Experimental security analysis of a modern automobile K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ... 2010 IEEE Symposium on Security and Privacy, 447-462, 2010 | 2490 | 2010 |
Comprehensive experimental analyses of automotive attack surfaces S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ... Proceedings of USENIX Security, 2011 | 2215 | 2011 |
Defending against neural fake news R Zellers, A Holtzman, H Rashkin, Y Bisk, A Farhadi, F Roesner, Y Choi Advances in Neural Information Processing Systems, 9054-9065, 2019 | 981 | 2019 |
Detecting and Defending Against Third-Party Tracking on the Web F Roesner, T Kohno, D Wetherall Symposium on Networking Systems Design and Implementation, 2012 | 598 | 2012 |
End User Security & Privacy Concerns with Smart Homes E Zeng, S Mare, F Roesner Symposium on Usable Privacy and Security (SOUPS), 2017 | 523 | 2017 |
Security and privacy for augmented reality systems F Roesner, T Kohno, D Molnar Communications of the ACM 57 (4), 88-96, 2014 | 334 | 2014 |
User-driven access control: Rethinking permission granting in modern operating systems F Roesner, T Kohno, A Moshchuk, B Parno, HJ Wang, C Cowan 2012 IEEE Symposium on Security and Privacy, 224-238, 2012 | 313 | 2012 |
Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016. A Lerner, AK Simpson, T Kohno, F Roesner USENIX Security Symposium, 2016 | 291 | 2016 |
Toys that Listen: A Study of Parents, Children, and Internet-Connected Toys E McReynolds, S Hubbard, T Lau, A Saraf, M Cakmak, F Roesner Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017 | 270 | 2017 |
Who's In Control?: Interactions In Multi-User Smart Homes C Geeng, F Roesner Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 238 | 2019 |
Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study E Zeng, F Roesner 28th {USENIX} Security Symposium ({USENIX} Security 19), 159-176, 2019 | 209 | 2019 |
Fake News on Facebook and Twitter: Investigating How People (Don't) Investigate C Geeng, S Yee, F Roesner Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020 | 156 | 2020 |
Sex, Lies, or Kittens? Investigating the Use of Snapchat’s Self-Destructing Messages F Roesner, BT Gill, T Kohno Financial Cryptography and Data Security, 2014 | 150 | 2014 |
Radiatus: a Shared-Nothing Server-Side Web Architecture R Cheng, W Scott, P Ellenbogen, J Howell, F Roesner, A Krishnamurthy, ... Proceedings of the Seventh ACM Symposium on Cloud Computing, 237-250, 2016 | 144 | 2016 |
World-Driven Access Control for Continuous Sensing F Roesner, D Molnar, A Moshchuk, T Kohno, HJ Wang CCS, 2014 | 141 | 2014 |
Towards security and privacy for multi-user augmented reality: Foundations with end users K Lebeck, K Ruth, T Kohno, F Roesner 2018 IEEE Symposium on Security and Privacy (SP), 392-408, 2018 | 140 | 2018 |
Securing vulnerable home IoT devices with an in-hub security manager AK Simpson, F Roesner, T Kohno 2017 IEEE International Conference on Pervasive Computing and Communications …, 2017 | 138 | 2017 |
Collaborative verification of information flow for a high-assurance app store MD Ernst, R Just, S Millstein, W Dietl, S Pernsteiner, F Roesner, ... Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 130 | 2014 |
Investigating the Computer Security Practices and Needs of Journalists SE McGregor, P Charters, T Holliday, F Roesner 24th USENIX Security Symposium (USENIX Security 15), 2015 | 126 | 2015 |
The Privacy-Utility Tradeoff for Remotely Teleoperated Robots DJ Butler, J Huang, F Roesner, M Cakmak Proceedings of the Tenth Annual ACM/IEEE International Conference on Human …, 2015 | 118 | 2015 |