Следене
Stephen Checkoway
Stephen Checkoway
Assistant Professor at Oberlin College
Потвърден имейл адрес: oberlin.edu - Начална страница
Заглавие
Позовавания
Позовавания
Година
Experimental security analysis of a modern automobile
K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ...
2010 IEEE symposium on security and privacy, 447-462, 2010
20432010
Comprehensive experimental analyses of automotive attack surfaces
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
20th USENIX security symposium (USENIX Security 11), 2011
18142011
Return-oriented programming without returns
S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
7172010
Enforcing {Forward-Edge}{Control-Flow} Integrity in {GCC} & {LLVM}
C Tice, T Roeder, P Collingbourne, S Checkoway, Ú Erlingsson, ...
23rd USENIX security symposium (USENIX security 14), 941-955, 2014
4472014
Iago attacks: Why the system call API is a bad untrusted RPC interface
S Checkoway, H Shacham
ACM SIGARCH Computer Architecture News 41 (1), 253-264, 2013
2932013
On the Practical Exploitability of Dual EC in TLS Implementations
S Checkoway, M Fredrikson, R Niederhagen, M Green, T Lange, ...
150*
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage.
S Checkoway, AJ Feldman, B Kantor, JA Halderman, EW Felten, ...
EVT/WOTE 2009, 2009
1412009
A systematic analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
902016
The Phantom Tollbooth:{Privacy-Preserving} Electronic Toll Collection in the Presence of Driver Collusion
S Meiklejohn, K Mowery, S Checkoway, H Shacham
20th USENIX Security Symposium (USENIX Security 11), 2011
622011
{iSeeYou}: Disabling the {MacBook} Webcam Indicator {LED}
M Brocker, S Checkoway
23rd USENIX Security Symposium (USENIX Security 14), 337-352, 2014
602014
O Single {Sign-Off}, Where Art Thou? An Empirical Analysis of Single {Sign-On} Account Hijacking and Session Management on the Web
M Ghasemisharif, A Ramesh, S Checkoway, C Kanich, J Polakis
27th USENIX Security Symposium (USENIX Security 18), 1475-1492, 2018
392018
Escape from return-oriented programming: Return-oriented programming without returns (on the x86)
S Checkoway, H Shacham
[Department of Computer Science and Engineering], University of California …, 2010
312010
Security Analysis of a {Full-Body} Scanner
K Mowery, E Wustrow, T Wypych, C Singleton, C Comfort, E Rescorla, ...
23rd USENIX Security Symposium (USENIX Security 14), 369-384, 2014
292014
Risk-limiting audits and the margin of victory in nonplurality elections
AD Sarwate, S Checkoway, H Shacham
Statistics, Politics, and Policy 4 (1), 29-64, 2013
28*2013
Putting Out a {HIT}: Crowdsourcing Malware Installs
C Kanich, S Checkoway
5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011
242011
{Single-Ballot}{Risk-Limiting} Audits Using Convex Optimization
S Checkoway, A Sarwate
2010 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2010
142010
Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer.
S Checkoway, H Shacham, E Rescorla
LEET, 2010
132010
Jetset: Targeted firmware rehosting for embedded systems
E Johnson, M Bland, YF Zhu, J Mason, S Checkoway, S Savage, ...
30th USENIX Security Symposium (USENIX Security 21), 321-338, 2021
122021
On the security of mobile cockpit information systems
D Lundberg, B Farinholt, E Sullivan, R Mast, S Checkoway, S Savage, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
112014
Kollector: Detecting Fraudulent Activities on Mobile Devices Using Deep Learning
L Sun, B Cao, J Wang, W Srisa-an, SY Philip, AD Leow, S Checkoway
IEEE Transactions on Mobile Computing 20 (4), 1465-1476, 2020
102020
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20