Tadayoshi Kohno

Affiliations:
  • University of Washington, Seattle, Washington, USA


According to our database1, Tadayoshi Kohno authored at least 154 papers between 2000 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
The Buffet Overflow Café.
IEEE Secur. Priv., 2022

The Schuhmacher.
IEEE Secur. Priv., 2022

Mx. President Has a Brain.
IEEE Secur. Priv., 2022

Excerpts From the New Dictionary of Cybersecurity, 2036.
IEEE Secur. Priv., 2022

Defensive Technology Use During the 2018-2019 Sudanese Revolution.
IEEE Secur. Priv., 2022

2021
DNA Sequencing Flow Cells and the Security of the Molecular-Digital Interface.
Proc. Priv. Enhancing Technol., 2021

FoggySight: A Scheme for Facial Lookup Privacy.
Proc. Priv. Enhancing Technol., 2021

Disrupting Model Training with Adversarial Shortcuts.
CoRR, 2021

Defensive Technology Use by Political Activists During the Sudanese Revolution.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Understanding Privacy Attitudes and Concerns Towards Remote Communications During the COVID-19 Pandemic.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Reliable and Trustworthy Machine Learning for Health Using Dataset Shift Detection.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Polls, clickbait, and commemorative $2 bills: problematic political advertising on news and media websites around the 2020 U.S. elections.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

What Makes a "Bad" Ad? User Perceptions of Problematic Online Advertising.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Would You Rather: A Focus Group Method for Eliciting and Discussing Formative Design Insights with Children.
Proceedings of the IDC '21: Interaction Design and Children, 2021

2020
Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts.
Proc. Priv. Enhancing Technol., 2020

A Privacy-Focused Systematic Analysis of Online Status Indicators.
Proc. Priv. Enhancing Technol., 2020

Toward a Secure Internet of Things: Directions for Research.
IEEE Secur. Priv., 2020

PACT: Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing.
IEEE Data Eng. Bull., 2020

COVID-19 Contact Tracing and Privacy: A Longitudinal Study of Public Opinion.
CoRR, 2020

Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things.
CoRR, 2020

Security and Machine Learning in the Real World.
CoRR, 2020

COVID-19 Contact Tracing and Privacy: Studying Opinion and Preferences.
CoRR, 2020

PACT: Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing.
CoRR, 2020

Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Accept the Risk and Continue: Measuring the Long Tail of Government https Adoption.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

User Experiences with Online Status Indicators.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Consumer Smart Homes: Where We Are and Where We Need to Go.
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019

Enabling Multiple Applications to Simultaneously Augment Reality: Challenges and Directions.
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019

Secure Multi-User Content Sharing for Augmented Reality Applications.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution.
Proc. Priv. Enhancing Technol., 2018

Arya: Operating System Support for Securely Augmenting Reality.
IEEE Secur. Priv., 2018

Computer Security Risks of Distant Relative Matching in Consumer Genetic Databases.
CoRR, 2018

Challenges and New Directions in Augmented Reality, Computer Security, and Neuroscience - Part 1: Risks to Sensation and Perception.
CoRR, 2018

Physical Adversarial Examples for Object Detectors.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

Computer Security and Privacy for Refugees in the United States.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Robust Physical-World Attacks on Deep Learning Visual Classification.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

2017
SeaGlass: Enabling City-Wide IMSI-Catcher Detection.
Proc. Priv. Enhancing Technol., 2017

CovertBand: Activity Information Leakage using Music.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Note on Attacking Object Detectors with Adversarial Stickers.
CoRR, 2017

Robust Physical-World Attacks on Machine Learning Models.
CoRR, 2017

How Public Is My Private Life?: Privacy in Online Dating.
Proceedings of the 26th International Conference on World Wide Web, 2017

Exploring ADINT: Using Ad Targeting for Surveillance on a Budget - or - How Alice Can Buy Ads to Track Bob.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More.
Proceedings of the 26th USENIX Security Symposium, 2017

