default search action
Shaanan Cohney
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j2]Faxing Wang, Shaanan Cohney, Riad Wahby, Joseph Bonneau:
NOTRY: Deniable messaging with retroactive avowal. Proc. Priv. Enhancing Technol. 2024(2): 391-411 (2024) - [c10]Lianglu Pan, Shaanan Cohney, Toby Murray, Van-Thuan Pham:
EDEFuzz: A Web API Fuzzer for Excessive Data Exposures. ICSE 2024: 45:1-45:12 - [c9]Liam Saliba, Elisa Shioji, Eduardo Oliveira, Shaanan Cohney, Jianzhong Qi:
Learning with Style: Improving Student Code-Style Through Better Automated Feedback. SIGCSE (1) 2024: 1175-1181 - 2023
- [i10]Lianglu Pan, Shaanan Cohney, Toby Murray, Van-Thuan Pham:
Detecting Excessive Data Exposures in Web Server Responses with Metamorphic Fuzzing. CoRR abs/2301.09258 (2023) - [i9]Joseph Surin, Shaanan Cohney:
A Gentle Tutorial for Lattice-Based Cryptanalysis. IACR Cryptol. ePrint Arch. 2023: 32 (2023) - [i8]Faxing Wang, Shaanan Cohney, Riad Wahby, Joseph Bonneau:
NOTRY: deniable messaging with retroactive avowal. IACR Cryptol. ePrint Arch. 2023: 1926 (2023) - 2022
- [c8]Ben Burgess, Avi Ginsberg, Edward W. Felten, Shaanan Cohney:
Watching the watchers: bias and vulnerability in remote proctoring software. USENIX Security Symposium 2022: 571-588 - [i7]Ben Burgess, Avi Ginsberg, Edward W. Felten, Shaanan Cohney:
Watching the watchers: bias and vulnerability in remote proctoring software. CoRR abs/2205.03009 (2022) - [i6]Shaanan Cohney, Marc Cheong:
COVID Down Under: where did Australia's pandemic apps go wrong? CoRR abs/2212.12178 (2022) - 2021
- [c7]Shaanan Cohney, Ross Teixeira, Anne Kohlbrenner, Arvind Narayanan, Mihir Kshirsagar, Yan Shvartzshnaider, Madelyn Sanfilippo:
Virtual Classrooms and Real Harms: Remote Learning at U.S. Universities. SOUPS @ USENIX Security Symposium 2021: 653-674 - 2020
- [c6]Shaanan Cohney, Andrew Kwong, Shahar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom:
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG. SP 2020: 1241-1258 - [i5]Shaanan Cohney, Ross Teixeira, Anne Kohlbrenner, Arvind Narayanan, Mihir Kshirsagar, Yan Shvartzshnaider, Madelyn Sanfilippo:
Virtual Classrooms and Real Harms. CoRR abs/2012.05867 (2020)
2010 – 2019
- 2019
- [i4]Shaanan Cohney, Andrew Kwong, Shahar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom:
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG. IACR Cryptol. ePrint Arch. 2019: 996 (2019) - 2018
- [j1]Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham:
Where did I leave my keys?: lessons from the Juniper Dual EC incident. Commun. ACM 61(11): 148-155 (2018) - [c5]Shaanan N. Cohney, Matthew D. Green, Nadia Heninger:
Practical State Recovery Attacks against Legacy RNG Implementations. CCS 2018: 265-280 - 2017
- [c4]Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J. Alex Halderman, Nadia Heninger:
Measuring small subgroup attacks against Diffie-Hellman. NDSS 2017 - 2016
- [c3]Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham:
A Systematic Analysis of the Juniper Dual EC Incident. CCS 2016: 468-479 - [c2]Luke Valenta, Shaanan Cohney, Alex Liao, Joshua Fried, Satya Bodduluri, Nadia Heninger:
Factoring as a Service. Financial Cryptography 2016: 321-338 - [c1]Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar, Yuval Shavitt:
DROWN: Breaking TLS Using SSLv2. USENIX Security Symposium 2016: 689-706 - [i3]Stephen Checkoway, Shaanan Cohney, Christina Garman, Matthew Green, Nadia Heninger, Jacob Maskiewicz, Eric Rescorla, Hovav Shacham, Ralf-Philipp Weinmann:
A Systematic Analysis of the Juniper Dual EC Incident. IACR Cryptol. ePrint Arch. 2016: 376 (2016) - [i2]Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J. Alex Halderman, Nadia Heninger:
Measuring small subgroup attacks against Diffie-Hellman. IACR Cryptol. ePrint Arch. 2016: 995 (2016) - 2015
- [i1]Luke Valenta, Shaanan Cohney, Alex Liao, Joshua Fried, Satya Bodduluri, Nadia Heninger:
Factoring as a Service. IACR Cryptol. ePrint Arch. 2015: 1000 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-10 00:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint