


Остановите войну!
for scientists:


default search action
Tadayoshi Kohno
Person information

- affiliation: University of Washington, Seattle, Washington, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [i32]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Franziska Roesner, Kurt Thomas:
"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment. CoRR abs/2302.08057 (2023) - [i31]Tadayoshi Kohno, Yasemin Acar, Wulf Loh:
Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. CoRR abs/2302.14326 (2023) - 2022
- [j35]Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, Alexandru G. Bardas:
Defensive Technology Use During the 2018-2019 Sudanese Revolution. IEEE Secur. Priv. 20(2): 40-48 (2022) - [j34]Tadayoshi Kohno:
Excerpts From the New Dictionary of Cybersecurity, 2036. IEEE Secur. Priv. 20(3): 8 (2022) - [j33]Tadayoshi Kohno:
Mx. President Has a Brain. IEEE Secur. Priv. 20(3): 9-11 (2022) - [j32]Tadayoshi Kohno, Camille Cobb, Ada Lerner, Michelle Lin, Adam Shostack:
The Buffet Overflow Café. IEEE Secur. Priv. 20(4): 4-7 (2022) - [j31]Tadayoshi Kohno
:
The Schuhmacher. IEEE Secur. Priv. 20(5): 14-15 (2022) - [j30]Tadayoshi Kohno
:
The Our Reality Privacy Policy. IEEE Secur. Priv. 20(6): 4-7 (2022) - [j29]Tadayoshi Kohno:
Welcome to the Latest "Off by One" Column. IEEE Secur. Priv. 20(6): 5 (2022) - [c106]Kentrell Owens, Johanna Gunawan, David R. Choffnes, Pardis Emami Naeini, Tadayoshi Kohno, Franziska Roesner:
Exploring Deceptive Design Patterns in Voice Interfaces. EuroUSEC 2022: 64-78 - [c105]Eric Zeng, Rachel McAmis, Tadayoshi Kohno, Franziska Roesner:
What factors affect targeting and bids in online advertising?: a field measurement study. IMC 2022: 210-229 - [c104]Miranda Wei, Eric Zeng, Tadayoshi Kohno, Franziska Roesner:
Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships. SOUPS @ USENIX Security Symposium 2022: 447-462 - [c103]Kentrell Owens, Anita Alem, Franziska Roesner, Tadayoshi Kohno:
Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives. USENIX Security Symposium 2022: 4077-4094 - [i30]Ashish Hooda, Andrey Labunets, Tadayoshi Kohno, Earlence Fernandes:
Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance. CoRR abs/2212.04107 (2022) - 2021
- [j28]Ivan Evtimov, Pascal Sturmfels, Tadayoshi Kohno:
FoggySight: A Scheme for Facial Lookup Privacy. Proc. Priv. Enhancing Technol. 2021(3): 204-226 (2021) - [j27]Peter Ney, Lee Organick, Jeff Nivala, Luis Ceze, Tadayoshi Kohno:
DNA Sequencing Flow Cells and the Security of the Molecular-Digital Interface. Proc. Priv. Enhancing Technol. 2021(3): 413-432 (2021) - [c102]Lucy Simko, Britnie Chin, Sungmin Na, Harkiran Kaur Saluja, Tian Qi Zhu, Tadayoshi Kohno, Alexis Hiniker, Jason C. Yip, Camille Cobb:
Would You Rather: A Focus Group Method for Eliciting and Discussing Formative Design Insights with Children. IDC 2021: 131-146 - [c101]Eric Zeng, Tadayoshi Kohno, Franziska Roesner:
What Makes a "Bad" Ad? User Perceptions of Problematic Online Advertising. CHI 2021: 361:1-361:24 - [c100]Eric Zeng, Miranda Wei, Theo Gregersen, Tadayoshi Kohno, Franziska Roesner:
Polls, clickbait, and commemorative $2 bills: problematic political advertising on news and media websites around the 2020 U.S. elections. Internet Measurement Conference 2021: 507-525 - [c99]Chunjong Park, Anas Awadalla, Tadayoshi Kohno, Shwetak N. Patel:
Reliable and Trustworthy Machine Learning for Health Using Dataset Shift Detection. NeurIPS 2021: 3043-3056 - [c98]Pardis Emami Naeini, Tiona Francisco, Tadayoshi Kohno, Franziska Roesner:
Understanding Privacy Attitudes and Concerns Towards Remote Communications During the COVID-19 Pandemic. SOUPS @ USENIX Security Symposium 2021: 695-714 - [c97]Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, Alexandru G. Bardas:
Defensive Technology Use by Political Activists During the Sudanese Revolution. IEEE Symposium on Security and Privacy 2021: 372-390 - [i29]Pardis Emami Naeini, Tiona Francisco, Tadayoshi Kohno, Franziska Roesner:
Understanding Privacy Attitudes and Concerns Towards Remote Communications During the COVID-19 Pandemic. CoRR abs/2106.05227 (2021) - [i28]Ivan Evtimov, Ian Covert, Aditya Kusupati, Tadayoshi Kohno:
Disrupting Model Training with Adversarial Shortcuts. CoRR abs/2106.06654 (2021) - [i27]Chunjong Park, Anas Awadalla, Tadayoshi Kohno, Shwetak N. Patel:
Reliable and Trustworthy Machine Learning for Health Using Dataset Shift Detection. CoRR abs/2110.14019 (2021) - 2020
- [j26]Justin Chan, Landon P. Cox, Dean P. Foster, Shyam Gollakota, Eric Horvitz, Joseph Jaeger, Sham M. Kakade, Tadayoshi Kohno, John Langford, Jonathan Larson, Puneet Sharma, Sudheesh Singanamalla, Jacob E. Sunshine, Stefano Tessaro:
PACT: Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing. IEEE Data Eng. Bull. 43(2): 15-35 (2020) - [j25]L. Jean Camp, Ryan Henry
, Tadayoshi Kohno
, Shrirang Mare
, Steven A. Myers, Shwetak N. Patel
, Joshua Streiff:
Toward a Secure Internet of Things: Directions for Research. IEEE Secur. Priv. 18(4): 28-37 (2020) - [j24]Shrirang Mare, Franziska Roesner, Tadayoshi Kohno:
Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proc. Priv. Enhancing Technol. 2020(2): 436-458 (2020) - [j23]Camille Cobb, Lucy Simko, Tadayoshi Kohno, Alexis Hiniker:
A Privacy-Focused Systematic Analysis of Online Status Indicators. Proc. Priv. Enhancing Technol. 2020(3): 384-403 (2020) - [c96]Camille Cobb, Lucy Simko, Tadayoshi Kohno, Alexis Hiniker:
User Experiences with Online Status Indicators. CHI 2020: 1-12 - [c95]Sudheesh Singanamalla
, Esther Han Beol Jang, Richard J. Anderson, Tadayoshi Kohno, Kurtis Heimerl:
Accept the Risk and Continue: Measuring the Long Tail of Government https Adoption. Internet Measurement Conference 2020: 577-597 - [c94]Peter Ney, Luis Ceze, Tadayoshi Kohno:
Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference. NDSS 2020 - [i26]Justin Chan, Dean P. Foster, Shyam Gollakota, Eric Horvitz, Joseph Jaeger, Sham M. Kakade, Tadayoshi Kohno, John Langford, Jonathan Larson, Sudheesh Singanamalla, Jacob E. Sunshine, Stefano Tessaro:
PACT: Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing. CoRR abs/2004.03544 (2020) - [i25]Lucy Simko, Ryan Calo, Franziska Roesner, Tadayoshi Kohno:
COVID-19 Contact Tracing and Privacy: Studying Opinion and Preferences. CoRR abs/2005.06056 (2020) - [i24]Ivan Evtimov, Weidong Cui, Ece Kamar, Emre Kiciman, Tadayoshi Kohno, Jerry Li:
Security and Machine Learning in the Real World. CoRR abs/2007.07205 (2020) - [i23]Kevin Fu, Tadayoshi Kohno, Daniel Lopresti, Elizabeth D. Mynatt, Klara Nahrstedt, Shwetak N. Patel, Debra J. Richardson, Benjamin G. Zorn:
Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things. CoRR abs/2008.00017 (2020) - [i22]Lucy Simko, Jack Lucas Chang, Maggie Jiang, Ryan Calo, Franziska Roesner, Tadayoshi Kohno:
COVID-19 Contact Tracing and Privacy: A Longitudinal Study of Public Opinion. CoRR abs/2012.01553 (2020) - [i21]Ivan Evtimov, Pascal Sturmfels, Tadayoshi Kohno:
