default search action
David Barrera 0003
Person information
- affiliation: Carleton University, Canada
- affiliation (former): Polytechnique Montréal, Canada
- affiliation (former): ETH Zürich, Switzerland
Other persons with the same name
- David Barrera 0001 — CMAP, École Polytechnique, Université Paris-Saclay, France
- David Barrera 0002 (aka: David Barrera Ferro) — Universidad de los Andes, Bogotá, Colombia
- David Barrera 0004 — University of Alcalá, Alcalá de Henares, Spain (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j6]David Barrera, Christopher Bellman, Paul C. van Oorschot:
A close look at a systematic method for analyzing sets of security advice. J. Cybersecur. 9(1) (2023) - [j5]David Barrera, Christopher Bellman, Paul C. van Oorschot:
Security Best Practices: A Critical Analysis Using IoT as a Case Study. ACM Trans. Priv. Secur. 26(2): 13:1-13:30 (2023) - [c24]Conner Bradley, David Barrera:
Escaping Vendor Mortality: A New Paradigm for Extending IoT Device Longevity. NSPW 2023: 1-16 - 2022
- [c23]Anthony Tam, Furkan Alaca, David Barrera:
If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes. FPS 2022: 373-388 - [c22]Conner Bradley, David Barrera:
Towards Characterizing IoT Software Update Practices. FPS 2022: 406-422 - [i14]Christopher Neal, Jean-Yves De Miceli, David Barrera, José Fernandez:
Ontology-Based Anomaly Detection for Air Traffic Control Systems. CoRR abs/2207.00637 (2022) - [i13]David Barrera, Christopher Bellman, Paul C. van Oorschot:
Security Best Practices: A Critical Analysis Using IoT as a Case Study. CoRR abs/2209.01285 (2022) - [i12]David Barrera, Christopher Bellman, Paul C. van Oorschot:
A Close Look at a Systematic Method for Analyzing Sets of Security Advice. CoRR abs/2209.04502 (2022) - [i11]Conner Bradley, David Barrera:
Toward Identification and Characterization of IoT Software Update Practices. CoRR abs/2209.09855 (2022) - 2021
- [i10]William Findlay, David Barrera, Anil Somayaji:
BPFContain: Fixing the Soft Underbelly of Container Security. CoRR abs/2102.06972 (2021) - 2020
- [c21]Corentin Thomasset, David Barrera:
SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes. ACSAC 2020: 542-555 - [c20]William Findlay, Anil Somayaji, David Barrera:
bpfbox: Simple Precise Process Confinement with eBPF. CCSW 2020: 91-103 - [c19]Elizabeth Stobert, David Barrera, Valérie Homier, Daniel Kollek:
Understanding Cybersecurity Practices in Emergency Departments. CHI 2020: 1-8 - [i9]Corentin Thomasset, David Barrera:
SERENIoT: Collaborative Network Security Policy Management and Enforcement for Smart Homes. CoRR abs/2003.02892 (2020)
2010 – 2019
- 2018
- [c18]Chen Chen, Daniele Enrico Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso:
TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer. EuroS&P 2018: 137-152 - [i8]Shayan Eskandari, Jeremy Clark, David Barrera, Elizabeth Stobert:
A first look at the usability of bitcoin key management. CoRR abs/1802.04351 (2018) - [i7]Chen Chen, Daniele Enrico Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso:
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer. CoRR abs/1802.08415 (2018) - 2017
- [j4]David Barrera, Laurent Chuat, Adrian Perrig, Raphael M. Reischuk, Pawel Szalachowski:
The SCION internet architecture. Commun. ACM 60(6): 56-65 (2017) - [c17]Benjamin Rothenberger, Daniele Enrico Asoni, David Barrera, Adrian Perrig:
Internet Kill Switches Demystified. EUROSEC 2017: 5:1-5:6 - [i6]David Barrera, Ian M. Molloy, Heqing Huang:
IDIoT: Securing the Internet of Things like it's 1994. CoRR abs/1712.03623 (2017) - 2016
- [c16]Chen Chen, David Barrera, Adrian Perrig:
Modeling Data-Plane Power Consumption of Future Internet Architectures. CIC 2016: 149-158 - [c15]Taeho Lee, Christos Pappas, David Barrera, Pawel Szalachowski, Adrian Perrig:
Source Accountability with Domain-brokered Privacy. CoNEXT 2016: 345-358 - [c14]Elizabeth Stobert, David Barrera:
Picking a (Smart)Lock: Locking Relationships on Mobile Devices. WAY@SOUPS 2016 - [i5]Taeho Lee, Christos Pappas, David Barrera, Pawel Szalachowski, Adrian Perrig:
Source Accountability with Domain-brokered Privacy. CoRR abs/1610.00461 (2016) - [i4]Chen Chen, David Barrera, Adrian Perrig:
Modeling Data-Plane Power Consumption of Future Internet Architectures. CoRR abs/1610.01511 (2016) - 2015
- [c13]Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, Adrian Perrig:
HORNET: High-speed Onion Routing at the Network Layer. CCS 2015: 1441-1454 - [c12]Daniele Enrico Asoni, Chen Chen, David Barrera, Adrian Perrig:
On Building Onion Routing into Future Internet Architectures. iNetSeC 2015: 71-81 - [c11]AbdelRahman Abdou, David Barrera, Paul C. van Oorschot:
What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks. PASSWORDS 2015: 72-91 - [i3]Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, Adrian Perrig:
HORNET: High-speed Onion Routing at the Network Layer. CoRR abs/1507.05724 (2015) - [i2]David Barrera, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig:
SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks. CoRR abs/1508.01651 (2015) - [i1]Taeho Lee, Pawel Szalachowski, David Barrera, Adrian Perrig, Heejo Lee, David Watrin:
Bootstrapping Real-world Deployment of Future Internet Architectures. CoRR abs/1508.02240 (2015) - 2014
- [c10]David Barrera, Daniel McCarney, Jeremy Clark, Paul C. van Oorschot:
Baton: certificate agility for android's decentralized signing infrastructure. WISEC 2014: 1-12 - 2013
- [c9]Adam Skillen, David Barrera, Paul C. van Oorschot:
Deadbolt: locking down android disk encryption. SPSM@CCS 2013: 3-14 - 2012
- [c8]Daniel McCarney, David Barrera, Jeremy Clark, Sonia Chiasson, Paul C. van Oorschot:
Tapas: design, implementation, and usability evaluation of a password manager. ACSAC 2012: 89-98 - [c7]Chris Jarabek, David Barrera, John Aycock:
ThinAV: truly lightweight mobile cloud-based anti-malware. ACSAC 2012: 209-218 - [c6]David Barrera, Jeremy Clark, Daniel McCarney, Paul C. van Oorschot:
Understanding and improving app installation security mechanisms through empirical analysis of android. SPSM@CCS 2012: 81-92 - 2011
- [j3]David Barrera, Paul C. van Oorschot:
Secure Software Installation on Smartphones. IEEE Secur. Priv. 9(3): 42-48 (2011) - [j2]David Barrera, Paul C. van Oorschot:
Accommodating IPv6 Addresses in Security Visualization Tools. Inf. Vis. 10(2): 107-116 (2011) - [j1]David Barrera, Glenn Wurster, Paul C. van Oorschot:
Back to the Future: Revisiting IPv6 Privacy Extensions. login Usenix Mag. 36(1) (2011) - [c5]Mohammad Mannan, David Barrera, Carson D. Brown, David Lie, Paul C. van Oorschot:
Mercury: Recovering Forgotten Passwords Using Personal Devices. Financial Cryptography 2011: 315-330 - 2010
- [c4]David Barrera, Hilmi Günes Kayacik, Paul C. van Oorschot, Anil Somayaji:
A methodology for empirical analysis of permission-based security models and its application to android. CCS 2010: 73-84
2000 – 2009
- 2009
- [c3]Carson D. Brown, David Barrera, Dwight Deugo:
FiGD: An Open Source Intellectual Property Violation Detector. SEKE 2009: 536-541 - [c2]David Barrera, Paul C. van Oorschot:
Security visualization tools and IPv6 addresses. VizSEC 2009: 21-26 - 2008
- [c1]Mansour Alsaleh, David Barrera, Paul C. van Oorschot:
Improving Security Visualization with Exposure Map Filtering. ACSAC 2008: 205-214
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-28 02:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint