Karl Koscher

According to our database1, Karl Koscher authored at least 21 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Triton: A Software-Reconfigurable Federated Avionics Testbed.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

2017
Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Automobile Driver Fingerprinting.
Proc. Priv. Enhancing Technol., 2016

2015
Exploring Controller Area Networks.
login Usenix Mag., 2015

SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Fast and Vulnerable: A Story of Telematic Failures.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

2014
Securing Embedded Systems: Analyses of Modern Automotive Systems and Enabling Near-Real Time Dynamic Analysis.
PhD thesis, 2014

Collaborative Verification of Information Flow for a High-Assurance App Store.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2012
An Upper-Bound on Information Contained Within a Tweet.
Tiny Trans. Comput. Sci., 2012

vpwns: Virtual Pwned Networks.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012

2011
Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Proceedings of the 20th USENIX Security Symposium, 2011

2010
Experimental Security Analysis of a Modern Automobile.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Following directions using statistical machine translation.
Proceedings of the 5th ACM/IEEE International Conference on Human Robot Interaction, 2010

2009
Longitudinal study of a building-scale RFID ecosystem.
Proceedings of the 7th International Conference on Mobile Systems, 2009

A spotlight on security and privacy risks with future household robots: attacks and lessons.
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009

EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
The Mobile Sensing Platform: An Embedded Activity Recognition System.
IEEE Pervasive Comput., 2008

Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Multi-player soccer and wireless embedded systems.
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, 2008

RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Context to Make You More Aware.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007


  Loading...