Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Patrick Drew McDaniel
Patrick McDaniel
2010 – today
- 2012
[j27]
[j26]Machigar Ongtang, Stephen E. McLaughlin, William Enck, Patrick McDaniel: Semantically rich application-centric security in Android. Security and Communication Networks 5(6): 658-673 (2012)
[j25]Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman, Patrick McDaniel, Trent Jaeger: Scalable Web Content Attestation. IEEE Trans. Computers 61(5): 686-699 (2012)
[c77]Devin J. Pohly, Stephen E. McLaughlin, Patrick McDaniel, Kevin R. B. Butler: Hi-Fi: collecting high-fidelity whole-system provenance. ACSAC 2012: 259-268
[c76]
[c75]Weining Yang, Ninghui Li, Yuan Qi, Wahbeh H. Qardaji, Stephen E. McLaughlin, Patrick McDaniel: Minimizing private data disclosures in the smart grid. ACM Conference on Computer and Communications Security 2012: 415-427
[c74]Stephen E. McLaughlin, Patrick McDaniel: SABOT: specification-based payload generation for programmable logic controllers. ACM Conference on Computer and Communications Security 2012: 439-449
[c73]Eun-Kyoung Kim, Patrick McDaniel, Thomas F. La Porta: A Detection Mechanism for SMS Flooding Attacks in Cellular Networks. SecureComm 2012: 76-93
[c72]Damien Octeau, Somesh Jha, Patrick McDaniel: Retargeting Android applications to Java bytecode. SIGSOFT FSE 2012: 6- 2011
[j24]Joshua Schiffman, Thomas Moyer, Trent Jaeger, Patrick McDaniel: Network-Based Root of Trust for Installation. IEEE Security & Privacy 9(1): 40-48 (2011)
[j23]
[j22]Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, Thomas F. La Porta: From mobile phones to responsible devices. Security and Communication Networks 4(6): 719-726 (2011)
[c71]Stephen E. McLaughlin, Patrick McDaniel, William Aiello: Protecting consumer privacy from electric load monitoring. ACM Conference on Computer and Communications Security 2011: 87-98
[c70]William Enck, Damien Octeau, Patrick McDaniel, Swarat Chaudhuri: A Study of Android Application Security. USENIX Security Symposium 2011- 2010
[j21]Kevin R. B. Butler, Stephen E. McLaughlin, Thomas Moyer, Patrick McDaniel: New Security Architectures Based on Emerging Disk Functionality. IEEE Security & Privacy 8(5): 34-41 (2010)
[j20]Patrick McDaniel, William Enck: Not So Great Expectations: Why Application Markets Haven't Failed Security. IEEE Security & Privacy 8(5): 76-78 (2010)
[j19]Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Brent Waters: Secure attribute-based systems. Journal of Computer Security 18(5): 799-837 (2010)
[j18]Kevin R. B. Butler, Toni R. Farley, Patrick McDaniel, Jennifer Rexford: A Survey of BGP Security Issues and Solutions. Proceedings of the IEEE 98(1): 100-122 (2010)
[j17]Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick McDaniel, Kevin Borders: malnets: large-scale malicious networks via compromised wireless access points. Security and Communication Networks 3(2-3): 102-113 (2010)
[j16]Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, Patrick McDaniel: A logical specification and analysis for SELinux MLS policy. ACM Trans. Inf. Syst. Secur. 13(3) (2010)
[c69]Stephen E. McLaughlin, Dmitry Podkuiko, Sergei Miadzvezhanka, Adam Delozier, Patrick Drew McDaniel: Multi-vendor penetration testing in the advanced metering infrastructure. ACSAC 2010: 107-116
[c68]Machigar Ongtang, Kevin R. B. Butler, Patrick Drew McDaniel: Porscha: policy oriented secure content handling in Android. ACSAC 2010: 221-230
[c67]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick Drew McDaniel: Kells: a protection framework for portable data. ACSAC 2010: 231-240
[c66]Joshua Schiffman, Thomas Moyer, Hayawardh Vijayakumar, Trent Jaeger, Patrick McDaniel: Seeding clouds with trust anchors. CCSW 2010: 43-46
[c65]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick Drew McDaniel: Protecting portable storage with host validation. ACM Conference on Computer and Communications Security 2010: 651-653
[c64]Patrick Traynor, Joshua Schiffman, Thomas F. La Porta, Patrick McDaniel, Abhrajit Ghosh: Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware. GLOBECOM 2010: 1-6
[c63]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick McDaniel: Disk-enabled authenticated encryption. MSST 2010: 1-6
