Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ryan W. Gardner is active.

Publication


Featured researches published by Ryan W. Gardner.


financial cryptography | 2009

Coercion Resistant End-to-end Voting

Ryan W. Gardner; Sujata Garera; Aviel D. Rubin

End-to-end voting schemes have shown considerable promise for allowing voters to verify that tallies are accurate. At the same time, the threat of coercion has generally been considered only when voting devices are honest, and in many schemes, voters can be forced or incentivized to cast votes of an adversarys choice. In this paper, we examine the issue of voter coercion and identify one example method for coercing voters in a scheme by Benaloh. To address such attacks, we present a formal definition of coercion resistance for end-to-end voting. We then present a new scheme, extended from Benalohs, that is provably coercion resistant. In addition to providing accuracy and coercion resistance, our scheme emphasizes ease-of-use for the voter.


IEEE Transactions on Information Forensics and Security | 2009

Detecting Code Alteration by Creating a Temporary Memory Bottleneck

Ryan W. Gardner; Sujata Garera; Aviel D. Rubin

We develop a new technique whereby a poll worker can determine whether the software executing on electronic voting machines on election day has been altered from its factory version. Our generalized approach allows a human, using a known challenge-response pair, to detect attacks that involve modification or replacement of software on a computer based on the time it takes the computer to provide a correct response to a challenge. We exploit the large difference between main memory access times and cache memory access or CPU clock cycle times to significantly increase the time required to compute the right response when the software has been changed.


Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems | 2009

Securing medical records on smart phones

Ryan W. Gardner; Sujata Garera; Matthew W. Pagano; Matthew Green; Aviel D. Rubin

There is an inherent conflict between the desire to maintain privacy of ones medical records and the need to make those records available during an emergency. To satisfy both objectives, we introduce a flexible architecture for the secure storage of medical records on smart phones. In our system, a person can view her records at any time, and emergency medical personnel can view the records as long as the person is present (even if she is unconscious). Our solution allows for efficient revocation of access rights and is robust against adversaries who can access the phones storage offline.


ieee symposium on security and privacy | 2009

Are Patched Machines Really Fixed

Ryan W. Gardner; Matt Bishop; Tadayoshi Kohno

Updating and patching has become a ubiquitous part of software maintenance, with particular importance to security. Its especially crucial when the systems in question perform vital functions and security compromises might yield drastic consequences. Unfortunately, updates intended to remediate security problems are sometimes incomplete, are flawed, or introduce new vulnerability themselves. The authors present several examples of such instances in a widely used electronic voting system, a device for which security is critical. A central lesson of the study is that evaluating a systems security by examining changes between revisions is insufficient; you must evaluate and analyze the system as a whole.


financial cryptography | 2010

Designing for audit: a voting machine with a tiny TCB

Ryan W. Gardner; Sujata Garera; Aviel D. Rubin

Thoroughly auditing voting machine software has proved to be difficult, and even efforts to reduce its complexity have relied on significant amounts of external code. We design and implement a device that allows a voter to confirm and cast her vote while trusting only 1,034 lines of ARM assembly. The system, which we develop from scratch, supports visually (and hearing) impaired voters and ensures the privacy of the voter as well as the integrity of the tally under some common assumptions. We employ several techniques to increase the readability of our code and make it easier to audit.


Archive | 2009

Protecting Patient Records from Unwarranted Access

Ryan W. Gardner; Sujata Garera; Aviel D. Rubin; Anand Rajan; Carlos V. Rozas; Manoj R. Sastry

Securing access to medical information is vital to protecting patient privacy. However, Electronic Patient Record (EPR) systems are vulnerable to a number of inside and outside threats. Adversaries can compromise EPR client machines to obtain a variety of highly sensitive information including valid EPR login credentials, without detection. Furthermore, medical staff can covertly view records of their choosing for personal interest or more malicious purposes. In particular, we observe that the lack of integrity measurement and auditability in these systems creates a potential threat to the privacy of patient information. We explore the use of virtualization and trusted computing hardware to address these problems. We identify open problems and encourage further research in the area.


usenix workshop on accurate electronic voting technology | 2007

On the difficulty of validating voting machine software with software

Ryan W. Gardner; Sujata Garera; Aviel D. Rubin


Archive | 2013

Apparatus and method for identifying related code variants in binaries

Margaret F. Lospinuso; David M. Patrone; David P. Silberberg; Jonathan D. Cohen; Ryan W. Gardner; Laura J. Glendenning; Sakunthala Harshavardhana; Robert T. Hider; C. Durward McDonell; Dennis S. Patrone; Nathan S. Reller; Benjamin R. Salazar


Archive | 2014

Method and Apparatus for Automated Vulnerability Detection

Yanni Kouskoulas; Douglas C. Schmidt; C. Durward McDonell; Laura J. Glendenning; Ryan W. Gardner; David J. Heine; Margaret F. Lospinuso; Forest C. Deal; David R. Zaret; Vina H. Nguyen


Archive | 2014

A Formally Verified Hybrid System for the Next-Generation Airborne Collision Avoidance System (CMU-CS-14-138)

Jean-Baptiste Jeannin; Khalil Ghorbal; Yanni Kouskoulas; Ryan W. Gardner; Aurora Schmidt; Erik Zawadski; André Platzer

Collaboration


Dive into the Ryan W. Gardner's collaboration.

Top Co-Authors

Avatar

Aviel D. Rubin

Johns Hopkins University

View shared research outputs
Top Co-Authors

Avatar

Sujata Garera

Johns Hopkins University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yanni Kouskoulas

Johns Hopkins University Applied Physics Laboratory

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David J. Heine

Johns Hopkins University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge