Export 16 results:
Filters: Author is Hovav Shacham  [Clear All Filters]
Kohlbrenner D, Shacham H.  2017.  On the effectiveness of mitigations against floating-point timing channels. 26th USENIX Security Symposium (USENIX Security 17). :69--81.
Kohlbrenner D, Shacham H.  2016.  Trusted Browsers for Uncertain Times. 25th USENIX Security Symposium (USENIX Security 16). :463--480.
Lian W, Rescorla E, Shacham H, Savage S.  2013.  Measuring the Practical Impact of DNSSEC Deployment. 22nd USENIX Security Symposium (USENIX Security 13). :573--588.
Checkoway S, McCoy D, Kantor B, Anderson D, Shacham H, Savage S, Koscher K, Czeskis A, Roesner F, Kohno T.  2011.  Comprehensive Experimental Analyses of Automotive Attack Surfaces. 20th USENIX Security Symposium (USENIX Security 11).
Shacham H, Teague V.  2011.  Opening Remarks. 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 11).
Meiklejohn S, Mowery K, Checkoway S, Shacham H.  2011.  The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion. 20th USENIX Security Symposium (USENIX Security 11).
Checkoway S, Shacham H, Rescorla E.  2010.  Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 10).
Wang K, Rescorla E, Shacham H, Belongie S.  2010.  OpenScan: A Fully Transparent Optical Scan Voting System. 2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 10).
Miller C, Shacham H.  2010.  Welcome. 4th USENIX Workshop on Offensive Technologies (WOOT 10).
Checkoway S, Feldman AJ, Kantor B, J. Halderman A, Felten EW, Shacham H.  2009.  Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage 2009 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 09).