Pixel perfect: Fingerprinting canvas in HTML5 K Mowery, H Shacham Proceedings of W2SP 2012, 2012 | 428 | 2012 |
Fingerprinting information in JavaScript implementations K Mowery, D Bogenreif, S Yilek, H Shacham Proceedings of W2SP 2 (11), 2011 | 224 | 2011 |
On subnormal floating point and abnormal timing M Andrysco, D Kohlbrenner, K Mowery, R Jhala, S Lerner, H Shacham 2015 IEEE Symposium on Security and Privacy, 623-639, 2015 | 172 | 2015 |
Heat of the moment: Characterizing the efficacy of thermal camera-based attacks K Mowery, S Meiklejohn, S Savage Proceedings of the 5th USENIX conference on Offensive technologies, 6-6, 2011 | 67 | 2011 |
The Phantom Tollbooth:{Privacy-Preserving} Electronic Toll Collection in the Presence of Driver Collusion S Meiklejohn, K Mowery, S Checkoway, H Shacham 20th USENIX Security Symposium (USENIX Security 11), 2011 | 66 | 2011 |
Are AES x86 cache timing attacks still feasible? K Mowery, S Keelveedhi, H Shacham Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 19-24, 2012 | 56 | 2012 |
Security Analysis of a {Full-Body} Scanner K Mowery, E Wustrow, T Wypych, C Singleton, C Comfort, E Rescorla, ... 23rd USENIX Security Symposium (USENIX Security 14), 369-384, 2014 | 30 | 2014 |
Welcome to the Entropics: Boot-time entropy in embedded devices K Mowery, M Wei, D Kohlbrenner, H Shacham, S Swanson 2013 IEEE Symposium on Security and Privacy, 589-603, 2013 | 28 | 2013 |
Putting Out a {HIT}: Crowdsourcing Malware Installs C Kanich, S Checkoway 5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011 | 24 | 2011 |
Efficient {User-Guided} Ballot Image Verification A Cordero, T Ji, A Tsai, K Mowery, D Wagner 2010 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2010 | 9 | 2010 |
Efficient implementation for differential privacy using cryptographic functions YL Sierra, AG Thakurta, US Vaishampayan, JC Hurley, KF Mowery, ... US Patent 10,229,282, 2019 | 8 | 2019 |
Synchronizing content PLH ASTRAND, H Van, N Sharma, X Lu, SA Myers, MD Linington, ... US Patent 11,182,349, 2021 | 2 | 2021 |
Synchronizing content PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ... US Patent 11,063,748, 2021 | | 2021 |
Efficient implementation for differential privacy using cryptographic functions YL Sierra, AG Thakurta, US Vaishampayan, JC Hurley, KF Mowery, ... US Patent 11,042,664, 2021 | | 2021 |
Synchronizing content PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ... US Patent 11,025,412, 2021 | | 2021 |
Key registration transparency for secure messaging BE Basile, KF Mowery, YL Sierra, F Jacobs, RW Baker US Patent App. 16/888,157, 2020 | | 2020 |
Efficient implementation for differential privacy using cryptographic functions YL Sierra, AG Thakurta, US Vaishampayan, JC Hurley, KF Mowery, ... US Patent 10,552,631, 2020 | | 2020 |
Synchronizing content PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ... US Patent App. 15/996,390, 2018 | | 2018 |
Beneath the Attack Surface K Mowery University of California, San Diego, 2015 | | 2015 |