Seguir
Stephen Checkoway
Stephen Checkoway
Associate Professor at Oberlin College
Dirección de correo verificada de oberlin.edu - Página principal
Título
Citado por
Citado por
Año
Experimental security analysis of a modern automobile
K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ...
2010 IEEE symposium on security and privacy, 447-462, 2010
24582010
Comprehensive experimental analyses of automotive attack surfaces
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
20th USENIX security symposium (USENIX Security 11), 2011
21622011
Return-oriented programming without returns
S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
8222010
Enforcing {Forward-Edge}{Control-Flow} integrity in {GCC} & {LLVM}
C Tice, T Roeder, P Collingbourne, S Checkoway, Ú Erlingsson, ...
23rd USENIX security symposium (USENIX security 14), 941-955, 2014
5312014
Iago attacks: Why the system call API is a bad untrusted RPC interface
S Checkoway, H Shacham
ACM SIGARCH Computer Architecture News 41 (1), 253-264, 2013
3612013
On the Practical Exploitability of Dual EC in TLS Implementations
S Checkoway, M Fredrikson, R Niederhagen, M Green, T Lange, ...
188*
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage.
S Checkoway, AJ Feldman, B Kantor, JA Halderman, EW Felten, ...
EVT/WOTE 2009, 2009
1432009
A systematic analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1102016
O single {Sign-Off}, where art thou? An empirical analysis of single {Sign-On} account hijacking and session management on the web
M Ghasemisharif, A Ramesh, S Checkoway, C Kanich, J Polakis
27th USENIX Security Symposium (USENIX Security 18), 1475-1492, 2018
792018
The Phantom Tollbooth:{Privacy-Preserving} Electronic Toll Collection in the Presence of Driver Collusion
S Meiklejohn, K Mowery, S Checkoway, H Shacham
20th USENIX Security Symposium (USENIX Security 11), 2011
732011
{iSeeYou}: Disabling the {MacBook} webcam indicator {LED}
M Brocker, S Checkoway
23rd USENIX Security Symposium (USENIX Security 14), 337-352, 2014
692014
Jetset: Targeted firmware rehosting for embedded systems
E Johnson, M Bland, YF Zhu, J Mason, S Checkoway, S Savage, ...
30th USENIX Security Symposium (USENIX Security 21), 321-338, 2021
562021
Security analysis of a {Full-Body} scanner
K Mowery, E Wustrow, T Wypych, C Singleton, C Comfort, E Rescorla, ...
23rd USENIX Security Symposium (USENIX Security 14), 369-384, 2014
362014
Risk-limiting audits and the margin of victory in nonplurality elections
AD Sarwate, S Checkoway, H Shacham
Statistics, Politics, and Policy 4 (1), 29-64, 2013
36*2013
Escape from return-oriented programming: Return-oriented programming without returns (on the x86)
S Checkoway, H Shacham
342010
Kollector: Detecting Fraudulent Activities on Mobile Devices Using Deep Learning
L Sun, B Cao, J Wang, W Srisa-an, SY Philip, AD Leow, S Checkoway
IEEE Transactions on Mobile Computing 20 (4), 1465-1476, 2020
252020
Putting Out a {HIT}: Crowdsourcing Malware Installs
C Kanich, S Checkoway
5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011
252011
{Single-Ballot}{Risk-Limiting} Audits Using Convex Optimization
S Checkoway, A Sarwate
2010 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2010
162010
Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer.
S Checkoway, H Shacham, E Rescorla
LEET, 2010
152010
On the security of mobile cockpit information systems
D Lundberg, B Farinholt, E Sullivan, R Mast, S Checkoway, S Savage, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
132014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20