Follow
Keaton Mowery
Keaton Mowery
Verified email at cs.ucsd.edu
Title
Cited by
Cited by
Year
Pixel perfect: Fingerprinting canvas in HTML5
K Mowery, H Shacham
Proceedings of W2SP 2012, 2012
4282012
Fingerprinting information in JavaScript implementations
K Mowery, D Bogenreif, S Yilek, H Shacham
Proceedings of W2SP 2 (11), 2011
2242011
On subnormal floating point and abnormal timing
M Andrysco, D Kohlbrenner, K Mowery, R Jhala, S Lerner, H Shacham
2015 IEEE Symposium on Security and Privacy, 623-639, 2015
1722015
Heat of the moment: Characterizing the efficacy of thermal camera-based attacks
K Mowery, S Meiklejohn, S Savage
Proceedings of the 5th USENIX conference on Offensive technologies, 6-6, 2011
672011
The Phantom Tollbooth:{Privacy-Preserving} Electronic Toll Collection in the Presence of Driver Collusion
S Meiklejohn, K Mowery, S Checkoway, H Shacham
20th USENIX Security Symposium (USENIX Security 11), 2011
662011
Are AES x86 cache timing attacks still feasible?
K Mowery, S Keelveedhi, H Shacham
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 19-24, 2012
562012
Security Analysis of a {Full-Body} Scanner
K Mowery, E Wustrow, T Wypych, C Singleton, C Comfort, E Rescorla, ...
23rd USENIX Security Symposium (USENIX Security 14), 369-384, 2014
302014
Welcome to the Entropics: Boot-time entropy in embedded devices
K Mowery, M Wei, D Kohlbrenner, H Shacham, S Swanson
2013 IEEE Symposium on Security and Privacy, 589-603, 2013
282013
Putting Out a {HIT}: Crowdsourcing Malware Installs
C Kanich, S Checkoway
5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011
242011
Efficient {User-Guided} Ballot Image Verification
A Cordero, T Ji, A Tsai, K Mowery, D Wagner
2010 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2010
92010
Efficient implementation for differential privacy using cryptographic functions
YL Sierra, AG Thakurta, US Vaishampayan, JC Hurley, KF Mowery, ...
US Patent 10,229,282, 2019
82019
Synchronizing content
PLH ASTRAND, H Van, N Sharma, X Lu, SA Myers, MD Linington, ...
US Patent 11,182,349, 2021
22021
Synchronizing content
PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ...
US Patent 11,063,748, 2021
2021
Efficient implementation for differential privacy using cryptographic functions
YL Sierra, AG Thakurta, US Vaishampayan, JC Hurley, KF Mowery, ...
US Patent 11,042,664, 2021
2021
Synchronizing content
PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ...
US Patent 11,025,412, 2021
2021
Key registration transparency for secure messaging
BE Basile, KF Mowery, YL Sierra, F Jacobs, RW Baker
US Patent App. 16/888,157, 2020
2020
Efficient implementation for differential privacy using cryptographic functions
YL Sierra, AG Thakurta, US Vaishampayan, JC Hurley, KF Mowery, ...
US Patent 10,552,631, 2020
2020
Synchronizing content
PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ...
US Patent App. 15/996,390, 2018
2018
Beneath the Attack Surface
K Mowery
University of California, San Diego, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–19