Adam J. Aviv

According to our database1, Adam J. Aviv authored at least 42 papers between 2007 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A Video-based Attack for Android Pattern Lock.
ACM Trans. Priv. Secur., 2018

"It's all about the start" classifying eyes-free mobile authentication techniques.
J. Inf. Sec. Appl., 2018

Efficient Range ORAM with 핆(log2N) Locality.
IACR Cryptology ePrint Archive, 2018

An empirical study examining the perceptions and behaviours of security-conscious users of mobile authentication.
Behaviour & IT, 2018

Scaling Hardware Accelerated Network Monitoring to Concurrent and Dynamic Queries With *Flow.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Turboflow: information rich flow record generation on commodity switches.
Proceedings of the Thirteenth EuroSys Conference, 2018

How Do We Talk Ourselves Into These Things?
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Comparing Video Based Shoulder Surfing with Live Simulation.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Is Bigger Better When It Comes to Android Graphical Pattern Unlock?
IEEE Internet Computing, 2017

ObliviSync: Practical Oblivious File Backup and Synchronization.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Baseline Measurements of Shoulder Surfing Analysis and Comparability for Smartphone Unlock Authentication.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Deterministic, Stash-Free Write-Only ORAM.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Perceptions of Mobile Device Authentication Mechanisms by Individuals who are Blind.
Proceedings of the 19th International ACM SIGACCESS Conference on Computers and Accessibility, 2017

Towards Baselines for Shoulder Surfing on Mobile Authentication.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Exploring large scale security system reproducibility with the LESS simulator.
Journal of Computer Security, 2016

A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Preliminary Findings from an Exploratory Qualitative Study of Security-Conscious Users of Mobile Authentication.
Proceedings of the 2nd Workshop on Security Information Workers, 2016

Position Paper: Measuring the Impact of Alphabet and Culture on Graphical Passwords.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Enabling Practical Software-defined Networking Security Applications with OFX.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Timing SDN Control Planes to Infer Network Configurations.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016

Timing-based reconnaissance and defense in software-defined networks.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

Managing Cloud Storage Obliviously.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Cross-domain collaboration for improved IDS rule set selection.
J. Inf. Sec. Appl., 2015

POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Measuring Privacy Disclosures in URL Query Strings.
IEEE Internet Computing, 2014

Privacy-aware message exchanges for HumaNets.
Computer Communications, 2014

LESS Is More: Host-Agent Based Simulator for Large-Scale Evaluation of Security Systems.
Proceedings of the Computer Security - ESORICS 2014, 2014

Understanding visual perceptions of usability and security of Android's graphical password pattern.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Bridging the Data Gap: Data Related Challenges in Evaluating Large Scale Collaborative Security Systems.
Proceedings of the 6th Workshop on Cyber Security Experimentation and Test, 2013

2012
Experiences in teaching an educational user-level operating systems implementation project.
Operating Systems Review, 2012

Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks.
Proceedings of the Computer Security - ESORICS 2012, 2012

Practicality of accelerometer side channels on smartphones.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Challenges in Experimenting with Botnet Detection Systems.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

2010
Smudge Attacks on Smartphone Touch Screens.
Proceedings of the 4th USENIX Workshop on Offensive Technologies, 2010

Evading Cellular Data Monitoring with Human Movement Networks.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

Differential privacy for collaborative security.
Proceedings of the Third European Workshop on System Security, 2010

Spam mitigation using spatio-temporal reputations from blacklist history.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
QuanTM: a quantitative trust management system.
Proceedings of the Second European Workshop on System Security, 2009

2008
Security Evaluation of ES&S Voting Machines and Election Management System.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies.
Proceedings of the Usability, Psychology, and Security, 2008

2007
SSARES: Secure Searchable Automated Remote Email Storage.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007


  Loading...