FoggySight: A Scheme for Facial Lookup Privacy. CoRR abs/2012.08588 (2020)
2010 – 2019
- 2019
- [c93]Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Secure Multi-User Content Sharing for Augmented Reality Applications. USENIX Security Symposium 2019: 141-158 - [c92]Kiron Lebeck, Tadayoshi Kohno, Franziska Roesner:
Enabling Multiple Applications to Simultaneously Augment Reality: Challenges and Directions. HotMobile 2019: 81-86 - [c91]Shrirang Mare, Logan Girvin, Franziska Roesner, Tadayoshi Kohno:
Consumer Smart Homes: Where We Are and Where We Need to Go. HotMobile 2019: 117-122 - 2018
- [j22]Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Arya: Operating System Support for Securely Augmenting Reality. IEEE Secur. Priv. 16(1): 44-53 (2018) - [j21]Lucy Simko, Luke Zettlemoyer, Tadayoshi Kohno:
Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution. Proc. Priv. Enhancing Technol. 2018(1): 127-144 (2018) - [c90]Kevin Eykholt
, Ivan Evtimov, Earlence Fernandes
, Bo Li, Amir Rahmati
, Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, Dawn Song:
Robust Physical-World Attacks on Deep Learning Visual Classification. CVPR 2018: 1625-1634 - [c89]Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users. IEEE Symposium on Security and Privacy 2018: 392-408 - [c88]Lucy Simko, Ada Lerner, Samia Ibtasam, Franziska Roesner, Tadayoshi Kohno:
Computer Security and Privacy for Refugees in the United States. IEEE Symposium on Security and Privacy 2018: 409-423 - [c87]Dawn Song, Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramèr
, Atul Prakash, Tadayoshi Kohno:
Physical Adversarial Examples for Object Detectors. WOOT @ USENIX Security Symposium 2018 - [i20]Stefano Baldassi, Tadayoshi Kohno, Franziska Roesner, Moqian Tian:
Challenges and New Directions in Augmented Reality, Computer Security, and Neuroscience - Part 1: Risks to Sensation and Perception. CoRR abs/1806.10557 (2018) - [i19]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati
, Florian Tramèr, Atul Prakash, Tadayoshi Kohno, Dawn Song:
Physical Adversarial Examples for Object Detectors. CoRR abs/1807.07769 (2018) - [i18]Peter M. Ney, Luis Ceze, Tadayoshi Kohno:
Computer Security Risks of Distant Relative Matching in Consumer Genetic Databases. CoRR abs/1810.02895 (2018) - 2017
- [j20]Rajalakshmi Nandakumar, Alex Takakuwa, Tadayoshi Kohno, Shyamnath Gollakota:
CovertBand: Activity Information Leakage using Music. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(3): 87:1-87:24 (2017) - [j19]Peter Ney, Ian Smith, Gabriel Cadamuro, Tadayoshi Kohno:
SeaGlass: Enabling City-Wide IMSI-Catcher Detection. Proc. Priv. Enhancing Technol. 2017(3): 39 (2017) - [c86]Ada Lerner, Tadayoshi Kohno, Franziska Roesner:
Rewriting History: Changing the Archived Web from the Present. CCS 2017: 1741-1755 - [c85]Genevieve Gebhart, Tadayoshi Kohno:
Internet Censorship in Thailand: User Practices and Potential Threats. EuroS&P 2017: 417-432 - [c84]Anna Kornfeld Simpson, Franziska Roesner, Tadayoshi Kohno:
Securing vulnerable home IoT devices with an in-hub security manager. PerCom Workshops 2017: 551-556 - [c83]Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Securing Augmented Reality Output. IEEE Symposium on Security and Privacy 2017: 320-337 - [c82]Peter Ney, Karl Koscher, Lee Organick, Luis Ceze, Tadayoshi Kohno:
Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More. USENIX Security Symposium 2017: 765-779 - [c81]Paul Vines, Franziska Roesner, Tadayoshi Kohno:
