Stephen Checkoway

According to our database1, Stephen Checkoway authored at least 27 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders.
Proceedings of the 32nd USENIX Security Symposium, 2023

2021
Kollector: Detecting Fraudulent Activities on Mobile Devices Using Deep Learning.
IEEE Trans. Mob. Comput., 2021

Jetset: Targeted Firmware Rehosting for Embedded Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

2019
Triton: A Software-Reconfigurable Federated Avionics Testbed.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

2018
Where did I leave my keys?: lessons from the Juniper Dual EC incident.
Commun. ACM, 2018

O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web.
Proceedings of the 27th USENIX Security Symposium, 2018

Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018

2016
A Systematic Analysis of the Juniper Dual EC Incident.
IACR Cryptol. ePrint Arch., 2016

A Systematic Analysis of the Juniper Dual EC Incident.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Run-DMA.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

2014
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Security Analysis of a Full-Body Scanner.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

On the Practical Exploitability of Dual EC in TLS Implementations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

iSeeYou: Disabling the MacBook Webcam Indicator LED.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

On The Security of Mobile Cockpit Information Systems.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Iago attacks: why the system call API is a bad untrusted RPC interface.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2013

2012
Low-level software security : exploiting memory safety vulnerabilities and assumptions.
PhD thesis, 2012

Portably solving the access(2)/open(2) race.
Adv. Math. Commun., 2012

2011
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
Proceedings of the 20th USENIX Security Symposium, 2011

Putting Out a HIT: Crowdsourcing Malware Installs.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Proceedings of the 20th USENIX Security Symposium, 2011

2010
Don't Take LaTeX Files from Strangers.
login Usenix Mag., 2010

Single-Ballot Risk-Limiting Audits Using Convex Optimization.
Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010

Experimental Security Analysis of a Modern Automobile.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010

Return-oriented programming without returns.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009


  Loading...