Stephen Checkoway
Stephen Checkoway
Assistant Professor at Oberlin College
Verified email at oberlin.edu - Homepage
Title
Cited by
Cited by
Year
Experimental security analysis of a modern automobile
K Koscher, S Savage, F Roesner, S Patel, T Kohno, A Czeskis, D McCoy, ...
2010 IEEE Symposium on Security and Privacy, 447-462, 2010
17242010
Comprehensive experimental analyses of automotive attack surfaces.
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
USENIX Security Symposium 4, 447-462, 2011
15082011
Return-oriented programming without returns
S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
6282010
Enforcing forward-edge control-flow integrity in {GCC} & {LLVM}
C Tice, T Roeder, P Collingbourne, S Checkoway, Ú Erlingsson, ...
23rd {USENIX} Security Symposium ({USENIX} Security 14), 941-955, 2014
3662014
Iago attacks: Why the system call api is a bad untrusted rpc interface
S Checkoway, H Shacham
ACM SIGARCH Computer Architecture News 41 (1), 253-264, 2013
2472013
On the Practical Exploitability of Dual EC in TLS Implementations
S Checkoway, M Fredrikson, R Niederhagen, M Green, T Lange, ...
130*
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage.
S Checkoway, AJ Feldman, B Kantor, JA Halderman, EW Felten, ...
EVT/WOTE 2009, 2009
1272009
Collaborative Networked Communication: MUDs as Systems Tools.
R Evard
LISA 7, 1-8, 1993
931993
A systematic analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
712016
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
S Meiklejohn, K Mowery, S Checkoway, H Shacham
USENIX security symposium 201 (1), 2011
562011
iSeeYou: Disabling the MacBook Webcam Indicator {LED}
M Brocker, S Checkoway
23rd {USENIX} Security Symposium ({USENIX} Security 14), 337-352, 2014
472014
Escape from return-oriented programming: Return-oriented programming without returns (on the x86)
S Checkoway, H Shacham
[Department of Computer Science and Engineering], University of California …, 2010
292010
Risk-limiting audits and the margin of victory in nonplurality elections
AD Sarwate, S Checkoway, H Shacham
Statistics, Politics and Policy 3 (3), 29-64, 2012
232012
Security analysis of a full-body scanner
K Mowery, E Wustrow, T Wypych, C Singleton, C Comfort, E Rescorla, ...
23rd {USENIX} Security Symposium ({USENIX} Security 14), 369-384, 2014
222014
Putting Out a HIT: Crowdsourcing Malware Installs.
C Kanich, S Checkoway, K Mowery
WOOT, 71-80, 2011
182011
O single sign-off, where art thou? an empirical analysis of single sign-on account hijacking and session management on the web
M Ghasemisharif, A Ramesh, S Checkoway, C Kanich, J Polakis
27th {USENIX} Security Symposium ({USENIX} Security 18), 1475-1492, 2018
172018
Single-Ballot Risk-Limiting Audits Using Convex Optimization.
S Checkoway, AD Sarwate, H Shacham
EVT/WOTE, 2010
142010
Run-dma
M Rushanan, S Checkoway
9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), 2015
102015
Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer.
S Checkoway, H Shacham, E Rescorla
LEET, 2010
102010
On the security of mobile cockpit information systems
D Lundberg, B Farinholt, E Sullivan, R Mast, S Checkoway, S Savage, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
72014
The system can't perform the operation now. Try again later.
Articles 1–20