scispace - formally typeset
T

Tadayoshi Kohno

Researcher at University of Washington

Publications -  236
Citations -  20751

Tadayoshi Kohno is an academic researcher from University of Washington. The author has contributed to research in topics: Encryption & Cryptography. The author has an hindex of 66, co-authored 213 publications receiving 18044 citations. Previous affiliations of Tadayoshi Kohno include University of California, Berkeley & Cigital.

Papers
More filters
Proceedings Article

Designing voting machines for verification

TL;DR: This work presents a voting system design and discusses the experience building a prototype implementation based on the design in Java and C, and provides techniques to help vendors, independent testing agencies, and others verify critical security properties in direct recording electronic voting machines.
Proceedings ArticleDOI

How Public Is My Private Life?: Privacy in Online Dating

TL;DR: The results of a survey designed to examine privacy-related risks, practices, and expectations of people who use or have used online dating are presented and tensions between privacy and competing user values and goals are revealed.
Proceedings ArticleDOI

Rewriting History: Changing the Archived Web from the Present

TL;DR: This work discovers and analyzes several vulnerabilities in how the Wayback Machine archives data, and leverages these vulnerabilities to create what are to the authors' knowledge the first attacks against a user's view of the archived web.

EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond

TL;DR: The recently issued United States Passport Card and Washington State "enhanced" drivers license (WA EDL) are examined, both of which incorporate Gen-2 EPC tags, and it is shown that a key anti-cloning feature proposed by the U.S. Department of Homeland Security remains undeployed in these cards.
Proceedings ArticleDOI

Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference.

TL;DR: It is experimentally shown how the GEDmatch API is vulnerable to a number of attacks from an adversary that only uploads normally formatted genetic data files and runs standard queries, and how these attacks are possible because of the rich set of features supported by the API, including detailed visualizations that are meant to enhance usability.