Tadayoshi Kohno
Orcid: 0000-0002-4899-226XAffiliations:
- University of Washington, Seattle, Washington, USA
According to our database1,
Tadayoshi Kohno
authored at least 196 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., January, 2024
Particip-AI: A Democratic Surveying Framework for Anticipating Future AI Use Cases, Harms and Benefits.
CoRR, 2024
Attacking the Diebold Signature Variant - RSA Signatures with Unverified High-order Padding.
CoRR, 2024
SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors.
Proceedings of the 33rd USENIX Security Symposium, 2024
Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse.
Proceedings of the 33rd USENIX Security Symposium, 2024
"But they have overlooked a few things in Afghanistan: " An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections.
Proceedings of the 33rd USENIX Security Symposium, 2024
When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality.
Proceedings of the 33rd USENIX Security Symposium, 2024
"Violation of my body: " Perceptions of AI-generated non-consensual (intimate) imagery.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
Experimental Analyses of the Physical Surveillance Risks in Client-Side Content Scanning.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
Proceedings of the 4th ACM Conference on Equity and Access in Algorithms, 2024
It's Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based Bias.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Proc. ACM Hum. Comput. Interact., 2023
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription.
IEEE Secur. Priv., 2023
LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins.
CoRR, 2023
The Case for Anticipating Undesirable Consequences of Computing Innovations Early, Often, and Across Computer Science.
CoRR, 2023
Proceedings of the ACM Web Conference 2023, 2023
The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real Estate.
Proceedings of the 32nd USENIX Security Symposium, 2023
Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.
Proceedings of the 32nd USENIX Security Symposium, 2023
Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
A Scalable Inclusive Security Intervention to Center Marginalized & Vulnerable Populations in Security & Privacy Design.
Proceedings of the 2023 New Security Paradigms Workshop, 2023
Proceedings of the 3rd ACM Conference on Equity and Access in Algorithms, 2023
"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
How Language Formality in Security and Privacy Interfaces Impacts Intended Compliance.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Proceedings of the 2023 AAAI/ACM Conference on AI, Ethics, and Society, 2023
2022
IEEE Secur. Priv., 2022
DTRAP, 2022
Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance.
CoRR, 2022
Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives.
Proceedings of the 31st USENIX Security Symposium, 2022
Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
What factors affect targeting and bids in online advertising?: a field measurement study.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022
2021
Proc. Priv. Enhancing Technol., 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Understanding Privacy Attitudes and Concerns Towards Remote Communications During the COVID-19 Pandemic.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Polls, clickbait, and commemorative $2 bills: problematic political advertising on news and media websites around the 2020 U.S. elections.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Would You Rather: A Focus Group Method for Eliciting and Discussing Formative Design Insights with Children.
Proceedings of the IDC '21: Interaction Design and Children, 2021
2020
Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts.
Proc. Priv. Enhancing Technol., 2020
Proc. Priv. Enhancing Technol., 2020
IEEE Data Eng. Bull., 2020
Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things.
CoRR, 2020
CoRR, 2020
Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
2019
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019
Enabling Multiple Applications to Simultaneously Augment Reality: Challenges and Directions.
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
2018
Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution.
Proc. Priv. Enhancing Technol., 2018
IEEE Secur. Priv., 2018
CoRR, 2018
Challenges and New Directions in Augmented Reality, Computer Security, and Neuroscience - Part 1: Risks to Sensation and Perception.
CoRR, 2018
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018
2017
Proc. Priv. Enhancing Technol., 2017
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Exploring ADINT: Using Ad Targeting for Surveillance on a Budget - or - How Alice Can Buy Ads to Track Bob.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More.
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016
Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016.
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 2016 USENIX Annual Technical Conference, 2016
Proceedings of the Eighth International Conference on Information and Communication Technologies and Development, 2016
Why would you do that? predicting the uses and gratifications behind smartphone-usage behaviors.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
2015
To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots.
CoRR, 2015
Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015
Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, 2015
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015
Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems, 2015
Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions.
Proceedings of the Financial Cryptography and Data Security, 2015
2014
Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research.
Proceedings of the 2014 USENIX Summit on Gaming, 2014
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
Workshop on usable privacy & security for wearable and domestic ubiquitous devices (UPSIDE).
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages.
Proceedings of the Financial Cryptography and Data Security, 2014
In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Control-Alt-Hack™: a card game for computer security outreach and education (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013
Experimental Security Analyses of Non-Networked Compact Fluorescent Lamps: A Case Study of Home Automation Security.
Proceedings of the 2013 Workshop on Learning from Authoritative Security Experiment Results, 2013
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013
Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
login Usenix Mag., 2012
Security for cyber-physical systems: case studies with medical devices, robots, and automobiles.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Security Risks, Low-tech User Interfaces, and Implantable Medical Devices: A Case Study with Insulin Pump Infusion Systems.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012
Proceedings of the 25th Annual ACM Symposium on User Interface Software and Technology, 2012
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012
Strengthening user authentication through opportunistic cryptographic identity assertions.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
SensorSift: balancing sensor data privacy and utility in automated face understanding.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
ACM SIGOPS Oper. Syst. Rev., 2011
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Science fiction prototyping and security education: cultivating contextual and societal thinking in computer security education and beyond.
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011
Proceedings of the European Conference on Computer Systems, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010
Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010
Wiley, ISBN: 978-0-470-47424-2, 2010
2009
Proceedings of the 18th USENIX Security Symposium, 2009
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009
A spotlight on security and privacy risks with future household robots: attacks and lessons.
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009
A comprehensive study of frequency, interference, and training of multiple graphical passwords.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
J. Cryptol., 2008
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs.
Proceedings of the 17th USENIX Security Symposium, 2008
Challenges and Directions for Monitoring P2P File Sharing Networks - or - Why My Printer Received a DMCA Takedown Notice.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the Privacy Enhancing Technologies, 2008
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008
Proceedings of the 6th International Conference on Mobile Systems, 2008
Privacy oracle: a system for finding application leaks with black box differential testing.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007
2006
Authenticated encryption in practice : generalized composition methods and the Secure Shell, CWC, and WinZip schemes.
PhD thesis, 2006
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine.
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
2004
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm.
ACM Trans. Inf. Syst. Secur., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications.
Proceedings of the Advances in Cryptology, 2003
2002
ACM Trans. Inf. Syst. Secur., 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
A Network-Flow-Based Scheduler: Design, Performance History, and Experimental Analysis.
ACM J. Exp. Algorithmics, 2001
Proceedings of the Financial Cryptography, 2001
2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Preliminary Cryptanalysis of Reduced-Round Serpent.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000