scispace - formally typeset
C

Chad Brubaker

Researcher at Google

Publications -  5
Citations -  465

Chad Brubaker is an academic researcher from Google. The author has contributed to research in topics: Computer security model & Threat model. The author has an hindex of 4, co-authored 5 publications receiving 382 citations. Previous affiliations of Chad Brubaker include University of Texas at Austin.

Papers
More filters
Proceedings ArticleDOI

Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations

TL;DR: This work designs, implements, and applies the first methodology for large-scale testing of certificate validation logic in SSL/TLS implementations, and implements and applies "frankencerts," synthetic certificates that are randomly mutated from parts of real certificates and thus include unusual combinations of extensions and constraints.
Proceedings ArticleDOI

The Parrot Is Dead: Observing Unobservable Network Communications

TL;DR: This work enumerates the requirements that a censorship-resistant system must satisfy to successfully mimic another protocol and concludes that "unobservability by imitation" is a fundamentally flawed approach.
Book ChapterDOI

CloudTransport: Using Cloud Storage for Censorship-Resistant Networking

TL;DR: Censorship circumvention systems such as Tor are highly vulnerable to network-level filtering, because the traffic generated by these systems is disjoint from normal network traffic, it is easy to recognize and block.
Posted Content

The Android Platform Security Model

TL;DR: This article aims to both document the abstract model of the Android security model and discuss its implications, and analyze how the different security measures in past and current Android implementations work together to mitigate these threats.
Journal ArticleDOI

The Android Platform Security Model

TL;DR: In this paper, the Android security model has been formally published and discussed its implications, based on a definition of the threat model and Android ecosystem context in which it operates, the authors analyze how the different security measures in past and current Android implementations work together to mitigate these threats.