{DROWN}: Breaking {TLS} Using {SSLv2} N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ... 25th USENIX Security Symposium (USENIX Security 16), 689-706, 2016 | 325 | 2016 |
Coin-operated capitalism S Cohney, D Hoffman, J Sklaroff, D Wishnick Columbia law review 119 (3), 591-676, 2019 | 271 | 2019 |
A systematic analysis of the Juniper Dual EC incident S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 115 | 2016 |
Transactional Scripts in Contract Stacks S Cohney, DA Hoffman Minnesota Law Review 105 (319), 2020 | 69 | 2020 |
Factoring as a service L Valenta, S Cohney, A Liao, J Fried, S Bodduluri, N Heninger Financial Cryptography and Data Security: 20th International Conference, FC …, 2017 | 57 | 2017 |
Pseudorandom black swans: Cache attacks on CTR_DRBG S Cohney, A Kwong, S Paz, D Genkin, N Heninger, E Ronen, Y Yarom 2020 IEEE Symposium on Security and Privacy (SP), 1241-1258, 2020 | 46 | 2020 |
Measuring small subgroup attacks against Diffie-Hellman. L Valenta, D Adrian, A Sanso, S Cohney, J Fried, M Hastings, ... NDSS, 2017 | 44 | 2017 |
Virtual classrooms and real harms: Remote learning at {US}. universities S Cohney, R Teixeira, A Kohlbrenner, A Narayanan, M Kshirsagar, ... Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 653-674, 2021 | 41 | 2021 |
Practical state recovery attacks against legacy RNG implementations SN Cohney, MD Green, N Heninger Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 24 | 2018 |
Watching the watchers: bias and vulnerability in remote proctoring software B Burgess, A Ginsberg, EW Felten, S Cohney 31st USENIX Security Symposium (USENIX Security 22), 571-588, 2022 | 17 | 2022 |
Where did i leave my keys? Lessons from the juniper dual ec incident S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ... Communications of the ACM 61 (11), 148-155, 2018 | 8 | 2018 |
EDEFuzz: A Web API Fuzzer for Excessive Data Exposures L Pan, S Cohney, T Murray, VT Pham Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024 | 5* | 2024 |
A Gentle Tutorial for Lattice-Based Cryptanalysis J Surin, S Cohney Cryptology ePrint Archive, 2023 | 1 | 2023 |
Too Important to Leave to Chance: Pseudorandom Number Generator Standardization & Security SN Cohney University of Pennsylvania, 2019 | 1 | 2019 |
Learning with Style: Improving Student Code-Style Through Better Automated Feedback L Saliba, E Shioji, E Oliveira, S Cohney, J Qi Proceedings of the 55th ACM Technical Symposium on Computer Science …, 2024 | | 2024 |
NOTRY: Deniable messaging with retroactive avowal F Wang, S Cohney, R Wahby, J Bonneau Proceedings on Privacy Enhancing Technologies, 2024 | | 2024 |
COVID Down Under: where did Australia's pandemic apps go wrong? S Cohney, M Cheong 2023 IEEE International Symposium on Ethics in Engineering, Science, and …, 2023 | | 2023 |
Strengthening Australian Consumer Protection in the era of Digital Platforms S Cohney, L Harding, S Dreyfus | | 2023 |
Submission in Response to the 2023-2030 Australian Cyber Security Strategy Discussion Paper SC Atif Ahmad, S Dreyfus, S Erfani, L Harding, C Leckie, S Maynard, ... | | 2023 |
Addressing Big Tech Regulation in Australia G Bush, M Cheong, S Cohney, T Cutts, S Dreyfus, L Harding, T Murray, ... Senate Economics Reference Committee Inquiry into Influence of international …, 2023 | | 2023 |