Stephen Checkoway
According to our database1,
Stephen Checkoway
authored at least 27 papers
between 2009 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders.
Proceedings of the 32nd USENIX Security Symposium, 2023
2021
IEEE Trans. Mob. Comput., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
2019
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019
2018
Commun. ACM, 2018
O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2013
2012
Low-level software security : exploiting memory safety vulnerabilities and assumptions.
PhD thesis, 2012
2011
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
2010
Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009