Biblio

Export 20 results:
Filters: Author is Tadayoshi Kohno  [Clear All Filters]
2019
Ruth K, Kohno T, Roesner F.  2019.  Secure Multi-User Content Sharing for Augmented Reality Applications. 28th USENIX Security Symposium (USENIX Security 19). :141--158.
2018
Song D, Eykholt K, Evtimov I, Fernandes E, Li B, Rahmati A, Tramèr F, Prakash A, Kohno T.  2018.  Physical Adversarial Examples for Object Detectors. 12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18).
2015
Hassanieh H, Wang J, Katabi D, Kohno T.  2015.  Securing RFIDs by Randomizing the Modulation and Channel. 12th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 15). :235--249.
Koscher K, Kohno T, Molnar D.  2015.  SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems. 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15).
2012
Roesner F, Kohno T, Wetherall D.  2012.  Detecting and Defending Against Third-Party Tracking on the Web. 9th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 12). :155--168.
2010
Geambasu R, Levy AA, Kohno T, Krishnamurthy A, Levy HM.  2010.  Comet: An Active Distributed Key-Value Store. 9th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 10).
Neuman C, Frincke D, Fu K, Kohno T, Masera M.  2010.  Security Experimentation with Cyber-Physical Devices. 3rd Workshop on Cyber Security Experimentation and Test ({CSET} 10).
2008
Denning T, Fu K, Kohno T.  2008.  Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security. 3rd {USENIX} Workshop on Hot Topics in Security (HotSec 08).
Reis C, Gribble SD, Kohno T, Weaver NC.  2008.  Detecting In-Flight Page Changes with Web Tripwires. 5th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 08).