Tadayoshi Kohno

According to our database1, Tadayoshi Kohno authored at least 124 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Consumer Smart Homes: Where We Are and Where We Need to Go.
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019

Enabling Multiple Applications to Simultaneously Augment Reality: Challenges and Directions.
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019

Secure Multi-User Content Sharing for Augmented Reality Applications.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution.
PoPETs, 2018

Arya: Operating System Support for Securely Augmenting Reality.
IEEE Security & Privacy, 2018

Physical Adversarial Examples for Object Detectors.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

Computer Security and Privacy for Refugees in the United States.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Robust Physical-World Attacks on Deep Learning Visual Classification.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

2017
SeaGlass: Enabling City-Wide IMSI-Catcher Detection.
PoPETs, 2017

CovertBand: Activity Information Leakage using Music.
IMWUT, 2017

How Public Is My Private Life?: Privacy in Online Dating.
Proceedings of the 26th International Conference on World Wide Web, 2017

Exploring ADINT: Using Ad Targeting for Surveillance on a Budget - or - How Alice Can Buy Ads to Track Bob.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More.
Proceedings of the 26th USENIX Security Symposium, 2017

Securing Augmented Reality Output.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Securing vulnerable home IoT devices with an in-hub security manager.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Internet Censorship in Thailand: User Practices and Potential Threats.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Rewriting History: Changing the Archived Web from the Present.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Excavating Web Trackers Using Web Archaeology.
;login:, 2016

Keeping Ahead of Our Adversaries.
IEEE Software, 2016

Automobile Driver Fingerprinting.
PoPETs, 2016

How to Safely Augment Reality: Challenges and Directions.
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016

Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016.
Proceedings of the 25th USENIX Security Symposium, 2016

Satellite: Joint Analysis of CDNs and Network-Level Interference.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

Computer Security for Data Collection Technologies.
Proceedings of the Eighth International Conference on Information and Communication Technologies and Development, 2016

Why would you do that? predicting the uses and gratifications behind smartphone-usage behaviors.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

MyTime: Designing and Evaluating an Intervention for Smartphone Non-Use.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Surreptitiously Weakening Cryptographic Systems.
IACR Cryptology ePrint Archive, 2015

Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Securing RFIDs by Randomizing the Modulation and Channel.
Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, 2015

Analyzing the Use of Quick Response Codes in the Wild.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Experimental analysis of denial-of-service attacks on teleoperated robotic systems.
Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems, 2015

Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Security and privacy for augmented reality systems.
Commun. ACM, 2014

Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

Augmented reality: hard problems of law and policy.
Proceedings of the 2014 ACM Conference on Ubiquitous Computing, 2014

Workshop on usable privacy & security for wearable and domestic ubiquitous devices (UPSIDE).
Proceedings of the 2014 ACM Conference on Ubiquitous Computing, 2014

Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages.
Proceedings of the Financial Cryptography and Data Security, 2014

In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

World-Driven Access Control for Continuous Sensing.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

Polymorphism as a Defense for Automated Attack of Websites.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Computer security and the modern home.
Commun. ACM, 2013

Lightweight server support for browser-based CSRF protection.
Proceedings of the 22nd International World Wide Web Conference, 2013

Securing Embedded User Interfaces: Android and Beyond.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Control-Alt-Hack™: a card game for computer security outreach and education (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Experimental Security Analyses of Non-Networked Compact Fluorescent Lamps: A Case Study of Home Automation Security.
Proceedings of the 2013 Workshop on Learning from Authoritative Security Experiment Results, 2013

Operating System Support for Augmented Reality Applications.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
ShareMeNot: Balancing Privacy and Functionality of Third-Party Social Widgets.
;login:, 2012

Security for cyber-physical systems: case studies with medical devices, robots, and automobiles.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Security Risks, Low-tech User Interfaces, and Implantable Medical Devices: A Case Study with Insulin Pump Infusion Systems.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

User interface toolkit mechanisms for securing interface elements.
Proceedings of the 25th Annual ACM Symposium on User Interface Software and Technology, 2012

User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Detecting and Defending Against Third-Party Tracking on the Web.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

Strengthening user authentication through opportunistic cryptographic identity assertions.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

SensorSift: balancing sensor data privacy and utility in automated face understanding.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
TaintEraser: protecting sensitive data leaks using application-level taint tracking.
Operating Systems Review, 2011

Privacy-preserving network forensics.
Commun. ACM, 2011

Sensor tricorder: what does that sensor know about me?
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Proceedings of the 20th USENIX Security Symposium, 2011

Science fiction prototyping and security education: cultivating contextual and societal thinking in computer security education and beyond.
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011

Keypad: an auditing file system for theft-prone devices.
Proceedings of the European Conference on Computer Systems, 2011

Televisions, video privacy, and powerline electromagnetic interference.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Experimental Security Analysis of a Modern Automobile.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Comet: An active distributed key-value store.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

Seeing through Obscure Glass.
Proceedings of the Computer Vision - ECCV 2010, 2010

Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

The limits of automatic OS fingerprint generation.
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010

Cryptography Engineering - Design Principles and Practical Applications.
Wiley, ISBN: 978-0-470-47424-2, 2010

2009
Are Patched Machines Really Fixed?
IEEE Security & Privacy, 2009

Vanish: Increasing Data Privacy with Self-Destructing Data.
Proceedings of the 18th USENIX Security Symposium, 2009

Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

A spotlight on security and privacy risks with future household robots: attacks and lessons.
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009

A comprehensive study of frequency, interference, and training of multiple graphical passwords.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
An Interview with RFID Security Expert Ari Juels.
IEEE Pervasive Computing, 2008

Security and Privacy for Implantable Medical Devices.
IEEE Pervasive Computing, 2008

Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs.
Proceedings of the 17th USENIX Security Symposium, 2008

Challenges and Directions for Monitoring P2P File Sharing Networks - or - Why My Printer Received a DMCA Takedown Notice.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008), 2008

Shining Light in Dark Places: Understanding the Tor Network.
Proceedings of the Privacy Enhancing Technologies, 2008

Detecting In-Flight Page Changes with Web Tripwires.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

Improving wireless privacy with an identifier-free link layer protocol.
Proceedings of the 6th International Conference on Mobile Systems, 2008

Privacy oracle: a system for finding application leaks with black box differential testing.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Physical Access Control for Captured RFID Data.
IEEE Pervasive Computing, 2007

Low-resource routing attacks against tor.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

2006
The Secure Shell (SSH) Transport Layer Encryption Modes.
RFC, January, 2006

Authenticated encryption in practice : generalized composition methods and the Secure Shell, CWC, and WinZip schemes.
PhD thesis, 2006

Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine.
IACR Cryptology ePrint Archive, 2006

Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Herding Hash Functions and the Nostradamus Attack.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

2005
Remote Physical Device Fingerprintin.
IEEE Trans. Dependable Sec. Comput., 2005

Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage.
IACR Cryptology ePrint Archive, 2005

Remote Physical Device Fingerprinting.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
Proceedings of the Advances in Cryptology, 2005

2004
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm.
ACM Trans. Inf. Syst. Secur., 2004

Analysis of the WinZip encryption method.
IACR Cryptology ePrint Archive, 2004

Analysis of an Electronic Voting System.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

CWC: A High-Performance Conventional Authenticated Encryption Mode.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

Hash Function Balance and Its Impact on Birthday Attacks.
Proceedings of the Advances in Cryptology, 2004

Attacking and repairing the winZip encryption scheme.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
Building Secure Cryptographic Transforms, or How to Encrypt and MAC.
IACR Cryptology ePrint Archive, 2003

Analysis of RMAC.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications.
Proceedings of the Advances in Cryptology, 2003

2002
Token-based scanning of source code for security problems.
ACM Trans. Inf. Syst. Secur., 2002

Related-Key and Key-Collision Attacks Against RMAC.
IACR Cryptology ePrint Archive, 2002

Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm.
IACR Cryptology ePrint Archive, 2002

Authenticated encryption in SSH: provably fixing the SSH binary packet protocol.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
A Network-Flow-Based Scheduler: Design, Performance History, and Experimental Analysis.
ACM Journal of Experimental Algorithmics, 2001

Trust (and mistrust) in secure applications.
Commun. ACM, 2001

On the Global Content PMI: Improved Copy-Protected Internet Content Distribution.
Proceedings of the Financial Cryptography, 2001

2000
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Preliminary Cryptanalysis of Reduced-Round Serpent.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000


  Loading...