fbpx
Wikipedia

Edward Felten

Edward William Felten (born March 25, 1963) is the Robert E. Kahn Professor of Computer Science and Public Affairs at Princeton University, where he was also the Director of the Center for Information Technology Policy from 2007 to 2015 and from 2017 to 2019.[2] On November 4, 2010, he was named Chief Technologist for the Federal Trade Commission,[3] a position he officially assumed January 3, 2011. On May 11, 2015, he was named the Deputy U.S. Chief Technology Officer.[4]

Edward William Felten
Edward Felten at Princeton University
Born (1963-03-25) March 25, 1963 (age 59)
CitizenshipAmerican
Alma materCalifornia Institute of Technology (B.S.)
University of Washington (M.S., Ph.D.)
Known forSecure Digital Music Initiative
AwardsEFF Pioneer Award[1]
Scientific career
FieldsComputer Science
public affairs
InstitutionsPrinceton University, Federal Trade Commission
Doctoral advisorEdward D. Lazowska and John Zahorjan

Felten has done a variety of computer security research, including groundbreaking work on proof-carrying authentication and work on security related to the Java programming language, but he is perhaps best known for his paper on the Secure Digital Music Initiative (SDMI) challenge.

Biography

Felten attended the California Institute of Technology and graduated with a degree in Physics in 1985. He worked as a staff programmer at Caltech from 1986 to 1989 on a parallel supercomputer project at Caltech. He then enrolled as a graduate student in Computer Science at the University of Washington. He was awarded a Master of Science degree in 1991 and a Ph.D in 1993. His Ph.D. thesis was on developing an automated protocol for communication between parallel processors.

In 1993, he joined the faculty of Princeton University in the Department of Computer Science as an Assistant Professor. He was promoted to Associate Professor in 1999 and to Professor in 2003. In 2006, he joined the Woodrow Wilson School of Public and International Affairs, but computer science remains his home department. In 2005, he became the Director of the Center for Information and Technology Policy at Princeton. He has served as a consultant to law firms, corporations, private foundations, and government agencies. His research involves computer security, and technology policy.[5]

He lives in Princeton, New Jersey with his family. From 2006 to 2010, he was a member of the board of the Electronic Frontier Foundation (EFF). In 2007, he was inducted as a Fellow of the Association for Computing Machinery.

In November 2010, he was named Chief Technologist of the Federal Trade Commission.[6]

In 2013, Felton was elected a member of the National Academy of Engineering for contributions to security of computer systems, and for impact on public policy.

On May 11, 2015, he was named Deputy U.S. Chief Technology Officer for The White House.[7]

United States v. Microsoft

Felten was a witness for the United States government in United States v. Microsoft, where the software company was charged with committing a variety of antitrust crimes. During the trial, Microsoft's attorneys denied that it was possible to remove the Internet Explorer web browser from a Windows 98 equipped computer without significantly impairing the operation of Windows.

Citing research he had undertaken with Christian Hicks and Peter Creath, two of his former students,[8] Felten testified that it was possible to remove Internet Explorer functionality from Windows without causing any problems with the operating system. He demonstrated his team's tool in court, showing 19 ways in which it is normally possible to access the web browser from the Windows platform that his team's tool rendered inaccessible.

Microsoft argued that Felten's changes did not truly remove Internet Explorer but only made its functionality inaccessible to the end user by removing icons, shortcuts and the iexplore.exe executable file, and making changes to the system registry. This led to a debate as to what exactly constitutes the "web browser," since much of the core functionality of Internet Explorer is stored in a shared dynamic-link library, accessible to any program running under Windows.

Microsoft also argued that Felten's tool did not even completely remove web-browsing capability from the system since it was still possible to access the web through other Windows executables besides iexplore.exe, such as the Windows help system.

The SDMI challenge

As part of a contest in 2000, SDMI (Secure Digital Music Initiative) invited researchers and others to try to break the digital audio watermark technologies that they had devised. In a series of individual challenges, the participants were given a sample audio piece, with one of the watermarks embedded. If the participants sent back the sample with the watermark removed (and with less than an acceptable amount of signal loss, though this condition was not stated by SDMI), they would win that particular challenge.

Felten was an initial participant of the contest. He chose to opt out of confidentiality agreements that would have made his team eligible for the cash prize. Despite being given very little or no information about the watermarking technologies other than the audio samples and having only three weeks to work with them, Felten and his team managed to modify the files sufficiently that SDMI's automated judging system declared the watermark removed.

SDMI did not accept that Felten had successfully broken the watermark according to the rules of the contest, noting that there was a requirement for files to lose no sound quality. SDMI claimed that the automated judging result was inconclusive, as a submission which simply wiped all the sounds off the file would have successfully removed the watermark but would not meet the quality requirement.

SDMI lawsuits

Felten's team developed a scientific paper explaining the methods used by his team in defeating the SDMI watermarks. Planning to present the paper at the Fourth International Information Hiding Workshop of 2001 in Pittsburgh, Felten was threatened with legal action by SDMI,[9] the Recording Industry Association of America (RIAA), and Verance Corporation, under the terms of the DMCA, on the argument that one of the technologies his team had broken was currently in use in the market. Felten withdrew the presentation from the workshop, reading a brief statement about the threats instead. SDMI and other copyright holders denied that they had ever threatened to sue Felten. However, SDMI appears to have threatened legal action when spokesman Matt Oppenheim warned Felten in a letter that "any disclosure of information gained from participating in the Public Challenge....could subject you and your research team to actions under the Digital Millennium Copyright Act.".[10]

Felten, with help from the Electronic Frontier Foundation, sued the groups, requesting a declaratory judgement ruling that their publication of the paper would be legal. The case was dismissed for a lack of standing.[11]

Felten presented his paper at the USENIX security conference in 2001.[12] The United States Department of Justice has offered Felten and other researchers assurances that the DMCA does not threaten their work and stated that the legal threats against them were invalid.

Sony rootkit investigation

The 2005 Sony BMG CD copy protection scandal started when security researcher Mark Russinovich revealed on October 31, 2005 that Sony's Extended Copy Protection ("XCP") copy protection software on the CD Get Right with the Man by Van Zant contained hidden files that could damage the operating system, install spyware and make the user's computer vulnerable to attack when the CD was played on a Microsoft Windows-based PC. Sony then released a software patch to remove XCP.

On November 15, 2005, Felten and J. Alex Halderman showed that Sony's method for removing XCP copy protection software from the computer makes it more vulnerable to attack, as it essentially installed a rootkit, in the form of an Active X control used by the uninstaller, and left it on the user's machine and set so as to allow any web page visited by the user to execute arbitrary code. Felten and Halderman described the problem in a blog post:

The consequences of the flaw are severe, it allows any Web page you visit to download, install, and run any code it likes on your computer. Any Web page can seize control of your computer; then it can do anything it likes. That's about as serious as a security flaw can get.[13]

Diebold voting machine analysis

On September 13, 2006, Felten and graduate students Ariel Feldman and Alex Halderman discovered severe security flaws in a Diebold Election Systems (now Premier Election Solutions) voting machine. Their findings claimed, "Malicious software running on a single voting machine can steal votes with little if any risk of detection. The malicious software can modify all of the records, audit logs, and counters kept by the voting machine, so that even careful forensic examination of these records will find nothing amiss."[14][15][16][17][18]

Sequoia voting machine analysis

In early 2008, New Jersey election officials announced that they planned to send one or more Sequoia Advantage voting machines to Ed Felten and Andrew Appel (also of Princeton University) for analysis. In March 2008, Sequoia sent an e-mail to Professor Felten asserting that allowing him to examine Sequoia voting machines would violate the license agreement between Sequoia and the county which bought them, and also that Sequoia would take legal action "to stop [...] any non-compliant analysis, [...] publication of Sequoia software, its behavior, reports regarding same or any other infringement of our intellectual property." [19] This action sparked outrage among computer technology activists.[20][21]

After examining Sequoia's machines, Felten and Appel indeed discovered grave problems with the accuracy of the machines.[22] They also demonstrated that the machines can be hacked and compromised within minutes.[23]

Shortly after that, Sequoia's corporate Web site was hacked. The hack was first discovered by Ed Felten. Sequoia took its Web site down on 20 March and removed the "intrusive content."[24]

Cold boot attack

In February 2008, Felten and his students were part of the team that discovered the cold boot attack, which allows someone with physical access to a computer to bypass operating system protections and extract the contents of its memory.[25]

Federal Trade Commission

In November 2010, Felten was named the first Chief Technologist of the Federal Trade Commission,[26] for which he took a one-year leave of absence from Princeton University.[27]

Awards

References

  1. ^ Electronic Frontier Foundation Announces Pioneer Award Winners 2010-11-11 at the Wayback Machine EFF, 2005
  2. ^ "Edward W. Felten | Center for Information Technology Policy". Retrieved 2020-05-28.
  3. ^ "FTC Names Edward W. Felten as Agency's Chief Technologist; Eileen Harrington as Executive Director". 4 November 2010.
  4. ^ www.whitehouse.gov
  5. ^ Felten, Edward. "Edward Felten's Curriculum Vitae" (PDF). Retrieved 2008-05-19.
  6. ^ "FTC Names Edward W. Felten as Agency's Chief Technologist; Eileen Harrington as Executive Director". Federal Trade Commission. 2010-11-04. Retrieved 2010-11-04.
  7. ^ "The White House Names Dr. Ed Felten as Deputy U.S. Chief Technology Officer". whitehouse.gov. 2015-05-11. Retrieved 2015-05-11 – via National Archives.
  8. ^ Wasserman, Elizabeth (April 26, 2001). "Security Code-Cracking Professor Pulls 'How-To' Paper". The Industry Standard. Retrieved 2007-05-07.
  9. ^ Oppenheim, Matthew J. (April 9, 2001). . Electronic Frontier Foundation. Archived from the original on April 14, 2007. Retrieved 2007-05-07.
  10. ^ Greene, Thomas C. (April 23, 2001). "SDMI cracks revealed". Security. The Register. Retrieved 2007-05-07.
  11. ^ "Final Hearing Transcript, Felten v. RIAA". Electronic Frontier Foundation. November 28, 2001. Retrieved 2007-05-07.
  12. ^ Craver, Scott A.; Wu, Min; Liu, Bede; Stubbenfield, Adam; Swartzlander, Ben; Wallach, Dan S.; Dean, Drew; Felton, Edward W. (August 13–17, 2001). (PDF). Proceedings of the 10th USENIX Security Symposium. 10th USENIX Security Symposium. Washington, D.C., USA: USENIX Association. Archived from the original (PDF) on 21 May 2022. Retrieved 12 July 2022.{{cite conference}}: CS1 maint: date and year (link)
  13. ^ Felten, Edward; Alex Halderman (November 15, 2005). "Sony's Web-Based Uninstaller Opens a Big Security Hole; Sony to Recall Discs". Freedom to Tinker. Retrieved 2007-05-07.
  14. ^ Ariel J. Feldman; J. Alex Halderman; Edward W. Felten (September 13, 2006). (PDF). Princeton University. Archived from the original (PDF) on May 13, 2007. Retrieved 2007-05-07. {{cite journal}}: Cite journal requires |journal= (help)
  15. ^ Feldman, Ariel J.; Halderman, J. Alex; Felten, Edward W. (September 13, 2006). "Security Analysis of the Diebold AccuVote-TS Voting Machine". Center for Information Technology Policy. from the original on 2017-12-12. Retrieved 6 June 2021. Full research paper [PDF], Workshop version [PDF], Executive summary, Frequently Asked Questions, Our reply to Diebold's response, Demonstration Videos
  16. ^ CITP Princeton (2016-11-30). "Security Demonstration of DieBold AccuVote-TS Electronic Voting Machine". via: YouTube. Archived from the original on 2021-12-12. Retrieved 6 June 2021.
  17. ^ CITP Princeton (2016-12-01). "Access to Diebold AccuVote-TS Electronic Voting Machine - close up". via: YouTube. Archived from the original on 2021-12-12. Retrieved 6 June 2021.
  18. ^ CITP Princeton (2016-12-01). "Access Diebold AccuVote-TS Electronic Voting Machine - angle view". via: YouTube. Archived from the original on 2021-12-12. Retrieved 6 June 2021. No audio
  19. ^ Ed Felten (2008-03-17). "Interesting e-mail by Sequoia".
  20. ^ "E-Voting Firm Threatens Ed Felten If He Reviews Its E-Voting Machine". Techdirt. 2008-03-18.
  21. ^ Cory Doctorow (2008-03-17). "Sequoia Voting Systems threatens Felten's Princeton security research team". BoingBoing.
  22. ^ Ed Felten: NJ Election Discrepancies Worse Than Previously Thought, Contradict Sequoia's Explanation, Freedom To Tinker, April 4th, 2008.
  23. ^ Andrew Appel: Security Seals on AVC Advantage Voting Machines are Easily Defeated, Freedom To Tinker, December 19th, 2008.
  24. ^ Dee Chisamera (2008-03-21). . eFluxMedia. Archived from the original on 2009-04-06.
  25. ^ J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten (2008-02-21). . Princeton University. Archived from the original on July 22, 2011. Retrieved 2008-02-22. {{cite journal}}: Cite journal requires |journal= (help)CS1 maint: multiple names: authors list (link)
  26. ^ "FTC names Princeton computer security expert as first chief technologist". The Washington Post.
  27. ^ "Princeton prof. Edward Felten named FTC's first chief technologist". 4 November 2010.
  28. ^ "Edward W. Felten". American Academy of Arts & Sciences. Retrieved 2020-05-28.
  29. ^ "Professor Edward W. Felten". NAE Website. Retrieved 2020-05-28.

