


Остановите войну!
for scientists:


default search action
Tadayoshi Kohno
Person information

- affiliation: University of Washington, Seattle, Washington, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j39]Tadayoshi Kohno
:
{In Earth} Until (Ready). IEEE Secur. Priv. 21(2): 7-8 (2023) - [j38]Carl E. Landwehr
, Michael K. Reiter
, Laurie A. Williams
, Gene Tsudik
, Trent Jaeger
, Tadayoshi Kohno
, Apu Kapadia
:
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. IEEE Secur. Priv. 21(2): 32-42 (2023) - [j37]Elissa M. Redmiles
, Mia M. Bennett, Tadayoshi Kohno
:
Power in Computer Security and Privacy: A Critical Lens. IEEE Secur. Priv. 21(2): 48-52 (2023) - [j36]Tadayoshi Kohno:
In Your Eyes. IEEE Secur. Priv. 21(5): 4-5 (2023) - [c115]Rachel Hong, Tadayoshi Kohno, Jamie Morgenstern:
Evaluation of targeted dataset collection on racial equity in face recognition. AIES 2023: 531-541 - [c114]Pardis Emami Naeini
, Joseph Breda
, Wei Dai
, Tadayoshi Kohno
, Kim Laine
, Shwetak N. Patel
, Franziska Roesner
:
Understanding People's Concerns and Attitudes Toward Smart Cities. CHI 2023: 71:1-71:24 - [c113]Miranda Wei
, Sunny Consolvo
, Patrick Gage Kelley
, Tadayoshi Kohno
, Franziska Roesner
, Kurt Thomas
:
"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment. CHI 2023: 190:1-190:17 - [c112]Jackson Stokes
, Tal August
, Robert A Marver
, Alexei Czeskis
, Franziska Roesner
, Tadayoshi Kohno
, Katharina Reinecke
:
How Language Formality in Security and Privacy Interfaces Impacts Intended Compliance. CHI 2023: 617:1-617:12 - [c111]Miranda Wei, Pardis Emami Naeini, Franziska Roesner, Tadayoshi Kohno:
Skilled or Gullibleƒ Gender Stereotypes Related to Computer Security and Privacy. SP 2023: 2050-2067 - [c110]Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner:
Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality. USENIX Security Symposium 2023 - [c109]Tadayoshi Kohno, Yasemin Acar, Wulf Loh:
Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. USENIX Security Symposium 2023 - [c108]Rachel McAmis, Tadayoshi Kohno:
The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real Estate. USENIX Security Symposium 2023 - [c107]Christina Yeung
, Umar Iqbal
, Yekaterina Tsipenyuk O'Neil
, Tadayoshi Kohno
, Franziska Roesner
:
Online Advertising in Ukraine and Russia During the 2022 Russian Invasion. WWW 2023: 2787-2796 - [i34]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Franziska Roesner, Kurt Thomas:
"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment. CoRR abs/2302.08057 (2023) - [i33]Tadayoshi Kohno, Yasemin Acar, Wulf Loh:
Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. CoRR abs/2302.14326 (2023) - [i32]Inyoung Cheong, Aylin Caliskan, Tadayoshi Kohno:
Is the U.S. Legal System Ready for AI's Challenges to Human Values? CoRR abs/2308.15906 (2023) - [i31]Rock Yuren Pang, Dan Grossman, Tadayoshi Kohno, Katharina Reinecke:
The Case for Anticipating Undesirable Consequences of Computing Innovations Early, Often, and Across Computer Science. CoRR abs/2309.04456 (2023) - 2022
- [j35]Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, Alexandru G. Bardas:
Defensive Technology Use During the 2018-2019 Sudanese Revolution. IEEE Secur. Priv. 20(2): 40-48 (2022) - [j34]Tadayoshi Kohno:
Excerpts From the New Dictionary of Cybersecurity, 2036. IEEE Secur. Priv. 20(3): 8 (2022) - [j33]Tadayoshi Kohno:
Mx. President Has a Brain. IEEE Secur. Priv. 20(3): 9-11 (2022) - [j32]Tadayoshi Kohno, Camille Cobb, Ada Lerner, Michelle Lin, Adam Shostack:
The Buffet Overflow Café. IEEE Secur. Priv. 20(4): 4-7 (2022) - [j31]Tadayoshi Kohno
:
The Schuhmacher. IEEE Secur. Priv. 20(5): 14-15 (2022) - [j30]Tadayoshi Kohno
:
The Our Reality Privacy Policy. IEEE Secur. Priv. 20(6): 4-7 (2022) - [j29]Tadayoshi Kohno:
Welcome to the Latest "Off by One" Column. IEEE Secur. Priv. 20(6): 5 (2022) - [c106]Kentrell Owens, Johanna Gunawan, David R. Choffnes, Pardis Emami Naeini, Tadayoshi Kohno, Franziska Roesner:
Exploring Deceptive Design Patterns in Voice Interfaces. EuroUSEC 2022: 64-78 - [c105]Eric Zeng, Rachel McAmis, Tadayoshi Kohno, Franziska Roesner:
What factors affect targeting and bids in online advertising?: a field measurement study. IMC 2022: 210-229 - [c104]Miranda Wei, Eric Zeng, Tadayoshi Kohno, Franziska Roesner:
Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships. SOUPS @ USENIX Security Symposium 2022: 447-462 - [c103]Kentrell Owens, Anita Alem, Franziska Roesner, Tadayoshi Kohno:
Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives. USENIX Security Symposium 2022: 4077-4094 - [i30]Ashish Hooda, Andrey Labunets, Tadayoshi Kohno, Earlence Fernandes:
Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance. CoRR abs/2212.04107 (2022) - 2021
- [j28]Ivan Evtimov, Pascal Sturmfels, Tadayoshi Kohno:
FoggySight: A Scheme for Facial Lookup Privacy. Proc. Priv. Enhancing Technol. 2021(3): 204-226 (2021) - [j27]Peter Ney, Lee Organick, Jeff Nivala, Luis Ceze, Tadayoshi Kohno:
DNA Sequencing Flow Cells and the Security of the Molecular-Digital Interface. Proc. Priv. Enhancing Technol. 2021(3): 413-432 (2021) - [c102]Lucy Simko, Britnie Chin, Sungmin Na, Harkiran Kaur Saluja, Tian Qi Zhu, Tadayoshi Kohno, Alexis Hiniker, Jason C. Yip, Camille Cobb:
Would You Rather: A Focus Group Method for Eliciting and Discussing Formative Design Insights with Children. IDC 2021: 131-146 - [c101]Eric Zeng, Tadayoshi Kohno, Franziska Roesner:
What Makes a "Bad" Ad? User Perceptions of Problematic Online Advertising. CHI 2021: 361:1-361:24 - [c100]Eric Zeng, Miranda Wei, Theo Gregersen, Tadayoshi Kohno, Franziska Roesner:
Polls, clickbait, and commemorative $2 bills: problematic political advertising on news and media websites around the 2020 U.S. elections. Internet Measurement Conference 2021: 507-525 - [c99]Chunjong Park, Anas Awadalla, Tadayoshi Kohno, Shwetak N. Patel:
Reliable and Trustworthy Machine Learning for Health Using Dataset Shift Detection. NeurIPS 2021: 3043-3056 - [c98]Pardis Emami Naeini, Tiona Francisco, Tadayoshi Kohno, Franziska Roesner:
Understanding Privacy Attitudes and Concerns Towards Remote Communications During the COVID-19 Pandemic. SOUPS @ USENIX Security Symposium 2021: 695-714 - [c97]Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, Alexandru G. Bardas:
Defensive Technology Use by Political Activists During the Sudanese Revolution. SP 2021: 372-390 - [i29]Pardis Emami Naeini, Tiona Francisco, Tadayoshi Kohno, Franziska Roesner:
Understanding Privacy Attitudes and Concerns Towards Remote Communications During the COVID-19 Pandemic. CoRR abs/2106.05227 (2021) - [i28]Ivan Evtimov, Ian Covert, Aditya Kusupati, Tadayoshi Kohno:
