BibTeX records: Tadayoshi Kohno

download as .bib file

@article{DBLP:journals/ieeesp/RoesnerK24,
  author       = {Franziska Roesner and
                  Tadayoshi Kohno},
  title        = {Security and Privacy in the Metaverse},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {1},
  pages        = {7--9},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3333989},
  doi          = {10.1109/MSEC.2023.3333989},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RoesnerK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/McAmisSBK24,
  author       = {Rachel McAmis and
                  Mattea Sim and
                  Mia M. Bennett and
                  Tadayoshi Kohno},
  title        = {Over Fences and Into Yards: Privacy Threats and Concerns of Commercial
                  Satellites},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {1},
  pages        = {379--396},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0022},
  doi          = {10.56553/POPETS-2024-0022},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/McAmisSBK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-01048,
  author       = {Ryan W. Gardner and
                  Tadayoshi Kohno and
                  Alec Yasinsac},
  title        = {Attacking the Diebold Signature Variant - {RSA} Signatures with Unverified
                  High-order Padding},
  journal      = {CoRR},
  volume       = {abs/2403.01048},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.01048},
  doi          = {10.48550/ARXIV.2403.01048},
  eprinttype    = {arXiv},
  eprint       = {2403.01048},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-01048.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-04960,
  author       = {Yuhao Wu and
                  Franziska Roesner and
                  Tadayoshi Kohno and
                  Ning Zhang and
                  Umar Iqbal},
  title        = {SecGPT: An Execution Isolation Architecture for LLM-Based Systems},
  journal      = {CoRR},
  volume       = {abs/2403.04960},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.04960},
  doi          = {10.48550/ARXIV.2403.04960},
  eprinttype    = {arXiv},
  eprint       = {2403.04960},
  timestamp    = {Wed, 03 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-04960.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-14791,
  author       = {Jimin Mun and
                  Liwei Jiang and
                  Jenny T. Liang and
                  Inyoung Cheong and
                  Nicole DeCario and
                  Yejin Choi and
                  Tadayoshi Kohno and
                  Maarten Sap},
  title        = {Particip-AI: {A} Democratic Surveying Framework for Anticipating Future
                  {AI} Use Cases, Harms and Benefits},
  journal      = {CoRR},
  volume       = {abs/2403.14791},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.14791},
  doi          = {10.48550/ARXIV.2403.14791},
  eprinttype    = {arXiv},
  eprint       = {2403.14791},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-14791.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Kohno23,
  author       = {Tadayoshi Kohno},
  title        = {\{In Earth\} Until (Ready)},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {7--8},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3237099},
  doi          = {10.1109/MSEC.2023.3237099},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Kohno23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LandwehrRWTJKK23,
  author       = {Carl E. Landwehr and
                  Michael K. Reiter and
                  Laurie A. Williams and
                  Gene Tsudik and
                  Trent Jaeger and
                  Tadayoshi Kohno and
                  Apu Kapadia},
  title        = {Looking Backwards (and Forwards): {NSF} Secure and Trustworthy Computing
                  20-Year Retrospective Panel Transcription},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {32--42},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3208721},
  doi          = {10.1109/MSEC.2022.3208721},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LandwehrRWTJKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RedmilesBK23,
  author       = {Elissa M. Redmiles and
                  Mia M. Bennett and
                  Tadayoshi Kohno},
  title        = {Power in Computer Security and Privacy: {A} Critical Lens},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {48--52},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3238591},
  doi          = {10.1109/MSEC.2023.3238591},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RedmilesBK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Kohno23a,
  author       = {Tadayoshi Kohno},
  title        = {In Your Eyes},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {5},
  pages        = {4--5},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3295440},
  doi          = {10.1109/MSEC.2023.3295440},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Kohno23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmhci/SimkoRKA23,
  author       = {Lucy Simko and
                  Harshini Sri Ramulu and
                  Tadayoshi Kohno and
                  Yasemin Acar},
  title        = {The Use and Non-Use of Technology During Hurricanes},
  journal      = {Proc. {ACM} Hum. Comput. Interact.},
  volume       = {7},
  number       = {{CSCW2}},
  pages        = {1--54},
  year         = {2023},
  url          = {https://doi.org/10.1145/3610215},
  doi          = {10.1145/3610215},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmhci/SimkoRKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aies/HongKM23,
  author       = {Rachel Hong and
                  Tadayoshi Kohno and
                  Jamie Morgenstern},
  editor       = {Francesca Rossi and
                  Sanmay Das and
                  Jenny Davis and
                  Kay Firth{-}Butterfield and
                  Alex John},
  title        = {Evaluation of targeted dataset collection on racial equity in face
                  recognition},
  booktitle    = {Proceedings of the 2023 {AAAI/ACM} Conference on AI, Ethics, and Society,
                  {AIES} 2023, Montr{\'{e}}al, QC, Canada, August 8-10, 2023},
  pages        = {531--541},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600211.3604662},
  doi          = {10.1145/3600211.3604662},
  timestamp    = {Tue, 23 Jan 2024 13:25:45 +0100},
  biburl       = {https://dblp.org/rec/conf/aies/HongKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/NaeiniBDKLPR23,
  author       = {Pardis Emami Naeini and
                  Joseph Breda and
                  Wei Dai and
                  Tadayoshi Kohno and
                  Kim Laine and
                  Shwetak N. Patel and
                  Franziska Roesner},
  editor       = {Albrecht Schmidt and
                  Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and
                  Tesh Goyal and
                  Per Ola Kristensson and
                  Anicia Peters and
                  Stefanie Mueller and
                  Julie R. Williamson and
                  Max L. Wilson},
  title        = {Understanding People's Concerns and Attitudes Toward Smart Cities},
  booktitle    = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023},
  pages        = {71:1--71:24},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3544548.3581558},
  doi          = {10.1145/3544548.3581558},
  timestamp    = {Sat, 27 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/NaeiniBDKLPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/WeiCKKRT23,
  author       = {Miranda Wei and
                  Sunny Consolvo and
                  Patrick Gage Kelley and
                  Tadayoshi Kohno and
                  Franziska Roesner and
                  Kurt Thomas},
  editor       = {Albrecht Schmidt and
                  Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and
                  Tesh Goyal and
                  Per Ola Kristensson and
                  Anicia Peters and
                  Stefanie Mueller and
                  Julie R. Williamson and
                  Max L. Wilson},
  title        = {"There's so much responsibility on users right now: " Expert
                  Advice for Staying Safer From Hate and Harassment},
  booktitle    = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023},
  pages        = {190:1--190:17},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3544548.3581229},
  doi          = {10.1145/3544548.3581229},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/WeiCKKRT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/StokesAMCRKR23,
  author       = {Jackson Stokes and
                  Tal August and
                  Robert A Marver and
                  Alexei Czeskis and
                  Franziska Roesner and
                  Tadayoshi Kohno and
                  Katharina Reinecke},
  editor       = {Albrecht Schmidt and
                  Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and
                  Tesh Goyal and
                  Per Ola Kristensson and
                  Anicia Peters and
                  Stefanie Mueller and
                  Julie R. Williamson and
                  Max L. Wilson},
  title        = {How Language Formality in Security and Privacy Interfaces Impacts
                  Intended Compliance},
  booktitle    = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023},
  pages        = {617:1--617:12},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3544548.3581275},
  doi          = {10.1145/3544548.3581275},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/StokesAMCRKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eaamo/YeungIKR23,
  author       = {Christina Yeung and
                  Umar Iqbal and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  title        = {Gender Biases in Tone Analysis: {A} Case Study of a Commercial Wearable},
  booktitle    = {Proceedings of the 3rd {ACM} Conference on Equity and Access in Algorithms,
                  Mechanisms, and Optimization, {EAAMO} 2023, Boston, MA, USA, 30 October
                  2023 - 1 November 2023},
  pages        = {21:1--21:12},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617694.3623241},
  doi          = {10.1145/3617694.3623241},
  timestamp    = {Wed, 13 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eaamo/YeungIKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SimHKR23,
  author       = {Mattea Sim and
                  Kurt Hugenberg and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  title        = {A Scalable Inclusive Security Intervention to Center Marginalized
                  {\&} Vulnerable Populations in Security {\&} Privacy Design},
  booktitle    = {Proceedings of the 2023 New Security Paradigms Workshop, {NSPW} 2023,
                  Segovia, Spain, September 18-21, 2023},
  pages        = {102--115},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3633500.3633508},
  doi          = {10.1145/3633500.3633508},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/SimHKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WeiNRK23,
  author       = {Miranda Wei and
                  Pardis Emami Naeini and
                  Franziska Roesner and
                  Tadayoshi Kohno},
  title        = {Skilled or Gullible{\(f\)} Gender Stereotypes Related to Computer
                  Security and Privacy},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {2050--2067},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179469},
  doi          = {10.1109/SP46215.2023.10179469},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WeiNRK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChengTKR23,
  author       = {Kaiming Cheng and
                  Jeffery F. Tian and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Exploring User Reactions and Mental Models Towards Perceptual Manipulation
                  Attacks in Mixed Reality},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {911--928},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/cheng-kaiming},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChengTKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/McAmisK23,
  author       = {Rachel McAmis and
                  Tadayoshi Kohno},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {The Writing on the Wall and 3D Digital Twins: Personal Information
                  in (not so) Private Real Estate},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {2169--2186},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/mcamis},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/McAmisK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KohnoAL23,
  author       = {Tadayoshi Kohno and
                  Yasemin Acar and
                  Wulf Loh},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Ethical Frameworks and Computer Security Trolley Problems: Foundations
                  for Conversations},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5145--5162},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/kohno},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KohnoAL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/YeungIOKR23,
  author       = {Christina Yeung and
                  Umar Iqbal and
                  Yekaterina Tsipenyuk O'Neil and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  editor       = {Ying Ding and
                  Jie Tang and
                  Juan F. Sequeda and
                  Lora Aroyo and
                  Carlos Castillo and
                  Geert{-}Jan Houben},
  title        = {Online Advertising in Ukraine and Russia During the 2022 Russian Invasion},
  booktitle    = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin,
                  TX, USA, 30 April 2023 - 4 May 2023},
  pages        = {2787--2796},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543507.3583484},
  doi          = {10.1145/3543507.3583484},
  timestamp    = {Wed, 13 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/YeungIOKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-08057,
  author       = {Miranda Wei and
                  Sunny Consolvo and
                  Patrick Gage Kelley and
                  Tadayoshi Kohno and
                  Franziska Roesner and
                  Kurt Thomas},
  title        = {"There's so much responsibility on users right now: " Expert
                  Advice for Staying Safer From Hate and Harassment},
  journal      = {CoRR},
  volume       = {abs/2302.08057},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.08057},
  doi          = {10.48550/ARXIV.2302.08057},
  eprinttype    = {arXiv},
  eprint       = {2302.08057},
  timestamp    = {Mon, 20 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-08057.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-14326,
  author       = {Tadayoshi Kohno and
                  Yasemin Acar and
                  Wulf Loh},
  title        = {Ethical Frameworks and Computer Security Trolley Problems: Foundations
                  for Conversations},
  journal      = {CoRR},
  volume       = {abs/2302.14326},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.14326},
  doi          = {10.48550/ARXIV.2302.14326},
  eprinttype    = {arXiv},
  eprint       = {2302.14326},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-14326.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-15906,
  author       = {Inyoung Cheong and
                  Aylin Caliskan and
                  Tadayoshi Kohno},
  title        = {Is the {U.S.} Legal System Ready for AI's Challenges to Human Values?},
  journal      = {CoRR},
  volume       = {abs/2308.15906},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.15906},
  doi          = {10.48550/ARXIV.2308.15906},
  eprinttype    = {arXiv},
  eprint       = {2308.15906},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-15906.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-04456,
  author       = {Rock Yuren Pang and
                  Dan Grossman and
                  Tadayoshi Kohno and
                  Katharina Reinecke},
  title        = {The Case for Anticipating Undesirable Consequences of Computing Innovations
                  Early, Often, and Across Computer Science},
  journal      = {CoRR},
  volume       = {abs/2309.04456},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.04456},
  doi          = {10.48550/ARXIV.2309.04456},
  eprinttype    = {arXiv},
  eprint       = {2309.04456},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-04456.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-10254,
  author       = {Umar Iqbal and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  title        = {{LLM} Platform Security: Applying a Systematic Evaluation Framework
                  to OpenAI's ChatGPT Plugins},
  journal      = {CoRR},
  volume       = {abs/2309.10254},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.10254},
  doi          = {10.48550/ARXIV.2309.10254},
  eprinttype    = {arXiv},
  eprint       = {2309.10254},
  timestamp    = {Wed, 13 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-10254.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DaffallaSKB22,
  author       = {Alaa Daffalla and
                  Lucy Simko and
                  Tadayoshi Kohno and
                  Alexandru G. Bardas},
  title        = {Defensive Technology Use During the 2018-2019 Sudanese Revolution},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {2},
  pages        = {40--48},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2021.3128819},
  doi          = {10.1109/MSEC.2021.3128819},
  timestamp    = {Thu, 31 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DaffallaSKB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Kohno22,
  author       = {Tadayoshi Kohno},
  title        = {Excerpts From the New Dictionary of Cybersecurity, 2036},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {3},
  pages        = {8},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2022.3159400},
  doi          = {10.1109/MSEC.2022.3159400},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Kohno22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Kohno22a,
  author       = {Tadayoshi Kohno},
  title        = {Mx. President Has a Brain},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {3},
  pages        = {9--11},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2022.3159425},
  doi          = {10.1109/MSEC.2022.3159425},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Kohno22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KohnoCLLS22,
  author       = {Tadayoshi Kohno and
                  Camille Cobb and
                  Ada Lerner and
                  Michelle Lin and
                  Adam Shostack},
  title        = {The Buffet Overflow Caf{\'{e}}},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {4},
  pages        = {4--7},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2022.3173122},
  doi          = {10.1109/MSEC.2022.3173122},
  timestamp    = {Tue, 19 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KohnoCLLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Kohno22b,
  author       = {Tadayoshi Kohno},
  title        = {The Schuhmacher},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {5},
  pages        = {14--15},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2022.3187631},
  doi          = {10.1109/MSEC.2022.3187631},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Kohno22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Kohno22c,
  author       = {Tadayoshi Kohno},
  title        = {The Our Reality Privacy Policy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {6},
  pages        = {4--7},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2022.3201712},
  doi          = {10.1109/MSEC.2022.3201712},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Kohno22c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Kohno22d,
  author       = {Tadayoshi Kohno},
  title        = {Welcome to the Latest "Off by One" Column},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {6},
  pages        = {5},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2022.3201713},
  doi          = {10.1109/MSEC.2022.3201713},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Kohno22d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurousec/OwensGCNKR22,
  author       = {Kentrell Owens and
                  Johanna Gunawan and
                  David R. Choffnes and
                  Pardis Emami Naeini and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  title        = {Exploring Deceptive Design Patterns in Voice Interfaces},
  booktitle    = {EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany,
                  September 29 - 30, 2022},
  pages        = {64--78},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3549015.3554213},
  doi          = {10.1145/3549015.3554213},
  timestamp    = {Mon, 26 Sep 2022 13:15:44 +0200},
  biburl       = {https://dblp.org/rec/conf/eurousec/OwensGCNKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/ZengMKR22,
  author       = {Eric Zeng and
                  Rachel McAmis and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  editor       = {Chadi Barakat and
                  Cristel Pelsser and
                  Theophilus A. Benson and
                  David R. Choffnes},
  title        = {What factors affect targeting and bids in online advertising?: a field
                  measurement study},
  booktitle    = {Proceedings of the 22nd {ACM} Internet Measurement Conference, {IMC}
                  2022, Nice, France, October 25-27, 2022},
  pages        = {210--229},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3517745.3561460},
  doi          = {10.1145/3517745.3561460},
  timestamp    = {Mon, 06 Feb 2023 21:45:20 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/ZengMKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/WeiZKR22,
  author       = {Miranda Wei and
                  Eric Zeng and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  editor       = {Sonia Chiasson and
                  Apu Kapadia},
  title        = {Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled
                  Surveillance and Control in Intimate Partner and Parent-Child Relationships},
  booktitle    = {Eighteenth Symposium on Usable Privacy and Security, {SOUPS} 2022,
                  Boston, MA, USA, August 7-9, 2022},
  pages        = {447--462},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/soups2022/presentation/wei},
  timestamp    = {Wed, 26 Oct 2022 12:44:43 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/WeiZKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OwensARK22,
  author       = {Kentrell Owens and
                  Anita Alem and
                  Franziska Roesner and
                  Tadayoshi Kohno},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical,
                  Human-Centered, and Legal Perspectives},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {4077--4094},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/owens},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/OwensARK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-04107,
  author       = {Ashish Hooda and
                  Andrey Labunets and
                  Tadayoshi Kohno and
                  Earlence Fernandes},
  title        = {Re-purposing Perceptual Hashing based Client Side Scanning for Physical
                  Surveillance},
  journal      = {CoRR},
  volume       = {abs/2212.04107},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.04107},
  doi          = {10.48550/ARXIV.2212.04107},
  eprinttype    = {arXiv},
  eprint       = {2212.04107},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-04107.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/EvtimovSK21,
  author       = {Ivan Evtimov and
                  Pascal Sturmfels and
                  Tadayoshi Kohno},
  title        = {FoggySight: {A} Scheme for Facial Lookup Privacy},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {3},
  pages        = {204--226},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0044},
  doi          = {10.2478/POPETS-2021-0044},
  timestamp    = {Fri, 21 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/EvtimovSK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/NeyONCK21,
  author       = {Peter Ney and
                  Lee Organick and
                  Jeff Nivala and
                  Luis Ceze and
                  Tadayoshi Kohno},
  title        = {{DNA} Sequencing Flow Cells and the Security of the Molecular-Digital
                  Interface},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {3},
  pages        = {413--432},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0054},
  doi          = {10.2478/POPETS-2021-0054},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/NeyONCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acmidc/SimkoCNSZKHYC21,
  author       = {Lucy Simko and
                  Britnie Chin and
                  Sungmin Na and
                  Harkiran Kaur Saluja and
                  Tian Qi Zhu and
                  Tadayoshi Kohno and
                  Alexis Hiniker and
                  Jason C. Yip and
                  Camille Cobb},
  title        = {Would You Rather: {A} Focus Group Method for Eliciting and Discussing
                  Formative Design Insights with Children},
  booktitle    = {{IDC} '21: Interaction Design and Children, Athens, Greece, 24-30
                  June, 2021},
  pages        = {131--146},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3459990.3460708},
  doi          = {10.1145/3459990.3460708},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acmidc/SimkoCNSZKHYC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/ZengKR21,
  author       = {Eric Zeng and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  editor       = {Yoshifumi Kitamura and
                  Aaron Quigley and
                  Katherine Isbister and
                  Takeo Igarashi and
                  Pernille Bj{\o}rn and
                  Steven Mark Drucker},
  title        = {What Makes a "Bad" Ad? User Perceptions of Problematic Online
                  Advertising},
  booktitle    = {{CHI} '21: {CHI} Conference on Human Factors in Computing Systems,
                  Virtual Event / Yokohama, Japan, May 8-13, 2021},
  pages        = {361:1--361:24},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3411764.3445459},
  doi          = {10.1145/3411764.3445459},
  timestamp    = {Mon, 17 May 2021 13:31:38 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/ZengKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/ZengWGKR21,
  author       = {Eric Zeng and
                  Miranda Wei and
                  Theo Gregersen and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  editor       = {Dave Levin and
                  Alan Mislove and
                  Johanna Amann and
                  Matthew Luckie},
  title        = {Polls, clickbait, and commemorative {\textdollar}2 bills: problematic
                  political advertising on news and media websites around the 2020 {U.S.}
                  elections},
  booktitle    = {{IMC} '21: {ACM} Internet Measurement Conference, Virtual Event, USA,
                  November 2-4, 2021},
  pages        = {507--525},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3487552.3487850},
  doi          = {10.1145/3487552.3487850},
  timestamp    = {Thu, 04 Nov 2021 08:55:53 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/ZengWGKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/ParkAKP21,
  author       = {Chunjong Park and
                  Anas Awadalla and
                  Tadayoshi Kohno and
                  Shwetak N. Patel},
  editor       = {Marc'Aurelio Ranzato and
                  Alina Beygelzimer and
                  Yann N. Dauphin and
                  Percy Liang and
                  Jennifer Wortman Vaughan},
  title        = {Reliable and Trustworthy Machine Learning for Health Using Dataset
                  Shift Detection},
  booktitle    = {Advances in Neural Information Processing Systems 34: Annual Conference
                  on Neural Information Processing Systems 2021, NeurIPS 2021, December
                  6-14, 2021, virtual},
  pages        = {3043--3056},
  year         = {2021},
  url          = {https://proceedings.neurips.cc/paper/2021/hash/17e23e50bedc63b4095e3d8204ce063b-Abstract.html},
  timestamp    = {Tue, 03 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/ParkAKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/NaeiniFKR21,
  author       = {Pardis Emami Naeini and
                  Tiona Francisco and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  editor       = {Sonia Chiasson},
  title        = {Understanding Privacy Attitudes and Concerns Towards Remote Communications
                  During the {COVID-19} Pandemic},
  booktitle    = {Seventeenth Symposium on Usable Privacy and Security, {SOUPS} 2021,
                  August 8-10, 2021},
  pages        = {695--714},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/soups2021/presentation/emami-naeini},
  timestamp    = {Wed, 09 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/NaeiniFKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DaffallaSKB21,
  author       = {Alaa Daffalla and
                  Lucy Simko and
                  Tadayoshi Kohno and
                  Alexandru G. Bardas},
  title        = {Defensive Technology Use by Political Activists During the Sudanese
                  Revolution},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {372--390},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00055},
  doi          = {10.1109/SP40001.2021.00055},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DaffallaSKB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-05227,
  author       = {Pardis Emami Naeini and
                  Tiona Francisco and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  title        = {Understanding Privacy Attitudes and Concerns Towards Remote Communications
                  During the {COVID-19} Pandemic},
  journal      = {CoRR},
  volume       = {abs/2106.05227},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.05227},
  eprinttype    = {arXiv},
  eprint       = {2106.05227},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-05227.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-06654,
  author       = {Ivan Evtimov and
                  Ian Covert and
                  Aditya Kusupati and
                  Tadayoshi Kohno},
  title        = {Disrupting Model Training with Adversarial Shortcuts},
  journal      = {CoRR},
  volume       = {abs/2106.06654},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.06654},
  eprinttype    = {arXiv},
  eprint       = {2106.06654},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-06654.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-14019,
  author       = {Chunjong Park and
                  Anas Awadalla and
                  Tadayoshi Kohno and
                  Shwetak N. Patel},
  title        = {Reliable and Trustworthy Machine Learning for Health Using Dataset
                  Shift Detection},
  journal      = {CoRR},
  volume       = {abs/2110.14019},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.14019},
  eprinttype    = {arXiv},
  eprint       = {2110.14019},
  timestamp    = {Fri, 29 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-14019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/ChanFGHJKK0LSSS20,
  author       = {Justin Chan and
                  Landon P. Cox and
                  Dean P. Foster and
                  Shyam Gollakota and
                  Eric Horvitz and
                  Joseph Jaeger and
                  Sham M. Kakade and
                  Tadayoshi Kohno and
                  John Langford and
                  Jonathan Larson and
                  Puneet Sharma and
                  Sudheesh Singanamalla and