External links

  • Edward W. Felten at Princeton
  • Freedom to Tinker
  • Appearances on C-SPAN
  • . Case archive. EFF. 2001. Archived from the original on 2018-01-05. Retrieved 2017-07-28.
  • Verance Corporation
  • Lessig, Larry; Zittrain, Jonathan (Nov 1, 2002). "United States of America v. Microsoft". Antitrust. OpenLaw. Harvard Law School.
  • Halderman, J. Alex; Felten, Edward W. (Feb 14, 2006). "Lessons from the Sony CD DRM Episode" (PDF). (PDF) from the original on February 22, 2006.
  • Wilkinson, Will (Oct 9, 2008). "Conversation with Edward Felten" (Video). Bloggingheads.tv.

edward, felten, this, article, needs, additional, citations, verification, please, help, improve, this, article, adding, citations, reliable, sources, unsourced, material, challenged, removed, find, sources, news, newspapers, books, scholar, jstor, september, . This article needs additional citations for verification Please help improve this article by adding citations to reliable sources Unsourced material may be challenged and removed Find sources Edward Felten news newspapers books scholar JSTOR September 2020 Learn how and when to remove this template message Edward William Felten born March 25 1963 is the Robert E Kahn Professor of Computer Science and Public Affairs at Princeton University where he was also the Director of the Center for Information Technology Policy from 2007 to 2015 and from 2017 to 2019 2 On November 4 2010 he was named Chief Technologist for the Federal Trade Commission 3 a position he officially assumed January 3 2011 On May 11 2015 he was named the Deputy U S Chief Technology Officer 4 Edward William FeltenEdward Felten at Princeton UniversityBorn 1963 03 25 March 25 1963 age 59 CitizenshipAmericanAlma materCalifornia Institute of Technology B S University of Washington M S Ph D Known forSecure Digital Music InitiativeAwardsEFF Pioneer Award 1 Scientific careerFieldsComputer Sciencepublic affairsInstitutionsPrinceton University Federal Trade CommissionDoctoral advisorEdward D Lazowska and John ZahorjanFelten has done a variety of computer security research including groundbreaking work on proof carrying authentication and work on security related to the Java programming language but he is perhaps best known for his paper on the Secure Digital Music Initiative SDMI challenge Contents 1 Biography 2 United States v Microsoft 3 The SDMI challenge 3 1 SDMI lawsuits 4 Sony rootkit investigation 5 Diebold voting machine analysis 6 Sequoia voting machine analysis 7 Cold boot attack 8 Federal Trade Commission 9 Awards 10 References 11 External linksBiography EditFelten attended the California Institute of Technology and graduated with a degree in Physics in 1985 He worked as a staff programmer at Caltech from 1986 to 1989 on a parallel supercomputer project at Caltech He then enrolled as a graduate student in Computer Science at the University of Washington He was awarded a Master of Science degree in 1991 and a Ph D in 1993 His Ph D thesis was on developing an automated protocol for communication between parallel processors In 1993 he joined the faculty of Princeton University in the Department of Computer Science as an Assistant Professor He was promoted to Associate Professor in 1999 and to Professor in 2003 In 2006 he joined the Woodrow Wilson School of Public and International Affairs but computer science remains his home department In 2005 he became the Director of the Center for Information and Technology Policy at Princeton He has served as a consultant to law firms corporations private foundations and government agencies His research involves computer security and technology policy 5 He lives in Princeton New Jersey with his family From 2006 to 2010 he was a member of the board of the Electronic Frontier Foundation EFF In 2007 he was inducted as a Fellow of the Association for Computing Machinery In November 2010 he was named Chief Technologist of the Federal Trade Commission 6 In 2013 Felton was elected a member of the National Academy of Engineering for contributions to security of computer systems and for impact on public policy On May 11 2015 he was named Deputy U S Chief Technology Officer for The White House 7 United States v Microsoft EditFelten was a witness for the United States government in United States v Microsoft where the software company was charged with committing a variety of antitrust crimes During the trial Microsoft s attorneys denied that it was possible to remove the Internet Explorer web browser from a Windows 98 equipped computer without significantly impairing the operation of Windows Citing research he had undertaken with Christian Hicks and Peter Creath two of his former students 8 Felten testified that it was possible to remove Internet Explorer functionality from Windows without causing any problems with the operating system He demonstrated his team s tool in court showing 19 ways in which it is normally possible to access the web browser from the Windows platform that his team s tool rendered inaccessible Microsoft argued that Felten s changes did not truly remove Internet Explorer but only made its functionality inaccessible to the end user by removing icons shortcuts and the iexplore exe executable file and making changes to the system registry This led to a debate as to what exactly constitutes the web browser since much of the core functionality of Internet Explorer is stored in a shared dynamic link library accessible to any program running under Windows Microsoft also argued that Felten s tool did not even completely remove web browsing capability from the system since it was still possible to access the web through other Windows executables besides iexplore exe such as the Windows help system The SDMI challenge EditAs part of a contest in 2000 SDMI Secure Digital Music Initiative invited researchers and others to try to break the digital audio watermark technologies that they had devised In a series of individual challenges the participants were given a sample audio piece with one of the watermarks embedded If the participants sent back the sample with the watermark removed and with less than an acceptable amount of signal loss though this condition was not stated by SDMI they would win that particular challenge Felten was an initial participant of the contest He chose to opt out of confidentiality agreements that would have made his team eligible for the cash prize Despite being given very little or no information about the watermarking technologies other than the audio samples and having only three weeks to work with them Felten and his team managed to modify the files sufficiently that SDMI s automated judging system declared the watermark removed SDMI did not accept that Felten had successfully broken the watermark according to the rules of the contest noting that there was a requirement for files to lose no sound quality SDMI claimed that the automated judging result was inconclusive as a submission which simply wiped all the sounds off the file would have successfully removed the watermark but would not meet the quality requirement SDMI lawsuits Edit Felten s team developed a scientific paper explaining the methods used by his team in defeating the SDMI watermarks Planning to present the paper at the Fourth International Information Hiding Workshop of 2001 in Pittsburgh Felten was threatened with legal action by SDMI 9 the Recording Industry Association of America RIAA and Verance Corporation under the terms of the DMCA on the argument that one of the technologies his team had broken was currently in use in the market Felten withdrew the presentation from the workshop reading a brief statement about the threats instead SDMI and other copyright holders denied that they had ever threatened to sue Felten However SDMI appears to have threatened legal action when spokesman Matt Oppenheim warned Felten in a letter that any disclosure of information gained from participating in the Public Challenge could subject you and your research team to actions under the Digital Millennium Copyright Act 10 Felten with help from the Electronic Frontier Foundation sued the groups requesting a declaratory judgement ruling that their publication of the paper would be legal The case was dismissed for a lack of standing 11 Felten presented his paper at the USENIX security conference in 2001 12 The United States Department of Justice has offered Felten and other researchers assurances that the DMCA does not threaten their work and stated that the legal threats against them were invalid Sony rootkit investigation EditThe 2005 Sony BMG CD copy