BibTeX records: Patrick D. McDaniel

download as .bib file

@article{DBLP:journals/popets/BeuginM24,
  author       = {Yohan Beugin and
                  Patrick D. McDaniel},
  title        = {Interest-disclosing Mechanisms for Advertising are Privacy-Exposing
                  (not Preserving)},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {1},
  pages        = {41--57},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0004},
  doi          = {10.56553/POPETS-2024-0004},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/BeuginM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-09644,
  author       = {Ryan Guide and
                  Eric Pauley and
                  Yohan Beugin and
                  Ryan Sheatsley and
                  Patrick D. McDaniel},
  title        = {Characterizing the Modification Space of Signature {IDS} Rules},
  journal      = {CoRR},
  volume       = {abs/2402.09644},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.09644},
  doi          = {10.48550/ARXIV.2402.09644},
  eprinttype    = {arXiv},
  eprint       = {2402.09644},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-09644.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-18649,
  author       = {Fangzhou Wu and
                  Ning Zhang and
                  Somesh Jha and
                  Patrick D. McDaniel and
                  Chaowei Xiao},
  title        = {A New Era in {LLM} Security: Exploring Security Concerns in Real-World
                  LLM-based Systems},
  journal      = {CoRR},
  volume       = {abs/2402.18649},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.18649},
  doi          = {10.48550/ARXIV.2402.18649},
  eprinttype    = {arXiv},
  eprint       = {2402.18649},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-18649.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/XieTHMB23,
  author       = {Tian Xie and
                  Sanchal Thakkar and
                  Ting He and
                  Patrick D. McDaniel and
                  Quinn Burke},
  title        = {Joint Caching and Routing in Cache Networks With Arbitrary Topology},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {34},
  number       = {8},
  pages        = {2237--2250},
  year         = {2023},
  url          = {https://doi.org/10.1109/TPDS.2023.3276724},
  doi          = {10.1109/TPDS.2023.3276724},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/XieTHMB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/XiaoSQVMY23,
  author       = {Ya Xiao and
                  Wenjia Song and
                  Jingyuan Qi and
                  Bimal Viswanath and
                  Patrick D. McDaniel and
                  Danfeng Yao},
  title        = {Specializing Neural Networks for Cryptographic Code Completion Applications},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {49},
  number       = {6},
  pages        = {3524--3535},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSE.2023.3265362},
  doi          = {10.1109/TSE.2023.3265362},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/XiaoSQVMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/XieTHBM23,
  author       = {Tian Xie and
                  Sanchal Thakkar and
                  Ting He and
                  Novella Bartolini and
                  Patrick D. McDaniel},
  title        = {Host-Based Flow Table Size Inference in Multi-Hop {SDN}},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur,
                  Malaysia, December 4-8, 2023},
  pages        = {25--30},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GLOBECOM54140.2023.10436907},
  doi          = {10.1109/GLOBECOM54140.2023.10436907},
  timestamp    = {Sun, 10 Mar 2024 10:39:12 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/XieTHBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/PauleyBM23,
  author       = {Eric Pauley and
                  Paul Barford and
                  Patrick D. McDaniel},
  editor       = {Marie{-}Jos{\'{e}} Montpetit and
                  Aris Leivadeas and
                  Steve Uhlig and
                  Mobin Javed},
  title        = {The {CVE} Wayback Machine: Measuring Coordinated Disclosure from Exploits
                  against Two Years of Zero-Days},
  booktitle    = {Proceedings of the 2023 {ACM} on Internet Measurement Conference,
                  {IMC} 2023, Montreal, QC, Canada, October 24-26, 2023},
  pages        = {236--252},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3618257.3624810},
  doi          = {10.1145/3618257.3624810},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/PauleyBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/LiDFM23,
  author       = {Kunyang Li and
                  Kyle Domico and
                  Jean{-}Charles Noirot Ferrand and
                  Patrick D. McDaniel},
  title        = {The Efficacy of Transformer-based Adversarial Attacks in Security
                  Domains},
  booktitle    = {{IEEE} Military Communications Conference, {MILCOM} 2023, Boston,
                  MA, USA, October 30 - Nov. 3, 2023},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MILCOM58377.2023.10356372},
  doi          = {10.1109/MILCOM58377.2023.10356372},
  timestamp    = {Thu, 25 Jan 2024 09:55:40 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/LiDFM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/GuidePBSM23,
  author       = {Ryan Guide and
                  Eric Pauley and
                  Yohan Beugin and
                  Ryan Sheatsley and
                  Patrick D. McDaniel},
  title        = {Characterizing the Modification Space of Signature {IDS} Rules},
  booktitle    = {{IEEE} Military Communications Conference, {MILCOM} 2023, Boston,
                  MA, USA, October 30 - Nov. 3, 2023},
  pages        = {536--541},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MILCOM58377.2023.10356225},
  doi          = {10.1109/MILCOM58377.2023.10356225},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/GuidePBSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/YuBPM23,
  author       = {Mingli Yu and
                  Quinn K. Burke and
                  Thomas La Porta and
                  Patrick D. McDaniel},
  title        = {mMLSnet: Multilevel Security Network with Mobility},
  booktitle    = {{IEEE} Military Communications Conference, {MILCOM} 2023, Boston,
                  MA, USA, October 30 - Nov. 3, 2023},
  pages        = {821--826},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MILCOM58377.2023.10356279},
  doi          = {10.1109/MILCOM58377.2023.10356279},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/YuBPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SheatsleyHPM23,
  author       = {Ryan Sheatsley and
                  Blaine Hoak and
                  Eric Pauley and
                  Patrick D. McDaniel},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {The Space of Adversarial Strategies},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3745--3761},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/sheatsley},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SheatsleyHPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PauleyBM23,
  author       = {Eric Pauley and
                  Paul Barford and
                  Patrick D. McDaniel},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {DScope: {A} Cloud-Native Internet Telescope},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5989--6006},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/pauley},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/PauleyBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-18639,
  author       = {Quinn Burke and
                  Yohan Beugin and
                  Blaine Hoak and
                  Rachel King and
                  Eric Pauley and
                  Ryan Sheatsley and
                  Mingli Yu and
                  Ting He and
                  Thomas La Porta and
                  Patrick D. McDaniel},
  title        = {Securing Cloud File Systems using Shielded Execution},
  journal      = {CoRR},
  volume       = {abs/2305.18639},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.18639},
  doi          = {10.48550/ARXIV.2305.18639},
  eprinttype    = {arXiv},
  eprint       = {2305.18639},
  timestamp    = {Wed, 07 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-18639.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-03825,
  author       = {Yohan Beugin and
                  Patrick D. McDaniel},
  title        = {Interest-disclosing Mechanisms for Advertising are Privacy-Exposing
                  (not Preserving)},
  journal      = {CoRR},
  volume       = {abs/2306.03825},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.03825},
  doi          = {10.48550/ARXIV.2306.03825},
  eprinttype    = {arXiv},
  eprint       = {2306.03825},
  timestamp    = {Tue, 13 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-03825.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-11993,
  author       = {Syed Rafiul Hussain and
                  Patrick D. McDaniel and
                  Anshul Gandhi and
                  Kanad Ghose and
                  Kartik Gopalan and
                  Dongyoon Lee and
                  Yu David Liu and
                  Zhenhua Liu and
                  Shuai Mu and
                  Erez Zadok},
  title        = {Verifiable Sustainability in Data Centers},
  journal      = {CoRR},
  volume       = {abs/2307.11993},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.11993},
  doi          = {10.48550/ARXIV.2307.11993},
  eprinttype    = {arXiv},
  eprint       = {2307.11993},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-11993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-06263,
  author       = {Alban H{\'{e}}on and
                  Ryan Sheatsley and
                  Quinn Burke and
                  Blaine Hoak and
                  Eric Pauley and
                  Yohan Beugin and
                  Patrick D. McDaniel},
  title        = {Systematic Evaluation of Geolocation Privacy Mechanisms},
  journal      = {CoRR},
  volume       = {abs/2309.06263},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.06263},
  doi          = {10.48550/ARXIV.2309.06263},
  eprinttype    = {arXiv},
  eprint       = {2309.06263},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-06263.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-11597,
  author       = {Kunyang Li and
                  Kyle Domico and
                  Jean{-}Charles Noirot Ferrand and
                  Patrick D. McDaniel},
  title        = {The Efficacy of Transformer-based Adversarial Attacks in Security
                  Domains},
  journal      = {CoRR},
  volume       = {abs/2310.11597},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.11597},
  doi          = {10.48550/ARXIV.2310.11597},
  eprinttype    = {arXiv},
  eprint       = {2310.11597},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-11597.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SheatsleyPWVM22,
  author       = {Ryan Sheatsley and
                  Nicolas Papernot and
                  Michael J. Weisman and
                  Gunjan Verma and
                  Patrick D. McDaniel},
  title        = {Adversarial examples for network intrusion detection systems},
  journal      = {J. Comput. Secur.},
  volume       = {30},
  number       = {5},
  pages        = {727--752},
  year         = {2022},
  url          = {https://doi.org/10.3233/JCS-210094},
  doi          = {10.3233/JCS-210094},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SheatsleyPWVM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BeuginBHSPTHM22,
  author       = {Yohan Beugin and
                  Quinn Burke and
                  Blaine Hoak and
                  Ryan Sheatsley and
                  Eric Pauley and
                  Gang Tan and
                  Syed Rafiul Hussain and
                  Patrick D. McDaniel},
  title        = {Building a Privacy-Preserving Smart Camera System},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {2},
  pages        = {25--46},
  year         = {2022},
  url          = {https://doi.org/10.2478/popets-2022-0034},
  doi          = {10.2478/POPETS-2022-0034},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/BeuginBHSPTHM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tiot/NorrisCRZMST22,
  author       = {Michael Norris and
                  Z. Berkay Celik and
                  Prasanna Venkatesh Rengasamy and
                  Shulin Zhao and
                  Patrick Drew McDaniel and
                  Anand Sivasubramaniam and
                  Gang Tan},
  title        = {IoTRepair: Flexible Fault Handling in Diverse IoT Deployments},
  journal      = {{ACM} Trans. Internet Things},
  volume       = {3},
  number       = {3},
  pages        = {22:1--22:33},
  year         = {2022},
  url          = {https://doi.org/10.1145/3532194},
  doi          = {10.1145/3532194},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tiot/NorrisCRZMST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tiot/SikderBCAMKU22,
  author       = {Amit Kumar Sikder and
                  Leonardo Babun and
                  Z. Berkay Celik and
                  Hidayet Aksu and
                  Patrick D. McDaniel and
                  Engin Kirda and
                  A. Selcuk Uluagac},
  title        = {Who's Controlling My Device? Multi-User Multi-Device-Aware Access
                  Control System for Shared Smart Home Environment},
  journal      = {{ACM} Trans. Internet Things},
  volume       = {3},
  number       = {4},
  pages        = {27:1--27:39},
  year         = {2022},
  url          = {https://doi.org/10.1145/3543513},
  doi          = {10.1145/3543513},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tiot/SikderBCAMKU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/BurkeMGOJPM22,
  author       = {Quinn Burke and
                  Fidan Mehmeti and
                  Rahul George and
                  Kyle Ostrowski and
                  Trent Jaeger and
                  Thomas F. La Porta and
                  Patrick D. McDaniel},
  title        = {Enforcing Multilevel Security Policies in Unstable Networks},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {19},
  number       = {3},
  pages        = {2349--2365},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSM.2022.3176820},
  doi          = {10.1109/TNSM.2022.3176820},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/BurkeMGOJPM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/XieNHM22,
  author       = {Tian Xie and
                  Namitha Nambiar and
                  Ting He and
                  Patrick D. McDaniel},
  title        = {Attack Resilience of Cache Replacement Policies: {A} Study Based on
                  {TTL} Approximation},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {30},
  number       = {6},
  pages        = {2433--2447},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNET.2022.3171720},
  doi          = {10.1109/TNET.2022.3171720},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/XieNHM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McDaniel22,
  author       = {Patrick Drew McDaniel},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Sustainability is a Security Problem},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {9--10},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559396},
  doi          = {10.1145/3548606.3559396},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/McDaniel22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PauleyTZM22,
  author       = {Eric Pauley and
                  Gang Tan and
                  Danfeng Zhang and
                  Patrick D. McDaniel},
  title        = {Performant Binary Fuzzing without Source Code using Static Instrumentation},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {226--235},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947273},
  doi          = {10.1109/CNS56114.2022.9947273},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/PauleyTZM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/XieTHMB22,
  author       = {Tian Xie and
                  Sanchal Thakkar and
                  Ting He and
                  Patrick D. McDaniel and
                  Quinn Burke},
  title        = {Joint Caching and Routing in Cache Networks with Arbitrary Topology},
  booktitle    = {42nd {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2022, Bologna, Italy, July 10-13, 2022},
  pages        = {56--66},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICDCS54860.2022.00015},
  doi          = {10.1109/ICDCS54860.2022.00015},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/XieTHMB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PauleySHBBM22,
  author       = {Eric Pauley and
                  Ryan Sheatsley and
                  Blaine Hoak and
                  Quinn Burke and
                  Yohan Beugin and
                  Patrick D. McDaniel},
  title        = {Measuring and Mitigating the Risk of {IP} Reuse on Public Clouds},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {558--575},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833784},
  doi          = {10.1109/SP46214.2022.9833784},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/PauleySHBBM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-09338,
  author       = {Yohan Beugin and
                  Quinn Burke and
                  Blaine Hoak and
                  Ryan Sheatsley and
                  Eric Pauley and
                  Gang Tan and
                  Syed Rafiul Hussain and
                  Patrick D. McDaniel},
  title        = {Building a Privacy-Preserving Smart Camera System},
  journal      = {CoRR},
  volume       = {abs/2201.09338},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.09338},
  eprinttype    = {arXiv},
  eprint       = {2201.09338},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-09338.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-10309,
  author       = {Ahmed Abdou and
                  Ryan Sheatsley and
                  Yohan Beugin and
                  Tyler J. Shipp and
                  Patrick D. McDaniel},
  title        = {HoneyModels: Machine Learning Honeypots},
  journal      = {CoRR},
  volume       = {abs/2202.10309},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.10309},
  eprinttype    = {arXiv},
  eprint       = {2202.10309},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-10309.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-10387,
  author       = {Ryan Sheatsley and
                  Matthew Durbin and
                  Azaree Lintereur and
                  Patrick D. McDaniel},
  title        = {Improving Radioactive Material Localization by Leveraging Cyber-Security
                  Model Optimizations},
  journal      = {CoRR},
  volume       = {abs/2202.10387},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.10387},
  eprinttype    = {arXiv},
  eprint       = {2202.10387},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-10387.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-06694,
  author       = {Bolor{-}Erdene Zolbayar and
                  Ryan Sheatsley and
                  Patrick D. McDaniel and
                  Michael J. Weisman and
                  Sencun Zhu and
                  Shitong Zhu and
                  Srikanth V. Krishnamurthy},
  title        = {Generating Practical Adversarial Network Traffic Flows Using {NIDSGAN}},
  journal      = {CoRR},
  volume       = {abs/2203.06694},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.06694},
  doi          = {10.48550/ARXIV.2203.06694},
  eprinttype    = {arXiv},
  eprint       = {2203.06694},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-06694.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-05122,
  author       = {Eric Pauley and
                  Ryan Sheatsley and
                  Blaine Hoak and
                  Quinn Burke and
                  Yohan Beugin and
                  Patrick D. McDaniel},
  title        = {Measuring and Mitigating the Risk of {IP} Reuse on Public Clouds},
  journal      = {CoRR},
  volume       = {abs/2204.05122},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.05122},
  doi          = {10.48550/ARXIV.2204.05122},
  eprinttype    = {arXiv},
  eprint       = {2204.05122},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-05122.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-05780,
  author       = {Kyle Domico and
                  Ryan Sheatsley and
                  Yohan Beugin and
                  Quinn Burke and
                  Patrick D. McDaniel},
  title        = {A Machine Learning and Computer Vision Approach to Geomagnetic Storm
                  Forecasting},
  journal      = {CoRR},
  volume       = {abs/2204.05780},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.05780},
  doi          = {10.48550/ARXIV.2204.05780},
  eprinttype    = {arXiv},
  eprint       = {2204.05780},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-05780.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-00566,
  author       = {Valentin Vie and
                  Ryan Sheatsley and
                  Sophia Beyda and
                  Sushrut Shringarputale and
                  Kevin S. Chan and
                  Trent Jaeger and
                  Patrick D. McDaniel},
  title        = {Adversarial Plannning},
  journal      = {CoRR},
  volume       = {abs/2205.00566},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.00566},
  doi          = {10.48550/ARXIV.2205.00566},
  eprinttype    = {arXiv},
  eprint       = {2205.00566},
  timestamp    = {Tue, 03 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-00566.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-09776,
  author       = {Yohan Beugin and
                  Quinn Burke and
                  Blaine Hoak and
                  Ryan Sheatsley and
                  Eric Pauley and
                  Gang Tan and
                  Syed Rafiul Hussain and
                  Patrick D. McDaniel},
  title        = {Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices},
  journal      = {CoRR},
  volume       = {abs/2208.09776},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.09776},
  doi          = {10.48550/ARXIV.2208.09776},
  eprinttype    = {arXiv},
  eprint       = {2208.09776},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-09776.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-04521,
  author       = {Ryan Sheatsley and
                  Blaine Hoak and
                  Eric Pauley and
                  Patrick D. McDaniel},
  title        = {The Space of Adversarial Strategies},
  journal      = {CoRR},
  volume       = {abs/2209.04521},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.04521},
  doi          = {10.48550/ARXIV.2209.04521},
  eprinttype    = {arXiv},
  eprint       = {2209.04521},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-04521.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-14999,
  author       = {Eric Pauley and
                  Kyle Domico and
                  Blaine Hoak and
                  Ryan Sheatsley and
                  Quinn Burke and
                  Yohan Beugin and
                  Patrick D. McDaniel},
  title        = {{EIPSIM:} Modeling Secure {IP} Address Allocation at Cloud Scale},
  journal      = {CoRR},
  volume       = {abs/2210.14999},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.14999},
  doi          = {10.48550/ARXIV.2210.14999},
  eprinttype    = {arXiv},
  eprint       = {2210.14999},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-14999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BabunDCMU21,
  author       = {Leonardo Babun and
                  Kyle Denney and
                  Z. Berkay Celik and
                  Patrick D. McDaniel and
                  A. Selcuk Uluagac},
  title        = {A survey on IoT platforms: Communication, security, and privacy perspectives},
  journal      = {Comput. Networks},
  volume       = {192},
  pages        = {108040},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108040},
  doi          = {10.1016/J.COMNET.2021.108040},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/BabunDCMU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BabunCMU21,
  author       = {Leonardo Babun and
                  Z. Berkay Celik and
                  Patrick D. McDaniel and
                  A. Selcuk Uluagac},
  title        = {Real-time Analysis of Privacy-(un)aware IoT Applications},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {1},
  pages        = {145--166},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0009},
  doi          = {10.2478/POPETS-2021-0009},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/BabunCMU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/AchleitnerBMJPK21,
  author       = {Stefan Achleitner and
                  Quinn Burke and
                  Patrick D. McDaniel and
                  Trent Jaeger and
                  Thomas La Porta and
                  Srikanth V. Krishnamurthy},
  title        = {MLSNet: {A} Policy Complying Multilevel Security Framework for Software
                  Defined Networking},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {18},
  number       = {1},
  pages        = {729--744},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSM.2020.3045998},
  doi          = {10.1109/TNSM.2020.3045998},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/AchleitnerBMJPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/YuXHMB21,
  author       = {Mingli Yu and
                  Tian Xie and
                  Ting He and
                  Patrick D. McDaniel and
                  Quinn K. Burke},
  title        = {Flow Table Security in {SDN:} Adversarial Reconnaissance and Intelligent
                  Attacks},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {29},
  number       = {6},
  pages        = {2793--2806},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNET.2021.3099717},
  doi          = {10.1109/TNET.2021.3099717},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/YuXHMB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SheatsleyHPBWM21,
  author       = {Ryan Sheatsley and
                  Blaine Hoak and
                  Eric Pauley and
                  Yohan Beugin and
                  Michael J. Weisman and
                  Patrick D. McDaniel},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {On the Robustness of Domain Constraints},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {495--515},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484570},
  doi          = {10.1145/3460120.3484570},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SheatsleyHPBWM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/XieHMN21,
  author       = {Tian Xie and
                  Ting He and
                  Patrick D. McDaniel and
                  Namitha Nambiar},
  title        = {Attack Resilience of Cache Replacement Policies},
  booktitle    = {40th {IEEE} Conference on Computer Communications, {INFOCOM} 2021,
                  Vancouver, BC, Canada, May 10-13, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/INFOCOM42981.2021.9488697},
  doi          = {10.1109/INFOCOM42981.2021.9488697},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/XieHMN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotdi/CossonSBCMU21,
  author       = {Adrien Cosson and
                  Amit Kumar Sikder and
                  Leonardo Babun and
                  Z. Berkay Celik and
                  Patrick D. McDaniel and
                  A. Selcuk Uluagac},
  title        = {Sentinel: {A} Robust Intrusion Detection System for IoT Networks Using
                  Kernel-Level System Information},
  booktitle    = {IoTDI '21: International Conference on Internet-of-Things Design and
                  Implementation, Virtual Event / Charlottesville, VA, USA, May 18-21,
                  2021},
  pages        = {53--66},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3450268.3453533},
  doi          = {10.1145/3450268.3453533},
  timestamp    = {Thu, 20 May 2021 08:39:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iotdi/CossonSBCMU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/AbdouSBSM21,
  author       = {Ahmed Abdou and
                  Ryan Sheatsley and
                  Yohan Beugin and
                  Tyler J. Shipp and
                  Patrick D. McDaniel},
  title        = {HoneyModels: Machine Learning Honeypots},
  booktitle    = {2021 {IEEE} Military Communications Conference, {MILCOM} 2021, San
                  Diego, CA, USA, November 29 - Dec. 2, 2021},
  pages        = {886--891},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/MILCOM52596.2021.9652947},
  doi          = {10.1109/MILCOM52596.2021.9652947},
  timestamp    = {Wed, 12 Jan 2022 09:10:31 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/AbdouSBSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-08619,
  author       = {Ryan Sheatsley and
                  Blaine Hoak and
                  Eric Pauley and
                  Yohan Beugin and
                  Michael J. Weisman and
                  Patrick D. McDaniel},
  title        = {On the Robustness of Domain Constraints},
  journal      = {CoRR},
  volume       = {abs/2105.08619},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.08619},
  eprinttype    = {arXiv},
  eprint       = {2105.08619},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-08619.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccsw-ws/ShringarputaleM20,
  author       = {Sushrut Shringarputale and
                  Patrick D. McDaniel and
                  Kevin R. B. Butler and
                  Thomas La Porta},
  editor       = {Yinqian Zhang and
                  Radu Sion},
  title        = {Co-residency Attacks on Containers are Real},
  booktitle    = {CCSW'20, Proceedings of the 2020 {ACM} {SIGSAC} Conference on Cloud
                  Computing Security Workshop, Virtual Event, USA, November 9, 2020},
  pages        = {53--66},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411495.3421357},
  doi          = {10.1145/3411495.3421357},
  timestamp    = {Thu, 12 Oct 2023 12:32:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ccsw-ws/ShringarputaleM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/YuHMB20,
  author       = {Mingli Yu and
                  Ting He and
                  Patrick Drew McDaniel and
                  Quinn K. Burke},
  title        = {Flow Table Security in {SDN:} Adversarial Reconnaissance and Intelligent
                  Attacks},
  booktitle    = {39th {IEEE} Conference on Computer Communications, {INFOCOM} 2020,
                  Toronto, ON, Canada, July 6-9, 2020},
  pages        = {1519--1528},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/INFOCOM41043.2020.9155538},
  doi          = {10.1109/INFOCOM41043.2020.9155538},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/YuHMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotdi/NorrisCVZMST20,
  author       = {Michael Norris and
                  Z. Berkay Celik and
                  Prasanna Venkatesh Rengasamy and
                  Shulin Zhao and
                  Patrick D. McDaniel and
                  Anand Sivasubramaniam and
                  Gang Tan},
  title        = {IoTRepair: Systematically Addressing Device Faults in Commodity IoT},
  booktitle    = {Fifth {IEEE/ACM} International Conference on Internet-of-Things Design
                  and Implementation, IoTDI 2020, Sydney, Australia, April 21-24, 2020},
  pages        = {142--148},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IoTDI49375.2020.00021},
  doi          = {10.1109/IOTDI49375.2020.00021},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iotdi/NorrisCVZMST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/BurkeMPYH20,
  author       = {Quinn Burke and
                  Patrick D. McDaniel and
                  Thomas F. La Porta and
                  Mingli Yu and
                  Ting He},
  editor       = {Noseong Park and
                  Kun Sun and
                  Sara Foresti and
                  Kevin R. B. Butler and
                  Nitesh Saxena},
  title        = {Misreporting Attacks in Software-Defined Networking},
  booktitle    = {Security and Privacy in Communication Networks - 16th {EAI} International
                  Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020,
                  Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {335},
  pages        = {276--296},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63086-7\_16},
  doi          = {10.1007/978-3-030-63086-7\_16},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/BurkeMPYH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/EPSM20,
  author       = {Sayed M. Saghaian N. E. and
                  Tom La Porta and
                  Simone Silvestri and
                  Patrick D. McDaniel},
  editor       = {Noseong Park and
                  Kun Sun and
                  Sara Foresti and
                  Kevin R. B. Butler and
                  Nitesh Saxena},
  title        = {Improving Robustness of a Popular Probabilistic Clustering Algorithm
                  Against Insider Attacks},
  booktitle    = {Security and Privacy in Communication Networks - 16th {EAI} International
                  Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020,
                  Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {335},
  pages        = {381--401},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63086-7\_21},
  doi          = {10.1007/978-3-030-63086-7\_21},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/EPSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SikderBCAAMKU20,
  author       = {Amit Kumar Sikder and
                  Leonardo Babun and
                  Z. Berkay Celik and
                  Abbas Acar and
                  Hidayet Aksu and
                  Patrick D. McDaniel and
                  Engin Kirda and
                  A. Selcuk Uluagac},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Kratos: multi-user multi-device-aware access control system for the
                  smart home},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399358},
  doi          = {10.1145/3395351.3399358},
  timestamp    = {Tue, 29 Dec 2020 18:27:47 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SikderBCAAMKU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-07641,
  author       = {Michael Norris and
                  Z. Berkay Celik and
                  Patrick D. McDaniel and
                  Gang Tan and
                  Prasanna Venkatesh Rengasamy and
                  Shulin Zhao and
                  Anand Sivasubramaniam},
  title        = {IoTRepair: Systematically Addressing Device Faults in Commodity IoT
                  (Extended Paper)},
  journal      = {CoRR},
  volume       = {abs/2002.07641},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.07641},
  eprinttype    = {arXiv},
  eprint       = {2002.07641},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-07641.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-10021,
  author       = {Stefan Achleitner and
                  Quinn Burke and
                  Patrick D. McDaniel and
                  Trent Jaeger and
                  Thomas La Porta and
                  Srikanth V. Krishnamurthy},
  title        = {MLSNet: {A} Policy Complying Multilevel Security Framework for Software
                  Defined Networking},
  journal      = {CoRR},
  volume       = {abs/2009.10021},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.10021},
  eprinttype    = {arXiv},
  eprint       = {2009.10021},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-10021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-01183,
  author       = {Ryan Sheatsley and
                  Nicolas Papernot and
                  Michael J. Weisman and
                  Gunjan Verma and
                  Patrick D. McDaniel},
  title        = {Adversarial Examples in Constrained Domains},
  journal      = {CoRR},
  volume       = {abs/2011.01183},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.01183},
  eprinttype    = {arXiv},
  eprint       = {2011.01183},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-01183.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/CelikFPTM19,
  author       = {Z. Berkay Celik and
                  Earlence Fernandes and
                  Eric Pauley and
                  Gang Tan and
                  Patrick D. McDaniel},
  title        = {Program Analysis of Commodity IoT Applications for Security and Privacy:
                  Challenges and Opportunities},
  journal      = {{ACM} Comput. Surv.},
  volume       = {52},
  number       = {4},
  pages        = {74:1--74:30},
  year         = {2019},
  url          = {https://doi.org/10.1145/3333501},
  doi          = {10.1145/3333501},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/CelikFPTM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CelikMTBU19,
  author       = {Z. Berkay Celik and
                  Patrick D. McDaniel and
                  Gang Tan and
                  Leonardo Babun and
                  A. Selcuk Uluagac},
  title        = {Verifying Internet of Things Safety and Security in Physical Spaces},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {5},
  pages        = {30--37},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2911511},
  doi          = {10.1109/MSEC.2019.2911511},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CelikMTBU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BonehGMP19,
  author       = {Dan Boneh and
                  Andrew J. Grotto and
                  Patrick D. McDaniel and
                  Nicolas Papernot},
  title        = {How Relevant Is the Turing Test in the Age of Sophisbots?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {64--71},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2934193},
  doi          = {10.1109/MSEC.2019.2934193},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BonehGMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/AtyaQKPMM19,
  author       = {Ahmed Osama Fathy Atya and
                  Zhiyun Qian and
                  Srikanth V. Krishnamurthy and
                  Thomas La Porta and
                  Patrick D. McDaniel and
                  Lisa M. Marvel},
  title        = {Catch Me if You Can: {A} Closer Look at Malicious Co-Residency on
                  the Cloud},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {27},
  number       = {2},
  pages        = {560--576},
  year         = {2019},
  url          = {https://doi.org/10.1109/TNET.2019.2891528},
  doi          = {10.1109/TNET.2019.2891528},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/AtyaQKPMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/CelikAASMU19,
  author       = {Z. Berkay Celik and
                  Abbas Acar and
                  Hidayet Aksu and
                  Ryan Sheatsley and
                  Patrick D. McDaniel and
                  A. Selcuk Uluagac},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {Curie: Policy-based Secure Data Exchange},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {121--132},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3300042},
  doi          = {10.1145/3292006.3300042},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/CelikAASMU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CelikTM19,
  author       = {Z. Berkay Celik and
                  Gang Tan and
                  Patrick D. McDaniel},
  title        = {IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity
                  IoT},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/iotguard-dynamic-enforcement-of-security-and-safety-policy-in-commodity-iot/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/CelikTM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AlvarezLSM19,
  author       = {Raquel Alvarez and
                  Jake Levenson and
                  Ryan Sheatsley and
                  Patrick D. McDaniel},
  editor       = {Songqing Chen and
                  Kim{-}Kwang Raymond Choo and
                  Xinwen Fu and
                  Wenjing Lou and
                  Aziz Mohaisen},
  title        = {Application Transiency: Towards a Fair Trade of Personal Information
                  for Application Services},
  booktitle    = {Security and Privacy in Communication Networks - 15th {EAI} International
                  Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {305},
  pages        = {47--66},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37231-6\_3},
  doi          = {10.1007/978-3-030-37231-6\_3},
  timestamp    = {Sat, 07 Mar 2020 15:42:08 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/AlvarezLSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PetraccaSAMGJ19,
  author       = {Giuseppe Petracca and
                  Yuqiong Sun and
                  Ahmad Atamli{-}Reineh and
                  Patrick D. McDaniel and
                  Jens Grossklags and
                  Trent Jaeger},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation
                  Graphs},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {567--584},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/petracca},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PetraccaSAMGJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-00056,
  author       = {Dan Boneh and
                  Andrew J. Grotto and
                  Patrick D. McDaniel and
                  Nicolas Papernot},
  title        = {How Relevant is the Turing Test in the Age of Sophisbots?},
  journal      = {CoRR},
  volume       = {abs/1909.00056},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.00056},
  eprinttype    = {arXiv},
  eprint       = {1909.00056},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-00056.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-10186,
  author       = {Amit Kumar Sikder and
                  Leonardo Babun and
                  Z. Berkay Celik and
                  Abbas Acar and
                  Hidayet Aksu and
                  Patrick D. McDaniel and
                  Engin Kirda and
                  A. Selcuk Uluagac},
  title        = {Multi-User Multi-Device-Aware Access Control System for Smart Home},
  journal      = {CoRR},
  volume       = {abs/1911.10186},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.10186},
  eprinttype    = {arXiv},
  eprint       = {1911.10186},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-10186.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-10461,
  author       = {Leonardo Babun and
                  Z. Berkay Celik and
                  Patrick D. McDaniel and
                  A. Selcuk Uluagac},
  title        = {Real-time Analysis of Privacy-(un)aware IoT Applications},
  journal      = {CoRR},
  volume       = {abs/1911.10461},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.10461},
  eprinttype    = {arXiv},
  eprint       = {1911.10461},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-10461.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/GoodfellowMP18,
  author       = {Ian J. Goodfellow and
                  Patrick D. McDaniel and