Exploring ADINT: Using Ad Targeting for Surveillance on a Budget - or - How Alice Can Buy Ads to Track Bob. WPES@CCS 2017: 153-164 - [c80]Camille Cobb, Tadayoshi Kohno:
How Public Is My Private Life?: Privacy in Online Dating. WWW 2017: 1231-1240 - [i17]Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati
, Dawn Song:
Robust Physical-World Attacks on Machine Learning Models. CoRR abs/1707.08945 (2017) - [i16]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Dawn Song, Tadayoshi Kohno, Amir Rahmati, Atul Prakash, Florian Tramèr:
Note on Attacking Object Detectors with Adversarial Stickers. CoRR abs/1712.08062 (2017) - 2016
- [j18]Miro Enev, Alex Takakuwa, Karl Koscher, Tadayoshi Kohno:
Automobile Driver Fingerprinting. Proc. Priv. Enhancing Technol. 2016(1): 34-50 (2016) - [j17]Jane Cleland-Huang, Tamara Denning, Tadayoshi Kohno, Forrest Shull, Samuel Weber:
Keeping Ahead of Our Adversaries. IEEE Softw. 33(3): 24-28 (2016) - [j16]Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner:
Excavating Web Trackers Using Web Archaeology. login Usenix Mag. 41(4) (2016) - [c79]Alexis Hiniker
, Sungsoo (Ray) Hong
, Tadayoshi Kohno, Julie A. Kientz:
MyTime: Designing and Evaluating an Intervention for Smartphone Non-Use. CHI 2016: 4746-4757 - [c78]Alexis Hiniker
, Shwetak N. Patel, Tadayoshi Kohno, Julie A. Kientz:
Why would you do that? predicting the uses and gratifications behind smartphone-usage behaviors. UbiComp 2016: 634-645 - [c77]Camille Cobb, Samuel Sudar, Nicholas Reiter, Richard J. Anderson, Franziska Roesner, Tadayoshi Kohno:
Computer Security for Data Collection Technologies. ICTD 2016: 2 - [c76]Will Scott, Thomas E. Anderson, Tadayoshi Kohno, Arvind Krishnamurthy:
Satellite: Joint Analysis of CDNs and Network-Level Interference. USENIX Annual Technical Conference 2016: 195-208 - [c75]Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner:
Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016. USENIX Security Symposium 2016 - [c74]Kiron Lebeck, Tadayoshi Kohno, Franziska Roesner:
How to Safely Augment Reality: Challenges and Directions. HotMobile 2016: 45-50 - 2015
- [c73]Emily McReynolds, Adam Lerner, Will Scott, Franziska Roesner, Tadayoshi Kohno:
Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions. Financial Cryptography Workshops 2015: 94-111 - [c72]Tamara Bonaci, Junjie Yan, Jeffrey Herron, Tadayoshi Kohno, Howard Jay Chizeck:
Experimental analysis of denial-of-service attacks on teleoperated robotic systems. ICCPS 2015: 11-20 - [c71]Adam Lerner, Alisha Saxena, Kirk Ouimet, Ben Turley, Anthony Vance, Tadayoshi Kohno, Franziska Roesner:
Analyzing the Use of Quick Response Codes in the Wild. MobiSys 2015: 359-374 - [c70]Haitham Hassanieh, Jue Wang, Dina Katabi, Tadayoshi Kohno:
Securing RFIDs by Randomizing the Modulation and Channel. NSDI 2015: 235-249 - [c69]Karl Koscher, Tadayoshi Kohno, David Molnar:
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems. WOOT 2015 - [c68]Paul Vines, Tadayoshi Kohno:
Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform. WPES@CCS 2015: 75-84 - [i15]Tamara Bonaci, Jeffrey Herron, Tariq Yusuf, Junjie Yan, Tadayoshi Kohno, Howard Jay Chizeck:
To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots. CoRR abs/1504.04339 (2015) - [i14]Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart:
Surreptitiously Weakening Cryptographic Systems. IACR Cryptol. ePrint Arch. 2015: 97 (2015) - 2014
- [j15]Franziska Roesner, Tadayoshi Kohno, David Molnar:
Security and privacy for augmented reality systems. Commun. ACM 57(4): 88-96 (2014) - [c67]Xinran Wang, Tadayoshi Kohno, Bob Blakley:
