William Marczak
William Marczak
Verified email at cs.berkeley.edu
Cited by
Cited by
Consistency Analysis in Bloom: a CALM and Collected Approach.
P Alvaro, N Conway, JM Hellerstein, WR Marczak
CIDR, 249-260, 2011
Dedalus: Datalog in Time and Space
P Alvaro, WR Marczak, N Conway, JM Hellerstein, D Maier, R Sears
International Datalog 2.0 Workshop, 262-281, 2010
Logic and lattices for distributed programming
N Conway, WR Marczak, P Alvaro, JM Hellerstein, D Maier
Proceedings of the Third ACM Symposium on Cloud Computing, 1-14, 2012
China’s great cannon
B Marczak, N Weaver, J Dalek, R Ensafi, D Fifield, S McKune, A Rey, ...
Citizen Lab 10, 2015
When governments hack opponents: A look at actors and technology
WR Marczak, J Scott-Railton, M Marquis-Boire, V Paxson
23rd {USENIX} Security Symposium ({USENIX} Security 14), 511-525, 2014
An analysis of china’s “great cannon”
B Marczak, N Weaver, J Dalek, R Ensafi, D Fifield, S McKune, A Rey, ...
5th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2015
Towards a data-centric view of cloud security
W Zhou, M Sherr, WR Marczak, Z Zhang, T Tao, BT Loo, I Lee
Proceedings of the second international workshop on Cloud data management, 25-32, 2010
Ał: An Extensible Platform for Application-Aware Anonymity
M Sherr, A Mao, WR Marczak, W Zhou, BT Loo, MA Blaze
Secureblox: customizable secure distributed data processing
WR Marczak, SS Huang, M Bravenboer, M Sherr, BT Loo, M Aref
Proceedings of the 2010 ACM SIGMOD International Conference on Management of …, 2010
For their eyes only: The commercialization of digital spying
M Marquis-Boire, B Marczak, C Guarnieri, J Scott-Railton
Citizen Lab, 2013
Declarative reconfigurable trust management
W Marczak, D Zook, W Zhou, M Aref, BT Loo
arXiv preprint arXiv:0909.1759, 2009
Confluence analysis for distributed programs: A model-theoretic approach
WR Marczak, P Alvaro, N Conway, JM Hellerstein, D Maier
International Datalog 2.0 Workshop, 135-147, 2012
BloomUnit: Declarative testing for distributed programs
P Alvaro, A Hutchinson, N Conway, WR Marczak, JM Hellerstein
Proceedings of the Fifth International Workshop on Testing Database Systems, 1-7, 2012
You only click twice: FinFisher’s global proliferation
M Marquis-Boire, B Marzcak, C Guarnieri, J Scott-Railton
The million dollar dissident: NSO group’s iPhone zero-days used against a UAE human rights defender
B Marczak, J Scott-Railton
Citizen Lab 24, 2016
From Bahrain with love: FinFisher’s spy kit exposed?
M Marquis-Boire, B Marczak
A declarative semantics for Dedalus
P Alvaro, TJ Ameloot, JM Hellerstein, W Marczak, J Van den Bussche
UC Berkeley EECS Technical Report 120, 2011, 2011
Hacking Team and the targeting of Ethiopian journalists
B Marczak, C Guarnieri, M Marquis-Boire, J Scott-Railton
CPJ 3, 14, 2017
HIDE AND SEEK: Tracking NSO Group’s Pegasus Spyware to operations in 45 countries
B Marczak, J Scott-Railton, S McKune, B Abdul Razzak, R Deibert
Social Engineering Attacks on Government Opponents: Target Perspectives
WR Marczak, V Paxson
Proceedings on Privacy Enhancing Technologies 2017 (2), 172-185, 2017
The system can't perform the operation now. Try again later.
Articles 1–20