                  Jacob E. Sunshine and
                  Stefano Tessaro},
  title        = {{PACT:} Privacy-Sensitive Protocols And Mechanisms for Mobile Contact
                  Tracing},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {43},
  number       = {2},
  pages        = {15--35},
  year         = {2020},
  url          = {http://sites.computer.org/debull/A20june/p15.pdf},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/debu/ChanFGHJKK0LSSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CampHKMMPS20,
  author       = {L. Jean Camp and
                  Ryan Henry and
                  Tadayoshi Kohno and
                  Shrirang Mare and
                  Steven A. Myers and
                  Shwetak N. Patel and
                  Joshua Streiff},
  title        = {Toward a Secure Internet of Things: Directions for Research},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {4},
  pages        = {28--37},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2020.2970155},
  doi          = {10.1109/MSEC.2020.2970155},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CampHKMMPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MareRK20,
  author       = {Shrirang Mare and
                  Franziska Roesner and
                  Tadayoshi Kohno},
  title        = {Smart Devices in Airbnbs: Considering Privacy and Security for both
                  Guests and Hosts},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {2},
  pages        = {436--458},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0035},
  doi          = {10.2478/POPETS-2020-0035},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/MareRK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/CobbSKH20,
  author       = {Camille Cobb and
                  Lucy Simko and
                  Tadayoshi Kohno and
                  Alexis Hiniker},
  title        = {A Privacy-Focused Systematic Analysis of Online Status Indicators},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {3},
  pages        = {384--403},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0057},
  doi          = {10.2478/POPETS-2020-0057},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/CobbSKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/CobbSKH20,
  author       = {Camille Cobb and
                  Lucy Simko and
                  Tadayoshi Kohno and
                  Alexis Hiniker},
  editor       = {Regina Bernhaupt and
                  Florian 'Floyd' Mueller and
                  David Verweij and
                  Josh Andres and
                  Joanna McGrenere and
                  Andy Cockburn and
                  Ignacio Avellino and
                  Alix Goguey and
                  Pernille Bj{\o}n and
                  Shengdong Zhao and
                  Briane Paul Samson and
                  Rafal Kocielnik},
  title        = {User Experiences with Online Status Indicators},
  booktitle    = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems,
                  Honolulu, HI, USA, April 25-30, 2020},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3313831.3376240},
  doi          = {10.1145/3313831.3376240},
  timestamp    = {Wed, 04 May 2022 13:02:17 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/CobbSKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/SinganamallaJAK20,
  author       = {Sudheesh Singanamalla and
                  Esther Han Beol Jang and
                  Richard J. Anderson and
                  Tadayoshi Kohno and
                  Kurtis Heimerl},
  title        = {Accept the Risk and Continue: Measuring the Long Tail of Government
                  https Adoption},
  booktitle    = {{IMC} '20: {ACM} Internet Measurement Conference, Virtual Event, USA,
                  October 27-29, 2020},
  pages        = {577--597},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419394.3423645},
  doi          = {10.1145/3419394.3423645},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/SinganamallaJAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NeyCK20,
  author       = {Peter Ney and
                  Luis Ceze and
                  Tadayoshi Kohno},
  title        = {Genotype Extraction and False Relative Attacks: Security Risks to
                  Third-Party Genetic Genealogy Services Beyond Identity Inference},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/genotype-extraction-and-false-relative-attacks-security-risks-to-third-party-genetic-genealogy-services-beyond-identity-inference/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/NeyCK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-03544,
  author       = {Justin Chan and
                  Dean P. Foster and
                  Shyam Gollakota and
                  Eric Horvitz and
                  Joseph Jaeger and
                  Sham M. Kakade and
                  Tadayoshi Kohno and
                  John Langford and
                  Jonathan Larson and
                  Sudheesh Singanamalla and
                  Jacob E. Sunshine and
                  Stefano Tessaro},
  title        = {{PACT:} Privacy Sensitive Protocols and Mechanisms for Mobile Contact
                  Tracing},
  journal      = {CoRR},
  volume       = {abs/2004.03544},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.03544},
  eprinttype    = {arXiv},
  eprint       = {2004.03544},
  timestamp    = {Tue, 21 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-03544.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-06056,
  author       = {Lucy Simko and
                  Ryan Calo and
                  Franziska Roesner and
                  Tadayoshi Kohno},
  title        = {{COVID-19} Contact Tracing and Privacy: Studying Opinion and Preferences},
  journal      = {CoRR},
  volume       = {abs/2005.06056},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.06056},
  eprinttype    = {arXiv},
  eprint       = {2005.06056},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-06056.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-07205,
  author       = {Ivan Evtimov and
                  Weidong Cui and
                  Ece Kamar and
                  Emre Kiciman and
                  Tadayoshi Kohno and
                  Jerry Li},
  title        = {Security and Machine Learning in the Real World},
  journal      = {CoRR},
  volume       = {abs/2007.07205},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.07205},
  eprinttype    = {arXiv},
  eprint       = {2007.07205},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-07205.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-00017,
  author       = {Kevin Fu and
                  Tadayoshi Kohno and
                  Daniel Lopresti and
                  Elizabeth D. Mynatt and
                  Klara Nahrstedt and
                  Shwetak N. Patel and
                  Debra J. Richardson and
                  Benjamin G. Zorn},
  title        = {Safety, Security, and Privacy Threats Posed by Accelerating Trends
                  in the Internet of Things},
  journal      = {CoRR},
  volume       = {abs/2008.00017},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.00017},
  eprinttype    = {arXiv},
  eprint       = {2008.00017},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-00017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-01553,
  author       = {Lucy Simko and
                  Jack Lucas Chang and
                  Maggie Jiang and
                  Ryan Calo and
                  Franziska Roesner and
                  Tadayoshi Kohno},
  title        = {{COVID-19} Contact Tracing and Privacy: {A} Longitudinal Study of
                  Public Opinion},
  journal      = {CoRR},
  volume       = {abs/2012.01553},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.01553},
  eprinttype    = {arXiv},
  eprint       = {2012.01553},
  timestamp    = {Fri, 04 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-01553.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-08588,
  author       = {Ivan Evtimov and
                  Pascal Sturmfels and
                  Tadayoshi Kohno},
  title        = {FoggySight: {A} Scheme for Facial Lookup Privacy},
  journal      = {CoRR},
  volume       = {abs/2012.08588},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.08588},
  eprinttype    = {arXiv},
  eprint       = {2012.08588},
  timestamp    = {Sat, 02 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-08588.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RuthKR19,
  author       = {Kimberly Ruth and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Secure Multi-User Content Sharing for Augmented Reality Applications},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {141--158},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/ruth},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RuthKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/LebeckKR19,
  author       = {Kiron Lebeck and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  editor       = {Alec Wolman and
                  Lin Zhong},
  title        = {Enabling Multiple Applications to Simultaneously Augment Reality:
                  Challenges and Directions},
  booktitle    = {Proceedings of the 20th International Workshop on Mobile Computing
                  Systems and Applications, HotMobile 2019, Santa Cruz, CA, USA, February
                  27-28, 2019},
  pages        = {81--86},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3301293.3302362},
  doi          = {10.1145/3301293.3302362},
  timestamp    = {Thu, 28 Feb 2019 17:02:13 +0100},
  biburl       = {https://dblp.org/rec/conf/wmcsa/LebeckKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/MareGRK19,
  author       = {Shrirang Mare and
                  Logan Girvin and
                  Franziska Roesner and
                  Tadayoshi Kohno},
  editor       = {Alec Wolman and
                  Lin Zhong},
  title        = {Consumer Smart Homes: Where We Are and Where We Need to Go},
  booktitle    = {Proceedings of the 20th International Workshop on Mobile Computing
                  Systems and Applications, HotMobile 2019, Santa Cruz, CA, USA, February
                  27-28, 2019},
  pages        = {117--122},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3301293.3302371},
  doi          = {10.1145/3301293.3302371},
  timestamp    = {Thu, 28 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wmcsa/MareGRK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LebeckRKR18,
  author       = {Kiron Lebeck and
                  Kimberly Ruth and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  title        = {Arya: Operating System Support for Securely Augmenting Reality},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {44--53},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331020},
  doi          = {10.1109/MSP.2018.1331020},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LebeckRKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SimkoZK18,
  author       = {Lucy Simko and
                  Luke Zettlemoyer and
                  Tadayoshi Kohno},
  title        = {Recognizing and Imitating Programmer Style: Adversaries in Program
                  Authorship Attribution},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2018},
  number       = {1},
  pages        = {127--144},
  year         = {2018},
  url          = {https://doi.org/10.1515/popets-2018-0007},
  doi          = {10.1515/POPETS-2018-0007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/SimkoZK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/EykholtEF0RXPKS18,
  author       = {Kevin Eykholt and
                  Ivan Evtimov and
                  Earlence Fernandes and
                  Bo Li and
                  Amir Rahmati and
                  Chaowei Xiao and
                  Atul Prakash and
                  Tadayoshi Kohno and
                  Dawn Song},
  title        = {Robust Physical-World Attacks on Deep Learning Visual Classification},
  booktitle    = {2018 {IEEE} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2018, Salt Lake City, UT, USA, June 18-22, 2018},
  pages        = {1625--1634},
  publisher    = {Computer Vision Foundation / {IEEE} Computer Society},
  year         = {2018},
  url          = {http://openaccess.thecvf.com/content\_cvpr\_2018/html/Eykholt\_Robust\_Physical-World\_Attacks\_CVPR\_2018\_paper.html},
  doi          = {10.1109/CVPR.2018.00175},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/EykholtEF0RXPKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LebeckRKR18,
  author       = {Kiron Lebeck and
                  Kimberly Ruth and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  title        = {Towards Security and Privacy for Multi-user Augmented Reality: Foundations
                  with End Users},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {392--408},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00051},
  doi          = {10.1109/SP.2018.00051},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LebeckRKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SimkoLIRK18,
  author       = {Lucy Simko and
                  Ada Lerner and
                  Samia Ibtasam and
                  Franziska Roesner and
                  Tadayoshi Kohno},
  title        = {Computer Security and Privacy for Refugees in the United States},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {409--423},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00023},
  doi          = {10.1109/SP.2018.00023},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SimkoLIRK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/SongEEF0RTPK18,
  author       = {Dawn Song and
                  Kevin Eykholt and
                  Ivan Evtimov and
                  Earlence Fernandes and
                  Bo Li and
                  Amir Rahmati and
                  Florian Tram{\`{e}}r and
                  Atul Prakash and
                  Tadayoshi Kohno},
  editor       = {Christian Rossow and
                  Yves Younan},
  title        = {Physical Adversarial Examples for Object Detectors},
  booktitle    = {12th {USENIX} Workshop on Offensive Technologies, {WOOT} 2018, Baltimore,
                  MD, USA, August 13-14, 2018},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/woot18/presentation/eykholt},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/woot/SongEEF0RTPK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-10557,
  author       = {Stefano Baldassi and
                  Tadayoshi Kohno and
                  Franziska Roesner and
                  Moqian Tian},
  title        = {Challenges and New Directions in Augmented Reality, Computer Security,
                  and Neuroscience - Part 1: Risks to Sensation and Perception},
  journal      = {CoRR},
  volume       = {abs/1806.10557},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.10557},
  eprinttype    = {arXiv},
  eprint       = {1806.10557},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-10557.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-07769,
  author       = {Kevin Eykholt and
                  Ivan Evtimov and
                  Earlence Fernandes and
                  Bo Li and
                  Amir Rahmati and
                  Florian Tram{\`{e}}r and
                  Atul Prakash and
                  Tadayoshi Kohno and
                  Dawn Song},
  title        = {Physical Adversarial Examples for Object Detectors},
  journal      = {CoRR},
  volume       = {abs/1807.07769},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.07769},
  eprinttype    = {arXiv},
  eprint       = {1807.07769},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-07769.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-02895,
  author       = {Peter M. Ney and
                  Luis Ceze and
                  Tadayoshi Kohno},
  title        = {Computer Security Risks of Distant Relative Matching in Consumer Genetic
                  Databases},
  journal      = {CoRR},
  volume       = {abs/1810.02895},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.02895},
  eprinttype    = {arXiv},
  eprint       = {1810.02895},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-02895.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imwut/NandakumarTKG17,
  author       = {Rajalakshmi Nandakumar and
                  Alex Takakuwa and
                  Tadayoshi Kohno and
                  Shyamnath Gollakota},
  title        = {CovertBand: Activity Information Leakage using Music},
  journal      = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.},
  volume       = {1},
  number       = {3},
  pages        = {87:1--87:24},
  year         = {2017},
  url          = {https://doi.org/10.1145/3131897},
  doi          = {10.1145/3131897},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imwut/NandakumarTKG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/NeySCK17,
  author       = {Peter Ney and
                  Ian Smith and
                  Gabriel Cadamuro and
                  Tadayoshi Kohno},
  title        = {SeaGlass: Enabling City-Wide IMSI-Catcher Detection},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {3},
  pages        = {39},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0027},
  doi          = {10.1515/POPETS-2017-0027},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/NeySCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LernerKR17,
  author       = {Ada Lerner and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Rewriting History: Changing the Archived Web from the Present},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1741--1755},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134042},
  doi          = {10.1145/3133956.3134042},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LernerKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/GebhartK17,
  author       = {Genevieve Gebhart and
                  Tadayoshi Kohno},
  title        = {Internet Censorship in Thailand: User Practices and Potential Threats},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {417--432},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.50},
  doi          = {10.1109/EUROSP.2017.50},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/GebhartK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/SimpsonRK17,
  author       = {Anna Kornfeld Simpson and
                  Franziska Roesner and
                  Tadayoshi Kohno},
  title        = {Securing vulnerable home IoT devices with an in-hub security manager},
  booktitle    = {2017 {IEEE} International Conference on Pervasive Computing and Communications
                  Workshops, PerCom Workshops 2017, Kona, Big Island, HI, USA, March
                  13-17, 2017},
  pages        = {551--556},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/PERCOMW.2017.7917622},
  doi          = {10.1109/PERCOMW.2017.7917622},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/SimpsonRK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LebeckRKR17,
  author       = {Kiron Lebeck and
                  Kimberly Ruth and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  title        = {Securing Augmented Reality Output},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {320--337},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.13},
  doi          = {10.1109/SP.2017.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LebeckRKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NeyKOCK17,
  author       = {Peter Ney and
                  Karl Koscher and
                  Lee Organick and
                  Luis Ceze and
                  Tadayoshi Kohno},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Computer Security, Privacy, and {DNA} Sequencing: Compromising Computers
                  with Synthesized DNA, Privacy Leaks, and More},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {765--779},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ney},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/NeyKOCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/VinesRK17,
  author       = {Paul Vines and
                  Franziska Roesner and
                  Tadayoshi Kohno},
  editor       = {Bhavani Thuraisingham and
                  Adam J. Lee},
  title        = {Exploring {ADINT:} Using Ad Targeting for Surveillance on a Budget
                  - or - How Alice Can Buy Ads to Track Bob},
  booktitle    = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society,
                  Dallas, TX, USA, October 30 - November 3, 2017},
  pages        = {153--164},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139550.3139567},
  doi          = {10.1145/3139550.3139567},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/VinesRK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/CobbK17,
  author       = {Camille Cobb and
                  Tadayoshi Kohno},
  editor       = {Rick Barrett and
                  Rick Cummings and
                  Eugene Agichtein and
                  Evgeniy Gabrilovich},
  title        = {How Public Is My Private Life?: Privacy in Online Dating},
  booktitle    = {Proceedings of the 26th International Conference on World Wide Web,
                  {WWW} 2017, Perth, Australia, April 3-7, 2017},
  pages        = {1231--1240},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3038912.3052592},
  doi          = {10.1145/3038912.3052592},
  timestamp    = {Tue, 06 Nov 2018 16:57:07 +0100},
  biburl       = {https://dblp.org/rec/conf/www/CobbK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/EvtimovEFKLPRS17,
  author       = {Ivan Evtimov and
                  Kevin Eykholt and
                  Earlence Fernandes and
                  Tadayoshi Kohno and
                  Bo Li and
                  Atul Prakash and
                  Amir Rahmati and
                  Dawn Song},
  title        = {Robust Physical-World Attacks on Machine Learning Models},
  journal      = {CoRR},
  volume       = {abs/1707.08945},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.08945},
  eprinttype    = {arXiv},
  eprint       = {1707.08945},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/EvtimovEFKLPRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-08062,
  author       = {Kevin Eykholt and
                  Ivan Evtimov and
                  Earlence Fernandes and
                  Bo Li and
                  Dawn Song and
                  Tadayoshi Kohno and
                  Amir Rahmati and
                  Atul Prakash and
                  Florian Tram{\`{e}}r},
  title        = {Note on Attacking Object Detectors with Adversarial Stickers},
  journal      = {CoRR},
  volume       = {abs/1712.08062},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.08062},
  eprinttype    = {arXiv},
  eprint       = {1712.08062},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-08062.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/EnevTKK16,
  author       = {Miro Enev and
                  Alex Takakuwa and
                  Karl Koscher and
                  Tadayoshi Kohno},
  title        = {Automobile Driver Fingerprinting},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2016},
  number       = {1},
  pages        = {34--50},
  year         = {2016},
  url          = {https://doi.org/10.1515/popets-2015-0029},
  doi          = {10.1515/POPETS-2015-0029},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/EnevTKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/software/Cleland-HuangDK16,
  author       = {Jane Cleland{-}Huang and
                  Tamara Denning and
                  Tadayoshi Kohno and
                  Forrest Shull and
                  Samuel Weber},
  title        = {Keeping Ahead of Our Adversaries},
  journal      = {{IEEE} Softw.},
  volume       = {33},
  number       = {3},
  pages        = {24--28},
  year         = {2016},
  url          = {https://doi.org/10.1109/MS.2016.75},
  doi          = {10.1109/MS.2016.75},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/software/Cleland-HuangDK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/LernerSKR16,
  author       = {Ada Lerner and
                  Anna Kornfeld Simpson and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  title        = {Excavating Web Trackers Using Web Archaeology},
  journal      = {login Usenix Mag.},
  volume       = {41},
  number       = {4},
  year         = {2016},
  url          = {https://www.usenix.org/publications/login/winter2016/lerner},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/usenix-login/LernerSKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/HinikerHKK16,
  author       = {Alexis Hiniker and
                  Sungsoo (Ray) Hong and
                  Tadayoshi Kohno and
                  Julie A. Kientz},
  editor       = {Jofish Kaye and
                  Allison Druin and
                  Cliff Lampe and
                  Dan Morris and
                  Juan Pablo Hourcade},
  title        = {MyTime: Designing and Evaluating an Intervention for Smartphone Non-Use},
  booktitle    = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing
                  Systems, San Jose, CA, USA, May 7-12, 2016},
  pages        = {4746--4757},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2858036.2858403},
  doi          = {10.1145/2858036.2858403},
  timestamp    = {Wed, 01 Jun 2022 08:38:38 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/HinikerHKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/HinikerPKK16,
  author       = {Alexis Hiniker and
                  Shwetak N. Patel and
                  Tadayoshi Kohno and
                  Julie A. Kientz},
  editor       = {Paul Lukowicz and
                  Antonio Kr{\"{u}}ger and
                  Andreas Bulling and
                  Youn{-}Kyung Lim and
                  Shwetak N. Patel},
  title        = {Why would you do that? predicting the uses and gratifications behind
                  smartphone-usage behaviors},
  booktitle    = {Proceedings of the 2016 {ACM} International Joint Conference on Pervasive
                  and Ubiquitous Computing, UbiComp 2016, Heidelberg, Germany, September
                  12-16, 2016},
  pages        = {634--645},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2971648.2971762},
  doi          = {10.1145/2971648.2971762},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/huc/HinikerPKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictd/CobbSRARK16,
  author       = {Camille Cobb and
                  Samuel Sudar and
                  Nicholas Reiter and
                  Richard J. Anderson and
                  Franziska Roesner and
                  Tadayoshi Kohno},
  editor       = {Kentaro Toyama},
  title        = {Computer Security for Data Collection Technologies},
  booktitle    = {Proceedings of the Eighth International Conference on Information
                  and Communication Technologies and Development, {ICTD} 2016, Ann Arbor,
                  MI, USA, June 03 - 06, 2016},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909609.2909660},
  doi          = {10.1145/2909609.2909660},
  timestamp    = {Tue, 06 Nov 2018 16:58:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ictd/CobbSRARK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/ScottAKK16,
  author       = {Will Scott and
                  Thomas E. Anderson and
                  Tadayoshi Kohno and
                  Arvind Krishnamurthy},
  editor       = {Ajay Gulati and
                  Hakim Weatherspoon},
  title        = {Satellite: Joint Analysis of CDNs and Network-Level Interference},
  booktitle    = {2016 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2016, Denver,
                  CO, USA, June 22-24, 2016},
  pages        = {195--208},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/atc16/technical-sessions/presentation/scott},
  timestamp    = {Mon, 01 Feb 2021 17:03:06 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/ScottAKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LernerSKR16,
  author       = {Ada Lerner and
                  Anna Kornfeld Simpson and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Internet Jones and the Raiders of the Lost Trackers: An Archaeological
                  Study of Web Tracking from 1996 to 2016},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/lerner},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LernerSKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/LebeckKR16,
  author       = {Kiron Lebeck and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  editor       = {David Chu and
                  Prabal Dutta},
  title        = {How to Safely Augment Reality: Challenges and Directions},
  booktitle    = {Proceedings of the 17th International Workshop on Mobile Computing
                  Systems and Applications, HotMobile 2016, St. Augustine, FL, USA,
                  February 23-24, 2016},
  pages        = {45--50},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2873587.2873595},
  doi          = {10.1145/2873587.2873595},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wmcsa/LebeckKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/McReynoldsLSRK15,
  author       = {Emily McReynolds and
                  Adam Lerner and
                  Will Scott and
                  Franziska Roesner and
                  Tadayoshi Kohno},
  editor       = {Michael Brenner and
                  Nicolas Christin and
                  Benjamin Johnson and
                  Kurt Rohloff},
  title        = {Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues
                  and Technical Directions},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2015 International
                  Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January
                  30, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8976},
  pages        = {94--111},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48051-9\_8},
  doi          = {10.1007/978-3-662-48051-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/McReynoldsLSRK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccps/BonaciYHKC15,
  author       = {Tamara Bonaci and
                  Junjie Yan and
                  Jeffrey Herron and
                  Tadayoshi Kohno and
                  Howard Jay Chizeck},
  editor       = {Alexandre M. Bayen and
                  Michael S. Branicky},
  title        = {Experimental analysis of denial-of-service attacks on teleoperated
                  robotic systems},
  booktitle    = {Proceedings of the {ACM/IEEE} Sixth International Conference on Cyber-Physical
                  Systems, {ICCPS} 2015, Seattle, WA, USA, April 14-16, 2015},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2735960.2735980},
  doi          = {10.1145/2735960.2735980},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccps/BonaciYHKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/LernerSOTVKR15,
  author       = {Adam Lerner and
                  Alisha Saxena and
                  Kirk Ouimet and
                  Ben Turley and
                  Anthony Vance and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  editor       = {Gaetano Borriello and
                  Giovanni Pau and
                  Marco Gruteser and
                  Jason I. Hong},
  title        = {Analyzing the Use of Quick Response Codes in the Wild},
  booktitle    = {Proceedings of the 13th Annual International Conference on Mobile
                  Systems, Applications, and Services, MobiSys 2015, Florence, Italy,
                  May 19-22, 2015},
  pages        = {359--374},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2742647.2742650},
  doi          = {10.1145/2742647.2742650},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/LernerSOTVKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/HassaniehWKK15,
  author       = {Haitham Hassanieh and
                  Jue Wang and
                  Dina Katabi and
                  Tadayoshi Kohno},
