Author image not provided
 Tadayoshi Kohno

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article29.30
Citation Count1,963
Publication count67
Publication years2000-2017
Available for download31
Average downloads per article3,403.58
Downloads (cumulative)105,511
Downloads (12 Months)2,763
Downloads (6 Weeks)302
SEARCH
ROLE
Arrow RightAuthor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


69 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 69
Result page: 1 2 3 4

Sort by:

1 published by ACM
October 2017 CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 8,   Downloads (12 Months): 127,   Downloads (Overall): 127

Full text available: PDFPDF
The Internet Archive's Wayback Machine is the largest modern web archive, preserving web content since 1996. We discover and analyze several vulnerabilities in how the Wayback Machine archives data, and then leverage these vulnerabilities to create what are to our knowledge the first attacks against a user's view of the ...
Keywords: web archives, web security

2 published by ACM
October 2017 WPES '17: Proceedings of the 2017 on Workshop on Privacy in the Electronic Society
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 8,   Downloads (12 Months): 67,   Downloads (Overall): 67

Full text available: PDFPDF
The online advertising ecosystem is built upon the ability of advertising networks to know properties about users (e.g., their interests or physical locations) and deliver targeted ads based on those properties. Much of the privacy debate around online advertising has focused on the harvesting of these properties by the advertising ...
Keywords: surveillance, targeted advertising, adint, location, privacy, online advertising

3 published by ACM
September 2017 Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies: Volume 1 Issue 3, September 2017
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 11,   Downloads (12 Months): 199,   Downloads (Overall): 372

Full text available: PDFPDF
This paper contributes a novel method for low-cost, covert physical sensing and, by doing so, surfaces new privacy threats. We demonstrate how a smartphone and portable speaker playing music with embedded, inaudible signals can track multiple individuals’ locations and activities both within a room and through barriers in 2D space. ...
Keywords: Active Sonar, Information leakage, Motion tracking, Music processing

4
August 2017 SEC'17: Proceedings of the 26th USENIX Conference on Security Symposium
Publisher: USENIX Association
Bibliometrics:
Citation Count: 0

The rapid improvement in DNA sequencing has sparked a big data revolution in genomic sciences, which has in turn led to a proliferation of bioinformatics tools. To date, these tools have encountered little adversarial pressure. This paper evaluates the robustness of such tools if (or when ) adversarial attacks manifest. ...

5
April 2017 WWW '17: Proceedings of the 26th International Conference on World Wide Web
Publisher: International World Wide Web Conferences Steering Committee
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 15,   Downloads (12 Months): 125,   Downloads (Overall): 211

Full text available: PDFPDF
Online dating services let users expand their dating pool beyond their social network and specify important characteristics of potential partners. To assess compatibility, users share personal information -- e.g., identifying details or sensitive opinions about sexual preferences or worldviews -- in profiles or in one-on-one communication. Thus, participating in online ...
Keywords: human values, privacy, security, information disclosure, online dating

6
August 2016 SEC'16: Proceedings of the 25th USENIX Conference on Security Symposium
Publisher: USENIX Association
Bibliometrics:
Citation Count: 1

Though web tracking and its privacy implications have received much attention in recent years, that attention has come relatively recently in the history of the web and lacks full historical context. In this paper, we present longitudinal measurements of third-party web tracking behaviors from 1996 to present (2016). Our tool, ...

7
June 2016 USENIX ATC '16: Proceedings of the 2016 USENIX Conference on Usenix Annual Technical Conference
Publisher: USENIX Association
Bibliometrics:
Citation Count: 0

Satellite is a methodology, tool chain, and data-set for understanding global trends in website deployment and accessibility using only a single or small number of standard measurement nodes. Satellite collects information on DNS resolution and resource availability around the Internet by probing the IPv4 address space. These measurements are valuable ...

8
May 2016 IEEE Software: Volume 33 Issue 3, May 2016
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 0

Building a secure system requires proactive, rigorous analysis of the threats to which it might be exposed, followed by systematic transformation of those threats into security-related requirements. These requirements can then be tracked throughout the development life cycle. The Web extra at https://youtu.be/77FTWWj1clk is an audio podcast of author Jane ...

9 published by ACM
April 2014 Communications of the ACM: Volume 57 Issue 4, April 2014
Publisher: ACM
Bibliometrics:
Citation Count: 14
Downloads (6 Weeks): 67,   Downloads (12 Months): 722,   Downloads (Overall): 69,016

Full text available: HtmlHtml  PDFPDF  PDF Chinese translationPDF Chinese translation
AR systems pose potential security concerns that should be addressed before the systems become widespread.

