Keaton Mowery

According to our database1, Keaton Mowery authored at least 9 papers between 2010 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Beneath the Attack Surface.
PhD thesis, 2015

On Subnormal Floating Point and Abnormal Timing.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
Security Analysis of a Full-Body Scanner.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
Welcome to the Entropics: Boot-Time Entropy in Embedded Devices.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
Are AES x86 cache timing attacks still feasible?
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

2011
Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
Proceedings of the 20th USENIX Security Symposium, 2011

Putting Out a HIT: Crowdsourcing Malware Installs.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

2010
Efficient User-Guided Ballot Image Verification.
Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010


  Loading...