Karl Koscher

According to our database1, Karl Koscher authored at least 21 papers between 2007 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Triton: A Software-Reconfigurable Federated Avionics Testbed.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More.
Proceedings of the 26th USENIX Security Symposium, 2017

Automobile Driver Fingerprinting.
Proc. Priv. Enhancing Technol., 2016

Exploring Controller Area Networks.
login Usenix Mag., 2015

SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Fast and Vulnerable: A Story of Telematic Failures.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Securing Embedded Systems: Analyses of Modern Automotive Systems and Enabling Near-Real Time Dynamic Analysis.
PhD thesis, 2014

Collaborative Verification of Information Flow for a High-Assurance App Store.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

An Upper-Bound on Information Contained Within a Tweet.
Tiny Trans. Comput. Sci., 2012

vpwns: Virtual Pwned Networks.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012

Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Proceedings of the 20th USENIX Security Symposium, 2011

Experimental Security Analysis of a Modern Automobile.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Following directions using statistical machine translation.
Proceedings of the 5th ACM/IEEE International Conference on Human Robot Interaction, 2010

Longitudinal study of a building-scale RFID ecosystem.
Proceedings of the 7th International Conference on Mobile Systems, 2009

A spotlight on security and privacy risks with future household robots: attacks and lessons.
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009

EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

The Mobile Sensing Platform: An Embedded Activity Recognition System.
IEEE Pervasive Comput., 2008

Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Multi-player soccer and wireless embedded systems.
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, 2008

RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Context to Make You More Aware.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007