Difference between revisions of "Main Page"
From Simson Garfinkel
Jump to navigationJump to search
Line 33: | Line 33: | ||
==Current Projects== | ==Current Projects== | ||
;Software and systems: | ;Software and systems: | ||
* [https://github.com/simsong/tcpflow tcpflow], a TCP/IP session reassembler | * [https://github.com/simsong/tcpflow tcpflow], a TCP/IP session reassembler | ||
* [https://github.com/simsong/bulk_extractor bulk_extractor], a high-speed feature extractor | * [https://github.com/simsong/bulk_extractor bulk_extractor], a high-speed feature extractor | ||
* [http://www.forensicswiki.org/wiki/Category:Digital_Forensics_XML Digital Forensics XML] | * [http://www.forensicswiki.org/wiki/Category:Digital_Forensics_XML Digital Forensics XML] | ||
* [http://www.forensicswiki.org/ The Forensics Wiki] | * [http://www.forensicswiki.org/ The Forensics Wiki], founder and maintainer | ||
;Writing: | ;Writing: |
Revision as of 09:25, 23 March 2013
Welcome to Simson Garfinkel's web site.
Simson L. Garfinkel is an Associate Professor at the Naval Postgraduate School in Monterey, California. His research interests include computer forensics, usable security, personal information management, information policy and terrorism. (Read full bio.)
Recent Tutorials and Presentations
- 2013-02-22 Bulk Data Analysis With Optimistic Decompression.
- 2013-01-07 Digital Forensics Innovation: Searching A Terabyte of Data in 10 minutes (DCACM, Washington DC)
- 2012-01-11 The Cybersecurity Mess, and what SFS students can do about it.
See also my Presentations Archive
Recent Publications
- Academic
- Young J., Foster, K., Garfinkel, S., and Fairbanks, K., Distinct Sector Hashes for Target File Detection, IEEE Computer, December 2012
- Garfinkel, S. Digital Forensics XML and the DFXML toolset, Digital Investigation, 2012.
- Garfinkel, S., and Dinolt, G. Operations with Degraded Security. IEEE Security & Privacy, pages 18–23, November/December 2011
- Beverly, Robert, Simson Garfinkel and Greg Cardwell, "Forensic Carving of Network Packets and Associated Data Structures", DFRWS 2011, Aug. 1-3, 2011, New Orleans, LA BEST PAPER AWARD (Acceptance rate: 23%, 14/62)
- Journalistic
- Windows 8: Design over Usability, Technology Review, February 20, 2013
- How to Delete Regrettable Posts from the Internet, Technology Review, October 30, 2012.
- Seven Ways to get yourself hacked, Technology Review, December 15, 2011.
- A Cloud over Ownership: Online services set content free from the physical world’s constraints—including those that have defined the very idea of possession,Technology Review, August 23, 2011
Other sites of interest
|