Tadayoshi Kohno [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More usenixsecurity-2017 - vancouver,canada
Internet Censorship in Thailand: User practices, potential threats and necessary responses EuroSP-2017 - paris,france
Teaching Computer Security: Thoughts from the Field USENIX-2016 - austin,usa
Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016 USENIX-2016 - austin,usa
Automobile Driver Fingerprinting PETS-2016 - darmstadt,germany
Computer Security and the Internet of Things Enigma-2016 - san francisco,usa
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems WOOT-2015 - washington,USA
Experimental Analysis of Denial-of-Service Attacks on Teleoperated Robotic Systems ICCPS-2015 - Seattle,USA
CPS: Beyond Usability: Applying VSD-Based Methodologies to Investigate Domain Characteristics for Security for Implantable Cardiac Devices ACSAC-2014 - new orleans,usa
World-Driven Access Control for Continuous Sensing CCS-2014 - Scottsdale,USA
Safer Sign-Ons usenix-2014 - san diego,usa
Polymorphism as a Defense for Automated Attack of Websites ACNS-2014 - Lausanne, Switzerland
Securing Smart Machines: Where We Are, Where We Want to Be, and Challenges RSACon-2014 - San Francisco, USA
Keynote 1: PRDC-2013 - Vancouver,Canada
Securing Embedded User Interfaces: Android and Beyond USENIX-2013 - Washington, D.C.
Welcome and Awards USENIX-2012 - Washington, D.C.
CONTROL-ALT-HACK(TM): WHITE HAT HACKING FOR FUN AND PROFIT (A COMPUTER SECURITY CARD GAME) BlackHat USA-2012 - Las Vegas, USA Security Games
Detecting and Defending Against Third-Party Tracking on the Web 9th USENIX Symposium on Networked Systems Design and Implementation-2012 - San Jose, USA
Televisions, Video Privacy, and Powerline Electromagnetic Interference Confrence-on-computer-communications-security-2011 - Chicago, USA
Vanish: Increasing Data Privacy With Self-Destructing Data 18th USENIX Security Symposium-2009 - Montreal, Canada Security Privacy
Panel: Hacking In The Name Of Science DEF CON-16 - Las Vegas, USA Security
New Classes Of Security And Privacy Vulnerabilities For Implantable Wireless Medical Devices Blackhat USA-2008 - Las Vegas, USA Security Wireless Privacy
Privacy-Preserving Location Tracking Of Lost Or Stolen Devices: Cryptographic Techniques And Replacing Trusted Third Parties With Dhts 17th USENIX Security Symposium-2008 - San Jose, USA Security
Absence Makes The Heart Grow Fonder: New Directions For Implantable Medical Device Security 3rd USENIX Workshop on Hot Topics in Security-2008 - San Jose, USA Security
Defeating Encrypted And Deniable File Systems: Truecrypt V5.1A And The Case Of The Tattling Os And Applications 3rd USENIX Workshop on Hot Topics in Security-2008 - San Jose, USA Security
Challenges And Directions For Monitoring P2P File Sharing Networksóorówhy My Printer Received A Dmca Takedown Notice 3rd USENIX Workshop on Hot Topics in Security-2008 - San Jose, USA Security
Authentication 16th USENIX Security Symposium-2007 - Boston, USA Security
Devices That Tell On You: Privacy Trends In Consumer Ubiquitous Computing 16th USENIX Security Symposium-2007 - Boston, USA Security Privacy
Designing Voting Machines For Verification 15th USENIX Security Symposium-2006 - Vancouver, Canada Security