BibTeX records: Patrick Traynor

download as .bib file

@inproceedings{DBLP:conf/ccs/OlszewskiLSWKPU23,
  author       = {Daniel Olszewski and
                  Allison Lu and
                  Carson Stillman and
                  Kevin Warren and
                  Cole Kitroser and
                  Alejandro Pascual and
                  Divyajyoti Ukirde and
                  Kevin R. B. Butler and
                  Patrick Traynor},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {"Get in Researchers; We're Measuring Reproducibility": {A}
                  Reproducibility Study of Machine Learning Papers in Tier 1 Security
                  Conferences},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {3433--3459},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623130},
  doi          = {10.1145/3576915.3623130},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/OlszewskiLSWKPU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/PeetersTJBT23,
  author       = {Christian Peeters and
                  Tyler Tucker and
                  Anushri Jain and
                  Kevin R. B. Butler and
                  Patrick Traynor},
  editor       = {Petteri Nurmi and
                  Pan Hui and
                  Ardalan Amiri Sani and
                  Yunxin Liu},
  title        = {LeopardSeal: Detecting Call Interception via Audio Rogue Base Stations},
  booktitle    = {Proceedings of the 21st Annual International Conference on Mobile
                  Systems, Applications and Services, MobiSys 2023, Helsinki, Finland,
                  June 18-22, 2023},
  pages        = {410--422},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3581791.3596846},
  doi          = {10.1145/3581791.3596846},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/PeetersTJBT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AbdullahKPRBBBT23,
  author       = {Hadi Abdullah and
                  Aditya Karlekar and
                  Saurabh Prasad and
                  Muhammad Sajidur Rahman and
                  Logan Blue and
                  Luke A. Bauer and
                  Vincent Bindschaedler and
                  Patrick Traynor},
  title        = {Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks
                  on Automatic Speech Recognition Systems},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/attacks-as-defenses-designing-robust-audio-captchas-using-attacks-on-automatic-speech-recognition-systems/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/AbdullahKPRBBBT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TuckerSBT23,
  author       = {Tyler Tucker and
                  Hunter Searle and
                  Kevin R. B. Butler and
                  Patrick Traynor},
  title        = {Blue's Clues: Practical Discovery of Non-Discoverable Bluetooth Devices},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {3098--3112},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179358},
  doi          = {10.1109/SP46215.2023.10179358},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/TuckerSBT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GibsonFPGVRBTB22,
  author       = {Cassidy Gibson and
                  Vanessa Frost and
                  Katie Platt and
                  Washington Garcia and
                  Luis Vargas and
                  Sara Rampazzi and
                  Vincent Bindschaedler and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {Analyzing the Monetization Ecosystem of Stalkerware},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {4},
  pages        = {105--119},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0101},
  doi          = {10.56553/POPETS-2022-0101},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/GibsonFPGVRBTB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/PeetersPMOST22,
  author       = {Christian Peeters and
                  Christopher Patton and
                  Imani N. S. Munyaka and
                  Daniel Olszewski and
                  Thomas Shrimpton and
                  Patrick Traynor},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {{SMS} {OTP} Security {(SOS):} Hardening SMS-Based Two Factor Authentication},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {2--16},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3497756},
  doi          = {10.1145/3488932.3497756},
  timestamp    = {Tue, 24 May 2022 13:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/PeetersPMOST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/OlszewskiZSBT22,
  author       = {Daniel Olszewski and
                  Weidong Zhu and
                  Sandeep Sathyanarayana and
                  Kevin R. B. Butler and
                  Patrick Traynor},
  title        = {HallMonitor: {A} Framework for Identifying Network Policy Violations
                  in Software},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {245--253},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947243},
  doi          = {10.1109/CNS56114.2022.9947243},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/OlszewskiZSBT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/AbdullahKBT22,
  author       = {Hadi Abdullah and
                  Aditya Karlekar and
                  Vincent Bindschaedler and
                  Patrick Traynor},
  title        = {Demystifying Limited Adversarial Transferability in Automatic Speech
                  Recognition Systems},
  booktitle    = {The Tenth International Conference on Learning Representations, {ICLR}
                  2022, Virtual Event, April 25-29, 2022},
  publisher    = {OpenReview.net},
  year         = {2022},
  url          = {https://openreview.net/forum?id=l5aSHXi8jG5},
  timestamp    = {Sat, 20 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/AbdullahKBT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HernandezMMMPST22,
  author       = {Grant Hernandez and
                  Marius Muench and
                  Dominik Christian Maier and
                  Alyssa Milburn and
                  Shinjo Park and
                  Tobias Scharnowski and
                  Tyler Tucker and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-200/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/HernandezMMMPST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BlueWAGVOBT22,
  author       = {Logan Blue and
                  Kevin Warren and
                  Hadi Abdullah and
                  Cassidy Gibson and
                  Luis Vargas and
                  Jessica O'Dell and
                  Kevin R. B. Butler and
                  Patrick Traynor},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Who Are You {(I} Really Wanna Know)? Detecting Audio DeepFakes Through
                  Vocal Tract Reconstruction},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {2691--2708},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/blue},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BlueWAGVOBT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-05408,
  author       = {Hadi Abdullah and
                  Aditya Karlekar and
                  Saurabh Prasad and
                  Muhammad Sajidur Rahman and
                  Logan Blue and
                  Luke A. Bauer and
                  Vincent Bindschaedler and
                  Patrick Traynor},
  title        = {Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks
                  on Automatic Speech Recognition Systems},
  journal      = {CoRR},
  volume       = {abs/2203.05408},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.05408},
  doi          = {10.48550/ARXIV.2203.05408},
  eprinttype    = {arXiv},
  eprint       = {2203.05408},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-05408.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KingSTDPV21,
  author       = {Samuel T. King and
                  Nolen Scaife and
                  Patrick Traynor and
                  Zain ul Abi Din and
                  Christian Peeters and
                  Hari Venugopalan},
  title        = {Credit Card Fraud Is a Computer Security Problem},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {65--69},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3050247},
  doi          = {10.1109/MSEC.2021.3050247},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KingSTDPV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acml/AbdullahRPGGBST21,
  author       = {Hadi Abdullah and
                  Muhammad Sajidur Rahman and
                  Christian Peeters and
                  Cassidy Gibson and
                  Washington Garcia and
                  Vincent Bindschaedler and
                  Thomas Shrimpton and
                  Patrick Traynor},
  editor       = {Vineeth N. Balasubramanian and
                  Ivor W. Tsang},
  title        = {Beyond L\({}_{\mbox{p}}\) Clipping: Equalization based Psychoacoustic
                  Attacks against ASRs},
  booktitle    = {Asian Conference on Machine Learning, {ACML} 2021, 17-19 November
                  2021, Virtual Event},
  series       = {Proceedings of Machine Learning Research},
  volume       = {157},
  pages        = {672--688},
  publisher    = {{PMLR}},
  year         = {2021},
  url          = {https://proceedings.mlr.press/v157/abdullah21a.html},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acml/AbdullahRPGGBST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotdi/BlueMTA21,
  author       = {Logan Blue and
                  Samuel Marchal and
                  Patrick Traynor and
                  N. Asokan},
  title        = {Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices},
  booktitle    = {IoTDI '21: International Conference on Internet-of-Things Design and
                  Implementation, Virtual Event / Charlottesville, VA, USA, May 18-21,
                  2021},
  pages        = {15--27},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3450268.3453530},
  doi          = {10.1145/3450268.3453530},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iotdi/BlueMTA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AbdullahRGWYST21,
  author       = {Hadi Abdullah and
                  Muhammad Sajidur Rahman and
                  Washington Garcia and
                  Kevin Warren and
                  Anurag Swarnim Yadav and
                  Tom Shrimpton and
                  Patrick Traynor},
  title        = {Hear "No Evil", See "Kenansville"*: Efficient
                  and Transferable Black-Box Attacks on Speech Recognition and Voice
                  Identification Systems},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {712--729},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00009},
  doi          = {10.1109/SP40001.2021.00009},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AbdullahRGWYST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AbdullahWBPT21,
  author       = {Hadi Abdullah and
                  Kevin Warren and
                  Vincent Bindschaedler and
                  Nicolas Papernot and
                  Patrick Traynor},
  title        = {SoK: The Faults in our ASRs: An Overview of Attacks against Automatic
                  Speech Recognition and Speaker Identification Systems},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {730--747},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00014},
  doi          = {10.1109/SP40001.2021.00014},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AbdullahWBPT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uemcom/KhanCTWBTSW21,
  author       = {Arslan Khan and
                  Joseph I. Choi and
                  Dave Jing Tian and
                  Tyler Ward and
                  Kevin R. B. Butler and
                  Patrick Traynor and
                  John M. Shea and
                  Tan F. Wong},
  title        = {Privacy-Preserving Localization using Enclaves},
  booktitle    = {12th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile
                  Communication Conference, {UEMCON} 2021, New York, NY, USA, December
                  1-4, 2021},
  pages        = {269--278},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/UEMCON53757.2021.9666706},
  doi          = {10.1109/UEMCON53757.2021.9666706},
  timestamp    = {Tue, 18 Jan 2022 17:38:45 +0100},
  biburl       = {https://dblp.org/rec/conf/uemcom/KhanCTWBTSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-13250,
  author       = {Hadi Abdullah and
                  Muhammad Sajidur Rahman and
                  Christian Peeters and
                  Cassidy Gibson and
                  Washington Garcia and
                  Vincent Bindschaedler and
                  Thomas Shrimpton and
                  Patrick Traynor},
  title        = {Beyond L\({}_{\mbox{p}}\) clipping: Equalization-based Psychoacoustic
                  Attacks against ASRs},
  journal      = {CoRR},
  volume       = {abs/2110.13250},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.13250},
  eprinttype    = {arXiv},
  eprint       = {2110.13250},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-13250.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccsw-ws/VargasET20,
  author       = {Luis Vargas and
                  Patrick Emami and
                  Patrick Traynor},
  editor       = {Yinqian Zhang and
                  Radu Sion},
  title        = {On the Detection of Disinformation Campaign Activity with Network
                  Analysis},
  booktitle    = {CCSW'20, Proceedings of the 2020 {ACM} {SIGSAC} Conference on Cloud
                  Computing Security Workshop, Virtual Event, USA, November 9, 2020},
  pages        = {133--146},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411495.3421363},
  doi          = {10.1145/3411495.3421363},
  timestamp    = {Thu, 12 Oct 2023 12:32:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ccsw-ws/VargasET20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istas/ShermanBLGRT20,
  author       = {Imani N. Sherman and
                  Jasmine D. Bowers and
                  Liz{-}Laure Laborde and
                  Juan E. Gilbert and
                  Jaime Ruiz and
                  Patrick Traynor},
  title        = {Truly Visual Caller ID? An Analysis of Anti-Robocall Applications
                  and their Accessibility to Visually Impaired Users},
  booktitle    = {{IEEE} International Symposium on Technology and Society, {ISTAS}
                  2020, Tempe, AZ, USA, November 12-15, 2020},
  pages        = {266--279},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISTAS50296.2020.9462185},
  doi          = {10.1109/ISTAS50296.2020.9462185},
  timestamp    = {Fri, 23 Jul 2021 17:04:06 +0200},
  biburl       = {https://dblp.org/rec/conf/istas/ShermanBLGRT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ShermanBMGRT20,
  author       = {Imani N. Sherman and
                  Jasmine D. Bowers and
                  Keith McNamara Jr. and
                  Juan E. Gilbert and
                  Jaime Ruiz and
                  Patrick Traynor},
  title        = {Are You Going to Answer That? Measuring User Responses to Anti-Robocall
                  Application Indicators},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/are-you-going-to-answer-that-measuring-user-responses-to-anti-robocall-application-indicators/},
  timestamp    = {Fri, 23 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ShermanBMGRT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-13466,
  author       = {Luis Vargas and
                  Patrick Emami and
                  Patrick Traynor},
  title        = {On the Detection of Disinformation Campaign Activity with Network
                  Analysis},
  journal      = {CoRR},
  volume       = {abs/2005.13466},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.13466},
  eprinttype    = {arXiv},
  eprint       = {2005.13466},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-13466.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-06622,
  author       = {Hadi Abdullah and
                  Kevin Warren and
                  Vincent Bindschaedler and
                  Nicolas Papernot and
                  Patrick Traynor},
  title        = {SoK: The Faults in our ASRs: An Overview of Attacks against Automatic
                  Speech Recognition and Speaker Identification Systems},
  journal      = {CoRR},
  volume       = {abs/2007.06622},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.06622},
  eprinttype    = {arXiv},
  eprint       = {2007.06622},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-06622.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ScaifePT19,
  author       = {Nolen Scaife and
                  Christian Peeters and
                  Patrick Traynor},
  title        = {More Cowbell: Lessons Learned in Developing the Skim Reaper},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {10--17},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2914017},
  doi          = {10.1109/MSEC.2019.2914017},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ScaifePT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HernandezFTYTB19,
  author       = {Grant Hernandez and
                  Farhaan Fowze and
                  Dave Jing Tian and
                  Tuba Yavuz and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {Toward Automated Firmware Analysis in the IoT Era},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {5},
  pages        = {38--46},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2926462},
  doi          = {10.1109/MSEC.2019.2926462},
  timestamp    = {Sat, 11 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HernandezFTYTB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/CarterT19,
  author       = {Henry Carter and
                  Patrick Traynor},
  title        = {Outsourcing computation for private function evaluation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {6},
  pages        = {525--561},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.103052},
  doi          = {10.1504/IJICS.2019.103052},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/CarterT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ReavesVSTBTB18,
  author       = {Bradley Reaves and
                  Luis Vargas and
                  Nolen Scaife and
                  Dave Tian and
                  Logan Blue and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {Characterizing the Security of the {SMS} Ecosystem with Public Gateways},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {2:1--2:31},
  year         = {2019},
  url          = {https://doi.org/10.1145/3268932},
  doi          = {10.1145/3268932},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ReavesVSTBTB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChoiTHPMSBT19,
  author       = {Joseph I. Choi and
                  Dave (Jing) Tian and
                  Grant Hernandez and
                  Christopher Patton and
                  Benjamin Mood and
                  Thomas Shrimpton and
                  Kevin R. B. Butler and
                  Patrick Traynor},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {A Hybrid Approach to Secure Function Evaluation using {SGX}},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {100--113},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329835},
  doi          = {10.1145/3321705.3329835},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChoiTHPMSBT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FrostTRPTB19,
  author       = {Vanessa Frost and
                  Dave (Jing) Tian and
                  Christie Ruales and
                  Vijay Prakash and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Examining DES-based Cipher Suite Support within the {TLS} Ecosystem},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {539--546},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329858},
  doi          = {10.1145/3321705.3329858},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FrostTRPTB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/TianCHTB19,
  author       = {Dave (Jing) Tian and
                  Joseph I. Choi and
                  Grant Hernandez and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {A Practical Intel {SGX} Setting for Linux Containers in the Cloud},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {255--266},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3300030},
  doi          = {10.1145/3292006.3300030},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/TianCHTB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AbdullahGPTBW19,
  author       = {Hadi Abdullah and
                  Washington Garcia and
                  Christian Peeters and
                  Patrick Traynor and
                  Kevin R. B. Butler and
                  Joseph Wilson},
  title        = {Practical Hidden Voice Attacks against Speech and Speaker Recognition
                  Systems},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/practical-hidden-voice-attacks-against-speech-and-speaker-recognition-systems/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AbdullahGPTBW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/VargasBFPSBT19,
  author       = {Luis Vargas and
                  Logan Blue and
                  Vanessa Frost and
                  Christopher Patton and
                  Nolen Scaife and
                  Kevin R. B. Butler and
                  Patrick Traynor},
  title        = {Digital Healthcare-Associated Infection: {A} Case Study on the Security
                  of a Major Multi-Campus Hospital System},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/digital-healthcare-associated-infection-a-case-study-on-the-security-of-a-major-multi-campus-hospital-system/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/VargasBFPSBT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ScaifeBPHSTA19,
  author       = {Nolen Scaife and
                  Jasmine D. Bowers and
                  Christian Peeters and
                  Grant Hernandez and
                  Imani N. Sherman and
                  Patrick Traynor and
                  Lisa Anthony},
  title        = {Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card
                  Skimmers},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {1000--1014},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00077},
  doi          = {10.1109/SP.2019.00077},
  timestamp    = {Fri, 23 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ScaifeBPHSTA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BowersSBT19,
  author       = {Jasmine D. Bowers and
                  Imani N. Sherman and
                  Kevin R. B. Butler and
                  Patrick Traynor},
  title        = {Characterizing security and privacy practices in emerging digital
                  credit applications},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {94--107},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3319723},
  doi          = {10.1145/3317549.3319723},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BowersSBT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChoiTWBTSW19,
  author       = {Joseph I. Choi and
                  Dave (Jing) Tian and
                  Tyler Ward and
                  Kevin R. B. Butler and
                  Patrick Traynor and
                  John M. Shea and
                  Tan F. Wong},
  title        = {Enclave-based privacy-preserving localization: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {312--313},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326307},
  doi          = {10.1145/3317549.3326307},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ChoiTWBTSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2019,
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-05734,
  author       = {Hadi Abdullah and
                  Washington Garcia and
                  Christian Peeters and
                  Patrick Traynor and
                  Kevin R. B. Butler and
                  Joseph Wilson},
  title        = {Practical Hidden Voice Attacks against Speech and Speaker Recognition
                  Systems},
  journal      = {CoRR},
  volume       = {abs/1904.05734},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.05734},
  eprinttype    = {arXiv},
  eprint       = {1904.05734},
  timestamp    = {Thu, 25 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-05734.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-01233,
  author       = {Joseph I. Choi and
                  Dave (Jing) Tian and
                  Grant Hernandez and
                  Christopher Patton and
                  Benjamin Mood and
                  Thomas Shrimpton and
                  Kevin R. B. Butler and
                  Patrick Traynor},
  title        = {A Hybrid Approach to Secure Function Evaluation Using {SGX}},
  journal      = {CoRR},
  volume       = {abs/1905.01233},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.01233},
  eprinttype    = {arXiv},
  eprint       = {1905.01233},
  timestamp    = {Mon, 27 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-01233.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-05262,
  author       = {Hadi Abdullah and
                  Muhammad Sajidur Rahman and
                  Washington Garcia and
                  Logan Blue and
                  Kevin Warren and
                  Anurag Swarnim Yadav and
                  Tom Shrimpton and
                  Patrick Traynor},
  title        = {Hear "No Evil", See "Kenansville": Efficient and
                  Transferable Black-Box Attacks on Speech Recognition and Voice Identification
                  Systems},
  journal      = {CoRR},
  volume       = {abs/1910.05262},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.05262},
  eprinttype    = {arXiv},
  eprint       = {1910.05262},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-05262.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ScaifeCLJT18,
  author       = {Nolen Scaife and
                  Henry Carter and
                  Lyrissa Lidsky and
                  Rachael L. Jones and
                  Patrick Traynor},
  title        = {OnionDNS: a seizure-resistant top-level domain},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {6},
  pages        = {645--660},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0391-z},
  doi          = {10.1007/S10207-017-0391-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ScaifeCLJT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WermkeHARTF18,
  author       = {Dominik Wermke and
                  Nicolas Huaman and
                  Yasemin Acar and
                  Bradley Reaves and
                  Patrick Traynor and
                  Sascha Fahl},
  title        = {A Large Scale Investigation of Obfuscation Use in Google Play},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {222--235},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274726},
  doi          = {10.1145/3274694.3274726},
  timestamp    = {Wed, 05 Dec 2018 09:44:25 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WermkeHARTF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BlueAVT18,
  author       = {Logan Blue and
                  Hadi Abdullah and
                  Luis Vargas and
                  Patrick Traynor},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {2MA: Verifying Voice Commands via Two Microphone Authentication},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {89--100},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196545},
  doi          = {10.1145/3196494.3196545},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BlueAVT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VargasHCBSST18,
  author       = {Luis Vargas and
                  Gyan Hazarika and
                  Rachel Culpepper and
                  Kevin R. B. Butler and
                  Thomas Shrimpton and
                  Doug Szajda and
                  Patrick Traynor},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Mitigating Risk while Complying with Data Retention Laws},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {2011--2027},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243800},
  doi          = {10.1145/3243734.3243800},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/VargasHCBSST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PeetersASBTRB18,
  author       = {Christian Peeters and
                  Hadi Abdullah and
                  Nolen Scaife and
                  Jasmine D. Bowers and
                  Patrick Traynor and
                  Bradley Reaves and
                  Kevin R. B. Butler},
  title        = {Sonar: Detecting {SS7} Redirection Attacks with Audio-Based Distance
                  Bounding},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {567--582},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00006},
  doi          = {10.1109/SP.2018.00006},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/PeetersASBTRB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ScaifePVZTA18,
  author       = {Nolen Scaife and
                  Christian Peeters and
                  Camilo Velez and
                  Hanqing Zhao and
                  Patrick Traynor and
                  David Arnold},
  title        = {The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding
                  Jitter},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {1063--1076},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00042},
  doi          = {10.1109/SP.2018.00042},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ScaifePVZTA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ScaifePT18,
  author       = {Nolen Scaife and
                  Christian Peeters and
                  Patrick Traynor},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Fear the Reaper: Characterization and Fast Detection of Card Skimmers},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {1--14},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/scaife},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ScaifePT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TianHCFRTVHRGB18,
  author       = {Dave (Jing) Tian and
                  Grant Hernandez and
                  Joseph I. Choi and
                  Vanessa Frost and
                  Christie Ruales and
                  Patrick Traynor and
                  Hayawardh Vijayakumar and
                  Lee Harrison and
                  Amir Rahmati and
                  Michael Grace and
                  Kevin R. B. Butler},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {ATtention Spanned: Comprehensive Vulnerability Analysis of {AT} Commands
                  Within the Android Ecosystem},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {273--290},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/tian},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/TianHCFRTVHRGB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BlueVT18,
  author       = {Logan Blue and
                  Luis Vargas and
                  Patrick Traynor},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Hello, Is It Me You're Looking For?: Differentiating Between Human
                  and Electronic Speakers for Voice Interface Security},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {123--133},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212505},