Securing Augmented Reality Output.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Securing vulnerable home IoT devices with an in-hub security manager.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Internet Censorship in Thailand: User Practices and Potential Threats.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Rewriting History: Changing the Archived Web from the Present.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Excavating Web Trackers Using Web Archaeology.
login Usenix Mag., 2016

Keeping Ahead of Our Adversaries.
IEEE Softw., 2016

Automobile Driver Fingerprinting.
Proc. Priv. Enhancing Technol., 2016

How to Safely Augment Reality: Challenges and Directions.
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016

Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016.
Proceedings of the 25th USENIX Security Symposium, 2016

Satellite: Joint Analysis of CDNs and Network-Level Interference.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

Computer Security for Data Collection Technologies.
Proceedings of the Eighth International Conference on Information and Communication Technologies and Development, 2016

Why would you do that? predicting the uses and gratifications behind smartphone-usage behaviors.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

MyTime: Designing and Evaluating an Intervention for Smartphone Non-Use.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Surreptitiously Weakening Cryptographic Systems.
IACR Cryptol. ePrint Arch., 2015

To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots.
CoRR, 2015

Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Securing RFIDs by Randomizing the Modulation and Channel.
Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, 2015

Analyzing the Use of Quick Response Codes in the Wild.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Experimental analysis of denial-of-service attacks on teleoperated robotic systems.
Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems, 2015

Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Security and privacy for augmented reality systems.
Commun. ACM, 2014

Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

Augmented reality: hard problems of law and policy.
Proceedings of the 2014 ACM Conference on Ubiquitous Computing, 2014

Workshop on usable privacy & security for wearable and domestic ubiquitous devices (UPSIDE).
Proceedings of the 2014 ACM Conference on Ubiquitous Computing, 2014

Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages.
Proceedings of the Financial Cryptography and Data Security, 2014

In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

World-Driven Access Control for Continuous Sensing.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

Polymorphism as a Defense for Automated Attack of Websites.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Computer security and the modern home.
Commun. ACM, 2013

Lightweight server support for browser-based CSRF protection.
Proceedings of the 22nd International World Wide Web Conference, 2013

Securing Embedded User Interfaces: Android and Beyond.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Control-Alt-Hack™: a card game for computer security outreach and education (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Experimental Security Analyses of Non-Networked Compact Fluorescent Lamps: A Case Study of Home Automation Security.
Proceedings of the 2013 Workshop on Learning from Authoritative Security Experiment Results, 2013

Operating System Support for Augmented Reality Applications.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
ShareMeNot: Balancing Privacy and Functionality of Third-Party Social Widgets.
login Usenix Mag., 2012

Security for cyber-physical systems: case studies with medical devices, robots, and automobiles.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Security Risks, Low-tech User Interfaces, and Implantable Medical Devices: A Case Study with Insulin Pump Infusion Systems.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

User interface toolkit mechanisms for securing interface elements.
Proceedings of the 25th Annual ACM Symposium on User Interface Software and Technology, 2012

User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Detecting and Defending Against Third-Party Tracking on the Web.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

Strengthening user authentication through opportunistic cryptographic identity assertions.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

SensorSift: balancing sensor data privacy and utility in automated face understanding.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
TaintEraser: protecting sensitive data leaks using application-level taint tracking.
ACM SIGOPS Oper. Syst. Rev., 2011

Privacy-preserving network forensics.
Commun. ACM, 2011

Sensor tricorder: what does that sensor know about me?
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Proceedings of the 20th USENIX Security Symposium, 2011

Science fiction prototyping and security education: cultivating contextual and societal thinking in computer security education and beyond.
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011

Keypad: an auditing file system for theft-prone devices.
Proceedings of the European Conference on Computer Systems, 2011

Televisions, video privacy, and powerline electromagnetic interference.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Experimental Security Analysis of a Modern Automobile.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Comet: An active distributed key-value store.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