[c62]William Enck, Peter Gilbert, Byung-gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, Anmol Sheth: TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. OSDI 2010: 393-407
[c61]Boniface Hicks, Sandra Rueda, Dave King, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick McDaniel, Trent Jaeger: An architecture for enforcing end-to-end access control over web applications. SACMAT 2010: 163-172
[c60]Toby Ehrenkranz, Jun Li, Patrick McDaniel: Realizing a Source Authentic Internet. SecureComm 2010: 217-234
2000 – 2009
- 2009
[j15]William Enck, Machigar Ongtang, Patrick Drew McDaniel: Understanding Android Security. IEEE Security & Privacy 7(1): 50-57 (2009)
[j14]Patrick Drew McDaniel, Stephen E. McLaughlin: Security and Privacy Challenges in the Smart Grid. IEEE Security & Privacy 7(3): 75-77 (2009)
[j13]William Enck, Thomas Moyer, Patrick McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert G. Greenberg, Yu-Wei Eric Sung, Sanjay G. Rao, William Aiello: Configuration management at massive scale: system design and experience. IEEE Journal on Selected Areas in Communications 27(3): 323-335 (2009)
[j12]Patrick Traynor, William Enck, Patrick McDaniel, Thomas F. La Porta: Mitigating attacks on open functionality in SMS-capable cellular networks. IEEE/ACM Trans. Netw. 17(1): 40-53 (2009)
[j11]Kevin R. B. Butler, Sunam Ryu, Patrick Traynor, Patrick Drew McDaniel: Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. IEEE Trans. Parallel Distrib. Syst. 20(12): 1803-1815 (2009)
[j10]Heesook Choi, William Enck, Jaesheung Shin, Patrick Drew McDaniel, Thomas F. La Porta: ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks. Wireless Networks 15(4): 525-539 (2009)
[c59]Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger, Patrick Drew McDaniel: Justifying Integrity Using a Virtual Machine Verifier. ACSAC 2009: 83-92
[c58]Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman, Patrick Drew McDaniel, Trent Jaeger: Scalable Web Content Attestation. ACSAC 2009: 95-104
[c57]Machigar Ongtang, Stephen E. McLaughlin, William Enck, Patrick Drew McDaniel: Semantically Rich Application-Centric Security in Android. ACSAC 2009: 340-349
[c56]Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick Drew McDaniel, Thomas F. La Porta: On cellular botnets: measuring the impact of malicious devices on a cellular network core. ACM Conference on Computer and Communications Security 2009: 223-234
[c55]William Enck, Machigar Ongtang, Patrick Drew McDaniel: On lightweight mobile phone application certification. ACM Conference on Computer and Communications Security 2009: 235-245
[c54]Stephen E. McLaughlin, Dmitry Podkuiko, Patrick McDaniel: Energy Theft in the Advanced Metering Infrastructure. CRITIS 2009: 176-187
[c53]- 2008
[b1]Patrick Traynor, Patrick McDaniel, Thomas F. La Porta: Security for Telecommunications Networks. Advances in Information Security 40, Springer 2008, ISBN 978-0-387-72441-6, pp. 1-162
[j9]Patrick Traynor, William Enck, Patrick McDaniel, Thomas F. La Porta: Exploiting open functionality in SMS-capable cellular networks. Journal of Computer Security 16(6): 713-742 (2008)
[j8]Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick McDaniel: Noninvasive Methods for Host Certification. ACM Trans. Inf. Syst. Secur. 11(3) (2008)
[j7]Patrick McDaniel, Bashar Nuseibeh: Guest Editors' Introduction: Special Section on Software Engineering for Secure Systems. IEEE Trans. Software Eng. 34(1): 3-4 (2008)
[c52]William Enck, Patrick Drew McDaniel, Trent Jaeger: PinUP: Pinning User Files to Known Applications. ACSAC 2008: 55-64
[c51]William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick Drew McDaniel, Adam Smith: Defending Against Attacks on Main Memory Persistence. ACSAC 2008: 65-74
[c50]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick Drew McDaniel: Rootkit-resistant disks. ACM Conference on Computer and Communications Security 2008: 403-416
[c49]Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick McDaniel: Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. NDSS 2008
[c48]Kevin R. B. Butler, William Enck, Harri Hursti, Stephen E. McLaughlin, Patrick Traynor, Patrick McDaniel: Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST. EVT 2008- 2007
[j6]Wesam Lootah, William Enck, Patrick McDaniel: TARP: Ticket-based address resolution protocol. Computer Networks 51(15): 4322-4337 (2007)
[c47]Luke St. Clair, Joshua Schiffman, Trent Jaeger, Patrick McDaniel: Establishing and Sustaining System Integrity via Root of Trust Installation. ACSAC 2007: 19-29
[c46]Boniface Hicks, Tim Misiak, Patrick McDaniel: Channels: Runtime System Infrastructure for Security-Typed Languages. ACSAC 2007: 443-452
[c45]Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Patrick Drew McDaniel: Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. AINA Workshops (1) 2007: 519-524
[c44]William Enck, Sandra Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger, Patrick McDaniel: Protecting users from "themselves". CSAW 2007: 29-36
[c43]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick Drew McDaniel: Non-volatile memory and disks: avenues for policy architectures. CSAW 2007: 77-84
[c42]Lisa Johansen, Michael Rowell, Kevin R. B. Butler, Patrick Drew McDaniel: Email Communities of Interest. CEAS 2007
[c41]Sophie Y. Qiu, Patrick Drew McDaniel, Fabian Monrose: Toward Valley-Free Inter-domain Routing. ICC 2007: 2009-2016
[c40]Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew McDaniel: Towards Automated Privilege Separation. ICISS 2007: 272-276
[c39]Hosam Rowaihy, William Enck, Patrick McDaniel, Tom La Porta: Limiting Sybil Attacks in Structured P2P Networks. INFOCOM 2007: 2596-2600
[c38]Anusha Sriraman, Kevin R. B. Butler, Patrick Drew McDaniel, Padma Raghavan: Analysis of the IPv4 Address Space Delegation Structure. ISCC 2007: 501-508
[c37]Boniface Hicks, Dave King, Patrick McDaniel: Jifclipse: development tools for security-typed languages. PLAS 2007: 1-10
[c36]Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, Patrick Drew McDaniel: A logical specification and analysis for SELinux MLS policy. SACMAT 2007: 91-100
[c35]Heesook Choi, Patrick Drew McDaniel, Thomas F. La Porta: Privacy Preserving Communication in MANETs. SECON 2007: 233-242
[c34]William Enck, Patrick Drew McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert G. Greenberg, Sanjay G. Rao, William Aiello: Configuration Management at Massive Scale: System Design and Experience. USENIX Annual Technical Conference 2007: 73-86
[c33]Boniface Hicks, Sandra Rueda, Trent Jaeger, Patrick Drew McDaniel: From Trusted to Secure: Building and Executing Applications That Enforce System Security. USENIX Annual Technical Conference 2007: 205-218
[e2]Patrick Drew McDaniel, Shyam K. Gupta (Eds.): Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings. Lecture Notes in Computer Science 4812, Springer 2007, ISBN 978-3-540-77085-5- 2006
[j5]Patrick McDaniel, William Aiello, Kevin R. B. Butler, John Ioannidis: Origin authentication in interdomain routing. Computer Networks 50(16): 2953-2980 (2006)
[j4]Matthew Pirretti, Sencun Zhu, Narayanan Vijaykrishnan, Patrick McDaniel, Mahmut T. Kandemir, Richard R. Brooks: The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. IJDSN 2(3): 267-287 (2006)
[j3]Patrick McDaniel, Atul Prakash: Enforcing provisioning and authorization policy in the Antigone system. Journal of Computer Security 14(6): 483-511 (2006)
[j2]Patrick McDaniel, Atul Prakash: Methods and limitations of security policy reconciliation. ACM Trans. Inf. Syst. Secur. 9(3): 259-291 (2006)
[c32]Boniface Hicks, Kiyan Ahmadizadeh, Patrick Drew McDaniel: From Languages to Systems: Understanding Practical Application Development in Security-typed Languages. ACSAC 2006: 153-164
[c31]Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Brent Waters: Secure attribute-based systems. ACM Conference on Computer and Communications Security 2006: 99-112
[c30]Kevin R. B. Butler, Patrick McDaniel, William Aiello: Optimizing BGP security by exploiting path stability. ACM Conference on Computer and Communications Security 2006: 298-310
[c29]Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger: Password Exhaustion: Predicting the End of Password Usefulness. ICISS 2006: 37-55
[c28]Kevin R. B. Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick McDaniel: Privacy Preserving Web-Based Email. ICISS 2006: 116-131
[c27]Sophie Y. Qiu, Patrick Drew McDaniel, Fabian Monrose, Aviel D. Rubin: Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing. ISCC 2006: 489-496
[c26]Patrick Traynor, William Enck, Patrick McDaniel, Thomas F. La Porta: Mitigating attacks on open functionality in SMS-capable cellular networks. MOBICOM 2006: 182-193
[c25]Patrick Drew McDaniel, Subhabrata Sen, Oliver Spatscheck, Jacobus E. van der Merwe, William Aiello, Charles R. Kalmanek: Enterprise Security: A Community of Interest Based Approach. NDSS 2006
[c24]Boniface Hicks, Dave King, Patrick McDaniel, Michael Hicks: Trusted declassification: : high-level policy for a security-typed language. PLAS 2006: 65-74
[c23]Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick McDaniel: Non-Invasive Methods for Host Certification. SecureComm 2006: 1-10
[c22]Shiva Chaitanya, Kevin R. B. Butler, Anand Sivasubramaniam, Patrick McDaniel, Murali Vilayannur: Design, implementation and evaluation of security in iSCSI-based network storage systems. StorageSS 2006: 17-28- 2005
[j1]
[c21]Wesam Lootah, William Enck, Patrick McDaniel: TARP: Ticket-based Address Resolution Protocol. ACSAC 2005: 106-116
[c20]William Enck, Patrick Traynor, Patrick McDaniel, Thomas F. La Porta: Exploiting open functionality in SMS-capable cellular networks. ACM Conference on Computer and Communications Security 2005: 393-404
[c19]
[c18]Kevin R. B. Butler, Patrick Drew McDaniel: Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. ICISS 2005: 36-48
[c17]Ali Al-Lawati, Dongwon Lee, Patrick McDaniel: Blocking-aware private record linkage. IQIS 2005: 59-68
[c16]Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel, Thomas F. La Porta: Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks. MobiQuitous 2005: 12-21
[c15]William Aiello, Charles R. Kalmanek, Patrick Drew McDaniel, Subhabrata Sen, Oliver Spatscheck, Jacobus E. van der Merwe: Analysis of Communities of Interest in Data Networks. PAM 2005: 83-96
[r2]
[r1]- 2004
[c14]Simon Byers, Lorrie Faith Cranor, David P. Kormann, Patrick Drew McDaniel: Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine. Privacy Enhancing Technologies 2004: 314-328
[c13]Hao Wang, Somesh Jha, Miron Livny, Patrick Drew McDaniel: Security Policy Reconciliation in Distributed Computing Environments. POLICY 2004: 137-
[e1]Vijayalakshmi Atluri, Birgit Pfitzmann, Patrick Drew McDaniel (Eds.): Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004. ACM 2004, ISBN 1-58113-961-6- 2003
[c12]Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew McDaniel: On the performance, feasibility, and use of forward-secure signatures. ACM Conference on Computer and Communications Security 2003: 131-144
[c11]William Aiello, John Ioannidis, Patrick Drew McDaniel: Origin authentication in interdomain routing. ACM Conference on Computer and Communications Security 2003: 165-178
[c10]Jim Irrer, Atul Prakash, Patrick McDaniel: Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System. DISCEX (2) 2003: 44-46
[c9]Patrick McDaniel, Atul Prakash: A Flexible Architecture for Security Policy Enforcement. DISCEX (2) 2003: 234-239
[c8]Simon Byers, Lorrie Faith Cranor, David P. Kormann, Patrick Drew McDaniel, Eric Cronin: Analysis of security vulnerabilities in the movie production and distribution process. Digital Rights Management Workshop 2003: 1-12
[c7]Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick Drew McDaniel, Aviel D. Rubin: Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. NDSS 2003
[c6]- 2002
[c5]Patrick Drew McDaniel, Atul Prakash: Methods and Limitations of Security Policy Reconciliation. IEEE Symposium on Security and Privacy 2002: 73-87- 2001
[c4]Hugh Harney, Andrea Colgrove, Patrick Drew McDaniel: Principles of Policy in Secure Groups. NDSS 2001- 2000
[c3]Patrick Drew McDaniel, Aviel D. Rubin: A Response to ''Can We Eliminate Certificate Revocation Lists?''. Financial Cryptography 2000: 245-258
[c2]
1990 – 1999
- 1999
[c1]William A. Adamson, C. J. Antonelli, Kevin Coffman, Patrick Drew McDaniel, Jim Rees: Secure Distributed Virtual Conferencing. Communications and Multimedia Security 1999: 176-190
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:00 CEST by the dblp team