  doi          = {10.1145/3212480.3212505},
  timestamp    = {Mon, 16 Sep 2019 13:25:53 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BlueVT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-02742,
  author       = {Dominik Wermke and
                  Nicolas Huaman and
                  Yasemin Acar and
                  Bradley Reaves and
                  Patrick Traynor and
                  Sascha Fahl},
  title        = {A Large Scale Investigation of Obfuscation Use in Google Play},
  journal      = {CoRR},
  volume       = {abs/1801.02742},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.02742},
  eprinttype    = {arXiv},
  eprint       = {1801.02742},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-02742.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TraynorBBR17,
  author       = {Patrick Traynor and
                  Kevin R. B. Butler and
                  Jasmine D. Bowers and
                  Bradley Reaves},
  title        = {FinTechSec: Addressing the Security Challenges of Digital Financial
                  Services},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {5},
  pages        = {85--89},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.3681060},
  doi          = {10.1109/MSP.2017.3681060},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TraynorBBR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HeuserRPCDEKST17,
  author       = {Stephan Heuser and
                  Bradley Reaves and
                  Praveen Kumar Pendyala and
                  Henry Carter and
                  Alexandra Dmitrienko and
                  William Enck and
                  Negar Kiyavash and
                  Ahmad{-}Reza Sadeghi and
                  Patrick Traynor},
  title        = {Phonion: Practical Protection of Metadata in Telephony Networks},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {1},
  pages        = {170--187},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0011},
  doi          = {10.1515/POPETS-2017-0011},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/HeuserRPCDEKST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ReavesBSBBTB17,
  author       = {Bradley Reaves and
                  Jasmine D. Bowers and
                  Nolen Scaife and
                  Adam Bates and
                  Arnav Bhartiya and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking
                  Applications},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {11:1--11:31},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092368},
  doi          = {10.1145/3092368},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ReavesBSBBTB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/AmrutkarKT17,
  author       = {Chaitrali Amrutkar and
                  Young Seuk Kim and
                  Patrick Traynor},
  title        = {Detecting Mobile Malicious Webpages in Real Time},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {16},
  number       = {8},
  pages        = {2184--2197},
  year         = {2017},
  url          = {https://doi.org/10.1109/TMC.2016.2575828},
  doi          = {10.1109/TMC.2016.2575828},
  timestamp    = {Wed, 26 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/AmrutkarKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/WardCBSTW17,
  author       = {Tyler Ward and
                  Joseph I. Choi and
                  Kevin R. B. Butler and
                  John M. Shea and
                  Patrick Traynor and
                  Tan F. Wong},
  title        = {Privacy preserving localization using a distributed particle filtering
                  protocol},
  booktitle    = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore,
                  MD, USA, October 23-25, 2017},
  pages        = {835--840},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/MILCOM.2017.8170863},
  doi          = {10.1109/MILCOM.2017.8170863},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/WardCBSTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/BowersRSTB17,
  author       = {Jasmine D. Bowers and
                  Bradley Reaves and
                  Imani N. Sherman and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money
                  Services},
  booktitle    = {Thirteenth Symposium on Usable Privacy and Security, {SOUPS} 2017,
                  Santa Clara, CA, USA, July 12-14, 2017},
  pages        = {97--114},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/soups2017/technical-sessions/presentation/bowers},
  timestamp    = {Fri, 23 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/BowersRSTB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ReavesBAVTS17,
  author       = {Bradley Reaves and
                  Logan Blue and
                  Hadi Abdullah and
                  Luis Vargas and
                  Patrick Traynor and
                  Thomas Shrimpton},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {AuthentiCall: Efficient Identity and Content Authentication for Phone
                  Calls},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {575--592},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/reaves},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ReavesBAVTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ReavesBGABCDHKS16,
  author       = {Bradley Reaves and
                  Jasmine D. Bowers and
                  Sigmund Albert Gorski III and
                  Olabode Anise and
                  Rahul Bobhate and
                  Raymond Cho and
                  Hiranava Das and
                  Sharique Hussain and
                  Hamza Karachiwala and
                  Nolen Scaife and
                  Byron Wright and
                  Kevin R. B. Butler and
                  William Enck and
                  Patrick Traynor},
  title        = {*droid: Assessment and Evaluation of Android Application Analysis
                  Tools},
  journal      = {{ACM} Comput. Surv.},
  volume       = {49},
  number       = {3},
  pages        = {55:1--55:30},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996358},
  doi          = {10.1145/2996358},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/ReavesBGABCDHKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CarterMTB15,
  author       = {Henry Carter and
                  Benjamin Mood and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {Secure outsourced garbled circuit evaluation for mobile devices},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {137--180},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-150540},
  doi          = {10.3233/JCS-150540},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CarterMTB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CarterMTB16,
  author       = {Henry Carter and
                  Benjamin Mood and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {Outsourcing secure two-party computation as a black box},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {14},
  pages        = {2261--2275},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1486},
  doi          = {10.1002/SEC.1486},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CarterMTB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DeshmukhCHTB16,
  author       = {Siddhant Deshmukh and
                  Henry Carter and
                  Grant Hernandez and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {Efficient and secure template blinding for biometric authentication},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {480--488},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860539},
  doi          = {10.1109/CNS.2016.7860539},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DeshmukhCHTB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/MoodGCBT16,
  author       = {Benjamin Mood and
                  Debayan Gupta and
                  Henry Carter and
                  Kevin R. B. Butler and
                  Patrick Traynor},
  title        = {Frigate: {A} Validated, Extensible, and Efficient Compiler and Interpreter
                  for Secure Computation},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages        = {112--127},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/EuroSP.2016.20},
  doi          = {10.1109/EUROSP.2016.20},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/MoodGCBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GuptaMFBT16,
  author       = {Debayan Gupta and
                  Benjamin Mood and
                  Joan Feigenbaum and
                  Kevin R. B. Butler and
                  Patrick Traynor},
  editor       = {Jeremy Clark and
                  Sarah Meiklejohn and
                  Peter Y. A. Ryan and
                  Dan S. Wallach and
                  Michael Brenner and
                  Kurt Rohloff},
  title        = {Using Intel Software Guard Extensions for Efficient Two-Party Secure
                  Function Evaluation},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2016 International
                  Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
                  26, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9604},
  pages        = {302--318},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53357-4\_20},
  doi          = {10.1007/978-3-662-53357-4\_20},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GuptaMFBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ScaifeCTB16,
  author       = {Nolen Scaife and
                  Henry Carter and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data},
  booktitle    = {36th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2016, Nara, Japan, June 27-30, 2016},
  pages        = {303--312},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICDCS.2016.46},
  doi          = {10.1109/ICDCS.2016.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/ScaifeCTB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ReavesSTBTB16,
  author       = {Bradley Reaves and
                  Nolen Scaife and
                  Dave Tian and
                  Logan Blue and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {Sending Out an {SMS:} Characterizing the Security of the {SMS} Ecosystem
                  with Public Gateways},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {339--356},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.28},
  doi          = {10.1109/SP.2016.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ReavesSTBTB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TianSBBT16,
  author       = {Dave (Jing) Tian and
                  Nolen Scaife and
                  Adam Bates and
                  Kevin R. B. Butler and
                  Patrick Traynor},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Making {USB} Great Again with {USBFILTER}},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {415--430},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/tian},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/TianSBBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ReavesBT16,
  author       = {Bradley Reaves and
                  Logan Blue and
                  Patrick Traynor},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {AuthLoop: End-to-End Cryptographic Authentication for Telephony over
                  Voice Channels},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {963--978},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/reaves},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ReavesBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ReavesBTTB16,
  author       = {Bradley Reaves and
                  Logan Blue and
                  Dave Tian and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Detecting {SMS} Spam in the Age of Legitimate Bulk Messaging},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {165--170},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939937},
  doi          = {10.1145/2939918.2939937},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ReavesBTTB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/woot/2016,
  editor       = {Natalie Silvanovich and
                  Patrick Traynor},
  title        = {10th {USENIX} Workshop on Offensive Technologies, {WOOT} 16, Austin,
                  TX, USA, August 8-9, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/woot16},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarterT16,
  author       = {Henry Carter and
                  Patrick Traynor},
  title        = {{OPFE:} Outsourcing Computation for Private Function Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarterT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BatesBSSTW15,
  author       = {Adam Bates and
                  Kevin R. B. Butler and
                  Micah Sherr and
                  Clay Shields and
                  Patrick Traynor and
                  Dan S. Wallach},
  title        = {Accountable wiretapping - or - {I} know they can hear you now},
  journal      = {J. Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {167--195},
  year         = {2015},
  url          = {https://doi.org/10.3233/JCS-140515},
  doi          = {10.3233/JCS-140515},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BatesBSSTW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/AmrutkarTO15,
  author       = {Chaitrali Amrutkar and
                  Patrick Traynor and
                  Paul C. van Oorschot},
  title        = {An Empirical Evaluation of Security Indicators in Mobile Web Browsers},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {14},
  number       = {5},
  pages        = {889--903},
  year         = {2015},
  url          = {https://doi.org/10.1109/TMC.2013.90},
  doi          = {10.1109/TMC.2013.90},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/AmrutkarTO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DeweyRT15,
  author       = {David Dewey and
                  Bradley Reaves and
                  Patrick Traynor},
  title        = {Uncovering Use-After-Free Conditions in Compiled Code},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {90--99},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.61},
  doi          = {10.1109/ARES.2015.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DeweyRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/CarterMTB15,
  author       = {Henry Carter and
                  Benjamin Mood and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Outsourcing Secure Two-Party Computation as a Black Box},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {214--222},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_15},
  doi          = {10.1007/978-3-319-26823-1\_15},
  timestamp    = {Mon, 02 Jan 2023 08:05:35 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/CarterMTB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ScaifeCT15,
  author       = {Nolen Scaife and
                  Henry Carter and
                  Patrick Traynor},
  title        = {OnionDNS: {A} seizure-resistant top-level Domain},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {379--387},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346849},
  doi          = {10.1109/CNS.2015.7346849},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ScaifeCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/ShernanCTTB15,
  author       = {Ethan Shernan and
                  Henry Carter and
                  Dave Tian and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  editor       = {Magnus Almgren and
                  Vincenzo Gulisano and
                  Federico Maggi},
  title        = {More Guidelines Than Rules: {CSRF} Vulnerabilities from Noncompliant
                  OAuth 2.0 Implementations},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 12th International Conference, {DIMVA} 2015, Milan, Italy, July
                  9-10, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9148},
  pages        = {239--260},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20550-2\_13},
  doi          = {10.1007/978-3-319-20550-2\_13},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/ShernanCTTB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ReavesSBTB15,
  author       = {Bradley Reaves and
                  Nolen Scaife and
                  Adam Bates and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking
                  Applications in the Developing World},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {17--32},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/reaves},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ReavesSBTB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ReavesSBCT15,
  author       = {Bradley Reaves and
                  Ethan Shernan and
                  Adam Bates and
                  Henry Carter and
                  Patrick Traynor},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network
                  Edge},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {833--848},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/reaves-boxed},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ReavesSBCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CarterADT14,
  author       = {Henry Carter and
                  Chaitrali Amrutkar and
                  Italo Dacosta and
                  Patrick Traynor},
  title        = {For your phone only: custom protocols for efficient secure function
                  evaluation on mobile devices},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {7},
  pages        = {1165--1176},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.851},
  doi          = {10.1002/SEC.851},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CarterADT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CarterLT14,
  author       = {Henry Carter and
                  Charles Lever and
                  Patrick Traynor},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Whitewash: outsourcing garbled circuit generation for mobile devices},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {266--275},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664255},
  doi          = {10.1145/2664243.2664255},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CarterLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2014,
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2627393},
  isbn         = {978-1-4503-2972-9},
  timestamp    = {Thu, 02 Jun 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarterLT14,
  author       = {Henry Carter and
                  Charles Lever and
                  Patrick Traynor},
  title        = {Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarterLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarterMTB14,
  author       = {Henry Carter and
                  Benjamin Mood and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {Outsourcing Secure Two-Party Computation as a Black Box},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {936},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/936},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarterMTB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/AmrutkarHJJSTV13,
  author       = {Chaitrali Amrutkar and
                  Matti A. Hiltunen and
                  Trevor Jim and
                  Kaustubh R. Joshi and
                  Oliver Spatscheck and
                  Patrick Traynor and
                  Shobha Venkataraman},
  title        = {Why is my smartphone slow? On the fly diagnosis of underperformance
                  on the mobile Internet},
  booktitle    = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/DSN.2013.6575301},
  doi          = {10.1109/DSN.2013.6575301},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/AmrutkarHJJSTV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LeverARTL13,
  author       = {Charles Lever and
                  Manos Antonakakis and
                  Bradley Reaves and
                  Patrick Traynor and
                  Wenke Lee},
  title        = {The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/core-matter-analyzing-malicious-traffic-cellular-carriers},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LeverARTL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CarterMTB13,
  author       = {Henry Carter and
                  Benjamin Mood and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  editor       = {Samuel T. King},
  title        = {Secure Outsourced Garbled Circuit Evaluation for Mobile Devices},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {289--304},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/carter},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CarterMTB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChakradeoRTE13,
  author       = {Saurabh Chakradeo and
                  Bradley Reaves and
                  Patrick Traynor and
                  William Enck},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {{MAST:} triage for market-scale mobile malware analysis},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462100},
  doi          = {10.1145/2462096.2462100},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ChakradeoRTE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ShiLTAZ12,
  author       = {Cong Shi and
                  Xiapu Luo and
                  Patrick Traynor and
                  Mostafa H. Ammar and
                  Ellen W. Zegura},
  title        = {{ARDEN:} Anonymous networking in delay tolerant networks},
  journal      = {Ad Hoc Networks},
  volume       = {10},
  number       = {6},
  pages        = {918--930},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.adhoc.2011.11.008},
  doi          = {10.1016/J.ADHOC.2011.11.008},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ShiLTAZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/Traynor12,
  author       = {Patrick Traynor},
  title        = {Characterizing the Security Implications of Third-Party Emergency
                  Alert Systems over Cellular Text Messaging Services},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {11},
  number       = {6},
  pages        = {983--994},
  year         = {2012},
  url          = {https://doi.org/10.1109/TMC.2011.120},
  doi          = {10.1109/TMC.2011.120},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/Traynor12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/DacostaCAT12,
  author       = {Italo Dacosta and
                  Saurabh Chakradeo and
                  Mustaque Ahamad and
                  Patrick Traynor},
  title        = {One-time cookies: Preventing session hijacking attacks with stateless
                  authentication tokens},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {12},
  number       = {1},
  pages        = {1:1--1:24},
  year         = {2012},
  url          = {https://doi.org/10.1145/2220352.2220353},
  doi          = {10.1145/2220352.2220353},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/DacostaCAT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AmrutkarT12,
  author       = {Chaitrali Amrutkar and
                  Patrick Traynor},
  editor       = {Ting Yu and
                  William Enck and
                  Xuxian Jiang},
  title        = {Short paper: rethinking permissions for mobile web apps: barriers
                  and the road ahead},
  booktitle    = {SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones
                  and Mobile Devices, Co-located with {CCS} 2012, October 19, 2012,
                  Raleigh, NC, {USA}},
  pages        = {15--20},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381934.2381939},
  doi          = {10.1145/2381934.2381939},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AmrutkarT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DacostaAT12,
  author       = {Italo Dacosta and
                  Mustaque Ahamad and
                  Patrick Traynor},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {Trust No One Else: Detecting {MITM} Attacks against {SSL/TLS} without
                  Third-Parties},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {199--216},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_12},
  doi          = {10.1007/978-3-642-33167-1\_12},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DacostaAT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/AmrutkarSVT12,
  author       = {Chaitrali Amrutkar and
                  Kapil Singh and
                  Arunabh Verma and
                  Patrick Traynor},
  editor       = {Venkat N. Venkatakrishnan and
                  Diganta Goswami},
  title        = {VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security},
  booktitle    = {Information Systems Security, 8th International Conference, {ICISS}
                  2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {16--34},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35130-3\_2},
  doi          = {10.1007/978-3-642-35130-3\_2},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/AmrutkarSVT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/AmrutkarTO12,
  author       = {Chaitrali Amrutkar and
                  Patrick Traynor and
                  Paul C. van Oorschot},
  editor       = {Dieter Gollmann and
                  Felix C. Freiling},
  title        = {Measuring {SSL} Indicators on Mobile Browsers: Extended Life, or End
                  of the Road?},
  booktitle    = {Information Security - 15th International Conference, {ISC} 2012,
                  Passau, Germany, September 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7483},
  pages        = {86--103},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33383-5\_6},
  doi          = {10.1007/978-3-642-33383-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/AmrutkarTO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BatesBSSTW12,
  author       = {Adam Bates and
                  Kevin R. B. Butler and
                  Micah Sherr and
                  Clay Shields and
                  Patrick Traynor and
                  Dan S. Wallach},
  title        = {Accountable Wiretapping -or- {I} know they can hear you now},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/accountable-wiretapping-or-i-know-they-can-hear-you-now},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BatesBSSTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/LawrenceT12,
  author       = {Nigel Lawrence and
                  Patrick Traynor},
  editor       = {Elie Bursztein and
                  Thomas Dullien},
  title        = {Under New Management: Practical Attacks on SNMPv3},
  booktitle    = {6th {USENIX} Workshop on Offensive Technologies, WOOT'12, August 6-7,
                  2012, Bellevue, WA, USA, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {http://www.usenix.org/conference/woot12/under-new-management-practical-attacks-snmpv3},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/LawrenceT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2012hotsec,
  editor       = {Patrick Traynor},
  title        = {7th {USENIX} Workshop on Hot Topics in Security, HotSec'12, Bellevue,
                  WA, USA, August 7, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/hotsec12},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2012hotsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TraynorARJMP11,
  author       = {Patrick Traynor and
                  Chaitrali Amrutkar and
                  Vikhyath Rao and
                  Trent Jaeger and
                  Patrick D. McDaniel and
                  Thomas La Porta},
  title        = {From mobile phones to responsible devices},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {6},
  pages        = {719--726},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.218},
  doi          = {10.1002/SEC.218},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/TraynorARJMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/DacostaBAT11,
  author       = {Italo Dacosta and
                  Vijay Balasubramaniyan and
                  Mustaque Ahamad and
                  Patrick Traynor},
  title        = {Improving Authentication Performance of Distributed {SIP} Proxies},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {22},
  number       = {11},
  pages        = {1804--1812},
  year         = {2011},
  url          = {https://doi.org/10.1109/TPDS.2011.62},
  doi          = {10.1109/TPDS.2011.62},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/DacostaBAT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NipaneDT11,
  author       = {Nilesh Nipane and
                  Italo Dacosta and
                  Patrick Traynor},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {"Mix-in-Place" anonymous networking using secure function
                  evaluation},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {63--72},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076742},
  doi          = {10.1145/2076732.2076742},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NipaneDT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NadjiGT11,
  author       = {Yacin Nadji and
                  Jonathon T. Giffin and
                  Patrick Traynor},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Automated remote repair for mobile malware},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {413--422},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076791},
  doi          = {10.1145/2076732.2076791},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NadjiGT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MarquardtVCT11,
  author       = {Philip Marquardt and
                  Arunabh Verma and
                  Henry Carter and
                  Patrick Traynor},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {(sp)iPhone: decoding vibrations from nearby keyboards using mobile
                  phone accelerometers},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {551--562},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046771},
  doi          = {10.1145/2046707.2046771},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MarquardtVCT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MarquardtDT11,
  author       = {Philip Marquardt and
                  David Dagon and
                  Patrick Traynor},
  editor       = {George Danezis},
  title        = {Impeding Individual User Profiling in Shopper Loyalty Programs},
  booktitle    = {Financial Cryptography and Data Security - 15th International Conference,
                  {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  pages        = {93--101},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27576-0\_8},
  doi          = {10.1007/978-3-642-27576-0\_8},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MarquardtDT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DeweyT11,
  author       = {David Dewey and
                  Patrick Traynor},
  title        = {No Loitering: Exploiting Lingering Vulnerabilities in Default {COM}
                  Objects},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  url          = {https://www.ndss-symposium.org/ndss2011/no-loitering-exploiting-lingering-vulnerabilities-in-default-com-objects},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/DeweyT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/PirrettiTMW10,
  author       = {Matthew Pirretti and
                  Patrick Traynor and
                  Patrick D. McDaniel and
                  Brent Waters},
  title        = {Secure attribute-based systems},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {799--837},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2009-0383},
  doi          = {10.3233/JCS-2009-0383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/PirrettiTMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TraynorBEMB10,
  author       = {Patrick Traynor and
                  Kevin R. B. Butler and
                  William Enck and
                  Patrick D. McDaniel and
                  Kevin Borders},
  title        = {malnets: large-scale malicious networks \emph{via} compromised wireless
                  access points},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {2-3},
  pages        = {102--113},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.149},
  doi          = {10.1002/SEC.149},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/TraynorBEMB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BalasubramaniyanPAHT10,
  author       = {Vijay A. Balasubramaniyan and
                  Aamir Poonawalla and
                  Mustaque Ahamad and
                  Michael T. Hunter and
                  Patrick Traynor},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {PinDr0p: using single-ended audio features to determine call provenance},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {109--120},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866320},
  doi          = {10.1145/1866307.1866320},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BalasubramaniyanPAHT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/SinghSJTL10,
  author       = {Kapil Singh and
                  Samrit Sangal and
                  Nehil Jain and
                  Patrick Traynor and
                  Wenke Lee},
  editor       = {Christian Kreibich and
                  Marko Jahnke},
  title        = {Evaluating Bluetooth as a Medium for Botnet Command and Control},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  7th International Conference, {DIMVA} 2010, Bonn, Germany, July 8-9,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6201},
  pages        = {61--80},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14215-4\_4},
  doi          = {10.1007/978-3-642-14215-4\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/SinghSJTL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/TraynorSPMG10,
  author       = {Patrick Traynor and
                  Joshua Schiffman and
                  Thomas La Porta and
                  Patrick D. McDaniel and
                  Abhrajit Ghosh},
  title        = {Constructing Secure Localization Systems with Adjustable Granularity
                  Using Commodity Hardware},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5684072},
  doi          = {10.1109/GLOCOM.2010.5684072},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/TraynorSPMG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/Traynor10,
  author       = {Patrick Traynor},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {Characterizing the Security Implications of Third-Party Emergency
                  Alert Systems over Cellular Text Messaging Services},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {125--143},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_8},
  doi          = {10.1007/978-3-642-16161-2\_8},
  timestamp    = {Sun, 07 Jan 2018 16:52:46 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/Traynor10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/DacostaT10,
  author       = {Italo Dacosta and
                  Patrick Traynor},
  editor       = {Paul Barham and
                  Timothy Roscoe},
  title        = {Proxychain: Developing a Robust and Efficient Authentication Infrastructure
                  for Carrier-Scale VoIP Networks},
  booktitle    = {2010 {USENIX} Annual Technical Conference, Boston, MA, USA, June 23-25,
                  2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/usenix-atc-10/proxychain-developing-robust-and-efficient-authentication-infrastructure},
  timestamp    = {Mon, 01 Feb 2021 08:43:38 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/DacostaT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Traynor09,
  author       = {Patrick Traynor},
  title        = {Securing Cellular Infrastructure: Challenges and Opportunities},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {7},
  number       = {4},
  pages        = {77--79},
  year         = {2009},
  url          = {https://doi.org/10.1109/MSP.2009.103},
  doi          = {10.1109/MSP.2009.103},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Traynor09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/TraynorEMP09,
  author       = {Patrick Traynor and
                  William Enck and
                  Patrick D. McDaniel and
                  Thomas La Porta},
  title        = {Mitigating attacks on open functionality in SMS-capable cellular networks},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {17},
  number       = {1},
  pages        = {40--53},
  year         = {2009},
  url          = {http://doi.acm.org/10.1145/1514070.1514074},
  doi          = {10.1145/1514070.1514074},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/TraynorEMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ButlerRTM09,
  author       = {Kevin R. B. Butler and
                  Sunam Ryu and
                  Patrick Traynor and
                  Patrick D. McDaniel},
  title        = {Leveraging Identity-Based Cryptography for Node {ID} Assignment in
                  Structured {P2P} Systems},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {20},
  number       = {12},
  pages        = {1803--1815},
  year         = {2009},
  url          = {https://doi.org/10.1109/TPDS.2008.249},
  doi          = {10.1109/TPDS.2008.249},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/ButlerRTM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ParkGT09,
  author       = {Frank S. Park and
                  Chinmay Gangakhedkar and
                  Patrick Traynor},
  title        = {Leveraging Cellular Infrastructure to Improve Fraud Prevention},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {350--359},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.40},
  doi          = {10.1109/ACSAC.2009.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ParkGT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TraynorLORJMP09,
  author       = {Patrick Traynor and
                  Michael Lin and
                  Machigar Ongtang and
                  Vikhyath Rao and
                  Trent Jaeger and
                  Patrick D. McDaniel and
                  Thomas La Porta},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {On cellular botnets: measuring the impact of malicious devices on
                  a cellular network core},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {223--234},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653690},
  doi          = {10.1145/1653662.1653690},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TraynorLORJMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Dolan-GavittSTG09,
  author       = {Brendan Dolan{-}Gavitt and
                  Abhinav Srivastava and
                  Patrick Traynor and
                  Jonathon T. Giffin},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Robust signatures for kernel data structures},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {566--577},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653730},
  doi          = {10.1145/1653662.1653730},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Dolan-GavittSTG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptcomm/DacostaBAT09,
  author       = {Italo Dacosta and
                  Vijay Balasubramaniyan and
                  Mustaque Ahamad and
                  Patrick Traynor},
  editor       = {Mustaque Ahamad and
                  Dorgham Sisalem and
                  Eric Chen and
                  Charles Consel},
  title        = {Improving authentication performance of distributed {SIP} proxies},
  booktitle    = {Principles, Systems and Applications of {IP} Telecommunications. Third
                  International Conference, IPTComm 2009, Atlanta, Georgia, USA, July
                  7-8, 2009. Proceedings},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1595637.1595639},
  doi          = {10.1145/1595637.1595639},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptcomm/DacostaBAT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/TraynorMP08,
  author       = {Patrick Traynor and
                  Patrick D. McDaniel and
                  Thomas La Porta},
  title        = {Security for Telecommunications Networks},
  series       = {Advances in Information Security},
  volume       = {40},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-72442-3},
  doi          = {10.1007/978-0-387-72442-3},
  isbn         = {978-0-387-72441-6},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/TraynorMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/TraynorEMP08,
  author       = {Patrick Traynor and
                  William Enck and
                  Patrick D. McDaniel and
                  Thomas La Porta},
  title        = {Exploiting open functionality in SMS-capable cellular networks},
  journal      = {J. Comput. Secur.},
  volume       = {16},
  number       = {6},
  pages        = {713--742},
  year         = {2008},
  url          = {https://doi.org/10.3233/JCS-2007-0308},
  doi          = {10.3233/JCS-2007-0308},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/TraynorEMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/TraynorCWHM08,
  author       = {Patrick Traynor and
                  Michael Chien and
                  Scott Weaver and
                  Boniface Hicks and
                  Patrick D. McDaniel},
  title        = {Noninvasive Methods for Host Certification},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {16:1--16:23},
  year         = {2008},
  url          = {https://doi.org/10.1145/1341731.1341737},
  doi          = {10.1145/1341731.1341737},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/TraynorCWHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/TraynorBEM08,
  author       = {Patrick Traynor and
                  Kevin R. B. Butler and
                  William Enck and
                  Patrick D. McDaniel},
  title        = {Realizing Massive-Scale Conditional Access Systems Through Attribute-Based
                  Cryptosystems},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/realizing-massive-scale-conditional-access-systems-through-attribute-based-cryptosystems/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/TraynorBEM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ButlerEHMTM08,
  author       = {Kevin R. B. Butler and
                  William Enck and
                  Harri Hursti and
                  Stephen E. McLaughlin and
                  Patrick Traynor and
                  Patrick D. McDaniel},
  editor       = {David L. Dill and
                  Tadayoshi Kohno},
  title        = {Systemic Issues in the Hart InterCivic and Premier Voting Systems:
                  Reflections on Project {EVEREST}},
  booktitle    = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July
                  28-29, 2008, San Jose, CA, USA, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/evt08/tech/full\_papers/butler/butler.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ButlerEHMTM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/TraynorKCCZP07,
  author       = {Patrick Traynor and
                  Raju Kumar and
                  Heesook Choi and
                  Guohong Cao and
                  Sencun Zhu and
                  Thomas La Porta},
  title        = {Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {6},
  number       = {6},
  pages        = {663--677},
  year         = {2007},
  url          = {https://doi.org/10.1109/TMC.2007.1020},
  doi          = {10.1109/TMC.2007.1020},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/TraynorKCCZP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/RyuBTM07,
  author       = {Sunam Ryu and
                  Kevin R. B. Butler and
                  Patrick Traynor and
                  Patrick D. McDaniel},
  title        = {Leveraging Identity-Based Cryptography for Node {ID} Assignment in
                  Structured {P2P} Systems},
  booktitle    = {21st International Conference on Advanced Information Networking and
                  Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23,
                  2007, Niagara Falls, Canada},
  pages        = {519--524},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AINAW.2007.221},
  doi          = {10.1109/AINAW.2007.221},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/RyuBTM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amia/WangRNSTDB06,
  author       = {Song Wang and
                  Richard M. Reichley and
                  Laura A. Noirot and
                  Patricia Storey and
                  Patrick Traynor and
                  W. Claiborne Dunagan and
                  Thomas C. Bailey},
  title        = {Identification of Patients with Coronary Heart Disease: Meeting Regulatory
                  Standards vs. Improving Overall Care},
  booktitle    = {{AMIA} 2006, American Medical Informatics Association Annual Symposium,
                  Washington, DC, USA, November 11-15, 2006},
  publisher    = {{AMIA}},
  year         = {2006},
  url          = {https://knowledge.amia.org/amia-55142-a2006a-1.620145/t-002-1.622268/f-001-1.622269/a-462-1.622354/a-463-1.622350},
  timestamp    = {Wed, 17 Apr 2024 11:48:16 +0200},
  biburl       = {https://dblp.org/rec/conf/amia/WangRNSTDB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PirrettiTMW06,
  author       = {Matthew Pirretti and
                  Patrick Traynor and
                  Patrick D. McDaniel and
                  Brent Waters},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Secure attribute-based systems},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {99--112},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180419},
  doi          = {10.1145/1180405.1180419},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PirrettiTMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ClairJEPTMJ06,
  author       = {Luke St. Clair and
                  Lisa Johansen and
                  William Enck and
                  Matthew Pirretti and
                  Patrick Traynor and
                  Patrick D. McDaniel and
                  Trent Jaeger},
  editor       = {Aditya Bagchi and
                  Vijayalakshmi Atluri},
  title        = {Password Exhaustion: Predicting the End of Password Usefulness},
  booktitle    = {Information Systems Security, Second International Conference, {ICISS}
                  2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {37--55},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11961635\_3},
  doi          = {10.1007/11961635\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/ClairJEPTMJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ButlerEPTM06,
  author       = {Kevin R. B. Butler and
                  William Enck and
                  Jennifer Plasterr and
                  Patrick Traynor and
                  Patrick D. McDaniel},
  editor       = {Aditya Bagchi and
                  Vijayalakshmi Atluri},
  title        = {Privacy Preserving Web-Based Email},
  booktitle    = {Information Systems Security, Second International Conference, {ICISS}
                  2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {116--131},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11961635\_8},
  doi          = {10.1007/11961635\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/ButlerEPTM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/TraynorCCZP06,
  author       = {Patrick Traynor and
                  Heesook Choi and
                  Guohong Cao and
                  Sencun Zhu and
                  Thomas La Porta},
  title        = {Establishing Pair-Wise Keys in Heterogeneous Sensor Networks},
  booktitle    = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  23-29 April 2006, Barcelona, Catalunya, Spain},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/INFOCOM.2006.260},
  doi          = {10.1109/INFOCOM.2006.260},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/TraynorCCZP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/TraynorEMP06,
  author       = {Patrick Traynor and
                  William Enck and
                  Patrick D. McDaniel and
                  Thomas La Porta},
  editor       = {Mario Gerla and
                  Chiara Petrioli and
                  Ramachandran Ramjee},
  title        = {Mitigating attacks on open functionality in SMS-capable cellular networks},
  booktitle    = {Proceedings of the 12th Annual International Conference on Mobile
                  Computing and Networking, {MOBICOM} 2006, Los Angeles, CA, USA, September
                  23-29, 2006},
  pages        = {182--193},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161089.1161111},
  doi          = {10.1145/1161089.1161111},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/TraynorEMP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/TraynorKSCP06,
  author       = {Patrick Traynor and
                  Raju Kumar and
                  Hussain Bin Saad and
                  Guohong Cao and
                  Thomas La Porta},
  editor       = {Per Gunningberg and
                  Lars{-}{\AA}ke Larzon and
                  Mahadev Satyanarayanan and
                  Nigel Davies},
  title        = {{LIGER:} implementing efficient hybrid security mechanisms for heterogeneous
                  sensor networks},
  booktitle    = {Proceedings of the 4th International Conference on Mobile Systems,
                  Applications, and Services (MobiSys 2006), Uppsala, Sweden, June 19-22,
                  2006},
  pages        = {15--27},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1134680.1134683},
  doi          = {10.1145/1134680.1134683},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/TraynorKSCP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/TraynorCWHM06,
  author       = {Patrick Traynor and
                  Michael Chien and
                  Scott Weaver and
                  Boniface Hicks and
                  Patrick D. McDaniel},
  title        = {Non-Invasive Methods for Host Certification},
  booktitle    = {Second International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
                  2, 2006 - September 1, 2006},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECCOMW.2006.359539},
  doi          = {10.1109/SECCOMW.2006.359539},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/TraynorCWHM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/TraynorSMPP06,
  author       = {Patrick Traynor and
                  Jaesheung Shin and
                  Bharat B. Madan and
                  Shashi Phoha and
                  Thomas La Porta},
  title        = {Efficient Group Mobility for Heterogeneous Sensor Networks},
  booktitle    = {Proceedings of the 64th {IEEE} Vehicular Technology Conference, {VTC}
                  Fall 2006, 25-28 September 2006, Montr{\'{e}}al, Qu{\'{e}}bec,
                  Canada},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/VTCF.2006.545},
  doi          = {10.1109/VTCF.2006.545},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/TraynorSMPP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/TraynorCP06,
  author       = {Patrick Traynor and
                  Guohong Cao and
                  Thomas La Porta},
  title        = {The effects of probabilistic key management on secure routing in sensor
                  networks},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2006,
                  3-6 April 2006, Las Vegas, Nevada, {USA}},
  pages        = {659--664},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/WCNC.2006.1683547},
  doi          = {10.1109/WCNC.2006.1683547},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/TraynorCP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EnckTMP05,
  author       = {William Enck and
                  Patrick Traynor and
                  Patrick D. McDaniel and
                  Thomas F. La Porta},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Exploiting open functionality in SMS-capable cellular networks},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {393--404},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102171},
  doi          = {10.1145/1102120.1102171},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/EnckTMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics