Adam Aviv [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Knock, Knock. Who’s There? On the Security of LG’s Knock Codes SOUPS2020-2020 - Boston, United States
Scaling Hardware Accelerated Network Monitoring to Concurrent and Dynamic Queries With *Flow UsenixATCBoston-2018 - Boston, USA
ObliviSync: Practical Oblivious File Backup and Synchronization NDSS-2017 - california,usa
Reversing and Exploitation Exercises ASE-2016 - austin,usa
Enabling Practical Software-defined Networking Security Applications with OFX NDSS-2016 - california,usa
Is Bigger Better? Comparing User Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock ACSAC-2015 - los angeles,usa
Understanding Visual Perceptions of Usability and Security of Androids' Graphical Password Pattern ACSAC-2014 - new orleans,usa
Mobile Systems Security 1 ACSAC-2013 - New Orleans, USA
Tor Is Peace, Software Freedom Is Slavery, Wikipedia Is Truth Chaos Communication Congress-27 - Berlin, Germany Security
Smudge Attacks On Smartphone Touch Screens 4th USENIX Workshop on Offensive Technologies -2010 - Washington DC, USA Security
Evading Cellular Data Monitoring With Human Movement Networks 5th USENIX Workshop on Hot Topics in Security-2010 - Washington DC, USA Security
Twatfs: A Surly Abuse Of Social Networking LayerOne-2009 - Anaheim, USA Security
Hacking Democracy: An In Depth Analysis Of The Es&S Voting Systems The Last HOPE-2008 - USA Security Analysis
Climbing Everest: An Inside Look At Voting Systems Used By The State Of Ohio ShmooCon-2008 - Washington DC, USA Security Infrastructure Analysis