Peer Reviewed Papers

  1. Detecting Excessive Data Exposures in Web Server Responses with Metamorphic Fuzzing, In Submission, (2023), Lianglu Pan, Shaanan Cohney, Toby Murray and Van-Thuan Pham.
  2. Watching the watchers: bias and vulnerability in remote proctoring software, 31st USENIX Security Symposium (USENIX Security 22), (2022), Ben Burgess, Avi Ginsberg, Edward W Felten and Shaanan Cohney, 220k Twitter Impressions!
  3. Virtual Classrooms and Real Harms: Remote Learning at {US}. Universities, Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), (2021), Shaanan Cohney, Ross Teixeira, Anne Kohlbrenner, Arvind Narayanan, Mihir Kshirsagar, Yan Shvartzshnaider and Madelyn Sanfilippo.
  4. Pseudorandom black swans: Cache attacks on CTR_DRBG, 2020 IEEE Symposium on Security and Privacy (SP), (2020), Shaanan Cohney, Andrew Kwong, Shahar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen and Yuval Yarom.
  5. Practical state recovery attacks against legacy RNG implementations, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (2018), Shaanan Cohney, Matthew D Green and Nadia Heninger.
  6. {DROWN}: Breaking {TLS} Using {SSLv2}, 25th USENIX Security Symposium (USENIX Security 16), (2016), Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar and Yuval Shavitt, Runner-Up, Internet Defense Prize.
  7. A systematic analysis of the Juniper Dual EC incident, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (2016), Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla and Hovav Shacham, Best Paper Award.
  8. Factoring as a service, International Conference on Financial Cryptography and Data Security, (2016), Luke Valenta, Shaanan Cohney, Alex Liao, Joshua Fried, Satya Bodduluri and Nadia Heninger.
  9. Measuring small subgroup attacks against Diffie-Hellman, NDSS, (2016), Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J Alex Halderman and Nadia Heninger.

Law Review Articles

  1. Transactional scripts in contract stacks, Minn. L. Rev., (2020), Shaanan Cohney and David A Hoffman.
  2. Coin-operated capitalism, Columbia Law Review, 3 (2019), Shaanan Cohney, David Hoffman, Jeremy Sklaroff and David Wishnick.

Journal Articles

  1. Where did i leave my keys? Lessons from the juniper dual ec incident, Communications of the ACM, 11 (2018), Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla and Hovav Shacham.

Policy Submissions

  1. Strengthening Australian Consumer Protection in the era of Digital Platforms. Shaanan Cohney, Liam Harding and Suelette Dreyfus. (2023).
  2. Addressing Big Tech Regulation in Australia. Shaanan Cohney, Liam Harding, Gabby Bush, Marc Cheong, Tatiana Cutts, Liam Harding, Toby Murray, Suelette Dreyfus and Sarita Rosenstock. (2023).
  3. Submission to the ACCC’s Digital Platform Services Inquiry Discussion Paper. Jeannie Paterson, Shaanan Cohney, Gabby Bush, Liam Harding and Alex Paterson. (2022).
  4. Response to the Review of the Privacy Act. Jeannie Paterson, Shaanan Cohney, Lars Kulik and Liam Harding. (2022).
  5. Submission to ANPR R111004 Commercial Surveillance. Nia Brazzell, Jordan Bresinger, Shaanan Cohney, Sayash Kapoor, Mhir Kshirsagar, Jonathan Mayer and Arvind Narayanan. (2022).
  6. Strengthening Australia’s cybersecurity regulations and incentives: Response to the Department of Home Affairs Discussion Paper. Amit Achrekar, Atif Ahmad, Shanton Chang, Shaanan Cohney, Suelette Dreyfus, Chris Leckie, Toby Murray, Jeannie Paterson, Thuan Pham and Liz Sonenberg. (2021).
  7. Comments on Revised Proposed Regulations Implementing the California Consumer Privacy Act. Marshini Chetty, Shaanan Cohney, Mihir Kshirsagar, Arunesh Mathur, Jonathan Mayer, Arvind Narayanan, Ross Teixeira and Ari Ezra Waldman. (2020).

Tutorials & Tools

  1. A Gentle Tutorial for Lattice-Based Cryptanalysis. Joseph Surin and Shaanan Cohney. (2022).

Patents

  1. System and Method for Detecting Excessive Data Exposures. Australian Provisional Patent 2022903182. Lianglu Pan, Toby Murray, Thuan Pham and Shaanan Cohney. (2022).