Disrupting Model Training with Adversarial Shortcuts. CoRR abs/2106.06654 (2021) - [i27]Chunjong Park, Anas Awadalla, Tadayoshi Kohno, Shwetak N. Patel:
Reliable and Trustworthy Machine Learning for Health Using Dataset Shift Detection. CoRR abs/2110.14019 (2021) - 2020
- [j26]Justin Chan, Landon P. Cox, Dean P. Foster, Shyam Gollakota, Eric Horvitz, Joseph Jaeger
, Sham M. Kakade, Tadayoshi Kohno, John Langford, Jonathan Larson, Puneet Sharma, Sudheesh Singanamalla, Jacob E. Sunshine, Stefano Tessaro:
PACT: Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing. IEEE Data Eng. Bull. 43(2): 15-35 (2020) - [j25]L. Jean Camp, Ryan Henry
, Tadayoshi Kohno
, Shrirang Mare
, Steven A. Myers, Shwetak N. Patel
, Joshua Streiff:
Toward a Secure Internet of Things: Directions for Research. IEEE Secur. Priv. 18(4): 28-37 (2020) - [j24]Shrirang Mare, Franziska Roesner, Tadayoshi Kohno:
Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proc. Priv. Enhancing Technol. 2020(2): 436-458 (2020) - [j23]Camille Cobb, Lucy Simko, Tadayoshi Kohno, Alexis Hiniker:
A Privacy-Focused Systematic Analysis of Online Status Indicators. Proc. Priv. Enhancing Technol. 2020(3): 384-403 (2020) - [c96]Camille Cobb, Lucy Simko, Tadayoshi Kohno, Alexis Hiniker:
User Experiences with Online Status Indicators. CHI 2020: 1-12 - [c95]Sudheesh Singanamalla
, Esther Han Beol Jang, Richard J. Anderson, Tadayoshi Kohno, Kurtis Heimerl:
Accept the Risk and Continue: Measuring the Long Tail of Government https Adoption. Internet Measurement Conference 2020: 577-597 - [c94]Peter Ney, Luis Ceze, Tadayoshi Kohno:
Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference. NDSS 2020 - [i26]Justin Chan, Dean P. Foster, Shyam Gollakota, Eric Horvitz, Joseph Jaeger, Sham M. Kakade, Tadayoshi Kohno, John Langford, Jonathan Larson, Sudheesh Singanamalla, Jacob E. Sunshine, Stefano Tessaro:
PACT: Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing. CoRR abs/2004.03544 (2020) - [i25]Lucy Simko, Ryan Calo, Franziska Roesner, Tadayoshi Kohno:
COVID-19 Contact Tracing and Privacy: Studying Opinion and Preferences. CoRR abs/2005.06056 (2020) - [i24]Ivan Evtimov, Weidong Cui, Ece Kamar, Emre Kiciman, Tadayoshi Kohno, Jerry Li:
Security and Machine Learning in the Real World. CoRR abs/2007.07205 (2020) - [i23]Kevin Fu, Tadayoshi Kohno, Daniel Lopresti, Elizabeth D. Mynatt, Klara Nahrstedt, Shwetak N. Patel, Debra J. Richardson, Benjamin G. Zorn:
Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things. CoRR abs/2008.00017 (2020) - [i22]Lucy Simko, Jack Lucas Chang, Maggie Jiang, Ryan Calo, Franziska Roesner, Tadayoshi Kohno:
COVID-19 Contact Tracing and Privacy: A Longitudinal Study of Public Opinion. CoRR abs/2012.01553 (2020) - [i21]Ivan Evtimov, Pascal Sturmfels, Tadayoshi Kohno:
FoggySight: A Scheme for Facial Lookup Privacy. CoRR abs/2012.08588 (2020)
2010 – 2019
- 2019
- [c93]Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Secure Multi-User Content Sharing for Augmented Reality Applications. USENIX Security Symposium 2019: 141-158 - [c92]Kiron Lebeck, Tadayoshi Kohno, Franziska Roesner:
Enabling Multiple Applications to Simultaneously Augment Reality: Challenges and Directions. HotMobile 2019: 81-86 - [c91]Shrirang Mare, Logan Girvin, Franziska Roesner, Tadayoshi Kohno:
Consumer Smart Homes: Where We Are and Where We Need to Go. HotMobile 2019: 117-122 - 2018
- [j22]Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Arya: Operating System Support for Securely Augmenting Reality. IEEE Secur. Priv. 16(1): 44-53 (2018) - [j21]Lucy Simko, Luke Zettlemoyer, Tadayoshi Kohno:
Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution. Proc. Priv. Enhancing Technol. 2018(1): 127-144 (2018) - [c90]Kevin Eykholt
, Ivan Evtimov, Earlence Fernandes
, Bo Li, Amir Rahmati
, Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, Dawn Song:
Robust Physical-World Attacks on Deep Learning Visual Classification. CVPR 2018: 1625-1634 - [c89]Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users. IEEE Symposium on Security and Privacy 2018: 392-408 - [c88]Lucy Simko, Ada Lerner, Samia Ibtasam, Franziska Roesner, Tadayoshi Kohno:
Computer Security and Privacy for Refugees in the United States. IEEE Symposium on Security and Privacy 2018: 409-423 - [c87]Dawn Song, Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramèr
, Atul Prakash, Tadayoshi Kohno:
Physical Adversarial Examples for Object Detectors. WOOT @ USENIX Security Symposium 2018 - [i20]Stefano Baldassi, Tadayoshi Kohno, Franziska Roesner, Moqian Tian:
Challenges and New Directions in Augmented Reality, Computer Security, and Neuroscience - Part 1: Risks to Sensation and Perception. CoRR abs/1806.10557 (2018) - [i19]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati
, Florian Tramèr, Atul Prakash, Tadayoshi Kohno, Dawn Song:
Physical Adversarial Examples for Object Detectors. CoRR abs/1807.07769 (2018) - [i18]Peter M. Ney, Luis Ceze, Tadayoshi Kohno:
Computer Security Risks of Distant Relative Matching in Consumer Genetic Databases. CoRR abs/1810.02895 (2018) - 2017
- [j20]Rajalakshmi Nandakumar, Alex Takakuwa, Tadayoshi Kohno, Shyamnath Gollakota:
CovertBand: Activity Information Leakage using Music. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(3): 87:1-87:24 (2017) - [j19]Peter Ney, Ian Smith, Gabriel Cadamuro, Tadayoshi Kohno:
SeaGlass: Enabling City-Wide IMSI-Catcher Detection. Proc. Priv. Enhancing Technol. 2017(3): 39 (2017) - [c86]Ada Lerner, Tadayoshi Kohno, Franziska Roesner:
Rewriting History: Changing the Archived Web from the Present. CCS 2017: 1741-1755 - [c85]Genevieve Gebhart, Tadayoshi Kohno:
Internet Censorship in Thailand: User Practices and Potential Threats. EuroS&P 2017: 417-432 - [c84]Anna Kornfeld Simpson, Franziska Roesner, Tadayoshi Kohno:
Securing vulnerable home IoT devices with an in-hub security manager. PerCom Workshops 2017: 551-556 - [c83]Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Securing Augmented Reality Output. IEEE Symposium on Security and Privacy 2017: 320-337 - [c82]Peter Ney, Karl Koscher, Lee Organick, Luis Ceze, Tadayoshi Kohno:
Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More. USENIX Security Symposium 2017: 765-779 - [c81]Paul Vines, Franziska Roesner, Tadayoshi Kohno:
Exploring ADINT: Using Ad Targeting for Surveillance on a Budget - or - How Alice Can Buy Ads to Track Bob. WPES@CCS 2017: 153-164 - [c80]Camille Cobb, Tadayoshi Kohno:
How Public Is My Private Life?: Privacy in Online Dating. WWW 2017: 1231-1240 - [i17]Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati
, Dawn Song:
Robust Physical-World Attacks on Machine Learning Models. CoRR abs/1707.08945 (2017) - [i16]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Dawn Song, Tadayoshi Kohno, Amir Rahmati, Atul Prakash, Florian Tramèr:
Note on Attacking Object Detectors with Adversarial Stickers. CoRR abs/1712.08062 (2017) - 2016
- [j18]Miro Enev, Alex Takakuwa, Karl Koscher, Tadayoshi Kohno:
Automobile Driver Fingerprinting. Proc. Priv. Enhancing Technol. 2016(1): 34-50 (2016) - [j17]Jane Cleland-Huang, Tamara Denning, Tadayoshi Kohno, Forrest Shull, Samuel Weber:
Keeping Ahead of Our Adversaries. IEEE Softw. 33(3): 24-28 (2016) - [j16]Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner:
Excavating Web Trackers Using Web Archaeology. login Usenix Mag. 41(4) (2016) - [c79]Alexis Hiniker
, Sungsoo (Ray) Hong
, Tadayoshi Kohno, Julie A. Kientz:
MyTime: Designing and Evaluating an Intervention for Smartphone Non-Use. CHI 2016: 4746-4757 - [c78]Alexis Hiniker
, Shwetak N. Patel, Tadayoshi Kohno, Julie A. Kientz:
Why would you do that? predicting the uses and gratifications behind smartphone-usage behaviors. UbiComp 2016: 634-645 - [c77]Camille Cobb, Samuel Sudar, Nicholas Reiter, Richard J. Anderson, Franziska Roesner, Tadayoshi Kohno:
Computer Security for Data Collection Technologies. ICTD 2016: 2 - [c76]Will Scott, Thomas E. Anderson, Tadayoshi Kohno, Arvind Krishnamurthy:
Satellite: Joint Analysis of CDNs and Network-Level Interference. USENIX Annual Technical Conference 2016: 195-208 - [c75]Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner:
Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016. USENIX Security Symposium 2016 - [c74]Kiron Lebeck, Tadayoshi Kohno, Franziska Roesner:
How to Safely Augment Reality: Challenges and Directions. HotMobile 2016: 45-50 - 2015
- [c73]Emily McReynolds, Adam Lerner, Will Scott, Franziska Roesner, Tadayoshi Kohno:
Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions. Financial Cryptography Workshops 2015: 94-111 - [c72]Tamara Bonaci, Junjie Yan, Jeffrey Herron, Tadayoshi Kohno, Howard Jay Chizeck:
Experimental analysis of denial-of-service attacks on teleoperated robotic systems. ICCPS 2015: 11-20 - [c71]Adam Lerner, Alisha Saxena, Kirk Ouimet, Ben Turley, Anthony Vance, Tadayoshi Kohno, Franziska Roesner:
Analyzing the Use of Quick Response Codes in the Wild. MobiSys 2015: 359-374 - [c70]Haitham Hassanieh
, Jue Wang, Dina Katabi, Tadayoshi Kohno:
Securing RFIDs by Randomizing the Modulation and Channel. NSDI 2015: 235-249 - [c69]Karl Koscher, Tadayoshi Kohno, David Molnar:
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems. WOOT 2015 - [c68]Paul Vines, Tadayoshi Kohno:
Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform. WPES@CCS 2015: 75-84 - [i15]Tamara Bonaci, Jeffrey Herron, Tariq Yusuf, Junjie Yan, Tadayoshi Kohno, Howard Jay Chizeck:
To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots. CoRR abs/1504.04339 (2015) - [i14]Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart:
Surreptitiously Weakening Cryptographic Systems. IACR Cryptol. ePrint Arch. 2015: 97 (2015) - 2014
- [j15]Franziska Roesner, Tadayoshi Kohno, David Molnar:
Security and privacy for augmented reality systems. Commun. ACM 57(4): 88-96 (2014) - [c67]Xinran Wang, Tadayoshi Kohno, Bob Blakley:
Polymorphism as a Defense for Automated Attack of Websites. ACNS 2014: 513-530 - [c66]Tamara Denning, Daniel B. Kramer, Batya Friedman, Matthew R. Reynolds, Brian T. Gill, Tadayoshi Kohno:
CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices. ACSAC 2014: 426-435 - [c65]Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, Helen J. Wang:
World-Driven Access Control for Continuous Sensing. CCS 2014: 1169-1181 - [c64]Tamara Denning, Zakariya Dehlawi, Tadayoshi Kohno:
In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies. CHI 2014: 2377-2386 - [c63]Franziska Roesner, Brian T. Gill, Tadayoshi Kohno:
Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages. Financial Cryptography 2014: 64-76 - [c62]Jaeyeon Jung, Tadayoshi Kohno:
Workshop on usable privacy & security for wearable and domestic ubiquitous devices (UPSIDE). UbiComp Adjunct 2014: 1279-1282 - [c61]Franziska Roesner, Tadayoshi Kohno, Tamara Denning, Ryan Calo, Bryce Clayton Newell:
Augmented reality: hard problems of law and policy. UbiComp Adjunct 2014: 1283-1288 - [c60]Tamara Denning, Adam Shostack, Tadayoshi Kohno:
Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research. 3GSE 2014 - 2013
- [j14]Tamara Denning, Tadayoshi Kohno, Henry M. Levy:
Computer security and the modern home. Commun. ACM 56(1): 94-103 (2013) - [c59]Tamara Denning, Adam Lerner, Adam Shostack, Tadayoshi Kohno:
Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education. CCS 2013: 915-928 - [c58]Loris D'Antoni, Alan M. Dunn, Suman Jana, Tadayoshi Kohno, Benjamin Livshits, David Molnar, Alexander Moshchuk, Eyal Ofek, Franziska Roesner, T. Scott Saponas, Margus Veanes, Helen J. Wang:
Operating System Support for Augmented Reality Applications. HotOS 2013 - [c57]Temitope Oluwafemi, Tadayoshi Kohno, Sidhant Gupta, Shwetak N. Patel:
Experimental Security Analyses of Non-Networked Compact Fluorescent Lamps: A Case Study of Home Automation Security. LASER 2013: 13-24 - [c56]Tamara Denning, Tadayoshi Kohno, Adam Shostack:
Control-Alt-Hack™: a card game for computer security outreach and education (abstract only). SIGCSE 2013: 729 - [c55]Franziska Roesner, Tadayoshi Kohno:
Securing Embedded User Interfaces: Android and Beyond. USENIX Security Symposium 2013: 97-112 - [c54]Alexei Czeskis, Alexander Moshchuk, Tadayoshi Kohno, Helen J. Wang:
Lightweight server support for browser-based CSRF protection. WWW 2013: 273-284 - 2012
- [j13]Franziska Roesner, Christopher Rovillos, Tadayoshi Kohno, David Wetherall:
ShareMeNot: Balancing Privacy and Functionality of Third-Party Social Widgets. login Usenix Mag. 37(4) (2012) - [c53]Miro Enev, Jaeyeon Jung, Liefeng Bo, Xiaofeng Ren, Tadayoshi Kohno:
SensorSift: balancing sensor data privacy and utility in automated face understanding. ACSAC 2012: 149-158 - [c52]Alexei Czeskis, Michael Dietz, Tadayoshi Kohno, Dan S. Wallach, Dirk Balfanz:
Strengthening user authentication through opportunistic cryptographic identity assertions. CCS 2012: 404-414 - [c51]Franziska Roesner, Tadayoshi Kohno, David Wetherall:
Detecting and Defending Against Third-Party Tracking on the Web. NSDI 2012: 155-168 - [c50]Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, Crispin Cowan:
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. IEEE Symposium on Security and Privacy 2012: 224-238 - [c49]Franziska Roesner, James Fogarty, Tadayoshi Kohno:
User interface toolkit mechanisms for securing interface elements. UIST 2012: 239-250 - [c48]