Articles with public access mandates - Adam J AvivLearn more
Not available anywhere: 2
Is bigger better when it comes to android graphical pattern unlock?
AJ Aviv, R Kuber, D Budzitowski
IEEE Internet Computing 21 (6), 46-51, 2017
Mandates: US Department of Defense
Exploring large scale security system reproducibility with the LESS simulator
J Sonchack, AJ Aviv
Journal of Computer Security 24 (5), 645-665, 2016
Mandates: US National Science Foundation
Available somewhere: 44
Scaling hardware accelerated network monitoring to concurrent and dynamic queries with {* Flow}
J Sonchack, O Michel, AJ Aviv, E Keller, JM Smith
2018 USENIX Annual Technical Conference (USENIX ATC 18), 823-835, 2018
Mandates: US National Science Foundation, US Department of Defense
Turboflow: Information rich flow record generation on commodity switches
J Sonchack, AJ Aviv, E Keller, JM Smith
Proceedings of the Thirteenth EuroSys Conference, 1-16, 2018
Mandates: US National Science Foundation, US Department of Defense
Enabling Practical Software-defined Networking Security Applications with OFX.
J Sonchack, JM Smith, AJ Aviv, E Keller
NDSS 16, 1-15, 2016
Mandates: US National Science Foundation
Towards baselines for shoulder surfing on mobile authentication
AJ Aviv, JT Davin, F Wolf, R Kuber
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
Mandates: US Department of Defense
A practical oblivious map data structure with secure deletion and history independence
DS Roche, A Aviv, SG Choi
2016 IEEE Symposium on Security and Privacy (SP), 178-197, 2016
Mandates: US National Science Foundation
This pin can be easily guessed: Analyzing the security of smartphone unlock pins
P Markert, DV Bailey, M Golla, M Dürmuth, AJ Aviv
2020 IEEE Symposium on Security and Privacy (SP), 286-303, 2020
Mandates: US National Science Foundation, German Research Foundation
Examining the examiners: Students' privacy and security perceptions of online proctoring services
DG Balash, D Kim, D Shaibekova, RA Fainchtein, M Sherr, AJ Aviv
Seventeenth symposium on usable privacy and security (SOUPS 2021), 633-652, 2021
Mandates: US National Science Foundation
Why older adults (Don't) use password managers
H Ray, F Wolf, R Kuber, AJ Aviv
30th USENIX Security Symposium (USENIX Security 21), 73-90, 2021
Mandates: US National Science Foundation
Timing-based reconnaissance and defense in software-defined networks
J Sonchack, A Dubey, AJ Aviv, JM Smith, E Keller
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Mandates: US National Science Foundation
" Now I'm a bit {angry:}" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them
P Mayer, Y Zou, F Schaub, AJ Aviv
30th USENIX Security Symposium (USENIX Security 21), 393-410, 2021
Mandates: Helmholtz Association
A video-based attack for android pattern lock
G Ye, Z Tang, D Fang, X Chen, W Wolff, AJ Aviv, Z Wang
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-31, 2018
Mandates: National Natural Science Foundation of China, UK Engineering and Physical …
Are privacy dashboards good for end users? Evaluating user perceptions and reactions to google's my activity
FM Farke, DG Balash, M Golla, M Dürmuth, AJ Aviv
30th USENIX Security Symposium (USENIX Security 21), 483-500, 2021
Mandates: German Research Foundation
Why users (don't) use password managers at a large educational institution
P Mayer, CW Munyendo, ML Mazurek, AJ Aviv
31st USENIX Security Symposium (USENIX Security 22), 1849-1866, 2022
Mandates: US National Science Foundation, Helmholtz Association
" Woe is me" Examining Older Adults' Perceptions of Privacy
H Ray, F Wolf, R Kuber, AJ Aviv
Extended abstracts of the 2019 CHI conference on human factors in computing …, 2019
Mandates: US Department of Defense
Deterministic, stash-free write-only oram
DS Roche, A Aviv, SG Choi, T Mayberry
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Mandates: US National Science Foundation, US Department of Defense
" Pretty Close to a Must-Have" Balancing Usability Desire and Security Concern in Biometric Adoption
F Wolf, R Kuber, AJ Aviv
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
Mandates: US Department of Defense
Timing SDN control planes to infer network configurations
J Sonchack, AJ Aviv, E Keller
Proceedings of the 2016 ACM International Workshop on Security in Software …, 2016
Mandates: US National Science Foundation
rORAM: Efficient Range ORAM with O (log2 N) Locality.
A Chakraborti, AJ Aviv, SG Choi, T Mayberry, DS Roche, R Sion
NDSS, 2019
Mandates: US National Science Foundation, US Department of Defense
Publication and funding information is determined automatically by a computer program