Cohney, Shaanan
18  results:
Search for persons X
?
1

Learning with Style: Improving Student Code-Style Through B..:

, In: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1,
Saliba, Liam ; Shioji, Elisa ; Oliveira, Eduardo.. - p. 1175-1181 , 2024
 
?
2

EDEFuzz: A Web API Fuzzer for Excessive Data Exposures:

, In: 2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE),
Pan, Lianglu ; Cohney, Shaanan ; Murray, Toby. - p. 530-541 , 2024
 
?
3

NOTRY: Deniable messaging with retroactive avowal:

Wang, Faxing ; Cohney, Shaanan ; Wahby, Riad.
Proceedings on Privacy Enhancing Technologies.  2024 (2024)  2 - p. 391-411 , 2024
 
?
4

EDEFuzz: A Web API Fuzzer for Excessive Data Exposures:

, In: Proceedings of the IEEE/ACM 46th International Conference on Software Engineering,
Pan, Lianglu ; Cohney, Shaanan ; Murray, Toby. - p. 1-12 , 2024
 
?
5

COVID Down Under: where did Australia's pandemic apps go wr..:

, In: 2023 IEEE International Symposium on Ethics in Engineering, Science, and Technology (ETHICS),
Cohney, Shaanan ; Cheong, Marc - p. 1-8 , 2023
 
?
 
?
7

Pseudorandom Black Swans: Cache Attacks on CTR_DRBG:

, In: 2020 IEEE Symposium on Security and Privacy (SP),
Cohney, Shaanan ; Kwong, Andrew ; Paz, Shahar... - p. 1241-1258 , 2020
 
?
8

Coin-Operated Capitalism:

Cohney, Shaanan ; Hoffman, David A. ; Sklaroff, Jeremy.
Columbia Law Review.  119 (2019)  - p. 591 , 2019
 
?
9

COIN-OPERATED CAPITALISM:

Cohney, Shaanan ; Hoffman, David ; Sklaroff, Jeremy.
Columbia Law Review.  119 (2019)  3 - p. 591-676 , 2019
 
?
12

A Systematic Analysis of the Juniper Dual EC Incident:

, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security,
 
?
13

Practical State Recovery Attacks against Legacy RNG Impleme..:

, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
 
1-15