- SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems. K. Koscher, T. Kohno, D. Molnar. In the Proceedings of 9th Workshop on Offensive Technologies (WOOT '15).
- Fast and Vulnerable: A Story of Telematics Failures. I. Foster, A. Prudhomme, K. Koscher, S. Savage. In the Proceedings of 9th Workshop on Offensive Technologies (WOOT '15).
- Collaborative Verification of Information Flow for a High-Assurance App Store. M. D. Ernst., R. Just, S. Millerstein, W. Dietl, S. Pernsteiner, F. Roesner, K. Koscher, P. Barros, R. Bhoraskar, S. Han, P. Vines, E. X. Wu. In the Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS '14).
- Securing Embedded Systems: Analyses of Modern Automotive Systems and Enabling Near-Real Time Dynamic Analysis. K. Koscher. Doctoral Dissertation, University of Washington, 2014.
- DeadDrop/StrongBox Security Assessment. A. Czeskis, D. Mah, O. Sandoval, I. Smith, K. Koscher, J. Appelbaum, T. Kohno, B. Schneier. University of Washington Computer Science and Engineering Technical Report, TR 13-08-02, August 2013.
- vpwns: Virtual Pwned Networks. J. Appelbaum, M. Ray, K. Koscher, I. Finder. In the Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet (FOCI '12).
- Comprehensive Experimental Analyses of Automotive Attack Surfaces. S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage (University of California, San Diego), K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno (University of Washington). Presented in part at the National Academy of Sciences Committee on Electronic Vehicle Controls and Unintended Acceleration, March 3-4, 2011. In the Proceedings of the 20th USENIX Security Symposium, August 8-12, 2011.
- Experimental Security Analysis of a Modern Automobile.
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno (University of Washington), S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage (University of California, San Diego).
In the Proceedings of the 31st IEEE Symposium on Security and Privacy, May 16-19, 2010 (Oakland).
- Following Directions Using Statistical Machine Translation.
C. Matuszek, D. Fox, K. Koscher.
In the Proceedings of the 5th ACM/IEEE International Conference on Human-Robot Interaction (HRI 2010).
- EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond.
K. Koscher, A. Juels, V. Brajkovic, and T. Kohno.
In the Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09).
- A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons.
T. Denning, C. Matuszek, K. Koscher, J.R. Smith, and T. Kohno
In the Proceedings of the 11th International Conference on Ubiquitous Computing (UbiComp '09).
- Longitudinal Study of a Building-Wide Passive RFID Deployment.
E. Welbourne, K. Koscher, E. Soroush, M. Balazinska, G. Borriello.
In the Proceedings of The 7th Annual International Conference on Mobile Systems, Applications and Services (MobiSys '09).
- The International Criminal Tribunal for Rwanda Information Heritage Project (aka Voices of the Rwanda Tribunal): Integrity Verification Architecture.
A. Czeskis, K. Koscher, M. Andrews, N.C. Grey, B. Friedman, T.Kohno.
University of Washington Computer Science and Engineering Technical Report, TR 09-01-02, March 2009.
- EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licneses, and Beyond.
K. Koscher, A. Juels, V. Brajkovic, and T. Kohno.
UW CSE Tech Report 08-10-02.
- RFIDs and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and Unauthorized Reads with Context-Aware Communications.
A. Czeskis, K. Koscher, J.R. Smith, T. Kohno.
In the Proceedings of the 15th ACM Conference on Computer and Communications Security, October 2008.
- Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications.
A. Czeskis, D.J. St. Hilaire, K. Koscher, S.D. Gribble, T. Kohno, B. Schneier.
In the Proceedings of the 3rd USENIX Workshop on Hot Topics in Security (HotSec '08), July 29, 2008.
- The Mobile Sensing Platform: An Embedded System for Capturing and Recognizing Human Activities.
T. Choudhury, G. Borriello, S. Consolvo, D. Haehnel, B. Harrison, B. Hemingway, J. Hightower, P. Klasnja, K. Koscher, A. LaMarca, J. A. Landay, J. Lester.
IEEE Pervasive Computing, vol. 7, no. 2, pp. 32-41, April-June, 2008.
- Multi-player Soccer and Wireless Embedded Systems.
G. Borriello, C. Hartung, B. Hemingway, K. Koscher, B. Mayton.
In the Proceedings of the 39th ACM Technical Symposium on Computer Science Education, March 2008.
- Context to Make Your More Aware.
A. Andrew, Y. Anokwa, K. Koscher, J. Lester, G. Boriello.
In the Proceedings of the 27th International Conference on Distributed Computing Systems Workshops, June 2007.