protection scandal started when security researcher Mark Russinovich revealed on October 31 2005 that Sony s Extended Copy Protection XCP copy protection software on the CD Get Right with the Man by Van Zant contained hidden files that could damage the operating system install spyware and make the user s computer vulnerable to attack when the CD was played on a Microsoft Windows based PC Sony then released a software patch to remove XCP On November 15 2005 Felten and J Alex Halderman showed that Sony s method for removing XCP copy protection software from the computer makes it more vulnerable to attack as it essentially installed a rootkit in the form of an Active X control used by the uninstaller and left it on the user s machine and set so as to allow any web page visited by the user to execute arbitrary code Felten and Halderman described the problem in a blog post The consequences of the flaw are severe it allows any Web page you visit to download install and run any code it likes on your computer Any Web page can seize control of your computer then it can do anything it likes That s about as serious as a security flaw can get 13 Diebold voting machine analysis EditOn September 13 2006 Felten and graduate students Ariel Feldman and Alex Halderman discovered severe security flaws in a Diebold Election Systems now Premier Election Solutions voting machine Their findings claimed Malicious software running on a single voting machine can steal votes with little if any risk of detection The malicious software can modify all of the records audit logs and counters kept by the voting machine so that even careful forensic examination of these records will find nothing amiss 14 15 16 17 18 Sequoia voting machine analysis EditIn early 2008 New Jersey election officials announced that they planned to send one or more Sequoia Advantage voting machines to Ed Felten and Andrew Appel also of Princeton University for analysis In March 2008 Sequoia sent an e mail to Professor Felten asserting that allowing him to examine Sequoia voting machines would violate the license agreement between Sequoia and the county which bought them and also that Sequoia would take legal action to stop any non compliant analysis publication of Sequoia software its behavior reports regarding same or any other infringement of our intellectual property 19 This action sparked outrage among computer technology activists 20 21 After examining Sequoia s machines Felten and Appel indeed discovered grave problems with the accuracy of the machines 22 They also demonstrated that the machines can be hacked and compromised within minutes 23 Shortly after that Sequoia s corporate Web site was hacked The hack was first discovered by Ed Felten Sequoia took its Web site down on 20 March and removed the intrusive content 24 Cold boot attack EditIn February 2008 Felten and his students were part of the team that discovered the cold boot attack which allows someone with physical access to a computer to bypass operating system protections and extract the contents of its memory 25 Federal Trade Commission EditIn November 2010 Felten was named the first Chief Technologist of the Federal Trade Commission 26 for which he took a one year leave of absence from Princeton University 27 Awards EditMember of the American Academy of Arts and Sciences elected 2011 28 Member of the National Academy of Engineering elected 2013 29 References Edit Electronic Frontier Foundation Announces Pioneer Award Winners Archived 2010 11 11 at the Wayback Machine EFF 2005 Edward W Felten Center for Information Technology Policy Retrieved 2020 05 28 FTC Names Edward W Felten as Agency s Chief Technologist Eileen Harrington as Executive Director 4 November 2010 www whitehouse gov Felten Edward Edward Felten s Curriculum Vitae PDF Retrieved 2008 05 19 FTC Names Edward W Felten as Agency s Chief Technologist Eileen Harrington as Executive Director Federal Trade Commission 2010 11 04 Retrieved 2010 11 04 The White House Names Dr Ed Felten as Deputy U S Chief Technology Officer whitehouse gov 2015 05 11 Retrieved 2015 05 11 via National Archives Wasserman Elizabeth April 26 2001 Security Code Cracking Professor Pulls How To Paper The Industry Standard Retrieved 2007 05 07 Oppenheim Matthew J April 9 2001 RIAA SDMI Legal Threat Letter