt Thomas, Sarah Meiklejohn, Michael A. Specter, Xiang Wang, Xavier Llorà, Stephan Somogyi, David Kleidermacher.</description><pubDate>Mon, 01 Jan 2024 00:00:00 GMT</pubDate></item><item><title>Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries</title><link>https://spdr.cc.gatech.edu/#publications</link><guid isPermaLink="true">https://spdr.cc.gatech.edu/#publications</guid><description>Work by Jenny Blessing, Michael A. Specter, Daniel J. Weitzner. At Proceedings of the 19th ACM Asia Conference on Computer and Communications Security.</description><pubDate>Mon, 01 Jan 2024 00:00:00 GMT</pubDate></item><item><title>A systematization of voter registration security</title><link>https://doi.org/10.1093/cybsec/tyad008</link><guid isPermaLink="true">https://doi.org/10.1093/cybsec/tyad008</guid><description>Work by Jack Cable, Andrés Fábrega, Sunoo Park, Michael A. Specter. At Journal of Cybersecurity.</description><pubDate>Thu, 01 Jun 2023 00:00:00 GMT</pubDate></item><item><title>The Android Platform Security Model (2023)</title><link>http://arxiv.org/abs/1904.05572</link><guid isPermaLink="true">http://arxiv.org/abs/1904.05572</guid><description>Work by René Mayrhofer, Jeffrey Vander Stoep, Chad Brubaker, Dianne Hackborn, Bram Bonné, Güliz Seray Tuncay, Roger Piqueras Jover, Michael A. Specter.</description><pubDate>Sun, 01 Jan 2023 00:00:00 GMT</pubDate></item><item><title>Going from bad to worse: from Internet voting to blockchain voting </title><link>https://doi.org/10.1093/cybsec/tyaa025</link><guid isPermaLink="true">https://doi.org/10.1093/cybsec/tyaa025</guid><description>Work by Sunoo Park, Michael A. Specter, Neha Narula, Ronald L Rivest. At Oxford Journal of Cybersecurity.</description><pubDate>Mon, 01 Feb 2021 00:00:00 GMT</pubDate></item><item><title>Security Analysis of the Democracy Live Online Voting  System</title><link>https://spdr.cc.gatech.edu/#publications</link><guid isPermaLink="true">https://spdr.cc.gatech.edu/#publications</guid><description>Work by Michael A. Specter, J. Alex Halderman. At 30th USENIX Security Symposium (USENIX Security 21).</description><pubDate>Fri, 01 Jan 2021 00:00:00 GMT</pubDate></item><item><title>KeyForge: Mitigating Email Breaches with Forward- Forgeable Signatures</title><link>https://www.usenix.org/conference/usenixsecurity21/presentation/specter-keyforge</link><guid isPermaLink="true">https://www.usenix.org/conference/usenixsecurity21/presentation/specter-keyforge</guid><description>Work by Michael A. Specter, Sunoo Park, Matthew Green. At 30th USENIX Security Symposium (USENIX Security 21).</description><pubDate>Fri, 01 Jan 2021 00:00:00 GMT</pubDate></item><item><title>The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in US Federal Elections</title><link>https://www.usenix.org/conference/usenixsecurity20/presentation/specter</link><guid isPermaLink="true">https://www.usenix.org/conference/usenixsecurity20/presentation/specter</guid><description>Work by Michael A. Specter, James Koppel, Daniel Weitnzer. At 29th USENIX Security Symposium (USENIX Security 20).</description><pubDate>Wed, 01 Jan 2020 00:00:00 GMT</pubDate></item><item><title>The PACT Protocol Specification</title><link>https://spdr.cc.gatech.edu/#publications</link><guid isPermaLink="true">https://spdr.cc.gatech.edu/#publications</guid><description>Work by Ronald L. Rivest, Jon Callas, Ran Canetti, Kevin Esvelt, Daniel Kahn Gillmor, Yael Tauman Kalai, Anna Lysyanskaya, Adam Norige, Ramesh Raskar, Adi Shamir, Israel Shen, Michael A. Specter, Vanessa Teague, Ari Trachtenberg, Mayank Varia, Marc Viera, Daniel Weitzner, John Wilkinson, Marc Zissman.</description><pubDate>Wed, 01 Jan 2020 00:00:00 GMT</pubDate></item><item><title>Explaining Explanations: An Overview of Interpretability of Machine Learning</title><link>https://spdr.cc.gatech.edu/#publications</link><guid isPermaLink="true">https://spdr.cc.gatech.edu/#publications</guid><description>Work by Leilani H. Gilpin, David Bau, Ben Z. Yuan, Ayesha Bajwa, Michael A. Specter, Lalana Kagal. At 2018 IEEE 5th International Conference on data science and advanced analytics (DSAA).</description><pubDate>Mon, 01 Jan 2018 00:00:00 GMT</pubDate></item><item><title>Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications</title><link>https://spdr.cc.gatech.edu/#publications</link><guid isPermaLink="true">https://spdr.cc.gatech.edu/#publications</guid><description>Work by Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner. At Journal of Cybersecurity.</description><pubDate>Thu, 01 Jan 2015 00:00:00 GMT</pubDate></item><item><title>Security Analysis of Wearable Fitness Devices (Fitbit)</title><link>https://spdr.cc.gatech.edu/#publications</link><guid isPermaLink="true">https://spdr.cc.gatech.edu/#publications</guid><description>Work by Britt Cyr, Webb Horn, Daniela Miao, Michael A. Specter. At Massachusetts Institute of Technology.</description><pubDate>Wed, 01 Jan 2014 00:00:00 GMT</pubDate></item></channel></rss>