Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Tadayoshi Kohno
@article{DBLP:journals/ieeesp/RoesnerK24, author = {Franziska Roesner and Tadayoshi Kohno}, title = {Security and Privacy in the Metaverse}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {1}, pages = {7--9}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3333989}, doi = {10.1109/MSEC.2023.3333989}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RoesnerK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/McAmisSBK24, author = {Rachel McAmis and Mattea Sim and Mia M. Bennett and Tadayoshi Kohno}, title = {Over Fences and Into Yards: Privacy Threats and Concerns of Commercial Satellites}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {1}, pages = {379--396}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0022}, doi = {10.56553/POPETS-2024-0022}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/McAmisSBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-01048, author = {Ryan W. Gardner and Tadayoshi Kohno and Alec Yasinsac}, title = {Attacking the Diebold Signature Variant - {RSA} Signatures with Unverified High-order Padding}, journal = {CoRR}, volume = {abs/2403.01048}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.01048}, doi = {10.48550/ARXIV.2403.01048}, eprinttype = {arXiv}, eprint = {2403.01048}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-01048.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-04960, author = {Yuhao Wu and Franziska Roesner and Tadayoshi Kohno and Ning Zhang and Umar Iqbal}, title = {SecGPT: An Execution Isolation Architecture for LLM-Based Systems}, journal = {CoRR}, volume = {abs/2403.04960}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.04960}, doi = {10.48550/ARXIV.2403.04960}, eprinttype = {arXiv}, eprint = {2403.04960}, timestamp = {Wed, 03 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-04960.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-14791, author = {Jimin Mun and Liwei Jiang and Jenny T. Liang and Inyoung Cheong and Nicole DeCario and Yejin Choi and Tadayoshi Kohno and Maarten Sap}, title = {Particip-AI: {A} Democratic Surveying Framework for Anticipating Future {AI} Use Cases, Harms and Benefits}, journal = {CoRR}, volume = {abs/2403.14791}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.14791}, doi = {10.48550/ARXIV.2403.14791}, eprinttype = {arXiv}, eprint = {2403.14791}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-14791.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Kohno23, author = {Tadayoshi Kohno}, title = {\{In Earth\} Until (Ready)}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {7--8}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3237099}, doi = {10.1109/MSEC.2023.3237099}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Kohno23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LandwehrRWTJKK23, author = {Carl E. Landwehr and Michael K. Reiter and Laurie A. Williams and Gene Tsudik and Trent Jaeger and Tadayoshi Kohno and Apu Kapadia}, title = {Looking Backwards (and Forwards): {NSF} Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {32--42}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3208721}, doi = {10.1109/MSEC.2022.3208721}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/LandwehrRWTJKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RedmilesBK23, author = {Elissa M. Redmiles and Mia M. Bennett and Tadayoshi Kohno}, title = {Power in Computer Security and Privacy: {A} Critical Lens}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {48--52}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3238591}, doi = {10.1109/MSEC.2023.3238591}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/RedmilesBK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Kohno23a, author = {Tadayoshi Kohno}, title = {In Your Eyes}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {5}, pages = {4--5}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3295440}, doi = {10.1109/MSEC.2023.3295440}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Kohno23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmhci/SimkoRKA23, author = {Lucy Simko and Harshini Sri Ramulu and Tadayoshi Kohno and Yasemin Acar}, title = {The Use and Non-Use of Technology During Hurricanes}, journal = {Proc. {ACM} Hum. Comput. Interact.}, volume = {7}, number = {{CSCW2}}, pages = {1--54}, year = {2023}, url = {https://doi.org/10.1145/3610215}, doi = {10.1145/3610215}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmhci/SimkoRKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aies/HongKM23, author = {Rachel Hong and Tadayoshi Kohno and Jamie Morgenstern}, editor = {Francesca Rossi and Sanmay Das and Jenny Davis and Kay Firth{-}Butterfield and Alex John}, title = {Evaluation of targeted dataset collection on racial equity in face recognition}, booktitle = {Proceedings of the 2023 {AAAI/ACM} Conference on AI, Ethics, and Society, {AIES} 2023, Montr{\'{e}}al, QC, Canada, August 8-10, 2023}, pages = {531--541}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600211.3604662}, doi = {10.1145/3600211.3604662}, timestamp = {Tue, 23 Jan 2024 13:25:45 +0100}, biburl = {https://dblp.org/rec/conf/aies/HongKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/NaeiniBDKLPR23, author = {Pardis Emami Naeini and Joseph Breda and Wei Dai and Tadayoshi Kohno and Kim Laine and Shwetak N. Patel and Franziska Roesner}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters and Stefanie Mueller and Julie R. Williamson and Max L. Wilson}, title = {Understanding People's Concerns and Attitudes Toward Smart Cities}, booktitle = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {71:1--71:24}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544548.3581558}, doi = {10.1145/3544548.3581558}, timestamp = {Sat, 27 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/NaeiniBDKLPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/WeiCKKRT23, author = {Miranda Wei and Sunny Consolvo and Patrick Gage Kelley and Tadayoshi Kohno and Franziska Roesner and Kurt Thomas}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters and Stefanie Mueller and Julie R. Williamson and Max L. Wilson}, title = {"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment}, booktitle = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {190:1--190:17}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544548.3581229}, doi = {10.1145/3544548.3581229}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/WeiCKKRT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/StokesAMCRKR23, author = {Jackson Stokes and Tal August and Robert A Marver and Alexei Czeskis and Franziska Roesner and Tadayoshi Kohno and Katharina Reinecke}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters and Stefanie Mueller and Julie R. Williamson and Max L. Wilson}, title = {How Language Formality in Security and Privacy Interfaces Impacts Intended Compliance}, booktitle = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {617:1--617:12}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544548.3581275}, doi = {10.1145/3544548.3581275}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/StokesAMCRKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eaamo/YeungIKR23, author = {Christina Yeung and Umar Iqbal and Tadayoshi Kohno and Franziska Roesner}, title = {Gender Biases in Tone Analysis: {A} Case Study of a Commercial Wearable}, booktitle = {Proceedings of the 3rd {ACM} Conference on Equity and Access in Algorithms, Mechanisms, and Optimization, {EAAMO} 2023, Boston, MA, USA, 30 October 2023 - 1 November 2023}, pages = {21:1--21:12}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3617694.3623241}, doi = {10.1145/3617694.3623241}, timestamp = {Wed, 13 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eaamo/YeungIKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SimHKR23, author = {Mattea Sim and Kurt Hugenberg and Tadayoshi Kohno and Franziska Roesner}, title = {A Scalable Inclusive Security Intervention to Center Marginalized {\&} Vulnerable Populations in Security {\&} Privacy Design}, booktitle = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023, Segovia, Spain, September 18-21, 2023}, pages = {102--115}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3633500.3633508}, doi = {10.1145/3633500.3633508}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/SimHKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WeiNRK23, author = {Miranda Wei and Pardis Emami Naeini and Franziska Roesner and Tadayoshi Kohno}, title = {Skilled or Gullible{\(f\)} Gender Stereotypes Related to Computer Security and Privacy}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {2050--2067}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179469}, doi = {10.1109/SP46215.2023.10179469}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/WeiNRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChengTKR23, author = {Kaiming Cheng and Jeffery F. Tian and Tadayoshi Kohno and Franziska Roesner}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {911--928}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/cheng-kaiming}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChengTKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/McAmisK23, author = {Rachel McAmis and Tadayoshi Kohno}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real Estate}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {2169--2186}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/mcamis}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/McAmisK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KohnoAL23, author = {Tadayoshi Kohno and Yasemin Acar and Wulf Loh}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5145--5162}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/kohno}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KohnoAL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/YeungIOKR23, author = {Christina Yeung and Umar Iqbal and Yekaterina Tsipenyuk O'Neil and Tadayoshi Kohno and Franziska Roesner}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {Online Advertising in Ukraine and Russia During the 2022 Russian Invasion}, booktitle = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {2787--2796}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543507.3583484}, doi = {10.1145/3543507.3583484}, timestamp = {Wed, 13 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/YeungIOKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-08057, author = {Miranda Wei and Sunny Consolvo and Patrick Gage Kelley and Tadayoshi Kohno and Franziska Roesner and Kurt Thomas}, title = {"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment}, journal = {CoRR}, volume = {abs/2302.08057}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.08057}, doi = {10.48550/ARXIV.2302.08057}, eprinttype = {arXiv}, eprint = {2302.08057}, timestamp = {Mon, 20 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-08057.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-14326, author = {Tadayoshi Kohno and Yasemin Acar and Wulf Loh}, title = {Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations}, journal = {CoRR}, volume = {abs/2302.14326}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.14326}, doi = {10.48550/ARXIV.2302.14326}, eprinttype = {arXiv}, eprint = {2302.14326}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-14326.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-15906, author = {Inyoung Cheong and Aylin Caliskan and Tadayoshi Kohno}, title = {Is the {U.S.} Legal System Ready for AI's Challenges to Human Values?}, journal = {CoRR}, volume = {abs/2308.15906}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.15906}, doi = {10.48550/ARXIV.2308.15906}, eprinttype = {arXiv}, eprint = {2308.15906}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-15906.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-04456, author = {Rock Yuren Pang and Dan Grossman and Tadayoshi Kohno and Katharina Reinecke}, title = {The Case for Anticipating Undesirable Consequences of Computing Innovations Early, Often, and Across Computer Science}, journal = {CoRR}, volume = {abs/2309.04456}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.04456}, doi = {10.48550/ARXIV.2309.04456}, eprinttype = {arXiv}, eprint = {2309.04456}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-04456.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-10254, author = {Umar Iqbal and Tadayoshi Kohno and Franziska Roesner}, title = {{LLM} Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins}, journal = {CoRR}, volume = {abs/2309.10254}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.10254}, doi = {10.48550/ARXIV.2309.10254}, eprinttype = {arXiv}, eprint = {2309.10254}, timestamp = {Wed, 13 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-10254.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DaffallaSKB22, author = {Alaa Daffalla and Lucy Simko and Tadayoshi Kohno and Alexandru G. Bardas}, title = {Defensive Technology Use During the 2018-2019 Sudanese Revolution}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {2}, pages = {40--48}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2021.3128819}, doi = {10.1109/MSEC.2021.3128819}, timestamp = {Thu, 31 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/DaffallaSKB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Kohno22, author = {Tadayoshi Kohno}, title = {Excerpts From the New Dictionary of Cybersecurity, 2036}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {3}, pages = {8}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2022.3159400}, doi = {10.1109/MSEC.2022.3159400}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Kohno22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Kohno22a, author = {Tadayoshi Kohno}, title = {Mx. President Has a Brain}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {3}, pages = {9--11}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2022.3159425}, doi = {10.1109/MSEC.2022.3159425}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Kohno22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KohnoCLLS22, author = {Tadayoshi Kohno and Camille Cobb and Ada Lerner and Michelle Lin and Adam Shostack}, title = {The Buffet Overflow Caf{\'{e}}}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {4}, pages = {4--7}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2022.3173122}, doi = {10.1109/MSEC.2022.3173122}, timestamp = {Tue, 19 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/KohnoCLLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Kohno22b, author = {Tadayoshi Kohno}, title = {The Schuhmacher}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {5}, pages = {14--15}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2022.3187631}, doi = {10.1109/MSEC.2022.3187631}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Kohno22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Kohno22c, author = {Tadayoshi Kohno}, title = {The Our Reality Privacy Policy}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {6}, pages = {4--7}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2022.3201712}, doi = {10.1109/MSEC.2022.3201712}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Kohno22c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Kohno22d, author = {Tadayoshi Kohno}, title = {Welcome to the Latest "Off by One" Column}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {6}, pages = {5}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2022.3201713}, doi = {10.1109/MSEC.2022.3201713}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Kohno22d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurousec/OwensGCNKR22, author = {Kentrell Owens and Johanna Gunawan and David R. Choffnes and Pardis Emami Naeini and Tadayoshi Kohno and Franziska Roesner}, title = {Exploring Deceptive Design Patterns in Voice Interfaces}, booktitle = {EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29 - 30, 2022}, pages = {64--78}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3549015.3554213}, doi = {10.1145/3549015.3554213}, timestamp = {Mon, 26 Sep 2022 13:15:44 +0200}, biburl = {https://dblp.org/rec/conf/eurousec/OwensGCNKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/ZengMKR22, author = {Eric Zeng and Rachel McAmis and Tadayoshi Kohno and Franziska Roesner}, editor = {Chadi Barakat and Cristel Pelsser and Theophilus A. Benson and David R. Choffnes}, title = {What factors affect targeting and bids in online advertising?: a field measurement study}, booktitle = {Proceedings of the 22nd {ACM} Internet Measurement Conference, {IMC} 2022, Nice, France, October 25-27, 2022}, pages = {210--229}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3517745.3561460}, doi = {10.1145/3517745.3561460}, timestamp = {Mon, 06 Feb 2023 21:45:20 +0100}, biburl = {https://dblp.org/rec/conf/imc/ZengMKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/WeiZKR22, author = {Miranda Wei and Eric Zeng and Tadayoshi Kohno and Franziska Roesner}, editor = {Sonia Chiasson and Apu Kapadia}, title = {Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships}, booktitle = {Eighteenth Symposium on Usable Privacy and Security, {SOUPS} 2022, Boston, MA, USA, August 7-9, 2022}, pages = {447--462}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/soups2022/presentation/wei}, timestamp = {Wed, 26 Oct 2022 12:44:43 +0200}, biburl = {https://dblp.org/rec/conf/soups/WeiZKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OwensARK22, author = {Kentrell Owens and Anita Alem and Franziska Roesner and Tadayoshi Kohno}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {4077--4094}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/owens}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/OwensARK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-04107, author = {Ashish Hooda and Andrey Labunets and Tadayoshi Kohno and Earlence Fernandes}, title = {Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance}, journal = {CoRR}, volume = {abs/2212.04107}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.04107}, doi = {10.48550/ARXIV.2212.04107}, eprinttype = {arXiv}, eprint = {2212.04107}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-04107.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/EvtimovSK21, author = {Ivan Evtimov and Pascal Sturmfels and Tadayoshi Kohno}, title = {FoggySight: {A} Scheme for Facial Lookup Privacy}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {3}, pages = {204--226}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0044}, doi = {10.2478/POPETS-2021-0044}, timestamp = {Fri, 21 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/EvtimovSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/NeyONCK21, author = {Peter Ney and Lee Organick and Jeff Nivala and Luis Ceze and Tadayoshi Kohno}, title = {{DNA} Sequencing Flow Cells and the Security of the Molecular-Digital Interface}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {3}, pages = {413--432}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0054}, doi = {10.2478/POPETS-2021-0054}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/NeyONCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmidc/SimkoCNSZKHYC21, author = {Lucy Simko and Britnie Chin and Sungmin Na and Harkiran Kaur Saluja and Tian Qi Zhu and Tadayoshi Kohno and Alexis Hiniker and Jason C. Yip and Camille Cobb}, title = {Would You Rather: {A} Focus Group Method for Eliciting and Discussing Formative Design Insights with Children}, booktitle = {{IDC} '21: Interaction Design and Children, Athens, Greece, 24-30 June, 2021}, pages = {131--146}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3459990.3460708}, doi = {10.1145/3459990.3460708}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acmidc/SimkoCNSZKHYC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ZengKR21, author = {Eric Zeng and Tadayoshi Kohno and Franziska Roesner}, editor = {Yoshifumi Kitamura and Aaron Quigley and Katherine Isbister and Takeo Igarashi and Pernille Bj{\o}rn and Steven Mark Drucker}, title = {What Makes a "Bad" Ad? User Perceptions of Problematic Online Advertising}, booktitle = {{CHI} '21: {CHI} Conference on Human Factors in Computing Systems, Virtual Event / Yokohama, Japan, May 8-13, 2021}, pages = {361:1--361:24}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3411764.3445459}, doi = {10.1145/3411764.3445459}, timestamp = {Mon, 17 May 2021 13:31:38 +0200}, biburl = {https://dblp.org/rec/conf/chi/ZengKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/ZengWGKR21, author = {Eric Zeng and Miranda Wei and Theo Gregersen and Tadayoshi Kohno and Franziska Roesner}, editor = {Dave Levin and Alan Mislove and Johanna Amann and Matthew Luckie}, title = {Polls, clickbait, and commemorative {\textdollar}2 bills: problematic political advertising on news and media websites around the 2020 {U.S.} elections}, booktitle = {{IMC} '21: {ACM} Internet Measurement Conference, Virtual Event, USA, November 2-4, 2021}, pages = {507--525}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3487552.3487850}, doi = {10.1145/3487552.3487850}, timestamp = {Thu, 04 Nov 2021 08:55:53 +0100}, biburl = {https://dblp.org/rec/conf/imc/ZengWGKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/ParkAKP21, author = {Chunjong Park and Anas Awadalla and Tadayoshi Kohno and Shwetak N. Patel}, editor = {Marc'Aurelio Ranzato and Alina Beygelzimer and Yann N. Dauphin and Percy Liang and Jennifer Wortman Vaughan}, title = {Reliable and Trustworthy Machine Learning for Health Using Dataset Shift Detection}, booktitle = {Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, virtual}, pages = {3043--3056}, year = {2021}, url = {https://proceedings.neurips.cc/paper/2021/hash/17e23e50bedc63b4095e3d8204ce063b-Abstract.html}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/ParkAKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/NaeiniFKR21, author = {Pardis Emami Naeini and Tiona Francisco and Tadayoshi Kohno and Franziska Roesner}, editor = {Sonia Chiasson}, title = {Understanding Privacy Attitudes and Concerns Towards Remote Communications During the {COVID-19} Pandemic}, booktitle = {Seventeenth Symposium on Usable Privacy and Security, {SOUPS} 2021, August 8-10, 2021}, pages = {695--714}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/soups2021/presentation/emami-naeini}, timestamp = {Wed, 09 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/NaeiniFKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DaffallaSKB21, author = {Alaa Daffalla and Lucy Simko and Tadayoshi Kohno and Alexandru G. Bardas}, title = {Defensive Technology Use by Political Activists During the Sudanese Revolution}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {372--390}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00055}, doi = {10.1109/SP40001.2021.00055}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/DaffallaSKB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-05227, author = {Pardis Emami Naeini and Tiona Francisco and Tadayoshi Kohno and Franziska Roesner}, title = {Understanding Privacy Attitudes and Concerns Towards Remote Communications During the {COVID-19} Pandemic}, journal = {CoRR}, volume = {abs/2106.05227}, year = {2021}, url = {https://arxiv.org/abs/2106.05227}, eprinttype = {arXiv}, eprint = {2106.05227}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-05227.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-06654, author = {Ivan Evtimov and Ian Covert and Aditya Kusupati and Tadayoshi Kohno}, title = {Disrupting Model Training with Adversarial Shortcuts}, journal = {CoRR}, volume = {abs/2106.06654}, year = {2021}, url = {https://arxiv.org/abs/2106.06654}, eprinttype = {arXiv}, eprint = {2106.06654}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-06654.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-14019, author = {Chunjong Park and Anas Awadalla and Tadayoshi Kohno and Shwetak N. Patel}, title = {Reliable and Trustworthy Machine Learning for Health Using Dataset Shift Detection}, journal = {CoRR}, volume = {abs/2110.14019}, year = {2021}, url = {https://arxiv.org/abs/2110.14019}, eprinttype = {arXiv}, eprint = {2110.14019}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-14019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/ChanFGHJKK0LSSS20, author = {Justin Chan and Landon P. Cox and Dean P. Foster and Shyam Gollakota and Eric Horvitz and Joseph Jaeger and Sham M. Kakade and Tadayoshi Kohno and John Langford and Jonathan Larson and Puneet Sharma and Sudheesh Singanamalla and Jacob E. Sunshine and Stefano Tessaro}, title = {{PACT:} Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing}, journal = {{IEEE} Data Eng. Bull.}, volume = {43}, number = {2}, pages = {15--35}, year = {2020}, url = {http://sites.computer.org/debull/A20june/p15.pdf}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/debu/ChanFGHJKK0LSSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CampHKMMPS20, author = {L. Jean Camp and Ryan Henry and Tadayoshi Kohno and Shrirang Mare and Steven A. Myers and Shwetak N. Patel and Joshua Streiff}, title = {Toward a Secure Internet of Things: Directions for Research}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {4}, pages = {28--37}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2020.2970155}, doi = {10.1109/MSEC.2020.2970155}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/CampHKMMPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/MareRK20, author = {Shrirang Mare and Franziska Roesner and Tadayoshi Kohno}, title = {Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {2}, pages = {436--458}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0035}, doi = {10.2478/POPETS-2020-0035}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/MareRK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/CobbSKH20, author = {Camille Cobb and Lucy Simko and Tadayoshi Kohno and Alexis Hiniker}, title = {A Privacy-Focused Systematic Analysis of Online Status Indicators}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {3}, pages = {384--403}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0057}, doi = {10.2478/POPETS-2020-0057}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/CobbSKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/CobbSKH20, author = {Camille Cobb and Lucy Simko and Tadayoshi Kohno and Alexis Hiniker}, editor = {Regina Bernhaupt and Florian 'Floyd' Mueller and David Verweij and Josh Andres and Joanna McGrenere and Andy Cockburn and Ignacio Avellino and Alix Goguey and Pernille Bj{\o}n and Shengdong Zhao and Briane Paul Samson and Rafal Kocielnik}, title = {User Experiences with Online Status Indicators}, booktitle = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems, Honolulu, HI, USA, April 25-30, 2020}, pages = {1--12}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3313831.3376240}, doi = {10.1145/3313831.3376240}, timestamp = {Wed, 04 May 2022 13:02:17 +0200}, biburl = {https://dblp.org/rec/conf/chi/CobbSKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/SinganamallaJAK20, author = {Sudheesh Singanamalla and Esther Han Beol Jang and Richard J. Anderson and Tadayoshi Kohno and Kurtis Heimerl}, title = {Accept the Risk and Continue: Measuring the Long Tail of Government https Adoption}, booktitle = {{IMC} '20: {ACM} Internet Measurement Conference, Virtual Event, USA, October 27-29, 2020}, pages = {577--597}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3419394.3423645}, doi = {10.1145/3419394.3423645}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/SinganamallaJAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NeyCK20, author = {Peter Ney and Luis Ceze and Tadayoshi Kohno}, title = {Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/genotype-extraction-and-false-relative-attacks-security-risks-to-third-party-genetic-genealogy-services-beyond-identity-inference/}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/NeyCK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-03544, author = {Justin Chan and Dean P. Foster and Shyam Gollakota and Eric Horvitz and Joseph Jaeger and Sham M. Kakade and Tadayoshi Kohno and John Langford and Jonathan Larson and Sudheesh Singanamalla and Jacob E. Sunshine and Stefano Tessaro}, title = {{PACT:} Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing}, journal = {CoRR}, volume = {abs/2004.03544}, year = {2020}, url = {https://arxiv.org/abs/2004.03544}, eprinttype = {arXiv}, eprint = {2004.03544}, timestamp = {Tue, 21 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-03544.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-06056, author = {Lucy Simko and Ryan Calo and Franziska Roesner and Tadayoshi Kohno}, title = {{COVID-19} Contact Tracing and Privacy: Studying Opinion and Preferences}, journal = {CoRR}, volume = {abs/2005.06056}, year = {2020}, url = {https://arxiv.org/abs/2005.06056}, eprinttype = {arXiv}, eprint = {2005.06056}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-06056.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-07205, author = {Ivan Evtimov and Weidong Cui and Ece Kamar and Emre Kiciman and Tadayoshi Kohno and Jerry Li}, title = {Security and Machine Learning in the Real World}, journal = {CoRR}, volume = {abs/2007.07205}, year = {2020}, url = {https://arxiv.org/abs/2007.07205}, eprinttype = {arXiv}, eprint = {2007.07205}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-07205.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-00017, author = {Kevin Fu and Tadayoshi Kohno and Daniel Lopresti and Elizabeth D. Mynatt and Klara Nahrstedt and Shwetak N. Patel and Debra J. Richardson and Benjamin G. Zorn}, title = {Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things}, journal = {CoRR}, volume = {abs/2008.00017}, year = {2020}, url = {https://arxiv.org/abs/2008.00017}, eprinttype = {arXiv}, eprint = {2008.00017}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-00017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-01553, author = {Lucy Simko and Jack Lucas Chang and Maggie Jiang and Ryan Calo and Franziska Roesner and Tadayoshi Kohno}, title = {{COVID-19} Contact Tracing and Privacy: {A} Longitudinal Study of Public Opinion}, journal = {CoRR}, volume = {abs/2012.01553}, year = {2020}, url = {https://arxiv.org/abs/2012.01553}, eprinttype = {arXiv}, eprint = {2012.01553}, timestamp = {Fri, 04 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-01553.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-08588, author = {Ivan Evtimov and Pascal Sturmfels and Tadayoshi Kohno}, title = {FoggySight: {A} Scheme for Facial Lookup Privacy}, journal = {CoRR}, volume = {abs/2012.08588}, year = {2020}, url = {https://arxiv.org/abs/2012.08588}, eprinttype = {arXiv}, eprint = {2012.08588}, timestamp = {Sat, 02 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-08588.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RuthKR19, author = {Kimberly Ruth and Tadayoshi Kohno and Franziska Roesner}, editor = {Nadia Heninger and Patrick Traynor}, title = {Secure Multi-User Content Sharing for Augmented Reality Applications}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {141--158}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/ruth}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/RuthKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/LebeckKR19, author = {Kiron Lebeck and Tadayoshi Kohno and Franziska Roesner}, editor = {Alec Wolman and Lin Zhong}, title = {Enabling Multiple Applications to Simultaneously Augment Reality: Challenges and Directions}, booktitle = {Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, HotMobile 2019, Santa Cruz, CA, USA, February 27-28, 2019}, pages = {81--86}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3301293.3302362}, doi = {10.1145/3301293.3302362}, timestamp = {Thu, 28 Feb 2019 17:02:13 +0100}, biburl = {https://dblp.org/rec/conf/wmcsa/LebeckKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/MareGRK19, author = {Shrirang Mare and Logan Girvin and Franziska Roesner and Tadayoshi Kohno}, editor = {Alec Wolman and Lin Zhong}, title = {Consumer Smart Homes: Where We Are and Where We Need to Go}, booktitle = {Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, HotMobile 2019, Santa Cruz, CA, USA, February 27-28, 2019}, pages = {117--122}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3301293.3302371}, doi = {10.1145/3301293.3302371}, timestamp = {Thu, 28 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wmcsa/MareGRK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LebeckRKR18, author = {Kiron Lebeck and Kimberly Ruth and Tadayoshi Kohno and Franziska Roesner}, title = {Arya: Operating System Support for Securely Augmenting Reality}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {44--53}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331020}, doi = {10.1109/MSP.2018.1331020}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LebeckRKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/SimkoZK18, author = {Lucy Simko and Luke Zettlemoyer and Tadayoshi Kohno}, title = {Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2018}, number = {1}, pages = {127--144}, year = {2018}, url = {https://doi.org/10.1515/popets-2018-0007}, doi = {10.1515/POPETS-2018-0007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/SimkoZK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/EykholtEF0RXPKS18, author = {Kevin Eykholt and Ivan Evtimov and Earlence Fernandes and Bo Li and Amir Rahmati and Chaowei Xiao and Atul Prakash and Tadayoshi Kohno and Dawn Song}, title = {Robust Physical-World Attacks on Deep Learning Visual Classification}, booktitle = {2018 {IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2018, Salt Lake City, UT, USA, June 18-22, 2018}, pages = {1625--1634}, publisher = {Computer Vision Foundation / {IEEE} Computer Society}, year = {2018}, url = {http://openaccess.thecvf.com/content\_cvpr\_2018/html/Eykholt\_Robust\_Physical-World\_Attacks\_CVPR\_2018\_paper.html}, doi = {10.1109/CVPR.2018.00175}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/EykholtEF0RXPKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LebeckRKR18, author = {Kiron Lebeck and Kimberly Ruth and Tadayoshi Kohno and Franziska Roesner}, title = {Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {392--408}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00051}, doi = {10.1109/SP.2018.00051}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LebeckRKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SimkoLIRK18, author = {Lucy Simko and Ada Lerner and Samia Ibtasam and Franziska Roesner and Tadayoshi Kohno}, title = {Computer Security and Privacy for Refugees in the United States}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {409--423}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00023}, doi = {10.1109/SP.2018.00023}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/SimkoLIRK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/SongEEF0RTPK18, author = {Dawn Song and Kevin Eykholt and Ivan Evtimov and Earlence Fernandes and Bo Li and Amir Rahmati and Florian Tram{\`{e}}r and Atul Prakash and Tadayoshi Kohno}, editor = {Christian Rossow and Yves Younan}, title = {Physical Adversarial Examples for Object Detectors}, booktitle = {12th {USENIX} Workshop on Offensive Technologies, {WOOT} 2018, Baltimore, MD, USA, August 13-14, 2018}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/woot18/presentation/eykholt}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/woot/SongEEF0RTPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-10557, author = {Stefano Baldassi and Tadayoshi Kohno and Franziska Roesner and Moqian Tian}, title = {Challenges and New Directions in Augmented Reality, Computer Security, and Neuroscience - Part 1: Risks to Sensation and Perception}, journal = {CoRR}, volume = {abs/1806.10557}, year = {2018}, url = {http://arxiv.org/abs/1806.10557}, eprinttype = {arXiv}, eprint = {1806.10557}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-10557.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-07769, author = {Kevin Eykholt and Ivan Evtimov and Earlence Fernandes and Bo Li and Amir Rahmati and Florian Tram{\`{e}}r and Atul Prakash and Tadayoshi Kohno and Dawn Song}, title = {Physical Adversarial Examples for Object Detectors}, journal = {CoRR}, volume = {abs/1807.07769}, year = {2018}, url = {http://arxiv.org/abs/1807.07769}, eprinttype = {arXiv}, eprint = {1807.07769}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-07769.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-02895, author = {Peter M. Ney and Luis Ceze and Tadayoshi Kohno}, title = {Computer Security Risks of Distant Relative Matching in Consumer Genetic Databases}, journal = {CoRR}, volume = {abs/1810.02895}, year = {2018}, url = {http://arxiv.org/abs/1810.02895}, eprinttype = {arXiv}, eprint = {1810.02895}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-02895.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imwut/NandakumarTKG17, author = {Rajalakshmi Nandakumar and Alex Takakuwa and Tadayoshi Kohno and Shyamnath Gollakota}, title = {CovertBand: Activity Information Leakage using Music}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {1}, number = {3}, pages = {87:1--87:24}, year = {2017}, url = {https://doi.org/10.1145/3131897}, doi = {10.1145/3131897}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imwut/NandakumarTKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/NeySCK17, author = {Peter Ney and Ian Smith and Gabriel Cadamuro and Tadayoshi Kohno}, title = {SeaGlass: Enabling City-Wide IMSI-Catcher Detection}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {3}, pages = {39}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0027}, doi = {10.1515/POPETS-2017-0027}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/NeySCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LernerKR17, author = {Ada Lerner and Tadayoshi Kohno and Franziska Roesner}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Rewriting History: Changing the Archived Web from the Present}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1741--1755}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134042}, doi = {10.1145/3133956.3134042}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LernerKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/GebhartK17, author = {Genevieve Gebhart and Tadayoshi Kohno}, title = {Internet Censorship in Thailand: User Practices and Potential Threats}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {417--432}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.50}, doi = {10.1109/EUROSP.2017.50}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/GebhartK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/SimpsonRK17, author = {Anna Kornfeld Simpson and Franziska Roesner and Tadayoshi Kohno}, title = {Securing vulnerable home IoT devices with an in-hub security manager}, booktitle = {2017 {IEEE} International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2017, Kona, Big Island, HI, USA, March 13-17, 2017}, pages = {551--556}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/PERCOMW.2017.7917622}, doi = {10.1109/PERCOMW.2017.7917622}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/percom/SimpsonRK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LebeckRKR17, author = {Kiron Lebeck and Kimberly Ruth and Tadayoshi Kohno and Franziska Roesner}, title = {Securing Augmented Reality Output}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {320--337}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.13}, doi = {10.1109/SP.2017.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LebeckRKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NeyKOCK17, author = {Peter Ney and Karl Koscher and Lee Organick and Luis Ceze and Tadayoshi Kohno}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Computer Security, Privacy, and {DNA} Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {765--779}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ney}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/NeyKOCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/VinesRK17, author = {Paul Vines and Franziska Roesner and Tadayoshi Kohno}, editor = {Bhavani Thuraisingham and Adam J. Lee}, title = {Exploring {ADINT:} Using Ad Targeting for Surveillance on a Budget - or - How Alice Can Buy Ads to Track Bob}, booktitle = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30 - November 3, 2017}, pages = {153--164}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139550.3139567}, doi = {10.1145/3139550.3139567}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/wpes/VinesRK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/CobbK17, author = {Camille Cobb and Tadayoshi Kohno}, editor = {Rick Barrett and Rick Cummings and Eugene Agichtein and Evgeniy Gabrilovich}, title = {How Public Is My Private Life?: Privacy in Online Dating}, booktitle = {Proceedings of the 26th International Conference on World Wide Web, {WWW} 2017, Perth, Australia, April 3-7, 2017}, pages = {1231--1240}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3038912.3052592}, doi = {10.1145/3038912.3052592}, timestamp = {Tue, 06 Nov 2018 16:57:07 +0100}, biburl = {https://dblp.org/rec/conf/www/CobbK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/EvtimovEFKLPRS17, author = {Ivan Evtimov and Kevin Eykholt and Earlence Fernandes and Tadayoshi Kohno and Bo Li and Atul Prakash and Amir Rahmati and Dawn Song}, title = {Robust Physical-World Attacks on Machine Learning Models}, journal = {CoRR}, volume = {abs/1707.08945}, year = {2017}, url = {http://arxiv.org/abs/1707.08945}, eprinttype = {arXiv}, eprint = {1707.08945}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/EvtimovEFKLPRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-08062, author = {Kevin Eykholt and Ivan Evtimov and Earlence Fernandes and Bo Li and Dawn Song and Tadayoshi Kohno and Amir Rahmati and Atul Prakash and Florian Tram{\`{e}}r}, title = {Note on Attacking Object Detectors with Adversarial Stickers}, journal = {CoRR}, volume = {abs/1712.08062}, year = {2017}, url = {http://arxiv.org/abs/1712.08062}, eprinttype = {arXiv}, eprint = {1712.08062}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-08062.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/EnevTKK16, author = {Miro Enev and Alex Takakuwa and Karl Koscher and Tadayoshi Kohno}, title = {Automobile Driver Fingerprinting}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {1}, pages = {34--50}, year = {2016}, url = {https://doi.org/10.1515/popets-2015-0029}, doi = {10.1515/POPETS-2015-0029}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/EnevTKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/software/Cleland-HuangDK16, author = {Jane Cleland{-}Huang and Tamara Denning and Tadayoshi Kohno and Forrest Shull and Samuel Weber}, title = {Keeping Ahead of Our Adversaries}, journal = {{IEEE} Softw.}, volume = {33}, number = {3}, pages = {24--28}, year = {2016}, url = {https://doi.org/10.1109/MS.2016.75}, doi = {10.1109/MS.2016.75}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/software/Cleland-HuangDK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/LernerSKR16, author = {Ada Lerner and Anna Kornfeld Simpson and Tadayoshi Kohno and Franziska Roesner}, title = {Excavating Web Trackers Using Web Archaeology}, journal = {login Usenix Mag.}, volume = {41}, number = {4}, year = {2016}, url = {https://www.usenix.org/publications/login/winter2016/lerner}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/usenix-login/LernerSKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/HinikerHKK16, author = {Alexis Hiniker and Sungsoo (Ray) Hong and Tadayoshi Kohno and Julie A. Kientz}, editor = {Jofish Kaye and Allison Druin and Cliff Lampe and Dan Morris and Juan Pablo Hourcade}, title = {MyTime: Designing and Evaluating an Intervention for Smartphone Non-Use}, booktitle = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing Systems, San Jose, CA, USA, May 7-12, 2016}, pages = {4746--4757}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2858036.2858403}, doi = {10.1145/2858036.2858403}, timestamp = {Wed, 01 Jun 2022 08:38:38 +0200}, biburl = {https://dblp.org/rec/conf/chi/HinikerHKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/HinikerPKK16, author = {Alexis Hiniker and Shwetak N. Patel and Tadayoshi Kohno and Julie A. Kientz}, editor = {Paul Lukowicz and Antonio Kr{\"{u}}ger and Andreas Bulling and Youn{-}Kyung Lim and Shwetak N. Patel}, title = {Why would you do that? predicting the uses and gratifications behind smartphone-usage behaviors}, booktitle = {Proceedings of the 2016 {ACM} International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2016, Heidelberg, Germany, September 12-16, 2016}, pages = {634--645}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2971648.2971762}, doi = {10.1145/2971648.2971762}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/huc/HinikerPKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictd/CobbSRARK16, author = {Camille Cobb and Samuel Sudar and Nicholas Reiter and Richard J. Anderson and Franziska Roesner and Tadayoshi Kohno}, editor = {Kentaro Toyama}, title = {Computer Security for Data Collection Technologies}, booktitle = {Proceedings of the Eighth International Conference on Information and Communication Technologies and Development, {ICTD} 2016, Ann Arbor, MI, USA, June 03 - 06, 2016}, pages = {2}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909609.2909660}, doi = {10.1145/2909609.2909660}, timestamp = {Tue, 06 Nov 2018 16:58:13 +0100}, biburl = {https://dblp.org/rec/conf/ictd/CobbSRARK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/ScottAKK16, author = {Will Scott and Thomas E. Anderson and Tadayoshi Kohno and Arvind Krishnamurthy}, editor = {Ajay Gulati and Hakim Weatherspoon}, title = {Satellite: Joint Analysis of CDNs and Network-Level Interference}, booktitle = {2016 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2016, Denver, CO, USA, June 22-24, 2016}, pages = {195--208}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/atc16/technical-sessions/presentation/scott}, timestamp = {Mon, 01 Feb 2021 17:03:06 +0100}, biburl = {https://dblp.org/rec/conf/usenix/ScottAKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LernerSKR16, author = {Ada Lerner and Anna Kornfeld Simpson and Tadayoshi Kohno and Franziska Roesner}, editor = {Thorsten Holz and Stefan Savage}, title = {Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/lerner}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/LernerSKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/LebeckKR16, author = {Kiron Lebeck and Tadayoshi Kohno and Franziska Roesner}, editor = {David Chu and Prabal Dutta}, title = {How to Safely Augment Reality: Challenges and Directions}, booktitle = {Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, HotMobile 2016, St. Augustine, FL, USA, February 23-24, 2016}, pages = {45--50}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2873587.2873595}, doi = {10.1145/2873587.2873595}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wmcsa/LebeckKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/McReynoldsLSRK15, author = {Emily McReynolds and Adam Lerner and Will Scott and Franziska Roesner and Tadayoshi Kohno}, editor = {Michael Brenner and Nicolas Christin and Benjamin Johnson and Kurt Rohloff}, title = {Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions}, booktitle = {Financial Cryptography and Data Security - {FC} 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8976}, pages = {94--111}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48051-9\_8}, doi = {10.1007/978-3-662-48051-9\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/McReynoldsLSRK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccps/BonaciYHKC15, author = {Tamara Bonaci and Junjie Yan and Jeffrey Herron and Tadayoshi Kohno and Howard Jay Chizeck}, editor = {Alexandre M. Bayen and Michael S. Branicky}, title = {Experimental analysis of denial-of-service attacks on teleoperated robotic systems}, booktitle = {Proceedings of the {ACM/IEEE} Sixth International Conference on Cyber-Physical Systems, {ICCPS} 2015, Seattle, WA, USA, April 14-16, 2015}, pages = {11--20}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2735960.2735980}, doi = {10.1145/2735960.2735980}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccps/BonaciYHKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/LernerSOTVKR15, author = {Adam Lerner and Alisha Saxena and Kirk Ouimet and Ben Turley and Anthony Vance and Tadayoshi Kohno and Franziska Roesner}, editor = {Gaetano Borriello and Giovanni Pau and Marco Gruteser and Jason I. Hong}, title = {Analyzing the Use of Quick Response Codes in the Wild}, booktitle = {Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2015, Florence, Italy, May 19-22, 2015}, pages = {359--374}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2742647.2742650}, doi = {10.1145/2742647.2742650}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/LernerSOTVKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/HassaniehWKK15, author = {Haitham Hassanieh and Jue Wang and Dina Katabi and Tadayoshi Kohno}, title = {Securing RFIDs by Randomizing the Modulation and Channel}, booktitle = {12th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 15, Oakland, CA, USA, May 4-6, 2015}, pages = {235--249}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/nsdi15/technical-sessions/presentation/hassanieh}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsdi/HassaniehWKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/KoscherKM15, author = {Karl Koscher and Tadayoshi Kohno and David Molnar}, editor = {Aur{\'{e}}lien Francillon and Thomas Ptacek}, title = {{SURROGATES:} Enabling Near-Real-Time Dynamic Analyses of Embedded Systems}, booktitle = {9th {USENIX} Workshop on Offensive Technologies, {WOOT} '15, Washington, DC, USA, August 10-11, 2015}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/woot15/workshop-program/presentation/koscher}, timestamp = {Mon, 01 Feb 2021 08:41:51 +0100}, biburl = {https://dblp.org/rec/conf/woot/KoscherKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/VinesK15, author = {Paul Vines and Tadayoshi Kohno}, editor = {Indrajit Ray and Nicholas Hopper and Rob Jansen}, title = {Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform}, booktitle = {Proceedings of the 14th {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2015, Denver, Colorado, USA, October 12, 2015}, pages = {75--84}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808138.2808141}, doi = {10.1145/2808138.2808141}, timestamp = {Tue, 06 Nov 2018 16:59:07 +0100}, biburl = {https://dblp.org/rec/conf/wpes/VinesK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BonaciHYYKC15, author = {Tamara Bonaci and Jeffrey Herron and Tariq Yusuf and Junjie Yan and Tadayoshi Kohno and Howard Jay Chizeck}, title = {To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots}, journal = {CoRR}, volume = {abs/1504.04339}, year = {2015}, url = {http://arxiv.org/abs/1504.04339}, eprinttype = {arXiv}, eprint = {1504.04339}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BonaciHYYKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchneierFKR15, author = {Bruce Schneier and Matthew Fredrikson and Tadayoshi Kohno and Thomas Ristenpart}, title = {Surreptitiously Weakening Cryptographic Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {97}, year = {2015}, url = {http://eprint.iacr.org/2015/097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchneierFKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/RoesnerKM14, author = {Franziska Roesner and Tadayoshi Kohno and David Molnar}, title = {Security and privacy for augmented reality systems}, journal = {Commun. {ACM}}, volume = {57}, number = {4}, pages = {88--96}, year = {2014}, url = {https://doi.org/10.1145/2580723.2580730}, doi = {10.1145/2580723.2580730}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/RoesnerKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/WangKB14, author = {Xinran Wang and Tadayoshi Kohno and Bob Blakley}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {Polymorphism as a Defense for Automated Attack of Websites}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {513--530}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_30}, doi = {10.1007/978-3-319-07536-5\_30}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/WangKB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DenningKFRGK14, author = {Tamara Denning and Daniel B. Kramer and Batya Friedman and Matthew R. Reynolds and Brian T. Gill and Tadayoshi Kohno}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {{CPS:} beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {426--435}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664289}, doi = {10.1145/2664243.2664289}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DenningKFRGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RoesnerMMKW14, author = {Franziska Roesner and David Molnar and Alexander Moshchuk and Tadayoshi Kohno and Helen J. Wang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {World-Driven Access Control for Continuous Sensing}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1169--1181}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660319}, doi = {10.1145/2660267.2660319}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RoesnerMMKW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/DenningDK14, author = {Tamara Denning and Zakariya Dehlawi and Tadayoshi Kohno}, editor = {Matt Jones and Philippe A. Palanque and Albrecht Schmidt and Tovi Grossman}, title = {In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies}, booktitle = {{CHI} Conference on Human Factors in Computing Systems, CHI'14, Toronto, ON, Canada - April 26 - May 01, 2014}, pages = {2377--2386}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556288.2557352}, doi = {10.1145/2556288.2557352}, timestamp = {Tue, 01 Jun 2021 15:21:43 +0200}, biburl = {https://dblp.org/rec/conf/chi/DenningDK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RoesnerGK14, author = {Franziska Roesner and Brian T. Gill and Tadayoshi Kohno}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {64--76}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_5}, doi = {10.1007/978-3-662-45472-5\_5}, timestamp = {Tue, 21 Mar 2023 20:59:40 +0100}, biburl = {https://dblp.org/rec/conf/fc/RoesnerGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/JungK14, author = {Jaeyeon Jung and Tadayoshi Kohno}, editor = {A. J. Brush and Adrian Friday and Julie A. Kientz and James Scott and Junehwa Song}, title = {Workshop on usable privacy {\&} security for wearable and domestic ubiquitous devices {(UPSIDE)}}, booktitle = {Proceedings of the 2014 {ACM} International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '14 Adjunct Publication, Seattle, WA, {USA} - September 13 - 17, 2014}, pages = {1279--1282}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2638728.2641712}, doi = {10.1145/2638728.2641712}, timestamp = {Tue, 26 Mar 2024 11:01:21 +0100}, biburl = {https://dblp.org/rec/conf/huc/JungK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/RoesnerKDCN14, author = {Franziska Roesner and Tadayoshi Kohno and Tamara Denning and Ryan Calo and Bryce Clayton Newell}, editor = {A. J. Brush and Adrian Friday and Julie A. Kientz and James Scott and Junehwa Song}, title = {Augmented reality: hard problems of law and policy}, booktitle = {Proceedings of the 2014 {ACM} International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '14 Adjunct Publication, Seattle, WA, {USA} - September 13 - 17, 2014}, pages = {1283--1288}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2638728.2641709}, doi = {10.1145/2638728.2641709}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/huc/RoesnerKDCN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DenningSK14, author = {Tamara Denning and Adam Shostack and Tadayoshi Kohno}, editor = {Zachary N. J. Peterson}, title = {Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research}, booktitle = {2014 {USENIX} Summit on Gaming, Games, and Gamification in Security Education, 3GSE '14, San Diego, CA, USA, August 18, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/3gse14/summit-program/presentation/denning}, timestamp = {Mon, 01 Feb 2021 08:43:14 +0100}, biburl = {https://dblp.org/rec/conf/uss/DenningSK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/DenningKL13, author = {Tamara Denning and Tadayoshi Kohno and Henry M. Levy}, title = {Computer security and the modern home}, journal = {Commun. {ACM}}, volume = {56}, number = {1}, pages = {94--103}, year = {2013}, url = {https://doi.org/10.1145/2398356.2398377}, doi = {10.1145/2398356.2398377}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/DenningKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DenningLSK13, author = {Tamara Denning and Adam Lerner and Adam Shostack and Tadayoshi Kohno}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {915--928}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516753}, doi = {10.1145/2508859.2516753}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DenningLSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/DAntoniDJKLMMORSVW13, author = {Loris D'Antoni and Alan M. Dunn and Suman Jana and Tadayoshi Kohno and Benjamin Livshits and David Molnar and Alexander Moshchuk and Eyal Ofek and Franziska Roesner and T. Scott Saponas and Margus Veanes and Helen J. Wang}, editor = {Petros Maniatis}, title = {Operating System Support for Augmented Reality Applications}, booktitle = {14th Workshop on Hot Topics in Operating Systems, HotOS XIV, Santa Ana Pueblo, New Mexico, USA, May 13-15, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/hotos13/session/d\%27antoni}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/hotos/DAntoniDJKLMMORSVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/laseres/OluwafemiKGP13, author = {Temitope Oluwafemi and Tadayoshi Kohno and Sidhant Gupta and Shwetak N. Patel}, title = {Experimental Security Analyses of Non-Networked Compact Fluorescent Lamps: {A} Case Study of Home Automation Security}, booktitle = {2013 Workshop on Learning from Authoritative Security Experiment Results, {LASER} 2013, Arlington, VA, USA, October 16-17, 2013}, pages = {13--24}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/laser2013/program/oluwafemi}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/laseres/OluwafemiKGP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/DenningKS13, author = {Tamara Denning and Tadayoshi Kohno and Adam Shostack}, editor = {Tracy Camp and Paul T. Tymann and J. D. Dougherty and Kris Nagel}, title = {Control-Alt-Hack{\texttrademark}: a card game for computer security outreach and education (abstract only)}, booktitle = {The 44th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2013, Denver, CO, USA, March 6-9, 2013}, pages = {729}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2445196.2445408}, doi = {10.1145/2445196.2445408}, timestamp = {Tue, 23 Mar 2021 10:54:19 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/DenningKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RoesnerK13, author = {Franziska Roesner and Tadayoshi Kohno}, editor = {Samuel T. King}, title = {Securing Embedded User Interfaces: Android and Beyond}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {97--112}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/roesner}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/RoesnerK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/CzeskisMKW13, author = {Alexei Czeskis and Alexander Moshchuk and Tadayoshi Kohno and Helen J. Wang}, editor = {Daniel Schwabe and Virg{\'{\i}}lio A. F. Almeida and Hartmut Glaser and Ricardo Baeza{-}Yates and Sue B. Moon}, title = {Lightweight server support for browser-based {CSRF} protection}, booktitle = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro, Brazil, May 13-17, 2013}, pages = {273--284}, publisher = {International World Wide Web Conferences Steering Committee / {ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488388.2488413}, doi = {10.1145/2488388.2488413}, timestamp = {Sun, 22 Sep 2019 18:15:38 +0200}, biburl = {https://dblp.org/rec/conf/www/CzeskisMKW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/RoesnerRKW12, author = {Franziska Roesner and Christopher Rovillos and Tadayoshi Kohno and David Wetherall}, title = {ShareMeNot: Balancing Privacy and Functionality of Third-Party Social Widgets}, journal = {login Usenix Mag.}, volume = {37}, number = {4}, year = {2012}, url = {https://www.usenix.org/publications/login/august-2012-volume-37-number-4/sharemenot-balancing-privacy-and-functionality}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/RoesnerRKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EnevJBRK12, author = {Miro Enev and Jaeyeon Jung and Liefeng Bo and Xiaofeng Ren and Tadayoshi Kohno}, editor = {Robert H'obbes' Zakon}, title = {SensorSift: balancing sensor data privacy and utility in automated face understanding}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {149--158}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420975}, doi = {10.1145/2420950.2420975}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/EnevJBRK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CzeskisDKWB12, author = {Alexei Czeskis and Michael Dietz and Tadayoshi Kohno and Dan S. Wallach and Dirk Balfanz}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Strengthening user authentication through opportunistic cryptographic identity assertions}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {404--414}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382240}, doi = {10.1145/2382196.2382240}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CzeskisDKWB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/RoesnerKW12, author = {Franziska Roesner and Tadayoshi Kohno and David Wetherall}, editor = {Steven D. Gribble and Dina Katabi}, title = {Detecting and Defending Against Third-Party Tracking on the Web}, booktitle = {Proceedings of the 9th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2012, San Jose, CA, USA, April 25-27, 2012}, pages = {155--168}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/nsdi12/technical-sessions/presentation/roesner}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/RoesnerKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RoesnerKMPWC12, author = {Franziska Roesner and Tadayoshi Kohno and Alexander Moshchuk and Bryan Parno and Helen J. Wang and Crispin Cowan}, title = {User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {224--238}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.24}, doi = {10.1109/SP.2012.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/RoesnerKMPWC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uist/RoesnerFK12, author = {Franziska Roesner and James Fogarty and Tadayoshi Kohno}, editor = {Rob Miller and Hrvoje Benko and Celine Latulipe}, title = {User interface toolkit mechanisms for securing interface elements}, booktitle = {The 25th Annual {ACM} Symposium on User Interface Software and Technology, {UIST} '12, Cambridge, MA, USA, October 7-10, 2012}, pages = {239--250}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2380116.2380147}, doi = {10.1145/2380116.2380147}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uist/RoesnerFK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PaulK12, author = {Nathanael Paul and Tadayoshi Kohno}, editor = {Carl A. Gunter and Zachary N. J. Peterson}, title = {Security Risks, Low-tech User Interfaces, and Implantable Medical Devices: {A} Case Study with Insulin Pump Infusion Systems}, booktitle = {3rd {USENIX} Workshop on Health Security and Privacy, HealthSec'12, Bellevue, WA, USA, August 6-7, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/healthsec12/workshop-program/presentation/paul}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/PaulK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Kohno12, author = {Tadayoshi Kohno}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Security for cyber-physical systems: case studies with medical devices, robots, and automobiles}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {99--100}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185462}, doi = {10.1145/2185448.2185462}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Kohno12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2012, editor = {Tadayoshi Kohno}, title = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, publisher = {{USENIX} Association}, year = {2012}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/AfanasyevKMMSSV11, author = {Mikhail Afanasyev and Tadayoshi Kohno and Justin Ma and Nick Murphy and Stefan Savage and Alex C. Snoeren and Geoffrey M. Voelker}, title = {Privacy-preserving network forensics}, journal = {Commun. {ACM}}, volume = {54}, number = {5}, pages = {78--87}, year = {2011}, url = {https://doi.org/10.1145/1941487.1941508}, doi = {10.1145/1941487.1941508}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/AfanasyevKMMSSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/ZhuJSKW11, author = {David (Yu) Zhu and Jaeyeon Jung and Dawn Song and Tadayoshi Kohno and David Wetherall}, title = {TaintEraser: protecting sensitive data leaks using application-level taint tracking}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {45}, number = {1}, pages = {142--154}, year = {2011}, url = {https://doi.org/10.1145/1945023.1945039}, doi = {10.1145/1945023.1945039}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/ZhuJSKW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EnevGKP11, author = {Miro Enev and Sidhant Gupta and Tadayoshi Kohno and Shwetak N. Patel}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Televisions, video privacy, and powerline electromagnetic interference}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {537--550}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046770}, doi = {10.1145/2046707.2046770}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EnevGKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/GeambasuJGKL11, author = {Roxana Geambasu and John P. John and Steven D. Gribble and Tadayoshi Kohno and Henry M. Levy}, editor = {Christoph M. Kirsch and Gernot Heiser}, title = {Keypad: an auditing file system for theft-prone devices}, booktitle = {European Conference on Computer Systems, Proceedings of the Sixth European conference on Computer systems, EuroSys 2011, Salzburg, Austria, April 10-13, 2011}, pages = {1--16}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966445.1966447}, doi = {10.1145/1966445.1966447}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/GeambasuJGKL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/KohnoJ11, author = {Tadayoshi Kohno and Brian David Johnson}, editor = {Thomas J. Cortina and Ellen Lowenfeld Walker and Laurie A. Smith King and David R. Musicant}, title = {Science fiction prototyping and security education: cultivating contextual and societal thinking in computer security education and beyond}, booktitle = {Proceedings of the 42nd {ACM} technical symposium on Computer science education, {SIGCSE} 2011, Dallas, TX, USA, March 9-12, 2011}, pages = {9--14}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1953163.1953173}, doi = {10.1145/1953163.1953173}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcse/KohnoJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CheckowayMKASSKCRK11, author = {Stephen Checkoway and Damon McCoy and Brian Kantor and Danny Anderson and Hovav Shacham and Stefan Savage and Karl Koscher and Alexei Czeskis and Franziska Roesner and Tadayoshi Kohno}, title = {Comprehensive Experimental Analyses of Automotive Attack Surfaces}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Checkoway.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CheckowayMKASSKCRK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/MaganisJKSW11, author = {Gabriel Maganis and Jaeyeon Jung and Tadayoshi Kohno and Anmol Sheth and David Wetherall}, editor = {Anthony LaMarca and Landon P. Cox}, title = {Sensor tricorder: what does that sensor know about me?}, booktitle = {12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, Phoenix, AZ, USA, March 1-3, 2011}, pages = {98--103}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2184489.2184510}, doi = {10.1145/2184489.2184510}, timestamp = {Tue, 06 Nov 2018 16:59:22 +0100}, biburl = {https://dblp.org/rec/conf/wmcsa/MaganisJKSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0024293, author = {Niels Ferguson and Bruce Schneier and Tadayoshi Kohno}, title = {Cryptography Engineering - Design Principles and Practical Applications}, publisher = {Wiley}, year = {2010}, url = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470474246.html}, isbn = {978-0-470-47424-2}, timestamp = {Mon, 13 Mar 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0024293.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RichardsonGK10, author = {David W. Richardson and Steven D. Gribble and Tadayoshi Kohno}, editor = {Rachel Greenstadt}, title = {The limits of automatic {OS} fingerprint generation}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010}, pages = {24--34}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866423.1866430}, doi = {10.1145/1866423.1866430}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RichardsonGK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/DenningBFGKM10, author = {Tamara Denning and Alan Borning and Batya Friedman and Brian T. Gill and Tadayoshi Kohno and William H. Maisel}, editor = {Elizabeth D. Mynatt and Don Schoner and Geraldine Fitzpatrick and Scott E. Hudson and W. Keith Edwards and Tom Rodden}, title = {Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices}, booktitle = {Proceedings of the 28th International Conference on Human Factors in Computing Systems, {CHI} 2010, Atlanta, Georgia, USA, April 10-15, 2010}, pages = {917--926}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1753326.1753462}, doi = {10.1145/1753326.1753462}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/DenningBFGKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eccv/ShanCK10, author = {Qi Shan and Brian Curless and Tadayoshi Kohno}, editor = {Kostas Daniilidis and Petros Maragos and Nikos Paragios}, title = {Seeing through Obscure Glass}, booktitle = {Computer Vision - {ECCV} 2010 - 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {6316}, pages = {364--378}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15567-3\_27}, doi = {10.1007/978-3-642-15567-3\_27}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eccv/ShanCK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/osdi/GeambasuLKKL10, author = {Roxana Geambasu and Amit A. Levy and Tadayoshi Kohno and Arvind Krishnamurthy and Henry M. Levy}, editor = {Remzi H. Arpaci{-}Dusseau and Brad Chen}, title = {Comet: An active distributed key-value store}, booktitle = {9th {USENIX} Symposium on Operating Systems Design and Implementation, {OSDI} 2010, October 4-6, 2010, Vancouver, BC, Canada, Proceedings}, pages = {323--336}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/osdi10/tech/full\_papers/Geambasu.pdf}, timestamp = {Thu, 12 Mar 2020 11:35:55 +0100}, biburl = {https://dblp.org/rec/conf/osdi/GeambasuLKKL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/CzeskisDYBFGK10, author = {Alexei Czeskis and Ivayla Dermendjieva and Hussein Yapit and Alan Borning and Batya Friedman and Brian T. Gill and Tadayoshi Kohno}, editor = {Lorrie Faith Cranor}, title = {Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety}, booktitle = {Proceedings of the Sixth Symposium on Usable Privacy and Security, {SOUPS} 2010, Redmond, Washington, USA, July 14-16, 2010}, series = {{ACM} International Conference Proceeding Series}, volume = {485}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1837110.1837130}, doi = {10.1145/1837110.1837130}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/CzeskisDYBFGK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KoscherCRPKCMKASS10, author = {Karl Koscher and Alexei Czeskis and Franziska Roesner and Shwetak N. Patel and Tadayoshi Kohno and Stephen Checkoway and Damon McCoy and Brian Kantor and Danny Anderson and Hovav Shacham and Stefan Savage}, title = {Experimental Security Analysis of a Modern Automobile}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {447--462}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.34}, doi = {10.1109/SP.2010.34}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/KoscherCRPKCMKASS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2010healthsec, editor = {Kevin Fu and Tadayoshi Kohno and Aviel D. Rubin}, title = {1st {USENIX} Workshop on Health Security and Privacy, HealthSec'10, Washington, D.C., USA, August 10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/healthsec10}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2010healthsec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GardnerBK09, author = {Ryan W. Gardner and Matt Bishop and Tadayoshi Kohno}, title = {Are Patched Machines Really Fixed?}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {5}, pages = {82--85}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.116}, doi = {10.1109/MSP.2009.116}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GardnerBK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KoscherJBK09, author = {Karl Koscher and Ari Juels and Vjekoslav Brajkovic and Tadayoshi Kohno}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {{EPC} {RFID} tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {33--42}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653668}, doi = {10.1145/1653662.1653668}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KoscherJBK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/EverittBFK09, author = {Katherine Everitt and Tanya Bragin and James Fogarty and Tadayoshi Kohno}, editor = {Dan R. Olsen Jr. and Richard B. Arthur and Ken Hinckley and Meredith Ringel Morris and Scott E. Hudson and Saul Greenberg}, title = {A comprehensive study of frequency, interference, and training of multiple graphical passwords}, booktitle = {Proceedings of the 27th International Conference on Human Factors in Computing Systems, {CHI} 2009, Boston, MA, USA, April 4-9, 2009}, pages = {889--898}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1518701.1518837}, doi = {10.1145/1518701.1518837}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/EverittBFK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/DenningMKSK09, author = {Tamara Denning and Cynthia Matuszek and Karl Koscher and Joshua R. Smith and Tadayoshi Kohno}, editor = {Sumi Helal and Hans Gellersen and Sunny Consolvo}, title = {A spotlight on security and privacy risks with future household robots: attacks and lessons}, booktitle = {UbiComp 2009: Ubiquitous Computing, 11th International Conference, UbiComp 2009, Orlando, Florida, USA, September 30 - October 3, 2009, Proceedings}, series = {{ACM} International Conference Proceeding Series}, pages = {105--114}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1620545.1620564}, doi = {10.1145/1620545.1620564}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/huc/DenningMKSK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/RaghavanKSW09, author = {Barath Raghavan and Tadayoshi Kohno and Alex C. Snoeren and David Wetherall}, editor = {Ian Goldberg and Mikhail J. Atallah}, title = {Enlisting ISPs to Improve Online Privacy: {IP} Address Mixing by Default}, booktitle = {Privacy Enhancing Technologies, 9th International Symposium, {PETS} 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5672}, pages = {143--163}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03168-7\_9}, doi = {10.1007/978-3-642-03168-7\_9}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/RaghavanKSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GeambasuKLL09, author = {Roxana Geambasu and Tadayoshi Kohno and Amit A. Levy and Henry M. Levy}, editor = {Fabian Monrose}, title = {Vanish: Increasing Data Privacy with Self-Destructing Data}, booktitle = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings}, pages = {299--316}, publisher = {{USENIX} Association}, year = {2009}, url = {http://www.usenix.org/events/sec09/tech/full\_papers/geambasu.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GeambasuKLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbdallaBCKKLMNPS08, author = {Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone{-}Lee and Gregory Neven and Pascal Paillier and Haixia Shi}, title = {Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions}, journal = {J. Cryptol.}, volume = {21}, number = {3}, pages = {350--391}, year = {2008}, url = {https://doi.org/10.1007/s00145-007-9006-6}, doi = {10.1007/S00145-007-9006-6}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdallaBCKKLMNPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pervasive/Kohno08, author = {Tadayoshi Kohno}, title = {An Interview with {RFID} Security Expert Ari Juels}, journal = {{IEEE} Pervasive Comput.}, volume = {7}, number = {1}, pages = {10--11}, year = {2008}, url = {https://doi.org/10.1109/MPRV.2008.4}, doi = {10.1109/MPRV.2008.4}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pervasive/Kohno08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pervasive/HalperinHFKM08, author = {Daniel Halperin and Thomas S. Heydt{-}Benjamin and Kevin Fu and Tadayoshi Kohno and William H. Maisel}, title = {Security and Privacy for Implantable Medical Devices}, journal = {{IEEE} Pervasive Comput.}, volume = {7}, number = {1}, pages = {30--39}, year = {2008}, url = {https://doi.org/10.1109/MPRV.2008.16}, doi = {10.1109/MPRV.2008.16}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pervasive/HalperinHFKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JungSGWMK08, author = {Jaeyeon Jung and Anmol Sheth and Ben Greenstein and David Wetherall and Gabriel Maganis and Tadayoshi Kohno}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Privacy oracle: a system for finding application leaks with black box differential testing}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {279--288}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455806}, doi = {10.1145/1455770.1455806}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JungSGWMK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CzeskisKSK08, author = {Alexei Czeskis and Karl Koscher and Joshua R. Smith and Tadayoshi Kohno}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {479--490}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455831}, doi = {10.1145/1455770.1455831}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CzeskisKSK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/GreensteinMPKSW08, author = {Ben Greenstein and Damon McCoy and Jeffrey Pang and Tadayoshi Kohno and Srinivasan Seshan and David Wetherall}, editor = {Dirk Grunwald and Richard Han and Eyal de Lara and Carla Schlatter Ellis}, title = {Improving wireless privacy with an identifier-free link layer protocol}, booktitle = {Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys 2008), Breckenridge, CO, USA, June 17-20, 2008}, pages = {40--53}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1378600.1378607}, doi = {10.1145/1378600.1378607}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/GreensteinMPKSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/ReisGKW08, author = {Charles Reis and Steven D. Gribble and Tadayoshi Kohno and Nicholas C. Weaver}, editor = {Jon Crowcroft and Michael Dahlin}, title = {Detecting In-Flight Page Changes with Web Tripwires}, booktitle = {5th {USENIX} Symposium on Networked Systems Design {\&} Implementation, {NSDI} 2008, April 16-18, 2008, San Francisco, CA, USA, Proceedings}, pages = {31--44}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/nsdi08/tech/full\_papers/reis/reis.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/ReisGKW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/McCoyBGKS08, author = {Damon McCoy and Kevin S. Bauer and Dirk Grunwald and Tadayoshi Kohno and Douglas C. Sicker}, editor = {Nikita Borisov and Ian Goldberg}, title = {Shining Light in Dark Places: Understanding the Tor Network}, booktitle = {Privacy Enhancing Technologies, 8th International Symposium, {PETS} 2008, Leuven, Belgium, July 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5134}, pages = {63--76}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70630-4\_5}, doi = {10.1007/978-3-540-70630-4\_5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pet/McCoyBGKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HalperinHRCDMFKM08, author = {Daniel Halperin and Thomas S. Heydt{-}Benjamin and Benjamin Ransford and Shane S. Clark and Benessa Defend and Will Morgan and Kevin Fu and Tadayoshi Kohno and William H. Maisel}, title = {Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {129--142}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.31}, doi = {10.1109/SP.2008.31}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/HalperinHRCDMFKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CzeskisHKGKS08, author = {Alexei Czeskis and David J. St. Hilaire and Karl Koscher and Steven D. Gribble and Tadayoshi Kohno and Bruce Schneier}, editor = {Niels Provos}, title = {Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling {OS} and Applications}, booktitle = {3rd {USENIX} Workshop on Hot Topics in Security, HotSec'08, San Jose, CA, USA, July 29, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/hotsec08/tech/full\_papers/czeskis/czeskis.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CzeskisHKGKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DenningFK08, author = {Tamara Denning and Kevin Fu and Tadayoshi Kohno}, editor = {Niels Provos}, title = {Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security}, booktitle = {3rd {USENIX} Workshop on Hot Topics in Security, HotSec'08, San Jose, CA, USA, July 29, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/hotsec08/tech/full\_papers/denning/denning.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DenningFK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PiatekKK08, author = {Michael Piatek and Tadayoshi Kohno and Arvind Krishnamurthy}, editor = {Niels Provos}, title = {Challenges and Directions for Monitoring {P2P} File Sharing Networks - or - Why My Printer Received a {DMCA} Takedown Notice}, booktitle = {3rd {USENIX} Workshop on Hot Topics in Security, HotSec'08, San Jose, CA, USA, July 29, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/hotsec08/tech/full\_papers/piatek/piatek.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/PiatekKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RistenpartMKK08, author = {Thomas Ristenpart and Gabriel Maganis and Arvind Krishnamurthy and Tadayoshi Kohno}, editor = {Paul C. van Oorschot}, title = {Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs}, booktitle = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August 1, 2008, San Jose, CA, {USA}}, pages = {275--290}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/sec08/tech/full\_papers/ristenpart/ristenpart.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/RistenpartMKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2008evt, editor = {David L. Dill and Tadayoshi Kohno}, title = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July 28-29, 2008, San Jose, CA, USA, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/2008evt.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pervasive/KripleanWKRBBKS07, author = {Travis Kriplean and Evan Welbourne and Nodira Khoussainova and Vibhor Rastogi and Magdalena Balazinska and Gaetano Borriello and Tadayoshi Kohno and Dan Suciu}, title = {Physical Access Control for Captured {RFID} Data}, journal = {{IEEE} Pervasive Comput.}, volume = {6}, number = {4}, pages = {48--55}, year = {2007}, url = {https://doi.org/10.1109/MPRV.2007.81}, doi = {10.1109/MPRV.2007.81}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pervasive/KripleanWKRBBKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/GreensteinGPCKSW07, author = {Ben Greenstein and Ramakrishna Gummadi and Jeffrey Pang and Mike Y. Chen and Tadayoshi Kohno and Srinivasan Seshan and David Wetherall}, editor = {Galen C. Hunt}, title = {Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era}, booktitle = {Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, May 7-9, 2005, San Diego, California, {USA}}, publisher = {{USENIX} Association}, year = {2007}, url = {http://www.usenix.org/events/hotos07/tech/full\_papers/greenstein/greenstein.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotos/GreensteinGPCKSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SaponasLHAK07, author = {T. Scott Saponas and Jonathan Lester and Carl Hartung and Sameer Agarwal and Tadayoshi Kohno}, editor = {Niels Provos}, title = {Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing}, booktitle = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA, August 6-10, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/16th-usenix-security-symposium/devices-tell-you-privacy-trends-consumer-ubiquitous}, timestamp = {Mon, 01 Feb 2021 08:43:02 +0100}, biburl = {https://dblp.org/rec/conf/uss/SaponasLHAK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/BauerMGKS07, author = {Kevin S. Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas C. Sicker}, editor = {Peng Ning and Ting Yu}, title = {Low-resource routing attacks against tor}, booktitle = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007}, pages = {11--20}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314333.1314336}, doi = {10.1145/1314333.1314336}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/BauerMGKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Kohno06, author = {Tadayoshi Kohno}, title = {Authenticated encryption in practice : generalized composition methods and the Secure Shell, CWC, and WinZip schemes}, school = {University of California, San Diego, {USA}}, year = {2006}, url = {http://www.escholarship.org/uc/item/7tz0v522}, timestamp = {Tue, 21 Mar 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Kohno06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellareKS06, author = {Mihir Bellare and Tadayoshi Kohno and Victor Shoup}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {380--389}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180452}, doi = {10.1145/1180405.1180452}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BellareKS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KelseyK06, author = {John Kelsey and Tadayoshi Kohno}, editor = {Serge Vaudenay}, title = {Herding Hash Functions and the Nostradamus Attack}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {183--200}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_12}, doi = {10.1007/11761679\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KelseyK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MolnarKSW06, author = {David Molnar and Tadayoshi Kohno and Naveen Sastry and David A. Wagner}, title = {Tamper-Evident, History-Independent, Subliminal-Free Data Structures on {PROM} Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract)}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {365--370}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.39}, doi = {10.1109/SP.2006.39}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/MolnarKSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MolnarKSW06, author = {David Molnar and Tadayoshi Kohno and Naveen Sastry and David A. Wagner}, title = {Tamper-Evident, History-Independent, Subliminal-Free Data Structures on {PROM} Storage -or- How to Store Ballots on a Voting Machine}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2006}, url = {http://eprint.iacr.org/2006/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MolnarKSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareKS06, author = {Mihir Bellare and Tadayoshi Kohno and Victor Shoup}, title = {Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2006}, url = {http://eprint.iacr.org/2006/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareKS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4344, author = {Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre}, title = {The Secure Shell {(SSH)} Transport Layer Encryption Modes}, journal = {{RFC}}, volume = {4344}, pages = {1--12}, year = {2006}, url = {https://doi.org/10.17487/RFC4344}, doi = {10.17487/RFC4344}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4344.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KohnoBC05, author = {Tadayoshi Kohno and Andre Broido and Kimberly C. Claffy}, title = {Remote Physical Device Fingerprintin}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {2}, pages = {93--108}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.26}, doi = {10.1109/TDSC.2005.26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/KohnoBC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaBCKKLMNPS05, author = {Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone{-}Lee and Gregory Neven and Pascal Paillier and Haixia Shi}, editor = {Victor Shoup}, title = {Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {205--222}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_13}, doi = {10.1007/11535218\_13}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaBCKKLMNPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KohnoBC05, author = {Tadayoshi Kohno and Andre Broido and Kimberly C. Claffy}, title = {Remote Physical Device Fingerprinting}, booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11 May 2005, Oakland, CA, {USA}}, pages = {211--225}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SP.2005.18}, doi = {10.1109/SP.2005.18}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KohnoBC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBCKKLMNPS05, author = {Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone{-}Lee and Gregory Neven and Pascal Paillier and Haixia Shi}, title = {Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2005}, url = {http://eprint.iacr.org/2005/254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBCKKLMNPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KelseyK05, author = {John Kelsey and Tadayoshi Kohno}, title = {Herding Hash Functions and the Nostradamus Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2005}, url = {http://eprint.iacr.org/2005/281}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KelseyK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuKK05, author = {Kevin Fu and Seny Kamara and Tadayoshi Kohno}, title = {Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2005}, url = {http://eprint.iacr.org/2005/303}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BellareKN04, author = {Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre}, title = {Breaking and provably repairing the {SSH} authenticated encryption scheme: {A} case study of the Encode-then-Encrypt-and-MAC paradigm}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {2}, pages = {206--241}, year = {2004}, url = {https://doi.org/10.1145/996943.996945}, doi = {10.1145/996943.996945}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BellareKN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kohno04, author = {Tadayoshi Kohno}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {Attacking and repairing the winZip encryption scheme}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {72--81}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030095}, doi = {10.1145/1030083.1030095}, timestamp = {Fri, 13 Nov 2020 16:10:44 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kohno04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareK04, author = {Mihir Bellare and Tadayoshi Kohno}, editor = {Christian Cachin and Jan Camenisch}, title = {Hash Function Balance and Its Impact on Birthday Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {401--418}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_24}, doi = {10.1007/978-3-540-24676-3\_24}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KohnoVW04, author = {Tadayoshi Kohno and John Viega and Doug Whiting}, editor = {Bimal K. Roy and Willi Meier}, title = {{CWC:} {A} High-Performance Conventional Authenticated Encryption Mode}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {408--426}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_26}, doi = {10.1007/978-3-540-25937-4\_26}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/KohnoVW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataK04, author = {Tetsu Iwata and Tadayoshi Kohno}, editor = {Bimal K. Roy and Willi Meier}, title = {New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {427--445}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_27}, doi = {10.1007/978-3-540-25937-4\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/IwataK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KohnoSRW04, author = {Tadayoshi Kohno and Adam Stubblefield and Aviel D. Rubin and Dan S. Wallach}, title = {Analysis of an Electronic Voting System}, booktitle = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12 May 2004, Berkeley, CA, {USA}}, pages = {27}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SECPRI.2004.1301313}, doi = {10.1109/SECPRI.2004.1301313}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/KohnoSRW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataK04, author = {Tetsu Iwata and Tadayoshi Kohno}, title = {New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2004}, url = {http://eprint.iacr.org/2004/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kohno04, author = {Tadayoshi Kohno}, title = {Analysis of the WinZip encryption method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2004}, url = {http://eprint.iacr.org/2004/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kohno04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareK03, author = {Mihir Bellare and Tadayoshi Kohno}, editor = {Eli Biham}, title = {A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {491--506}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_31}, doi = {10.1007/3-540-39200-9\_31}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenK03, author = {Lars R. Knudsen and Tadayoshi Kohno}, editor = {Thomas Johansson}, title = {Analysis of {RMAC}}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {182--191}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_14}, doi = {10.1007/978-3-540-39887-5\_14}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnudsenK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FergusonWSKLK03, author = {Niels Ferguson and Doug Whiting and Bruce Schneier and John Kelsey and Stefan Lucks and Tadayoshi Kohno}, editor = {Thomas Johansson}, title = {Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {330--346}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_24}, doi = {10.1007/978-3-540-39887-5\_24}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/FergusonWSKLK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareK03, author = {Mihir Bellare and Tadayoshi Kohno}, title = {Hash Function Balance and its Impact on Birthday Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2003}, url = {http://eprint.iacr.org/2003/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KohnoVW03, author = {Tadayoshi Kohno and John Viega and Doug Whiting}, title = {{CWC:} {A} high-performance conventional authenticated encryption mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {106}, year = {2003}, url = {http://eprint.iacr.org/2003/106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KohnoVW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KohnoPB03, author = {Tadayoshi Kohno and Adriana Palacio and John Black}, title = {Building Secure Cryptographic Transforms, or How to Encrypt and {MAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2003}, url = {http://eprint.iacr.org/2003/177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KohnoPB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ViegaBKM02, author = {John Viega and J. T. Bloch and Tadayoshi Kohno and Gary McGraw}, title = {Token-based scanning of source code for security problems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {3}, pages = {238--261}, year = {2002}, url = {https://doi.org/10.1145/545186.545188}, doi = {10.1145/545186.545188}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ViegaBKM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellareKN02, author = {Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre}, editor = {Vijayalakshmi Atluri}, title = {Authenticated encryption in {SSH:} provably fixing the {SSH} binary packet protocol}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {1--11}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586112}, doi = {10.1145/586110.586112}, timestamp = {Tue, 10 Nov 2020 20:00:47 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BellareKN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareKN02, author = {Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre}, title = {Breaking and Provably Repairing the {SSH} Authenticated Encryption Scheme: {A} Case Study of the Encode-then-Encrypt-and-MAC Paradigm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2002}, url = {http://eprint.iacr.org/2002/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareKN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kohno02, author = {Tadayoshi Kohno}, title = {Related-Key and Key-Collision Attacks Against {RMAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {159}, year = {2002}, url = {http://eprint.iacr.org/2002/159}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kohno02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/ViegaKP01, author = {John Viega and Tadayoshi Kohno and Bruce Potter}, title = {Trust (and mistrust) in secure applications}, journal = {Commun. {ACM}}, volume = {44}, number = {2}, pages = {31--36}, year = {2001}, url = {https://doi.org/10.1145/359205.359223}, doi = {10.1145/359205.359223}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/ViegaKP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jea/GabowK01, author = {Harold N. Gabow and Tadayoshi Kohno}, title = {A Network-Flow-Based Scheduler: Design, Performance History, and Experimental Analysis}, journal = {{ACM} J. Exp. Algorithmics}, volume = {6}, pages = {3}, year = {2001}, url = {https://doi.org/10.1145/945394.945397}, doi = {10.1145/945394.945397}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jea/GabowK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KohnoM01, author = {Tadayoshi Kohno and Mark McGovern}, editor = {Paul F. Syverson}, title = {On the Global Content {PMI:} Improved Copy-Protected Internet Content Distribution}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {70--81}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-46088-8\_9}, doi = {10.1007/3-540-46088-8\_9}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/KohnoM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/KohnoKS00, author = {Tadayoshi Kohno and John Kelsey and Bruce Schneier}, title = {Preliminary Cryptanalysis of Reduced-Round Serpent}, booktitle = {The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, {USA}}, pages = {195--211}, publisher = {National Institute of Standards and Technology,}, year = {2000}, timestamp = {Thu, 08 Aug 2019 17:13:16 +0200}, biburl = {https://dblp.org/rec/conf/aes/KohnoKS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KelseyKS00, author = {John Kelsey and Tadayoshi Kohno and Bruce Schneier}, editor = {Bruce Schneier}, title = {Amplified Boomerang Attacks Against Reduced-Round {MARS} and Serpent}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {75--93}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_6}, doi = {10.1007/3-540-44706-7\_6}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/KelseyKS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.