Steven M. Bellovin

Columbia University - Department of Computer Science

New York, NY 10027

United States

SCHOLARLY PAPERS

9

DOWNLOADS
Rank 11,532

SSRN RANKINGS

Top 11,532

in Total Papers Downloads

3,828

CITATIONS

0

Scholarly Papers (9)

1.

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

Privacy Legal Scholars Conference, June 2013
Number of pages: 70 Posted: 19 Aug 2013
Steven M. Bellovin, Matt Blaze, Sandy Clark and Susan Landau
Columbia University - Department of Computer Science, University of Pennsylvania - School of Engineering & Applied Science, University of Pennsylvania - School of Engineering & Applied Science and Worcester Polytechnic Institute (WPI)
Downloads 1,195 (15,291)

Abstract:

Loading...

wiretap, CALEA, surveillance, hacking, vulnerabilities, cyber-security, law enforcement

2.

When Enough is Enough: Location Tracking, Mosaic Theory, and Machine Learning

NYU Journal of Law & Liberty, Vol. 8, U of Maryland Legal Studies Research Paper No. 2013-51
Number of pages: 75 Posted: 03 Sep 2013 Last Revised: 21 May 2014
Columbia University - Department of Computer Science, University of Maryland Francis King Carey School of Law, Columbia University, Computer Science and Wesleyan University
Downloads 1,121 (16,873)

Abstract:

Loading...

privacy, mosaic theory, surveillance data, Fourth Amendment

3.

It's Too Complicated: How the Internet Upends Katz, Smith, and Electronic Surveillance Law

Harvard Journal of Law and Technology, Forthcoming
Number of pages: 88 Posted: 08 Jun 2016 Last Revised: 10 Nov 2016
Steven M. Bellovin, Matt Blaze, Susan Landau and Stephanie K. Pell
Columbia University - Department of Computer Science, University of Pennsylvania - School of Engineering & Applied Science, Worcester Polytechnic Institute (WPI) and West Point--Army Cyber Institute
Downloads 704 (32,994)

Abstract:

Loading...

metadata, content, non-content, third-party doctrine, pen register, Internet, IP-based communications, Ex Parte Jackson, Katz v. United States, Smith v. Maryland, United States v. Warshak, Fourth Amendment, wiretap

4.

Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications

Number of pages: 24 Posted: 15 Jul 2016 Last Revised: 09 Aug 2017
Steven M. Bellovin, Susan Landau and Herbert Lin
Columbia University - Department of Computer Science, Worcester Polytechnic Institute (WPI) and Center for International Security and Cooperation
Downloads 285 (99,828)

Abstract:

Loading...

cyber target, cyber attack, laws of war, laws of armed conflict, proportionality, collateral damage, indiscriminate weapons Cyber Arms Control

5.

That Was Close! Reward Reporting of Cybersecurity 'Near Misses'

Forthcoming in Colorado Technology Law Journal 16.2, U of Colorado Law Legal Studies Research Paper No. 17-28
Number of pages: 38 Posted: 06 Dec 2017 Last Revised: 27 Aug 2018
University of Colorado at Boulder, School of Law, Students, Columbia University - Department of Computer Science, University of Colorado at Boulder, School of Law, Students, University of Colorado Law School and Independent
Downloads 264 (108,124)

Abstract:

Loading...

computer security; data breach

6.

Can It Really Work? Problems with Extending EINSTEIN 3 to Critical Infrastructure

Number of pages: 28 Posted: 23 May 2011 Last Revised: 05 Apr 2015
Columbia University - Department of Computer Science, Harvard University, Stanford University - Center for International Security and Cooperation, Worcester Polytechnic Institute (WPI) and Princeton University - Department of Computer Science
Downloads 202 (141,001)

Abstract:

Loading...

7.

Privacy and Synthetic Datasets

Stanford Technology Law Review, Forthcoming
Number of pages: 39 Posted: 17 Oct 2018
Steven M. Bellovin, Preetam K. Dutta and Nathan Reitinger
Columbia University - Department of Computer Science, Columbia University - Department of Computer Science and Columbia University - Department of Computer Science
Downloads 29 (444,670)

Abstract:

Loading...

privacy, machine learning, synthetic data, HIPAA, FERPA

8.

Privee: An Architecture for Automatically Analyzing Web Privacy Policies

23rd USENIX Security Symposium, 1, 2014
Number of pages: 17 Posted: 14 Oct 2014
Sebastian Zimmeck and Steven M. Bellovin
Wesleyan University and Columbia University - Department of Computer Science
Downloads 28 (449,393)

Abstract:

Loading...

9.

'I Don't Have a Photograph, But You Can Have My Footprints' – Revealing the Demographics of Location Data

Proceedings of the Ninth International AAAI Conference on Web and Social Media, 2015
Posted: 23 Feb 2016
Columbia University, Wesleyan University, Dartmouth College, Columbia University and Columbia University - Department of Computer Science

Abstract:

Loading...

Location Data; Machine Learning; Privacy; Segregation; Social Networks