Suivre
Adam J Aviv
Adam J Aviv
Adresse e-mail validée de email.gwu.edu - Page d'accueil
Titre
Citée par
Citée par
Année
Smudge attacks on smartphone touch screens
AJ Aviv, K Gibson, E Mossop, M Blaze, JM Smith
4th USENIX workshop on offensive technologies (WOOT 10), 2010
10562010
Practicality of accelerometer side channels on smartphones
AJ Aviv, B Sapp, M Blaze, JM Smith
Proceedings of the 28th annual computer security applications conference, 41-50, 2012
3032012
Scaling hardware accelerated network monitoring to concurrent and dynamic queries with {* Flow}
J Sonchack, O Michel, AJ Aviv, E Keller, JM Smith
2018 USENIX Annual Technical Conference (USENIX ATC 18), 823-835, 2018
1092018
Challenges in experimenting with botnet detection systems
AJ Aviv, A Haeberlen
4th Workshop on Cyber Security Experimentation and Test (CSET 11), 2011
1002011
Turboflow: Information rich flow record generation on commodity switches
J Sonchack, AJ Aviv, E Keller, JM Smith
Proceedings of the Thirteenth EuroSys Conference, 1-16, 2018
952018
Enabling Practical Software-defined Networking Security Applications with OFX.
J Sonchack, JM Smith, AJ Aviv, E Keller
NDSS 16, 1-15, 2016
942016
Is bigger better? Comparing user-generated passwords on 3x3 vs. 4x4 grid sizes for android's pattern unlock
AJ Aviv, D Budzitowski, R Kuber
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
882015
Towards baselines for shoulder surfing on mobile authentication
AJ Aviv, JT Davin, F Wolf, R Kuber
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
802017
A practical oblivious map data structure with secure deletion and history independence
DS Roche, A Aviv, SG Choi
2016 IEEE Symposium on Security and Privacy (SP), 178-197, 2016
742016
This pin can be easily guessed: Analyzing the security of smartphone unlock pins
P Markert, DV Bailey, M Golla, M Dürmuth, AJ Aviv
2020 IEEE Symposium on Security and Privacy (SP), 286-303, 2020
652020
Timing-based reconnaissance and defense in software-defined networks
J Sonchack, A Dubey, AJ Aviv, JM Smith, E Keller
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
592016
Why older adults (Don't) use password managers
H Ray, F Wolf, R Kuber, AJ Aviv
30th USENIX Security Symposium (USENIX Security 21), 73-90, 2021
572021
Examining the examiners: Students' privacy and security perceptions of online proctoring services
DG Balash, D Kim, D Shaibekova, RA Fainchtein, M Sherr, AJ Aviv
Seventeenth symposium on usable privacy and security (SOUPS 2021), 633-652, 2021
552021
Security evaluation of ES&S voting machines and election management system
A Aviv, P Černy, S Clark, E Cronin, G Shah, M Sherr, M Blaze
Proceedings of the conference on Electronic voting technology, 1-13, 2008
552008
A video-based attack for android pattern lock
G Ye, Z Tang, D Fang, X Chen, W Wolff, AJ Aviv, Z Wang
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-31, 2018
542018
Differential privacy for collaborative security
J Reed, AJ Aviv, D Wagner, A Haeberlen, BC Pierce, JM Smith
Proceedings of the Third European Workshop on System Security, 1-7, 2010
432010
" Now I'm a bit {angry:}" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them
P Mayer, Y Zou, F Schaub, AJ Aviv
30th USENIX Security Symposium (USENIX Security 21), 393-410, 2021
412021
Understanding visual perceptions of usability and security of Android's graphical password pattern
AJ Aviv, D Fichter
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
392014
Are privacy dashboards good for end users? Evaluating user perceptions and reactions to google's my activity
FM Farke, DG Balash, M Golla, M Dürmuth, AJ Aviv
30th USENIX Security Symposium (USENIX Security 21), 483-500, 2021
372021
Deterministic, stash-free write-only oram
DS Roche, A Aviv, SG Choi, T Mayberry
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
332017
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20