Adam J. Aviv
According to our database1, Adam J. Aviv authored at least 42 papers between 2007 and 2018.
Legend:Book In proceedings Article PhD thesis Other
A Video-based Attack for Android Pattern Lock.
ACM Trans. Priv. Secur., 2018
"It's all about the start" classifying eyes-free mobile authentication techniques.
J. Inf. Sec. Appl., 2018
Efficient Range ORAM with 핆(log2N) Locality.
IACR Cryptology ePrint Archive, 2018
An empirical study examining the perceptions and behaviours of security-conscious users of mobile authentication.
Behaviour & IT, 2018
Scaling Hardware Accelerated Network Monitoring to Concurrent and Dynamic Queries With *Flow.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
Turboflow: information rich flow record generation on commodity switches.
Proceedings of the Thirteenth EuroSys Conference, 2018
How Do We Talk Ourselves Into These Things?
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
Comparing Video Based Shoulder Surfing with Live Simulation.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Is Bigger Better When It Comes to Android Graphical Pattern Unlock?
IEEE Internet Computing, 2017
ObliviSync: Practical Oblivious File Backup and Synchronization.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Baseline Measurements of Shoulder Surfing Analysis and Comparability for Smartphone Unlock Authentication.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
Deterministic, Stash-Free Write-Only ORAM.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017
Perceptions of Mobile Device Authentication Mechanisms by Individuals who are Blind.
Proceedings of the 19th International ACM SIGACCESS Conference on Computers and Accessibility, 2017
Towards Baselines for Shoulder Surfing on Mobile Authentication.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
Exploring large scale security system reproducibility with the LESS simulator.
Journal of Computer Security, 2016
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Preliminary Findings from an Exploratory Qualitative Study of Security-Conscious Users of Mobile Authentication.
Proceedings of the 2nd Workshop on Security Information Workers, 2016
Position Paper: Measuring the Impact of Alphabet and Culture on Graphical Passwords.
Proceedings of the Who Are You?! Adventures in Authentication, 2016
Enabling Practical Software-defined Networking Security Applications with OFX.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Timing SDN Control Planes to Infer Network Configurations.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
Timing-based reconnaissance and defense in software-defined networks.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
Managing Cloud Storage Obliviously.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
Cross-domain collaboration for improved IDS rule set selection.
J. Inf. Sec. Appl., 2015
POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
Measuring Privacy Disclosures in URL Query Strings.
IEEE Internet Computing, 2014
Privacy-aware message exchanges for HumaNets.
Computer Communications, 2014
LESS Is More: Host-Agent Based Simulator for Large-Scale Evaluation of Security Systems.
Proceedings of the Computer Security - ESORICS 2014, 2014
Understanding visual perceptions of usability and security of Android's graphical password pattern.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Bridging the Data Gap: Data Related Challenges in Evaluating Large Scale Collaborative Security Systems.
Proceedings of the 6th Workshop on Cyber Security Experimentation and Test, 2013
Experiences in teaching an educational user-level operating systems implementation project.
Operating Systems Review, 2012
Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks.
Proceedings of the Computer Security - ESORICS 2012, 2012
Practicality of accelerometer side channels on smartphones.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
Challenges in Experimenting with Botnet Detection Systems.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011
Smudge Attacks on Smartphone Touch Screens.
Proceedings of the 4th USENIX Workshop on Offensive Technologies, 2010
Evading Cellular Data Monitoring with Human Movement Networks.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Differential privacy for collaborative security.
Proceedings of the Third European Workshop on System Security, 2010
Spam mitigation using spatio-temporal reputations from blacklist history.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
QuanTM: a quantitative trust management system.
Proceedings of the Second European Workshop on System Security, 2009
Security Evaluation of ES&S Voting Machines and Election Management System.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies.
Proceedings of the Usability, Psychology, and Security, 2008
SSARES: Secure Searchable Automated Remote Email Storage.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007