⚠️ AU Media Inquiries: I'm currently on U.S. EST, and will check emails in the early AM.
I am currently accepting only limited Masters and PhD students. Please see here for details.
I’m a Senior Lecturer (equivalent to a U.S. Associate Professor) and Deputy Head of School (Academic) in the School of Computing and Information Systems at the University of Melbourne. My research explores how computer systems interact with the law, with a particular focus on security.
In public service, I was the inaugural Geller Fellow placed at the Federal Trade Commission’s Office of Policy Planning and worked on federal technology policy as a Cybersecurity Fellow in the office of U.S. Senator Ron Wyden. I earned my Ph.D. and MSE in Computer & Information Science and a Master in Law from the University of Pennsylvania, and a BSc and DipMus from the University of Melbourne and its Conservatorium.
I am a Senior Lecturer (equivalent to a U.S. Associate Professor) and the Deputy Head of School (Academic) for the School of Computing and Information Systems at the University of Melbourne. My research centers on the interplay between computer systems and the law, with particular focus on applications of cryptography.
In 2019, I was the inaugural Geller Fellow of the Wharton Public Policy Initiative, placed in the Federal Trade Commission’s Office of Policy Planning, where I assisted in the development of technology strategy for the commission.
In 2018 I served as a Cybersecurity Fellow working on U.S. federal technology policy in the office of Senator Ron Wyden.
I completed my Ph.D. and MSE at the University of Pennsylvania in Computer & Information Science. I obtained a Master in Law from Penn Law, and my BSc and DipMus (Vocal Performance) from the University and Conservatorium of Melbourne respectively.
My research has received recognition in the form of Best Paper Awards at ACM CCS and ACM/IEEE ICSE and a Pwnie Award for Best Cryptographic Attack, along with the faculty Excellence in Mid-Career Research Award. I am also the recipient of many teaching awards at the national and university level including the CORE Award for Teaching (Early Career), the Edward Brown Award, and the Kelvin Medal.
Research Interests
Applied Cryptography, Computer Security, Public Interest Technology, Consumer Protection
Highlighted Publications
This list represents a mix of some recent work and older work that is exciting and representative of my research.
“It’s been lovely watching you”: Institutional Decision-Making on
Online Proctoring Software. 2025 IEEE Symposium on Security and Privacy (SP) (2025). Elisa Shioji, Ani Meliksetyan, Lucy Simko, Ryan Watkins, Adam Aviv and Shaanan Cohney.
@inproceedings{shioji2024s,
title = {``It's been lovely watching you'': Institutional Decision-Making on
Online Proctoring Software},
author = {Shioji, Elisa and Meliksetyan, Ani and Simko, Lucy and Watkins, Ryan and Aviv, Adam and Cohney, Shaanan},
booktitle = {2025 IEEE Symposium on Security and Privacy (SP)},
pages = {1--18},
year = {2025},
organization = {IEEE Computer Society},
selected = {yes},
group = {papers},
link = https://www.lucysimko.com/publications/shioji-proctoring-ieee-sp-25.pdf
}
SoK: Trusted setups in cryptography, Financial Cryptography and Data Security, (2025), Faxing Wang, Shaanan Cohney and Joseph Bonneau.
@article{trustedsetups,
title = {{SoK: Trusted setups in cryptography}},
author = {Wang, Faxing and Cohney, Shaanan and Bonneau, Joseph},
journal = {Financial Cryptography and Data Security},
year = {2025},
pages = {1--18},
selected = {yes},
group = {papers},
link = {https://eprint.iacr.org/2025/064.pdf}
}
Trailblazer: Practical End-to-end Web API Fuzzing (Registered Report)
. Proceedings of the 34th ACM SIGSOFT International Symposium on
Software Testing and Analysis (2025). Lianglu Pan, Shaanan Cohney, Toby Murray and Van-Thuan Pham.
@inproceedings{pan2025trailblazer,
title = {Trailblazer: Practical End-to-end Web API Fuzzing (Registered Report)
},
author = {Pan, Lianglu and Cohney, Shaanan and Murray, Toby and Pham, Van-Thuan},
booktitle = {Proceedings of the 34th ACM SIGSOFT International Symposium on
Software Testing and Analysis},
pages = {143--152},
year = {2025},
selected = {yes},
group = {papers},
link = {https://dl.acm.org/doi/10.1145/3713081.3731717}
}
Detecting Excessive Data Exposures in Web Server Responses with
Metamorphic Fuzzing, 46th ACM/IEEE International Conference on Software Engineering, (2024), Lianglu Pan, Shaanan Cohney, Toby Murray and Van-Thuan Pham, 🏆 Distinguished Paper Award.
@article{edefuzz,
title = {Detecting Excessive Data Exposures in Web Server Responses with
Metamorphic Fuzzing},
author = {Pan, Lianglu and Cohney, Shaanan and Murray, Toby and Pham, Van-Thuan},
booktitle = {46th ACM/IEEE International Conference on Software Engineering},
year = {2024},
selected = {yes},
pages = {1-14},
group = {papers},
awards = {Distinguished Paper Award.},
link = {https://dl.acm.org/doi/10.1145/3597503.3608133}
}
Watching the watchers: bias and vulnerability in remote proctoring
software, 31st USENIX Security Symposium (USENIX Security 22), (2022), Ben Burgess, Avi Ginsberg, Edward W Felten and Shaanan Cohney.
@article{watchers,
title = {Watching the watchers: bias and vulnerability in remote proctoring
software},
author = {Burgess, Ben and Ginsberg, Avi and Felten, Edward W and Cohney, Shaanan},
booktitle = {31st USENIX Security Symposium (USENIX Security 22)},
year = {2022},
selected = {yes},
group = {papers},
pages = {571--588},
link = {https://www.usenix.org/system/files/sec22-burgess.pdf}
}
Coin-operated capitalism, Columbia Law Review, 3 (2019), Shaanan Cohney, David Hoffman, Jeremy Sklaroff and David Wishnick.
@article{coc,
title = {Coin-operated capitalism},
author = {Cohney, Shaanan and Hoffman, David and Sklaroff, Jeremy and Wishnick, David},
journal = {Columbia Law Review},
volume = {119},
number = {3},
pages = {591--676},
year = {2019},
publisher = {JSTOR},
selected = {yes},
group = {lawreviews},
link = {https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3215345}
}
A systematic analysis of the Juniper Dual EC incident, Proceedings of the 2016 ACM SIGSAC Conference on Computer and
Communications Security, (2016), Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla and Hovav Shacham, 🏆 Best Paper Award.
@article{juniper,
title = {A systematic analysis of the Juniper Dual EC incident},
author = {Checkoway, Stephen and Maskiewicz, Jacob and Garman, Christina and Fried, Joshua and Cohney, Shaanan and Green, Matthew and Heninger, Nadia and Weinmann, Ralf-Philipp and Rescorla, Eric and Shacham, Hovav},
booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and
Communications Security},
pages = {468--479},
year = {2016},
selected = {yes},
group = {papers},
link = {https://dl.acm.org/doi/10.1145/2976749.2978395},
awards = {Best Paper Award}
}
Dr Josh Fried— Systems security for efficient datacenters
Miscellaneous
While at Princeton I was a Bass in Voices of Gotham, a competitive barbershop chorus. I spent my PhD in multiple different choirs, the most significant of them being the Penn Glee Club and the Penn Pipers.
I spend much of my free time playing piano, predominantly works from musical theatre.
I came second place in a safe cracking tournament, and am working to learn and teach lockpicking.
I ran the Melbourne Marathon in 2021, having started from not being able to run 1km in 2020.
I have a finite Bacon-Erdős number of 6.
Kevin Bacon appeared with Laurence Fishburne in Mystic River, Laurence Fishburne appeared with Christine Anu in The Matrix Reloaded, Christine Anu appeared with me in The Project. Bacon 3.
I coauthored with Yuval Yarom who coauthored with Amnon B. Barak who coauthored with Paul Erdős. Erdős 3.