Shaanan Cohney

Orcid: 0000-0002-0890-6590

According to our database1, Shaanan Cohney authored at least 20 papers between 2016 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
SoK: Trusted setups for powers-of-tau strings.
IACR Cryptol. ePrint Arch., 2025

"It's been Lovely Watching you": Institutional Decision-Making on Online Proctoring Software.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Trailblazer: Practical End-to-end Web API Fuzzing (Registered Report).
Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2025

2024
Learning with Style: Improving Student Code-Style Through Better Automated Feedback.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

EDEFuzz: A Web API Fuzzer for Excessive Data Exposures.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
NOTRY: deniable messaging with retroactive avowal.
IACR Cryptol. ePrint Arch., 2023

A Gentle Tutorial for Lattice-Based Cryptanalysis.
IACR Cryptol. ePrint Arch., 2023

Detecting Excessive Data Exposures in Web Server Responses with Metamorphic Fuzzing.
CoRR, 2023

2022
COVID Down Under: where did Australia's pandemic apps go wrong?
CoRR, 2022

Watching the watchers: bias and vulnerability in remote proctoring software.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Virtual Classrooms and Real Harms: Remote Learning at U.S. Universities.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

2020
Virtual Classrooms and Real Harms.
CoRR, 2020

Pseudorandom Black Swans: Cache Attacks on CTR_DRBG.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2018
Where did I leave my keys?: lessons from the Juniper Dual EC incident.
Commun. ACM, 2018

Practical State Recovery Attacks against Legacy RNG Implementations.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Measuring small subgroup attacks against Diffie-Hellman.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
A Systematic Analysis of the Juniper Dual EC Incident.
IACR Cryptol. ePrint Arch., 2016


Factoring as a Service.
Proceedings of the Financial Cryptography and Data Security, 2016

A Systematic Analysis of the Juniper Dual EC Incident.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016


  Loading...