Подписаться
Adam J Aviv
Adam J Aviv
Подтвержден адрес электронной почты в домене email.gwu.edu - Главная страница
Название
Процитировано
Процитировано
Год
Smudge attacks on smartphone touch screens
AJ Aviv, K Gibson, E Mossop, M Blaze, JM Smith
4th USENIX workshop on offensive technologies (WOOT 10), 2010
10592010
Practicality of accelerometer side channels on smartphones
AJ Aviv, B Sapp, M Blaze, JM Smith
Proceedings of the 28th annual computer security applications conference, 41-50, 2012
3032012
Scaling hardware accelerated network monitoring to concurrent and dynamic queries with {* Flow}
J Sonchack, O Michel, AJ Aviv, E Keller, JM Smith
2018 USENIX Annual Technical Conference (USENIX ATC 18), 823-835, 2018
1112018
Challenges in experimenting with botnet detection systems
AJ Aviv, A Haeberlen
4th Workshop on Cyber Security Experimentation and Test (CSET 11), 2011
1012011
Turboflow: Information rich flow record generation on commodity switches
J Sonchack, AJ Aviv, E Keller, JM Smith
Proceedings of the Thirteenth EuroSys Conference, 1-16, 2018
982018
Enabling Practical Software-defined Networking Security Applications with OFX.
J Sonchack, JM Smith, AJ Aviv, E Keller
NDSS 16, 1-15, 2016
942016
Is bigger better? Comparing user-generated passwords on 3x3 vs. 4x4 grid sizes for android's pattern unlock
AJ Aviv, D Budzitowski, R Kuber
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
902015
Towards baselines for shoulder surfing on mobile authentication
AJ Aviv, JT Davin, F Wolf, R Kuber
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
802017
A practical oblivious map data structure with secure deletion and history independence
DS Roche, A Aviv, SG Choi
2016 IEEE Symposium on Security and Privacy (SP), 178-197, 2016
762016
This pin can be easily guessed: Analyzing the security of smartphone unlock pins
P Markert, DV Bailey, M Golla, M Dürmuth, AJ Aviv
2020 IEEE Symposium on Security and Privacy (SP), 286-303, 2020
682020
Timing-based reconnaissance and defense in software-defined networks
J Sonchack, A Dubey, AJ Aviv, JM Smith, E Keller
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
592016
Why older adults (Don't) use password managers
H Ray, F Wolf, R Kuber, AJ Aviv
30th USENIX Security Symposium (USENIX Security 21), 73-90, 2021
572021
Examining the examiners: Students' privacy and security perceptions of online proctoring services
DG Balash, D Kim, D Shaibekova, RA Fainchtein, M Sherr, AJ Aviv
Seventeenth symposium on usable privacy and security (SOUPS 2021), 633-652, 2021
562021
Security evaluation of ES&S voting machines and election management system
A Aviv, P Černy, S Clark, E Cronin, G Shah, M Sherr, M Blaze
Proceedings of the conference on Electronic voting technology, 1-13, 2008
552008
A video-based attack for android pattern lock
G Ye, Z Tang, D Fang, X Chen, W Wolff, AJ Aviv, Z Wang
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-31, 2018
542018
" Now I'm a bit {angry:}" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them
P Mayer, Y Zou, F Schaub, AJ Aviv
30th USENIX Security Symposium (USENIX Security 21), 393-410, 2021
442021
Differential privacy for collaborative security
J Reed, AJ Aviv, D Wagner, A Haeberlen, BC Pierce, JM Smith
Proceedings of the Third European Workshop on System Security, 1-7, 2010
432010
Are privacy dashboards good for end users? Evaluating user perceptions and reactions to google's my activity
FM Farke, DG Balash, M Golla, M Dürmuth, AJ Aviv
30th USENIX Security Symposium (USENIX Security 21), 483-500, 2021
392021
Understanding visual perceptions of usability and security of Android's graphical password pattern
AJ Aviv, D Fichter
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
392014
Deterministic, stash-free write-only oram
DS Roche, A Aviv, SG Choi, T Mayberry
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
352017
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20