Electronic Frontier Foundation Archived from the original on April 14 2007 Retrieved 2007 05 07 Greene Thomas C April 23 2001 SDMI cracks revealed Security The Register Retrieved 2007 05 07 Final Hearing Transcript Felten v RIAA Electronic Frontier Foundation November 28 2001 Retrieved 2007 05 07 Craver Scott A Wu Min Liu Bede Stubbenfield Adam Swartzlander Ben Wallach Dan S Dean Drew Felton Edward W August 13 17 2001 Reading Between the Lines Lessons from the SDMI Challenge PDF Proceedings of the 10th USENIX Security Symposium 10th USENIX Security Symposium Washington D C USA USENIX Association Archived from the original PDF on 21 May 2022 Retrieved 12 July 2022 a href Template Cite conference html title Template Cite conference cite conference a CS1 maint date and year link Felten Edward Alex Halderman November 15 2005 Sony s Web Based Uninstaller Opens a Big Security Hole Sony to Recall Discs Freedom to Tinker Retrieved 2007 05 07 Ariel J Feldman J Alex Halderman Edward W Felten September 13 2006 Security Analysis of the Diebold AccuVote TS Voting Machine PDF Princeton University Archived from the original PDF on May 13 2007 Retrieved 2007 05 07 a href Template Cite journal html title Template Cite journal cite journal a Cite journal requires journal help Feldman Ariel J Halderman J Alex Felten Edward W September 13 2006 Security Analysis of the Diebold AccuVote TS Voting Machine Center for Information Technology Policy Archived from the original on 2017 12 12 Retrieved 6 June 2021 Full research paper PDF Workshop version PDF Executive summary Frequently Asked Questions Our reply to Diebold s response Demonstration Videos CITP Princeton 2016 11 30 Security Demonstration of DieBold AccuVote TS Electronic Voting Machine via YouTube Archived from the original on 2021 12 12 Retrieved 6 June 2021 CITP Princeton 2016 12 01 Access to Diebold AccuVote TS Electronic Voting Machine close up via YouTube Archived from the original on 2021 12 12 Retrieved 6 June 2021 CITP Princeton 2016 12 01 Access Diebold AccuVote TS Electronic Voting Machine angle view via YouTube Archived from the original on 2021 12 12 Retrieved 6 June 2021 No audio Ed Felten 2008 03 17 Interesting e mail by Sequoia E Voting Firm Threatens Ed Felten If He Reviews Its E Voting Machine Techdirt 2008 03 18 Cory Doctorow 2008 03 17 Sequoia Voting Systems threatens Felten s Princeton security research team BoingBoing Ed Felten NJ Election Discrepancies Worse Than Previously Thought Contradict Sequoia s Explanation Freedom To Tinker April 4th 2008 Andrew Appel Security Seals on AVC Advantage Voting Machines are Easily Defeated Freedom To Tinker December 19th 2008 Dee Chisamera 2008 03 21 Sequoia Voting Systems Admits To Hackers Attacking Their Website eFluxMedia Archived from the original on 2009 04 06 J Alex Halderman Seth D Schoen Nadia Heninger William Clarkson William Paul Joseph A Calandrino Ariel J Feldman Jacob Appelbaum and Edward W Felten 2008 02 21 Lest We Remember Cold Boot Attacks on Encryption Keys Princeton University Archived from the original on July 22 2011 Retrieved 2008 02 22 a href Template Cite journal html title Template Cite journal cite journal a Cite journal requires journal help CS1 maint multiple names authors list link FTC names Princeton computer security expert as first chief technologist The Washington Post Princeton prof Edward Felten named FTC s first chief technologist 4 November 2010 Edward W Felten American Academy of Arts amp Sciences Retrieved 2020 05 28 Professor Edward W Felten NAE Website Retrieved 2020 05 28 External links Edit Wikimedia Commons has media related to Edward Felten Edward W Felten at Princeton Freedom to Tinker Appearances on C SPAN Felten et al v RIAA et al Case archive EFF 2001 Archived from the original on 2018 01 05 Retrieved 2017 07 28 Verance Corporation Lessig Larry Zittrain Jonathan Nov 1 2002 United States of America v Microsoft Antitrust OpenLaw Harvard Law School Halderman J Alex Felten Edward W Feb 14 2006 Lessons from the Sony CD DRM Episode PDF Archived PDF from the original on February 22 2006 Wilkinson Will Oct 9 2008 Conversation with Edward Felten Video Bloggingheads tv Retrieved from https en wikipedia org w index php title Edward Felten amp oldid 1099853579, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.