Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Patrick Traynor
@inproceedings{DBLP:conf/ccs/OlszewskiLSWKPU23, author = {Daniel Olszewski and Allison Lu and Carson Stillman and Kevin Warren and Cole Kitroser and Alejandro Pascual and Divyajyoti Ukirde and Kevin R. B. Butler and Patrick Traynor}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {"Get in Researchers; We're Measuring Reproducibility": {A} Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {3433--3459}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623130}, doi = {10.1145/3576915.3623130}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OlszewskiLSWKPU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/PeetersTJBT23, author = {Christian Peeters and Tyler Tucker and Anushri Jain and Kevin R. B. Butler and Patrick Traynor}, editor = {Petteri Nurmi and Pan Hui and Ardalan Amiri Sani and Yunxin Liu}, title = {LeopardSeal: Detecting Call Interception via Audio Rogue Base Stations}, booktitle = {Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services, MobiSys 2023, Helsinki, Finland, June 18-22, 2023}, pages = {410--422}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3581791.3596846}, doi = {10.1145/3581791.3596846}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/PeetersTJBT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AbdullahKPRBBBT23, author = {Hadi Abdullah and Aditya Karlekar and Saurabh Prasad and Muhammad Sajidur Rahman and Logan Blue and Luke A. Bauer and Vincent Bindschaedler and Patrick Traynor}, title = {Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/attacks-as-defenses-designing-robust-audio-captchas-using-attacks-on-automatic-speech-recognition-systems/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/AbdullahKPRBBBT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TuckerSBT23, author = {Tyler Tucker and Hunter Searle and Kevin R. B. Butler and Patrick Traynor}, title = {Blue's Clues: Practical Discovery of Non-Discoverable Bluetooth Devices}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {3098--3112}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179358}, doi = {10.1109/SP46215.2023.10179358}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/TuckerSBT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GibsonFPGVRBTB22, author = {Cassidy Gibson and Vanessa Frost and Katie Platt and Washington Garcia and Luis Vargas and Sara Rampazzi and Vincent Bindschaedler and Patrick Traynor and Kevin R. B. Butler}, title = {Analyzing the Monetization Ecosystem of Stalkerware}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {4}, pages = {105--119}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0101}, doi = {10.56553/POPETS-2022-0101}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/GibsonFPGVRBTB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/PeetersPMOST22, author = {Christian Peeters and Christopher Patton and Imani N. S. Munyaka and Daniel Olszewski and Thomas Shrimpton and Patrick Traynor}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {{SMS} {OTP} Security {(SOS):} Hardening SMS-Based Two Factor Authentication}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {2--16}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3497756}, doi = {10.1145/3488932.3497756}, timestamp = {Tue, 24 May 2022 13:40:31 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/PeetersPMOST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/OlszewskiZSBT22, author = {Daniel Olszewski and Weidong Zhu and Sandeep Sathyanarayana and Kevin R. B. Butler and Patrick Traynor}, title = {HallMonitor: {A} Framework for Identifying Network Policy Violations in Software}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {245--253}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947243}, doi = {10.1109/CNS56114.2022.9947243}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/OlszewskiZSBT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/AbdullahKBT22, author = {Hadi Abdullah and Aditya Karlekar and Vincent Bindschaedler and Patrick Traynor}, title = {Demystifying Limited Adversarial Transferability in Automatic Speech Recognition Systems}, booktitle = {The Tenth International Conference on Learning Representations, {ICLR} 2022, Virtual Event, April 25-29, 2022}, publisher = {OpenReview.net}, year = {2022}, url = {https://openreview.net/forum?id=l5aSHXi8jG5}, timestamp = {Sat, 20 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/AbdullahKBT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HernandezMMMPST22, author = {Grant Hernandez and Marius Muench and Dominik Christian Maier and Alyssa Milburn and Shinjo Park and Tobias Scharnowski and Tyler Tucker and Patrick Traynor and Kevin R. B. Butler}, title = {FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-200/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/HernandezMMMPST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BlueWAGVOBT22, author = {Logan Blue and Kevin Warren and Hadi Abdullah and Cassidy Gibson and Luis Vargas and Jessica O'Dell and Kevin R. B. Butler and Patrick Traynor}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Who Are You {(I} Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {2691--2708}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/blue}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/BlueWAGVOBT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-05408, author = {Hadi Abdullah and Aditya Karlekar and Saurabh Prasad and Muhammad Sajidur Rahman and Logan Blue and Luke A. Bauer and Vincent Bindschaedler and Patrick Traynor}, title = {Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems}, journal = {CoRR}, volume = {abs/2203.05408}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.05408}, doi = {10.48550/ARXIV.2203.05408}, eprinttype = {arXiv}, eprint = {2203.05408}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-05408.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KingSTDPV21, author = {Samuel T. King and Nolen Scaife and Patrick Traynor and Zain ul Abi Din and Christian Peeters and Hari Venugopalan}, title = {Credit Card Fraud Is a Computer Security Problem}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {65--69}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3050247}, doi = {10.1109/MSEC.2021.3050247}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/KingSTDPV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acml/AbdullahRPGGBST21, author = {Hadi Abdullah and Muhammad Sajidur Rahman and Christian Peeters and Cassidy Gibson and Washington Garcia and Vincent Bindschaedler and Thomas Shrimpton and Patrick Traynor}, editor = {Vineeth N. Balasubramanian and Ivor W. Tsang}, title = {Beyond L\({}_{\mbox{p}}\) Clipping: Equalization based Psychoacoustic Attacks against ASRs}, booktitle = {Asian Conference on Machine Learning, {ACML} 2021, 17-19 November 2021, Virtual Event}, series = {Proceedings of Machine Learning Research}, volume = {157}, pages = {672--688}, publisher = {{PMLR}}, year = {2021}, url = {https://proceedings.mlr.press/v157/abdullah21a.html}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acml/AbdullahRPGGBST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotdi/BlueMTA21, author = {Logan Blue and Samuel Marchal and Patrick Traynor and N. Asokan}, title = {Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices}, booktitle = {IoTDI '21: International Conference on Internet-of-Things Design and Implementation, Virtual Event / Charlottesville, VA, USA, May 18-21, 2021}, pages = {15--27}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3450268.3453530}, doi = {10.1145/3450268.3453530}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iotdi/BlueMTA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AbdullahRGWYST21, author = {Hadi Abdullah and Muhammad Sajidur Rahman and Washington Garcia and Kevin Warren and Anurag Swarnim Yadav and Tom Shrimpton and Patrick Traynor}, title = {Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {712--729}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00009}, doi = {10.1109/SP40001.2021.00009}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/AbdullahRGWYST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AbdullahWBPT21, author = {Hadi Abdullah and Kevin Warren and Vincent Bindschaedler and Nicolas Papernot and Patrick Traynor}, title = {SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {730--747}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00014}, doi = {10.1109/SP40001.2021.00014}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/AbdullahWBPT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uemcom/KhanCTWBTSW21, author = {Arslan Khan and Joseph I. Choi and Dave Jing Tian and Tyler Ward and Kevin R. B. Butler and Patrick Traynor and John M. Shea and Tan F. Wong}, title = {Privacy-Preserving Localization using Enclaves}, booktitle = {12th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile Communication Conference, {UEMCON} 2021, New York, NY, USA, December 1-4, 2021}, pages = {269--278}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/UEMCON53757.2021.9666706}, doi = {10.1109/UEMCON53757.2021.9666706}, timestamp = {Tue, 18 Jan 2022 17:38:45 +0100}, biburl = {https://dblp.org/rec/conf/uemcom/KhanCTWBTSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-13250, author = {Hadi Abdullah and Muhammad Sajidur Rahman and Christian Peeters and Cassidy Gibson and Washington Garcia and Vincent Bindschaedler and Thomas Shrimpton and Patrick Traynor}, title = {Beyond L\({}_{\mbox{p}}\) clipping: Equalization-based Psychoacoustic Attacks against ASRs}, journal = {CoRR}, volume = {abs/2110.13250}, year = {2021}, url = {https://arxiv.org/abs/2110.13250}, eprinttype = {arXiv}, eprint = {2110.13250}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-13250.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccsw-ws/VargasET20, author = {Luis Vargas and Patrick Emami and Patrick Traynor}, editor = {Yinqian Zhang and Radu Sion}, title = {On the Detection of Disinformation Campaign Activity with Network Analysis}, booktitle = {CCSW'20, Proceedings of the 2020 {ACM} {SIGSAC} Conference on Cloud Computing Security Workshop, Virtual Event, USA, November 9, 2020}, pages = {133--146}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411495.3421363}, doi = {10.1145/3411495.3421363}, timestamp = {Thu, 12 Oct 2023 12:32:08 +0200}, biburl = {https://dblp.org/rec/conf/ccsw-ws/VargasET20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istas/ShermanBLGRT20, author = {Imani N. Sherman and Jasmine D. Bowers and Liz{-}Laure Laborde and Juan E. Gilbert and Jaime Ruiz and Patrick Traynor}, title = {Truly Visual Caller ID? An Analysis of Anti-Robocall Applications and their Accessibility to Visually Impaired Users}, booktitle = {{IEEE} International Symposium on Technology and Society, {ISTAS} 2020, Tempe, AZ, USA, November 12-15, 2020}, pages = {266--279}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISTAS50296.2020.9462185}, doi = {10.1109/ISTAS50296.2020.9462185}, timestamp = {Fri, 23 Jul 2021 17:04:06 +0200}, biburl = {https://dblp.org/rec/conf/istas/ShermanBLGRT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ShermanBMGRT20, author = {Imani N. Sherman and Jasmine D. Bowers and Keith McNamara Jr. and Juan E. Gilbert and Jaime Ruiz and Patrick Traynor}, title = {Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/are-you-going-to-answer-that-measuring-user-responses-to-anti-robocall-application-indicators/}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ShermanBMGRT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-13466, author = {Luis Vargas and Patrick Emami and Patrick Traynor}, title = {On the Detection of Disinformation Campaign Activity with Network Analysis}, journal = {CoRR}, volume = {abs/2005.13466}, year = {2020}, url = {https://arxiv.org/abs/2005.13466}, eprinttype = {arXiv}, eprint = {2005.13466}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-13466.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-06622, author = {Hadi Abdullah and Kevin Warren and Vincent Bindschaedler and Nicolas Papernot and Patrick Traynor}, title = {SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems}, journal = {CoRR}, volume = {abs/2007.06622}, year = {2020}, url = {https://arxiv.org/abs/2007.06622}, eprinttype = {arXiv}, eprint = {2007.06622}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-06622.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ScaifePT19, author = {Nolen Scaife and Christian Peeters and Patrick Traynor}, title = {More Cowbell: Lessons Learned in Developing the Skim Reaper}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {10--17}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2914017}, doi = {10.1109/MSEC.2019.2914017}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ScaifePT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HernandezFTYTB19, author = {Grant Hernandez and Farhaan Fowze and Dave Jing Tian and Tuba Yavuz and Patrick Traynor and Kevin R. B. Butler}, title = {Toward Automated Firmware Analysis in the IoT Era}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {5}, pages = {38--46}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2926462}, doi = {10.1109/MSEC.2019.2926462}, timestamp = {Sat, 11 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/HernandezFTYTB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/CarterT19, author = {Henry Carter and Patrick Traynor}, title = {Outsourcing computation for private function evaluation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {6}, pages = {525--561}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.103052}, doi = {10.1504/IJICS.2019.103052}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/CarterT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ReavesVSTBTB18, author = {Bradley Reaves and Luis Vargas and Nolen Scaife and Dave Tian and Logan Blue and Patrick Traynor and Kevin R. B. Butler}, title = {Characterizing the Security of the {SMS} Ecosystem with Public Gateways}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {1}, pages = {2:1--2:31}, year = {2019}, url = {https://doi.org/10.1145/3268932}, doi = {10.1145/3268932}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ReavesVSTBTB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChoiTHPMSBT19, author = {Joseph I. Choi and Dave (Jing) Tian and Grant Hernandez and Christopher Patton and Benjamin Mood and Thomas Shrimpton and Kevin R. B. Butler and Patrick Traynor}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {A Hybrid Approach to Secure Function Evaluation using {SGX}}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {100--113}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329835}, doi = {10.1145/3321705.3329835}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChoiTHPMSBT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FrostTRPTB19, author = {Vanessa Frost and Dave (Jing) Tian and Christie Ruales and Vijay Prakash and Patrick Traynor and Kevin R. B. Butler}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Examining DES-based Cipher Suite Support within the {TLS} Ecosystem}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {539--546}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329858}, doi = {10.1145/3321705.3329858}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FrostTRPTB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/TianCHTB19, author = {Dave (Jing) Tian and Joseph I. Choi and Grant Hernandez and Patrick Traynor and Kevin R. B. Butler}, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {A Practical Intel {SGX} Setting for Linux Containers in the Cloud}, booktitle = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, pages = {255--266}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006.3300030}, doi = {10.1145/3292006.3300030}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/TianCHTB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AbdullahGPTBW19, author = {Hadi Abdullah and Washington Garcia and Christian Peeters and Patrick Traynor and Kevin R. B. Butler and Joseph Wilson}, title = {Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/practical-hidden-voice-attacks-against-speech-and-speaker-recognition-systems/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AbdullahGPTBW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/VargasBFPSBT19, author = {Luis Vargas and Logan Blue and Vanessa Frost and Christopher Patton and Nolen Scaife and Kevin R. B. Butler and Patrick Traynor}, title = {Digital Healthcare-Associated Infection: {A} Case Study on the Security of a Major Multi-Campus Hospital System}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/digital-healthcare-associated-infection-a-case-study-on-the-security-of-a-major-multi-campus-hospital-system/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/VargasBFPSBT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ScaifeBPHSTA19, author = {Nolen Scaife and Jasmine D. Bowers and Christian Peeters and Grant Hernandez and Imani N. Sherman and Patrick Traynor and Lisa Anthony}, title = {Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {1000--1014}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00077}, doi = {10.1109/SP.2019.00077}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ScaifeBPHSTA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BowersSBT19, author = {Jasmine D. Bowers and Imani N. Sherman and Kevin R. B. Butler and Patrick Traynor}, title = {Characterizing security and privacy practices in emerging digital credit applications}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {94--107}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3319723}, doi = {10.1145/3317549.3319723}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BowersSBT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChoiTWBTSW19, author = {Joseph I. Choi and Dave (Jing) Tian and Tyler Ward and Kevin R. B. Butler and Patrick Traynor and John M. Shea and Tan F. Wong}, title = {Enclave-based privacy-preserving localization: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {312--313}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326307}, doi = {10.1145/3317549.3326307}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ChoiTWBTSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2019, editor = {Nadia Heninger and Patrick Traynor}, title = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-05734, author = {Hadi Abdullah and Washington Garcia and Christian Peeters and Patrick Traynor and Kevin R. B. Butler and Joseph Wilson}, title = {Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems}, journal = {CoRR}, volume = {abs/1904.05734}, year = {2019}, url = {http://arxiv.org/abs/1904.05734}, eprinttype = {arXiv}, eprint = {1904.05734}, timestamp = {Thu, 25 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-05734.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-01233, author = {Joseph I. Choi and Dave (Jing) Tian and Grant Hernandez and Christopher Patton and Benjamin Mood and Thomas Shrimpton and Kevin R. B. Butler and Patrick Traynor}, title = {A Hybrid Approach to Secure Function Evaluation Using {SGX}}, journal = {CoRR}, volume = {abs/1905.01233}, year = {2019}, url = {http://arxiv.org/abs/1905.01233}, eprinttype = {arXiv}, eprint = {1905.01233}, timestamp = {Mon, 27 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-01233.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-05262, author = {Hadi Abdullah and Muhammad Sajidur Rahman and Washington Garcia and Logan Blue and Kevin Warren and Anurag Swarnim Yadav and Tom Shrimpton and Patrick Traynor}, title = {Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems}, journal = {CoRR}, volume = {abs/1910.05262}, year = {2019}, url = {http://arxiv.org/abs/1910.05262}, eprinttype = {arXiv}, eprint = {1910.05262}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-05262.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ScaifeCLJT18, author = {Nolen Scaife and Henry Carter and Lyrissa Lidsky and Rachael L. Jones and Patrick Traynor}, title = {OnionDNS: a seizure-resistant top-level domain}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {6}, pages = {645--660}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0391-z}, doi = {10.1007/S10207-017-0391-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ScaifeCLJT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WermkeHARTF18, author = {Dominik Wermke and Nicolas Huaman and Yasemin Acar and Bradley Reaves and Patrick Traynor and Sascha Fahl}, title = {A Large Scale Investigation of Obfuscation Use in Google Play}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {222--235}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274726}, doi = {10.1145/3274694.3274726}, timestamp = {Wed, 05 Dec 2018 09:44:25 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WermkeHARTF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BlueAVT18, author = {Logan Blue and Hadi Abdullah and Luis Vargas and Patrick Traynor}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {2MA: Verifying Voice Commands via Two Microphone Authentication}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {89--100}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196545}, doi = {10.1145/3196494.3196545}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BlueAVT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VargasHCBSST18, author = {Luis Vargas and Gyan Hazarika and Rachel Culpepper and Kevin R. B. Butler and Thomas Shrimpton and Doug Szajda and Patrick Traynor}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Mitigating Risk while Complying with Data Retention Laws}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {2011--2027}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243800}, doi = {10.1145/3243734.3243800}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/VargasHCBSST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PeetersASBTRB18, author = {Christian Peeters and Hadi Abdullah and Nolen Scaife and Jasmine D. Bowers and Patrick Traynor and Bradley Reaves and Kevin R. B. Butler}, title = {Sonar: Detecting {SS7} Redirection Attacks with Audio-Based Distance Bounding}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {567--582}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00006}, doi = {10.1109/SP.2018.00006}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/PeetersASBTRB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ScaifePVZTA18, author = {Nolen Scaife and Christian Peeters and Camilo Velez and Hanqing Zhao and Patrick Traynor and David Arnold}, title = {The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding Jitter}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {1063--1076}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00042}, doi = {10.1109/SP.2018.00042}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ScaifePVZTA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ScaifePT18, author = {Nolen Scaife and Christian Peeters and Patrick Traynor}, editor = {William Enck and Adrienne Porter Felt}, title = {Fear the Reaper: Characterization and Fast Detection of Card Skimmers}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1--14}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/scaife}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/ScaifePT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TianHCFRTVHRGB18, author = {Dave (Jing) Tian and Grant Hernandez and Joseph I. Choi and Vanessa Frost and Christie Ruales and Patrick Traynor and Hayawardh Vijayakumar and Lee Harrison and Amir Rahmati and Michael Grace and Kevin R. B. Butler}, editor = {William Enck and Adrienne Porter Felt}, title = {ATtention Spanned: Comprehensive Vulnerability Analysis of {AT} Commands Within the Android Ecosystem}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {273--290}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/tian}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/TianHCFRTVHRGB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BlueVT18, author = {Logan Blue and Luis Vargas and Patrick Traynor}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Hello, Is It Me You're Looking For?: Differentiating Between Human and Electronic Speakers for Voice Interface Security}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {123--133}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212505}, doi = {10.1145/3212480.3212505}, timestamp = {Mon, 16 Sep 2019 13:25:53 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BlueVT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-02742, author = {Dominik Wermke and Nicolas Huaman and Yasemin Acar and Bradley Reaves and Patrick Traynor and Sascha Fahl}, title = {A Large Scale Investigation of Obfuscation Use in Google Play}, journal = {CoRR}, volume = {abs/1801.02742}, year = {2018}, url = {http://arxiv.org/abs/1801.02742}, eprinttype = {arXiv}, eprint = {1801.02742}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-02742.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TraynorBBR17, author = {Patrick Traynor and Kevin R. B. Butler and Jasmine D. Bowers and Bradley Reaves}, title = {FinTechSec: Addressing the Security Challenges of Digital Financial Services}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {5}, pages = {85--89}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.3681060}, doi = {10.1109/MSP.2017.3681060}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/TraynorBBR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/HeuserRPCDEKST17, author = {Stephan Heuser and Bradley Reaves and Praveen Kumar Pendyala and Henry Carter and Alexandra Dmitrienko and William Enck and Negar Kiyavash and Ahmad{-}Reza Sadeghi and Patrick Traynor}, title = {Phonion: Practical Protection of Metadata in Telephony Networks}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {1}, pages = {170--187}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0011}, doi = {10.1515/POPETS-2017-0011}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/HeuserRPCDEKST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ReavesBSBBTB17, author = {Bradley Reaves and Jasmine D. Bowers and Nolen Scaife and Adam Bates and Arnav Bhartiya and Patrick Traynor and Kevin R. B. Butler}, title = {Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {3}, pages = {11:1--11:31}, year = {2017}, url = {https://doi.org/10.1145/3092368}, doi = {10.1145/3092368}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ReavesBSBBTB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/AmrutkarKT17, author = {Chaitrali Amrutkar and Young Seuk Kim and Patrick Traynor}, title = {Detecting Mobile Malicious Webpages in Real Time}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {16}, number = {8}, pages = {2184--2197}, year = {2017}, url = {https://doi.org/10.1109/TMC.2016.2575828}, doi = {10.1109/TMC.2016.2575828}, timestamp = {Wed, 26 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/AmrutkarKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/WardCBSTW17, author = {Tyler Ward and Joseph I. Choi and Kevin R. B. Butler and John M. Shea and Patrick Traynor and Tan F. Wong}, title = {Privacy preserving localization using a distributed particle filtering protocol}, booktitle = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore, MD, USA, October 23-25, 2017}, pages = {835--840}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/MILCOM.2017.8170863}, doi = {10.1109/MILCOM.2017.8170863}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/WardCBSTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/BowersRSTB17, author = {Jasmine D. Bowers and Bradley Reaves and Imani N. Sherman and Patrick Traynor and Kevin R. B. Butler}, title = {Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services}, booktitle = {Thirteenth Symposium on Usable Privacy and Security, {SOUPS} 2017, Santa Clara, CA, USA, July 12-14, 2017}, pages = {97--114}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/soups2017/technical-sessions/presentation/bowers}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/BowersRSTB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ReavesBAVTS17, author = {Bradley Reaves and Logan Blue and Hadi Abdullah and Luis Vargas and Patrick Traynor and Thomas Shrimpton}, editor = {Engin Kirda and Thomas Ristenpart}, title = {AuthentiCall: Efficient Identity and Content Authentication for Phone Calls}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {575--592}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/reaves}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/ReavesBAVTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ReavesBGABCDHKS16, author = {Bradley Reaves and Jasmine D. Bowers and Sigmund Albert Gorski III and Olabode Anise and Rahul Bobhate and Raymond Cho and Hiranava Das and Sharique Hussain and Hamza Karachiwala and Nolen Scaife and Byron Wright and Kevin R. B. Butler and William Enck and Patrick Traynor}, title = {*droid: Assessment and Evaluation of Android Application Analysis Tools}, journal = {{ACM} Comput. Surv.}, volume = {49}, number = {3}, pages = {55:1--55:30}, year = {2016}, url = {https://doi.org/10.1145/2996358}, doi = {10.1145/2996358}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/ReavesBGABCDHKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CarterMTB15, author = {Henry Carter and Benjamin Mood and Patrick Traynor and Kevin R. B. Butler}, title = {Secure outsourced garbled circuit evaluation for mobile devices}, journal = {J. Comput. Secur.}, volume = {24}, number = {2}, pages = {137--180}, year = {2016}, url = {https://doi.org/10.3233/JCS-150540}, doi = {10.3233/JCS-150540}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CarterMTB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CarterMTB16, author = {Henry Carter and Benjamin Mood and Patrick Traynor and Kevin R. B. Butler}, title = {Outsourcing secure two-party computation as a black box}, journal = {Secur. Commun. Networks}, volume = {9}, number = {14}, pages = {2261--2275}, year = {2016}, url = {https://doi.org/10.1002/sec.1486}, doi = {10.1002/SEC.1486}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CarterMTB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DeshmukhCHTB16, author = {Siddhant Deshmukh and Henry Carter and Grant Hernandez and Patrick Traynor and Kevin R. B. Butler}, title = {Efficient and secure template blinding for biometric authentication}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {480--488}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860539}, doi = {10.1109/CNS.2016.7860539}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DeshmukhCHTB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/MoodGCBT16, author = {Benjamin Mood and Debayan Gupta and Henry Carter and Kevin R. B. Butler and Patrick Traynor}, title = {Frigate: {A} Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, pages = {112--127}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EuroSP.2016.20}, doi = {10.1109/EUROSP.2016.20}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/MoodGCBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GuptaMFBT16, author = {Debayan Gupta and Benjamin Mood and Joan Feigenbaum and Kevin R. B. Butler and Patrick Traynor}, editor = {Jeremy Clark and Sarah Meiklejohn and Peter Y. A. Ryan and Dan S. Wallach and Michael Brenner and Kurt Rohloff}, title = {Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation}, booktitle = {Financial Cryptography and Data Security - {FC} 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9604}, pages = {302--318}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53357-4\_20}, doi = {10.1007/978-3-662-53357-4\_20}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/GuptaMFBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ScaifeCTB16, author = {Nolen Scaife and Henry Carter and Patrick Traynor and Kevin R. B. Butler}, title = {CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data}, booktitle = {36th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2016, Nara, Japan, June 27-30, 2016}, pages = {303--312}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICDCS.2016.46}, doi = {10.1109/ICDCS.2016.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/ScaifeCTB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ReavesSTBTB16, author = {Bradley Reaves and Nolen Scaife and Dave Tian and Logan Blue and Patrick Traynor and Kevin R. B. Butler}, title = {Sending Out an {SMS:} Characterizing the Security of the {SMS} Ecosystem with Public Gateways}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {339--356}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.28}, doi = {10.1109/SP.2016.