Tadayoshi Kohno

ORCID: 0000-0002-4899-226X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Privacy, Security, and Data Protection
  • User Authentication and Security Systems
  • Internet Traffic Analysis and Secure E-voting
  • Cryptographic Implementations and Security
  • Chaos-based Image/Signal Encryption
  • Cryptography and Data Security
  • Network Security and Intrusion Detection
  • Security and Verification in Computing
  • Privacy-Preserving Technologies in Data
  • Wireless Body Area Networks
  • Advanced Authentication Protocols Security
  • Coding theory and cryptography
  • Information and Cyber Security
  • Adversarial Robustness in Machine Learning
  • RFID technology advancements
  • Augmented Reality Applications
  • Ethics and Social Impacts of AI
  • Virtual Reality Applications and Impacts
  • Innovative Human-Technology Interaction
  • Hate Speech and Cyberbullying Detection
  • Interactive and Immersive Displays
  • Anomaly Detection Techniques and Applications
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Data Storage Technologies

University of Washington
2016-2025

University of California, San Diego
2002-2024

Seattle University
2013-2023

University of Southern California
2023

Pennsylvania State University
2023

Indiana University Bloomington
2023

University of Illinois Urbana-Champaign
2023

Institute of Electrical and Electronics Engineers
2022

Regional Municipality of Niagara
2022

IEEE Computer Society
2022

Recent studies show that the state-of-the-art deep neural networks (DNNs) are vulnerable to adversarial examples, resulting from small-magnitude perturbations added input. Given emerging physical systems using DNNs in safety-critical situations, examples could mislead these and cause dangerous situations. Therefore, understanding world is an important step towards developing resilient learning algorithms. We propose a general attack algorithm, Robust Physical Perturbations (RP2), generate...

10.1109/cvpr.2018.00175 article EN 2018-06-01

Modern automobiles are no longer mere mechanical devices; they pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular networks. While this transformation has driven major advancements in efficiency safety, it also introduced a range new potential risks. In paper we experimentally evaluate these issues on modern automobile demonstrate the fragility underlying system structure. We that an attacker who is able to infiltrate virtually any...

10.1109/sp.2010.34 article EN IEEE Symposium on Security and Privacy 2010-01-01

Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to U.S. market in 2003, this model ICD includes pacemaker technology is designed communicate wirelessly with a nearby external programmer 175 kHz frequency range. After partially reverse-engineering ICD's communications protocol oscilloscope software radio, we implemented several radio-based attacks that could compromise patient safety privacy. Motivated by our desire improve...

10.1109/sp.2008.31 article EN Proceedings - IEEE Symposium on Security and Privacy/Proceedings of the ... IEEE Symposium on Security and Privacy 2008-05-01

With significant U.S. federal funds now available to replace outdated punch-card and mechanical voting systems, municipalities states throughout the are adopting paperless electronic systems from a number of different vendors. We present security analysis source code one such machine used in share market. Our shows that this system is far below even most minimal standards applicable other contexts. identify several problems including unauthorized privilege escalation, incorrect use...

10.1109/secpri.2004.1301313 article EN 2004-06-10

Recent studies show that the state-of-the-art deep neural networks (DNNs) are vulnerable to adversarial examples, resulting from small-magnitude perturbations added input. Given emerging physical systems using DNNs in safety-critical situations, examples could mislead these and cause dangerous situations.Therefore, understanding world is an important step towards developing resilient learning algorithms. We propose a general attack algorithm,Robust Physical Perturbations (RP2), generate...

10.48550/arxiv.1707.08945 preprint EN other-oa arXiv (Cornell University) 2017-01-01

We introduce the area of remote physical device fingerprinting, or fingerprinting a device, as opposed to an operating system class devices, remotely, and without fingerprinted device's known cooperation. accomplish this goal by exploiting small, microscopic deviations in hardware: clock skews. Our techniques do not require any modification devices. report consistent measurements when measurer is thousands miles, multiple hops, tens milliseconds away from connected Internet different...

10.1109/tdsc.2005.26 article EN IEEE Transactions on Professional Communication 2005-02-01

Protecting implantable medical devices against attack without compromising patient health requires balancing security and privacy goals with traditional such as safety utility. Implantable monitor treat physiological conditions within the body. These - including pacemakers, cardiac defibrillators (ICDs), drug delivery systems, neurostimulators can help manage a broad range of ailments, arrhythmia, diabetes, Parkinson's disease. IMDs' pervasiveness continues to swell, upward 25 million US...

10.1109/mprv.2008.16 article EN IEEE Pervasive Computing 2008-01-01

Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Its popularity is due in part to its perceived strong anonymity properties and relatively low latency service. Low achieved through Tor's ability balance traffic load by optimizing router selection probabilistically favor routers with high bandwidth capabilities.

10.1145/1314333.1314336 article EN 2007-10-29

AR systems pose potential security concerns that should be addressed before the become widespread.

10.1145/2580723.2580730 article EN Communications of the ACM 2014-03-24

Deep neural networks (DNNs) are vulnerable to adversarial examples-maliciously crafted inputs that cause DNNs make incorrect predictions. Recent work has shown these attacks generalize the physical domain, create perturbations on objects fool image classifiers under a variety of real-world conditions. Such pose risk deep learning models used in safety-critical cyber-physical systems. In this work, we extend more challenging object detection models, broader class algorithms widely detect and...

10.48550/arxiv.1807.07769 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Abstract Today’s automobiles leverage powerful sensors and embedded computers to optimize efficiency, safety, driver engagement. However the complexity of possible inferences using in-car sensor data is not well understood. While we do know attempts by automotive manufacturers or makers after-market components (like insurance dongles) violate privacy, a key question ask is: could they (or their collection later accidental leaks data) driver’s privacy? In present study, experimentally...

10.1515/popets-2015-0029 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2015-09-08

Modern client platforms, such as iOS, Android, Windows Phone, 8, and web browsers, run each application in an isolated environment with limited privileges. A pressing open problem systems is how to allow users grant applications access user-owned resources, e.g., privacy- cost-sensitive devices like the camera or user data residing other applications. key challenge enable a way that non-disruptive while still maintaining least-privilege restrictions on In this paper, we take approach of...

10.1109/sp.2012.24 article EN IEEE Symposium on Security and Privacy 2012-05-01

The global health threat from COVID-19 has been controlled in a number of instances by large-scale testing and contact tracing efforts. We created this document to suggest three functionalities on how we might best harness computing technologies supporting the goals public organizations minimizing morbidity mortality associated with spread COVID-19, while protecting civil liberties individuals. In particular, work advocates for third-party free approach assisted mobile tracing, because such...

10.48550/arxiv.2004.03544 preprint EN cc-by arXiv (Cornell University) 2020-01-01

Large language model (LLM) platforms, such as ChatGPT, have recently begun offering an app ecosystem to interface with third-party services on the internet. While these apps extend capabilities of LLM they are developed by arbitrary third parties and thus cannot be implicitly trusted. Apps also platforms users using natural language, which can imprecise interpretations. In this paper, we propose a framework that lays foundation for platform designers analyze improve security, privacy, safety...

10.1609/aies.v7i1.31664 article EN 2024-10-16

We introduce the area of remote physical device fingerprinting, or fingerprinting a device, as opposed to an operating system class devices, remotely, and without fingerprinted device's known cooperation. accomplish this goal by exploiting small, microscopic deviations in hardware: clock skews. Our techniques do not require any modification devices. report consistent measurements when measurer is thousands miles, multiple hops, tens milliseconds away from connected Internet different...

10.1109/sp.2005.18 article EN 2005-01-01
Coming Soon ...