Karl Koscher
Karl Koscher
Research Scientist in Computer Science and Engineering, University of Washington
Dirección de correo verificada de cs.washington.edu - Página principal
Título
Citado por
Citado por
Año
Experimental security analysis of a modern automobile
K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ...
2010 IEEE Symposium on Security and Privacy, 447-462, 2010
14672010
Comprehensive experimental analyses of automotive attack surfaces.
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
USENIX Security Symposium 4, 447-462, 2011
12392011
The mobile sensing platform: An embedded activity recognition system
T Choudhury, S Consolvo, B Harrison, J Hightower, A LaMarca, ...
IEEE Pervasive Computing 7 (2), 32-41, 2008
7142008
Following directions using statistical machine translation
C Matuszek, D Fox, K Koscher
2010 5th ACM/IEEE International Conference on Human-Robot Interaction (HRI …, 2010
1592010
A spotlight on security and privacy risks with future household robots: attacks and lessons
T Denning, C Matuszek, K Koscher, JR Smith, T Kohno
Proceedings of the 11th international conference on Ubiquitous computing …, 2009
1352009
Fast and vulnerable: A story of telematic failures
I Foster, A Prudhomme, K Koscher, S Savage
9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), 2015
1332015
Automobile driver fingerprinting
M Enev, A Takakuwa, K Koscher, T Kohno
Proceedings on Privacy Enhancing Technologies 2016 (1), 34-50, 2016
1272016
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond
K Koscher, A Juels, V Brajkovic, T Kohno
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1112009
RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications
A Czeskis, K Koscher, JR Smith, T Kohno
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1102008
Collaborative verification of information flow for a high-assurance app store
MD Ernst, R Just, S Millstein, W Dietl, S Pernsteiner, F Roesner, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
932014
Defeating Encrypted and Deniable File Systems: TrueCrypt v5. 1a and the Case of the Tattling OS and Applications.
A Czeskis, DJS Hilaire, K Koscher, SD Gribble, T Kohno, B Schneier
HotSec, 2008
692008
Longitudinal study of a building-scale rfid ecosystem
E Welbourne, K Koscher, E Soroush, M Balazinska, G Borriello
Proceedings of the 7th international conference on Mobile systems …, 2009
342009
Computer Security, Privacy, and {DNA} Sequencing: Compromising Computers with Synthesized {DNA}, Privacy Leaks, and More
P Ney, K Koscher, L Organick, L Ceze, T Kohno
26th {USENIX} Security Symposium ({USENIX} Security 17), 765-779, 2017
202017
Exploring controller area networks
I Foster, K Koscher
login. USENIX Association 40 (6), 2015
202015
vpwns: Virtual pwned networks
J Appelbaum, M Ray, K Koscher, I Finder
2nd USENIX Workshop on Free and Open Communications on the Internet. USENIX …, 2012
172012
{SURROGATES}: Enabling near-real-time dynamic analyses of embedded systems
K Koscher, T Kohno, D Molnar
9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), 2015
142015
Context to make you more aware
A Andrew, Y Anokwa, K Koscher, J Lester, G Borriello
27th International Conference on Distributed Computing Systems Workshops …, 2007
122007
Radio frequency identification secret handshakes
T Kohno, A Czeskis, K Koscher, JR Smith
US Patent 8,643,475, 2014
112014
EPC RFID Tags in Security Applications: Passport Cards
K Koscher, A Juels, T Kohno, V Brajkovic
Enhanced Drivers Licenses, and Beyond, 2008
82008
Multi-player soccer and wireless embedded systems
G Borriello, C Hartung, B Hemingway, K Koscher, B Mayton
ACM SIGCSE Bulletin 40 (1), 82-86, 2008
72008
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20