Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Patrick Traynor
2010 – today
- 2013
[c34]Chaitrali Amrutkar, Matti A. Hiltunen, Trevor Jim, Kaustubh R. Joshi, Oliver Spatscheck, Patrick Traynor, Shobha Venkataraman: Why is my smartphone slow? On the fly diagnosis of underperformance on the mobile Internet. DSN 2013: 1-8
[c33]Charles Lever, Manos Antonakakis, Bradley Reaves, Patrick Traynor, Wenke Lee: The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers. NDSS 2013
[c32]Saurabh Chakradeo, Bradley Reaves, Patrick Traynor, William Enck: MAST: triage for market-scale mobile malware analysis. WISEC 2013: 13-24- 2012
[j13]Cong Shi, Xiapu Luo, Patrick Traynor, Mostafa H. Ammar, Ellen W. Zegura: ARDEN: Anonymous networking in delay tolerant networks. Ad Hoc Networks 10(6): 918-930 (2012)
[j12]Patrick Traynor: Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services. IEEE Trans. Mob. Comput. 11(6): 983-994 (2012)
[j11]Italo Dacosta, Saurabh Chakradeo, Mustaque Ahamad, Patrick Traynor: One-time cookies: Preventing session hijacking attacks with stateless authentication tokens. ACM Trans. Internet Techn. 12(1): 1 (2012)
[c31]Italo Dacosta, Mustaque Ahamad, Patrick Traynor: Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties. ESORICS 2012: 199-216
[c30]Chaitrali Amrutkar, Kapil Singh, Arunabh Verma, Patrick Traynor: VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security. ICISS 2012: 16-34
[c29]Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot: Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road? ISC 2012: 86-103
[c28]Adam M. Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach: Accountable Wiretapping -or- I know they can hear you now. NDSS 2012
[c27]- 2011
[j10]Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, Thomas F. La Porta: From mobile phones to responsible devices. Security and Communication Networks 4(6): 719-726 (2011)
[j9]Italo Dacosta, Vijay Balasubramaniyan, Mustaque Ahamad, Patrick Traynor: Improving Authentication Performance of Distributed SIP Proxies. IEEE Trans. Parallel Distrib. Syst. 22(11): 1804-1812 (2011)
[c26]Nilesh Nipane, Italo Dacosta, Patrick Traynor: "Mix-in-Place" anonymous networking using secure function evaluation. ACSAC 2011: 63-72
[c25]Yacin Nadji, Jonathon T. Giffin, Patrick Traynor: Automated remote repair for mobile malware. ACSAC 2011: 413-422
[c24]Philip Marquardt, Arunabh Verma, Henry Carter, Patrick Traynor: (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers. ACM Conference on Computer and Communications Security 2011: 551-562
[c23]Philip Marquardt, David Dagon, Patrick Traynor: Impeding Individual User Profiling in Shopper Loyalty Programs. Financial Cryptography 2011: 93-101
[c22]David Dewey, Patrick Traynor: No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects. NDSS 2011- 2010
[j8]Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Brent Waters: Secure attribute-based systems. Journal of Computer Security 18(5): 799-837 (2010)
[j7]Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick McDaniel, Kevin Borders: malnets: large-scale malicious networks via compromised wireless access points. Security and Communication Networks 3(2-3): 102-113 (2010)
[c21]Vijay A. Balasubramaniyan, Aamir Poonawalla, Mustaque Ahamad, Michael T. Hunter, Patrick Traynor: PinDr0p: using single-ended audio features to determine call provenance. ACM Conference on Computer and Communications Security 2010: 109-120
[c20]Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor, Wenke Lee: Evaluating Bluetooth as a Medium for Botnet Command and Control. DIMVA 2010: 61-80
[c19]Patrick Traynor, Joshua Schiffman, Thomas F. La Porta, Patrick McDaniel, Abhrajit Ghosh: Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware. GLOBECOM 2010: 1-6
[c18]Patrick Traynor: Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services. SecureComm 2010: 125-143
2000 – 2009
- 2009
[j6]Patrick Traynor: Securing Cellular Infrastructure: Challenges and Opportunities. IEEE Security & Privacy 7(4): 77-79 (2009)
[j5]Patrick Traynor, William Enck, Patrick McDaniel, Thomas F. La Porta: Mitigating attacks on open functionality in SMS-capable cellular networks. IEEE/ACM Trans. Netw. 17(1): 40-53 (2009)
[j4]Kevin R. B. Butler, Sunam Ryu, Patrick Traynor, Patrick Drew McDaniel: Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. IEEE Trans. Parallel Distrib. Syst. 20(12): 1803-1815 (2009)
[c17]Frank S. Park, Chinmay Gangakhedkar, Patrick Traynor: Leveraging Cellular Infrastructure to Improve Fraud Prevention. ACSAC 2009: 350-359
[c16]Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick Drew McDaniel, Thomas F. La Porta: On cellular botnets: measuring the impact of malicious devices on a cellular network core. ACM Conference on Computer and Communications Security 2009: 223-234
[c15]Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick Traynor, Jonathon T. Giffin: Robust signatures for kernel data structures. ACM Conference on Computer and Communications Security 2009: 566-577
[c14]Italo Dacosta, Vijay Balasubramaniyan, Mustaque Ahamad, Patrick Traynor: Improving authentication performance of distributed SIP proxies. IPTComm 2009: 1- 2008
[b1]Patrick Traynor, Patrick McDaniel, Thomas F. La Porta: Security for Telecommunications Networks. Advances in Information Security 40, Springer 2008, ISBN 978-0-387-72441-6, pp. 1-162
[j3]Patrick Traynor, William Enck, Patrick McDaniel, Thomas F. La Porta: Exploiting open functionality in SMS-capable cellular networks. Journal of Computer Security 16(6): 713-742 (2008)
[j2]Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick McDaniel: Noninvasive Methods for Host Certification. ACM Trans. Inf. Syst. Secur. 11(3) (2008)
[c13]Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick McDaniel: Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. NDSS 2008
[c12]Kevin R. B. Butler, William Enck, Harri Hursti, Stephen E. McLaughlin, Patrick Traynor, Patrick McDaniel: Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST. EVT 2008- 2007
[j1]Patrick Traynor, Raju Kumar, Heesook Choi, Guohong Cao, Sencun Zhu, Thomas F. La Porta: Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. IEEE Trans. Mob. Comput. 6(6): 663-677 (2007)
[c11]Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Patrick Drew McDaniel: Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. AINA Workshops (1) 2007: 519-524- 2006
[c10]Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Brent Waters: Secure attribute-based systems. ACM Conference on Computer and Communications Security 2006: 99-112
[c9]Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger: Password Exhaustion: Predicting the End of Password Usefulness. ICISS 2006: 37-55
[c8]Kevin R. B. Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick McDaniel: Privacy Preserving Web-Based Email. ICISS 2006: 116-131
[c7]Patrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu, Tom La Porta: Establishing Pair-Wise Keys in Heterogeneous Sensor Networks. INFOCOM 2006
[c6]Patrick Traynor, William Enck, Patrick McDaniel, Thomas F. La Porta: Mitigating attacks on open functionality in SMS-capable cellular networks. MOBICOM 2006: 182-193
[c5]Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guohong Cao, Thomas F. La Porta: LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks. MobiSys 2006: 15-27
[c4]Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick McDaniel: Non-Invasive Methods for Host Certification. SecureComm 2006: 1-10
[c3]Patrick Traynor, Jaesheung Shin, Bharat B. Madan, Shashi Phoha, Thomas F. La Porta: Efficient Group Mobility for Heterogeneous Sensor Networks. VTC Fall 2006: 1-5
[c2]Patrick Traynor, Guohong Cao, Tom La Porta: The effects of probabilistic key management on secure routing in sensor networks. WCNC 2006: 659-664- 2005
[c1]William Enck, Patrick Traynor, Patrick McDaniel, Thomas F. La Porta: Exploiting open functionality in SMS-capable cellular networks. ACM Conference on Computer and Communications Security 2005: 393-404
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:12 CEST by the dblp team



