Adam J. Aviv
TitleCited byYear
Smudge Attacks on Smartphone Touch Screens.
AJ Aviv, KL Gibson, E Mossop, M Blaze, JM Smith
Woot 10, 1-7, 2010
6622010
Practicality of accelerometer side channels on smartphones
AJ Aviv, B Sapp, M Blaze, JM Smith
Proceedings of the 28th Annual Computer Security Applications Conference, 41-50, 2012
1842012
Challenges in experimenting with botnet detection systems
AJ Aviv, A Haeberlen
662011
Enabling Practical Software-defined Networking Security Applications with OFX.
J Sonchack, JM Smith, AJ Aviv, E Keller
NDSS 16, 1-15, 2016
482016
Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock
AJ Aviv, D Budzitowski, R Kuber
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
382015
Differential privacy for collaborative security
J Reed, AJ Aviv, D Wagner, A Haeberlen, BC Pierce, JM Smith
Proceedings of the Third European Workshop on System Security, 1-7, 2010
382010
Security evaluation of ES&S voting machines and election management system
A Aviv, P Černy, S Clark, E Cronin, G Shah, M Sherr, M Blaze
Proceedings of the conference on Electronic voting technology, 11, 2008
382008
QuanTM: A quantitative trust management system
AG West, AJ Aviv, J Chang, VS Prabhu, M Blaze, S Kannan, I Lee, ...
Proceedings of the Second European Workshop on System Security, 28-35, 2009
302009
Cross-domain collaboration for improved IDS rule set selection
J Sonchack, AJ Aviv, JM Smith
Journal of Information Security and Applications 24, 25-40, 2015
282015
A practical oblivious map data structure with secure deletion and history independence
DS Roche, A Aviv, SG Choi
2016 IEEE Symposium on Security and Privacy (SP), 178-197, 2016
242016
Spam mitigation using spatio-temporal reputations from blacklist history
AG West, AJ Aviv, J Chang, I Lee
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
242010
Understanding visual perceptions of usability and security of Android's graphical password pattern
AJ Aviv, D Fichter
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
232014
Towards baselines for shoulder surfing on mobile authentication
AJ Aviv, JT Davin, F Wolf, R Kuber
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
162017
Ssares: Secure searchable automated remote email storage
AJ Aviv, ME Locasto, S Potter, AD Keromytis
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
162007
Timing-based reconnaissance and defense in software-defined networks
J Sonchack, A Dubey, AJ Aviv, JM Smith, E Keller
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
152016
Timing SDN control planes to infer network configurations
J Sonchack, AJ Aviv, E Keller
Proceedings of the 2016 ACM International Workshop on Security in Software …, 2016
132016
Turboflow: Information rich flow record generation on commodity switches
J Sonchack, AJ Aviv, E Keller, JM Smith
Proceedings of the Thirteenth EuroSys Conference, 11, 2018
122018
EVEREST: Evaluation and Validation of Election-Related Equipment
P McDaniel, K Butler, W Enck, H Hursti, S McLaughlin, P Traynor, M Blaze, ...
Standards, and Testing, 2007
112007
Deterministic, stash-free write-only oram
DS Roche, A Aviv, SG Choi, T Mayberry
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
102017
Experiences in teaching an educational user-level operating systems implementation project
AJ Aviv, V Mannino, T Owlarn, S Shannin, K Xu, BT Loo
ACM SIGOPS Operating Systems Review 46 (2), 80-86, 2012
102012
The system can't perform the operation now. Try again later.
Articles 1–20