  title        = {Securing RFIDs by Randomizing the Modulation and Channel},
  booktitle    = {12th {USENIX} Symposium on Networked Systems Design and Implementation,
                  {NSDI} 15, Oakland, CA, USA, May 4-6, 2015},
  pages        = {235--249},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/nsdi15/technical-sessions/presentation/hassanieh},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsdi/HassaniehWKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/KoscherKM15,
  author       = {Karl Koscher and
                  Tadayoshi Kohno and
                  David Molnar},
  editor       = {Aur{\'{e}}lien Francillon and
                  Thomas Ptacek},
  title        = {{SURROGATES:} Enabling Near-Real-Time Dynamic Analyses of Embedded
                  Systems},
  booktitle    = {9th {USENIX} Workshop on Offensive Technologies, {WOOT} '15, Washington,
                  DC, USA, August 10-11, 2015},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/woot15/workshop-program/presentation/koscher},
  timestamp    = {Mon, 01 Feb 2021 08:41:51 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/KoscherKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/VinesK15,
  author       = {Paul Vines and
                  Tadayoshi Kohno},
  editor       = {Indrajit Ray and
                  Nicholas Hopper and
                  Rob Jansen},
  title        = {Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication
                  Platform},
  booktitle    = {Proceedings of the 14th {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2015, Denver, Colorado, USA, October 12, 2015},
  pages        = {75--84},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808138.2808141},
  doi          = {10.1145/2808138.2808141},
  timestamp    = {Tue, 06 Nov 2018 16:59:07 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/VinesK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BonaciHYYKC15,
  author       = {Tamara Bonaci and
                  Jeffrey Herron and
                  Tariq Yusuf and
                  Junjie Yan and
                  Tadayoshi Kohno and
                  Howard Jay Chizeck},
  title        = {To Make a Robot Secure: An Experimental Analysis of Cyber Security
                  Threats Against Teleoperated Surgical Robots},
  journal      = {CoRR},
  volume       = {abs/1504.04339},
  year         = {2015},
  url          = {http://arxiv.org/abs/1504.04339},
  eprinttype    = {arXiv},
  eprint       = {1504.04339},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BonaciHYYKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchneierFKR15,
  author       = {Bruce Schneier and
                  Matthew Fredrikson and
                  Tadayoshi Kohno and
                  Thomas Ristenpart},
  title        = {Surreptitiously Weakening Cryptographic Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {97},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchneierFKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/RoesnerKM14,
  author       = {Franziska Roesner and
                  Tadayoshi Kohno and
                  David Molnar},
  title        = {Security and privacy for augmented reality systems},
  journal      = {Commun. {ACM}},
  volume       = {57},
  number       = {4},
  pages        = {88--96},
  year         = {2014},
  url          = {https://doi.org/10.1145/2580723.2580730},
  doi          = {10.1145/2580723.2580730},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/RoesnerKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/WangKB14,
  author       = {Xinran Wang and
                  Tadayoshi Kohno and
                  Bob Blakley},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {Polymorphism as a Defense for Automated Attack of Websites},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {513--530},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_30},
  doi          = {10.1007/978-3-319-07536-5\_30},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/WangKB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DenningKFRGK14,
  author       = {Tamara Denning and
                  Daniel B. Kramer and
                  Batya Friedman and
                  Matthew R. Reynolds and
                  Brian T. Gill and
                  Tadayoshi Kohno},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {{CPS:} beyond usability: applying value sensitive design based methods
                  to investigate domain characteristics for security for implantable
                  cardiac devices},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {426--435},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664289},
  doi          = {10.1145/2664243.2664289},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DenningKFRGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RoesnerMMKW14,
  author       = {Franziska Roesner and
                  David Molnar and
                  Alexander Moshchuk and
                  Tadayoshi Kohno and
                  Helen J. Wang},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {World-Driven Access Control for Continuous Sensing},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1169--1181},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660319},
  doi          = {10.1145/2660267.2660319},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RoesnerMMKW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/DenningDK14,
  author       = {Tamara Denning and
                  Zakariya Dehlawi and
                  Tadayoshi Kohno},
  editor       = {Matt Jones and
                  Philippe A. Palanque and
                  Albrecht Schmidt and
                  Tovi Grossman},
  title        = {In situ with bystanders of augmented reality glasses: perspectives
                  on recording and privacy-mediating technologies},
  booktitle    = {{CHI} Conference on Human Factors in Computing Systems, CHI'14, Toronto,
                  ON, Canada - April 26 - May 01, 2014},
  pages        = {2377--2386},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556288.2557352},
  doi          = {10.1145/2556288.2557352},
  timestamp    = {Tue, 01 Jun 2021 15:21:43 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/DenningDK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RoesnerGK14,
  author       = {Franziska Roesner and
                  Brian T. Gill and
                  Tadayoshi Kohno},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing
                  Messages},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {64--76},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_5},
  doi          = {10.1007/978-3-662-45472-5\_5},
  timestamp    = {Tue, 21 Mar 2023 20:59:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/RoesnerGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/JungK14,
  author       = {Jaeyeon Jung and
                  Tadayoshi Kohno},
  editor       = {A. J. Brush and
                  Adrian Friday and
                  Julie A. Kientz and
                  James Scott and
                  Junehwa Song},
  title        = {Workshop on usable privacy {\&} security for wearable and domestic
                  ubiquitous devices {(UPSIDE)}},
  booktitle    = {Proceedings of the 2014 {ACM} International Joint Conference on Pervasive
                  and Ubiquitous Computing, UbiComp '14 Adjunct Publication, Seattle,
                  WA, {USA} - September 13 - 17, 2014},
  pages        = {1279--1282},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2638728.2641712},
  doi          = {10.1145/2638728.2641712},
  timestamp    = {Tue, 26 Mar 2024 11:01:21 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/JungK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/RoesnerKDCN14,
  author       = {Franziska Roesner and
                  Tadayoshi Kohno and
                  Tamara Denning and
                  Ryan Calo and
                  Bryce Clayton Newell},
  editor       = {A. J. Brush and
                  Adrian Friday and
                  Julie A. Kientz and
                  James Scott and
                  Junehwa Song},
  title        = {Augmented reality: hard problems of law and policy},
  booktitle    = {Proceedings of the 2014 {ACM} International Joint Conference on Pervasive
                  and Ubiquitous Computing, UbiComp '14 Adjunct Publication, Seattle,
                  WA, {USA} - September 13 - 17, 2014},
  pages        = {1283--1288},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2638728.2641709},
  doi          = {10.1145/2638728.2641709},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/RoesnerKDCN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DenningSK14,
  author       = {Tamara Denning and
                  Adam Shostack and
                  Tadayoshi Kohno},
  editor       = {Zachary N. J. Peterson},
  title        = {Practical Lessons from Creating the Control-Alt-Hack Card Game and
                  Research Challenges for Games In Education and Research},
  booktitle    = {2014 {USENIX} Summit on Gaming, Games, and Gamification in Security
                  Education, 3GSE '14, San Diego, CA, USA, August 18, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/3gse14/summit-program/presentation/denning},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DenningSK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/DenningKL13,
  author       = {Tamara Denning and
                  Tadayoshi Kohno and
                  Henry M. Levy},
  title        = {Computer security and the modern home},
  journal      = {Commun. {ACM}},
  volume       = {56},
  number       = {1},
  pages        = {94--103},
  year         = {2013},
  url          = {https://doi.org/10.1145/2398356.2398377},
  doi          = {10.1145/2398356.2398377},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/DenningKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DenningLSK13,
  author       = {Tamara Denning and
                  Adam Lerner and
                  Adam Shostack and
                  Tadayoshi Kohno},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Control-Alt-Hack: the design and evaluation of a card game for computer
                  security awareness and education},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {915--928},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516753},
  doi          = {10.1145/2508859.2516753},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DenningLSK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/DAntoniDJKLMMORSVW13,
  author       = {Loris D'Antoni and
                  Alan M. Dunn and
                  Suman Jana and
                  Tadayoshi Kohno and
                  Benjamin Livshits and
                  David Molnar and
                  Alexander Moshchuk and
                  Eyal Ofek and
                  Franziska Roesner and
                  T. Scott Saponas and
                  Margus Veanes and
                  Helen J. Wang},
  editor       = {Petros Maniatis},
  title        = {Operating System Support for Augmented Reality Applications},
  booktitle    = {14th Workshop on Hot Topics in Operating Systems, HotOS XIV, Santa
                  Ana Pueblo, New Mexico, USA, May 13-15, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/hotos13/session/d\%27antoni},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/hotos/DAntoniDJKLMMORSVW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/laseres/OluwafemiKGP13,
  author       = {Temitope Oluwafemi and
                  Tadayoshi Kohno and
                  Sidhant Gupta and
                  Shwetak N. Patel},
  title        = {Experimental Security Analyses of Non-Networked Compact Fluorescent
                  Lamps: {A} Case Study of Home Automation Security},
  booktitle    = {2013 Workshop on Learning from Authoritative Security Experiment Results,
                  {LASER} 2013, Arlington, VA, USA, October 16-17, 2013},
  pages        = {13--24},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/laser2013/program/oluwafemi},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/laseres/OluwafemiKGP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/DenningKS13,
  author       = {Tamara Denning and
                  Tadayoshi Kohno and
                  Adam Shostack},
  editor       = {Tracy Camp and
                  Paul T. Tymann and
                  J. D. Dougherty and
                  Kris Nagel},
  title        = {Control-Alt-Hack{\texttrademark}: a card game for computer security
                  outreach and education (abstract only)},
  booktitle    = {The 44th {ACM} Technical Symposium on Computer Science Education,
                  {SIGCSE} 2013, Denver, CO, USA, March 6-9, 2013},
  pages        = {729},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2445196.2445408},
  doi          = {10.1145/2445196.2445408},
  timestamp    = {Tue, 23 Mar 2021 10:54:19 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/DenningKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RoesnerK13,
  author       = {Franziska Roesner and
                  Tadayoshi Kohno},
  editor       = {Samuel T. King},
  title        = {Securing Embedded User Interfaces: Android and Beyond},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {97--112},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/roesner},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RoesnerK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/CzeskisMKW13,
  author       = {Alexei Czeskis and
                  Alexander Moshchuk and
                  Tadayoshi Kohno and
                  Helen J. Wang},
  editor       = {Daniel Schwabe and
                  Virg{\'{\i}}lio A. F. Almeida and
                  Hartmut Glaser and
                  Ricardo Baeza{-}Yates and
                  Sue B. Moon},
  title        = {Lightweight server support for browser-based {CSRF} protection},
  booktitle    = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro,
                  Brazil, May 13-17, 2013},
  pages        = {273--284},
  publisher    = {International World Wide Web Conferences Steering Committee / {ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488388.2488413},
  doi          = {10.1145/2488388.2488413},
  timestamp    = {Sun, 22 Sep 2019 18:15:38 +0200},
  biburl       = {https://dblp.org/rec/conf/www/CzeskisMKW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/RoesnerRKW12,
  author       = {Franziska Roesner and
                  Christopher Rovillos and
                  Tadayoshi Kohno and
                  David Wetherall},
  title        = {ShareMeNot: Balancing Privacy and Functionality of Third-Party Social
                  Widgets},
  journal      = {login Usenix Mag.},
  volume       = {37},
  number       = {4},
  year         = {2012},
  url          = {https://www.usenix.org/publications/login/august-2012-volume-37-number-4/sharemenot-balancing-privacy-and-functionality},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/RoesnerRKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EnevJBRK12,
  author       = {Miro Enev and
                  Jaeyeon Jung and
                  Liefeng Bo and
                  Xiaofeng Ren and
                  Tadayoshi Kohno},
  editor       = {Robert H'obbes' Zakon},
  title        = {SensorSift: balancing sensor data privacy and utility in automated
                  face understanding},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {149--158},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420975},
  doi          = {10.1145/2420950.2420975},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EnevJBRK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CzeskisDKWB12,
  author       = {Alexei Czeskis and
                  Michael Dietz and
                  Tadayoshi Kohno and
                  Dan S. Wallach and
                  Dirk Balfanz},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Strengthening user authentication through opportunistic cryptographic
                  identity assertions},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {404--414},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382240},
  doi          = {10.1145/2382196.2382240},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CzeskisDKWB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/RoesnerKW12,
  author       = {Franziska Roesner and
                  Tadayoshi Kohno and
                  David Wetherall},
  editor       = {Steven D. Gribble and
                  Dina Katabi},
  title        = {Detecting and Defending Against Third-Party Tracking on the Web},
  booktitle    = {Proceedings of the 9th {USENIX} Symposium on Networked Systems Design
                  and Implementation, {NSDI} 2012, San Jose, CA, USA, April 25-27, 2012},
  pages        = {155--168},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/nsdi12/technical-sessions/presentation/roesner},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/RoesnerKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RoesnerKMPWC12,
  author       = {Franziska Roesner and
                  Tadayoshi Kohno and
                  Alexander Moshchuk and
                  Bryan Parno and
                  Helen J. Wang and
                  Crispin Cowan},
  title        = {User-Driven Access Control: Rethinking Permission Granting in Modern
                  Operating Systems},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {224--238},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.24},
  doi          = {10.1109/SP.2012.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/RoesnerKMPWC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uist/RoesnerFK12,
  author       = {Franziska Roesner and
                  James Fogarty and
                  Tadayoshi Kohno},
  editor       = {Rob Miller and
                  Hrvoje Benko and
                  Celine Latulipe},
  title        = {User interface toolkit mechanisms for securing interface elements},
  booktitle    = {The 25th Annual {ACM} Symposium on User Interface Software and Technology,
                  {UIST} '12, Cambridge, MA, USA, October 7-10, 2012},
  pages        = {239--250},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2380116.2380147},
  doi          = {10.1145/2380116.2380147},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uist/RoesnerFK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PaulK12,
  author       = {Nathanael Paul and
                  Tadayoshi Kohno},
  editor       = {Carl A. Gunter and
                  Zachary N. J. Peterson},
  title        = {Security Risks, Low-tech User Interfaces, and Implantable Medical
                  Devices: {A} Case Study with Insulin Pump Infusion Systems},
  booktitle    = {3rd {USENIX} Workshop on Health Security and Privacy, HealthSec'12,
                  Bellevue, WA, USA, August 6-7, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/healthsec12/workshop-program/presentation/paul},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PaulK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Kohno12,
  author       = {Tadayoshi Kohno},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Security for cyber-physical systems: case studies with medical devices,
                  robots, and automobiles},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {99--100},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185462},
  doi          = {10.1145/2185448.2185462},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Kohno12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2012,
  editor       = {Tadayoshi Kohno},
  title        = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/AfanasyevKMMSSV11,
  author       = {Mikhail Afanasyev and
                  Tadayoshi Kohno and
                  Justin Ma and
                  Nick Murphy and
                  Stefan Savage and
                  Alex C. Snoeren and
                  Geoffrey M. Voelker},
  title        = {Privacy-preserving network forensics},
  journal      = {Commun. {ACM}},
  volume       = {54},
  number       = {5},
  pages        = {78--87},
  year         = {2011},
  url          = {https://doi.org/10.1145/1941487.1941508},
  doi          = {10.1145/1941487.1941508},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/AfanasyevKMMSSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/ZhuJSKW11,
  author       = {David (Yu) Zhu and
                  Jaeyeon Jung and
                  Dawn Song and
                  Tadayoshi Kohno and
                  David Wetherall},
  title        = {TaintEraser: protecting sensitive data leaks using application-level
                  taint tracking},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {45},
  number       = {1},
  pages        = {142--154},
  year         = {2011},
  url          = {https://doi.org/10.1145/1945023.1945039},
  doi          = {10.1145/1945023.1945039},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/ZhuJSKW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EnevGKP11,
  author       = {Miro Enev and
                  Sidhant Gupta and
                  Tadayoshi Kohno and
                  Shwetak N. Patel},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Televisions, video privacy, and powerline electromagnetic interference},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {537--550},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046770},
  doi          = {10.1145/2046707.2046770},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/EnevGKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/GeambasuJGKL11,
  author       = {Roxana Geambasu and
                  John P. John and
                  Steven D. Gribble and
                  Tadayoshi Kohno and
                  Henry M. Levy},
  editor       = {Christoph M. Kirsch and
                  Gernot Heiser},
  title        = {Keypad: an auditing file system for theft-prone devices},
  booktitle    = {European Conference on Computer Systems, Proceedings of the Sixth
                  European conference on Computer systems, EuroSys 2011, Salzburg, Austria,
                  April 10-13, 2011},
  pages        = {1--16},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966445.1966447},
  doi          = {10.1145/1966445.1966447},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/GeambasuJGKL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/KohnoJ11,
  author       = {Tadayoshi Kohno and
                  Brian David Johnson},
  editor       = {Thomas J. Cortina and
                  Ellen Lowenfeld Walker and
                  Laurie A. Smith King and
                  David R. Musicant},
  title        = {Science fiction prototyping and security education: cultivating contextual
                  and societal thinking in computer security education and beyond},
  booktitle    = {Proceedings of the 42nd {ACM} technical symposium on Computer science
                  education, {SIGCSE} 2011, Dallas, TX, USA, March 9-12, 2011},
  pages        = {9--14},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1953163.1953173},
  doi          = {10.1145/1953163.1953173},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/KohnoJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CheckowayMKASSKCRK11,
  author       = {Stephen Checkoway and
                  Damon McCoy and
                  Brian Kantor and
                  Danny Anderson and
                  Hovav Shacham and
                  Stefan Savage and
                  Karl Koscher and
                  Alexei Czeskis and
                  Franziska Roesner and
                  Tadayoshi Kohno},
  title        = {Comprehensive Experimental Analyses of Automotive Attack Surfaces},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Checkoway.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CheckowayMKASSKCRK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/MaganisJKSW11,
  author       = {Gabriel Maganis and
                  Jaeyeon Jung and
                  Tadayoshi Kohno and
                  Anmol Sheth and
                  David Wetherall},
  editor       = {Anthony LaMarca and
                  Landon P. Cox},
  title        = {Sensor tricorder: what does that sensor know about me?},
  booktitle    = {12th Workshop on Mobile Computing Systems and Applications, HotMobile
                  '11, Phoenix, AZ, USA, March 1-3, 2011},
  pages        = {98--103},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2184489.2184510},
  doi          = {10.1145/2184489.2184510},
  timestamp    = {Tue, 06 Nov 2018 16:59:22 +0100},
  biburl       = {https://dblp.org/rec/conf/wmcsa/MaganisJKSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0024293,
  author       = {Niels Ferguson and
                  Bruce Schneier and
                  Tadayoshi Kohno},
  title        = {Cryptography Engineering - Design Principles and Practical Applications},
  publisher    = {Wiley},
  year         = {2010},
  url          = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470474246.html},
  isbn         = {978-0-470-47424-2},
  timestamp    = {Mon, 13 Mar 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0024293.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RichardsonGK10,
  author       = {David W. Richardson and
                  Steven D. Gribble and
                  Tadayoshi Kohno},
  editor       = {Rachel Greenstadt},
  title        = {The limits of automatic {OS} fingerprint generation},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2010, Chicago, Illinois, USA, October 8, 2010},
  pages        = {24--34},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866423.1866430},
  doi          = {10.1145/1866423.1866430},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RichardsonGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/DenningBFGKM10,
  author       = {Tamara Denning and
                  Alan Borning and
                  Batya Friedman and
                  Brian T. Gill and
                  Tadayoshi Kohno and
                  William H. Maisel},
  editor       = {Elizabeth D. Mynatt and
                  Don Schoner and
                  Geraldine Fitzpatrick and
                  Scott E. Hudson and
                  W. Keith Edwards and
                  Tom Rodden},
  title        = {Patients, pacemakers, and implantable defibrillators: human values
                  and security for wireless implantable medical devices},
  booktitle    = {Proceedings of the 28th International Conference on Human Factors
                  in Computing Systems, {CHI} 2010, Atlanta, Georgia, USA, April 10-15,
                  2010},
  pages        = {917--926},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1753326.1753462},
  doi          = {10.1145/1753326.1753462},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/DenningBFGKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eccv/ShanCK10,
  author       = {Qi Shan and
                  Brian Curless and
                  Tadayoshi Kohno},
  editor       = {Kostas Daniilidis and
                  Petros Maragos and
                  Nikos Paragios},
  title        = {Seeing through Obscure Glass},
  booktitle    = {Computer Vision - {ECCV} 2010 - 11th European Conference on Computer
                  Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings,
                  Part {VI}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6316},
  pages        = {364--378},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15567-3\_27},
  doi          = {10.1007/978-3-642-15567-3\_27},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eccv/ShanCK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/GeambasuLKKL10,
  author       = {Roxana Geambasu and
                  Amit A. Levy and
                  Tadayoshi Kohno and
                  Arvind Krishnamurthy and
                  Henry M. Levy},
  editor       = {Remzi H. Arpaci{-}Dusseau and
                  Brad Chen},
  title        = {Comet: An active distributed key-value store},
  booktitle    = {9th {USENIX} Symposium on Operating Systems Design and Implementation,
                  {OSDI} 2010, October 4-6, 2010, Vancouver, BC, Canada, Proceedings},
  pages        = {323--336},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/osdi10/tech/full\_papers/Geambasu.pdf},
  timestamp    = {Thu, 12 Mar 2020 11:35:55 +0100},
  biburl       = {https://dblp.org/rec/conf/osdi/GeambasuLKKL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/CzeskisDYBFGK10,
  author       = {Alexei Czeskis and
                  Ivayla Dermendjieva and
                  Hussein Yapit and
                  Alan Borning and
                  Batya Friedman and
                  Brian T. Gill and
                  Tadayoshi Kohno},
  editor       = {Lorrie Faith Cranor},
  title        = {Parenting from the pocket: value tensions and technical directions
                  for secure and private parent-teen mobile safety},
  booktitle    = {Proceedings of the Sixth Symposium on Usable Privacy and Security,
                  {SOUPS} 2010, Redmond, Washington, USA, July 14-16, 2010},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {485},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1837110.1837130},
  doi          = {10.1145/1837110.1837130},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/CzeskisDYBFGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KoscherCRPKCMKASS10,
  author       = {Karl Koscher and
                  Alexei Czeskis and
                  Franziska Roesner and
                  Shwetak N. Patel and
                  Tadayoshi Kohno and
                  Stephen Checkoway and
                  Damon McCoy and
                  Brian Kantor and
                  Danny Anderson and
                  Hovav Shacham and
                  Stefan Savage},
  title        = {Experimental Security Analysis of a Modern Automobile},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {447--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.34},
  doi          = {10.1109/SP.2010.34},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KoscherCRPKCMKASS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2010healthsec,
  editor       = {Kevin Fu and
                  Tadayoshi Kohno and
                  Aviel D. Rubin},
  title        = {1st {USENIX} Workshop on Health Security and Privacy, HealthSec'10,
                  Washington, D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/healthsec10},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2010healthsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GardnerBK09,
  author       = {Ryan W. Gardner and
                  Matt Bishop and
                  Tadayoshi Kohno},
  title        = {Are Patched Machines Really Fixed?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {7},
  number       = {5},
  pages        = {82--85},
  year         = {2009},
  url          = {https://doi.org/10.1109/MSP.2009.116},
  doi          = {10.1109/MSP.2009.116},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GardnerBK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KoscherJBK09,
  author       = {Karl Koscher and
                  Ari Juels and
                  Vjekoslav Brajkovic and
                  Tadayoshi Kohno},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {{EPC} {RFID} tag security weaknesses and defenses: passport cards,
                  enhanced drivers licenses, and beyond},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {33--42},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653668},
  doi          = {10.1145/1653662.1653668},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KoscherJBK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/EverittBFK09,
  author       = {Katherine Everitt and
                  Tanya Bragin and
                  James Fogarty and
                  Tadayoshi Kohno},
  editor       = {Dan R. Olsen Jr. and
                  Richard B. Arthur and
                  Ken Hinckley and
                  Meredith Ringel Morris and
                  Scott E. Hudson and
                  Saul Greenberg},
  title        = {A comprehensive study of frequency, interference, and training of
                  multiple graphical passwords},
  booktitle    = {Proceedings of the 27th International Conference on Human Factors
                  in Computing Systems, {CHI} 2009, Boston, MA, USA, April 4-9, 2009},
  pages        = {889--898},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1518701.1518837},
  doi          = {10.1145/1518701.1518837},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/EverittBFK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/DenningMKSK09,
  author       = {Tamara Denning and
                  Cynthia Matuszek and
                  Karl Koscher and
                  Joshua R. Smith and
                  Tadayoshi Kohno},
  editor       = {Sumi Helal and
                  Hans Gellersen and
                  Sunny Consolvo},
  title        = {A spotlight on security and privacy risks with future household robots:
                  attacks and lessons},
  booktitle    = {UbiComp 2009: Ubiquitous Computing, 11th International Conference,
                  UbiComp 2009, Orlando, Florida, USA, September 30 - October 3, 2009,
                  Proceedings},
  series       = {{ACM} International Conference Proceeding Series},
  pages        = {105--114},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1620545.1620564},
  doi          = {10.1145/1620545.1620564},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/DenningMKSK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/RaghavanKSW09,
  author       = {Barath Raghavan and
                  Tadayoshi Kohno and
                  Alex C. Snoeren and
                  David Wetherall},
  editor       = {Ian Goldberg and
                  Mikhail J. Atallah},
  title        = {Enlisting ISPs to Improve Online Privacy: {IP} Address Mixing by Default},
  booktitle    = {Privacy Enhancing Technologies, 9th International Symposium, {PETS}
                  2009, Seattle, WA, USA, August 5-7, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5672},
  pages        = {143--163},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03168-7\_9},
  doi          = {10.1007/978-3-642-03168-7\_9},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/RaghavanKSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GeambasuKLL09,
  author       = {Roxana Geambasu and
                  Tadayoshi Kohno and
                  Amit A. Levy and
                  Henry M. Levy},
  editor       = {Fabian Monrose},
  title        = {Vanish: Increasing Data Privacy with Self-Destructing Data},
  booktitle    = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14,
                  2009, Proceedings},
  pages        = {299--316},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {http://www.usenix.org/events/sec09/tech/full\_papers/geambasu.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GeambasuKLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbdallaBCKKLMNPS08,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Dario Catalano and
                  Eike Kiltz and
                  Tadayoshi Kohno and
                  Tanja Lange and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Pascal Paillier and
                  Haixia Shi},
  title        = {Searchable Encryption Revisited: Consistency Properties, Relation
                  to Anonymous IBE, and Extensions},
  journal      = {J. Cryptol.},
  volume       = {21},
  number       = {3},
  pages        = {350--391},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00145-007-9006-6},
  doi          = {10.1007/S00145-007-9006-6},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbdallaBCKKLMNPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pervasive/Kohno08,
  author       = {Tadayoshi Kohno},
  title        = {An Interview with {RFID} Security Expert Ari Juels},
  journal      = {{IEEE} Pervasive Comput.},
  volume       = {7},
  number       = {1},
  pages        = {10--11},
  year         = {2008},
  url          = {https://doi.org/10.1109/MPRV.2008.4},
  doi          = {10.1109/MPRV.2008.4},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pervasive/Kohno08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pervasive/HalperinHFKM08,
  author       = {Daniel Halperin and
                  Thomas S. Heydt{-}Benjamin and
                  Kevin Fu and
                  Tadayoshi Kohno and
                  William H. Maisel},
  title        = {Security and Privacy for Implantable Medical Devices},
  journal      = {{IEEE} Pervasive Comput.},
  volume       = {7},
  number       = {1},
  pages        = {30--39},
  year         = {2008},
  url          = {https://doi.org/10.1109/MPRV.2008.16},
  doi          = {10.1109/MPRV.2008.16},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pervasive/HalperinHFKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JungSGWMK08,
  author       = {Jaeyeon Jung and
                  Anmol Sheth and
                  Ben Greenstein and
                  David Wetherall and
                  Gabriel Maganis and
                  Tadayoshi Kohno},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Privacy oracle: a system for finding application leaks with black
                  box differential testing},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {279--288},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455806},
  doi          = {10.1145/1455770.1455806},
  timestamp    = {Tue, 10 Nov 2020 19:59:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JungSGWMK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CzeskisKSK08,
  author       = {Alexei Czeskis and
                  Karl Koscher and
                  Joshua R. Smith and
                  Tadayoshi Kohno},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {RFIDs and secret handshakes: defending against ghost-and-leech attacks
                  and unauthorized reads with context-aware communications},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {479--490},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455831},
  doi          = {10.1145/1455770.1455831},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CzeskisKSK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/GreensteinMPKSW08,
  author       = {Ben Greenstein and
                  Damon McCoy and
                  Jeffrey Pang and
                  Tadayoshi Kohno and
                  Srinivasan Seshan and
                  David Wetherall},
  editor       = {Dirk Grunwald and
                  Richard Han and
                  Eyal de Lara and
                  Carla Schlatter Ellis},
  title        = {Improving wireless privacy with an identifier-free link layer protocol},
  booktitle    = {Proceedings of the 6th International Conference on Mobile Systems,
                  Applications, and Services (MobiSys 2008), Breckenridge, CO, USA,
                  June 17-20, 2008},
  pages        = {40--53},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1378600.1378607},
  doi          = {10.1145/1378600.1378607},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/GreensteinMPKSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/ReisGKW08,
  author       = {Charles Reis and
                  Steven D. Gribble and
                  Tadayoshi Kohno and
                  Nicholas C. Weaver},
  editor       = {Jon Crowcroft and
                  Michael Dahlin},
  title        = {Detecting In-Flight Page Changes with Web Tripwires},
  booktitle    = {5th {USENIX} Symposium on Networked Systems Design {\&} Implementation,
                  {NSDI} 2008, April 16-18, 2008, San Francisco, CA, USA, Proceedings},
  pages        = {31--44},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/nsdi08/tech/full\_papers/reis/reis.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/ReisGKW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/McCoyBGKS08,
  author       = {Damon McCoy and
                  Kevin S. Bauer and
                  Dirk Grunwald and
                  Tadayoshi Kohno and
                  Douglas C. Sicker},
  editor       = {Nikita Borisov and
                  Ian Goldberg},
  title        = {Shining Light in Dark Places: Understanding the Tor Network},
  booktitle    = {Privacy Enhancing Technologies, 8th International Symposium, {PETS}
                  2008, Leuven, Belgium, July 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5134},
  pages        = {63--76},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70630-4\_5},
  doi          = {10.1007/978-3-540-70630-4\_5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pet/McCoyBGKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HalperinHRCDMFKM08,
  author       = {Daniel Halperin and
                  Thomas S. Heydt{-}Benjamin and
                  Benjamin Ransford and
                  Shane S. Clark and
                  Benessa Defend and
                  Will Morgan and
                  Kevin Fu and
                  Tadayoshi Kohno and
                  William H. Maisel},
  title        = {Pacemakers and Implantable Cardiac Defibrillators: Software Radio
                  Attacks and Zero-Power Defenses},
  booktitle    = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May
                  2008, Oakland, California, {USA}},
  pages        = {129--142},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SP.2008.31},
  doi          = {10.1109/SP.2008.31},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/HalperinHRCDMFKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CzeskisHKGKS08,
  author       = {Alexei Czeskis and
                  David J. St. Hilaire and
                  Karl Koscher and
                  Steven D. Gribble and
                  Tadayoshi Kohno and
                  Bruce Schneier},
  editor       = {Niels Provos},
  title        = {Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and
                  the Case of the Tattling {OS} and Applications},
  booktitle    = {3rd {USENIX} Workshop on Hot Topics in Security, HotSec'08, San Jose,
                  CA, USA, July 29, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/hotsec08/tech/full\_papers/czeskis/czeskis.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CzeskisHKGKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DenningFK08,
  author       = {Tamara Denning and
                  Kevin Fu and
                  Tadayoshi Kohno},
  editor       = {Niels Provos},
  title        = {Absence Makes the Heart Grow Fonder: New Directions for Implantable
                  Medical Device Security},
  booktitle    = {3rd {USENIX} Workshop on Hot Topics in Security, HotSec'08, San Jose,
                  CA, USA, July 29, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/hotsec08/tech/full\_papers/denning/denning.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DenningFK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PiatekKK08,
  author       = {Michael Piatek and
                  Tadayoshi Kohno and
                  Arvind Krishnamurthy},
  editor       = {Niels Provos},
  title        = {Challenges and Directions for Monitoring {P2P} File Sharing Networks
                  - or - Why My Printer Received a {DMCA} Takedown Notice},
  booktitle    = {3rd {USENIX} Workshop on Hot Topics in Security, HotSec'08, San Jose,
                  CA, USA, July 29, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/hotsec08/tech/full\_papers/piatek/piatek.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PiatekKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RistenpartMKK08,
  author       = {Thomas Ristenpart and
                  Gabriel Maganis and
                  Arvind Krishnamurthy and
                  Tadayoshi Kohno},
  editor       = {Paul C. van Oorschot},
  title        = {Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic
                  Techniques and Replacing Trusted Third Parties with DHTs},
  booktitle    = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August
                  1, 2008, San Jose, CA, {USA}},
  pages        = {275--290},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/sec08/tech/full\_papers/ristenpart/ristenpart.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RistenpartMKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2008evt,
  editor       = {David L. Dill and
                  Tadayoshi Kohno},
  title        = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July
                  28-29, 2008, San Jose, CA, USA, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/2008evt.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pervasive/KripleanWKRBBKS07,
  author       = {Travis Kriplean and
                  Evan Welbourne and
                  Nodira Khoussainova and
                  Vibhor Rastogi and
                  Magdalena Balazinska and
                  Gaetano Borriello and
                  Tadayoshi Kohno and
                  Dan Suciu},
  title        = {Physical Access Control for Captured {RFID} Data},
  journal      = {{IEEE} Pervasive Comput.},
  volume       = {6},
  number       = {4},
  pages        = {48--55},
  year         = {2007},
  url          = {https://doi.org/10.1109/MPRV.2007.81},
  doi          = {10.1109/MPRV.2007.81},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pervasive/KripleanWKRBBKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/GreensteinGPCKSW07,
  author       = {Ben Greenstein and
                  Ramakrishna Gummadi and
                  Jeffrey Pang and
                  Mike Y. Chen and
                  Tadayoshi Kohno and
                  Srinivasan Seshan and
                  David Wetherall},
  editor       = {Galen C. Hunt},
  title        = {Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the
                  Wireless Era},
  booktitle    = {Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating
                  Systems, May 7-9, 2005, San Diego, California, {USA}},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {http://www.usenix.org/events/hotos07/tech/full\_papers/greenstein/greenstein.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotos/GreensteinGPCKSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SaponasLHAK07,
  author       = {T. Scott Saponas and
                  Jonathan Lester and
                  Carl Hartung and
                  Sameer Agarwal and
                  Tadayoshi Kohno},
  editor       = {Niels Provos},
  title        = {Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing},
  booktitle    = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA,
                  August 6-10, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/16th-usenix-security-symposium/devices-tell-you-privacy-trends-consumer-ubiquitous},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SaponasLHAK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BauerMGKS07,
  author       = {Kevin S. Bauer and
                  Damon McCoy and
                  Dirk Grunwald and
                  Tadayoshi Kohno and
                  Douglas C. Sicker},
  editor       = {Peng Ning and
                  Ting Yu},
  title        = {Low-resource routing attacks against tor},
  booktitle    = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314333.1314336},
  doi          = {10.1145/1314333.1314336},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/BauerMGKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Kohno06,
  author       = {Tadayoshi Kohno},
  title        = {Authenticated encryption in practice : generalized composition methods
                  and the Secure Shell, CWC, and WinZip schemes},
  school       = {University of California, San Diego, {USA}},
  year         = {2006},
  url          = {http://www.escholarship.org/uc/item/7tz0v522},
  timestamp    = {Tue, 21 Mar 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Kohno06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BellareKS06,
  author       = {Mihir Bellare and
                  Tadayoshi Kohno and
                  Victor Shoup},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Stateful public-key cryptosystems: how to encrypt with one 160-bit
                  exponentiation},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {380--389},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180452},
  doi          = {10.1145/1180405.1180452},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BellareKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KelseyK06,
  author       = {John Kelsey and
                  Tadayoshi Kohno},
  editor       = {Serge Vaudenay},
  title        = {Herding Hash Functions and the Nostradamus Attack},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {183--200},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_12},
  doi          = {10.1007/11761679\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KelseyK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MolnarKSW06,
  author       = {David Molnar and
                  Tadayoshi Kohno and
                  Naveen Sastry and
                  David A. Wagner},
  title        = {Tamper-Evident, History-Independent, Subliminal-Free Data Structures
                  on {PROM} Storage-or-How to Store Ballots on a Voting Machine (Extended
                  Abstract)},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {365--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.39},
  doi          = {10.1109/SP.2006.39},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MolnarKSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MolnarKSW06,
  author       = {David Molnar and
                  Tadayoshi Kohno and
                  Naveen Sastry and
                  David A. Wagner},
  title        = {Tamper-Evident, History-Independent, Subliminal-Free Data Structures
                  on {PROM} Storage -or- How to Store Ballots on a Voting Machine},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MolnarKSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareKS06,
  author       = {Mihir Bellare and
                  Tadayoshi Kohno and
                  Victor Shoup},
  title        = {Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit
                  Exponentiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4344,
  author       = {Mihir Bellare and
                  Tadayoshi Kohno and
                  Chanathip Namprempre},
  title        = {The Secure Shell {(SSH)} Transport Layer Encryption Modes},
  journal      = {{RFC}},
  volume       = {4344},
  pages        = {1--12},
  year         = {2006},
  url          = {https://doi.org/10.17487/RFC4344},
  doi          = {10.17487/RFC4344},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4344.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KohnoBC05,
  author       = {Tadayoshi Kohno and
                  Andre Broido and
                  Kimberly C. Claffy},
  title        = {Remote Physical Device Fingerprintin},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {2},
  number       = {2},
  pages        = {93--108},
  year         = {2005},
  url          = {https://doi.org/10.1109/TDSC.2005.26},
  doi          = {10.1109/TDSC.2005.26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/KohnoBC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaBCKKLMNPS05,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Dario Catalano and
                  Eike Kiltz and
                  Tadayoshi Kohno and
                  Tanja Lange and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Pascal Paillier and
                  Haixia Shi},
  editor       = {Victor Shoup},
  title        = {Searchable Encryption Revisited: Consistency Properties, Relation
                  to Anonymous IBE, and Extensions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {205--222},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_13},
  doi          = {10.1007/11535218\_13},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaBCKKLMNPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KohnoBC05,
  author       = {Tadayoshi Kohno and
                  Andre Broido and
                  Kimberly C. Claffy},
  title        = {Remote Physical Device Fingerprinting},
  booktitle    = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11
                  May 2005, Oakland, CA, {USA}},
  pages        = {211--225},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SP.2005.18},
  doi          = {10.1109/SP.2005.18},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KohnoBC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBCKKLMNPS05,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Dario Catalano and
                  Eike Kiltz and
                  Tadayoshi Kohno and
                  Tanja Lange and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Pascal Paillier and
                  Haixia Shi},
  title        = {Searchable Encryption Revisited: Consistency Properties, Relation
                  to Anonymous IBE, and Extensions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBCKKLMNPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KelseyK05,
  author       = {John Kelsey and
                  Tadayoshi Kohno},
  title        = {Herding Hash Functions and the Nostradamus Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {281},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/281},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KelseyK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuKK05,
  author       = {Kevin Fu and
                  Seny Kamara and
                  Tadayoshi Kohno},
  title        = {Key Regression: Enabling Efficient Key Distribution for Secure Distributed
                  Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuKK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BellareKN04,
  author       = {Mihir Bellare and
                  Tadayoshi Kohno and
                  Chanathip Namprempre},
  title        = {Breaking and provably repairing the {SSH} authenticated encryption
                  scheme: {A} case study of the Encode-then-Encrypt-and-MAC paradigm},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {206--241},
  year         = {2004},
  url          = {https://doi.org/10.1145/996943.996945},
  doi          = {10.1145/996943.996945},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BellareKN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kohno04,
  author       = {Tadayoshi Kohno},
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {Attacking and repairing the winZip encryption scheme},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages        = {72--81},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1030083.1030095},
  doi          = {10.1145/1030083.1030095},
  timestamp    = {Fri, 13 Nov 2020 16:10:44 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Kohno04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareK04,
  author       = {Mihir Bellare and
                  Tadayoshi Kohno},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Hash Function Balance and Its Impact on Birthday Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {401--418},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_24},
  doi          = {10.1007/978-3-540-24676-3\_24},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KohnoVW04,
  author       = {Tadayoshi Kohno and
                  John Viega and
                  Doug Whiting},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {{CWC:} {A} High-Performance Conventional Authenticated Encryption
                  Mode},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {408--426},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_26},
  doi          = {10.1007/978-3-540-25937-4\_26},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KohnoVW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataK04,
  author       = {Tetsu Iwata and
                  Tadayoshi Kohno},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {427--445},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_27},
  doi          = {10.1007/978-3-540-25937-4\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IwataK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KohnoSRW04,
  author       = {Tadayoshi Kohno and
                  Adam Stubblefield and
                  Aviel D. Rubin and
                  Dan S. Wallach},
  title        = {Analysis of an Electronic Voting System},
  booktitle    = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12
                  May 2004, Berkeley, CA, {USA}},
  pages        = {27},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SECPRI.2004.1301313},
  doi          = {10.1109/SECPRI.2004.1301313},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KohnoSRW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataK04,
  author       = {Tetsu Iwata and
                  Tadayoshi Kohno},
  title        = {New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kohno04,
  author       = {Tadayoshi Kohno},
  title        = {Analysis of the WinZip encryption method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kohno04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareK03,
  author       = {Mihir Bellare and
                  Tadayoshi Kohno},
  editor       = {Eli Biham},
  title        = {A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs,
                  and Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {491--506},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_31},
  doi          = {10.1007/3-540-39200-9\_31},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenK03,
  author       = {Lars R. Knudsen and
                  Tadayoshi Kohno},
  editor       = {Thomas Johansson},
  title        = {Analysis of {RMAC}},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {182--191},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_14},
  doi          = {10.1007/978-3-540-39887-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FergusonWSKLK03,
  author       = {Niels Ferguson and
                  Doug Whiting and
                  Bruce Schneier and
                  John Kelsey and
                  Stefan Lucks and
                  Tadayoshi Kohno},
  editor       = {Thomas Johansson},
  title        = {Helix: Fast Encryption and Authentication in a Single Cryptographic
                  Primitive},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {330--346},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_24},
  doi          = {10.1007/978-3-540-39887-5\_24},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/FergusonWSKLK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareK03,
  author       = {Mihir Bellare and
                  Tadayoshi Kohno},
  title        = {Hash Function Balance and its Impact on Birthday Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KohnoVW03,
  author       = {Tadayoshi Kohno and
                  John Viega and
                  Doug Whiting},
  title        = {{CWC:} {A} high-performance conventional authenticated encryption
                  mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KohnoVW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KohnoPB03,
  author       = {Tadayoshi Kohno and
                  Adriana Palacio and
                  John Black},
  title        = {Building Secure Cryptographic Transforms, or How to Encrypt and {MAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KohnoPB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ViegaBKM02,
  author       = {John Viega and
                  J. T. Bloch and
                  Tadayoshi Kohno and
                  Gary McGraw},
  title        = {Token-based scanning of source code for security problems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {238--261},
  year         = {2002},
  url          = {https://doi.org/10.1145/545186.545188},
  doi          = {10.1145/545186.545188},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ViegaBKM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BellareKN02,
  author       = {Mihir Bellare and
                  Tadayoshi Kohno and
                  Chanathip Namprempre},
  editor       = {Vijayalakshmi Atluri},
  title        = {Authenticated encryption in {SSH:} provably fixing the {SSH} binary
                  packet protocol},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {1--11},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586112},
  doi          = {10.1145/586110.586112},
  timestamp    = {Tue, 10 Nov 2020 20:00:47 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BellareKN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareKN02,
  author       = {Mihir Bellare and
                  Tadayoshi Kohno and
                  Chanathip Namprempre},
  title        = {Breaking and Provably Repairing the {SSH} Authenticated Encryption
                  Scheme: {A} Case Study of the Encode-then-Encrypt-and-MAC Paradigm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareKN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kohno02,
  author       = {Tadayoshi Kohno},
  title        = {Related-Key and Key-Collision Attacks Against {RMAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {159},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/159},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kohno02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/ViegaKP01,
  author       = {John Viega and
                  Tadayoshi Kohno and
                  Bruce Potter},
  title        = {Trust (and mistrust) in secure applications},
  journal      = {Commun. {ACM}},
  volume       = {44},
  number       = {2},
  pages        = {31--36},
  year         = {2001},
  url          = {https://doi.org/10.1145/359205.359223},
  doi          = {10.1145/359205.359223},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/ViegaKP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jea/GabowK01,
  author       = {Harold N. Gabow and
                  Tadayoshi Kohno},
  title        = {A Network-Flow-Based Scheduler: Design, Performance History, and Experimental
                  Analysis},
  journal      = {{ACM} J. Exp. Algorithmics},
  volume       = {6},
  pages        = {3},
  year         = {2001},
  url          = {https://doi.org/10.1145/945394.945397},
  doi          = {10.1145/945394.945397},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jea/GabowK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KohnoM01,
  author       = {Tadayoshi Kohno and
                  Mark McGovern},
  editor       = {Paul F. Syverson},
  title        = {On the Global Content {PMI:} Improved Copy-Protected Internet Content
                  Distribution},
  booktitle    = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
                  Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {70--81},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-46088-8\_9},
  doi          = {10.1007/3-540-46088-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KohnoM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/KohnoKS00,
  author       = {Tadayoshi Kohno and
                  John Kelsey and
                  Bruce Schneier},
  title        = {Preliminary Cryptanalysis of Reduced-Round Serpent},
  booktitle    = {The Third Advanced Encryption Standard Candidate Conference, April
                  13-14, 2000, New York, New York, {USA}},
  pages        = {195--211},
  publisher    = {National Institute of Standards and Technology,},
  year         = {2000},
  timestamp    = {Thu, 08 Aug 2019 17:13:16 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/KohnoKS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KelseyKS00,
  author       = {John Kelsey and
                  Tadayoshi Kohno and
                  Bruce Schneier},
  editor       = {Bruce Schneier},
  title        = {Amplified Boomerang Attacks Against Reduced-Round {MARS} and Serpent},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {75--93},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_6},
  doi          = {10.1007/3-540-44706-7\_6},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KelseyKS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics