Stephen Checkoway

Assistant Professor
Department of Computer Science
University of Illinois at Chicago

Office:SEO 1236
Email:sfc@uic.edu
Address:University of Illinois at Chicago
Department of Computer Science
851 S. Morgan St. MC 152
Room 1120 SEO
Chicago, IL 60607-7053
Phone:(312) 413-2402
Fax:(312) 413-0024

Research Interests

My primary research interests are in embedded and cyberphysical systems security. Beyond those, I am interested in a number of topics such as tech policy—particularly 4th amendment protections against unreasonable searches and seizures as it relates to computers—modern algebra, category theory, cryptography, programming languages, and compilers.

I think research is a social activity and I enjoy collaboration with researchers both inside and outside of UIC.

Research Projects

I have a collection of miscellaneous software I’ve written here.

Recent Papers

  1. Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, and Hovav Shacham. A Systematic Analysis of the Juniper Dual EC Incident, in Proceedings of the ACM Conference on Computer and Communications Security 2016, pp. 468–479. ACM Press, Oct. 2016. Best paper award. [Details, PDF]
  2. Michael Rushanan and Stephen Checkoway. Run-DMA, in Proceedings of the USENIX Workshop on Offensive Technologies. USENIX, Aug. 2015. [Details, PDF]
  3. Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan Mast, Stephen Checkoway, Stefan Savage, Alex C. Snoeren, and Kirill Levchenko. On the Security of Mobile Cockpit Information Systems, in Proceedings of the ACM Conference on Computer and Communication Security 2014. ACM Press, Nov. 2014. [Details, PDF]
  4. Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Úlfar Erlingsson, Luis Lozano, and Geoff Pike. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM, in Proceedings of the USENIX Security Symposium 2014. USENIX, Aug. 2014. [Details, PDF]
  5. Matthew Brocker and Stephen Checkoway. iSeeYou: Disabling the MacBook Webcam Indicator LED, in Proceedings of the USENIX Security Symposium 2014. USENIX, Aug. 2014. [Details, PDF]
  6. Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, and Hovav Shacham. On the Practical Exploitability of Dual EC in TLS Implementations, in Proceedings of the USENIX Security Symposium 2014. USENIX, Aug. 2014. [Details, PDF]
  7. Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, and Hovav Shacham. Security Analysis of a Full-Body Scanner, in Proceedings of the USENIX Security Symposium 2014. USENIX, Aug. 2014. [Details, PDF]
  8. Paul D. Martin, Michael Rushanan, Stephen Checkoway, Aviel D. Rubin, and Matthew D. Green. Classifying Network Protocol Implementation Versions: An OpenSSL Case Study, Johns Hopkins University Department of Computer Science, 13-01, Dec. 2013. [Details, PDF]

All of my papers are available and my Google Scholar profile is reasonably up to date.

Teaching

Past teaching at JHU

Professional Activities

Recent Musings

All of my musings are available.

Education