University of Washington

General Info

Rank: #44 Worldwide
#31 in US
Papers: 65
Number of Researchers: 82
APA
(average papers per authors):
0.8
Country: USA

Activity Map

Contributors

  • Tadayoshi Kohno (26 papers)
  • Franziska Roesner (19 papers)
  • Karl Koscher (6 papers)
  • Alexei Czeskis (5 papers)
  • Sreeram Kannan (5 papers)
  • Henry M. Levy (4 papers)
  • Arvind Krishnamurthy (4 papers)
  • Steven D. Gribble (3 papers)
  • Kimberly Ruth (3 papers)
  • Seungyeop Han (3 papers)
  • Tanya Bragin (2 papers)
  • Earlence Fernandes (2 papers)
  • Peter Ney (2 papers)
  • Luis Ceze (2 papers)
  • Shwetak Patel (2 papers)
  • Kiron Lebeck (2 papers)
  • Lucy Simko (2 papers)
  • David Kohlbrenner (2 papers)
  • Dan Grossman (2 papers)
  • Gabriel Maganis (2 papers)
  • Justin Cappos (2 papers)
  • David Wetherall (2 papers)
  • Adam Lerner (2 papers)
  • Ravi Bhoraskar (2 papers)
  • Stefano Tessaro (2 papers)
  • Alexander Moshchuk (2 papers)
  • John P. John (2 papers)
  • Michael M. Swift (1 papers)
  • Alex Moshchuk (1 papers)
  • Zachary Tatlock (1 papers)
  • Richard S. Cox (1 papers)
  • N. R. Prasad (1 papers)
  • Daniel Halperin (1 papers)
  • Samia Ibtasam (1 papers)
  • Kaylea Champion (1 papers)
  • Benjamin Mako Hill (1 papers)
  • Pardis Emami-Naeini (1 papers)
  • Michael Flanders (1 papers)
  • Michael F. Ringenburg (1 papers)
  • Vjekoslav Brajkovic (1 papers)
  • Armon Dadgar (1 papers)
  • Jeff Rasley (1 papers)
  • Justin Samuel (1 papers)
  • Ivan Beschastnikh (1 papers)
  • Cosmin Barsan (1 papers)
  • Thomas Anderson (1 papers)
  • Miro Enev (1 papers)
  • Sidhant Gupta (1 papers)
  • Peter Hornyack (1 papers)
  • Tamara Denning (1 papers)
  • Adam Shostack (1 papers)
  • Michael D. Ernst (1 papers)
  • Rene Just (1 papers)
  • Suzanne Millstein (1 papers)
  • Stuart Pernsteiner (1 papers)
  • Paulo Barros (1 papers)
  • Paul Vines (1 papers)
  • Edward XueJun Wu (1 papers)
  • Talia Ringer (1 papers)
  • Ada Lerner (1 papers)
  • Viswa Virinchi Muppirala (1 papers)
  • Sarang Dharmapurikar (1 papers)
  • Damien Deville (1 papers)
  • T. Scott Saponas (1 papers)
  • Jonathan Lester (1 papers)
  • Carl Hartung (1 papers)
  • Sameer Agarwal (1 papers)
  • Salvatore Guarnieri (1 papers)
  • Roxana Geambasu (1 papers)
  • Amit Levy (1 papers)
  • Polina Charters (1 papers)
  • Tobin Holliday (1 papers)
  • Anna Kornfeld Simpson (1 papers)
  • Lee Organick (1 papers)
  • Christine Chen (1 papers)
  • Eric Zeng (1 papers)
  • Miranda Wei (1 papers)
  • Kentrell Owens (1 papers)
  • Christine Geeng (1 papers)
  • Mike Harris (1 papers)
  • Umar Iqbal (1 papers)
  • Huijia Lin (1 papers)

Papers

"Implementation of Crossrealm Referral Handling in the MIT Kerberos Client"

Michael M. Swift, ... -- NDSS 2001

"Preventing Format-String Attacks via Automatic and Efficient Dynamic Checking"

Michael F. Ringenburg, Dan Grossman, ... -- CCS 2005

"Robust TCP Stream Reassembly in the Presence of Adversaries"

Sarang Dharmapurikar, ... -- Usenix 2005

"A Crawler-based Study of Spyware in the Web"

Alex Moshchuk, Tanya Bragin, Steven D. Gribble, Henry M. Levy, ... -- NDSS 2006

"A Safety-Oriented Platform for Web Applications"

Richard S. Cox, Steven D. Gribble, Henry M. Levy, ... -- Oakland 2006

"Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation"

Tadayoshi Kohno, ... -- CCS 2006

"On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication"

N. R. Prasad, ... -- Oakland 2007

"SpyProxy: Execution-based Detection of Malicious Web Content"

Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy, ... -- Usenix 2007

"Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing"

T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno, ... -- Usenix 2007

"Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses"

Tadayoshi Kohno, Daniel Halperin, ... -- Oakland 2008

"Privacy Oracle: a System for Finding Application Leaks with Black Box Differential Testing"

Gabriel Maganis, Tadayoshi Kohno, ... -- CCS 2008

"RFIDS and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and Unauthorized Reads with Context-Aware Communications"

Alexei Czeskis, Karl Koscher, Tadayoshi Kohno, ... -- CCS 2008

"Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs"

Tadayoshi Kohno, Gabriel Maganis, Arvind Krishnamurthy, ... -- Usenix 2008

"EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond"

Karl Koscher, Vjekoslav Brajkovic, Tadayoshi Kohno, ... -- CCS 2009

"GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code"

Salvatore Guarnieri, ... -- Usenix 2009

"Vanish: Increasing Data Privacy with Self-Destructing Data"

Tadayoshi Kohno, Henry M. Levy, Roxana Geambasu, Amit Levy, ... -- Usenix 2009

"The Multi-Principal OS Construction of the Gazelle Web Browser"

Alexander Moshchuk, ... -- Usenix 2009

"Experimental Security Analysis of a Modern Automobile"

Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, ... -- Oakland 2010

"Survivable key compromise in software update systems"

Justin Cappos, ... -- CCS 2010

"Retaining sandbox containment despite bugs in privileged memory-safe code"

Justin Cappos, Armon Dadgar, Jeff Rasley, Justin Samuel, Ivan Beschastnikh, Cosmin Barsan, Arvind Krishnamurthy, Thomas Anderson, ... -- CCS 2010

"Searching the Searchers with SearchAudit"

John P. John, Arvind Krishnamurthy, ... -- Usenix 2010

"Televisions, Video Privacy, and Powerline Electromagnetic Interference"

Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak Patel, ... -- CCS 2011

"These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications"

Peter Hornyack, Seungyeop Han, David Wetherall, ... -- CCS 2011

"Comprehensive Experimental Analyses of Automotive Attack Surfaces"

Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, ... -- Usenix 2011

"deSEO: Combating Search-Result Poisoning"

John P. John, Arvind Krishnamurthy, ... -- Usenix 2011

"User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems"

Franziska Roesner, Tadayoshi Kohno, ... -- Oakland 2012

"Strengthening User Authentication through Opportunistic Cryptographic Identity Assertions"

Alexei Czeskis, Tadayoshi Kohno, ... -- CCS 2012

"Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web"

Alexei Czeskis, ... -- Usenix 2012

"Control-Alt-Hack: The Design and Evaluation of a Card Game for Computer Security Awareness and Education"

Tamara Denning, Adam Lerner, Adam Shostack, Tadayoshi Kohno, ... -- CCS 2013

"Securing Embedded User Interfaces: Android and Beyond"

Franziska Roesner, Tadayoshi Kohno, ... -- Usenix 2013

"SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks"

Zachary Tatlock, ... -- NDSS 2014

"World-Driven Access Control for Continuous Sensing"

Franziska Roesner, Tadayoshi Kohno, ... -- CCS 2014

"Collaborative verification of information flow for a high-assurance app store"

Michael D. Ernst, Rene Just, Suzanne Millstein, Stuart Pernsteiner, Franziska Roesner, Karl Koscher, Paulo Barros, Ravi Bhoraskar, Seungyeop Han, Paul Vines, Edward XueJun Wu, ... -- CCS 2014

"Brahmastra: Driving Apps to Test the Security of Third-Party Components"

Ravi Bhoraskar, Seungyeop Han, David Wetherall, ... -- Usenix 2014

"Investigating the Computer Security Practices and Needs of Journalists"

Polina Charters, Tobin Holliday, Franziska Roesner, ... -- Usenix 2015

"AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems"

Talia Ringer, Dan Grossman, Franziska Roesner, ... -- CCS 2016

"Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016"

Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner, ... -- Usenix 2016

"Securing Augmented Reality Output"

Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner, ... -- Oakland 2017

"Rewriting History: Changing the Archived Web from the Present"

Ada Lerner, Tadayoshi Kohno, Franziska Roesner, ... -- CCS 2017

"When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers"

Franziska Roesner, ... -- Usenix 2017

"Computer Security, Privacy, and DNA Sequencing"

Peter Ney, Karl Koscher, Lee Organick, Luis Ceze, Tadayoshi Kohno, ... -- Usenix 2017

"Decentralized Action Integrity for Trigger-Action IoT Platforms."

Earlence Fernandes, ... -- NDSS 2018

"Computer Security and Privacy for Refugees in the United States"

Lucy Simko, Samia Ibtasam, Franziska Roesner, Tadayoshi Kohno, ... -- Oakland 2018

"Towards Security and Privacy for Multi-User Augmented Reality: Foundations with End Users"

Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner, ... -- Oakland 2018

"Rethinking Access Control and Authentication for the Home Internet of Things (IoT)"

Earlence Fernandes, ... -- Usenix 2018

"Prism: Deconstructing the Blockchain to Approach Physical Limits"

Sreeram Kannan, ... -- CCS 2019

"Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors"

Christine Chen, Franziska Roesner, ... -- Usenix 2019

"Secure Multi-User Content Sharing for Augmented Reality Applications"

Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner, ... -- Usenix 2019

"Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study"

Eric Zeng, Franziska Roesner, ... -- Usenix 2019

"Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference"

Peter Ney, Luis Ceze, Tadayoshi Kohno, ... -- NDSS 2020

"Are Anonymity-Seekers Just Like Everybody Else? An Analysis of Contributions to Wikipedia from Tor"

Kaylea Champion, Benjamin Mako Hill, ... -- Oakland 2020

"Everything is a Race and Nakamoto Always Wins"

Sreeram Kannan, ... -- CCS 2020

"What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data"

Miranda Wei, ... -- Usenix 2020

"Defensive Technology Use by Political Activists During the Sudanese Revolution"

Lucy Simko, Tadayoshi Kohno, ... -- Oakland 2021

"Which Privacy and Security Attributes Most Impact Consumers‚ Risk Perception and Willingness to Purchase IoT Devices?"

Pardis Emami-Naeini, ... -- Oakland 2021

"BFT Protocol Forensics"

Sreeram Kannan, ... -- CCS 2021

"Securing Parallel-chain Protocols under Variable Mining Power"

Viswa Virinchi Muppirala, Sreeram Kannan, ... -- CCS 2021

"Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest"

Michael Flanders, David Kohlbrenner, ... -- Oakland 2022

"Minotaur: Multi-Resource Blockchain Consensus"

Sreeram Kannan, ... -- CCS 2022

"VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries"

Stefano Tessaro, ... -- CCS 2022

"Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives"

Kentrell Owens, Franziska Roesner, Tadayoshi Kohno, ... -- Usenix 2022

""Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice"

Christine Geeng, Mike Harris, Franziska Roesner, ... -- Usenix 2022

"Khaleesi: Breaker of Advertising and Tracking Request Chains"

Umar Iqbal, ... -- Usenix 2022

"Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86"

David Kohlbrenner, ... -- Usenix 2022

"QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore"

Huijia Lin, Stefano Tessaro, ... -- Usenix 2022