Experimental security analysis of a modern automobile K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ... 2010 IEEE symposium on security and privacy, 447-462, 2010 | 2497 | 2010 |
Comprehensive experimental analyses of automotive attack surfaces S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ... 20th USENIX security symposium (USENIX Security 11), 2011 | 2228 | 2011 |
Return-oriented programming without returns S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ... Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 823 | 2010 |
Enforcing {Forward-Edge}{Control-Flow} integrity in {GCC} & {LLVM} C Tice, T Roeder, P Collingbourne, S Checkoway, Ú Erlingsson, ... 23rd USENIX security symposium (USENIX security 14), 941-955, 2014 | 542 | 2014 |
Iago attacks: Why the system call API is a bad untrusted RPC interface S Checkoway, H Shacham ACM SIGARCH Computer Architecture News 41 (1), 253-264, 2013 | 374 | 2013 |
On the Practical Exploitability of Dual EC in TLS Implementations S Checkoway, M Fredrikson, R Niederhagen, M Green, T Lange, ... | 194* | |
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage. S Checkoway, AJ Feldman, B Kantor, JA Halderman, EW Felten, ... EVT/WOTE 2009, 2009 | 142 | 2009 |
A systematic analysis of the Juniper Dual EC incident S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 115 | 2016 |
O single {Sign-Off}, where art thou? An empirical analysis of single {Sign-On} account hijacking and session management on the web M Ghasemisharif, A Ramesh, S Checkoway, C Kanich, J Polakis 27th USENIX Security Symposium (USENIX Security 18), 1475-1492, 2018 | 85 | 2018 |
{iSeeYou}: Disabling the {MacBook} webcam indicator {LED} M Brocker, S Checkoway 23rd USENIX Security Symposium (USENIX Security 14), 337-352, 2014 | 72 | 2014 |
The Phantom Tollbooth:{Privacy-Preserving} Electronic Toll Collection in the Presence of Driver Collusion S Meiklejohn, K Mowery, S Checkoway, H Shacham 20th USENIX Security Symposium (USENIX Security 11), 2011 | 71 | 2011 |
Jetset: Targeted firmware rehosting for embedded systems E Johnson, M Bland, YF Zhu, J Mason, S Checkoway, S Savage, ... 30th USENIX Security Symposium (USENIX Security 21), 321-338, 2021 | 63 | 2021 |
Risk-limiting audits and the margin of victory in nonplurality elections AD Sarwate, S Checkoway, H Shacham Statistics, Politics, and Policy 4 (1), 29-64, 2013 | 37* | 2013 |
Security analysis of a {Full-Body} scanner K Mowery, E Wustrow, T Wypych, C Singleton, C Comfort, E Rescorla, ... 23rd USENIX Security Symposium (USENIX Security 14), 369-384, 2014 | 36 | 2014 |
Escape from return-oriented programming: Return-oriented programming without returns (on the x86) S Checkoway, H Shacham | 33 | 2010 |
Putting Out a {HIT}: Crowdsourcing Malware Installs C Kanich, S Checkoway 5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011 | 26 | 2011 |
Kollector: Detecting Fraudulent Activities on Mobile Devices Using Deep Learning L Sun, B Cao, J Wang, W Srisa-an, SY Philip, AD Leow, S Checkoway IEEE Transactions on Mobile Computing 20 (4), 1465-1476, 2020 | 24 | 2020 |
{Single-Ballot}{Risk-Limiting} Audits Using Convex Optimization S Checkoway, A Sarwate 2010 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2010 | 17 | 2010 |
Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer. S Checkoway, H Shacham, E Rescorla LEET, 2010 | 15 | 2010 |
On the security of mobile cockpit information systems D Lundberg, B Farinholt, E Sullivan, R Mast, S Checkoway, S Savage, ... Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 14 | 2014 |