USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 15 results:
Filters: Author is Stephen Checkoway [Clear All Filters]
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders. 32nd USENIX Security Symposium (USENIX Security 23). :6647--6664.
.
2023. Jetset: Targeted Firmware Rehosting for Embedded Systems. 30th USENIX Security Symposium (USENIX Security 21). :321--338.
.
2021. Triton: A Software-Reconfigurable Federated Avionics Testbed. 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19).
.
2019. O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web 27th USENIX Security Symposium (USENIX Security 18). :1475--1492.
.
2018. Run-DMA. 9th USENIX Workshop on Offensive Technologies (WOOT 15).
.
2015. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. 23rd USENIX Security Symposium (USENIX Security 14). :941--955.
.
2014. iSeeYou: Disabling the MacBook Webcam Indicator LED. 23rd USENIX Security Symposium (USENIX Security 14). :337--352.
.
2014. On the Practical Exploitability of Dual EC in TLS Implementations. 23rd USENIX Security Symposium (USENIX Security 14). :319--335.
.
2014. Security Analysis of a Full-Body Scanner. 23rd USENIX Security Symposium (USENIX Security 14). :369--384.
.
2014. Comprehensive Experimental Analyses of Automotive Attack Surfaces. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Putting Out a HIT: Crowdsourcing Malware Installs. 5th USENIX Workshop on Offensive Technologies (WOOT 11).
.
2011. Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 10).
.
2010. Single-Ballot Risk-Limiting Audits Using Convex Optimization. 2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 10).
.
2010. Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage 2009 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 09).
.
2009.