Pixel perfect: Fingerprinting canvas in HTML5 K Mowery, H Shacham Proceedings of W2SP, 1-12, 2012 | 350 | 2012 |
Fingerprinting information in JavaScript implementations K Mowery, D Bogenreif, S Yilek, H Shacham Proceedings of W2SP 2 (11), 2011 | 199 | 2011 |
On subnormal floating point and abnormal timing M Andrysco, D Kohlbrenner, K Mowery, R Jhala, S Lerner, H Shacham 2015 IEEE Symposium on Security and Privacy, 623-639, 2015 | 126 | 2015 |
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion. S Meiklejohn, K Mowery, S Checkoway, H Shacham USENIX security symposium 201 (1), 2011 | 57 | 2011 |
Are aes x86 cache timing attacks still feasible? K Mowery, S Keelveedhi, H Shacham Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 19-24, 2012 | 55 | 2012 |
Heat of the moment: Characterizing the efficacy of thermal camera-based attacks K Mowery, S Meiklejohn, S Savage Proceedings of the 5th USENIX conference on Offensive technologies, 6-6, 2011 | 55 | 2011 |
Welcome to the Entropics: Boot-time entropy in embedded devices K Mowery, M Wei, D Kohlbrenner, H Shacham, S Swanson 2013 IEEE Symposium on Security and Privacy, 589-603, 2013 | 26 | 2013 |
Security analysis of a full-body scanner K Mowery, E Wustrow, T Wypych, C Singleton, C Comfort, E Rescorla, ... 23rd {USENIX} Security Symposium ({USENIX} Security 14), 369-384, 2014 | 25 | 2014 |
Wireless communication system capable of saving time for mutual data communication in sniff mode J Park US Patent 7,330,445, 2008 | 21* | 2008 |
Putting Out a HIT: Crowdsourcing Malware Installs. C Kanich, S Checkoway, K Mowery WOOT, 71-80, 2011 | 18 | 2011 |
Efficient User-Guided Ballot Image Verification. A Cordero, T Ji, A Tsai, K Mowery, DA Wagner EVT/WOTE, 2010 | 6 | 2010 |
Synchronizing content PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ... US Patent App. 15/996,403, 2018 | 1 | 2018 |
Key registration transparency for secure messaging BE Basile, KF Mowery, YL Sierra, F Jacobs, RW Baker US Patent App. 16/888,157, 2020 | | 2020 |
Efficient implementation for differential privacy using cryptographic functions YL Sierra, AG Thakurta, US Vaishampayan, JC Hurley, KF Mowery, ... US Patent App. 16/746,683, 2020 | | 2020 |
Efficient implementation for differential privacy using cryptographic functions YL Sierra, AG Thakurta, US Vaishampayan, JC Hurley, KF Mowery, ... US Patent 10,552,631, 2020 | | 2020 |
Synchronizing content PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ... US Patent App. 16/428,914, 2019 | | 2019 |
Synchronizing content PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ... US Patent App. 15/996,390, 2018 | | 2018 |
Synchronizing content PLH ASTRAND, BI WILLIAMSON, KF Mowery, MD Adler, MA AURICCHIO, ... US Patent App. 15/996,387, 2018 | | 2018 |
Beneath the Attack Surface K Mowery UC San Diego, 2015 | | 2015 |