Smudge attacks on smartphone touch screens AJ Aviv, K Gibson, E Mossop, M Blaze, JM Smith 4th USENIX workshop on offensive technologies (WOOT 10), 2010 | 1067 | 2010 |
Practicality of accelerometer side channels on smartphones AJ Aviv, B Sapp, M Blaze, JM Smith Proceedings of the 28th annual computer security applications conference, 41-50, 2012 | 304 | 2012 |
Scaling hardware accelerated network monitoring to concurrent and dynamic queries with {* Flow} J Sonchack, O Michel, AJ Aviv, E Keller, JM Smith 2018 USENIX Annual Technical Conference (USENIX ATC 18), 823-835, 2018 | 115 | 2018 |
Turboflow: Information rich flow record generation on commodity switches J Sonchack, AJ Aviv, E Keller, JM Smith Proceedings of the Thirteenth EuroSys Conference, 1-16, 2018 | 102 | 2018 |
Challenges in experimenting with botnet detection systems AJ Aviv, A Haeberlen 4th Workshop on Cyber Security Experimentation and Test (CSET 11), 2011 | 101 | 2011 |
Enabling Practical Software-defined Networking Security Applications with OFX. J Sonchack, JM Smith, AJ Aviv, E Keller NDSS 16, 1-15, 2016 | 94 | 2016 |
Is bigger better? Comparing user-generated passwords on 3x3 vs. 4x4 grid sizes for android's pattern unlock AJ Aviv, D Budzitowski, R Kuber Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 90 | 2015 |
Towards baselines for shoulder surfing on mobile authentication AJ Aviv, JT Davin, F Wolf, R Kuber Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 81 | 2017 |
A practical oblivious map data structure with secure deletion and history independence DS Roche, A Aviv, SG Choi 2016 IEEE Symposium on Security and Privacy (SP), 178-197, 2016 | 77 | 2016 |
This pin can be easily guessed: Analyzing the security of smartphone unlock pins P Markert, DV Bailey, M Golla, M Dürmuth, AJ Aviv 2020 IEEE Symposium on Security and Privacy (SP), 286-303, 2020 | 68 | 2020 |
Why older adults (Don't) use password managers H Ray, F Wolf, R Kuber, AJ Aviv 30th USENIX Security Symposium (USENIX Security 21), 73-90, 2021 | 62 | 2021 |
Examining the examiners: Students' privacy and security perceptions of online proctoring services DG Balash, D Kim, D Shaibekova, RA Fainchtein, M Sherr, AJ Aviv Seventeenth symposium on usable privacy and security (SOUPS 2021), 633-652, 2021 | 61 | 2021 |
Timing-based reconnaissance and defense in software-defined networks J Sonchack, A Dubey, AJ Aviv, JM Smith, E Keller Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 60 | 2016 |
A video-based attack for android pattern lock G Ye, Z Tang, D Fang, X Chen, W Wolff, AJ Aviv, Z Wang ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-31, 2018 | 55 | 2018 |
Security evaluation of ES&S voting machines and election management system A Aviv, P Černy, S Clark, E Cronin, G Shah, M Sherr, M Blaze Proceedings of the conference on Electronic voting technology, 1-13, 2008 | 55 | 2008 |
" Now I'm a bit {angry:}" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them P Mayer, Y Zou, F Schaub, AJ Aviv 30th USENIX Security Symposium (USENIX Security 21), 393-410, 2021 | 47 | 2021 |
Differential privacy for collaborative security J Reed, AJ Aviv, D Wagner, A Haeberlen, BC Pierce, JM Smith Proceedings of the Third European Workshop on System Security, 1-7, 2010 | 43 | 2010 |
Are privacy dashboards good for end users? Evaluating user perceptions and reactions to google's my activity FM Farke, DG Balash, M Golla, M Dürmuth, AJ Aviv 30th USENIX Security Symposium (USENIX Security 21), 483-500, 2021 | 40 | 2021 |
Understanding visual perceptions of usability and security of Android's graphical password pattern AJ Aviv, D Fichter Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 39 | 2014 |
Deterministic, stash-free write-only oram DS Roche, A Aviv, SG Choi, T Mayberry Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 36 | 2017 |