Seeing through Obscure Glass.
Proceedings of the Computer Vision - ECCV 2010, 2010

Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

The limits of automatic OS fingerprint generation.
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010

Cryptography Engineering - Design Principles and Practical Applications.
Wiley, ISBN: 978-0-470-47424-2, 2010

2009
Are Patched Machines Really Fixed?
IEEE Secur. Priv., 2009

Vanish: Increasing Data Privacy with Self-Destructing Data.
Proceedings of the 18th USENIX Security Symposium, 2009

Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

A spotlight on security and privacy risks with future household robots: attacks and lessons.
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009

A comprehensive study of frequency, interference, and training of multiple graphical passwords.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
An Interview with RFID Security Expert Ari Juels.
IEEE Pervasive Comput., 2008

Security and Privacy for Implantable Medical Devices.
IEEE Pervasive Comput., 2008

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
J. Cryptol., 2008

Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs.
Proceedings of the 17th USENIX Security Symposium, 2008

Challenges and Directions for Monitoring P2P File Sharing Networks - or - Why My Printer Received a DMCA Takedown Notice.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008), 2008

Shining Light in Dark Places: Understanding the Tor Network.
Proceedings of the Privacy Enhancing Technologies, 2008

Detecting In-Flight Page Changes with Web Tripwires.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

Improving wireless privacy with an identifier-free link layer protocol.
Proceedings of the 6th International Conference on Mobile Systems, 2008

Privacy oracle: a system for finding application leaks with black box differential testing.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Physical Access Control for Captured RFID Data.
IEEE Pervasive Comput., 2007

Low-resource routing attacks against tor.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

2006
The Secure Shell (SSH) Transport Layer Encryption Modes.
RFC, January, 2006

Authenticated encryption in practice : generalized composition methods and the Secure Shell, CWC, and WinZip schemes.
PhD thesis, 2006

Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine.
IACR Cryptol. ePrint Arch., 2006

Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation.
IACR Cryptol. ePrint Arch., 2006

Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

2005
Remote Physical Device Fingerprintin.
IEEE Trans. Dependable Secur. Comput., 2005

Herding Hash Functions and the Nostradamus Attack.
IACR Cryptol. ePrint Arch., 2005

Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage.
IACR Cryptol. ePrint Arch., 2005

Remote Physical Device Fingerprinting.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

2004
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm.
ACM Trans. Inf. Syst. Secur., 2004

Analysis of the WinZip encryption method.
IACR Cryptol. ePrint Arch., 2004

New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms.
IACR Cryptol. ePrint Arch., 2004

Analysis of an Electronic Voting System.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Attacking and repairing the winZip encryption scheme.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
CWC: A high-performance conventional authenticated encryption mode.
IACR Cryptol. ePrint Arch., 2003

Building Secure Cryptographic Transforms, or How to Encrypt and MAC.
IACR Cryptol. ePrint Arch., 2003

Hash Function Balance and its Impact on Birthday Attacks.
IACR Cryptol. ePrint Arch., 2003

Analysis of RMAC.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications.
Proceedings of the Advances in Cryptology, 2003

2002
Token-based scanning of source code for security problems.
ACM Trans. Inf. Syst. Secur., 2002

Related-Key and Key-Collision Attacks Against RMAC.
IACR Cryptol. ePrint Arch., 2002

Authenticated encryption in SSH: provably fixing the SSH binary packet protocol.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
A Network-Flow-Based Scheduler: Design, Performance History, and Experimental Analysis.
ACM J. Exp. Algorithmics, 2001

Trust (and mistrust) in secure applications.
Commun. ACM, 2001

On the Global Content PMI: Improved Copy-Protected Internet Content Distribution.
Proceedings of the Financial Cryptography, 2001

2000
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Preliminary Cryptanalysis of Reduced-Round Serpent.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000


  Loading...