Biography
Tadayoshi Kohno is the Short-Dooley Professor of Computer Science & Engineering at the University of Washington, with adjunct appointments in the UW Electrical Engineering Department and the UW Information School. He is a member of the UW CSE Security and Privacy Research Lab and the UW Tech Policy Lab. He also serves on the National Academies Forum on Cyber Resilience and the USENIX Security Steering Committee. Kohno's research focuses on computer security and privacy, broadly defined. He is especially interested in: computer security and privacy for emerging and consumer technologies; computer security and privacy for mobile and cloud systems; the human element in computer security systems; and computer security education.
Education
- Ph D, Computer Science and Engineering, University of California, San Diego, 2006
- MS, Computer Science and Engineering, University of California, San Diego, 2004
- BS, Computer Science, University of Colorado at Boulder, 1999
Publications and Contributions
-
Journal Article, Academic JournalSafeguarding Human Values: Rethinking US Law for Generative AI's Societal Impacts (2024)AI and Ethics
-
Conference Extended AbstractEnvisioning Legal Mitigations for LLM-based Intentional and Unintentional Harms (2023)Fortieth International Conference on Machine Learning Workshop on Generative AI and Law (ICML GenLaw 2023)
-
CommentsComments to the Federal Trade Commission re: Commercial Surveillance ANPR, R111004 (2022)Federal Trade Commission 2022
-
Journal Article, Academic JournalA Privacy-Focused Systematic Analysis of Online Status Indicators (2020)Proceedings on Privacy Enhancing Technologies Symposium (PoPETS), 3(Unknown Issue), pp. 384-403
-
Book Editor, Scholarly
-
Conference PaperUser Experiences with Online Status Indicators (2020)Proceedings of the 38th annual ACM conference on human factors in computing systems (CHI '20), pp. 1-12
-
Conference ProceedingConsumer Smart Homes: Where We Are and Where We Need to Go (2019)Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, pp. 117--122
-
Conference PaperSecure Multi-User Content Sharing for Augmented Reality Applications (2019)Proceedings of the 28th USENIX Security Symposium, pp. 141--158
-
Journal Article, Academic JournalArya: Operating system support for securely augmenting reality (2018)IEEE Security & Privacy, 16(1), pp. 44--53
-
Journal Article, Academic JournalChallenges and New Directions in Augmented Reality, Computer Security, and Neuroscience--Part 1: Risks to Sensation and Perception (2018)arXiv preprint arXiv:1806.10557
-
Conference ProceedingComputer Security and Privacy for Refugees in the United States (2018)2018 IEEE Symposium on Security and Privacy (SP), pp. 409--423
-
Journal Article, Academic JournalComputer security for data collection technologies (2018)Development engineering, 3(Unknown Issue), pp. 1--11
-
Conference ProceedingTowards security and privacy for multi-user augmented reality: Foundations with end users (2018)2018 IEEE Symposium on Security and Privacy (SP), pp. 392--408
-
Conference PaperExploring ADINT: Using ad targeting for surveillance on a budget-or-how Alice can buy ads to track Bob (2017)Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, pp. 153--164
-
Conference PaperRewriting history: Changing the archived web from the present (2017)Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1741--1755
-
Conference PaperSecuring augmented reality output (2017)2017 IEEE Symposium on Security and Privacy (SP), pp. 320--337
-
Conference PaperSecuring vulnerable home IoT devices with an in-hub security manager (2017)2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 551--556
-
Journal Article, Academic JournalExcavating Web Trackers Using Web Archaeology (2016); login:, 41(4)
-
Conference ProceedingHow to safely augment reality: Challenges and directions (2016)Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, pp. 45--50
-
Conference ProceedingInternet Jones and the raiders of the lost trackers (2016)An archaeological study of web tracking from 1996 to 2016
-
Managing access by applications to perceptual information (2016)
-
Conference PaperMyTime: Designing and Evaluating an Intervention for Smartphone Non-Use (2016)Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 4746–4757
-
Conference PaperMyTime: Designing and Evaluating an Intervention for Targeted Smartphone Non-Use (2016)ACM Conference on Human Factors in Computing Systems
-
Conference PaperWhy would you do that? Predicting the uses and gratifications behind smartphone-usage behaviors (2016)Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 634–645
-
Conference PaperAnalyzing the use of quick response codes in the wild (2015)Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, pp. 359--374
-
ReportAugmented Reality: A Technology and Policy Primer (2015)
-
Conference PaperCryptographic currencies from a tech-policy perspective: Policy issues and technical directions (2015)International Conference on Financial Cryptography and Data Security, pp. 94--111
-
Technical ReportDisplay leakage and transparent wearable displays: Investigation of risk, root causes, and defenses (2015)
-
Technical ReportRethinking Mobile Money Security for Developing Regions (2015)
-
Conference Workshop PaperAugmented Reality: A Techno-Legal Approach (2014)Ubicomp - ACM International Conference on Ubiquitous Computing
-
Conference PaperAugmented reality: hard problems of law and policy (2014)2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'14): Adjunct Publication, pp. 1283--1288
-
Conference PaperCPS: Beyond usability: Applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices (2014)Annual Computer Security Applications Conference (ACSAC)
-
Conference PaperSex, lies, or kittens? investigating the use of snapchat’s self-destructing messages (2014)International Conference on Financial Cryptography and Data Security, pp. 64--76
-
Conference PaperWorld-driven access control for continuous sensing (2014)Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1169--1181
-
Conference PaperOperating system support for augmented reality applications (2013)Presented as part of the 14th Workshop on Hot Topics in Operating Systems
-
Conference PaperSecuring embedded user interfaces: Android and beyond (2013)Presented as part of the 22nd $\{$USENIX$\}$ Security Symposium ($\{$USENIX$\}$ Security 13), pp. 97--112
-
Magazine/Trade PublicationBalancing privacy and functionality of third-party social widgets (2012)USENIX Magazine
-
Conference PaperDetecting and defending against third-party tracking on the web (2012)Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, pp. 12--12
-
Magazine/Trade PublicationSharemenot: Balancing privacy and functionality of third-party social widgets (2012)Usenix; login
-
Conference PaperUser interface toolkit mechanisms for securing interface elements (2012)Proceedings of the 25th annual ACM symposium on User interface software and technology, pp. 239--250
-
Conference PaperComprehensive experimental analyses of automotive attack surfaces. (2011)USENIX Security Symposium, 4(Unknown Issue), pp. 447--462
Presentations
-
Second Global Summit on Tech Policy: Toward Culturally Responsive Artificial Intelligence
(2018)
UW Tech Policy Lab - Seattle, WA
-
Responsible Innovation: A Cross Disciplinary Lens on Privacy and Security Challenges
(2015)
College of Engineering Public Lectures Series, University of Washington - Seattle, WA