Follow
Tadayoshi Kohno
Tadayoshi Kohno
Professor, Paul G. Allen School of Computer Science & Engineering, University of Washington
Verified email at cs.washington.edu - Homepage
Title
Cited by
Cited by
Year
Robust physical-world attacks on deep learning visual classification
K Eykholt, I Evtimov, E Fernandes, B Li, A Rahmati, C Xiao, A Prakash, ...
Proceedings of the IEEE conference on computer vision and pattern …, 2018
3276*2018
Experimental security analysis of a modern automobile
K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ...
2010 IEEE symposium on security and privacy, 447-462, 2010
25832010
Comprehensive experimental analyses of automotive attack surfaces
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
20th USENIX security symposium (USENIX Security 11), 2011
23192011
Remote physical device fingerprinting
T Kohno, A Broido, KC Claffy
IEEE Transactions on Dependable and Secure Computing 2 (2), 93-108, 2005
11012005
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
D Halperin, TS Heydt-Benjamin, B Ransford, SS Clark, B Defend, ...
2008 IEEE Symposium on Security and Privacy (sp 2008), 129-142, 2008
10262008
Cryptography engineering: design principles and practical applications
N Ferguson, B Schneier, T Kohno
John Wiley & Sons, 2011
8542011
Analysis of an electronic voting system
T Kohno, A Stubblefield, AD Rubin, DS Wallach
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 27-40, 2004
8442004
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
8152005
ITS4: A static vulnerability scanner for C and C++ code
J Viega, JT Bloch, Y Kohno, G McGraw
Computer Security Applications, 2000. ACSAC'00. 16th Annual Conference, 257-267, 2000
6442000
Security and privacy for implantable medical devices
D Halperin, TS Heydt-Benjamin, K Fu, T Kohno, WH Maisel
IEEE pervasive computing 7 (1), 30-39, 2008
6252008
Detecting and Defending Against {Third-Party} Tracking on the Web
F Roesner, T Kohno, D Wetherall
9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12 …, 2012
6222012
Shining light in dark places: Understanding the Tor network
D McCoy, K Bauer, D Grunwald, T Kohno, D Sicker
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008
5932008
Vanish: Increasing Data Privacy with Self-Destructing Data.
R Geambasu, T Kohno, AA Levy, HM Levy
USENIX security symposium 316, 10-5555, 2009
5902009
Physical adversarial examples for object detectors
D Song, K Eykholt, I Evtimov, E Fernandes, B Li, A Rahmati, F Tramer, ...
12th USENIX workshop on offensive technologies (WOOT 18), 2018
5572018
Low-resource routing attacks against Tor
K Bauer, D McCoy, D Grunwald, T Kohno, D Sicker
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 11-20, 2007
4962007
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Journal of cryptology 21, 350-391, 2008
4672008
The skein hash function family
N Ferguson, S Lucks, B Schneier, D Whiting, M Bellare, T Kohno, J Callas, ...
Submission to NIST (round 3) 7 (7.5), 3, 2010
4022010
A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications
M Bellare, T Kohno
International Conference on the Theory and Applications of Cryptographic …, 2003
3672003
Security and privacy for augmented reality systems
F Roesner, T Kohno, D Molnar
Communications of the ACM 57 (4), 88-96, 2014
3612014
Herding hash functions and the Nostradamus attack
J Kelsey, T Kohno
Annual International Conference on the Theory and Applications of …, 2006
3242006
The system can't perform the operation now. Try again later.
Articles 1–20