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ReavesSTBTB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TianSBBT16, author = {Dave (Jing) Tian and Nolen Scaife and Adam Bates and Kevin R. B. Butler and Patrick Traynor}, editor = {Thorsten Holz and Stefan Savage}, title = {Making {USB} Great Again with {USBFILTER}}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {415--430}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/tian}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/TianSBBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ReavesBT16, author = {Bradley Reaves and Logan Blue and Patrick Traynor}, editor = {Thorsten Holz and Stefan Savage}, title = {AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {963--978}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/reaves}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ReavesBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ReavesBTTB16, author = {Bradley Reaves and Logan Blue and Dave Tian and Patrick Traynor and Kevin R. B. Butler}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Detecting {SMS} Spam in the Age of Legitimate Bulk Messaging}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {165--170}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939937}, doi = {10.1145/2939918.2939937}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ReavesBTTB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/woot/2016, editor = {Natalie Silvanovich and Patrick Traynor}, title = {10th {USENIX} Workshop on Offensive Technologies, {WOOT} 16, Austin, TX, USA, August 8-9, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/woot16}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/woot/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarterT16, author = {Henry Carter and Patrick Traynor}, title = {{OPFE:} Outsourcing Computation for Private Function Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2016}, url = {http://eprint.iacr.org/2016/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarterT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BatesBSSTW15, author = {Adam Bates and Kevin R. B. Butler and Micah Sherr and Clay Shields and Patrick Traynor and Dan S. Wallach}, title = {Accountable wiretapping - or - {I} know they can hear you now}, journal = {J. Comput. Secur.}, volume = {23}, number = {2}, pages = {167--195}, year = {2015}, url = {https://doi.org/10.3233/JCS-140515}, doi = {10.3233/JCS-140515}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BatesBSSTW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/AmrutkarTO15, author = {Chaitrali Amrutkar and Patrick Traynor and Paul C. van Oorschot}, title = {An Empirical Evaluation of Security Indicators in Mobile Web Browsers}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {14}, number = {5}, pages = {889--903}, year = {2015}, url = {https://doi.org/10.1109/TMC.2013.90}, doi = {10.1109/TMC.2013.90}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/AmrutkarTO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DeweyRT15, author = {David Dewey and Bradley Reaves and Patrick Traynor}, title = {Uncovering Use-After-Free Conditions in Compiled Code}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {90--99}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.61}, doi = {10.1109/ARES.2015.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/DeweyRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/CarterMTB15, author = {Henry Carter and Benjamin Mood and Patrick Traynor and Kevin R. B. Butler}, editor = {Michael K. Reiter and David Naccache}, title = {Outsourcing Secure Two-Party Computation as a Black Box}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {214--222}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_15}, doi = {10.1007/978-3-319-26823-1\_15}, timestamp = {Mon, 02 Jan 2023 08:05:35 +0100}, biburl = {https://dblp.org/rec/conf/cans/CarterMTB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ScaifeCT15, author = {Nolen Scaife and Henry Carter and Patrick Traynor}, title = {OnionDNS: {A} seizure-resistant top-level Domain}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {379--387}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346849}, doi = {10.1109/CNS.2015.7346849}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/ScaifeCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/ShernanCTTB15, author = {Ethan Shernan and Henry Carter and Dave Tian and Patrick Traynor and Kevin R. B. Butler}, editor = {Magnus Almgren and Vincenzo Gulisano and Federico Maggi}, title = {More Guidelines Than Rules: {CSRF} Vulnerabilities from Noncompliant OAuth 2.0 Implementations}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, {DIMVA} 2015, Milan, Italy, July 9-10, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9148}, pages = {239--260}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20550-2\_13}, doi = {10.1007/978-3-319-20550-2\_13}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/ShernanCTTB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ReavesSBTB15, author = {Bradley Reaves and Nolen Scaife and Adam Bates and Patrick Traynor and Kevin R. B. Butler}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {17--32}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/reaves}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/ReavesSBTB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ReavesSBCT15, author = {Bradley Reaves and Ethan Shernan and Adam Bates and Henry Carter and Patrick Traynor}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {833--848}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/reaves-boxed}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ReavesSBCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CarterADT14, author = {Henry Carter and Chaitrali Amrutkar and Italo Dacosta and Patrick Traynor}, title = {For your phone only: custom protocols for efficient secure function evaluation on mobile devices}, journal = {Secur. Commun. Networks}, volume = {7}, number = {7}, pages = {1165--1176}, year = {2014}, url = {https://doi.org/10.1002/sec.851}, doi = {10.1002/SEC.851}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CarterADT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CarterLT14, author = {Henry Carter and Charles Lever and Patrick Traynor}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Whitewash: outsourcing garbled circuit generation for mobile devices}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {266--275}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664255}, doi = {10.1145/2664243.2664255}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CarterLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2014, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2627393}, isbn = {978-1-4503-2972-9}, timestamp = {Thu, 02 Jun 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarterLT14, author = {Henry Carter and Charles Lever and Patrick Traynor}, title = {Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2014}, url = {http://eprint.iacr.org/2014/224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarterLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarterMTB14, author = {Henry Carter and Benjamin Mood and Patrick Traynor and Kevin R. B. Butler}, title = {Outsourcing Secure Two-Party Computation as a Black Box}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {936}, year = {2014}, url = {http://eprint.iacr.org/2014/936}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarterMTB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/AmrutkarHJJSTV13, author = {Chaitrali Amrutkar and Matti A. Hiltunen and Trevor Jim and Kaustubh R. Joshi and Oliver Spatscheck and Patrick Traynor and Shobha Venkataraman}, title = {Why is my smartphone slow? On the fly diagnosis of underperformance on the mobile Internet}, booktitle = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/DSN.2013.6575301}, doi = {10.1109/DSN.2013.6575301}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/AmrutkarHJJSTV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LeverARTL13, author = {Charles Lever and Manos Antonakakis and Bradley Reaves and Patrick Traynor and Wenke Lee}, title = {The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/core-matter-analyzing-malicious-traffic-cellular-carriers}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LeverARTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CarterMTB13, author = {Henry Carter and Benjamin Mood and Patrick Traynor and Kevin R. B. Butler}, editor = {Samuel T. King}, title = {Secure Outsourced Garbled Circuit Evaluation for Mobile Devices}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {289--304}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/carter}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/CarterMTB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChakradeoRTE13, author = {Saurabh Chakradeo and Bradley Reaves and Patrick Traynor and William Enck}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {{MAST:} triage for market-scale mobile malware analysis}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {13--24}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462100}, doi = {10.1145/2462096.2462100}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ChakradeoRTE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ShiLTAZ12, author = {Cong Shi and Xiapu Luo and Patrick Traynor and Mostafa H. Ammar and Ellen W. Zegura}, title = {{ARDEN:} Anonymous networking in delay tolerant networks}, journal = {Ad Hoc Networks}, volume = {10}, number = {6}, pages = {918--930}, year = {2012}, url = {https://doi.org/10.1016/j.adhoc.2011.11.008}, doi = {10.1016/J.ADHOC.2011.11.008}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ShiLTAZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/Traynor12, author = {Patrick Traynor}, title = {Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {11}, number = {6}, pages = {983--994}, year = {2012}, url = {https://doi.org/10.1109/TMC.2011.120}, doi = {10.1109/TMC.2011.120}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/Traynor12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/DacostaCAT12, author = {Italo Dacosta and Saurabh Chakradeo and Mustaque Ahamad and Patrick Traynor}, title = {One-time cookies: Preventing session hijacking attacks with stateless authentication tokens}, journal = {{ACM} Trans. Internet Techn.