Robust physical-world attacks on deep learning visual classification K Eykholt, I Evtimov, E Fernandes, B Li, A Rahmati, C Xiao, A Prakash, ... Proceedings of the IEEE conference on computer vision and pattern …, 2018 | 2375* | 2018 |
Experimental security analysis of a modern automobile K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ... 2010 IEEE symposium on security and privacy, 447-462, 2010 | 2250 | 2010 |
Comprehensive experimental analyses of automotive attack surfaces. S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ... USENIX security symposium 4 (447-462), 2021, 2011 | 1992 | 2011 |
Remote physical device fingerprinting T Kohno, A Broido, KC Claffy IEEE Transactions on Dependable and Secure Computing 2 (2), 93-108, 2005 | 1045 | 2005 |
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses D Halperin, TS Heydt-Benjamin, B Ransford, SS Clark, B Defend, ... 2008 IEEE Symposium on Security and Privacy (sp 2008), 129-142, 2008 | 945 | 2008 |
Analysis of an electronic voting system T Kohno, A Stubblefield, AD Rubin, DS Wallach IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 27-40, 2004 | 816 | 2004 |
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ... Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005 | 744 | 2005 |
Cryptography engineering: design principles and practical applications N Ferguson, B Schneier, T Kohno John Wiley & Sons, 2011 | 720 | 2011 |
ITS4: A static vulnerability scanner for C and C++ code J Viega, JT Bloch, Y Kohno, G McGraw Computer Security Applications, 2000. ACSAC'00. 16th Annual Conference, 257-267, 2000 | 604 | 2000 |
Security and privacy for implantable medical devices D Halperin, TS Heydt-Benjamin, K Fu, T Kohno, WH Maisel IEEE pervasive computing 7 (1), 30-39, 2008 | 581 | 2008 |
Vanish: Increasing Data Privacy with Self-Destructing Data. R Geambasu, T Kohno, AA Levy, HM Levy USENIX security symposium 316, 10-5555, 2009 | 556 | 2009 |
Detecting and defending against third-party tracking on the web F Roesner, T Kohno, D Wetherall Presented as part of the 9th {USENIX} Symposium on Networked Systems Design …, 2012 | 551 | 2012 |
Shining light in dark places: Understanding the Tor network D McCoy, K Bauer, D Grunwald, T Kohno, D Sicker Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008 | 469 | 2008 |
Low-resource routing attacks against Tor K Bauer, D McCoy, D Grunwald, T Kohno, D Sicker Proceedings of the 2007 ACM workshop on Privacy in electronic society, 11-20, 2007 | 469 | 2007 |
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ... Journal of cryptology 21, 350-391, 2008 | 423 | 2008 |
Physical adversarial examples for object detectors D Song, K Eykholt, I Evtimov, E Fernandes, B Li, A Rahmati, F Tramer, ... 12th USENIX workshop on offensive technologies (WOOT 18), 2018 | 378 | 2018 |
The Skein hash function family N Ferguson, S Lucks, B Schneier, D Whiting, M Bellare, T Kohno, J Callas, ... Submission to NIST (round 3) 7 (7.5), 3, 2010 | 377 | 2010 |
A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications M Bellare, T Kohno Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003 | 343 | 2003 |
Herding hash functions and the Nostradamus attack J Kelsey, T Kohno Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference …, 2006 | 301 | 2006 |
User-driven access control: Rethinking permission granting in modern operating systems F Roesner, T Kohno, A Moshchuk, B Parno, HJ Wang, C Cowan 2012 IEEE Symposium on Security and Privacy, 224-238, 2012 | 300 | 2012 |