default search action
Stephen E. McLaughlin
Person information
- affiliation: Penn State, University Park, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c23]Darius Suciu, Stephen E. McLaughlin, Laurent Simon, Radu Sion:
Horizontal Privilege Escalation in Trusted Applications. USENIX Security Symposium 2020
2010 – 2019
- 2014
- [j6]Saman A. Zonouz, Julian L. Rrushi, Stephen E. McLaughlin:
Detecting Industrial Control Malware Using Automated PLC Code Analytics. IEEE Secur. Priv. 12(6): 40-47 (2014) - [c22]Stephen E. McLaughlin, Saman A. Zonouz, Devin J. Pohly, Patrick D. McDaniel:
A Trusted Safety Verifier for Process Controller Code. NDSS 2014 - [c21]Stephen E. McLaughlin, Saman A. Zonouz:
Controller-aware false data injection against programmable logic controllers. SmartGridComm 2014: 848-853 - [c20]Luis Garcia, Henry Senyondo, Stephen E. McLaughlin, Saman A. Zonouz:
Covert channel communication through physical interdependencies in cyber-physical infrastructures. SmartGridComm 2014: 952-957 - 2013
- [j5]Stephen E. McLaughlin:
Securing Control Systems from the Inside: A Case for Mediating Physical Behaviors. IEEE Secur. Priv. 11(4): 82-84 (2013) - [j4]Stephen E. McLaughlin, Brett Holbert, Ahmed M. Fawaz, Robin Berthier, Saman A. Zonouz:
A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures. IEEE J. Sel. Areas Commun. 31(7): 1319-1330 (2013) - [c19]Stephen E. McLaughlin:
CPS: stateful policy enforcement for control system device usage. ACSAC 2013: 109-118 - 2012
- [j3]Machigar Ongtang, Stephen E. McLaughlin, William Enck, Patrick D. McDaniel:
Semantically rich application-centric security in Android. Secur. Commun. Networks 5(6): 658-673 (2012) - [c18]Devin J. Pohly, Stephen E. McLaughlin, Patrick D. McDaniel, Kevin R. B. Butler:
Hi-Fi: collecting high-fidelity whole-system provenance. ACSAC 2012: 259-268 - [c17]Weining Yang, Ninghui Li, Yuan Qi, Wahbeh H. Qardaji, Stephen E. McLaughlin, Patrick D. McDaniel:
Minimizing private data disclosures in the smart grid. CCS 2012: 415-427 - [c16]Stephen E. McLaughlin, Patrick D. McDaniel:
SABOT: specification-based payload generation for programmable logic controllers. CCS 2012: 439-449 - [c15]Stephen E. McLaughlin, Brett Holbert, Saman A. Zonouz, Robin Berthier:
AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures. SmartGridComm 2012: 354-359 - 2011
- [c14]Stephen E. McLaughlin, Patrick D. McDaniel, William Aiello:
Protecting consumer privacy from electric load monitoring. CCS 2011: 87-98 - [c13]Stephen E. McLaughlin:
On Dynamic Malware Payloads Aimed at Programmable Logic Controllers. HotSec 2011 - 2010
- [j2]Kevin R. B. Butler, Stephen E. McLaughlin, Thomas Moyer, Patrick D. McDaniel:
New Security Architectures Based on Emerging Disk Functionality. IEEE Secur. Priv. 8(5): 34-41 (2010) - [c12]Stephen E. McLaughlin, Dmitry Podkuiko, Sergei Miadzvezhanka, Adam Delozier, Patrick D. McDaniel:
Multi-vendor penetration testing in the advanced metering infrastructure. ACSAC 2010: 107-116 - [c11]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel:
Kells: a protection framework for portable data. ACSAC 2010: 231-240 - [c10]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel:
Protecting portable storage with host validation. CCS 2010: 651-653 - [c9]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel:
Disk-enabled authenticated encryption. MSST 2010: 1-6 - [c8]Patrick D. McDaniel, Kevin R. B. Butler, Stephen E. McLaughlin, Radu Sion, Erez Zadok, Marianne Winslett:
Towards a Secure and Efficient System for End-to-End Provenance. TaPP 2010 - [c7]Stephen E. McLaughlin, Dmitry Podkuiko, Adam Delozier, Sergei Miadzvezhanka, Patrick D. McDaniel:
Embedded Firmware Diversity for Smart Electric Meters. HotSec 2010
2000 – 2009
- 2009
- [j1]Patrick D. McDaniel, Stephen E. McLaughlin:
Security and Privacy Challenges in the Smart Grid. IEEE Secur. Priv. 7(3): 75-77 (2009) - [c6]Machigar Ongtang, Stephen E. McLaughlin, William Enck, Patrick D. McDaniel:
Semantically Rich Application-Centric Security in Android. ACSAC 2009: 340-349 - [c5]Stephen E. McLaughlin, Dmitry Podkuiko, Patrick D. McDaniel:
Energy Theft in the Advanced Metering Infrastructure. CRITIS 2009: 176-187 - 2008
- [c4]Albert Tannous, Jonathan T. Trostle, Mohamed Hassan, Stephen E. McLaughlin, Trent Jaeger:
New Side Channels Targeted at Passwords. ACSAC 2008: 45-54 - [c3]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel:
Rootkit-resistant disks. CCS 2008: 403-416 - [c2]Kevin R. B. Butler, William Enck, Harri Hursti, Stephen E. McLaughlin, Patrick Traynor, Patrick D. McDaniel:
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST. EVT 2008 - 2007
- [c1]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel:
Non-volatile memory and disks: avenues for policy architectures. CSAW 2007: 77-84
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint