default search action
Karl Koscher
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c16]Sam Crow, Brown Farinholt, Brian Johannesmeyer, Karl Koscher, Stephen Checkoway, Stefan Savage, Aaron Schulman, Alex C. Snoeren, Kirill Levchenko:
Triton: A Software-Reconfigurable Federated Avionics Testbed. CSET @ USENIX Security Symposium 2019 - 2017
- [c15]Peter Ney, Karl Koscher, Lee Organick, Luis Ceze, Tadayoshi Kohno:
Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More. USENIX Security Symposium 2017: 765-779 - 2016
- [j3]Miro Enev, Alex Takakuwa, Karl Koscher, Tadayoshi Kohno:
Automobile Driver Fingerprinting. Proc. Priv. Enhancing Technol. 2016(1): 34-50 (2016) - 2015
- [j2]Ian D. Foster, Karl Koscher:
Exploring Controller Area Networks. login Usenix Mag. 40(6) (2015) - [c14]Ian D. Foster, Andrew Prudhomme, Karl Koscher, Stefan Savage:
Fast and Vulnerable: A Story of Telematic Failures. WOOT 2015 - [c13]Karl Koscher, Tadayoshi Kohno, David Molnar:
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems. WOOT 2015 - 2014
- [b1]Karl Koscher:
Securing Embedded Systems: Analyses of Modern Automotive Systems and Enabling Near-Real Time Dynamic Analysis. University of Washington, USA, 2014 - [c12]Michael D. Ernst, René Just, Suzanne Millstein, Werner Dietl, Stuart Pernsteiner, Franziska Roesner, Karl Koscher, Paulo Barros, Ravi Bhoraskar, Seungyeop Han, Paul Vines, Edward XueJun Wu:
Collaborative Verification of Information Flow for a High-Assurance App Store. CCS 2014: 1092-1104 - 2012
- [c11]Marsh Ray, Jacob Appelbaum, Karl Koscher, Ian Finder:
vpwns: Virtual Pwned Networks. FOCI 2012 - [i1]Karl Koscher:
An Upper-Bound on Information Contained Within a Tweet. Tiny Trans. Comput. Sci. 1 (2012) - 2011
- [c10]Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno:
Comprehensive Experimental Analyses of Automotive Attack Surfaces. USENIX Security Symposium 2011 - 2010
- [c9]Cynthia Matuszek, Dieter Fox, Karl Koscher:
Following directions using statistical machine translation. HRI 2010: 251-258 - [c8]Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak N. Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage:
Experimental Security Analysis of a Modern Automobile. IEEE Symposium on Security and Privacy 2010: 447-462
2000 – 2009
- 2009
- [c7]Karl Koscher, Ari Juels, Vjekoslav Brajkovic, Tadayoshi Kohno:
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. CCS 2009: 33-42 - [c6]Tamara Denning, Cynthia Matuszek, Karl Koscher, Joshua R. Smith, Tadayoshi Kohno:
A spotlight on security and privacy risks with future household robots: attacks and lessons. UbiComp 2009: 105-114 - [c5]Evan Welbourne, Karl Koscher, Emad Soroush, Magdalena Balazinska, Gaetano Borriello:
Longitudinal study of a building-scale RFID ecosystem. MobiSys 2009: 69-82 - 2008
- [j1]Tanzeem Choudhury, Gaetano Borriello, Sunny Consolvo, Dirk Hähnel, Beverly L. Harrison, Bruce Hemingway, Jeffrey Hightower, Predrag V. Klasnja, Karl Koscher, Anthony LaMarca, James A. Landay, Louis LeGrand, Jonathan Lester, Ali Rahimi, Adam D. Rea, Danny Wyatt:
The Mobile Sensing Platform: An Embedded Activity Recognition System. IEEE Pervasive Comput. 7(2): 32-41 (2008) - [c4]Alexei Czeskis, Karl Koscher, Joshua R. Smith, Tadayoshi Kohno:
RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. CCS 2008: 479-490 - [c3]Gaetano Borriello, Carl Hartung, Bruce Hemingway, Karl Koscher, Brian Mayton:
Multi-player soccer and wireless embedded systems. SIGCSE 2008: 82-86 - [c2]Alexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, Tadayoshi Kohno, Bruce Schneier:
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. HotSec 2008 - 2007
- [c1]Adrienne H. Andrew, Yaw Anokwa, Karl Koscher, Jonathan Lester, Gaetano Borriello:
Context to Make You More Aware. ICDCS Workshops 2007: 49
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint