Institution : University of Washington
Tadayoshi Kohno is an Assistant Professor of Computer Science and Engineering at the University of Washington, where his research focuses on computer security, privacy, and cryptography. Example topics of past and on-going research include: provable security for cryptographic protocols; security and privacy for wireless medical devices; electronic voting machine security and privacy; digital rights management and DMCA enforcement; human-computer interaction and security and privacy; and RFID security and privacy. Kohno is the recipient of a National Science Foundation CAREER Award, an Alfred P. Sloan Research Fellowship, and an MIT Technology Review TR-35 Award. Kohno received his Ph.D. in computer science from the University of California at San Diego.
Tadayoshi Kohno, Andre Broido, and KC Claffy. Remote physical device fingerprinting. In IEEE Symposium on Security and Privacy, May 2005.
Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy, and Tadayoshi Kohno. Privacy-preserving location tracking of lost or stolen devices: Cryptographic techniques and replacing trusted third parties with DHTs. In 17th USENIX Security Symposium, August 2008.
Criminal activity is rampant on the Internet. Traditionally, investigators and law enforcement officers have had to rely on mostly ad hoc digital forensic trails to catch the perpetrators of these crimes. These traditional forensic trails, while helpful, are generally limited in that: (1) they are weak and forgeable and (2) they do not respect the privacy of normal Internet citizens in the common cases when there are no criminal incidents to investigate.
These limitations beg the question: Can we create computer systems that inherently provide strongly un-forgeable yet privacy-respecting forensics evidence? I will touch on two research directions focused on meeting these goals. The first direction is to create a new Internet with built-in forensic trails that are both significantly stronger and more privacy-respecting than the forensic trails we have today. The second targets creating strong, privacy-respecting methods for recovering stolen laptops and other mobile devices.