Keaton Mowery
Keaton Mowery
Bestätigte E-Mail-Adresse bei cs.ucsd.edu
Titel
Zitiert von
Zitiert von
Jahr
Pixel perfect: Fingerprinting canvas in HTML5
K Mowery, H Shacham
Proceedings of W2SP, 1-12, 2012
3392012
Fingerprinting information in JavaScript implementations
K Mowery, D Bogenreif, S Yilek, H Shacham
Proceedings of W2SP 2 (11), 2011
1942011
On subnormal floating point and abnormal timing
M Andrysco, D Kohlbrenner, K Mowery, R Jhala, S Lerner, H Shacham
2015 IEEE Symposium on Security and Privacy, 623-639, 2015
1132015
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
S Meiklejohn, K Mowery, S Checkoway, H Shacham
USENIX security symposium 201 (1), 2011
562011
Are aes x86 cache timing attacks still feasible?
K Mowery, S Keelveedhi, H Shacham
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 19-24, 2012
542012
Heat of the moment: Characterizing the efficacy of thermal camera-based attacks
K Mowery, S Meiklejohn, S Savage
Proceedings of the 5th USENIX conference on Offensive technologies, 6-6, 2011
542011
Welcome to the Entropics: Boot-time entropy in embedded devices
K Mowery, M Wei, D Kohlbrenner, H Shacham, S Swanson
2013 IEEE Symposium on Security and Privacy, 589-603, 2013
252013
Security analysis of a full-body scanner
K Mowery, E Wustrow, T Wypych, C Singleton, C Comfort, E Rescorla, ...
23rd {USENIX} Security Symposium ({USENIX} Security 14), 369-384, 2014
222014
Wireless communication system capable of saving time for mutual data communication in sniff mode
J Park
US Patent 7,330,445, 2008
21*2008
Putting Out a HIT: Crowdsourcing Malware Installs.
C Kanich, S Checkoway, K Mowery
WOOT, 71-80, 2011
172011
Efficient User-Guided Ballot Image Verification.
A Cordero, T Ji, A Tsai, K Mowery, DA Wagner
EVT/WOTE, 2010
62010
Key registration transparency for secure messaging
BE Basile, KF Mowery, YL Sierra, F Jacobs, RW Baker
US Patent App. 16/888,157, 2020
2020
Efficient implementation for differential privacy using cryptographic functions
YL Sierra, AG Thakurta, US Vaishampayan, JC Hurley, KF Mowery, ...
US Patent App. 16/746,683, 2020
2020
Efficient implementation for differential privacy using cryptographic functions
YL Sierra, AG Thakurta, US Vaishampayan, JC Hurley, KF Mowery, ...
US Patent 10,552,631, 2020
2020
Synchronizing content
PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ...
US Patent App. 16/428,914, 2019
2019
Synchronizing content
PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ...
US Patent App. 15/996,390, 2018
2018
Synchronizing content
PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ...
US Patent App. 15/996,403, 2018
2018
Synchronizing content
PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ...
US Patent App. 15/996,387, 2018
2018
Beneath the Attack Surface
K Mowery
UC San Diego, 2015
2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–19