What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Stephen Checkoway
Google Scholar
17
publications in security and cryptology related venues
Year
Venue
Title
2023
conf/uss
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders.
Willy R. Vasquez
Stephen Checkoway
Hovav Shacham
2021
conf/uss
Jetset: Targeted Firmware Rehosting for Embedded Systems.
Evan Johnson
Maxwell Bland
Yifei Zhu
Joshua Mason
Stephen Checkoway
Stefan Savage
Kirill Levchenko
2019
conf/uss
Triton: A Software-Reconfigurable Federated Avionics Testbed.
Sam Crow
Brown Farinholt
Brian Johannesmeyer
Karl Koscher
Stephen Checkoway
Stefan Savage
Aaron Schulman
Alex C. Snoeren
Kirill Levchenko
2018
conf/uss
O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web.
Mohammad Ghasemisharif
Amrutha Ramesh
Stephen Checkoway
Chris Kanich
Jason Polakis
2016
conf/ccs
A Systematic Analysis of the Juniper Dual EC Incident.
Stephen Checkoway
Jacob Maskiewicz
Christina Garman
Joshua Fried
Shaanan Cohney
Matthew Green
Nadia Heninger
Ralf-Philipp Weinmann
Eric Rescorla
Hovav Shacham
2014
conf/ccs
On The Security of Mobile Cockpit Information Systems.
Devin Lundberg
Brown Farinholt
Edward Sullivan
Ryan A. Mast
Stephen Checkoway
Stefan Savage
Alex C. Snoeren
Kirill Levchenko
2014
conf/uss
iSeeYou: Disabling the MacBook Webcam Indicator LED.
Matthew Brocker
Stephen Checkoway
2014
conf/uss
Security Analysis of a Full-Body Scanner.
Keaton Mowery
Eric Wustrow
Tom Wypych
Corey Singleton
Chris Comfort
Eric Rescorla
J. Alex Halderman
Hovav Shacham
Stephen Checkoway
2014
conf/uss
On the Practical Exploitability of Dual EC in TLS Implementations.
Stephen Checkoway
Ruben Niederhagen
Adam Everspaugh
Matthew Green
Tanja Lange
Thomas Ristenpart
Daniel J. Bernstein
Jake Maskiewicz
Hovav Shacham
Matthew Fredrikson
2014
conf/uss
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM.
Caroline Tice
Tom Roeder
Peter Collingbourne
Stephen Checkoway
Úlfar Erlingsson
Luis Lozano
Geoff Pike
2011
conf/uss
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
Sarah Meiklejohn
Keaton Mowery
Stephen Checkoway
Hovav Shacham
2011
conf/uss
Putting Out a HIT: Crowdsourcing Malware Installs.
Chris Kanich
Stephen Checkoway
Keaton Mowery
2011
conf/uss
Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Stephen Checkoway
Damon McCoy
Brian Kantor
Danny Anderson
Hovav Shacham
Stefan Savage
Karl Koscher
Alexei Czeskis
Franziska Roesner
Tadayoshi Kohno
2010
conf/ccs
Return-oriented programming without returns.
Stephen Checkoway
Lucas Davi
Alexandra Dmitrienko
Ahmad-Reza Sadeghi
Hovav Shacham
Marcel Winandy
2010
conf/uss
Single-Ballot Risk-Limiting Audits Using Convex Optimization.
Stephen Checkoway
Anand D. Sarwate
2010
conf/sp
Experimental Security Analysis of a Modern Automobile.
Karl Koscher
Alexei Czeskis
Franziska Roesner
Shwetak N. Patel
Tadayoshi Kohno
Stephen Checkoway
Damon McCoy
Brian Kantor
Danny Anderson
Hovav Shacham
Stefan Savage
2009
conf/uss
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage.
Stephen Checkoway
Ariel J. Feldman
Brian Kantor
J. Alex Halderman
Edward W. Felten
Hovav Shacham
Coauthors
Aaron Schulman
(1)
Adam Everspaugh
(1)
Ahmad-Reza Sadeghi
(1)
Alex C. Snoeren
(2)
Alexandra Dmitrienko
(1)
Alexei Czeskis
(2)
Amrutha Ramesh
(1)
Anand D. Sarwate
(1)
Ariel J. Feldman
(1)
Brian Johannesmeyer
(1)
Brian Kantor
(3)
Brown Farinholt
(2)
Caroline Tice
(1)
Chris Comfort
(1)
Chris Kanich
(2)
Christina Garman
(1)
Corey Singleton
(1)
Damon McCoy
(2)
Daniel J. Bernstein
(1)
Danny Anderson
(2)
Devin Lundberg
(1)
Edward Sullivan
(1)
Edward W. Felten
(1)
Eric Rescorla
(2)
Eric Wustrow
(1)
Evan Johnson
(1)
Franziska Roesner
(2)
Geoff Pike
(1)
Hovav Shacham
(9)
J. Alex Halderman
(2)
Jacob Maskiewicz
(1)
Jake Maskiewicz
(1)
Jason Polakis
(1)
Joshua Fried
(1)
Joshua Mason
(1)
Karl Koscher
(3)
Keaton Mowery
(3)
Kirill Levchenko
(3)
Lucas Davi
(1)
Luis Lozano
(1)
Marcel Winandy
(1)
Matthew Brocker
(1)
Matthew Fredrikson
(1)
Matthew Green
(2)
Maxwell Bland
(1)
Mohammad Ghasemisharif
(1)
Nadia Heninger
(1)
Peter Collingbourne
(1)
Ralf-Philipp Weinmann
(1)
Ruben Niederhagen
(1)
Ryan A. Mast
(1)
Sam Crow
(1)
Sarah Meiklejohn
(1)
Shaanan Cohney
(1)
Shwetak N. Patel
(1)
Stefan Savage
(5)
Stephen Checkoway
(17)
Tadayoshi Kohno
(2)
Tanja Lange
(1)
Thomas Ristenpart
(1)
Tom Roeder
(1)
Tom Wypych
(1)
Úlfar Erlingsson
(1)
Willy R. Vasquez
(1)
Yifei Zhu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to