scispace - formally typeset
T

Tadayoshi Kohno

Researcher at University of Washington

Publications -  236
Citations -  20751

Tadayoshi Kohno is an academic researcher from University of Washington. The author has contributed to research in topics: Encryption & Cryptography. The author has an hindex of 66, co-authored 213 publications receiving 18044 citations. Previous affiliations of Tadayoshi Kohno include University of California, Berkeley & Cigital.

Papers
More filters
Proceedings ArticleDOI

Robust Physical-World Attacks on Deep Learning Visual Classification

TL;DR: This work proposes a general attack algorithm, Robust Physical Perturbations (RP2), to generate robust visual adversarial perturbations under different physical conditions and shows that adversarial examples generated using RP2 achieve high targeted misclassification rates against standard-architecture road sign classifiers in the physical world under various environmental conditions, including viewpoints.
Proceedings ArticleDOI

Experimental Security Analysis of a Modern Automobile

TL;DR: It is demonstrated that an attacker who is able to infiltrate virtually any Electronic Control Unit (ECU) can leverage this ability to completely circumvent a broad array of safety-critical systems and present composite attacks that leverage individual weaknesses.
Proceedings Article

Comprehensive experimental analyses of automotive attack surfaces

TL;DR: This work discovers that remote exploitation is feasible via a broad range of attack vectors (including mechanics tools, CD players, Bluetooth and cellular radio), and further, that wireless communications channels allow long distance vehicle control, location tracking, in-cabin audio exfiltration and theft.
Journal ArticleDOI

Remote physical device fingerprinting

TL;DR: Remote physical device fingerprinting is introduced, or fingerprinting a physical device, as opposed to an operating system or class of devices, remotely, and without the fingerprinted device's known cooperation, by exploiting small, microscopic deviations in device hardware: clock skews.
Proceedings ArticleDOI

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

TL;DR: This paper is the first in the community to use general-purpose software radios to analyze and attack previously unknown radio communications protocols, and introduces three new zero-power defenses based on RF power harvesting.