Follow
Shaanan Cohney
Title
Cited by
Cited by
Year
{DROWN}: Breaking {TLS} using sslv2
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 689-706, 2016
2812016
Coin-operated capitalism
S Cohney, D Hoffman, J Sklaroff, D Wishnick
Columbia Law Review 119 (3), 591-676, 2019
2242019
A systematic analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1002016
Transactional Scripts in Contract Stacks
S Cohney, DA Hoffman
Minnesota Law Review 105 (319), 2020
542020
Factoring as a service
L Valenta, S Cohney, A Liao, J Fried, S Bodduluri, N Heninger
Financial Cryptography and Data Security: 20th International Conference, FC …, 2017
542017
Measuring small subgroup attacks against Diffie-Hellman.
L Valenta, D Adrian, A Sanso, S Cohney, J Fried, M Hastings, ...
NDSS, 2017
372017
Pseudorandom black swans: Cache attacks on CTR_DRBG
S Cohney, A Kwong, S Paz, D Genkin, N Heninger, E Ronen, Y Yarom
2020 IEEE Symposium on Security and Privacy (SP), 1241-1258, 2020
322020
Virtual Classrooms and Real Harms: Remote Learning at US Universities.
S Cohney, R Teixeira, A Kohlbrenner, A Narayanan, M Kshirsagar, ...
SOUPS@ USENIX Security Symposium, 653-674, 2021
222021
Practical state recovery attacks against legacy RNG implementations
SN Cohney, MD Green, N Heninger
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
202018
Where did i leave my keys? Lessons from the juniper dual ec incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Communications of the ACM 61 (11), 148-155, 2018
52018
Watching the watchers: bias and vulnerability in remote proctoring software
B Burgess, A Ginsberg, EW Felten, S Cohney
31st USENIX Security Symposium (USENIX Security 22), 571-588, 2022
42022
Strengthening Australian Consumer Protection in the era of Digital Platforms
S Cohney, L Harding, S Dreyfus
2023
Detecting Excessive Data Exposures in Web Server Responses with Metamorphic Fuzzing
L Pan, S Cohney, T Murray, VT Pham
To Appear ICSE 2024, arXiv preprint arXiv:2301.09258, 2023
2023
Submission in Response to the 2023-2030 Australian Cyber Security Strategy Discussion Paper
SC Atif Ahmad, S Dreyfus, S Erfani, L Harding, C Leckie, S Maynard, ...
2023
Addressing Big Tech Regulation in Australia
G Bush, M Cheong, S Cohney, T Cutts, S Dreyfus, L Harding, T Murray, ...
Senate Economics Reference Committee Inquiry into Influence of international …, 2023
2023
A Gentle Tutorial for Lattice-Based Cryptanalysis
J Surin, S Cohney
Cryptology ePrint Archive, 2023
2023
COVID Down Under: where did Australia's pandemic apps go wrong?
S Cohney, M Cheong
arXiv preprint arXiv:2212.12178, 2022
2022
Submission to ANPR R111004 Commercial Surveillance
N Brazzell, J Bresinger, S Cohney, S Kapoor, M Kshirsagar, J Mayer, ...
2022
Response to the Review of the Privacy Act
J Paterson, S Cohney, L Kulik, L Harding
2022
Submission to the ACCC’s Digital Platform Services Inquiry Discussion Paper
J Paterson, S Cohney, G Bush, L Harding, A Paterson
2022
The system can't perform the operation now. Try again later.
Articles 1–20