}, volume = {12}, number = {1}, pages = {1:1--1:24}, year = {2012}, url = {https://doi.org/10.1145/2220352.2220353}, doi = {10.1145/2220352.2220353}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/DacostaCAT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AmrutkarT12, author = {Chaitrali Amrutkar and Patrick Traynor}, editor = {Ting Yu and William Enck and Xuxian Jiang}, title = {Short paper: rethinking permissions for mobile web apps: barriers and the road ahead}, booktitle = {SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2012, October 19, 2012, Raleigh, NC, {USA}}, pages = {15--20}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381934.2381939}, doi = {10.1145/2381934.2381939}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AmrutkarT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DacostaAT12, author = {Italo Dacosta and Mustaque Ahamad and Patrick Traynor}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Trust No One Else: Detecting {MITM} Attacks against {SSL/TLS} without Third-Parties}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {199--216}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_12}, doi = {10.1007/978-3-642-33167-1\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DacostaAT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/AmrutkarSVT12, author = {Chaitrali Amrutkar and Kapil Singh and Arunabh Verma and Patrick Traynor}, editor = {Venkat N. Venkatakrishnan and Diganta Goswami}, title = {VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security}, booktitle = {Information Systems Security, 8th International Conference, {ICISS} 2012, Guwahati, India, December 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {16--34}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35130-3\_2}, doi = {10.1007/978-3-642-35130-3\_2}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/AmrutkarSVT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/AmrutkarTO12, author = {Chaitrali Amrutkar and Patrick Traynor and Paul C. van Oorschot}, editor = {Dieter Gollmann and Felix C. Freiling}, title = {Measuring {SSL} Indicators on Mobile Browsers: Extended Life, or End of the Road?}, booktitle = {Information Security - 15th International Conference, {ISC} 2012, Passau, Germany, September 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7483}, pages = {86--103}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33383-5\_6}, doi = {10.1007/978-3-642-33383-5\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/AmrutkarTO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BatesBSSTW12, author = {Adam Bates and Kevin R. B. Butler and Micah Sherr and Clay Shields and Patrick Traynor and Dan S. Wallach}, title = {Accountable Wiretapping -or- {I} know they can hear you now}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/accountable-wiretapping-or-i-know-they-can-hear-you-now}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BatesBSSTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/LawrenceT12, author = {Nigel Lawrence and Patrick Traynor}, editor = {Elie Bursztein and Thomas Dullien}, title = {Under New Management: Practical Attacks on SNMPv3}, booktitle = {6th {USENIX} Workshop on Offensive Technologies, WOOT'12, August 6-7, 2012, Bellevue, WA, USA, Proceedings}, publisher = {{USENIX} Association}, year = {2012}, url = {http://www.usenix.org/conference/woot12/under-new-management-practical-attacks-snmpv3}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/woot/LawrenceT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2012hotsec, editor = {Patrick Traynor}, title = {7th {USENIX} Workshop on Hot Topics in Security, HotSec'12, Bellevue, WA, USA, August 7, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/hotsec12}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2012hotsec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TraynorARJMP11, author = {Patrick Traynor and Chaitrali Amrutkar and Vikhyath Rao and Trent Jaeger and Patrick D. McDaniel and Thomas La Porta}, title = {From mobile phones to responsible devices}, journal = {Secur. Commun. Networks}, volume = {4}, number = {6}, pages = {719--726}, year = {2011}, url = {https://doi.org/10.1002/sec.218}, doi = {10.1002/SEC.218}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/TraynorARJMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/DacostaBAT11, author = {Italo Dacosta and Vijay Balasubramaniyan and Mustaque Ahamad and Patrick Traynor}, title = {Improving Authentication Performance of Distributed {SIP} Proxies}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {22}, number = {11}, pages = {1804--1812}, year = {2011}, url = {https://doi.org/10.1109/TPDS.2011.62}, doi = {10.1109/TPDS.2011.62}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/DacostaBAT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NipaneDT11, author = {Nilesh Nipane and Italo Dacosta and Patrick Traynor}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {"Mix-in-Place" anonymous networking using secure function evaluation}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {63--72}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076742}, doi = {10.1145/2076732.2076742}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NipaneDT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NadjiGT11, author = {Yacin Nadji and Jonathon T. Giffin and Patrick Traynor}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Automated remote repair for mobile malware}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {413--422}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076791}, doi = {10.1145/2076732.2076791}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NadjiGT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MarquardtVCT11, author = {Philip Marquardt and Arunabh Verma and Henry Carter and Patrick Traynor}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {(sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {551--562}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046771}, doi = {10.1145/2046707.2046771}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MarquardtVCT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MarquardtDT11, author = {Philip Marquardt and David Dagon and Patrick Traynor}, editor = {George Danezis}, title = {Impeding Individual User Profiling in Shopper Loyalty Programs}, booktitle = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7035}, pages = {93--101}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27576-0\_8}, doi = {10.1007/978-3-642-27576-0\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/MarquardtDT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DeweyT11, author = {David Dewey and Patrick Traynor}, title = {No Loitering: Exploiting Lingering Vulnerabilities in Default {COM} Objects}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, url = {https://www.ndss-symposium.org/ndss2011/no-loitering-exploiting-lingering-vulnerabilities-in-default-com-objects}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/DeweyT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/PirrettiTMW10, author = {Matthew Pirretti and Patrick Traynor and Patrick D. McDaniel and Brent Waters}, title = {Secure attribute-based systems}, journal = {J. Comput. Secur.}, volume = {18}, number = {5}, pages = {799--837}, year = {2010}, url = {https://doi.org/10.3233/JCS-2009-0383}, doi = {10.3233/JCS-2009-0383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/PirrettiTMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TraynorBEMB10, author = {Patrick Traynor and Kevin R. B. Butler and William Enck and Patrick D. McDaniel and Kevin Borders}, title = {malnets: large-scale malicious networks \emph{via} compromised wireless access points}, journal = {Secur. Commun. Networks}, volume = {3}, number = {2-3}, pages = {102--113}, year = {2010}, url = {https://doi.org/10.1002/sec.149}, doi = {10.1002/SEC.149}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/TraynorBEMB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BalasubramaniyanPAHT10, author = {Vijay A. Balasubramaniyan and Aamir Poonawalla and Mustaque Ahamad and Michael T. Hunter and Patrick Traynor}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {PinDr0p: using single-ended audio features to determine call provenance}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {109--120}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866320}, doi = {10.1145/1866307.1866320}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BalasubramaniyanPAHT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/SinghSJTL10, author = {Kapil Singh and Samrit Sangal and Nehil Jain and Patrick Traynor and Wenke Lee}, editor = {Christian Kreibich and Marko Jahnke}, title = {Evaluating Bluetooth as a Medium for Botnet Command and Control}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 7th International Conference, {DIMVA} 2010, Bonn, Germany, July 8-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6201}, pages = {61--80}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14215-4\_4}, doi = {10.1007/978-3-642-14215-4\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/SinghSJTL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/TraynorSPMG10, author = {Patrick Traynor and Joshua Schiffman and Thomas La Porta and Patrick D. McDaniel and Abhrajit Ghosh}, title = {Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware}, booktitle = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM} 2010, 6-10 December 2010, Miami, Florida, {USA}}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/GLOCOM.2010.5684072}, doi = {10.1109/GLOCOM.2010.5684072}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/TraynorSPMG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/Traynor10, author = {Patrick Traynor}, editor = {Sushil Jajodia and Jianying Zhou}, title = {Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {125--143}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_8}, doi = {10.1007/978-3-642-16161-2\_8}, timestamp = {Sun, 07 Jan 2018 16:52:46 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/Traynor10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/DacostaT10, author = {Italo Dacosta and Patrick Traynor}, editor = {Paul Barham and Timothy Roscoe}, title = {Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks}, booktitle = {2010 {USENIX} Annual Technical Conference, Boston, MA, USA, June 23-25, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/usenix-atc-10/proxychain-developing-robust-and-efficient-authentication-infrastructure}, timestamp = {Mon, 01 Feb 2021 08:43:38 +0100}, biburl = {https://dblp.org/rec/conf/usenix/DacostaT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Traynor09, author = {Patrick Traynor}, title = {Securing Cellular Infrastructure: Challenges and Opportunities}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {4}, pages = {77--79}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.103}, doi = {10.1109/MSP.2009.103}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Traynor09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/TraynorEMP09, author = {Patrick Traynor and William Enck and Patrick D. McDaniel and Thomas La Porta}, title = {Mitigating attacks on open functionality in SMS-capable cellular networks}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {17}, number = {1}, pages = {40--53}, year = {2009}, url = {http://doi.acm.org/10.1145/1514070.1514074}, doi = {10.1145/1514070.1514074}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/TraynorEMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ButlerRTM09, author = {Kevin R. B. Butler and Sunam Ryu and Patrick Traynor and Patrick D. McDaniel}, title = {Leveraging Identity-Based Cryptography for Node {ID} Assignment in Structured {P2P} Systems}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {20}, number = {12}, pages = {1803--1815}, year = {2009}, url = {https://doi.org/10.1109/TPDS.2008.249}, doi = {10.1109/TPDS.2008.249}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/ButlerRTM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ParkGT09, author = {Frank S. Park and Chinmay Gangakhedkar and Patrick Traynor}, title = {Leveraging Cellular Infrastructure to Improve Fraud Prevention}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {350--359}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.40}, doi = {10.1109/ACSAC.2009.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ParkGT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TraynorLORJMP09, author = {Patrick Traynor and Michael Lin and Machigar Ongtang and Vikhyath Rao and Trent Jaeger and Patrick D. McDaniel and Thomas La Porta}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {On cellular botnets: measuring the impact of malicious devices on a cellular network core}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {223--234}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653690}, doi = {10.1145/1653662.1653690}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TraynorLORJMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Dolan-GavittSTG09, author = {Brendan Dolan{-}Gavitt and Abhinav Srivastava and Patrick Traynor and Jonathon T. Giffin}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Robust signatures for kernel data structures}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {566--577}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653730}, doi = {10.1145/1653662.1653730}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Dolan-GavittSTG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptcomm/DacostaBAT09, author = {Italo Dacosta and Vijay Balasubramaniyan and Mustaque Ahamad and Patrick Traynor}, editor = {Mustaque Ahamad and Dorgham Sisalem and Eric Chen and Charles Consel}, title = {Improving authentication performance of distributed {SIP} proxies}, booktitle = {Principles, Systems and Applications of {IP} Telecommunications. Third International Conference, IPTComm 2009, Atlanta, Georgia, USA, July 7-8, 2009. Proceedings}, pages = {1}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1595637.1595639}, doi = {10.1145/1595637.1595639}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptcomm/DacostaBAT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/TraynorMP08, author = {Patrick Traynor and Patrick D. McDaniel and Thomas La Porta}, title = {Security for Telecommunications Networks}, series = {Advances in Information Security}, volume = {40}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-72442-3}, doi = {10.1007/978-0-387-72442-3}, isbn = {978-0-387-72441-6}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/TraynorMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/TraynorEMP08, author = {Patrick Traynor and William Enck and Patrick D. McDaniel and Thomas La Porta}, title = {Exploiting open functionality in SMS-capable cellular networks}, journal = {J. Comput. Secur.}, volume = {16}, number = {6}, pages = {713--742}, year = {2008}, url = {https://doi.org/10.3233/JCS-2007-0308}, doi = {10.3233/JCS-2007-0308}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/TraynorEMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/TraynorCWHM08, author = {Patrick Traynor and Michael Chien and Scott Weaver and Boniface Hicks and Patrick D. McDaniel}, title = {Noninvasive Methods for Host Certification}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {3}, pages = {16:1--16:23}, year = {2008}, url = {https://doi.org/10.1145/1341731.1341737}, doi = {10.1145/1341731.1341737}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/TraynorCWHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/TraynorBEM08, author = {Patrick Traynor and Kevin R. B. Butler and William Enck and Patrick D. McDaniel}, title = {Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/realizing-massive-scale-conditional-access-systems-through-attribute-based-cryptosystems/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/TraynorBEM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ButlerEHMTM08, author = {Kevin R. B. Butler and William Enck and Harri Hursti and Stephen E. McLaughlin and Patrick Traynor and Patrick D. McDaniel}, editor = {David L. Dill and Tadayoshi Kohno}, title = {Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project {EVEREST}}, booktitle = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July 28-29, 2008, San Jose, CA, USA, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/evt08/tech/full\_papers/butler/butler.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ButlerEHMTM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/TraynorKCCZP07, author = {Patrick Traynor and Raju Kumar and Heesook Choi and Guohong Cao and Sencun Zhu and Thomas La Porta}, title = {Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {6}, number = {6}, pages = {663--677}, year = {2007}, url = {https://doi.org/10.1109/TMC.2007.1020}, doi = {10.1109/TMC.2007.1020}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/TraynorKCCZP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/RyuBTM07, author = {Sunam Ryu and Kevin R. B. Butler and Patrick Traynor and Patrick D. McDaniel}, title = {Leveraging Identity-Based Cryptography for Node {ID} Assignment in Structured {P2P} Systems}, booktitle = {21st International Conference on Advanced Information Networking and Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada}, pages = {519--524}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/AINAW.2007.221}, doi = {10.1109/AINAW.2007.221}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/RyuBTM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amia/WangRNSTDB06, author = {Song Wang and Richard M. Reichley and Laura A. Noirot and Patricia Storey and Patrick Traynor and W. Claiborne Dunagan and Thomas C. Bailey}, title = {Identification of Patients with Coronary Heart Disease: Meeting Regulatory Standards vs. Improving Overall Care}, booktitle = {{AMIA} 2006, American Medical Informatics Association Annual Symposium, Washington, DC, USA, November 11-15, 2006}, publisher = {{AMIA}}, year = {2006}, url = {https://knowledge.amia.org/amia-55142-a2006a-1.620145/t-002-1.622268/f-001-1.622269/a-462-1.622354/a-463-1.622350}, timestamp = {Wed, 17 Apr 2024 11:48:16 +0200}, biburl = {https://dblp.org/rec/conf/amia/WangRNSTDB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PirrettiTMW06, author = {Matthew Pirretti and Patrick Traynor and Patrick D. McDaniel and Brent Waters}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Secure attribute-based systems}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {99--112}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180419}, doi = {10.1145/1180405.1180419}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PirrettiTMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/ClairJEPTMJ06, author = {Luke St. Clair and Lisa Johansen and William Enck and Matthew Pirretti and Patrick Traynor and Patrick D. McDaniel and Trent Jaeger}, editor = {Aditya Bagchi and Vijayalakshmi Atluri}, title = {Password Exhaustion: Predicting the End of Password Usefulness}, booktitle = {Information Systems Security, Second International Conference, {ICISS} 2006, Kolkata, India, December 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {37--55}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11961635\_3}, doi = {10.1007/11961635\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/ClairJEPTMJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/ButlerEPTM06, author = {Kevin R. B. Butler and William Enck and Jennifer Plasterr and Patrick Traynor and Patrick D. McDaniel}, editor = {Aditya Bagchi and Vijayalakshmi Atluri}, title = {Privacy Preserving Web-Based Email}, booktitle = {Information Systems Security, Second International Conference, {ICISS} 2006, Kolkata, India, December 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {116--131}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11961635\_8}, doi = {10.1007/11961635\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/ButlerEPTM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/TraynorCCZP06, author = {Patrick Traynor and Heesook Choi and Guohong Cao and Sencun Zhu and Thomas La Porta}, title = {Establishing Pair-Wise Keys in Heterogeneous Sensor Networks}, booktitle = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/INFOCOM.2006.260}, doi = {10.1109/INFOCOM.2006.260}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/TraynorCCZP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/TraynorEMP06, author = {Patrick Traynor and William Enck and Patrick D. McDaniel and Thomas La Porta}, editor = {Mario Gerla and Chiara Petrioli and Ramachandran Ramjee}, title = {Mitigating attacks on open functionality in SMS-capable cellular networks}, booktitle = {Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, {MOBICOM} 2006, Los Angeles, CA, USA, September 23-29, 2006}, pages = {182--193}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161089.1161111}, doi = {10.1145/1161089.1161111}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/TraynorEMP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/TraynorKSCP06, author = {Patrick Traynor and Raju Kumar and Hussain Bin Saad and Guohong Cao and Thomas La Porta}, editor = {Per Gunningberg and Lars{-}{\AA}ke Larzon and Mahadev Satyanarayanan and Nigel Davies}, title = {{LIGER:} implementing efficient hybrid security mechanisms for heterogeneous sensor networks}, booktitle = {Proceedings of the 4th International Conference on Mobile Systems, Applications, and Services (MobiSys 2006), Uppsala, Sweden, June 19-22, 2006}, pages = {15--27}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134680.1134683}, doi = {10.1145/1134680.1134683}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/TraynorKSCP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/TraynorCWHM06, author = {Patrick Traynor and Michael Chien and Scott Weaver and Boniface Hicks and Patrick D. McDaniel}, title = {Non-Invasive Methods for Host Certification}, booktitle = {Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006}, pages = {1--10}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/SECCOMW.2006.359539}, doi = {10.1109/SECCOMW.2006.359539}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/TraynorCWHM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/TraynorSMPP06, author = {Patrick Traynor and Jaesheung Shin and Bharat B. Madan and Shashi Phoha and Thomas La Porta}, title = {Efficient Group Mobility for Heterogeneous Sensor Networks}, booktitle = {Proceedings of the 64th {IEEE} Vehicular Technology Conference, {VTC} Fall 2006, 25-28 September 2006, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, pages = {1--5}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/VTCF.2006.545}, doi = {10.1109/VTCF.2006.545}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vtc/TraynorSMPP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/TraynorCP06, author = {Patrick Traynor and Guohong Cao and Thomas La Porta}, title = {The effects of probabilistic key management on secure routing in sensor networks}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2006, 3-6 April 2006, Las Vegas, Nevada, {USA}}, pages = {659--664}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/WCNC.2006.1683547}, doi = {10.1109/WCNC.2006.1683547}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/TraynorCP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EnckTMP05, author = {William Enck and Patrick Traynor and Patrick D. McDaniel and Thomas F. La Porta}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Exploiting open functionality in SMS-capable cellular networks}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {393--404}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102171}, doi = {10.1145/1102120.1102171}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/EnckTMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.