Biblio

Export 19 results:
Filters: Author is Hovav Shacham  [Clear All Filters]
2017
Kohlbrenner D, Shacham H.  2017.  On the effectiveness of mitigations against floating-point timing channels. 26th USENIX Security Symposium (USENIX Security 17). :69--81.
2016
Kohlbrenner D, Shacham H.  2016.  Trusted Browsers for Uncertain Times. 25th USENIX Security Symposium (USENIX Security 16). :463--480.
2013
Lian W, Rescorla E, Shacham H, Savage S.  2013.  Measuring the Practical Impact of DNSSEC Deployment. 22nd USENIX Security Symposium (USENIX Security 13). :573--588.
2011
Checkoway S, McCoy D, Kantor B, Anderson D, Shacham H, Savage S, Koscher K, Czeskis A, Roesner F, Kohno T.  2011.  Comprehensive Experimental Analyses of Automotive Attack Surfaces. 20th USENIX Security Symposium (USENIX Security 11).
Shacham H, Teague V.  2011.  Opening Remarks. 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 11).
Meiklejohn S, Mowery K, Checkoway S, Shacham H.  2011.  The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion. 20th USENIX Security Symposium (USENIX Security 11).
2010
Checkoway S, Shacham H, Rescorla E.  2010.  Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 10).
Wang K, Rescorla E, Shacham H, Belongie S.  2010.  OpenScan: A Fully Transparent Optical Scan Voting System. 2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 10).
Miller C, Shacham H.  2010.  Welcome. 4th USENIX Workshop on Offensive Technologies (WOOT 10).
2009
Checkoway S, Feldman AJ, Kantor B, J. Halderman A, Felten EW, Shacham H.  2009.  Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage 2009 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 09).