                  Nicolas Papernot},
  title        = {Making machine learning robust against adversarial inputs},
  journal      = {Commun. {ACM}},
  volume       = {61},
  number       = {7},
  pages        = {56--66},
  year         = {2018},
  url          = {https://doi.org/10.1145/3134599},
  doi          = {10.1145/3134599},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/GoodfellowMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CelikMIPSAS18,
  author       = {Z. Berkay Celik and
                  Patrick D. McDaniel and
                  Rauf Izmailov and
                  Nicolas Papernot and
                  Ryan Sheatsley and
                  Raquel Alvarez and
                  Ananthram Swami},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Detection under Privileged Information},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {199--206},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196502},
  doi          = {10.1145/3196494.3196502},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CelikMIPSAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/NguyenSQKCM18,
  author       = {Dang Tu Nguyen and
                  Chengyu Song and
                  Zhiyun Qian and
                  Srikanth V. Krishnamurthy and
                  Edward J. M. Colbert and
                  Patrick D. McDaniel},
  editor       = {Xenofontas A. Dimitropoulos and
                  Alberto Dainotti and
                  Laurent Vanbever and
                  Theophilus Benson},
  title        = {IotSan: fortifying the safety of IoT systems},
  booktitle    = {Proceedings of the 14th International Conference on emerging Networking
                  EXperiments and Technologies, CoNEXT 2018, Heraklion, Greece, December
                  04-07, 2018},
  pages        = {191--203},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3281411.3281440},
  doi          = {10.1145/3281411.3281440},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/conext/NguyenSQKCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/PapernotMSW18,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Arunesh Sinha and
                  Michael P. Wellman},
  title        = {SoK: Security and Privacy in Machine Learning},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2018, London, United Kingdom, April 24-26, 2018},
  pages        = {399--414},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSP.2018.00035},
  doi          = {10.1109/EUROSP.2018.00035},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/PapernotMSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/TramerKPGBM18,
  author       = {Florian Tram{\`{e}}r and
                  Alexey Kurakin and
                  Nicolas Papernot and
                  Ian J. Goodfellow and
                  Dan Boneh and
                  Patrick D. McDaniel},
  title        = {Ensemble Adversarial Training: Attacks and Defenses},
  booktitle    = {6th International Conference on Learning Representations, {ICLR} 2018,
                  Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings},
  publisher    = {OpenReview.net},
  year         = {2018},
  url          = {https://openreview.net/forum?id=rkZvSe-RZ},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/TramerKPGBM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/IzmailovSCMS18,
  author       = {Rauf Izmailov and
                  Shridatt Sugrim and
                  Ritu Chadha and
                  Patrick D. McDaniel and
                  Ananthram Swami},
  title        = {Enablers of Adversarial Attacks in Machine Learning},
  booktitle    = {2018 {IEEE} Military Communications Conference, {MILCOM} 2018, Los
                  Angeles, CA, USA, October 29-31, 2018},
  pages        = {425--430},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MILCOM.2018.8599715},
  doi          = {10.1109/MILCOM.2018.8599715},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/IzmailovSCMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/EPJCM18,
  author       = {Sayed M. Saghaian N. E. and
                  Tom La Porta and
                  Trent Jaeger and
                  Z. Berkay Celik and
                  Patrick D. McDaniel},
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {Mission-Oriented Security Model, Incorporating Security Risk, Cost
                  and Payout},
  booktitle    = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {255},
  pages        = {192--212},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01704-0\_11},
  doi          = {10.1007/978-3-030-01704-0\_11},
  timestamp    = {Fri, 11 Jan 2019 16:16:24 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/EPJCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CelikM18,
  author       = {Z. Berkay Celik and
                  Patrick D. McDaniel},
  title        = {Extending Detection with Privileged Information via Generalized Distillation},
  booktitle    = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San
                  Francisco, CA, USA, May 24, 2018},
  pages        = {83--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SPW.2018.00021},
  doi          = {10.1109/SPW.2018.00021},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CelikM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/CelikMT18,
  author       = {Z. Berkay Celik and
                  Patrick D. McDaniel and
                  Gang Tan},
  editor       = {Haryadi S. Gunawi and
                  Benjamin C. Reed},
  title        = {Soteria: Automated IoT Safety and Security Analysis},
  booktitle    = {2018 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2018, Boston,
                  MA, USA, July 11-13, 2018},
  pages        = {147--158},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/atc18/presentation/celik},
  timestamp    = {Sat, 25 Feb 2023 23:39:37 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/CelikMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CelikBSATMU18,
  author       = {Z. Berkay Celik and
                  Leonardo Babun and
                  Amit Kumar Sikder and
                  Hidayet Aksu and
                  Gang Tan and
                  Patrick D. McDaniel and
                  A. Selcuk Uluagac},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Sensitive Information Tracking in Commodity IoT},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {1687--1704},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/celik},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CelikBSATMU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-04500,
  author       = {Chun{-}Ming Lai and
                  Xiaoyun Wang and
                  Yunfeng Hong and
                  Yu{-}Cheng Lin and
                  Shyhtsun Felix Wu and
                  Patrick D. McDaniel and
                  Hasan Cam},
  title        = {Attacking Strategies and Temporal Analysis Involving Facebook Discussion
                  Groups},
  journal      = {CoRR},
  volume       = {abs/1802.04500},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.04500},
  eprinttype    = {arXiv},
  eprint       = {1802.04500},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-04500.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-08307,
  author       = {Z. Berkay Celik and
                  Leonardo Babun and
                  Amit Kumar Sikder and
                  Hidayet Aksu and
                  Gang Tan and
                  Patrick D. McDaniel and
                  A. Selcuk Uluagac},
  title        = {Sensitive Information Tracking in Commodity IoT},
  journal      = {CoRR},
  volume       = {abs/1802.08307},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.08307},
  eprinttype    = {arXiv},
  eprint       = {1802.08307},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-08307.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-04765,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel},
  title        = {Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust
                  Deep Learning},
  journal      = {CoRR},
  volume       = {abs/1803.04765},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.04765},
  eprinttype    = {arXiv},
  eprint       = {1803.04765},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-04765.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-08876,
  author       = {Z. Berkay Celik and
                  Patrick D. McDaniel and
                  Gang Tan},
  title        = {Soteria: Automated IoT Safety and Security Analysis},
  journal      = {CoRR},
  volume       = {abs/1805.08876},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.08876},
  eprinttype    = {arXiv},
  eprint       = {1805.08876},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-08876.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-05579,
  author       = {Giuseppe Petracca and
                  Jens Grossklags and
                  Patrick D. McDaniel and
                  Trent Jaeger},
  title        = {Regulating Access to System Sensors in Cooperating Programs},
  journal      = {CoRR},
  volume       = {abs/1808.05579},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.05579},
  eprinttype    = {arXiv},
  eprint       = {1808.05579},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-05579.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-06962,
  author       = {Z. Berkay Celik and
                  Earlence Fernandes and
                  Eric Pauley and
                  Gang Tan and
                  Patrick D. McDaniel},
  title        = {Program Analysis of Commodity IoT Applications for Security and Privacy:
                  Challenges and Opportunities},
  journal      = {CoRR},
  volume       = {abs/1809.06962},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.06962},
  eprinttype    = {arXiv},
  eprint       = {1809.06962},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-06962.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-09551,
  author       = {Dang Tu Nguyen and
                  Chengyu Song and
                  Zhiyun Qian and
                  Srikanth V. Krishnamurthy and
                  Edward J. M. Colbert and
                  Patrick D. McDaniel},
  title        = {IoTSan: Fortifying the Safety of IoT Systems},
  journal      = {CoRR},
  volume       = {abs/1810.09551},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.09551},
  eprinttype    = {arXiv},
  eprint       = {1810.09551},
  timestamp    = {Wed, 31 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-09551.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-02978,
  author       = {Chun{-}Ming Lai and
                  Xiaoyun Wang and
                  Jon William Chapman and
                  Yu{-}Cheng Lin and
                  Yu{-}Chang Ho and
                  Shyhtsun Felix Wu and
                  Patrick D. McDaniel and
                  Hasan Cam},
  title        = {More or Less? Predict the Social Influence of Malicious URLs on Social
                  Media},
  journal      = {CoRR},
  volume       = {abs/1812.02978},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.02978},
  eprinttype    = {arXiv},
  eprint       = {1812.02978},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-02978.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LeverWNDMA17,
  author       = {Chaz Lever and
                  Robert J. Walls and
                  Yacin Nadji and
                  David Dagon and
                  Patrick D. McDaniel and
                  Manos Antonakakis},
  title        = {Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust
                  in Domains},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {2},
  pages        = {70--77},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.42},
  doi          = {10.1109/MSP.2017.42},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LeverWNDMA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TianBCMK17,
  author       = {Jing (Dave) Tian and
                  Kevin R. B. Butler and
                  Joseph I. Choi and
                  Patrick D. McDaniel and
                  Padma Krishnaswamy},
  title        = {Securing {ARP/NDP} From the Ground Up},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2131--2143},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2695983},
  doi          = {10.1109/TIFS.2017.2695983},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TianBCMK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/AchleitnerPMSKC17,
  author       = {Stefan Achleitner and
                  Thomas F. La Porta and
                  Patrick D. McDaniel and
                  Shridatt Sugrim and
                  Srikanth V. Krishnamurthy and
                  Ritu Chadha},
  title        = {Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {14},
  number       = {4},
  pages        = {1098--1112},
  year         = {2017},
  url          = {https://doi.org/10.1109/TNSM.2017.2724239},
  doi          = {10.1109/TNSM.2017.2724239},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/AchleitnerPMSKC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PapernotMGJCS17,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Ian J. Goodfellow and
                  Somesh Jha and
                  Z. Berkay Celik and
                  Ananthram Swami},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Practical Black-Box Attacks against Machine Learning},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {506--519},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053009},
  doi          = {10.1145/3052973.3053009},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PapernotMGJCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/LaiWHLWMC17,
  author       = {Chun{-}Ming Lai and
                  Xiaoyun Wang and
                  Yunfeng Hong and
                  Yu{-}Cheng Lin and
                  Shyhtsun Felix Wu and
                  Patrick D. McDaniel and
                  Hasan Cam},
  title        = {Attacking strategies and temporal analysis involving Facebook discussion
                  groups},
  booktitle    = {13th International Conference on Network and Service Management, {CNSM}
                  2017, Tokyo, Japan, November 26-30, 2017},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.23919/CNSM.2017.8256040},
  doi          = {10.23919/CNSM.2017.8256040},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsm/LaiWHLWMC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/McDaniel17,
  author       = {Patrick D. McDaniel},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  title        = {Tracing the Arc of Smartphone Application Security},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Attribute-Based Access Control,
                  ABAC@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017},
  pages        = {41--42},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041008.3053682},
  doi          = {10.1145/3041008.3053682},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/McDaniel17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/CelikMI17,
  author       = {Z. Berkay Celik and
                  Patrick D. McDaniel and
                  Rauf Izmailov},
  editor       = {Rakesh M. Verma and
                  Bhavani Thuraisingham},
  title        = {Feature Cultivation in Privileged Information-augmented Detection},
  booktitle    = {Proceedings of the 3rd {ACM} on International Workshop on Security
                  And Privacy Analytics, IWSPA@CODASPY 2017, Scottsdale, Arizona, USA,
                  March 24, 2017},
  pages        = {73--80},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041008.3041018},
  doi          = {10.1145/3041008.3041018},
  timestamp    = {Wed, 29 Jun 2022 15:37:42 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/CelikMI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GrossePMBM17,
  author       = {Kathrin Grosse and
                  Nicolas Papernot and
                  Praveen Manoharan and
                  Michael Backes and
                  Patrick D. McDaniel},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Adversarial Examples for Malware Detection},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {62--79},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_4},
  doi          = {10.1007/978-3-319-66399-9\_4},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GrossePMBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/AchleitnerPMKPS17,
  author       = {Stefan Achleitner and
                  Thomas La Porta and
                  Patrick D. McDaniel and
                  Srikanth V. Krishnamurthy and
                  Alexander Poylisher and
                  Constantin Serban},
  title        = {Stealth migration: Hiding virtual machines on the network},
  booktitle    = {2017 {IEEE} Conference on Computer Communications, {INFOCOM} 2017,
                  Atlanta, GA, USA, May 1-4, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/INFOCOM.2017.8057195},
  doi          = {10.1109/INFOCOM.2017.8057195},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/AchleitnerPMKPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/AtyaQKPMM17,
  author       = {Ahmed Osama Fathy Atya and
                  Zhiyun Qian and
                  Srikanth V. Krishnamurthy and
                  Thomas La Porta and
                  Patrick D. McDaniel and
                  Lisa M. Marvel},
  title        = {Malicious co-residency on the cloud: Attacks and defense},
  booktitle    = {2017 {IEEE} Conference on Computer Communications, {INFOCOM} 2017,
                  Atlanta, GA, USA, May 1-4, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/INFOCOM.2017.8056951},
  doi          = {10.1109/INFOCOM.2017.8056951},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/AtyaQKPMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pac/CelikLM17,
  author       = {Z. Berkay Celik and
                  David Lopez{-}Paz and
                  Patrick D. McDaniel},
  title        = {Patient-Driven Privacy Control through Generalized Distillation},
  booktitle    = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington,
                  DC, USA, August 1-4, 2017},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.13},
  doi          = {10.1109/PAC.2017.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pac/CelikLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pac/AcarCAUM17,
  author       = {Abbas Acar and
                  Z. Berkay Celik and
                  Hidayet Aksu and
                  A. Selcuk Uluagac and
                  Patrick D. McDaniel},
  title        = {Achieving Secure and Differentially Private Computations in Multiparty
                  Settings},
  booktitle    = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington,
                  DC, USA, August 1-4, 2017},
  pages        = {49--59},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.12},
  doi          = {10.1109/PAC.2017.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pac/AcarCAUM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/HongHLWNMYCA17,
  author       = {Yunfeng Hong and
                  Yongjian Hu and
                  Chun{-}Ming Lai and
                  Shyhtsun Felix Wu and
                  Iulian Neamtiu and
                  Patrick D. McDaniel and
                  Paul L. Yu and
                  Hasan Cam and
                  Gail{-}Joon Ahn},
  editor       = {Xiaodong Lin and
                  Ali A. Ghorbani and
                  Kui Ren and
                  Sencun Zhu and
                  Aiqing Zhang},
  title        = {Defining and Detecting Environment Discrimination in Android Apps},
  booktitle    = {Security and Privacy in Communication Networks - 13th International
                  Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25,
                  2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {238},
  pages        = {510--529},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-78813-5\_26},
  doi          = {10.1007/978-3-319-78813-5\_26},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/HongHLWNMYCA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/RastogiDCJM17,
  author       = {Vaibhav Rastogi and
                  Drew Davidson and
                  Lorenzo De Carli and
                  Somesh Jha and
                  Patrick D. McDaniel},
  editor       = {Eric Bodden and
                  Wilhelm Sch{\"{a}}fer and
                  Arie van Deursen and
                  Andrea Zisman},
  title        = {Cimplifier: automatically debloating containers},
  booktitle    = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software
                  Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017},
  pages        = {476--486},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3106237.3106271},
  doi          = {10.1145/3106237.3106271},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/RastogiDCJM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosr/AchleitnerPJM17,
  author       = {Stefan Achleitner and
                  Thomas La Porta and
                  Trent Jaeger and
                  Patrick D. McDaniel},
  title        = {Adversarial Network Forensics in Software Defined Networking},
  booktitle    = {Proceedings of the Symposium on {SDN} Research, {SOSR} 2017, Santa
                  Clara, CA, USA, April 3-4, 2017},
  pages        = {8--20},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3050220.3050223},
  doi          = {10.1145/3050220.3050223},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sosr/AchleitnerPJM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosr/AchleitnerPJM17a,
  author       = {Stefan Achleitner and
                  Thomas La Porta and
                  Trent Jaeger and
                  Patrick D. McDaniel},
  title        = {Adversarial Network Forensics in Software Defined Networking: Demo},
  booktitle    = {Proceedings of the Symposium on {SDN} Research, {SOSR} 2017, Santa
                  Clara, CA, USA, April 3-4, 2017},
  pages        = {177--178},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3050220.3060599},
  doi          = {10.1145/3050220.3060599},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sosr/AchleitnerPJM17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GrosseMP0M17,
  author       = {Kathrin Grosse and
                  Praveen Manoharan and
                  Nicolas Papernot and
                  Michael Backes and
                  Patrick D. McDaniel},
  title        = {On the (Statistical) Detection of Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1702.06280},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.06280},
  eprinttype    = {arXiv},
  eprint       = {1702.06280},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GrosseMP0M17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CelikAASUM17,
  author       = {Z. Berkay Celik and
                  Hidayet Aksu and
                  Abbas Acar and
                  Ryan Sheatsley and
                  A. Selcuk Uluagac and
                  Patrick D. McDaniel},
  title        = {Curie: Policy-based Secure Data Exchange},
  journal      = {CoRR},
  volume       = {abs/1702.08342},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.08342},
  eprinttype    = {arXiv},
  eprint       = {1702.08342},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CelikAASUM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TramerPGBM17,
  author       = {Florian Tram{\`{e}}r and
                  Nicolas Papernot and
                  Ian J. Goodfellow and
                  Dan Boneh and
                  Patrick D. McDaniel},
  title        = {The Space of Transferable Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1704.03453},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.03453},
  eprinttype    = {arXiv},
  eprint       = {1704.03453},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/TramerPGBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PapernotM17,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel},
  title        = {Extending Defensive Distillation},
  journal      = {CoRR},
  volume       = {abs/1705.05264},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.05264},
  eprinttype    = {arXiv},
  eprint       = {1705.05264},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PapernotM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TramerKPBM17,
  author       = {Florian Tram{\`{e}}r and
                  Alexey Kurakin and
                  Nicolas Papernot and
                  Dan Boneh and
                  Patrick D. McDaniel},
  title        = {Ensemble Adversarial Training: Attacks and Defenses},
  journal      = {CoRR},
  volume       = {abs/1705.07204},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.07204},
  eprinttype    = {arXiv},
  eprint       = {1705.07204},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/TramerKPBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AcarCAUM17,
  author       = {Abbas Acar and
                  Z. Berkay Celik and
                  Hidayet Aksu and
                  A. Selcuk Uluagac and
                  Patrick D. McDaniel},
  title        = {Achieving Secure and Differentially Private Computations in Multiparty
                  Settings},
  journal      = {CoRR},
  volume       = {abs/1707.01871},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.01871},
  eprinttype    = {arXiv},
  eprint       = {1707.01871},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AcarCAUM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McDanielPC16,
  author       = {Patrick D. McDaniel and
                  Nicolas Papernot and
                  Z. Berkay Celik},
  title        = {Machine Learning in Adversarial Settings},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {3},
  pages        = {68--72},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.51},
  doi          = {10.1109/MSP.2016.51},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McDanielPC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/OcteauLJM16,
  author       = {Damien Octeau and
                  Daniel Luchaup and
                  Somesh Jha and
                  Patrick D. McDaniel},
  title        = {Composite Constant Propagation and its Application to Android Program
                  Analysis},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {42},
  number       = {11},
  pages        = {999--1014},
  year         = {2016},
  url          = {https://doi.org/10.1109/TSE.2016.2550446},
  doi          = {10.1109/TSE.2016.2550446},
  timestamp    = {Thu, 27 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/OcteauLJM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AchleitnerPMSKC16,
  author       = {Stefan Achleitner and
                  Thomas La Porta and
                  Patrick D. McDaniel and
                  Shridatt Sugrim and
                  Srikanth V. Krishnamurthy and
                  Ritu Chadha},
  editor       = {Ilsun You and
                  Elisa Bertino},
  title        = {Cyber Deception: Virtual Networks to Defend Insider Reconnaissance},
  booktitle    = {Proceedings of the 8th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October
                  28, 2016},
  pages        = {57--68},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2995962},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AchleitnerPMSKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/HuberMBM16,
  author       = {Charles Huber and
                  Patrick D. McDaniel and
                  Scott E. Brown and
                  Lisa M. Marvel},
  title        = {Cyber Fighter Associate: {A} Decision Support System for cyber agility},
  booktitle    = {2016 Annual Conference on Information Science and Systems, {CISS}
                  2016, Princeton, NJ, USA, March 16-18, 2016},
  pages        = {198--203},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CISS.2016.7460501},
  doi          = {10.1109/CISS.2016.7460501},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/HuberMBM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/PohlyM16,
  author       = {Devin J. Pohly and
                  Patrick D. McDaniel},
  title        = {Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols},
  booktitle    = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2016, Toulouse, France, June 28 - July 1, 2016},
  pages        = {371--382},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSN.2016.41},
  doi          = {10.1109/DSN.2016.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/PohlyM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/PapernotMJFCS16,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Somesh Jha and
                  Matt Fredrikson and
                  Z. Berkay Celik and
                  Ananthram Swami},
  title        = {The Limitations of Deep Learning in Adversarial Settings},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages        = {372--387},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/EuroSP.2016.36},
  doi          = {10.1109/EUROSP.2016.36},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/PapernotMJFCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/CelikHLPMWRLBPC16,
  author       = {Z. Berkay Celik and
                  Nan Hu and
                  Yun Li and
                  Nicolas Papernot and
                  Patrick D. McDaniel and
                  Robert J. Walls and
                  Jeff Rowe and
                  Karl N. Levitt and
                  Novella Bartolini and
                  Thomas F. La Porta and
                  Ritu Chadha},
  editor       = {Jerry Brand and
                  Matthew C. Valenti and
                  Akinwale Akinpelu and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {Mapping sample scenarios to operational models},
  booktitle    = {2016 {IEEE} Military Communications Conference, {MILCOM} 2016, Baltimore,
                  MD, USA, November 1-3, 2016},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/MILCOM.2016.7795293},
  doi          = {10.1109/MILCOM.2016.7795293},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/CelikHLPMWRLBPC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/PapernotMSH16,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Ananthram Swami and
                  Richard E. Harang},
  editor       = {Jerry Brand and
                  Matthew C. Valenti and
                  Akinwale Akinpelu and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {Crafting adversarial input sequences for recurrent neural networks},
  booktitle    = {2016 {IEEE} Military Communications Conference, {MILCOM} 2016, Baltimore,
                  MD, USA, November 1-3, 2016},
  pages        = {49--54},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/MILCOM.2016.7795300},
  doi          = {10.1109/MILCOM.2016.7795300},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/PapernotMSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/OcteauJDMB0KT16,
  author       = {Damien Octeau and
                  Somesh Jha and
                  Matthew L. Dering and
                  Patrick D. McDaniel and
                  Alexandre Bartel and
                  Li Li and
                  Jacques Klein and
                  Yves Le Traon},
  editor       = {Rastislav Bod{\'{\i}}k and
                  Rupak Majumdar},
  title        = {Combining static analysis with probabilistic models to enable market-scale
                  Android inter-component analysis},
  booktitle    = {Proceedings of the 43rd Annual {ACM} {SIGPLAN-SIGACT} Symposium on
                  Principles of Programming Languages, {POPL} 2016, St. Petersburg,
                  FL, USA, January 20 - 22, 2016},
  pages        = {469--484},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2837614.2837661},
  doi          = {10.1145/2837614.2837661},
  timestamp    = {Fri, 16 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/OcteauJDMB0KT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LagemanKWM16,
  author       = {Nathaniel Lageman and
                  Eric D. Kilmer and
                  Robert J. Walls and
                  Patrick D. McDaniel},
  editor       = {Robert H. Deng and
                  Jian Weng and
                  Kui Ren and
                  Vinod Yegneswaran},
  title        = {BinDNN: Resilient Function Matching Using Deep Learning},
  booktitle    = {Security and Privacy in Communication Networks - 12th International
                  Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016,
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {198},
  pages        = {517--537},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-59608-2\_29},
  doi          = {10.1007/978-3-319-59608-2\_29},
  timestamp    = {Tue, 12 May 2020 10:32:53 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/LagemanKWM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Acar0BFM016,
  author       = {Yasemin Acar and
                  Michael Backes and
                  Sven Bugiel and
                  Sascha Fahl and
                  Patrick D. McDaniel and
                  Matthew Smith},
  title        = {SoK: Lessons Learned from Android Security Research for Appified Software
                  Platforms},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {433--451},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.33},
  doi          = {10.1109/SP.2016.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Acar0BFM016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PapernotM0JS16,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Xi Wu and
                  Somesh Jha and
                  Ananthram Swami},
  title        = {Distillation as a Defense to Adversarial Perturbations Against Deep
                  Neural Networks},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {582--597},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.41},
  doi          = {10.1109/SP.2016.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/PapernotM0JS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LeverWNDMA16,
  author       = {Chaz Lever and
                  Robert J. Walls and
                  Yacin Nadji and
                  David Dagon and
                  Patrick D. McDaniel and
                  Manos Antonakakis},
  title        = {Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual
                  Trust in Domains},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {691--706},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.47},
  doi          = {10.1109/SP.2016.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LeverWNDMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001BDMOW16,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Erik Derr and
                  Patrick D. McDaniel and
                  Damien Octeau and
                  Sebastian Weisgerber},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {On Demystifying the Android Application Framework: Re-Visiting Android
                  Permission Specification Analysis},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1101--1118},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/backes\_android},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/0001BDMOW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PapernotMGJCS16,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Ian J. Goodfellow and
                  Somesh Jha and
                  Z. Berkay Celik and
                  Ananthram Swami},
  title        = {Practical Black-Box Attacks against Deep Learning Systems using Adversarial
                  Examples},
  journal      = {CoRR},
  volume       = {abs/1602.02697},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.02697},
  eprinttype    = {arXiv},
  eprint       = {1602.02697},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PapernotMGJCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RastogiDCJM16,
  author       = {Vaibhav Rastogi and
                  Drew Davidson and
                  Lorenzo De Carli and
                  Somesh Jha and
                  Patrick D. McDaniel},
  title        = {Towards Least Privilege Containers with Cimplifier},
  journal      = {CoRR},
  volume       = {abs/1602.08410},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.08410},
  eprinttype    = {arXiv},
  eprint       = {1602.08410},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RastogiDCJM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CelikMIPS16,
  author       = {Z. Berkay Celik and
                  Patrick D. McDaniel and
                  Rauf Izmailov and
                  Nicolas Papernot and
                  Ananthram Swami},
  title        = {Building Better Detection with Privileged Information},
  journal      = {CoRR},
  volume       = {abs/1603.09638},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.09638},
  eprinttype    = {arXiv},
  eprint       = {1603.09638},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CelikMIPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PapernotMSH16,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Ananthram Swami and
                  Richard E. Harang},
  title        = {Crafting Adversarial Input Sequences for Recurrent Neural Networks},
  journal      = {CoRR},
  volume       = {abs/1604.08275},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.08275},
  eprinttype    = {arXiv},
  eprint       = {1604.08275},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PapernotMSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PapernotMG16,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Ian J. Goodfellow},
  title        = {Transferability in Machine Learning: from Phenomena to Black-Box Attacks
                  using Adversarial Samples},
  journal      = {CoRR},
  volume       = {abs/1605.07277},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.07277},
  eprinttype    = {arXiv},
  eprint       = {1605.07277},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PapernotMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GrossePM0M16,
  author       = {Kathrin Grosse and
                  Nicolas Papernot and
                  Praveen Manoharan and
                  Michael Backes and
                  Patrick D. McDaniel},
  title        = {Adversarial Perturbations Against Deep Neural Networks for Malware
                  Classification},
  journal      = {CoRR},
  volume       = {abs/1606.04435},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.04435},
  eprinttype    = {arXiv},
  eprint       = {1606.04435},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GrossePM0M16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PapernotM16,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel},
  title        = {On the Effectiveness of Defensive Distillation},
  journal      = {CoRR},
  volume       = {abs/1607.05113},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.05113},
  eprinttype    = {arXiv},
  eprint       = {1607.05113},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PapernotM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GoodfellowPM16,
  author       = {Ian J. Goodfellow and
                  Nicolas Papernot and
                  Patrick D. McDaniel},
  title        = {cleverhans v0.1: an adversarial machine learning library},
  journal      = {CoRR},
  volume       = {abs/1610.00768},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.00768},
  eprinttype    = {arXiv},
  eprint       = {1610.00768},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GoodfellowPM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PapernotMSW16,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Arunesh Sinha and
                  Michael P. Wellman},
  title        = {Towards the Science of Security and Privacy in Machine Learning},
  journal      = {CoRR},
  volume       = {abs/1611.03814},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.03814},
  eprinttype    = {arXiv},
  eprint       = {1611.03814},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PapernotMSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CelikLM16,
  author       = {Z. Berkay Celik and
                  David Lopez{-}Paz and
                  Patrick D. McDaniel},
  title        = {Patient-Driven Privacy Control through Generalized Distillation},
  journal      = {CoRR},
  volume       = {abs/1611.08648},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.08648},
  eprinttype    = {arXiv},
  eprint       = {1611.08648},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CelikLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/TianBMK15,
  author       = {Jing (Dave) Tian and
                  Kevin R. B. Butler and
                  Patrick D. McDaniel and
                  Padma Krishnaswamy},
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {Securing {ARP} From the Ground Up},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {305--312},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699026.2699123},
  doi          = {10.1145/2699026.2699123},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/TianBMK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/PohlyM15,
  author       = {Devin J. Pohly and
                  Patrick D. McDaniel},
  title        = {{MICSS:} {A} Realistic Multichannel Secrecy Protocol},
  booktitle    = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San
                  Diego, CA, USA, December 6-10, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7417268},
  doi          = {10.1109/GLOCOM.2014.7417268},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/PohlyM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/McDaniel15,
  author       = {Patrick D. McDaniel},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {A New Science of Security Decision Making},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {IS--13},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/document/7509913/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/McDaniel15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/OcteauLDJM15,
  author       = {Damien Octeau and
                  Daniel Luchaup and
                  Matthew L. Dering and
                  Somesh Jha and
                  Patrick D. McDaniel},
  editor       = {Antonia Bertolino and
                  Gerardo Canfora and
                  Sebastian G. Elbaum},
  title        = {Composite Constant Propagation: Application to Android Inter-Component
                  Communication Analysis},
  booktitle    = {37th {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2015, Florence, Italy, May 16-24, 2015, Volume 1},
  pages        = {77--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICSE.2015.30},
  doi          = {10.1109/ICSE.2015.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/OcteauLDJM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/0029BBKTARBOM15,
  author       = {Li Li and
                  Alexandre Bartel and
                  Tegawend{\'{e}} F. Bissyand{\'{e}} and
                  Jacques Klein and
                  Yves Le Traon and
                  Steven Arzt and
                  Siegfried Rasthofer and
                  Eric Bodden and
                  Damien Octeau and
                  Patrick D. McDaniel},
  editor       = {Antonia Bertolino and
                  Gerardo Canfora and
                  Sebastian G. Elbaum},
  title        = {IccTA: Detecting Inter-Component Privacy Leaks in Android Apps},
  booktitle    = {37th {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2015, Florence, Italy, May 16-24, 2015, Volume 1},
  pages        = {280--291},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICSE.2015.48},
  doi          = {10.1109/ICSE.2015.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/0029BBKTARBOM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/WallsKLM15,
  author       = {Robert J. Walls and
                  Eric D. Kilmer and
                  Nathaniel Lageman and
                  Patrick D. McDaniel},
  editor       = {Kenjiro Cho and
                  Kensuke Fukuda and
                  Vivek S. Pai and
                  Neil Spring},
  title        = {Measuring the Impact and Perception of Acceptable Advertisements},
  booktitle    = {Proceedings of the 2015 {ACM} Internet Measurement Conference, {IMC}
                  2015, Tokyo, Japan, October 28-30, 2015},
  pages        = {107--120},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2815675.2815703},
  doi          = {10.1145/2815675.2815703},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/WallsKLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/PapernotMW15,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Robert J. Walls},
  editor       = {Qinqing Zhang and
                  Jerry Brand and
                  Thomas G. MacDonald and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {Enforcing agile access control policies in relational databases using
                  views},
  booktitle    = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
                  FL, USA, October 26-28, 2015},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MILCOM.2015.7357410},
  doi          = {10.1109/MILCOM.2015.7357410},
  timestamp    = {Thu, 07 Nov 2019 09:04:27 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/PapernotMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/OltramariCWM15,
  author       = {Alessandro Oltramari and
                  Lorrie Faith Cranor and
                  Robert J. Walls and
                  Patrick D. McDaniel},
  editor       = {Qinqing Zhang and
                  Jerry Brand and
                  Thomas G. MacDonald and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {Computational ontology of network operations},
  booktitle    = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
                  FL, USA, October 26-28, 2015},
  pages        = {318--323},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MILCOM.2015.7357462},
  doi          = {10.1109/MILCOM.2015.7357462},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/OltramariCWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/CelikWMS15,
  author       = {Z. Berkay Celik and
                  Robert J. Walls and
                  Patrick D. McDaniel and
                  Ananthram Swami},
  editor       = {Qinqing Zhang and
                  Jerry Brand and
                  Thomas G. MacDonald and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {Malware traffic detection using tamper resistant features},
  booktitle    = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
                  FL, USA, October 26-28, 2015},
  pages        = {330--335},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MILCOM.2015.7357464},
  doi          = {10.1109/MILCOM.2015.7357464},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/CelikWMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/PohlySM15,
  author       = {Devin J. Pohly and
                  Charles Sestito and
                  Patrick D. McDaniel},
  editor       = {Qinqing Zhang and
                  Jerry Brand and
                  Thomas G. MacDonald and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {Adaptive protocol switching using Dynamically Insertable Bumps in
                  the stack},
  booktitle    = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
                  FL, USA, October 26-28, 2015},
  pages        = {342--347},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MILCOM.2015.7357466},
  doi          = {10.1109/MILCOM.2015.7357466},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/PohlySM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/AqilAJKLMRS15,
  author       = {Azeem Aqil and
                  Ahmed Osama Fathy Atya and
                  Trent Jaeger and
                  Srikanth V. Krishnamurthy and
                  Karl N. Levitt and
                  Patrick D. McDaniel and
                  Jeff Rowe and
                  Ananthram Swami},
  editor       = {Qinqing Zhang and
                  Jerry Brand and
                  Thomas G. MacDonald and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {Detection of stealthy TCP-based DoS attacks},
  booktitle    = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
                  FL, USA, October 26-28, 2015},
  pages        = {348--353},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MILCOM.2015.7357467},
  doi          = {10.1109/MILCOM.2015.7357467},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/AqilAJKLMRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KottSM15,
  author       = {Alexander Kott and
                  Ananthram Swami and
                  Patrick D. McDaniel},
  title        = {Six Potential Game-Changers in Cyber Security: Towards Priorities
                  in Cyber Science and Engineering},
  journal      = {CoRR},
  volume       = {abs/1511.00509},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.00509},
  eprinttype    = {arXiv},
  eprint       = {1511.00509},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KottSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PapernotMWJS15,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Xi Wu and
                  Somesh Jha and
                  Ananthram Swami},
  title        = {Distillation as a Defense to Adversarial Perturbations against Deep
                  Neural Networks},
  journal      = {CoRR},
  volume       = {abs/1511.04508},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.04508},
  eprinttype    = {arXiv},
  eprint       = {1511.04508},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PapernotMWJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PapernotMJFCS15,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Somesh Jha and
                  Matt Fredrikson and
                  Z. Berkay Celik and
                  Ananthram Swami},
  title        = {The Limitations of Deep Learning in Adversarial Settings},
  journal      = {CoRR},
  volume       = {abs/1511.07528},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.07528},
  eprinttype    = {arXiv},
  eprint       = {1511.07528},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PapernotMJFCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/EnckGCCJMS14,
  author       = {William Enck and
                  Peter Gilbert and
                  Byung{-}Gon Chun and
                  Landon P. Cox and
                  Jaeyeon Jung and
                  Patrick D. McDaniel and
                  Anmol Sheth},
  title        = {TaintDroid: an information flow tracking system for real-time privacy
                  monitoring on smartphones},
  journal      = {Commun. {ACM}},
  volume       = {57},
  number       = {3},
  pages        = {99--106},
  year         = {2014},
  url          = {https://doi.org/10.1145/2494522},
  doi          = {10.1145/2494522},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/EnckGCCJMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KottSM14,
  author       = {Alexander Kott and
                  Ananthram Swami and
                  Patrick D. McDaniel},
  title        = {Security Outlook: Six Cyber Game Changers for the Next 15 Years},
  journal      = {Computer},
  volume       = {47},
  number       = {12},
  pages        = {104--106},
  year         = {2014},
  url          = {https://doi.org/10.1109/MC.2014.366},
  doi          = {10.1109/MC.2014.366},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KottSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McDanielRS14,
  author       = {Patrick D. McDaniel and
                  Brian Rivera and
                  Ananthram Swami},
  title        = {Toward a Science of Secure Environments},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {68--70},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.81},
  doi          = {10.1109/MSP.2014.81},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McDanielRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/EnckGHTCCJMS14,
  author       = {William Enck and
                  Peter Gilbert and
                  Seungyeop Han and
                  Vasant Tendulkar and
                  Byung{-}Gon Chun and
                  Landon P. Cox and
                  Jaeyeon Jung and
                  Patrick D. McDaniel and
                  Anmol N. Sheth},
  title        = {TaintDroid: An Information-Flow Tracking System for Realtime Privacy
                  Monitoring on Smartphones},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {32},
  number       = {2},
  pages        = {5:1--5:29},
  year         = {2014},
  url          = {https://doi.org/10.1145/2619091},
  doi          = {10.1145/2619091},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/EnckGHTCCJMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/CaoLLMPWX14,
  author       = {Zhenfu Cao and
                  Keqiu Li and
                  Xu Li and
                  Patrick D. McDaniel and
                  Radha Poovendran and
                  Guojun Wang and
                  Yang Xiang},
  title        = {Guest Editors' Introduction: Special Issue on Trust, Security, and
                  Privacy in Parallel and Distributed Systems},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {25},
  number       = {2},
  pages        = {279--282},
  year         = {2014},
  url          = {https://doi.org/10.1109/TPDS.2014.4},
  doi          = {10.1109/TPDS.2014.4},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/CaoLLMPWX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McDanielJPPWKMS14,
  author       = {Patrick D. McDaniel and
                  Trent Jaeger and
                  Thomas F. La Porta and
                  Nicolas Papernot and
                  Robert J. Walls and
                  Alexander Kott and
                  Lisa M. Marvel and
                  Ananthram Swami and
                  Prasant Mohapatra and
                  Srikanth V. Krishnamurthy and
                  Iulian Neamtiu},
  editor       = {Sushil Jajodia and
                  Kun Sun},
  title        = {Security and Science of Agility},
  booktitle    = {Proceedings of the First {ACM} Workshop on Moving Target Defense,
                  {MTD} '14, Scottsdale, Arizona, USA, November 7, 2014},
  pages        = {13--19},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663474.2663476},
  doi          = {10.1145/2663474.2663476},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/McDanielJPPWKMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KoshyKM14,
  author       = {Philip Koshy and
                  Diana Koshy and
                  Patrick D. McDaniel},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {An Analysis of Anonymity in Bitcoin Using {P2P} Network Traffic},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {469--485},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_30},
  doi          = {10.1007/978-3-662-45472-5\_30},
  timestamp    = {Tue, 21 Mar 2023 20:59:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/KoshyKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/DeringM14,
  author       = {Matthew L. Dering and
                  Patrick D. McDaniel},
  title        = {Android market reconstruction and analysis},
  booktitle    = {2014 {IEEE} Military Communications Conference, {MILCOM} 2014, Baltimore,
                  MD, USA, October 6-8, 2014},
  pages        = {300--305},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/MILCOM.2014.52},
  doi          = {10.1109/MILCOM.2014.52},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/DeringM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/McLaughlinZPM14,
  author       = {Stephen E. McLaughlin and
                  Saman A. Zonouz and
                  Devin J. Pohly and
                  Patrick D. McDaniel},
  title        = {A Trusted Safety Verifier for Process Controller Code},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/trusted-safety-verifier-process-controller-code},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/McLaughlinZPM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/ArztRFBBKTOM14,
  author       = {Steven Arzt and
                  Siegfried Rasthofer and
                  Christian Fritz and
                  Eric Bodden and
                  Alexandre Bartel and
                  Jacques Klein and
                  Yves Le Traon and
                  Damien Octeau and
                  Patrick D. McDaniel},
  editor       = {Michael F. P. O'Boyle and
                  Keshav Pingali},
  title        = {FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware
                  taint analysis for Android apps},
  booktitle    = {{ACM} {SIGPLAN} Conference on Programming Language Design and Implementation,
                  {PLDI} '14, Edinburgh, United Kingdom - June 09 - 11, 2014},
  pages        = {259--269},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2594291.2594299},
  doi          = {10.1145/2594291.2594299},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pldi/ArztRFBBKTOM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stids/OltramariCWM14,
  author       = {Alessandro Oltramari and
                  Lorrie Faith Cranor and
                  Robert J. Walls and
                  Patrick D. McDaniel},
  editor       = {Kathryn Blackmond Laskey and
                  Ian Emmons and
                  Paulo C. G. Costa},
  title        = {Building an Ontology of Cyber Security},
  booktitle    = {Proceedings of the Ninth Conference on Semantic Technology for Intelligence,
                  Defense, and Security, Fairfax VA, USA, November 18-21, 2014},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1304},
  pages        = {54--61},
  publisher    = {CEUR-WS.org},
  year         = {2014},
  url          = {https://ceur-ws.org/Vol-1304/STIDS2014\_T08\_OltramariEtAl.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:26 +0100},
  biburl       = {https://dblp.org/rec/conf/stids/OltramariCWM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HuOML14,
  author       = {Wenhui Hu and
                  Damien Octeau and
                  Patrick D. McDaniel and
                  Peng Liu},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Duet: library integrity verification for android applications},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {141--152},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627404},
  doi          = {10.1145/2627393.2627404},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/HuOML14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiBKTARBOM14,
  author       = {Li Li and
                  Alexandre Bartel and
                  Jacques Klein and
                  Yves Le Traon and
                  Steven Arzt and
                  Siegfried Rasthofer and
                  Eric Bodden and
                  Damien Octeau and
                  Patrick D. McDaniel},
  title        = {I know what leaked in your pocket: uncovering privacy leaks on Android
                  Apps with Static Taint Analysis},
  journal      = {CoRR},
  volume       = {abs/1404.7431},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.7431},
  eprinttype    = {arXiv},
  eprint       = {1404.7431},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LiBKTARBOM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OcteauMJBBKT13,
  author       = {Damien Octeau and
                  Patrick D. McDaniel and
                  Somesh Jha and
                  Alexandre Bartel and
                  Eric Bodden and
                  Jacques Klein and
                  Yves Le Traon},
  editor       = {Samuel T. King},
  title        = {Effective Inter-Component Communication Mapping in Android: An Essential
                  Step Towards Holistic Security Analysis},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {543--558},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/octeau},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/OcteauMJBBKT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McDaniel12,
  author       = {Patrick D. McDaniel},
  title        = {Bloatware Comes to the Smartphone},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {10},
  number       = {4},
  pages        = {85--87},
  year         = {2012},
  url          = {https://doi.org/10.1109/MSP.2012.92},
  doi          = {10.1109/MSP.2012.92},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McDaniel12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/OngtangMEM12,
  author       = {Machigar Ongtang and
                  Stephen E. McLaughlin and
                  William Enck and
                  Patrick D. McDaniel},
  title        = {Semantically rich application-centric security in Android},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {6},
  pages        = {658--673},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.360},
  doi          = {10.1002/SEC.360},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/OngtangMEM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/MoyerBSMJ12,
  author       = {Thomas Moyer and
                  Kevin R. B. Butler and
                  Joshua Schiffman and
                  Patrick D. McDaniel and
                  Trent Jaeger},
  title        = {Scalable Web Content Attestation},
  journal      = {{IEEE} Trans. Computers},
  volume       = {61},
  number       = {5},
  pages        = {686--699},
  year         = {2012},
  url          = {https://doi.org/10.1109/TC.2011.60},
  doi          = {10.1109/TC.2011.60},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/MoyerBSMJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PohlyMMB12,
  author       = {Devin J. Pohly and
                  Stephen E. McLaughlin and
                  Patrick D. McDaniel and
                  Kevin R. B. Butler},
  editor       = {Robert H'obbes' Zakon},
  title        = {Hi-Fi: collecting high-fidelity whole-system provenance},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {259--268},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420989},
  doi          = {10.1145/2420950.2420989},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PohlyMMB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/MoyerJM12,
  author       = {Thomas Moyer and
                  Trent Jaeger and
                  Patrick D. McDaniel},
  editor       = {Quan Z. Sheng and
                  Guoren Wang and
                  Christian S. Jensen and
                  Guandong Xu},
  title        = {Scalable Integrity-Guaranteed {AJAX}},
  booktitle    = {Web Technologies and Applications - 14th Asia-Pacific Web Conference,
                  APWeb 2012, Kunming, China, April 11-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7235},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29253-8\_1},
  doi          = {10.1007/978-3-642-29253-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/apweb/MoyerJM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangLQQMM12,
  author       = {Weining Yang and
                  Ninghui Li and
                  Yuan Qi and
                  Wahbeh H. Qardaji and
                  Stephen E. McLaughlin and
                  Patrick D. McDaniel},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Minimizing private data disclosures in the smart grid},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {415--427},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382242},
  doi          = {10.1145/2382196.2382242},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YangLQQMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McLaughlinM12,
  author       = {Stephen E. McLaughlin and
                  Patrick D. McDaniel},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {{SABOT:} specification-based payload generation for programmable logic
                  controllers},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {439--449},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382244},
  doi          = {10.1145/2382196.2382244},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/McLaughlinM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isccsp/McDanielM12,
  author       = {Patrick D. McDaniel and
                  Stephan McLaughlin},
  title        = {Structured security testing in the smart grid},
  booktitle    = {5th International Symposium on Communications, Control and Signal
                  Processing, {ISCCSP} 2012, Roma, Italy, May 2-4, 2012},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISCCSP.2012.6217858},
  doi          = {10.1109/ISCCSP.2012.6217858},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/isccsp/McDanielM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KimMP12,
  author       = {Eun{-}Kyoung Kim and
                  Patrick D. McDaniel and
                  Thomas La Porta},
  editor       = {Angelos D. Keromytis and
                  Roberto Di Pietro},
  title        = {A Detection Mechanism for {SMS} Flooding Attacks in Cellular Networks},
  booktitle    = {Security and Privacy in Communication Networks - 8th International
                  {ICST} Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012.
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {106},
  pages        = {76--93},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36883-7\_6},
  doi          = {10.1007/978-3-642-36883-7\_6},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/KimMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/OcteauJM12,
  author       = {Damien Octeau and
                  Somesh Jha and
                  Patrick D. McDaniel},
  editor       = {Will Tracz and
                  Martin P. Robillard and
                  Tevfik Bultan},
  title        = {Retargeting Android applications to Java bytecode},
  booktitle    = {20th {ACM} {SIGSOFT} Symposium on the Foundations of Software Engineering
                  (FSE-20), SIGSOFT/FSE'12, Cary, NC, {USA} - November 11 - 16, 2012},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2393596.2393600},
  doi          = {10.1145/2393596.2393600},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/OcteauJM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SchiffmanMJM11,
  author       = {Joshua Schiffman and
                  Thomas Moyer and
                  Trent Jaeger and
                  Patrick D. McDaniel},
  title        = {Network-Based Root of Trust for Installation},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {1},
  pages        = {40--48},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2011.15},
  doi          = {10.1109/MSP.2011.15},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SchiffmanMJM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McDaniel11,
  author       = {Patrick D. McDaniel},
  title        = {Data Provenance and Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {2},
  pages        = {83--85},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2011.27},
  doi          = {10.1109/MSP.2011.27},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McDaniel11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TraynorARJMP11,
  author       = {Patrick Traynor and
                  Chaitrali Amrutkar and
                  Vikhyath Rao and
                  Trent Jaeger and
                  Patrick D. McDaniel and
                  Thomas La Porta},
  title        = {From mobile phones to responsible devices},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {6},
  pages        = {719--726},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.218},
  doi          = {10.1002/SEC.218},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/TraynorARJMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McLaughlinMA11,
  author       = {Stephen E. McLaughlin and
                  Patrick D. McDaniel and
                  William Aiello},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Protecting consumer privacy from electric load monitoring},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {87--98},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046720},
  doi          = {10.1145/2046707.2046720},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/McLaughlinMA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/EnckOMC11,
  author       = {William Enck and
                  Damien Octeau and
                  Patrick D. McDaniel and
                  Swarat Chaudhuri},
  title        = {A Study of Android Application Security},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Enck.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/EnckOMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2011hotsec,
  editor       = {Patrick D. McDaniel},
  title        = {6th {USENIX} Workshop on Hot Topics in Security, HotSec'11, San Francisco,
                  CA, USA, August 9, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/hotsec11},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2011hotsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ButlerMMM10,
  author       = {Kevin R. B. Butler and
                  Stephen E. McLaughlin and
                  Thomas Moyer and
                  Patrick D. McDaniel},
  title        = {New Security Architectures Based on Emerging Disk Functionality},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {5},
  pages        = {34--41},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2010.90},
  doi          = {10.1109/MSP.2010.90},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ButlerMMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McDanielE10,
  author       = {Patrick D. McDaniel and
                  William Enck},
  title        = {Not So Great Expectations: Why Application Markets Haven't Failed
                  Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {5},
  pages        = {76--78},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2010.159},
  doi          = {10.1109/MSP.2010.159},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McDanielE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/PirrettiTMW10,
  author       = {Matthew Pirretti and
                  Patrick Traynor and
                  Patrick D. McDaniel and
                  Brent Waters},
  title        = {Secure attribute-based systems},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {799--837},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2009-0383},
  doi          = {10.3233/JCS-2009-0383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/PirrettiTMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/ButlerFMR10,
  author       = {Kevin R. B. Butler and
                  Toni R. Farley and
                  Patrick D. McDaniel and
                  Jennifer Rexford},
  title        = {A Survey of {BGP} Security Issues and Solutions},
  journal      = {Proc. {IEEE}},
  volume       = {98},
  number       = {1},
  pages        = {100--122},
  year         = {2010},
  url          = {https://doi.org/10.1109/JPROC.2009.2034031},
  doi          = {10.1109/JPROC.2009.2034031},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/ButlerFMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TraynorBEMB10,
  author       = {Patrick Traynor and
                  Kevin R. B. Butler and
                  William Enck and
                  Patrick D. McDaniel and
                  Kevin Borders},
  title        = {malnets: large-scale malicious networks \emph{via} compromised wireless
                  access points},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {2-3},
  pages        = {102--113},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.149},
  doi          = {10.1002/SEC.149},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/TraynorBEMB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HicksRCJM10,
  author       = {Boniface Hicks and
                  Sandra Julieta Rueda and
                  Luke St. Clair and
                  Trent Jaeger and
                  Patrick D. McDaniel},
  title        = {A logical specification and analysis for SELinux {MLS} policy},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {26:1--26:31},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805982},
  doi          = {10.1145/1805974.1805982},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HicksRCJM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McLaughlinPMDM10,
  author       = {Stephen E. McLaughlin and
                  Dmitry Podkuiko and
                  Sergei Miadzvezhanka and
                  Adam Delozier and
                  Patrick D. McDaniel},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Multi-vendor penetration testing in the advanced metering infrastructure},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {107--116},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920277},
  doi          = {10.1145/1920261.1920277},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/McLaughlinPMDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OngtangBM10,
  author       = {Machigar Ongtang and
                  Kevin R. B. Butler and
                  Patrick D. McDaniel},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Porscha: policy oriented secure content handling in Android},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {221--230},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920295},
  doi          = {10.1145/1920261.1920295},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/OngtangBM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ButlerMM10,
  author       = {Kevin R. B. Butler and
                  Stephen E. McLaughlin and
                  Patrick D. McDaniel},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Kells: a protection framework for portable data},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {231--240},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920296},
  doi          = {10.1145/1920261.1920296},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ButlerMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchiffmanMVJM10,
  author       = {Joshua Schiffman and
                  Thomas Moyer and
                  Hayawardh Vijayakumar and
                  Trent Jaeger and
                  Patrick D. McDaniel},
  editor       = {Adrian Perrig and
                  Radu Sion},
  title        = {Seeding clouds with trust anchors},
  booktitle    = {Proceedings of the 2nd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2010, Chicago, IL, USA, October 8, 2010},
  pages        = {43--46},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866835.1866843},
  doi          = {10.1145/1866835.1866843},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchiffmanMVJM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ButlerMM10,
  author       = {Kevin R. B. Butler and
                  Stephen E. McLaughlin and
                  Patrick D. McDaniel},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Protecting portable storage with host validation},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {651--653},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866386},
  doi          = {10.1145/1866307.1866386},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ButlerMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/TraynorSPMG10,
  author       = {Patrick Traynor and
                  Joshua Schiffman and
                  Thomas La Porta and
                  Patrick D. McDaniel and
                  Abhrajit Ghosh},
  title        = {Constructing Secure Localization Systems with Adjustable Granularity
                  Using Commodity Hardware},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5684072},
  doi          = {10.1109/GLOCOM.2010.5684072},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/TraynorSPMG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mss/ButlerMM10,
  author       = {Kevin R. B. Butler and
                  Stephen E. McLaughlin and
                  Patrick D. McDaniel},
  editor       = {Mohammed G. Khatib and
                  Xubin He and
                  Michael Factor},
  title        = {Disk-enabled authenticated encryption},
  booktitle    = {{IEEE} 26th Symposium on Mass Storage Systems and Technologies, {MSST}
                  2012, Lake Tahoe, Nevada, USA, May 3-7, 2010},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSST.2010.5496979},
  doi          = {10.1109/MSST.2010.5496979},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mss/ButlerMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/EnckGCCJMS10,
  author       = {William Enck and
                  Peter Gilbert and
                  Byung{-}Gon Chun and
                  Landon P. Cox and
                  Jaeyeon Jung and
                  Patrick D. McDaniel and
                  Anmol Sheth},
  editor       = {Remzi H. Arpaci{-}Dusseau and
                  Brad Chen},
  title        = {TaintDroid: An Information-Flow Tracking System for Realtime Privacy
                  Monitoring on Smartphones},
  booktitle    = {9th {USENIX} Symposium on Operating Systems Design and Implementation,
                  {OSDI} 2010, October 4-6, 2010, Vancouver, BC, Canada, Proceedings},
  pages        = {393--407},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/osdi10/tech/full\_papers/Enck.pdf},
  timestamp    = {Thu, 12 Mar 2020 11:35:55 +0100},
  biburl       = {https://dblp.org/rec/conf/osdi/EnckGCCJMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/HicksRKMSSMJ10,
  author       = {Boniface Hicks and
                  Sandra Julieta Rueda and
                  Dave King and
                  Thomas Moyer and
                  Joshua Schiffman and
                  Yogesh Sreenivasan and
                  Patrick D. McDaniel and
                  Trent Jaeger},
  editor       = {James B. D. Joshi and
                  Barbara Carminati},
  title        = {An architecture for enforcing end-to-end access control over web applications},
  booktitle    = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings},
  pages        = {163--172},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1809842.1809870},
  doi          = {10.1145/1809842.1809870},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/HicksRKMSSMJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/EhrenkranzLM10,
  author       = {Toby Ehrenkranz and
                  Jun Li and
                  Patrick D. McDaniel},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {Realizing a Source Authentic Internet},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {217--234},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_13},
  doi          = {10.1007/978-3-642-16161-2\_13},
  timestamp    = {Sun, 07 Jan 2018 16:52:46 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/EhrenkranzLM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapp/McDanielBMSZW10,
  author       = {Patrick D. McDaniel and
                  Kevin R. B. Butler and
                  Stephen E. McLaughlin and
                  Radu Sion and
                  Erez Zadok and
                  Marianne Winslett},
  editor       = {Margo I. Seltzer and
                  Wang{-}Chiew Tan},
  title        = {Towards a Secure and Efficient System for End-to-End Provenance},
  booktitle    = {2nd Workshop on the Theory and Practice of Provenance, TaPP'10, San
                  Jose, CA, USA, February 22, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/tapp-10/towards-secure-and-efficient-system-end-end-provenance},
  timestamp    = {Tue, 02 Feb 2021 08:04:56 +0100},
  biburl       = {https://dblp.org/rec/conf/tapp/McDanielBMSZW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/McLaughlinPDMM10,
  author       = {Stephen E. McLaughlin and
                  Dmitry Podkuiko and
                  Adam Delozier and
                  Sergei Miadzvezhanka and
                  Patrick D. McDaniel},
  editor       = {Wietse Z. Venema},
  title        = {Embedded Firmware Diversity for Smart Electric Meters},
  booktitle    = {5th {USENIX} Workshop on Hot Topics in Security, HotSec'10, Washington,
                  D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/hotsec10/embedded-firmware-diversity-smart-electric-meters},
  timestamp    = {Mon, 01 Feb 2021 08:43:16 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/McLaughlinPDMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/EnckOM09,
  author       = {William Enck and
                  Machigar Ongtang and
                  Patrick D. McDaniel},
  title        = {Understanding Android Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {7},
  number       = {1},
  pages        = {50--57},
  year         = {2009},
  url          = {https://doi.org/10.1109/MSP.2009.26},
  doi          = {10.1109/MSP.2009.26},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/EnckOM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McDanielM09,
  author       = {Patrick D. McDaniel and
                  Stephen E. McLaughlin},
  title        = {Security and Privacy Challenges in the Smart Grid},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {7},
  number       = {3},
  pages        = {75--77},
  year         = {2009},
  url          = {https://doi.org/10.1109/MSP.2009.76},
  doi          = {10.1109/MSP.2009.76},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McDanielM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/EnckMMSSSGSRA09,
  author       = {William Enck and
                  Thomas Moyer and
                  Patrick D. McDaniel and
                  Subhabrata Sen and
                  Panagiotis Sebos and
                  Sylke Spoerel and
                  Albert G. Greenberg and
                  Yu{-}Wei Eric Sung and
                  Sanjay G. Rao and
                  William Aiello},
  title        = {Configuration management at massive scale: system design and experience},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {27},
  number       = {3},
  pages        = {323--335},
  year         = {2009},
  url          = {https://doi.org/10.1109/JSAC.2009.090408},
  doi          = {10.1109/JSAC.2009.090408},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/EnckMMSSSGSRA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/TraynorEMP09,
  author       = {Patrick Traynor and
                  William Enck and
                  Patrick D. McDaniel and
                  Thomas La Porta},
  title        = {Mitigating attacks on open functionality in SMS-capable cellular networks},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {17},
  number       = {1},
  pages        = {40--53},
  year         = {2009},
  url          = {http://doi.acm.org/10.1145/1514070.1514074},
  doi          = {10.1145/1514070.1514074},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/TraynorEMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ButlerRTM09,
  author       = {Kevin R. B. Butler and
                  Sunam Ryu and
                  Patrick Traynor and
                  Patrick D. McDaniel},
  title        = {Leveraging Identity-Based Cryptography for Node {ID} Assignment in
                  Structured {P2P} Systems},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {20},
  number       = {12},
  pages        = {1803--1815},
  year         = {2009},
  url          = {https://doi.org/10.1109/TPDS.2008.249},
  doi          = {10.1109/TPDS.2008.249},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/ButlerRTM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/ChoiESMP09,
  author       = {Heesook Choi and
                  William Enck and
                  Jaesheung Shin and
                  Patrick D. McDaniel and
                  Thomas F. La Porta},
  title        = {{ASR:} anonymous and secure reporting of traffic forwarding activity
                  in mobile ad hoc networks},
  journal      = {Wirel. Networks},
  volume       = {15},
  number       = {4},
  pages        = {525--539},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11276-007-0067-0},
  doi          = {10.1007/S11276-007-0067-0},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/winet/ChoiESMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchiffmanMSJM09,
  author       = {Joshua Schiffman and
                  Thomas Moyer and
                  Christopher Shal and
                  Trent Jaeger and
                  Patrick D. McDaniel},
  title        = {Justifying Integrity Using a Virtual Machine Verifier},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {83--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.18},
  doi          = {10.1109/ACSAC.2009.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchiffmanMSJM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MoyerBSMJ09,
  author       = {Thomas Moyer and
                  Kevin R. B. Butler and
                  Joshua Schiffman and
                  Patrick D. McDaniel and
                  Trent Jaeger},
  title        = {Scalable Web Content Attestation},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {95--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.19},
  doi          = {10.1109/ACSAC.2009.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MoyerBSMJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OngtangMEM09,
  author       = {Machigar Ongtang and
                  Stephen E. McLaughlin and
                  William Enck and
                  Patrick D. McDaniel},
  title        = {Semantically Rich Application-Centric Security in Android},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {340--349},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.39},
  doi          = {10.1109/ACSAC.2009.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OngtangMEM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TraynorLORJMP09,
  author       = {Patrick Traynor and
                  Michael Lin and
                  Machigar Ongtang and
                  Vikhyath Rao and
                  Trent Jaeger and
                  Patrick D. McDaniel and
                  Thomas La Porta},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {On cellular botnets: measuring the impact of malicious devices on
                  a cellular network core},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {223--234},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653690},
  doi          = {10.1145/1653662.1653690},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TraynorLORJMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EnckOM09,
  author       = {William Enck and
                  Machigar Ongtang and
                  Patrick D. McDaniel},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {On lightweight mobile phone application certification},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {235--245},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653691},
  doi          = {10.1145/1653662.1653691},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/EnckOM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/McLaughlinPM09,
  author       = {Stephen E. McLaughlin and
                  Dmitry Podkuiko and
                  Patrick D. McDaniel},
  editor       = {Erich Rome and
                  Robin E. Bloomfield},
  title        = {Energy Theft in the Advanced Metering Infrastructure},
  booktitle    = {Critical Information Infrastructures Security, 4th International Workshop,
                  {CRITIS} 2009, Bonn, Germany, September 30 - October 2, 2009. Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6027},
  pages        = {176--187},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14379-3\_15},
  doi          = {10.1007/978-3-642-14379-3\_15},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/McLaughlinPM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BlazeM09,
  author       = {Matt Blaze and
                  Patrick D. McDaniel},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Below the Salt},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {24--27},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_4},
  doi          = {10.1007/978-3-642-36213-2\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BlazeM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/TraynorMP08,
  author       = {Patrick Traynor and
                  Patrick D. McDaniel and
                  Thomas La Porta},
  title        = {Security for Telecommunications Networks},
  series       = {Advances in Information Security},
  volume       = {40},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-72442-3},
  doi          = {10.1007/978-0-387-72442-3},
  isbn         = {978-0-387-72441-6},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/TraynorMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/TraynorEMP08,
  author       = {Patrick Traynor and
                  William Enck and
                  Patrick D. McDaniel and
                  Thomas La Porta},
  title        = {Exploiting open functionality in SMS-capable cellular networks},
  journal      = {J. Comput. Secur.},
  volume       = {16},
  number       = {6},
  pages        = {713--742},
  year         = {2008},
  url          = {https://doi.org/10.3233/JCS-2007-0308},
  doi          = {10.3233/JCS-2007-0308},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/TraynorEMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/TraynorCWHM08,
  author       = {Patrick Traynor and
                  Michael Chien and
                  Scott Weaver and
                  Boniface Hicks and
                  Patrick D. McDaniel},
  title        = {Noninvasive Methods for Host Certification},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {16:1--16:23},
  year         = {2008},
  url          = {https://doi.org/10.1145/1341731.1341737},
  doi          = {10.1145/1341731.1341737},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/TraynorCWHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/McDanielN08,
  author       = {Patrick D. McDaniel and
                  Bashar Nuseibeh},
  title        = {Guest Editors' Introduction: Special Section on Software Engineering
                  for Secure Systems},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {34},
  number       = {1},
  pages        = {3--4},
  year         = {2008},
  url          = {https://doi.org/10.1109/TSE.2008.10},
  doi          = {10.1109/TSE.2008.10},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/McDanielN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EnckMJ08,
  author       = {William Enck and
                  Patrick D. McDaniel and
                  Trent Jaeger},
  title        = {PinUP: Pinning User Files to Known Applications},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {55--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.41},
  doi          = {10.1109/ACSAC.2008.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EnckMJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EnckBRMS08,
  author       = {William Enck and
                  Kevin R. B. Butler and
                  Thomas Richardson and
                  Patrick D. McDaniel and
                  Adam D. Smith},
  title        = {Defending Against Attacks on Main Memory Persistence},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {65--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.45},
  doi          = {10.1109/ACSAC.2008.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EnckBRMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ButlerMM08,
  author       = {Kevin R. B. Butler and
                  Stephen E. McLaughlin and
                  Patrick D. McDaniel},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Rootkit-resistant disks},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {403--416},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455821},
  doi          = {10.1145/1455770.1455821},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ButlerMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/TraynorBEM08,
  author       = {Patrick Traynor and
                  Kevin R. B. Butler and
                  William Enck and
                  Patrick D. McDaniel},
  title        = {Realizing Massive-Scale Conditional Access Systems Through Attribute-Based
                  Cryptosystems},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/realizing-massive-scale-conditional-access-systems-through-attribute-based-cryptosystems/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/TraynorBEM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ButlerEHMTM08,
  author       = {Kevin R. B. Butler and
                  William Enck and
                  Harri Hursti and
                  Stephen E. McLaughlin and
                  Patrick Traynor and
                  Patrick D. McDaniel},
  editor       = {David L. Dill and
                  Tadayoshi Kohno},
  title        = {Systemic Issues in the Hart InterCivic and Premier Voting Systems:
                  Reflections on Project {EVEREST}},
  booktitle    = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July
                  28-29, 2008, San Jose, CA, USA, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/evt08/tech/full\_papers/butler/butler.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ButlerEHMTM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LootahEM07,
  author       = {Wesam Lootah and
                  William Enck and
                  Patrick D. McDaniel},
  title        = {{TARP:} Ticket-based address resolution protocol},
  journal      = {Comput. Networks},
  volume       = {51},
  number       = {15},
  pages        = {4322--4337},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comnet.2007.05.007},
  doi          = {10.1016/J.COMNET.2007.05.007},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LootahEM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ClairSJM07,
  author       = {Luke St. Clair and
                  Joshua Schiffman and
                  Trent Jaeger and
                  Patrick D. McDaniel},
  title        = {Establishing and Sustaining System Integrity via Root of Trust Installation},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {19--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.25},
  doi          = {10.1109/ACSAC.2007.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ClairSJM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HicksMM07,
  author       = {Boniface Hicks and
                  Tim Misiak and
                  Patrick D. McDaniel},
  title        = {Channels: Runtime System Infrastructure for Security-Typed Languages},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {443--452},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.35},
  doi          = {10.1109/ACSAC.2007.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HicksMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/RyuBTM07,
  author       = {Sunam Ryu and
                  Kevin R. B. Butler and
                  Patrick Traynor and
                  Patrick D. McDaniel},
  title        = {Leveraging Identity-Based Cryptography for Node {ID} Assignment in
                  Structured {P2P} Systems},
  booktitle    = {21st International Conference on Advanced Information Networking and
                  Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23,
                  2007, Niagara Falls, Canada},
  pages        = {519--524},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AINAW.2007.221},
  doi          = {10.1109/AINAW.2007.221},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/RyuBTM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EnckRSSCJM07,
  author       = {William Enck and
                  Sandra Julieta Rueda and
                  Joshua Schiffman and
                  Yogesh Sreenivasan and
                  Luke St. Clair and
                  Trent Jaeger and
                  Patrick D. McDaniel},
  editor       = {Peng Ning and
                  Vijay Atluri},
  title        = {Protecting users from "themselves"},
  booktitle    = {Proceedings of the 2007 {ACM} workshop on Computer Security Architecture,
                  {CSAW} 2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {29--36},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314466.1314472},
  doi          = {10.1145/1314466.1314472},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/EnckRSSCJM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ButlerMM07,
  author       = {Kevin R. B. Butler and
                  Stephen E. McLaughlin and
                  Patrick D. McDaniel},
  editor       = {Peng Ning and
                  Vijay Atluri},
  title        = {Non-volatile memory and disks: avenues for policy architectures},
  booktitle    = {Proceedings of the 2007 {ACM} workshop on Computer Security Architecture,
                  {CSAW} 2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {77--84},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314466.1314479},
  doi          = {10.1145/1314466.1314479},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ButlerMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ceas/JohansenRBM07,
  author       = {Lisa Johansen and
                  Michael Rowell and
                  Kevin R. B. Butler and
                  Patrick D. McDaniel},
  title        = {Email Communities of Interest},
  booktitle    = {{CEAS} 2007 - The Fourth Conference on Email and Anti-Spam, 2-3 August
                  2007, Mountain View, California, {USA}},
  year         = {2007},
  url          = {http://www.ceas.cc/2007/accepted.html\#Paper-59},
  timestamp    = {Mon, 01 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ceas/JohansenRBM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/QiuMM07,
  author       = {Sophie Y. Qiu and
                  Patrick D. McDaniel and
                  Fabian Monrose},
  title        = {Toward Valley-Free Inter-domain Routing},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007},
  pages        = {2009--2016},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICC.2007.334},
  doi          = {10.1109/ICC.2007.334},
  timestamp    = {Tue, 19 Jun 2018 07:53:33 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/QiuMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BapatBM07,
  author       = {Dhananjay Bapat and
                  Kevin R. B. Butler and
                  Patrick D. McDaniel},
  editor       = {Patrick D. McDaniel and
                  Shyam K. Gupta},
  title        = {Towards Automated Privilege Separation},
  booktitle    = {Information Systems Security, Third International Conference, {ICISS}
                  2007, Delhi, India, December 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {272--276},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77086-2\_24},
  doi          = {10.1007/978-3-540-77086-2\_24},
  timestamp    = {Thu, 05 Jan 2023 17:10:29 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/BapatBM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/RowaihyEMP07,
  author       = {Hosam Rowaihy and
                  William Enck and
                  Patrick D. McDaniel and
                  Thomas La Porta},
  title        = {Limiting Sybil Attacks in Structured {P2P} Networks},
  booktitle    = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  6-12 May 2007, Anchorage, Alaska, {USA}},
  pages        = {2596--2600},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/INFCOM.2007.328},
  doi          = {10.1109/INFCOM.2007.328},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/RowaihyEMP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/SriramanBMR07,
  author       = {Anusha Sriraman and
                  Kevin R. B. Butler and
                  Patrick D. McDaniel and
                  Padma Raghavan},
  title        = {Analysis of the IPv4 Address Space Delegation Structure},
  booktitle    = {Proceedings of the 12th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2007), July 1-4, Aveiro, Portugal},
  pages        = {501--508},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISCC.2007.4381538},
  doi          = {10.1109/ISCC.2007.4381538},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/SriramanBMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/HicksKM07,
  author       = {Boniface Hicks and
                  Dave King and
                  Patrick D. McDaniel},
  editor       = {Michael W. Hicks},
  title        = {Jifclipse: development tools for security-typed languages},
  booktitle    = {Proceedings of the 2007 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2007, San Diego, California, USA, June 14, 2007},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1255329.1255331},
  doi          = {10.1145/1255329.1255331},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/HicksKM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/HicksRCJM07,
  author       = {Boniface Hicks and
                  Sandra Julieta Rueda and
                  Luke St. Clair and
                  Trent Jaeger and
                  Patrick D. McDaniel},
  editor       = {Volkmar Lotz and
                  Bhavani Thuraisingham},
  title        = {A logical specification and analysis for SELinux {MLS} policy},
  booktitle    = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings},
  pages        = {91--100},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1266840.1266854},
  doi          = {10.1145/1266840.1266854},
  timestamp    = {Wed, 29 Jun 2022 15:37:42 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/HicksRCJM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/ChoiMP07,
  author       = {Heesook Choi and
                  Patrick D. McDaniel and
                  Thomas F. La Porta},
  title        = {Privacy Preserving Communication in MANETs},
  booktitle    = {Proceedings of the Fourth Annual {IEEE} Communications Society Conference
                  on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2007,
                  Merged with {IEEE} International Workshop on Wireless Ad-hoc and Sensor
                  Networks (IWWAN), June 18-21, 2007, San Diego, California, {USA}},
  pages        = {233--242},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/SAHCN.2007.4292835},
  doi          = {10.1109/SAHCN.2007.4292835},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/ChoiMP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/EnckMSSSGRA07,
  author       = {William Enck and
                  Patrick D. McDaniel and
                  Subhabrata Sen and
                  Panagiotis Sebos and
                  Sylke Spoerel and
                  Albert G. Greenberg and
                  Sanjay G. Rao and
                  William Aiello},
  editor       = {Jeff Chase and
                  Srinivasan Seshan},
  title        = {Configuration Management at Massive Scale: System Design and Experience},
  booktitle    = {Proceedings of the 2007 {USENIX} Annual Technical Conference, Santa
                  Clara, CA, USA, June 17-22, 2007},
  pages        = {73--86},
  publisher    = {{USENIX}},
  year         = {2007},
  url          = {http://www.usenix.org/events/usenix07/tech/enck.html},
  timestamp    = {Mon, 01 Feb 2021 08:43:36 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/EnckMSSSGRA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/HicksRJM07,
  author       = {Boniface Hicks and
                  Sandra Julieta Rueda and
                  Trent Jaeger and
                  Patrick D. McDaniel},
  editor       = {Jeff Chase and
                  Srinivasan Seshan},
  title        = {From Trusted to Secure: Building and Executing Applications That Enforce
                  System Security},
  booktitle    = {Proceedings of the 2007 {USENIX} Annual Technical Conference, Santa
                  Clara, CA, USA, June 17-22, 2007},
  pages        = {205--218},
  publisher    = {{USENIX}},
  year         = {2007},
  url          = {http://www.usenix.org/events/usenix07/tech/hicks.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/HicksRJM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/McDaniel07,
  author       = {Patrick D. McDaniel},
  editor       = {Niels Provos},
  title        = {On Attack Causality in Internet-Connected Cellular Networks},
  booktitle    = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA,
                  August 6-10, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/16th-usenix-security-symposium/attack-causality-internet-connected-cellular-networks},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/McDaniel07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2007,
  editor       = {Patrick D. McDaniel and
                  Shyam K. Gupta},
  title        = {Information Systems Security, Third International Conference, {ICISS}
                  2007, Delhi, India, December 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77086-2},
  doi          = {10.1007/978-3-540-77086-2},
  isbn         = {978-3-540-77085-5},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/McDanielABI06,
  author       = {Patrick D. McDaniel and
                  William Aiello and
                  Kevin R. B. Butler and
                  John Ioannidis},
  title        = {Origin authentication in interdomain routing},
  journal      = {Comput. Networks},
  volume       = {50},
  number       = {16},
  pages        = {2953--2980},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comnet.2005.11.007},
  doi          = {10.1016/J.COMNET.2005.11.007},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/McDanielABI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/PirrettiZVMKB06,
  author       = {Matthew Pirretti and
                  Sencun Zhu and
                  Narayanan Vijaykrishnan and
                  Patrick D. McDaniel and
                  Mahmut T. Kandemir and
                  Richard R. Brooks},
  title        = {The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods
                  of Defense},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {2},
  number       = {3},
  pages        = {267--287},
  year         = {2006},
  url          = {https://doi.org/10.1080/15501320600642718},
  doi          = {10.1080/15501320600642718},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/PirrettiZVMKB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/McDanielP06,
  author       = {Patrick D. McDaniel and
                  Atul Prakash},
  title        = {Enforcing provisioning and authorization policy in the Antigone system},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {6},
  pages        = {483--511},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14601},
  doi          = {10.3233/JCS-2006-14601},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/McDanielP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/McDanielP06,
  author       = {Patrick D. McDaniel and
                  Atul Prakash},
  title        = {Methods and limitations of security policy reconciliation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {259--291},
  year         = {2006},
  url          = {https://doi.org/10.1145/1178618.1178620},
  doi          = {10.1145/1178618.1178620},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/McDanielP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HicksAM06,
  author       = {Boniface Hicks and
                  Kiyan Ahmadizadeh and
                  Patrick D. McDaniel},
  title        = {From Languages to Systems: Understanding Practical Application Development
                  in Security-typed Languages},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {153--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.30},
  doi          = {10.1109/ACSAC.2006.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HicksAM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PirrettiTMW06,
  author       = {Matthew Pirretti and
                  Patrick Traynor and
                  Patrick D. McDaniel and
                  Brent Waters},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Secure attribute-based systems},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {99--112},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180419},
  doi          = {10.1145/1180405.1180419},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PirrettiTMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ButlerA06,
  author       = {Kevin R. B. Butler and
                  Patrick D. McDaniel and
                  William Aiello},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Optimizing {BGP} security by exploiting path stability},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {298--310},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180442},
  doi          = {10.1145/1180405.1180442},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ButlerA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ClairJEPTMJ06,
  author       = {Luke St. Clair and
                  Lisa Johansen and
                  William Enck and
                  Matthew Pirretti and
                  Patrick Traynor and
                  Patrick D. McDaniel and
                  Trent Jaeger},
  editor       = {Aditya Bagchi and
                  Vijayalakshmi Atluri},
  title        = {Password Exhaustion: Predicting the End of Password Usefulness},
  booktitle    = {Information Systems Security, Second International Conference, {ICISS}
                  2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {37--55},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11961635\_3},
  doi          = {10.1007/11961635\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/ClairJEPTMJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ButlerEPTM06,
  author       = {Kevin R. B. Butler and
                  William Enck and
                  Jennifer Plasterr and
                  Patrick Traynor and
                  Patrick D. McDaniel},
  editor       = {Aditya Bagchi and
                  Vijayalakshmi Atluri},
  title        = {Privacy Preserving Web-Based Email},
  booktitle    = {Information Systems Security, Second International Conference, {ICISS}
                  2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {116--131},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11961635\_8},
  doi          = {10.1007/11961635\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/ButlerEPTM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/QiuMMR06,
  author       = {Sophie Y. Qiu and
                  Patrick D. McDaniel and
                  Fabian Monrose and
                  Aviel D. Rubin},
  editor       = {Paolo Bellavista and
                  Chi{-}Ming Chen and
                  Antonio Corradi and
                  Mahmoud Daneshmand},
  title        = {Characterizing Address Use Structure and Stability of Origin Advertisement
                  in Inter-domain Routing},
  booktitle    = {Proceedings of the 11th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2006), 26-29 June 2006, Cagliari, Sardinia, Italy},
  pages        = {489--496},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISCC.2006.48},
  doi          = {10.1109/ISCC.2006.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/QiuMMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/TraynorEMP06,
  author       = {Patrick Traynor and
                  William Enck and
                  Patrick D. McDaniel and
                  Thomas La Porta},
  editor       = {Mario Gerla and
                  Chiara Petrioli and
                  Ramachandran Ramjee},
  title        = {Mitigating attacks on open functionality in SMS-capable cellular networks},
  booktitle    = {Proceedings of the 12th Annual International Conference on Mobile
                  Computing and Networking, {MOBICOM} 2006, Los Angeles, CA, USA, September
                  23-29, 2006},
  pages        = {182--193},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161089.1161111},
  doi          = {10.1145/1161089.1161111},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/TraynorEMP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/McDanielSSMAK06,
  author       = {Patrick D. McDaniel and
                  Subhabrata Sen and
                  Oliver Spatscheck and
                  Jacobus E. van der Merwe and
                  William Aiello and
                  Charles R. Kalmanek},
  title        = {Enterprise Security: {A} Community of Interest Based Approach},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2006, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2006},
  url          = {https://www.ndss-symposium.org/ndss2006/enterprise-security-community-interest-based-approach/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/McDanielSSMAK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/HicksKMH06,
  author       = {Boniface Hicks and
                  Dave King and
                  Patrick D. McDaniel and
                  Michael Hicks},
  editor       = {Vugranam C. Sreedhar and
                  Steve Zdancewic},
  title        = {Trusted declassification: : high-level policy for a security-typed
                  language},
  booktitle    = {Proceedings of the 2006 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2006, Ottawa, Ontario, Canada, June 10, 2006},
  pages        = {65--74},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1134744.1134757},
  doi          = {10.1145/1134744.1134757},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/HicksKMH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/TraynorCWHM06,
  author       = {Patrick Traynor and
                  Michael Chien and
                  Scott Weaver and
                  Boniface Hicks and
                  Patrick D. McDaniel},
  title        = {Non-Invasive Methods for Host Certification},
  booktitle    = {Second International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
                  2, 2006 - September 1, 2006},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECCOMW.2006.359539},
  doi          = {10.1109/SECCOMW.2006.359539},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/TraynorCWHM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/storagess/ChaitanyaBSMV06,
  author       = {Shiva Chaitanya and
                  Kevin R. B. Butler and
                  Anand Sivasubramaniam and
                  Patrick D. McDaniel and
                  Murali Vilayannur},
  editor       = {Ethan L. Miller and
                  Erez Zadok},
  title        = {Design, implementation and evaluation of security in iSCSI-based network
                  storage systems},
  booktitle    = {Proceedings of the 2006 {ACM} Workshop On Storage Security And Survivability,
                  StorageSS 2006, Alexandria, VA, USA, October 30, 2006},
  pages        = {17--28},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179559.1179564},
  doi          = {10.1145/1179559.1179564},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/storagess/ChaitanyaBSMV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JaegerMCCS06,
  author       = {Trent Jaeger and
                  Patrick D. McDaniel and
                  Luke St. Clair and
                  Ram{\'{o}}n C{\'{a}}ceres and
                  Reiner Sailer},
  title        = {Shame on Trust in Distributed Systems},
  booktitle    = {1st {USENIX} Workshop on Hot Topics in Security, HotSec'06, Vancouver,
                  BC, Canada, July 31, 2006},
  publisher    = {{USENIX} Association},
  year         = {2006},
  url          = {https://www.usenix.org/conference/hotsec-06/shame-trust-distributed-systems},
  timestamp    = {Mon, 01 Feb 2021 08:43:09 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JaegerMCCS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/McDanielR05,
  author       = {Patrick D. McDaniel and
                  Aviel D. Rubin},
  title        = {Web security},
  journal      = {Comput. Networks},
  volume       = {48},
  number       = {5},
  pages        = {697--699},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.comnet.2005.02.001},
  doi          = {10.1016/J.COMNET.2005.02.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/McDanielR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LootahEM05,
  author       = {Wesam Lootah and
                  William Enck and
                  Patrick D. McDaniel},
  title        = {{TARP:} Ticket-based Address Resolution Protocol},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {106--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.55},
  doi          = {10.1109/CSAC.2005.55},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LootahEM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EnckTMP05,
  author       = {William Enck and
                  Patrick Traynor and
                  Patrick D. McDaniel and
                  Thomas F. La Porta},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Exploiting open functionality in SMS-capable cellular networks},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {393--404},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102171},
  doi          = {10.1145/1102120.1102171},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/EnckTMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JhaKM05,
  author       = {Somesh Jha and
                  Louis Kruger and
                  Patrick D. McDaniel},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Privacy Preserving Clustering},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {397--417},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_23},
  doi          = {10.1007/11555827\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/JhaKM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ButlerM05,
  author       = {Kevin R. B. Butler and
                  Patrick D. McDaniel},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Understanding Mutable Internet Pathogens, or How {I} Learned to Stop
                  Worrying and Love Parasitic Behavior},
  booktitle    = {Information Systems Security, First International Conference, {ICISS}
                  2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {36--48},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593980\_3},
  doi          = {10.1007/11593980\_3},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/ButlerM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iqis/Al-LawatiLM05,
  author       = {Ali Al{-}Lawati and
                  Dongwon Lee and
                  Patrick D. McDaniel},
  editor       = {Laure Berti{-}{\'{E}}quille and
                  Carlo Batini and
                  Divesh Srivastava},
  title        = {Blocking-aware private record linkage},
  booktitle    = {{IQIS} 2005, International Workshop on Information Quality in Information
                  Systems, 17 June 2005, Baltimore, Maryland, {USA} {(SIGMOD} 2005 Workshop)},
  pages        = {59--68},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1077501.1077513},
  doi          = {10.1145/1077501.1077513},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iqis/Al-LawatiLM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/ChoiESMP05,
  author       = {Heesook Choi and
                  William Enck and
                  Jaesheung Shin and
                  Patrick D. McDaniel and
                  Thomas F. La Porta},
  title        = {Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks},
  booktitle    = {2nd Annual International Conference on Mobile and Ubiquitous Systems
                  (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, {USA}},
  pages        = {12--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/MOBIQUITOUS.2005.53},
  doi          = {10.1109/MOBIQUITOUS.2005.53},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/ChoiESMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/AielloKMSSM05,
  author       = {William Aiello and
                  Charles R. Kalmanek and
                  Patrick D. McDaniel and
                  Subhabrata Sen and
                  Oliver Spatscheck and
                  Jacobus E. van der Merwe},
  editor       = {Constantinos Dovrolis},
  title        = {Analysis of Communities of Interest in Data Networks},
  booktitle    = {Passive and Active Network Measurement, 6th International Workshop,
                  {PAM} 2005, Boston, MA, USA, March 31 - April 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3431},
  pages        = {83--96},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31966-5\_7},
  doi          = {10.1007/978-3-540-31966-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/AielloKMSSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2005,
  editor       = {Patrick D. McDaniel},
  title        = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD,
                  USA, July 31 - August 5, 2005},
  publisher    = {{USENIX} Association},
  year         = {2005},
  url          = {https://www.usenix.org/legacy/publications/library/proceedings/sec05/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/McDaniel05,
  author       = {Patrick D. McDaniel},
  editor       = {Henk C. A. van Tilborg},
  title        = {IPsec},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_209},
  doi          = {10.1007/0-387-23483-7\_209},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/McDaniel05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/McDaniel05a,
  author       = {Patrick D. McDaniel},
  editor       = {Henk C. A. van Tilborg},
  title        = {Policy},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_305},
  doi          = {10.1007/0-387-23483-7\_305},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/McDaniel05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/ByersCKM04,
  author       = {Simon D. Byers and
                  Lorrie Faith Cranor and
                  David P. Kormann and
                  Patrick D. McDaniel},
  editor       = {David M. Martin Jr. and
                  Andrei Serjantov},
  title        = {Searching for Privacy: Design and Implementation of a P3P-Enabled
                  Search Engine},
  booktitle    = {Privacy Enhancing Technologies, 4th International Workshop, {PET}
                  2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3424},
  pages        = {314--328},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11423409\_20},
  doi          = {10.1007/11423409\_20},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/ByersCKM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/WangJLM04,
  author       = {Hao Wang and
                  Somesh Jha and
                  Miron Livny and
                  Patrick D. McDaniel},
  title        = {Security Policy Reconciliation in Distributed Computing Environments},
  booktitle    = {5th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2004), 7-9 June 2004, Yorktown Heights, NY,
                  {USA}},
  pages        = {137},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/POLICY.2004.1309160},
  doi          = {10.1109/POLICY.2004.1309160},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/WangJLM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2004ccs,
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  publisher    = {{ACM}},
  year         = {2004},
  isbn         = {1-58113-961-6},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2004ccs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CroninJMM03,
  author       = {Eric Cronin and
                  Sugih Jamin and
                  Tal Malkin and
                  Patrick D. McDaniel},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {On the performance, feasibility, and use of forward-secure signatures},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {131--144},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948130},
  doi          = {10.1145/948109.948130},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CroninJMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AielloIM03,
  author       = {William Aiello and
                  John Ioannidis and
                  Patrick D. McDaniel},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Origin authentication in interdomain routing},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {165--178},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948133},
  doi          = {10.1145/948109.948133},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AielloIM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/discex/IrrerPM03,
  author       = {Jim Irrer and
                  Atul Prakash and
                  Patrick D. McDaniel},
  title        = {Antigone: Policy-based Secure Group Communication System and AMirD:
                  Antigone-based Secure File Mirroring System},
  booktitle    = {3rd {DARPA} Information Survivability Conference and Exposition {(DISCEX-III}
                  2003), 22-24 April 2003, Washington, DC, {USA}},
  pages        = {44--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DISCEX.2003.1194910},
  doi          = {10.1109/DISCEX.2003.1194910},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/discex/IrrerPM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/discex/McDanielP03,
  author       = {Patrick D. McDaniel and
                  Atul Prakash},
  title        = {A Flexible Architecture for Security Policy Enforcement},
  booktitle    = {3rd {DARPA} Information Survivability Conference and Exposition {(DISCEX-III}
                  2003), 22-24 April 2003, Washington, DC, {USA}},
  pages        = {234--239},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DISCEX.2003.1194971},
  doi          = {10.1109/DISCEX.2003.1194971},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/discex/McDanielP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/ByersCKMC03,
  author       = {Simon D. Byers and
                  Lorrie Faith Cranor and
                  David P. Kormann and
                  Patrick D. McDaniel and
                  Eric Cronin},
  editor       = {Moti Yung},
  title        = {Analysis of security vulnerabilities in the movie production and distribution
                  process},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947383},
  doi          = {10.1145/947380.947383},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/ByersCKMC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GoodellAGIMR03,
  author       = {Geoffrey Goodell and
                  William Aiello and
                  Timothy Griffin and
                  John Ioannidis and
                  Patrick D. McDaniel and
                  Aviel D. Rubin},
  title        = {Working around {BGP:} An Incremental Approach to Improving Security
                  and Accuracy in Interdomain Routing},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2003, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2003},
  url          = {https://www.ndss-symposium.org/ndss2003/working-around-bgp-incremental-approach-improving-security-and-accuracy-interdomain-routing/},
  timestamp    = {Mon, 01 Feb 2021 08:42:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GoodellAGIMR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/McDaniel03,
  author       = {Patrick D. McDaniel},
  editor       = {Elena Ferrari and
                  David F. Ferraiolo},
  title        = {On context in authorization policy},
  booktitle    = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings},
  pages        = {80--89},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/775412.775422},
  doi          = {10.1145/775412.775422},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/McDaniel03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/McDanielP02,
  author       = {Patrick D. McDaniel and
                  Atul Prakash},
  title        = {Methods and Limitations of Security Policy Reconciliation},
  booktitle    = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 12-15, 2002},
  pages        = {73--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/SECPRI.2002.1004363},
  doi          = {10.1109/SECPRI.2002.1004363},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/McDanielP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/McDaniel01,
  author       = {Patrick D. McDaniel},
  title        = {*Policy management in secure group communication},
  school       = {University of Michigan, {USA}},
  year         = {2001},
  url          = {http://hdl.handle.net/2027.42/128200},
  timestamp    = {Thu, 12 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/McDaniel01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HarneyCM01,
  author       = {Hugh Harney and
                  Andrea Colgrove and
                  Patrick D. McDaniel},
  title        = {Principles of Policy in Secure Groups},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2001, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2001},
  url          = {https://www.ndss-symposium.org/ndss2001/principles-policy-secure-groups/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/HarneyCM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/McDanielR00,
  author       = {Patrick D. McDaniel and
                  Aviel D. Rubin},
  editor       = {Yair Frankel},
  title        = {A Response to ''Can We Eliminate Certificate Revocation Lists?''},
  booktitle    = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla,
                  British West Indies, February 20-24, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1962},
  pages        = {245--258},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45472-1\_17},
  doi          = {10.1007/3-540-45472-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/McDanielR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/McDanielJ00,
  author       = {Patrick D. McDaniel and
                  Sugih Jamin},
  title        = {Windowed Certificate Revocation},
  booktitle    = {Proceedings {IEEE} {INFOCOM} 2000, The Conference on Computer Communications,
                  Nineteenth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, Reaching the Promised Land of Communications, Tel Aviv,
                  Israel, March 26-30, 2000},
  pages        = {1406--1414},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/INFCOM.2000.832538},
  doi          = {10.1109/INFCOM.2000.832538},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/McDanielJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/AdamsonACMR99,
  author       = {William A. Adamson and
                  Charles J. Antonelli and
                  Kevin Coffman and
                  Patrick D. McDaniel and
                  Jim Rees},
  editor       = {Bart Preneel},
  title        = {Secure Distributed Virtual Conferencing},
  booktitle    = {Secure Information Networks: Communications and Multimedia Security,
                  {IFIP} {TC6/TC11} Joint Working Conference on Communications and Multimedia
                  Security {(CMS} '99), September 20-21, 1999, Leuven, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {152},
  pages        = {176--190},
  publisher    = {Kluwer},
  year         = {1999},
  timestamp    = {Thu, 17 Nov 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cms/AdamsonACMR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/McDanielPH99,
  author       = {Patrick D. McDaniel and
                  Atul Prakash and
                  Peter Honeyman},
  editor       = {G. Winfield Treese},
  title        = {Antigone: {A} Flexible Framework for Secure Group Communication},
  booktitle    = {Proceedings of the 8th {USENIX} Security Symposium, Washington, DC,
                  USA, August 23-26, 1999},
  publisher    = {{USENIX} Association},
  year         = {1999},
  url          = {https://www.usenix.org/conference/8th-usenix-security-symposium/antigone-flexible-framework-secure-group-communication},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/McDanielPH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics