default search action
Patrick D. McDaniel
Person information
- affiliation: University of Wisconsin-Madison, WI, USA
- affiliation (former): Pennsylvania State University, School of Electrical Engineering and Computer Science
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j57]Yohan Beugin, Patrick D. McDaniel:
Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving). Proc. Priv. Enhancing Technol. 2024(1): 41-57 (2024) - [j56]Mingli Yu, Quinn K. Burke, Thomas F. La Porta, Patrick D. McDaniel:
Stealthy Misreporting Attacks Against Load Balancing. IEEE/ACM Trans. Netw. 32(4): 3622-3635 (2024) - [c163]Blaine Hoak, Patrick D. McDaniel:
Explorations in Texture Learning. Tiny Papers @ ICLR 2024 - [c162]Yohan Beugin, Patrick D. McDaniel:
A Public and Reproducible Assessment of the Topics API on Real Data. SP (Workshops) 2024: 1-8 - [i57]Ryan Guide, Eric Pauley, Yohan Beugin, Ryan Sheatsley, Patrick D. McDaniel:
Characterizing the Modification Space of Signature IDS Rules. CoRR abs/2402.09644 (2024) - [i56]Fangzhou Wu, Ning Zhang, Somesh Jha, Patrick D. McDaniel, Chaowei Xiao:
A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems. CoRR abs/2402.18649 (2024) - [i55]Blaine Hoak, Patrick D. McDaniel:
Explorations in Texture Learning. CoRR abs/2403.09543 (2024) - [i54]Yohan Beugin, Patrick D. McDaniel:
A Public and Reproducible Assessment of the Topics API on Real Data. CoRR abs/2403.19577 (2024) - [i53]Quinn Burke, Ryan Sheatsley, Rachel King, Michael Swift, Patrick D. McDaniel:
Cloud Storage Integrity at Scale: A Case for Dynamic Hash Trees. CoRR abs/2405.03830 (2024) - [i52]Rachel King, Quinn Burke, Yohan Beugin, Blaine Hoak, Kunyang Li, Eric Pauley, Ryan Sheatsley, Patrick D. McDaniel:
ParTEETor: A System for Partial Deployments of TEEs within Tor. CoRR abs/2408.14646 (2024) - [i51]Blaine Hoak, Patrick D. McDaniel:
On Synthetic Texture Datasets: Challenges, Creation, and Curation. CoRR abs/2409.10297 (2024) - 2023
- [j55]Quinn Burke, Patrick D. McDaniel, Thomas La Porta, Mingli Yu, Ting He:
Misreporting Attacks Against Load Balancers in Software-Defined Networking. Mob. Networks Appl. 28(4): 1482-1497 (2023) - [j54]Tian Xie, Sanchal Thakkar, Ting He, Patrick D. McDaniel, Quinn Burke:
Joint Caching and Routing in Cache Networks With Arbitrary Topology. IEEE Trans. Parallel Distributed Syst. 34(8): 2237-2250 (2023) - [j53]Ya Xiao, Wenjia Song, Jingyuan Qi, Bimal Viswanath, Patrick D. McDaniel, Danfeng Yao:
Specializing Neural Networks for Cryptographic Code Completion Applications. IEEE Trans. Software Eng. 49(6): 3524-3535 (2023) - [c161]Tian Xie, Sanchal Thakkar, Ting He, Novella Bartolini, Patrick D. McDaniel:
Host-Based Flow Table Size Inference in Multi-Hop SDN. GLOBECOM 2023: 25-30 - [c160]Eric Pauley, Paul Barford, Patrick D. McDaniel:
The CVE Wayback Machine: Measuring Coordinated Disclosure from Exploits against Two Years of Zero-Days. IMC 2023: 236-252 - [c159]Kunyang Li, Kyle Domico, Jean-Charles Noirot Ferrand, Patrick D. McDaniel:
The Efficacy of Transformer-based Adversarial Attacks in Security Domains. MILCOM 2023: 13-18 - [c158]Ryan Guide, Eric Pauley, Yohan Beugin, Ryan Sheatsley, Patrick D. McDaniel:
Characterizing the Modification Space of Signature IDS Rules. MILCOM 2023: 536-541 - [c157]Mingli Yu, Quinn K. Burke, Thomas La Porta, Patrick D. McDaniel:
mMLSnet: Multilevel Security Network with Mobility. MILCOM 2023: 821-826 - [c156]Ryan Sheatsley, Blaine Hoak, Eric Pauley, Patrick D. McDaniel:
The Space of Adversarial Strategies. USENIX Security Symposium 2023: 3745-3761 - [c155]Eric Pauley, Paul Barford, Patrick D. McDaniel:
DScope: A Cloud-Native Internet Telescope. USENIX Security Symposium 2023: 5989-6006 - [i50]Quinn Burke, Yohan Beugin, Blaine Hoak, Rachel King, Eric Pauley, Ryan Sheatsley, Mingli Yu, Ting He, Thomas La Porta, Patrick D. McDaniel:
Securing Cloud File Systems using Shielded Execution. CoRR abs/2305.18639 (2023) - [i49]Yohan Beugin, Patrick D. McDaniel:
Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving). CoRR abs/2306.03825 (2023) - [i48]Syed Rafiul Hussain, Patrick D. McDaniel, Anshul Gandhi, Kanad Ghose, Kartik Gopalan, Dongyoon Lee, Yu David Liu, Zhenhua Liu, Shuai Mu, Erez Zadok:
Verifiable Sustainability in Data Centers. CoRR abs/2307.11993 (2023) - [i47]Alban Héon, Ryan Sheatsley, Quinn Burke, Blaine Hoak, Eric Pauley, Yohan Beugin, Patrick D. McDaniel:
Systematic Evaluation of Geolocation Privacy Mechanisms. CoRR abs/2309.06263 (2023) - [i46]Kunyang Li, Kyle Domico, Jean-Charles Noirot Ferrand, Patrick D. McDaniel:
The Efficacy of Transformer-based Adversarial Attacks in Security Domains. CoRR abs/2310.11597 (2023) - 2022
- [j52]Ryan Sheatsley, Nicolas Papernot, Michael J. Weisman, Gunjan Verma, Patrick D. McDaniel:
Adversarial examples for network intrusion detection systems. J. Comput. Secur. 30(5): 727-752 (2022) - [j51]Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick D. McDaniel:
Building a Privacy-Preserving Smart Camera System. Proc. Priv. Enhancing Technol. 2022(2): 25-46 (2022) - [j50]Michael Norris, Z. Berkay Celik, Prasanna Venkatesh Rengasamy, Shulin Zhao, Patrick Drew McDaniel, Anand Sivasubramaniam, Gang Tan:
IoTRepair: Flexible Fault Handling in Diverse IoT Deployments. ACM Trans. Internet Things 3(3): 22:1-22:33 (2022) - [j49]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Who's Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment. ACM Trans. Internet Things 3(4): 27:1-27:39 (2022) - [j48]Quinn Burke, Fidan Mehmeti, Rahul George, Kyle Ostrowski, Trent Jaeger, Thomas F. La Porta, Patrick D. McDaniel:
Enforcing Multilevel Security Policies in Unstable Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 2349-2365 (2022) - [j47]Tian Xie, Namitha Nambiar, Ting He, Patrick D. McDaniel:
Attack Resilience of Cache Replacement Policies: A Study Based on TTL Approximation. IEEE/ACM Trans. Netw. 30(6): 2433-2447 (2022) - [c154]Patrick Drew McDaniel:
Sustainability is a Security Problem. CCS 2022: 9-10 - [c153]Eric Pauley, Gang Tan, Danfeng Zhang, Patrick D. McDaniel:
Performant Binary Fuzzing without Source Code using Static Instrumentation. CNS 2022: 226-235 - [c152]Tian Xie, Sanchal Thakkar, Ting He, Patrick D. McDaniel, Quinn Burke:
Joint Caching and Routing in Cache Networks with Arbitrary Topology. ICDCS 2022: 56-66 - [c151]Eric Pauley, Ryan Sheatsley, Blaine Hoak, Quinn Burke, Yohan Beugin, Patrick D. McDaniel:
Measuring and Mitigating the Risk of IP Reuse on Public Clouds. SP 2022: 558-575 - [i45]Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick D. McDaniel:
Building a Privacy-Preserving Smart Camera System. CoRR abs/2201.09338 (2022) - [i44]Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler J. Shipp, Patrick D. McDaniel:
HoneyModels: Machine Learning Honeypots. CoRR abs/2202.10309 (2022) - [i43]Ryan Sheatsley, Matthew Durbin, Azaree Lintereur, Patrick D. McDaniel:
Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations. CoRR abs/2202.10387 (2022) - [i42]Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick D. McDaniel, Michael J. Weisman, Sencun Zhu, Shitong Zhu, Srikanth V. Krishnamurthy:
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN. CoRR abs/2203.06694 (2022) - [i41]Eric Pauley, Ryan Sheatsley, Blaine Hoak, Quinn Burke, Yohan Beugin, Patrick D. McDaniel:
Measuring and Mitigating the Risk of IP Reuse on Public Clouds. CoRR abs/2204.05122 (2022) - [i40]Kyle Domico, Ryan Sheatsley, Yohan Beugin, Quinn Burke, Patrick D. McDaniel:
A Machine Learning and Computer Vision Approach to Geomagnetic Storm Forecasting. CoRR abs/2204.05780 (2022) - [i39]Valentin Vie, Ryan Sheatsley, Sophia Beyda, Sushrut Shringarputale, Kevin S. Chan, Trent Jaeger, Patrick D. McDaniel:
Adversarial Plannning. CoRR abs/2205.00566 (2022) - [i38]Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick D. McDaniel:
Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices. CoRR abs/2208.09776 (2022) - [i37]Ryan Sheatsley, Blaine Hoak, Eric Pauley, Patrick D. McDaniel:
The Space of Adversarial Strategies. CoRR abs/2209.04521 (2022) - [i36]Eric Pauley, Kyle Domico, Blaine Hoak, Ryan Sheatsley, Quinn Burke, Yohan Beugin, Patrick D. McDaniel:
EIPSIM: Modeling Secure IP Address Allocation at Cloud Scale. CoRR abs/2210.14999 (2022) - 2021
- [j46]Leonardo Babun, Kyle Denney, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:
A survey on IoT platforms: Communication, security, and privacy perspectives. Comput. Networks 192: 108040 (2021) - [j45]Leonardo Babun, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:
Real-time Analysis of Privacy-(un)aware IoT Applications. Proc. Priv. Enhancing Technol. 2021(1): 145-166 (2021) - [j44]Stefan Achleitner, Quinn Burke, Patrick D. McDaniel, Trent Jaeger, Thomas La Porta, Srikanth V. Krishnamurthy:
MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking. IEEE Trans. Netw. Serv. Manag. 18(1): 729-744 (2021) - [j43]Mingli Yu, Tian Xie, Ting He, Patrick D. McDaniel, Quinn K. Burke:
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks. IEEE/ACM Trans. Netw. 29(6): 2793-2806 (2021) - [c150]Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick D. McDaniel:
On the Robustness of Domain Constraints. CCS 2021: 495-515 - [c149]Tian Xie, Ting He, Patrick D. McDaniel, Namitha Nambiar:
Attack Resilience of Cache Replacement Policies. INFOCOM 2021: 1-10 - [c148]Adrien Cosson, Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:
Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information. IoTDI 2021: 53-66 - [c147]Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler J. Shipp, Patrick D. McDaniel:
HoneyModels: Machine Learning Honeypots. MILCOM 2021: 886-891 - [i35]Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick D. McDaniel:
On the Robustness of Domain Constraints. CoRR abs/2105.08619 (2021) - 2020
- [c146]Sushrut Shringarputale, Patrick D. McDaniel, Kevin R. B. Butler, Thomas La Porta:
Co-residency Attacks on Containers are Real. CCSW 2020: 53-66 - [c145]Mingli Yu, Ting He, Patrick Drew McDaniel, Quinn K. Burke:
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks. INFOCOM 2020: 1519-1528 - [c144]Michael Norris, Z. Berkay Celik, Prasanna Venkatesh Rengasamy, Shulin Zhao, Patrick D. McDaniel, Anand Sivasubramaniam, Gang Tan:
IoTRepair: Systematically Addressing Device Faults in Commodity IoT. IoTDI 2020: 142-148 - [c143]Quinn Burke, Patrick D. McDaniel, Thomas F. La Porta, Mingli Yu, Ting He:
Misreporting Attacks in Software-Defined Networking. SecureComm (1) 2020: 276-296 - [c142]Sayed M. Saghaian N. E., Tom La Porta, Simone Silvestri, Patrick D. McDaniel:
Improving Robustness of a Popular Probabilistic Clustering Algorithm Against Insider Attacks. SecureComm (1) 2020: 381-401 - [c141]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Kratos: multi-user multi-device-aware access control system for the smart home. WISEC 2020: 1-12 - [i34]Michael Norris, Z. Berkay Celik, Patrick D. McDaniel, Gang Tan, Prasanna Venkatesh Rengasamy, Shulin Zhao, Anand Sivasubramaniam:
IoTRepair: Systematically Addressing Device Faults in Commodity IoT (Extended Paper). CoRR abs/2002.07641 (2020) - [i33]Stefan Achleitner, Quinn Burke, Patrick D. McDaniel, Trent Jaeger, Thomas La Porta, Srikanth V. Krishnamurthy:
MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking. CoRR abs/2009.10021 (2020) - [i32]Ryan Sheatsley, Nicolas Papernot, Michael J. Weisman, Gunjan Verma, Patrick D. McDaniel:
Adversarial Examples in Constrained Domains. CoRR abs/2011.01183 (2020)
2010 – 2019
- 2019
- [j42]Z. Berkay Celik, Earlence Fernandes, Eric Pauley, Gang Tan, Patrick D. McDaniel:
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities. ACM Comput. Surv. 52(4): 74:1-74:30 (2019) - [j41]Z. Berkay Celik, Patrick D. McDaniel, Gang Tan, Leonardo Babun, A. Selcuk Uluagac:
Verifying Internet of Things Safety and Security in Physical Spaces. IEEE Secur. Priv. 17(5): 30-37 (2019) - [j40]Dan Boneh, Andrew J. Grotto, Patrick D. McDaniel, Nicolas Papernot:
How Relevant Is the Turing Test in the Age of Sophisbots? IEEE Secur. Priv. 17(6): 64-71 (2019) - [j39]Ahmed Osama Fathy Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Patrick D. McDaniel, Lisa M. Marvel:
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud. IEEE/ACM Trans. Netw. 27(2): 560-576 (2019) - [c140]Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Ryan Sheatsley, Patrick D. McDaniel, A. Selcuk Uluagac:
Curie: Policy-based Secure Data Exchange. CODASPY 2019: 121-132 - [c139]Z. Berkay Celik, Gang Tan, Patrick D. McDaniel:
IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT. NDSS 2019 - [c138]Raquel Alvarez, Jake Levenson, Ryan Sheatsley, Patrick D. McDaniel:
Application Transiency: Towards a Fair Trade of Personal Information for Application Services. SecureComm (2) 2019: 47-66 - [c137]Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli-Reineh, Patrick D. McDaniel, Jens Grossklags, Trent Jaeger:
EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs. USENIX Security Symposium 2019: 567-584 - [i31]Dan Boneh, Andrew J. Grotto, Patrick D. McDaniel, Nicolas Papernot:
How Relevant is the Turing Test in the Age of Sophisbots? CoRR abs/1909.00056 (2019) - [i30]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Multi-User Multi-Device-Aware Access Control System for Smart Home. CoRR abs/1911.10186 (2019) - [i29]Leonardo Babun, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:
Real-time Analysis of Privacy-(un)aware IoT Applications. CoRR abs/1911.10461 (2019) - 2018
- [j38]Ian J. Goodfellow, Patrick D. McDaniel, Nicolas Papernot:
Making machine learning robust against adversarial inputs. Commun. ACM 61(7): 56-66 (2018) - [c136]Z. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez, Ananthram Swami:
Detection under Privileged Information. AsiaCCS 2018: 199-206 - [c135]Dang Tu Nguyen, Chengyu Song, Zhiyun Qian, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Patrick D. McDaniel:
IotSan: fortifying the safety of IoT systems. CoNEXT 2018: 191-203 - [c134]Nicolas Papernot, Patrick D. McDaniel, Arunesh Sinha, Michael P. Wellman:
SoK: Security and Privacy in Machine Learning. EuroS&P 2018: 399-414 - [c133]Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Ian J. Goodfellow, Dan Boneh, Patrick D. McDaniel:
Ensemble Adversarial Training: Attacks and Defenses. ICLR (Poster) 2018 - [c132]Rauf Izmailov, Shridatt Sugrim, Ritu Chadha, Patrick D. McDaniel, Ananthram Swami:
Enablers of Adversarial Attacks in Machine Learning. MILCOM 2018: 425-430 - [c131]Sayed M. Saghaian N. E., Tom La Porta, Trent Jaeger, Z. Berkay Celik, Patrick D. McDaniel:
Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout. SecureComm (2) 2018: 192-212 - [c130]Z. Berkay Celik, Patrick D. McDaniel:
Extending Detection with Privileged Information via Generalized Distillation. IEEE Symposium on Security and Privacy Workshops 2018: 83-88 - [c129]Z. Berkay Celik, Patrick D. McDaniel, Gang Tan:
Soteria: Automated IoT Safety and Security Analysis. USENIX ATC 2018: 147-158 - [c128]Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick D. McDaniel, A. Selcuk Uluagac:
Sensitive Information Tracking in Commodity IoT. USENIX Security Symposium 2018: 1687-1704 - [i28]Chun-Ming Lai, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, Shyhtsun Felix Wu, Patrick D. McDaniel, Hasan Cam:
Attacking Strategies and Temporal Analysis Involving Facebook Discussion Groups. CoRR abs/1802.04500 (2018) - [i27]Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick D. McDaniel, A. Selcuk Uluagac:
Sensitive Information Tracking in Commodity IoT. CoRR abs/1802.08307 (2018) - [i26]Nicolas Papernot, Patrick D. McDaniel:
Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust Deep Learning. CoRR abs/1803.04765 (2018) - [i25]Z. Berkay Celik, Patrick D. McDaniel, Gang Tan:
Soteria: Automated IoT Safety and Security Analysis. CoRR abs/1805.08876 (2018) - [i24]Giuseppe Petracca, Jens Grossklags, Patrick D. McDaniel, Trent Jaeger:
Regulating Access to System Sensors in Cooperating Programs. CoRR abs/1808.05579 (2018) - [i23]Z. Berkay Celik, Earlence Fernandes, Eric Pauley, Gang Tan, Patrick D. McDaniel:
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities. CoRR abs/1809.06962 (2018) - [i22]Dang Tu Nguyen, Chengyu Song, Zhiyun Qian, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Patrick D. McDaniel:
IoTSan: Fortifying the Safety of IoT Systems. CoRR abs/1810.09551 (2018) - [i21]Chun-Ming Lai, Xiaoyun Wang, Jon William Chapman, Yu-Cheng Lin, Yu-Chang Ho, Shyhtsun Felix Wu, Patrick D. McDaniel, Hasan Cam:
More or Less? Predict the Social Influence of Malicious URLs on Social Media. CoRR abs/1812.02978 (2018) - 2017
- [j37]Chaz Lever, Robert J. Walls, Yacin Nadji, David Dagon, Patrick D. McDaniel, Manos Antonakakis:
Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains. IEEE Secur. Priv. 15(2): 70-77 (2017) - [j36]Jing (Dave) Tian, Kevin R. B. Butler, Joseph I. Choi, Patrick D. McDaniel, Padma Krishnaswamy:
Securing ARP/NDP From the Ground Up. IEEE Trans. Inf. Forensics Secur. 12(9): 2131-2143 (2017) - [j35]Stefan Achleitner, Thomas F. La Porta, Patrick D. McDaniel, Shridatt Sugrim, Srikanth V. Krishnamurthy, Ritu Chadha:
Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies. IEEE Trans. Netw. Serv. Manag. 14(4): 1098-1112 (2017) - [c127]Nicolas Papernot, Patrick D. McDaniel, Ian J. Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami:
Practical Black-Box Attacks against Machine Learning. AsiaCCS 2017: 506-519 - [c126]Chun-Ming Lai, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, Shyhtsun Felix Wu, Patrick D. McDaniel, Hasan Cam:
Attacking strategies and temporal analysis involving Facebook discussion groups. CNSM 2017: 1-9 - [c125]Patrick D. McDaniel:
Tracing the Arc of Smartphone Application Security. ABAC@CODASPY 2017: 41-42 - [c124]Z. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov:
Feature Cultivation in Privileged Information-augmented Detection. IWSPA@CODASPY 2017: 73-80 - [c123]Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick D. McDaniel:
Adversarial Examples for Malware Detection. ESORICS (2) 2017: 62-79 - [c122]Stefan Achleitner, Thomas La Porta, Patrick D. McDaniel, Srikanth V. Krishnamurthy, Alexander Poylisher, Constantin Serban:
Stealth migration: Hiding virtual machines on the network. INFOCOM 2017: 1-9 - [c121]Ahmed Osama Fathy Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Patrick D. McDaniel, Lisa M. Marvel:
Malicious co-residency on the cloud: Attacks and defense. INFOCOM 2017: 1-9 - [c120]Z. Berkay Celik, David Lopez-Paz, Patrick D. McDaniel:
Patient-Driven Privacy Control through Generalized Distillation. PAC 2017: 1-12 - [c119]Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick D. McDaniel:
Achieving Secure and Differentially Private Computations in Multiparty Settings. PAC 2017: 49-59 - [c118]Yunfeng Hong, Yongjian Hu, Chun-Ming Lai, Shyhtsun Felix Wu, Iulian Neamtiu, Patrick D. McDaniel, Paul L. Yu, Hasan Cam, Gail-Joon Ahn:
Defining and Detecting Environment Discrimination in Android Apps. SecureComm 2017: 510-529 - [c117]Vaibhav Rastogi, Drew Davidson, Lorenzo De Carli, Somesh Jha, Patrick D. McDaniel:
Cimplifier: automatically debloating containers. ESEC/SIGSOFT FSE 2017: 476-486 - [c116]Stefan Achleitner, Thomas La Porta, Trent Jaeger, Patrick D. McDaniel:
Adversarial Network Forensics in Software Defined Networking. SOSR 2017: 8-20 - [c115]Stefan Achleitner, Thomas La Porta, Trent Jaeger, Patrick D. McDaniel:
Adversarial Network Forensics in Software Defined Networking: Demo. SOSR 2017: 177-178 - [i20]Kathrin Grosse, Praveen Manoharan, Nicolas Papernot, Michael Backes, Patrick D. McDaniel:
On the (Statistical) Detection of Adversarial Examples. CoRR abs/1702.06280 (2017) - [i19]Z. Berkay Celik, Hidayet Aksu, Abbas Acar, Ryan Sheatsley, A. Selcuk Uluagac, Patrick D. McDaniel:
Curie: Policy-based Secure Data Exchange. CoRR abs/1702.08342 (2017) - [i18]Florian Tramèr, Nicolas Papernot, Ian J. Goodfellow, Dan Boneh, Patrick D. McDaniel:
The Space of Transferable Adversarial Examples. CoRR abs/1704.03453 (2017) - [i17]Nicolas Papernot, Patrick D. McDaniel:
Extending Defensive Distillation. CoRR abs/1705.05264 (2017) - [i16]Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Dan Boneh, Patrick D. McDaniel:
Ensemble Adversarial Training: Attacks and Defenses. CoRR abs/1705.07204 (2017) - [i15]Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick D. McDaniel:
Achieving Secure and Differentially Private Computations in Multiparty Settings. CoRR abs/1707.01871 (2017) - 2016
- [j34]Patrick D. McDaniel, Nicolas Papernot, Z. Berkay Celik:
Machine Learning in Adversarial Settings. IEEE Secur. Priv. 14(3): 68-72 (2016) - [j33]Damien Octeau, Daniel Luchaup, Somesh Jha, Patrick D. McDaniel:
Composite Constant Propagation and its Application to Android Program Analysis. IEEE Trans. Software Eng. 42(11): 999-1014 (2016) - [c114]Stefan Achleitner, Thomas La Porta, Patrick D. McDaniel, Shridatt Sugrim, Srikanth V. Krishnamurthy, Ritu Chadha:
Cyber Deception: Virtual Networks to Defend Insider Reconnaissance. MIST@CCS 2016: 57-68 - [c113]Charles Huber, Patrick D. McDaniel, Scott E. Brown, Lisa M. Marvel:
Cyber Fighter Associate: A Decision Support System for cyber agility. CISS 2016: 198-203 - [c112]Devin J. Pohly, Patrick D. McDaniel:
Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols. DSN 2016: 371-382 - [c111]Nicolas Papernot, Patrick D. McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami:
The Limitations of Deep Learning in Adversarial Settings. EuroS&P 2016: 372-387 - [c110]Z. Berkay Celik, Nan Hu, Yun Li, Nicolas Papernot, Patrick D. McDaniel, Robert J. Walls, Jeff Rowe, Karl N. Levitt, Novella Bartolini, Thomas F. La Porta, Ritu Chadha:
Mapping sample scenarios to operational models. MILCOM 2016: 7-12 - [c109]Nicolas Papernot, Patrick D. McDaniel, Ananthram Swami, Richard E. Harang:
Crafting adversarial input sequences for recurrent neural networks. MILCOM 2016: 49-54 - [c108]Damien Octeau, Somesh Jha, Matthew L. Dering, Patrick D. McDaniel, Alexandre Bartel, Li Li, Jacques Klein, Yves Le Traon:
Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis. POPL 2016: 469-484 - [c107]Nathaniel Lageman, Eric D. Kilmer, Robert J. Walls, Patrick D. McDaniel:
BinDNN: Resilient Function Matching Using Deep Learning. SecureComm 2016: 517-537 - [c106]Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick D. McDaniel, Matthew Smith:
SoK: Lessons Learned from Android Security Research for Appified Software Platforms. IEEE Symposium on Security and Privacy 2016: 433-451 - [c105]Nicolas Papernot, Patrick D. McDaniel, Xi Wu, Somesh Jha, Ananthram Swami:
Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks. IEEE Symposium on Security and Privacy 2016: 582-597 - [c104]Chaz Lever, Robert J. Walls, Yacin Nadji, David Dagon, Patrick D. McDaniel, Manos Antonakakis:
Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains. IEEE Symposium on Security and Privacy 2016: 691-706 - [c103]Michael Backes, Sven Bugiel, Erik Derr, Patrick D. McDaniel, Damien Octeau, Sebastian Weisgerber:
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. USENIX Security Symposium 2016: 1101-1118 - [i14]Nicolas Papernot, Patrick D. McDaniel, Ian J. Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami:
Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples. CoRR abs/1602.02697 (2016) - [i13]Vaibhav Rastogi, Drew Davidson, Lorenzo De Carli, Somesh Jha, Patrick D. McDaniel:
Towards Least Privilege Containers with Cimplifier. CoRR abs/1602.08410 (2016) - [i12]Z. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov, Nicolas Papernot, Ananthram Swami:
Building Better Detection with Privileged Information. CoRR abs/1603.09638 (2016) - [i11]Nicolas Papernot, Patrick D. McDaniel, Ananthram Swami, Richard E. Harang:
Crafting Adversarial Input Sequences for Recurrent Neural Networks. CoRR abs/1604.08275 (2016) - [i10]Nicolas Papernot, Patrick D. McDaniel, Ian J. Goodfellow:
Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples. CoRR abs/1605.07277 (2016) - [i9]Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick D. McDaniel:
Adversarial Perturbations Against Deep Neural Networks for Malware Classification. CoRR abs/1606.04435 (2016) - [i8]Nicolas Papernot, Patrick D. McDaniel:
On the Effectiveness of Defensive Distillation. CoRR abs/1607.05113 (2016) - [i7]Ian J. Goodfellow, Nicolas Papernot, Patrick D. McDaniel:
cleverhans v0.1: an adversarial machine learning library. CoRR abs/1610.00768 (2016) - [i6]Nicolas Papernot, Patrick D. McDaniel, Arunesh Sinha, Michael P. Wellman:
Towards the Science of Security and Privacy in Machine Learning. CoRR abs/1611.03814 (2016) - [i5]Z. Berkay Celik, David Lopez-Paz, Patrick D. McDaniel:
Patient-Driven Privacy Control through Generalized Distillation. CoRR abs/1611.08648 (2016) - 2015
- [c102]Jing (Dave) Tian, Kevin R. B. Butler, Patrick D. McDaniel, Padma Krishnaswamy:
Securing ARP From the Ground Up. CODASPY 2015: 305-312 - [c101]Devin J. Pohly, Patrick D. McDaniel:
MICSS: A Realistic Multichannel Secrecy Protocol. GLOBECOM 2015: 1-6 - [c100]Patrick D. McDaniel:
A New Science of Security Decision Making. ICISSP 2015: IS-13 - [c99]Damien Octeau, Daniel Luchaup, Matthew L. Dering, Somesh Jha, Patrick D. McDaniel:
Composite Constant Propagation: Application to Android Inter-Component Communication Analysis. ICSE (1) 2015: 77-88 - [c98]Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, Patrick D. McDaniel:
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. ICSE (1) 2015: 280-291 - [c97]Robert J. Walls, Eric D. Kilmer, Nathaniel Lageman, Patrick D. McDaniel:
Measuring the Impact and Perception of Acceptable Advertisements. Internet Measurement Conference 2015: 107-120 - [c96]Nicolas Papernot, Patrick D. McDaniel, Robert J. Walls:
Enforcing agile access control policies in relational databases using views. MILCOM 2015: 7-12 - [c95]Alessandro Oltramari, Lorrie Faith Cranor, Robert J. Walls, Patrick D. McDaniel:
Computational ontology of network operations. MILCOM 2015: 318-323 - [c94]Z. Berkay Celik, Robert J. Walls, Patrick D. McDaniel, Ananthram Swami:
Malware traffic detection using tamper resistant features. MILCOM 2015: 330-335 - [c93]Devin J. Pohly, Charles Sestito, Patrick D. McDaniel:
Adaptive protocol switching using Dynamically Insertable Bumps in the stack. MILCOM 2015: 342-347 - [c92]Azeem Aqil, Ahmed Osama Fathy Atya, Trent Jaeger, Srikanth V. Krishnamurthy, Karl N. Levitt, Patrick D. McDaniel, Jeff Rowe, Ananthram Swami:
Detection of stealthy TCP-based DoS attacks. MILCOM 2015: 348-353 - [i4]Alexander Kott, Ananthram Swami, Patrick D. McDaniel:
Six Potential Game-Changers in Cyber Security: Towards Priorities in Cyber Science and Engineering. CoRR abs/1511.00509 (2015) - [i3]Nicolas Papernot, Patrick D. McDaniel, Xi Wu, Somesh Jha, Ananthram Swami:
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks. CoRR abs/1511.04508 (2015) - [i2]Nicolas Papernot, Patrick D. McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami:
The Limitations of Deep Learning in Adversarial Settings. CoRR abs/1511.07528 (2015) - 2014
- [j32]William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D. McDaniel, Anmol Sheth:
TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones. Commun. ACM 57(3): 99-106 (2014) - [j31]Alexander Kott, Ananthram Swami, Patrick D. McDaniel:
Security Outlook: Six Cyber Game Changers for the Next 15 Years. Computer 47(12): 104-106 (2014) - [j30]Patrick D. McDaniel, Brian Rivera, Ananthram Swami:
Toward a Science of Secure Environments. IEEE Secur. Priv. 12(4): 68-70 (2014) - [j29]William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D. McDaniel, Anmol N. Sheth:
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. ACM Trans. Comput. Syst. 32(2): 5:1-5:29 (2014) - [j28]Zhenfu Cao, Keqiu Li, Xu Li, Patrick D. McDaniel, Radha Poovendran, Guojun Wang, Yang Xiang:
Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems. IEEE Trans. Parallel Distributed Syst. 25(2): 279-282 (2014) - [c91]Patrick D. McDaniel, Trent Jaeger, Thomas F. La Porta, Nicolas Papernot, Robert J. Walls, Alexander Kott, Lisa M. Marvel, Ananthram Swami, Prasant Mohapatra, Srikanth V. Krishnamurthy, Iulian Neamtiu:
Security and Science of Agility. MTD@CCS 2014: 13-19 - [c90]Philip Koshy, Diana Koshy, Patrick D. McDaniel:
An Analysis of Anonymity in Bitcoin Using P2P Network Traffic. Financial Cryptography 2014: 469-485 - [c89]Matthew L. Dering, Patrick D. McDaniel:
Android market reconstruction and analysis. MILCOM 2014: 300-305 - [c88]Stephen E. McLaughlin, Saman A. Zonouz, Devin J. Pohly, Patrick D. McDaniel:
A Trusted Safety Verifier for Process Controller Code. NDSS 2014 - [c87]Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, Patrick D. McDaniel:
FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. PLDI 2014: 259-269 - [c86]Alessandro Oltramari, Lorrie Faith Cranor, Robert J. Walls, Patrick D. McDaniel:
Building an Ontology of Cyber Security. STIDS 2014: 54-61 - [c85]Wenhui Hu, Damien Octeau, Patrick D. McDaniel, Peng Liu:
Duet: library integrity verification for android applications. WISEC 2014: 141-152 - [i1]Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, Patrick D. McDaniel:
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis. CoRR abs/1404.7431 (2014) - 2013
- [c84]Damien Octeau, Patrick D. McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, Yves Le Traon:
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis. USENIX Security Symposium 2013: 543-558 - 2012
- [j27]Patrick D. McDaniel:
Bloatware Comes to the Smartphone. IEEE Secur. Priv. 10(4): 85-87 (2012) - [j26]Machigar Ongtang, Stephen E. McLaughlin, William Enck, Patrick D. McDaniel:
Semantically rich application-centric security in Android. Secur. Commun. Networks 5(6): 658-673 (2012) - [j25]Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman, Patrick D. McDaniel, Trent Jaeger:
Scalable Web Content Attestation. IEEE Trans. Computers 61(5): 686-699 (2012) - [c83]Devin J. Pohly, Stephen E. McLaughlin, Patrick D. McDaniel, Kevin R. B. Butler:
Hi-Fi: collecting high-fidelity whole-system provenance. ACSAC 2012: 259-268 - [c82]Thomas Moyer, Trent Jaeger, Patrick D. McDaniel:
Scalable Integrity-Guaranteed AJAX. APWeb 2012: 1-19 - [c81]Weining Yang, Ninghui Li, Yuan Qi, Wahbeh H. Qardaji, Stephen E. McLaughlin, Patrick D. McDaniel:
Minimizing private data disclosures in the smart grid. CCS 2012: 415-427 - [c80]Stephen E. McLaughlin, Patrick D. McDaniel:
SABOT: specification-based payload generation for programmable logic controllers. CCS 2012: 439-449 - [c79]Patrick D. McDaniel, Stephan McLaughlin:
Structured security testing in the smart grid. ISCCSP 2012: 1-4 - [c78]Eun-Kyoung Kim, Patrick D. McDaniel, Thomas La Porta:
A Detection Mechanism for SMS Flooding Attacks in Cellular Networks. SecureComm 2012: 76-93 - [c77]Damien Octeau, Somesh Jha, Patrick D. McDaniel:
Retargeting Android applications to Java bytecode. SIGSOFT FSE 2012: 6 - 2011
- [j24]Joshua Schiffman, Thomas Moyer, Trent Jaeger, Patrick D. McDaniel:
Network-Based Root of Trust for Installation. IEEE Secur. Priv. 9(1): 40-48 (2011) - [j23]Patrick D. McDaniel:
Data Provenance and Security. IEEE Secur. Priv. 9(2): 83-85 (2011) - [j22]Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao, Trent Jaeger, Patrick D. McDaniel, Thomas La Porta:
From mobile phones to responsible devices. Secur. Commun. Networks 4(6): 719-726 (2011) - [c76]Stephen E. McLaughlin, Patrick D. McDaniel, William Aiello:
Protecting consumer privacy from electric load monitoring. CCS 2011: 87-98 - [c75]William Enck, Damien Octeau, Patrick D. McDaniel, Swarat Chaudhuri:
A Study of Android Application Security. USENIX Security Symposium 2011 - [e4]Patrick D. McDaniel:
6th USENIX Workshop on Hot Topics in Security, HotSec'11, San Francisco, CA, USA, August 9, 2011. USENIX Association 2011 [contents] - 2010
- [j21]Kevin R. B. Butler, Stephen E. McLaughlin, Thomas Moyer, Patrick D. McDaniel:
New Security Architectures Based on Emerging Disk Functionality. IEEE Secur. Priv. 8(5): 34-41 (2010) - [j20]Patrick D. McDaniel, William Enck:
Not So Great Expectations: Why Application Markets Haven't Failed Security. IEEE Secur. Priv. 8(5): 76-78 (2010) - [j19]Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Brent Waters:
Secure attribute-based systems. J. Comput. Secur. 18(5): 799-837 (2010) - [j18]Kevin R. B. Butler, Toni R. Farley, Patrick D. McDaniel, Jennifer Rexford:
A Survey of BGP Security Issues and Solutions. Proc. IEEE 98(1): 100-122 (2010) - [j17]Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick D. McDaniel, Kevin Borders:
malnets: large-scale malicious networks via compromised wireless access points. Secur. Commun. Networks 3(2-3): 102-113 (2010) - [j16]Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel:
A logical specification and analysis for SELinux MLS policy. ACM Trans. Inf. Syst. Secur. 13(3): 26:1-26:31 (2010) - [c74]Stephen E. McLaughlin, Dmitry Podkuiko, Sergei Miadzvezhanka, Adam Delozier, Patrick D. McDaniel:
Multi-vendor penetration testing in the advanced metering infrastructure. ACSAC 2010: 107-116 - [c73]Machigar Ongtang, Kevin R. B. Butler, Patrick D. McDaniel:
Porscha: policy oriented secure content handling in Android. ACSAC 2010: 221-230 - [c72]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel:
Kells: a protection framework for portable data. ACSAC 2010: 231-240 - [c71]Joshua Schiffman, Thomas Moyer, Hayawardh Vijayakumar, Trent Jaeger, Patrick D. McDaniel:
Seeding clouds with trust anchors. CCSW 2010: 43-46 - [c70]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel:
Protecting portable storage with host validation. CCS 2010: 651-653 - [c69]Patrick Traynor, Joshua Schiffman, Thomas La Porta, Patrick D. McDaniel, Abhrajit Ghosh:
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware. GLOBECOM 2010: 1-6 - [c68]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel:
Disk-enabled authenticated encryption. MSST 2010: 1-6 - [c67]William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D. McDaniel, Anmol Sheth:
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. OSDI 2010: 393-407 - [c66]Boniface Hicks, Sandra Julieta Rueda, Dave King, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick D. McDaniel, Trent Jaeger:
An architecture for enforcing end-to-end access control over web applications. SACMAT 2010: 163-172 - [c65]Toby Ehrenkranz, Jun Li, Patrick D. McDaniel:
Realizing a Source Authentic Internet. SecureComm 2010: 217-234 - [c64]Patrick D. McDaniel, Kevin R. B. Butler, Stephen E. McLaughlin, Radu Sion, Erez Zadok, Marianne Winslett:
Towards a Secure and Efficient System for End-to-End Provenance. TaPP 2010 - [c63]Stephen E. McLaughlin, Dmitry Podkuiko, Adam Delozier, Sergei Miadzvezhanka, Patrick D. McDaniel:
Embedded Firmware Diversity for Smart Electric Meters. HotSec 2010
2000 – 2009
- 2009
- [j15]William Enck, Machigar Ongtang, Patrick D. McDaniel:
Understanding Android Security. IEEE Secur. Priv. 7(1): 50-57 (2009) - [j14]Patrick D. McDaniel, Stephen E. McLaughlin:
Security and Privacy Challenges in the Smart Grid. IEEE Secur. Priv. 7(3): 75-77 (2009) - [j13]William Enck, Thomas Moyer, Patrick D. McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert G. Greenberg, Yu-Wei Eric Sung, Sanjay G. Rao, William Aiello:
Configuration management at massive scale: system design and experience. IEEE J. Sel. Areas Commun. 27(3): 323-335 (2009) - [j12]Patrick Traynor, William Enck, Patrick D. McDaniel, Thomas La Porta:
Mitigating attacks on open functionality in SMS-capable cellular networks. IEEE/ACM Trans. Netw. 17(1): 40-53 (2009) - [j11]Kevin R. B. Butler, Sunam Ryu, Patrick Traynor, Patrick D. McDaniel:
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. IEEE Trans. Parallel Distributed Syst. 20(12): 1803-1815 (2009) - [j10]Heesook Choi, William Enck, Jaesheung Shin, Patrick D. McDaniel, Thomas F. La Porta:
ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks. Wirel. Networks 15(4): 525-539 (2009) - [c62]Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger, Patrick D. McDaniel:
Justifying Integrity Using a Virtual Machine Verifier. ACSAC 2009: 83-92 - [c61]Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman, Patrick D. McDaniel, Trent Jaeger:
Scalable Web Content Attestation. ACSAC 2009: 95-104 - [c60]Machigar Ongtang, Stephen E. McLaughlin, William Enck, Patrick D. McDaniel:
Semantically Rich Application-Centric Security in Android. ACSAC 2009: 340-349 - [c59]Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick D. McDaniel, Thomas La Porta:
On cellular botnets: measuring the impact of malicious devices on a cellular network core. CCS 2009: 223-234 - [c58]William Enck, Machigar Ongtang, Patrick D. McDaniel:
On lightweight mobile phone application certification. CCS 2009: 235-245 - [c57]Stephen E. McLaughlin, Dmitry Podkuiko, Patrick D. McDaniel:
Energy Theft in the Advanced Metering Infrastructure. CRITIS 2009: 176-187 - [c56]Matt Blaze, Patrick D. McDaniel:
Below the Salt. Security Protocols Workshop 2009: 24-27 - 2008
- [b2]Patrick Traynor, Patrick D. McDaniel, Thomas La Porta:
Security for Telecommunications Networks. Advances in Information Security 40, Springer 2008, ISBN 978-0-387-72441-6, pp. 1-162 - [j9]Patrick Traynor, William Enck, Patrick D. McDaniel, Thomas La Porta:
Exploiting open functionality in SMS-capable cellular networks. J. Comput. Secur. 16(6): 713-742 (2008) - [j8]Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick D. McDaniel:
Noninvasive Methods for Host Certification. ACM Trans. Inf. Syst. Secur. 11(3): 16:1-16:23 (2008) - [j7]Patrick D. McDaniel, Bashar Nuseibeh:
Guest Editors' Introduction: Special Section on Software Engineering for Secure Systems. IEEE Trans. Software Eng. 34(1): 3-4 (2008) - [c55]William Enck, Patrick D. McDaniel, Trent Jaeger:
PinUP: Pinning User Files to Known Applications. ACSAC 2008: 55-64 - [c54]William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick D. McDaniel, Adam D. Smith:
Defending Against Attacks on Main Memory Persistence. ACSAC 2008: 65-74 - [c53]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel:
Rootkit-resistant disks. CCS 2008: 403-416 - [c52]Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick D. McDaniel:
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. NDSS 2008 - [c51]Kevin R. B. Butler, William Enck, Harri Hursti, Stephen E. McLaughlin, Patrick Traynor, Patrick D. McDaniel:
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST. EVT 2008 - 2007
- [j6]Wesam Lootah, William Enck, Patrick D. McDaniel:
TARP: Ticket-based address resolution protocol. Comput. Networks 51(15): 4322-4337 (2007) - [c50]Luke St. Clair, Joshua Schiffman, Trent Jaeger, Patrick D. McDaniel:
Establishing and Sustaining System Integrity via Root of Trust Installation. ACSAC 2007: 19-29 - [c49]Boniface Hicks, Tim Misiak, Patrick D. McDaniel:
Channels: Runtime System Infrastructure for Security-Typed Languages. ACSAC 2007: 443-452 - [c48]Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Patrick D. McDaniel:
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. AINA Workshops (1) 2007: 519-524 - [c47]William Enck, Sandra Julieta Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel:
Protecting users from "themselves". CSAW 2007: 29-36 - [c46]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel:
Non-volatile memory and disks: avenues for policy architectures. CSAW 2007: 77-84 - [c45]Lisa Johansen, Michael Rowell, Kevin R. B. Butler, Patrick D. McDaniel:
Email Communities of Interest. CEAS 2007 - [c44]Sophie Y. Qiu, Patrick D. McDaniel, Fabian Monrose:
Toward Valley-Free Inter-domain Routing. ICC 2007: 2009-2016 - [c43]Dhananjay Bapat, Kevin R. B. Butler, Patrick D. McDaniel:
Towards Automated Privilege Separation. ICISS 2007: 272-276 - [c42]Hosam Rowaihy, William Enck, Patrick D. McDaniel, Thomas La Porta:
Limiting Sybil Attacks in Structured P2P Networks. INFOCOM 2007: 2596-2600 - [c41]Anusha Sriraman, Kevin R. B. Butler, Patrick D. McDaniel, Padma Raghavan:
Analysis of the IPv4 Address Space Delegation Structure. ISCC 2007: 501-508 - [c40]Boniface Hicks, Dave King, Patrick D. McDaniel:
Jifclipse: development tools for security-typed languages. PLAS 2007: 1-10 - [c39]Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel:
A logical specification and analysis for SELinux MLS policy. SACMAT 2007: 91-100 - [c38]Heesook Choi, Patrick D. McDaniel, Thomas F. La Porta:
Privacy Preserving Communication in MANETs. SECON 2007: 233-242 - [c37]William Enck, Patrick D. McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert G. Greenberg, Sanjay G. Rao, William Aiello:
Configuration Management at Massive Scale: System Design and Experience. USENIX ATC 2007: 73-86 - [c36]Boniface Hicks, Sandra Julieta Rueda, Trent Jaeger, Patrick D. McDaniel:
From Trusted to Secure: Building and Executing Applications That Enforce System Security. USENIX ATC 2007: 205-218 - [c35]Patrick D. McDaniel:
On Attack Causality in Internet-Connected Cellular Networks. USENIX Security Symposium 2007 - [e3]Patrick D. McDaniel, Shyam K. Gupta:
Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings. Lecture Notes in Computer Science 4812, Springer 2007, ISBN 978-3-540-77085-5 [contents] - 2006
- [j5]Patrick D. McDaniel, William Aiello, Kevin R. B. Butler, John Ioannidis:
Origin authentication in interdomain routing. Comput. Networks 50(16): 2953-2980 (2006) - [j4]Matthew Pirretti, Sencun Zhu, Narayanan Vijaykrishnan, Patrick D. McDaniel, Mahmut T. Kandemir, Richard R. Brooks:
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. Int. J. Distributed Sens. Networks 2(3): 267-287 (2006) - [j3]Patrick D. McDaniel, Atul Prakash:
Enforcing provisioning and authorization policy in the Antigone system. J. Comput. Secur. 14(6): 483-511 (2006) - [j2]Patrick D. McDaniel, Atul Prakash:
Methods and limitations of security policy reconciliation. ACM Trans. Inf. Syst. Secur. 9(3): 259-291 (2006) - [c34]Boniface Hicks, Kiyan Ahmadizadeh, Patrick D. McDaniel:
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages. ACSAC 2006: 153-164 - [c33]Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Brent Waters:
Secure attribute-based systems. CCS 2006: 99-112 - [c32]Kevin R. B. Butler, Patrick D. McDaniel, William Aiello:
Optimizing BGP security by exploiting path stability. CCS 2006: 298-310 - [c31]Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Trent Jaeger:
Password Exhaustion: Predicting the End of Password Usefulness. ICISS 2006: 37-55 - [c30]Kevin R. B. Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick D. McDaniel:
Privacy Preserving Web-Based Email. ICISS 2006: 116-131 - [c29]Sophie Y. Qiu, Patrick D. McDaniel, Fabian Monrose, Aviel D. Rubin:
Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing. ISCC 2006: 489-496 - [c28]Patrick Traynor, William Enck, Patrick D. McDaniel, Thomas La Porta:
Mitigating attacks on open functionality in SMS-capable cellular networks. MobiCom 2006: 182-193 - [c27]Patrick D. McDaniel, Subhabrata Sen, Oliver Spatscheck, Jacobus E. van der Merwe, William Aiello, Charles R. Kalmanek:
Enterprise Security: A Community of Interest Based Approach. NDSS 2006 - [c26]Boniface Hicks, Dave King, Patrick D. McDaniel, Michael Hicks:
Trusted declassification: : high-level policy for a security-typed language. PLAS 2006: 65-74 - [c25]Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick D. McDaniel:
Non-Invasive Methods for Host Certification. SecureComm 2006: 1-10 - [c24]Shiva Chaitanya, Kevin R. B. Butler, Anand Sivasubramaniam, Patrick D. McDaniel, Murali Vilayannur:
Design, implementation and evaluation of security in iSCSI-based network storage systems. StorageSS 2006: 17-28 - [c23]Trent Jaeger, Patrick D. McDaniel, Luke St. Clair, Ramón Cáceres, Reiner Sailer:
Shame on Trust in Distributed Systems. HotSec 2006 - 2005
- [j1]Patrick D. McDaniel, Aviel D. Rubin:
Web security. Comput. Networks 48(5): 697-699 (2005) - [c22]Wesam Lootah, William Enck, Patrick D. McDaniel:
TARP: Ticket-based Address Resolution Protocol. ACSAC 2005: 106-116 - [c21]William Enck, Patrick Traynor, Patrick D. McDaniel, Thomas F. La Porta:
Exploiting open functionality in SMS-capable cellular networks. CCS 2005: 393-404 - [c20]Somesh Jha, Louis Kruger, Patrick D. McDaniel:
Privacy Preserving Clustering. ESORICS 2005: 397-417 - [c19]Kevin R. B. Butler, Patrick D. McDaniel:
Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. ICISS 2005: 36-48 - [c18]Ali Al-Lawati, Dongwon Lee, Patrick D. McDaniel:
Blocking-aware private record linkage. IQIS 2005: 59-68 - [c17]Heesook Choi, William Enck, Jaesheung Shin, Patrick D. McDaniel, Thomas F. La Porta:
Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks. MobiQuitous 2005: 12-21 - [c16]William Aiello, Charles R. Kalmanek, Patrick D. McDaniel, Subhabrata Sen, Oliver Spatscheck, Jacobus E. van der Merwe:
Analysis of Communities of Interest in Data Networks. PAM 2005: 83-96 - [e2]Patrick D. McDaniel:
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005. USENIX Association 2005 [contents] - [r2]Patrick D. McDaniel:
IPsec. Encyclopedia of Cryptography and Security 2005 - [r1]Patrick D. McDaniel:
Policy. Encyclopedia of Cryptography and Security 2005 - 2004
- [c15]Simon D. Byers, Lorrie Faith Cranor, David P. Kormann, Patrick D. McDaniel:
Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine. Privacy Enhancing Technologies 2004: 314-328 - [c14]Hao Wang, Somesh Jha, Miron Livny, Patrick D. McDaniel:
Security Policy Reconciliation in Distributed Computing Environments. POLICY 2004: 137- - [e1]Vijayalakshmi Atluri, Birgit Pfitzmann, Patrick D. McDaniel:
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004. ACM 2004, ISBN 1-58113-961-6 [contents] - 2003
- [c13]Eric Cronin, Sugih Jamin, Tal Malkin, Patrick D. McDaniel:
On the performance, feasibility, and use of forward-secure signatures. CCS 2003: 131-144 - [c12]William Aiello, John Ioannidis, Patrick D. McDaniel:
Origin authentication in interdomain routing. CCS 2003: 165-178 - [c11]Jim Irrer, Atul Prakash, Patrick D. McDaniel:
Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System. DISCEX (2) 2003: 44-46 - [c10]Patrick D. McDaniel, Atul Prakash:
A Flexible Architecture for Security Policy Enforcement. DISCEX (2) 2003: 234-239 - [c9]Simon D. Byers, Lorrie Faith Cranor, David P. Kormann, Patrick D. McDaniel, Eric Cronin:
Analysis of security vulnerabilities in the movie production and distribution process. Digital Rights Management Workshop 2003: 1-12 - [c8]Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick D. McDaniel, Aviel D. Rubin:
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. NDSS 2003 - [c7]Patrick D. McDaniel:
On context in authorization policy. SACMAT 2003: 80-89 - 2002
- [c6]Patrick D. McDaniel, Atul Prakash:
Methods and Limitations of Security Policy Reconciliation. S&P 2002: 73-87 - 2001
- [b1]Patrick D. McDaniel:
*Policy management in secure group communication. University of Michigan, USA, 2001 - [c5]Hugh Harney, Andrea Colgrove, Patrick D. McDaniel:
Principles of Policy in Secure Groups. NDSS 2001 - 2000
- [c4]Patrick D. McDaniel, Aviel D. Rubin:
A Response to ''Can We Eliminate Certificate Revocation Lists?''. Financial Cryptography 2000: 245-258 - [c3]Patrick D. McDaniel, Sugih Jamin:
Windowed Certificate Revocation. INFOCOM 2000: 1406-1414
1990 – 1999
- 1999
- [c2]William A. Adamson, Charles J. Antonelli, Kevin Coffman, Patrick D. McDaniel, Jim Rees:
Secure Distributed Virtual Conferencing. Communications and Multimedia Security 1999: 176-190 - [c1]Patrick D. McDaniel, Atul Prakash, Peter Honeyman:
Antigone: A Flexible Framework for Secure Group Communication. USENIX Security Symposium 1999
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 00:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint