Peer Reviewed Papers

  1. "It’s been lovely watching you”: Institutional Decision-Making on Online Proctoring Software. 2025 IEEE Symposium on Security and Privacy (SP) (2025).Elisa Shioji, Ani Meliksetyan, Lucy Simko, Ryan Watkins, Adam Aviv and Shaanan Cohney.
  2. NOTRY: Deniable messaging with retroactive avowal, PoPETS, (2024), Faxing Wang, Shaanan Cohney, Riad Wahby and Joseph Bonneau.
  3. Learning with Style: Improving Student Code-Style Through Better Automated Feedback, 55th ACM Technical Symposium on Computer Science Education, (2024), Liam Saliba, Eduardo Oliveira, Shaanan Cohney and Qi Jianzhong.
  4. Detecting Excessive Data Exposures in Web Server Responses with Metamorphic Fuzzing, 46th ACM/IEEE International Conference on Software Engineering, (2024), Lianglu Pan, Shaanan Cohney, Toby Murray and Van-Thuan Pham.
  5. COVID Down Under: where did Australia’s pandemic apps go wrong? 2023 IEEE International Symposium on Ethics in Engineering, Science, and Technology (ETHICS) (2023).Shaanan Cohney and Marc Cheong.
  6. Watching the watchers: bias and vulnerability in remote proctoring software, 31st USENIX Security Symposium (USENIX Security 22), (2022), Ben Burgess, Avi Ginsberg, Edward W Felten and Shaanan Cohney, 220k Twitter Impressions!
  7. Virtual Classrooms and Real Harms: Remote Learning at {US}. Universities, Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), (2021), Shaanan Cohney, Ross Teixeira, Anne Kohlbrenner, Arvind Narayanan, Mihir Kshirsagar, Yan Shvartzshnaider and Madelyn Sanfilippo.
  8. Pseudorandom black swans: Cache attacks on CTR_DRBG, 2020 IEEE Symposium on Security and Privacy (S&P), (2020), Shaanan Cohney, Andrew Kwong, Shahar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen and Yuval Yarom.
  9. Practical state recovery attacks against legacy RNG implementations, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (2018), Shaanan Cohney, Matthew D Green and Nadia Heninger.
  10. A systematic analysis of the Juniper Dual EC incident, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (2016), Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla and Hovav Shacham, Best Paper Award.
  11. {DROWN}: Breaking {TLS} Using {SSLv2}, 25th USENIX Security Symposium (USENIX Security 16), (2016), Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar and Yuval Shavitt, Runner-Up, Internet Defense Prize.
  12. Factoring as a service, International Conference on Financial Cryptography and Data Security, (2016), Luke Valenta, Shaanan Cohney, Alex Liao, Joshua Fried, Satya Bodduluri and Nadia Heninger.
  13. Measuring small subgroup attacks against Diffie-Hellman, NDSS, (2016), Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J Alex Halderman and Nadia Heninger.

Law Review Articles

  1. Transactional scripts in contract stacks, Minn. L. Rev., (2020), Shaanan Cohney and David A Hoffman.
  2. Coin-operated capitalism, Columbia Law Review, 3 (2019), Shaanan Cohney, David Hoffman, Jeremy Sklaroff and David Wishnick.

Journal Articles

  1. Where did i leave my keys? Lessons from the juniper dual ec incident, Communications of the ACM, 11 (2018), Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla and Hovav Shacham.

Policy Submissions

  1. Submission to Inform Government Response to Privacy Act Review Report. Shaanan Cohney, Chris Culnane, Liam Harding, Toby Murray, Olga Ohrimenko and Benjamin I.P. Rubinstein. (2023).
  2. Safe and responsible AI in Australia, Discussion Paper Response. Jeanie Marie Paterson, Shaanan Cohney, Liz Sonenberg, Fahimeh Abedi, Marc Cheong, Carmelina Contarino, Joe Brailsford, Tom Drummond, Liam Harding, Eduard Hovy, Christine de Kock, Brian Martin, Aidan McLoughney, Olga Ohrimenko, Sarita Rosenstock, Ben Rubinstein and Michael Wildenauer. (2023).
  3. Strengthening Australian Consumer Protection in the era of Digital Platforms. Shaanan Cohney, Liam Harding and Suelette Dreyfus. (2023).
  4. Addressing Big Tech Regulation in Australia. Shaanan Cohney, Liam Harding, Gabby Bush, Marc Cheong, Tatiana Cutts, Liam Harding, Toby Murray, Suelette Dreyfus and Sarita Rosenstock. (2023).
  5. Submission to ANPR R111004 Commercial Surveillance. Nia Brazzell, Jordan Bresinger, Shaanan Cohney, Sayash Kapoor, Mhir Kshirsagar, Jonathan Mayer and Arvind Narayanan. (2022).
  6. Response to the Review of the Privacy Act. Jeannie Paterson, Shaanan Cohney, Lars Kulik and Liam Harding. (2022).
  7. Submission to the ACCC’s Digital Platform Services Inquiry Discussion Paper. Jeannie Paterson, Shaanan Cohney, Gabby Bush, Liam Harding and Alex Paterson. (2022).
  8. Strengthening Australia’s cybersecurity regulations and incentives: Response to the Department of Home Affairs Discussion Paper. Amit Achrekar, Atif Ahmad, Shanton Chang, Shaanan Cohney, Suelette Dreyfus, Chris Leckie, Toby Murray, Jeannie Paterson, Thuan Pham and Liz Sonenberg. (2021).
  9. Comments on Revised Proposed Regulations Implementing the California Consumer Privacy Act. Marshini Chetty, Shaanan Cohney, Mihir Kshirsagar, Arunesh Mathur, Jonathan Mayer, Arvind Narayanan, Ross Teixeira and Ari Ezra Waldman. (2020).

Tutorials & Tools

  1. A Gentle Tutorial for Lattice-Based Cryptanalysis. Joseph Surin and Shaanan Cohney. (2022).

Patents

  1. System and Method for Detecting Excessive Data Exposures. Australian Provisional Patent 2022903182. Lianglu Pan, Toby Murray, Thuan Pham and Shaanan Cohney. (2022).