Publications

Shaanan's scholarship spans technical and legal scholarship exploring how cryptography, security, and policy intersect in practice. Highlights include work on proctoring, accountable governance, and secure protocol design, alongside impact-focused collaborations with regulators and industry.

    Peer Reviewed Papers

    1. “It’s been lovely watching you”: Institutional Decision-Making on Online Proctoring Software. 2025 IEEE Symposium on Security and Privacy (SP) (2025). Elisa Shioji, Ani Meliksetyan, Lucy Simko, Ryan Watkins, Adam Aviv and Shaanan Cohney.
      Security & Privacy Law & Policy
    2. SoK: Trusted setups in cryptography, Financial Cryptography and Data Security, (2025), Faxing Wang, Shaanan Cohney and Joseph Bonneau.
      Security & Privacy Cryptography
    3. Trailblazer: Practical End-to-end Web API Fuzzing (Registered Report) . Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis (2025). Lianglu Pan, Shaanan Cohney, Toby Murray and Van-Thuan Pham.
      Security & Privacy
    4. "It’s been lovely watching you": Institutional Decision-Making on Online Proctoring Software. 2025 IEEE Symposium on Security and Privacy (S&P) (2025). Elisa Shioji, Ani Meliksetyan, Ryan Watkins, Adam J. Aviv and Shaanan Cohney.
      Security & Privacy Law & Policy
    5. NOTRY: Deniable messaging with retroactive avowal, PoPETS, (2024), Faxing Wang, Shaanan Cohney, Riad Wahby and Joseph Bonneau. DOI:https://doi.org/10.56553/popets-2024-0056.
      Security & Privacy Cryptography
    6. Learning with Style: Improving Student Code-Style Through Better Automated Feedback, 55th ACM Technical Symposium on Computer Science Education, (2024), Liam Saliba, Eduardo Oliveira, Shaanan Cohney and Qi Jianzhong. DOI:https://doi.org/10.1145/3626252.3630889.
      Security & Privacy
    7. Detecting Excessive Data Exposures in Web Server Responses with Metamorphic Fuzzing, 46th ACM/IEEE International Conference on Software Engineering, (2024), Lianglu Pan, Shaanan Cohney, Toby Murray and Van-Thuan Pham, 🏆 Distinguished Paper Award. DOI:https://doi.org/10.1145/3597503.3608133.
      Security & Privacy
    8. COVID Down Under: where did Australia’s pandemic apps go wrong? 2023 IEEE International Symposium on Ethics in Engineering, Science, and Technology (ETHICS) (2023). Shaanan Cohney and Marc Cheong.
      Security & Privacy Law & Policy
    9. Watching the watchers: bias and vulnerability in remote proctoring software, 31st USENIX Security Symposium (USENIX Security 22), (2022), Ben Burgess, Avi Ginsberg, Edward W Felten and Shaanan Cohney. DOI:https://doi.org/10.48550/arXiv.2205.03009.
      Security & Privacy Law & Policy
    10. Virtual Classrooms and Real Harms: Remote Learning at {US}. Universities, Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021) , (2021), Shaanan Cohney, Ross Teixeira, Anne Kohlbrenner, Arvind Narayanan, Mihir Kshirsagar, Yan Shvartzshnaider and Madelyn Sanfilippo. DOI:https://doi.org/10.48550/arXiv.2012.05867.
      Security & Privacy Law & Policy
    11. Pseudorandom black swans: Cache attacks on CTR_DRBG, 2020 IEEE Symposium on Security and Privacy (S&P), (2020), Shaanan Cohney, Andrew Kwong, Shahar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen and Yuval Yarom. DOI:https://doi.org/10.1109/SP40000.2020.00046.
      Security & Privacy Cryptography
    12. Practical state recovery attacks against legacy RNG implementations, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (2018), Shaanan Cohney, Matthew D Green and Nadia Heninger. DOI:https://doi.org/10.1145/3243734.3243756.
      Security & Privacy Cryptography
    13. Measuring small subgroup attacks against Diffie-Hellman, NDSS, (2016), Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J Alex Halderman and Nadia Heninger. DOI:https://doi.org/10.14722/ndss.2017.23171.
      Security & Privacy Cryptography
    14. Factoring as a service, International Conference on Financial Cryptography and Data Security, (2016), Luke Valenta, Shaanan Cohney, Alex Liao, Joshua Fried, Satya Bodduluri and Nadia Heninger. DOI:https://doi.org/10.1007/978-3-662-54970-4_19.
      Security & Privacy Cryptography
    15. {DROWN}: Breaking {TLS} Using {SSLv2}, 25th USENIX Security Symposium (USENIX Security 16), (2016), Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar and Yuval Shavitt, 🏆 Runner-Up, Internet Defense Prize.
      Security & Privacy Cryptography
    16. A systematic analysis of the Juniper Dual EC incident, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (2016), Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla and Hovav Shacham, 🏆 Best Paper Award. DOI:https://doi.org/10.1145/2976749.2978395.
      Security & Privacy Cryptography

    Law Review Articles

    1. Transactional scripts in contract stacks, Minn. L. Rev., (2020), Shaanan Cohney and David A Hoffman. DOI:https://doi.org/10.2139/ssrn.3523515.
      Law & Policy
    2. Coin-operated capitalism, Columbia Law Review, 3 (2019), Shaanan Cohney, David Hoffman, Jeremy Sklaroff and David Wishnick. DOI:https://doi.org/10.2139/ssrn.3215345.
      Law & Policy

    Journal Articles

    1. Where did i leave my keys? Lessons from the juniper dual ec incident, Communications of the ACM, 11 (2018), Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla and Hovav Shacham. DOI:https://doi.org/10.1145/3266291.
      Security & Privacy Cryptography

    Policy Submissions

    1. Submission to the Education and Workforce Committee: Inquiry into the harm young New Zealanders encounter online, and the roles that Government, business, and society should play in addressing those harms. New Zealand Parliament, Education and Workforce Committee. Shaanan Cohney, Sarah Scheffler, Madelyne Xiao and Lena Habtu. (2025).
      Law & Policy
    2. Submission to Senate Inquiry: Online Safety Amendment (Social Media Minimum Age) Bill 2024. Submission 272 to the Senate Environment and Communications Legislation Committee. Benjamin I. P. Rubinstein, Olga Ohrimenko, Andrew C. Cullen, Shaanan Cohney, Chris Culnane, Toby Murray, Marc Cheong, Thuan Pham and Xingliang Yuan. (Nov. 2024).
      Law & Policy
    3. Submission to Senate Inquiry, Online Safety Amendment (Social Media Minimum Age) Bill 2024. Benjamin I. P. Rubinstein, Olga Ohrimenko, Andrew C. Cullen, Shaanan Cohney, Chris Culnane, Toby Murray, Marc Cheong, Thuan Pham and Xingliang Yuan. (Nov. 2024).
      Law & Policy
    4. Safe and responsible AI in Australia, Discussion Paper Response. Jeanie Marie Paterson, Shaanan Cohney, Liz Sonenberg, Fahimeh Abedi, Marc Cheong, Carmelina Contarino, Joe Brailsford, Tom Drummond, Liam Harding, Eduard Hovy, Christine de Kock, Brian Martin, Aidan McLoughney, Olga Ohrimenko, Sarita Rosenstock, Ben Rubinstein and Michael Wildenauer. (2023).
      Law & Policy
    5. Submission to Inform Government Response to Privacy Act Review Report . Shaanan Cohney, Chris Culnane, Liam Harding, Toby Murray, Olga Ohrimenko and Benjamin I.P. Rubinstein. (2023).
      Law & Policy
    6. Addressing Big Tech Regulation in Australia. Shaanan Cohney, Liam Harding, Gabby Bush, Marc Cheong, Tatiana Cutts, Liam Harding, Toby Murray, Suelette Dreyfus and Sarita Rosenstock. (2023).
      Law & Policy
    7. Strengthening Australian Consumer Protection in the era of Digital Platforms. Shaanan Cohney, Liam Harding and Suelette Dreyfus. (2023).
      Law & Policy
    8. Submission in Response to the 2023-2030 Australian Cyber Security Strategy Discussion Paper. Atif Ahmad, Shaanan Cohney, Suelette Dreyfus, Sarah Erfani, Liam Harding, Christopher Leckie, Sean Maynard, Toby Murray, Olga Ohrimenko, Adrian Pearce and Benjamin I.P. Rubinstein. (2023).
      Security & Privacy Law & Policy
    9. Submission to ANPR R111004 Commercial Surveillance. Nia Brazzell, Jordan Bresinger, Shaanan Cohney, Sayash Kapoor, Mhir Kshirsagar, Jonathan Mayer and Arvind Narayanan. (2022).
      Law & Policy
    10. Submission to the ACCC’s Digital Platform Services Inquiry Discussion Paper. Jeannie Paterson, Shaanan Cohney, Gabby Bush, Liam Harding and Alex Paterson. (2022).
      Law & Policy
    11. Response to the Review of the Privacy Act. Jeannie Paterson, Shaanan Cohney, Lars Kulik and Liam Harding. (2022).
      Law & Policy
    12. Strengthening Australia’s cybersecurity regulations and incentives: Response to the Department of Home Affairs Discussion Paper. Amit Achrekar, Atif Ahmad, Shanton Chang, Shaanan Cohney, Suelette Dreyfus, Chris Leckie, Toby Murray, Jeannie Paterson, Thuan Pham and Liz Sonenberg. (2021).
      Security & Privacy Law & Policy
    13. Comments on Revised Proposed Regulations Implementing the California Consumer Privacy Act. Marshini Chetty, Shaanan Cohney, Mihir Kshirsagar, Arunesh Mathur, Jonathan Mayer, Arvind Narayanan, Ross Teixeira and Ari Ezra Waldman. (2020).
      Law & Policy

    Forthcoming & In Press

    1. Beyond Client-Side Scanning: Cryptographic Protocols for Server-Side Content Moderation. Shangqi Lai, Xingliang Yuan, Shaanan Cohney, Faxing Wang and Qi Li. (2024).
      Security & Privacy Cryptography
    2. SoK: Trusted setups in cryptography. Faxing Wang, Shaanan Cohney and Joseph Bonneau. (2024).
      Cryptography
    3. No More Corporate Law? Shaanan Cohney and Hui Chia. (2024).
      Law & Policy
    4. Trailblazer: Practical End-to-end Web API Fuzzing. Lianglu Pan, Shaanan Cohney, Toby Murray and Van-Thuan Pham. (2024).
      Security & Privacy

    Tutorials & Tools

    1. A Gentle Tutorial for Lattice-Based Cryptanalysis. Joseph Surin and Shaanan Cohney. (2022).
      Cryptography

    Patents

    1. System and Method for Detecting Excessive Data Exposures. Australian Provisional Patent 2022903182. Lianglu Pan, Toby Murray, Thuan Pham and Shaanan Cohney. (2022).
      Security & Privacy

    Writing & Commentary

    1. Singing the virtues of cyber security. Cyber Australia. Suelette Dreyfus and Shaanan Cohney. (2023).
    2. The Splendour of Cybersecurity. Pursuit Magazine. Suelette Dreyfus and Shaanan Cohney. (2023).
    3. AI Apocalypse or Overblown Hype? Pursuit Magazine. Simon Coghlan and Shaanan Cohney. (2023).
    4. Unis are using artificial intelligence to keep students sitting exams honest. But this creates its own problems. The Conversation. Simon Coghlan, Jeannie Patterson, Shaanan Cohney and Tim Miller. (2021).
    5. The Problematic Role of Computer Code in Initial Coin Offerings. CLS Blue Sky: Columbia Law School Blog on Corporations and Capital Markets. Shaanan Cohney, David A. Hoffman, Jeremy Sklaroff and David A. Wishnick. (Aug. 2018).