Keaton Mowery
Keaton Mowery
Verified email at cs.ucsd.edu
Title
Cited by
Cited by
Year
Pixel perfect: Fingerprinting canvas in HTML5
K Mowery, H Shacham
Proceedings of W2SP, 1-12, 2012
3502012
Fingerprinting information in JavaScript implementations
K Mowery, D Bogenreif, S Yilek, H Shacham
Proceedings of W2SP 2 (11), 2011
1992011
On subnormal floating point and abnormal timing
M Andrysco, D Kohlbrenner, K Mowery, R Jhala, S Lerner, H Shacham
2015 IEEE Symposium on Security and Privacy, 623-639, 2015
1262015
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
S Meiklejohn, K Mowery, S Checkoway, H Shacham
USENIX security symposium 201 (1), 2011
572011
Are aes x86 cache timing attacks still feasible?
K Mowery, S Keelveedhi, H Shacham
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 19-24, 2012
552012
Heat of the moment: Characterizing the efficacy of thermal camera-based attacks
K Mowery, S Meiklejohn, S Savage
Proceedings of the 5th USENIX conference on Offensive technologies, 6-6, 2011
552011
Welcome to the Entropics: Boot-time entropy in embedded devices
K Mowery, M Wei, D Kohlbrenner, H Shacham, S Swanson
2013 IEEE Symposium on Security and Privacy, 589-603, 2013
262013
Security analysis of a full-body scanner
K Mowery, E Wustrow, T Wypych, C Singleton, C Comfort, E Rescorla, ...
23rd {USENIX} Security Symposium ({USENIX} Security 14), 369-384, 2014
252014
Wireless communication system capable of saving time for mutual data communication in sniff mode
J Park
US Patent 7,330,445, 2008
21*2008
Putting Out a HIT: Crowdsourcing Malware Installs.
C Kanich, S Checkoway, K Mowery
WOOT, 71-80, 2011
182011
Efficient User-Guided Ballot Image Verification.
A Cordero, T Ji, A Tsai, K Mowery, DA Wagner
EVT/WOTE, 2010
62010
Synchronizing content
PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ...
US Patent App. 15/996,403, 2018
12018
Key registration transparency for secure messaging
BE Basile, KF Mowery, YL Sierra, F Jacobs, RW Baker
US Patent App. 16/888,157, 2020
2020
Efficient implementation for differential privacy using cryptographic functions
YL Sierra, AG Thakurta, US Vaishampayan, JC Hurley, KF Mowery, ...
US Patent App. 16/746,683, 2020
2020
Efficient implementation for differential privacy using cryptographic functions
YL Sierra, AG Thakurta, US Vaishampayan, JC Hurley, KF Mowery, ...
US Patent 10,552,631, 2020
2020
Synchronizing content
PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ...
US Patent App. 16/428,914, 2019
2019
Synchronizing content
PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ...
US Patent App. 15/996,390, 2018
2018
Synchronizing content
PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ...
US Patent App. 15/996,387, 2018
2018
Beneath the Attack Surface
K Mowery
UC San Diego, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–19