10 published by ACM
November 2013 CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 11,   Downloads (12 Months): 82,   Downloads (Overall): 700

Full text available: PDFPDF
We scoped, designed, produced, and evaluated the effectiveness of a recreational tabletop card game created to raise awareness of and alter perceptions regarding-computer security. We discuss our process, the challenges that arose, and the decisions we made to address those challenges. As of May 2013, we have shipped approximately 800 ...
Keywords: card game, computer science education, privacy, security, security education, tabletop games, outreach, tabletop security, computer security education, security awareness, computer security and privacy, game, security outreach

11 published by ACM
March 2013 SIGCSE '13: Proceeding of the 44th ACM technical symposium on Computer science education
Publisher: ACM
Bibliometrics:
Citation Count: 3

In this poster, we present Control-Alt-Hack": White Hat Hacking for Fun and Profit--a card game for computer security outreach and education. A general lack of awareness about computer security contributes to the insecurity of new consumer technologies. We seek to increase people's prioritization of computer security and their understanding of ...
Keywords: awareness, card game, computer security, education, outreach, security

12 published by ACM
January 2013 Communications of the ACM: Volume 56 Issue 1, January 2013
Publisher: ACM
Bibliometrics:
Citation Count: 15
Downloads (6 Weeks): 64,   Downloads (12 Months): 507,   Downloads (Overall): 10,888

Full text available: HtmlHtml  PDFPDF
A framework for evaluating security risks associated with technologies used at home.

13
May 2012 SP '12: Proceedings of the 2012 IEEE Symposium on Security and Privacy
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 63

Modern client platforms, such as iOS, Android, Windows Phone, Windows 8, and web browsers, run each application in an isolated environment with limited privileges. A pressing open problem in such systems is how to allow users to grant applications access to user-owned resources, e.g., to privacy- and cost-sensitive devices like ...
Keywords: access control, user-driven access control, user intent, operating systems, access control gadgets, ACGs, permission granting, permissions, least-privilege, user-owned resources

14
April 2012 NSDI'12: Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Publisher: USENIX Association
Bibliometrics:
Citation Count: 66

While third-party tracking on the web has garnered much attention, its workings remain poorly understood. Our goal is to dissect how mainstream web tracking occurs in the wild. We develop a client-side method for detecting and classifying five kinds of third-party trackers based on how they manipulate browser state. We ...

15 published by ACM
April 2012 WISEC '12: Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 17,   Downloads (12 Months): 104,   Downloads (Overall): 697

Full text available: PDFPDF
Today's and tomorrow's emerging technologies and cyber-physical systems have the potential to greatly improve the quality of our lives. Without the appropriate checks and balances, however, these emerging technologies also have the potential to compromise our digital and physical security and privacy. This talk will explore three case studies in ...
Keywords: cyber-physical systems, security

16 published by ACM
October 2011 CCS '11: Proceedings of the 18th ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 7
Downloads (6 Weeks): 5,   Downloads (12 Months): 28,   Downloads (Overall): 434

Full text available: PDFPDF
We conduct an extensive study of information leakage over the powerline infrastructure from eight televisions (TVs) spanning multiple makes, models, and underlying technologies. In addition to being of scientific interest, our findings contribute to the overall debate of whether or not measurements of residential powerlines reveal significant information about the ...
Keywords: electromagnetic interference, information leakage, powerline security

17
August 2011 SEC'11: Proceedings of the 20th USENIX conference on Security
Publisher: USENIX Association
Bibliometrics:
Citation Count: 102

Modern automobiles are pervasively computerized, and hence potentially vulnerable to attack. However, while previous research has shown that the internal networks within some modern cars are insecure, the associated threat model--requiring prior physical access--has justifiably been viewed as unrealistic. Thus, it remains an open question if automobiles can also be ...

18 published by ACM
May 2011 Communications of the ACM: Volume 54 Issue 5, May 2011
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 5,   Downloads (12 Months): 51,   Downloads (Overall): 1,375

Full text available: HtmlHtml  PDFPDF
Privacy-preserving attribution of IP packets can help balance forensics with an individual's right to privacy.

19 published by ACM
April 2011 EuroSys '11: Proceedings of the sixth conference on Computer systems
Publisher: ACM
Bibliometrics:
Citation Count: 21
Downloads (6 Weeks): 1,   Downloads (12 Months): 10,   Downloads (Overall): 546

Full text available: PDFPDF
This paper presents Keypad, an auditing file system for theft-prone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine-grained file auditing: a user can obtain explicit evidence that no files have been accessed after a device's loss. Second, a user can disable future ...
Keywords: file system, keypad, theft-prone, auditing

20 published by ACM
March 2011 SIGCSE '11: Proceedings of the 42nd ACM technical symposium on Computer science education
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 12,   Downloads (Overall): 188

Full text available: PDFPDF
Computer security courses typically cover a breadth of technical topics, including threat modeling, applied cryptography, software security, and Web security. The technical artifacts of computer systems - and their associated computer security risks and defenses - do not exist in isolation, however; rather, these systems interact intimately with the needs, ...
Keywords: computer science, computer security, prototyping, science fiction, science fiction prototyping, security mindset



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us