Biography

Tadayoshi Kohno is the Short-Dooley Professor of Computer Science & Engineering at the University of Washington, with adjunct appointments in the UW Electrical Engineering Department and the UW Information School. He is a member of the UW CSE Security and Privacy Research Lab and the UW Tech Policy Lab. He also serves on the National Academies Forum on Cyber Resilience and the USENIX Security Steering Committee. Kohno's research focuses on computer security and privacy, broadly defined. He is especially interested in: computer security and privacy for emerging and consumer technologies; computer security and privacy for mobile and cloud systems; the human element in computer security systems; and computer security education.

Education

  • Ph D, Computer Science and Engineering, University of California, San Diego, 2006
  • MS, Computer Science and Engineering, University of California, San Diego, 2004
  • BS, Computer Science, University of Colorado at Boulder, 1999

Publications and Contributions

  • Comments
    Comments to the Federal Trade Commission re: Commercial Surveillance ANPR, R111004 (2022)
    Federal Trade Commission 2022 Authors: Clara Berridge, Aylin Caliskan, Ryan Calo, Mary D. Fan, Alexis Hiniker, Tadayoshi Kohno, Franziska Roesner
  • Journal Article, Academic Journal
    A Privacy-Focused Systematic Analysis of Online Status Indicators (2020)
    Proceedings on Privacy Enhancing Technologies Symposium (PoPETS), 3(Unknown Issue), pp. 384-403 Authors: Camille Cobb, Lucy Simko, Tadayoshi Kohno, Alexis Hiniker
  • Book Editor, Scholarly
  • Conference Paper
    User Experiences with Online Status Indicators (2020)
    Proceedings of the 38th annual ACM conference on human factors in computing systems (CHI '20), pp. 1-12 Authors: Camille Cobb, Lucy Simko, Tadayoshi Kohno, Alexis Hiniker
  • Conference Proceeding
    Consumer Smart Homes: Where We Are and Where We Need to Go (2019)
    Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, pp. 117--122 Authors: Shrirang Mare, Logan Girvin, Franzi Roesner, Tadayoshi Kohno
  • Conference Paper
    Secure Multi-User Content Sharing for Augmented Reality Applications (2019)
    Proceedings of the 28th USENIX Security Symposium, pp. 141--158 Authors: Kimberly Ruth, Tadayoshi Kohno, Franzi Roesner
  • Journal Article, Academic Journal
    Arya: Operating system support for securely augmenting reality (2018)
    IEEE Security & Privacy, 16(1), pp. 44--53 Authors: Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franzi Roesner
  • Journal Article, Academic Journal
    Challenges and New Directions in Augmented Reality, Computer Security, and Neuroscience--Part 1: Risks to Sensation and Perception (2018)
    arXiv preprint arXiv:1806.10557 Authors: Stefano Baldassi, Tadayoshi Kohno, Franzi Roesner, Moqian Tian
  • Conference Proceeding
    Computer Security and Privacy for Refugees in the United States (2018)
    2018 IEEE Symposium on Security and Privacy (SP), pp. 409--423 Authors: Lucy Simko, Ada Lerner, Samia Ibtasam, Franzi Roesner, Tadayoshi Kohno
  • Journal Article, Academic Journal
    Computer security for data collection technologies (2018)
    Development engineering, 3(Unknown Issue), pp. 1--11 Authors: Camille Cobb, Samuel Sudar, Nicholas Reiter, Richard Anderson, Franzi Roesner, Tadayoshi Kohno
  • Conference Proceeding
    Towards security and privacy for multi-user augmented reality: Foundations with end users (2018)
    2018 IEEE Symposium on Security and Privacy (SP), pp. 392--408 Authors: Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franzi Roesner
  • Conference Paper
    Exploring ADINT: Using ad targeting for surveillance on a budget-or-how Alice can buy ads to track Bob (2017)
    Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, pp. 153--164 Authors: Paul Vines, Franzi Roesner, Tadayoshi Kohno
  • Conference Paper
    Rewriting history: Changing the archived web from the present (2017)
    Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1741--1755 Authors: Ada Lerner, Tadayoshi Kohno, Franzi Roesner
  • Conference Paper
    Securing augmented reality output (2017)
    2017 IEEE Symposium on Security and Privacy (SP), pp. 320--337 Authors: Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franzi Roesner
  • Conference Paper
    Securing vulnerable home IoT devices with an in-hub security manager (2017)
    2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 551--556 Authors: Anna Kornfeld Simpson, Franzi Roesner, Tadayoshi Kohno
  • Journal Article, Academic Journal
    Excavating Web Trackers Using Web Archaeology (2016)
    ; login:, 41(4) Authors: Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franzi Roesner
  • Conference Proceeding
    How to safely augment reality: Challenges and directions (2016)
    Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, pp. 45--50 Authors: Kiron Lebeck, Tadayoshi Kohno, Franzi Roesner
  • Conference Proceeding
    Internet Jones and the raiders of the lost trackers (2016)
    An archaeological study of web tracking from 1996 to 2016 Authors: Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franzi Roesner
  • Managing access by applications to perceptual information (2016)
    Authors: Loris D'antoni, Alan M Dunn, Suman Jana, Tadayoshi Kohno, Benjamin Livshits, David A Molnar, Alexander N Moshchuk, Eyal Ofek, Franzi Roesner, Timothy Scott Saponas, others
  • Conference Paper
    MyTime: Designing and Evaluating an Intervention for Smartphone Non-Use (2016)
    Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 4746–4757 Authors: Alexis Hiniker, Sungsoo Ray Hong, Tadayoshi Kohno, Julie A. Kientz
  • Conference Paper
    MyTime: Designing and Evaluating an Intervention for Targeted Smartphone Non-Use (2016)
    ACM Conference on Human Factors in Computing Systems Authors: Alexis Hiniker, Sungsoo Hong, Tadayoshi Kohno, Julie A. Kientz
  • Conference Paper
    Why would you do that? Predicting the uses and gratifications behind smartphone-usage behaviors (2016)
    Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 634–645 Authors: Alexis Hiniker, Shwetak N Patel, Tadayoshi Kohno, Julie A. Kientz
  • Conference Paper
    Analyzing the use of quick response codes in the wild (2015)
    Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, pp. 359--374 Authors: Adam Lerner, Alisha Saxena, Kirk Ouimet, Ben Turley, Anthony Vance, Tadayoshi Kohno, Franzi Roesner
  • Report
    Augmented Reality: A Technology and Policy Primer (2015)
    Authors: Ryan Calo, T Denning, Batya Friedman, Tadayoshi Kohno, Lassana Magassa, E McReynolds, Bryce Newell, F Roesner, J Woo
  • Conference Paper
    Cryptographic currencies from a tech-policy perspective: Policy issues and technical directions (2015)
    International Conference on Financial Cryptography and Data Security, pp. 94--111 Authors: Emily McReynolds, Adam Lerner, Will Scott, Franzi Roesner, Tadayoshi Kohno
  • Technical Report
    Display leakage and transparent wearable displays: Investigation of risk, root causes, and defenses (2015)
    Authors: Tadayoshi Kohno, Joel Kollin, David Molnar, Franzi Roesner
  • Technical Report
    Rethinking Mobile Money Security for Developing Regions (2015)
    Authors: Kiron Lebeck, Temitope Oluwafemi, Tadayoshi Kohno, Franzi Roesner
  • Conference Workshop Paper
    Augmented Reality: A Techno-Legal Approach (2014)
    Ubicomp - ACM International Conference on Ubiquitous Computing Authors: Franziska Roesner, Tamara Denning, Bryce Newell, Tadayoshi Kohno, Ryan Calo
  • Conference Paper
    Augmented reality: hard problems of law and policy (2014)
    2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'14): Adjunct Publication, pp. 1283--1288 Authors: Franzi Roesner, Tamara Denning, Bryce Newell, Tadayoshi Kohno, Ryan Calo
  • Conference Paper
    CPS: Beyond usability: Applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices (2014)
    Annual Computer Security Applications Conference (ACSAC) Authors: Tamara Denning, Batya Friedman, Brian Gill, Daniel Kramer, Matthew Reynolds, Tadayoshi Kohno
  • Conference Paper
    Sex, lies, or kittens? investigating the use of snapchat’s self-destructing messages (2014)
    International Conference on Financial Cryptography and Data Security, pp. 64--76 Authors: Franzi Roesner, Brian T Gill, Tadayoshi Kohno
  • Conference Paper
    World-driven access control for continuous sensing (2014)
    Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1169--1181 Authors: Franzi Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, Helen J Wang
  • Conference Paper
    Operating system support for augmented reality applications (2013)
    Presented as part of the 14th Workshop on Hot Topics in Operating Systems Authors: Loris D'Antoni, Alan Dunn, Suman Jana, Tadayoshi Kohno, Benjamin Livshits, David Molnar, Alexander Moshchuk, Eyal Ofek, Franzi Roesner, Scott Saponas, others
  • Conference Paper
    Securing embedded user interfaces: Android and beyond (2013)
    Presented as part of the 22nd $\{$USENIX$\}$ Security Symposium ($\{$USENIX$\}$ Security 13), pp. 97--112 Authors: Franzi Roesner, Tadayoshi Kohno
  • Magazine/Trade Publication
    Balancing privacy and functionality of third-party social widgets (2012)
    USENIX Magazine Authors: Franzi Roesner, CHRISTOPHER Rovillos, Tadayoshi Kohno, DAVID Wetherall
  • Conference Paper
    Detecting and defending against third-party tracking on the web (2012)
    Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, pp. 12--12 Authors: Franzi Roesner, Tadayoshi Kohno, David Wetherall
  • Magazine/Trade Publication
    Sharemenot: Balancing privacy and functionality of third-party social widgets (2012)
    Usenix; login Authors: Franzi Roesner, Christopher Rovillos, Tadayoshi Kohno, David Wetherall
  • Conference Paper
    User interface toolkit mechanisms for securing interface elements (2012)
    Proceedings of the 25th annual ACM symposium on User interface software and technology, pp. 239--250 Authors: Franzi Roesner, James A. Fogarty, Tadayoshi Kohno
  • Conference Paper
    Comprehensive experimental analyses of automotive attack surfaces. (2011)
    USENIX Security Symposium, 4(Unknown Issue), pp. 447--462 Authors: Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franzi Roesner, Tadayoshi Kohno, others
  • Conference Poster
    NA
    Authors: Inyoung Cheong, Aylin Caliskan, Tadayoshi Kohno

Presentations

  • Second Global Summit on Tech Policy: Toward Culturally Responsive Artificial Intelligence (2018)
    UW Tech Policy Lab - Seattle, WA
  • Responsible Innovation: A Cross Disciplinary Lens on Privacy and Security Challenges (2015)
    College of Engineering Public Lectures Series, University of Washington - Seattle, WA