Polymorphism as a Defense for Automated Attack of Websites. ACNS 2014: 513-530 - [c66]Tamara Denning, Daniel B. Kramer, Batya Friedman, Matthew R. Reynolds, Brian T. Gill, Tadayoshi Kohno:
CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices. ACSAC 2014: 426-435 - [c65]Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, Helen J. Wang:
World-Driven Access Control for Continuous Sensing. CCS 2014: 1169-1181 - [c64]Tamara Denning, Zakariya Dehlawi, Tadayoshi Kohno:
In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies. CHI 2014: 2377-2386 - [c63]Franziska Roesner, Brian T. Gill, Tadayoshi Kohno:
Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages. Financial Cryptography 2014: 64-76 - [c62]Jaeyeon Jung, Tadayoshi Kohno:
Workshop on usable privacy & security for wearable and domestic ubiquitous devices (UPSIDE). UbiComp Adjunct 2014: 1279-1282 - [c61]Franziska Roesner, Tadayoshi Kohno, Tamara Denning, Ryan Calo, Bryce Clayton Newell:
Augmented reality: hard problems of law and policy. UbiComp Adjunct 2014: 1283-1288 - [c60]Tamara Denning, Adam Shostack, Tadayoshi Kohno:
Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research. 3GSE 2014 - 2013
- [j14]Tamara Denning, Tadayoshi Kohno, Henry M. Levy:
Computer security and the modern home. Commun. ACM 56(1): 94-103 (2013) - [c59]Tamara Denning, Adam Lerner, Adam Shostack, Tadayoshi Kohno:
Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education. CCS 2013: 915-928 - [c58]Loris D'Antoni, Alan M. Dunn, Suman Jana, Tadayoshi Kohno, Benjamin Livshits, David Molnar, Alexander Moshchuk, Eyal Ofek, Franziska Roesner, T. Scott Saponas, Margus Veanes, Helen J. Wang:
Operating System Support for Augmented Reality Applications. HotOS 2013 - [c57]Temitope Oluwafemi, Tadayoshi Kohno, Sidhant Gupta, Shwetak N. Patel:
Experimental Security Analyses of Non-Networked Compact Fluorescent Lamps: A Case Study of Home Automation Security. LASER 2013: 13-24 - [c56]Tamara Denning, Tadayoshi Kohno, Adam Shostack:
Control-Alt-Hack™: a card game for computer security outreach and education (abstract only). SIGCSE 2013: 729 - [c55]Franziska Roesner, Tadayoshi Kohno:
Securing Embedded User Interfaces: Android and Beyond. USENIX Security Symposium 2013: 97-112 - [c54]Alexei Czeskis, Alexander Moshchuk, Tadayoshi Kohno, Helen J. Wang:
Lightweight server support for browser-based CSRF protection. WWW 2013: 273-284 - 2012
- [j13]Franziska Roesner, Christopher Rovillos, Tadayoshi Kohno, David Wetherall:
ShareMeNot: Balancing Privacy and Functionality of Third-Party Social Widgets. login Usenix Mag. 37(4) (2012) - [c53]Miro Enev, Jaeyeon Jung, Liefeng Bo, Xiaofeng Ren, Tadayoshi Kohno:
SensorSift: balancing sensor data privacy and utility in automated face understanding. ACSAC 2012: 149-158 - [c52]Alexei Czeskis, Michael Dietz, Tadayoshi Kohno, Dan S. Wallach, Dirk Balfanz:
Strengthening user authentication through opportunistic cryptographic identity assertions. CCS 2012: 404-414 - [c51]Franziska Roesner, Tadayoshi Kohno, David Wetherall:
Detecting and Defending Against Third-Party Tracking on the Web. NSDI 2012: 155-168 - [c50]Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, Crispin Cowan:
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. IEEE Symposium on Security and Privacy 2012: 224-238 - [c49]Franziska Roesner, James Fogarty, Tadayoshi Kohno:
User interface toolkit mechanisms for securing interface elements. UIST 2012: 239-250 - [c48]Nathanael Paul, Tadayoshi Kohno:
Security Risks, Low-tech User Interfaces, and Implantable Medical Devices: A Case Study with Insulin Pump Infusion Systems. HealthSec 2012 - [c47]Tadayoshi Kohno:
Security for cyber-physical systems: case studies with medical devices, robots, and automobiles. WISEC 2012: 99-100 - [e3]Tadayoshi Kohno:
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012. USENIX Association 2012 [contents] - 2011
- [j12]Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, Geoffrey M. Voelker:
Privacy-preserving network forensics. Commun. ACM 54(5): 78-87 (2011) - [j11]David (Yu) Zhu, Jaeyeon Jung, Dawn Song, Tadayoshi Kohno, David Wetherall:
TaintEraser: protecting sensitive data leaks using application-level taint tracking. ACM SIGOPS Oper. Syst. Rev. 45(1): 142-154 (2011) - [c46]Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak N. Patel:
Televisions, video privacy, and powerline electromagnetic interference. CCS 2011: 537-550 - [c45]Roxana Geambasu, John P. John, Steven D. Gribble
, Tadayoshi Kohno, Henry M. Levy:
Keypad: an auditing file system for theft-prone devices. EuroSys 2011: 1-16 - [c44]Tadayoshi Kohno, Brian David Johnson:
Science fiction prototyping and security education: cultivating contextual and societal thinking in computer security education and beyond. SIGCSE 2011: 9-14 - [c43]Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno:
Comprehensive Experimental Analyses of Automotive Attack Surfaces. USENIX Security Symposium 2011 - [c42]Gabriel Maganis, Jaeyeon Jung, Tadayoshi Kohno, Anmol Sheth, David Wetherall:
Sensor tricorder: what does that sensor know about me? HotMobile 2011: 98-103 - 2010
- [b2]Niels Ferguson, Bruce Schneier, Tadayoshi Kohno:
Cryptography Engineering - Design Principles and Practical Applications. Wiley 2010, ISBN 978-0-470-47424-2, pp. I-XXIX, 1-353 - [c41]David W. Richardson, Steven D. Gribble
, Tadayoshi Kohno:
The limits of automatic OS fingerprint generation. AISec 2010: 24-34 - [c40]Tamara Denning, Alan Borning, Batya Friedman, Brian T. Gill, Tadayoshi Kohno, William H. Maisel:
Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices. CHI 2010: 917-926 - [c39]Qi Shan, Brian Curless, Tadayoshi Kohno:
Seeing through Obscure Glass. ECCV (6) 2010: 364-378 - [c38]Roxana Geambasu, Amit A. Levy, Tadayoshi Kohno, Arvind Krishnamurthy, Henry M. Levy:
Comet: An active distributed key-value store. OSDI 2010: 323-336 - [c37]Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit, Alan Borning, Batya Friedman, Brian T. Gill, Tadayoshi Kohno:
Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety. SOUPS 2010 - [c36]Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak N. Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage:
Experimental Security Analysis of a Modern Automobile. IEEE Symposium on Security and Privacy 2010: 447-462 - [e2]Kevin Fu, Tadayoshi Kohno, Aviel D. Rubin:
1st USENIX Workshop on Health Security and Privacy, HealthSec'10, Washington, D.C., USA, August 10, 2010. USENIX Association 2010 [contents]
2000 – 2009
- 2009
- [j10]Ryan W. Gardner, Matt Bishop, Tadayoshi Kohno:
Are Patched Machines Really Fixed? IEEE Secur. Priv. 7(5): 82-85 (2009) - [c35]Karl Koscher, Ari Juels, Vjekoslav Brajkovic, Tadayoshi Kohno:
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. CCS 2009: 33-42 - [c34]Katherine Everitt, Tanya Bragin, James Fogarty, Tadayoshi Kohno:
A comprehensive study of frequency, interference, and training of multiple graphical passwords. CHI 2009: 889-898