default search action
Patrick Traynor
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c92]K. Virgil English, Nathaniel Bennett, Seaver Thorn, Kevin R. B. Butler, William Enck, Patrick Traynor:
Examining Cryptography and Randomness Failures in Open-Source Cellular Cores. CODASPY 2024: 43-54 - [c91]Seth Layton, Tyler Tucker, Daniel Olszewski, Kevin Warren, Kevin R. B. Butler, Patrick Traynor:
SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets. USENIX Security Symposium 2024 - [c90]Jianliang Wu, Patrick Traynor, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi:
Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations. USENIX Security Symposium 2024 - [i12]Seth Layton, Thiago De Andrade, Daniel Olszewski, Kevin Warren, Kevin R. B. Butler, Patrick Traynor:
Every Breath You Don't Take: Deepfake Speech Detection Using Breath. CoRR abs/2404.15143 (2024) - 2023
- [c89]Daniel Olszewski, Allison Lu, Carson Stillman, Kevin Warren, Cole Kitroser, Alejandro Pascual, Divyajyoti Ukirde, Kevin R. B. Butler, Patrick Traynor:
"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences. CCS 2023: 3433-3459 - [c88]Christian Peeters, Tyler Tucker, Anushri Jain, Kevin R. B. Butler, Patrick Traynor:
LeopardSeal: Detecting Call Interception via Audio Rogue Base Stations. MobiSys 2023: 410-422 - [c87]Hadi Abdullah, Aditya Karlekar, Saurabh Prasad, Muhammad Sajidur Rahman, Logan Blue, Luke A. Bauer, Vincent Bindschaedler, Patrick Traynor:
Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems. NDSS 2023 - [c86]Tyler Tucker, Hunter Searle, Kevin R. B. Butler, Patrick Traynor:
Blue's Clues: Practical Discovery of Non-Discoverable Bluetooth Devices. SP 2023: 3098-3112 - 2022
- [j30]Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler:
Analyzing the Monetization Ecosystem of Stalkerware. Proc. Priv. Enhancing Technol. 2022(4): 105-119 (2022) - [c85]Christian Peeters, Christopher Patton, Imani N. S. Munyaka, Daniel Olszewski, Thomas Shrimpton, Patrick Traynor:
SMS OTP Security (SOS): Hardening SMS-Based Two Factor Authentication. AsiaCCS 2022: 2-16 - [c84]Daniel Olszewski, Weidong Zhu, Sandeep Sathyanarayana, Kevin R. B. Butler, Patrick Traynor:
HallMonitor: A Framework for Identifying Network Policy Violations in Software. CNS 2022: 245-253 - [c83]Hadi Abdullah, Aditya Karlekar, Vincent Bindschaedler, Patrick Traynor:
Demystifying Limited Adversarial Transferability in Automatic Speech Recognition Systems. ICLR 2022 - [c82]Grant Hernandez, Marius Muench, Dominik Christian Maier, Alyssa Milburn, Shinjo Park, Tobias Scharnowski, Tyler Tucker, Patrick Traynor, Kevin R. B. Butler:
FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware. NDSS 2022 - [c81]Logan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin R. B. Butler, Patrick Traynor:
Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction. USENIX Security Symposium 2022: 2691-2708 - [i11]Hadi Abdullah, Aditya Karlekar, Saurabh Prasad, Muhammad Sajidur Rahman, Logan Blue, Luke A. Bauer, Vincent Bindschaedler, Patrick Traynor:
Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems. CoRR abs/2203.05408 (2022) - 2021
- [j29]Samuel T. King, Nolen Scaife, Patrick Traynor, Zain ul Abi Din, Christian Peeters, Hari Venugopalan:
Credit Card Fraud Is a Computer Security Problem. IEEE Secur. Priv. 19(2): 65-69 (2021) - [c80]Hadi Abdullah, Muhammad Sajidur Rahman, Christian Peeters, Cassidy Gibson, Washington Garcia, Vincent Bindschaedler, Thomas Shrimpton, Patrick Traynor:
Beyond Lp Clipping: Equalization based Psychoacoustic Attacks against ASRs. ACML 2021: 672-688 - [c79]Logan Blue, Samuel Marchal, Patrick Traynor, N. Asokan:
Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices. IoTDI 2021: 15-27 - [c78]Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor:
Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems. SP 2021: 712-729 - [c77]Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, Nicolas Papernot, Patrick Traynor:
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems. SP 2021: 730-747 - [c76]Arslan Khan, Joseph I. Choi, Dave Jing Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, John M. Shea, Tan F. Wong:
Privacy-Preserving Localization using Enclaves. UEMCON 2021: 269-278 - [i10]Hadi Abdullah, Muhammad Sajidur Rahman, Christian Peeters, Cassidy Gibson, Washington Garcia, Vincent Bindschaedler, Thomas Shrimpton, Patrick Traynor:
Beyond Lp clipping: Equalization-based Psychoacoustic Attacks against ASRs. CoRR abs/2110.13250 (2021) - 2020
- [c75]Luis Vargas, Patrick Emami, Patrick Traynor:
On the Detection of Disinformation Campaign Activity with Network Analysis. CCSW 2020: 133-146 - [c74]Imani N. Sherman, Jasmine D. Bowers, Liz-Laure Laborde, Juan E. Gilbert, Jaime Ruiz, Patrick Traynor:
Truly Visual Caller ID? An Analysis of Anti-Robocall Applications and their Accessibility to Visually Impaired Users. ISTAS 2020: 266-279 - [c73]Imani N. Sherman, Jasmine D. Bowers, Keith McNamara Jr., Juan E. Gilbert, Jaime Ruiz, Patrick Traynor:
Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators. NDSS 2020 - [i9]Luis Vargas, Patrick Emami, Patrick Traynor:
On the Detection of Disinformation Campaign Activity with Network Analysis. CoRR abs/2005.13466 (2020) - [i8]Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, Nicolas Papernot, Patrick Traynor:
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems. CoRR abs/2007.06622 (2020)
2010 – 2019
- 2019
- [j28]Nolen Scaife, Christian Peeters, Patrick Traynor:
More Cowbell: Lessons Learned in Developing the Skim Reaper. IEEE Secur. Priv. 17(4): 10-17 (2019) - [j27]Grant Hernandez, Farhaan Fowze, Dave Jing Tian, Tuba Yavuz, Patrick Traynor, Kevin R. B. Butler:
Toward Automated Firmware Analysis in the IoT Era. IEEE Secur. Priv. 17(5): 38-46 (2019) - [j26]Henry Carter, Patrick Traynor:
Outsourcing computation for private function evaluation. Int. J. Inf. Comput. Secur. 11(6): 525-561 (2019) - [j25]Bradley Reaves, Luis Vargas, Nolen Scaife, Dave Tian, Logan Blue, Patrick Traynor, Kevin R. B. Butler:
Characterizing the Security of the SMS Ecosystem with Public Gateways. ACM Trans. Priv. Secur. 22(1): 2:1-2:31 (2019) - [c72]Joseph I. Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor:
A Hybrid Approach to Secure Function Evaluation using SGX. AsiaCCS 2019: 100-113 - [c71]Vanessa Frost, Dave (Jing) Tian, Christie Ruales, Vijay Prakash, Patrick Traynor, Kevin R. B. Butler:
Examining DES-based Cipher Suite Support within the TLS Ecosystem. AsiaCCS 2019: 539-546 - [c70]Dave (Jing) Tian, Joseph I. Choi, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler:
A Practical Intel SGX Setting for Linux Containers in the Cloud. CODASPY 2019: 255-266 - [c69]Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson:
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. NDSS 2019 - [c68]Luis Vargas, Logan Blue, Vanessa Frost, Christopher Patton, Nolen Scaife, Kevin R. B. Butler, Patrick Traynor:
Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System. NDSS 2019 - [c67]Nolen Scaife, Jasmine D. Bowers, Christian Peeters, Grant Hernandez, Imani N. Sherman, Patrick Traynor, Lisa Anthony:
Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers. IEEE Symposium on Security and Privacy 2019: 1000-1014 - [c66]Jasmine D. Bowers, Imani N. Sherman, Kevin R. B. Butler, Patrick Traynor:
Characterizing security and privacy practices in emerging digital credit applications. WiSec 2019: 94-107 - [c65]Joseph I. Choi, Dave (Jing) Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, John M. Shea, Tan F. Wong:
Enclave-based privacy-preserving localization: poster. WiSec 2019: 312-313 - [e4]Nadia Heninger, Patrick Traynor:
28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019. USENIX Association 2019 [contents] - [i7]Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson:
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. CoRR abs/1904.05734 (2019) - [i6]Joseph I. Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor:
A Hybrid Approach to Secure Function Evaluation Using SGX. CoRR abs/1905.01233 (2019) - [i5]Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor:
Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems. CoRR abs/1910.05262 (2019) - 2018
- [j24]Nolen Scaife, Henry Carter, Lyrissa Lidsky, Rachael L. Jones, Patrick Traynor:
OnionDNS: a seizure-resistant top-level domain. Int. J. Inf. Sec. 17(6): 645-660 (2018) - [c64]Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl:
A Large Scale Investigation of Obfuscation Use in Google Play. ACSAC 2018: 222-235 - [c63]Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor:
2MA: Verifying Voice Commands via Two Microphone Authentication. AsiaCCS 2018: 89-100 - [c62]Luis Vargas, Gyan Hazarika, Rachel Culpepper, Kevin R. B. Butler, Thomas Shrimpton, Doug Szajda, Patrick Traynor:
Mitigating Risk while Complying with Data Retention Laws. CCS 2018: 2011-2027 - [c61]Christian Peeters, Hadi Abdullah, Nolen Scaife, Jasmine D. Bowers, Patrick Traynor, Bradley Reaves, Kevin R. B. Butler:
Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding. IEEE Symposium on Security and Privacy 2018: 567-582 - [c60]Nolen Scaife, Christian Peeters, Camilo Velez, Hanqing Zhao, Patrick Traynor, David Arnold:
The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding Jitter. IEEE Symposium on Security and Privacy 2018: 1063-1076 - [c59]Nolen Scaife, Christian Peeters, Patrick Traynor:
Fear the Reaper: Characterization and Fast Detection of Card Skimmers. USENIX Security Symposium 2018: 1-14 - [c58]Dave (Jing) Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Christie Ruales, Patrick Traynor, Hayawardh Vijayakumar, Lee Harrison, Amir Rahmati, Michael Grace, Kevin R. B. Butler:
ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem. USENIX Security Symposium 2018: 273-290 - [c57]Logan Blue, Luis Vargas, Patrick Traynor:
Hello, Is It Me You're Looking For?: Differentiating Between Human and Electronic Speakers for Voice Interface Security. WISEC 2018: 123-133 - [i4]Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl:
A Large Scale Investigation of Obfuscation Use in Google Play. CoRR abs/1801.02742 (2018) - 2017
- [j23]Patrick Traynor, Kevin R. B. Butler, Jasmine D. Bowers, Bradley Reaves:
FinTechSec: Addressing the Security Challenges of Digital Financial Services. IEEE Secur. Priv. 15(5): 85-89 (2017) - [j22]Stephan Heuser, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra Dmitrienko, William Enck, Negar Kiyavash, Ahmad-Reza Sadeghi, Patrick Traynor:
Phonion: Practical Protection of Metadata in Telephony Networks. Proc. Priv. Enhancing Technol. 2017(1): 170-187 (2017) - [j21]Bradley Reaves, Jasmine D. Bowers, Nolen Scaife, Adam Bates, Arnav Bhartiya, Patrick Traynor, Kevin R. B. Butler:
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications. ACM Trans. Priv. Secur. 20(3): 11:1-11:31 (2017) - [j20]Chaitrali Amrutkar, Young Seuk Kim, Patrick Traynor:
Detecting Mobile Malicious Webpages in Real Time. IEEE Trans. Mob. Comput. 16(8): 2184-2197 (2017) - [c56]Tyler Ward, Joseph I. Choi, Kevin R. B. Butler, John M. Shea, Patrick Traynor, Tan F. Wong:
Privacy preserving localization using a distributed particle filtering protocol. MILCOM 2017: 835-840 - [c55]Jasmine D. Bowers, Bradley Reaves, Imani N. Sherman, Patrick Traynor, Kevin R. B. Butler:
Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. SOUPS 2017: 97-114 - [c54]Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor, Thomas Shrimpton:
AuthentiCall: Efficient Identity and Content Authentication for Phone Calls. USENIX Security Symposium 2017: 575-592 - 2016
- [j19]Bradley Reaves, Jasmine D. Bowers, Sigmund Albert Gorski III, Olabode Anise, Rahul Bobhate, Raymond Cho, Hiranava Das, Sharique Hussain, Hamza Karachiwala, Nolen Scaife, Byron Wright, Kevin R. B. Butler, William Enck, Patrick Traynor:
*droid: Assessment and Evaluation of Android Application Analysis Tools. ACM Comput. Surv. 49(3): 55:1-55:30 (2016) - [j18]Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Secure outsourced garbled circuit evaluation for mobile devices. J. Comput. Secur. 24(2): 137-180 (2016) - [j17]Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Outsourcing secure two-party computation as a black box. Secur. Commun. Networks 9(14): 2261-2275 (2016) - [c53]Siddhant Deshmukh, Henry Carter, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler:
Efficient and secure template blinding for biometric authentication. CNS 2016: 480-488 - [c52]Benjamin Mood, Debayan Gupta, Henry Carter, Kevin R. B. Butler, Patrick Traynor:
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation. EuroS&P 2016: 112-127 - [c51]Debayan Gupta, Benjamin Mood, Joan Feigenbaum, Kevin R. B. Butler, Patrick Traynor:
Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation. Financial Cryptography Workshops 2016: 302-318 - [c50]Nolen Scaife, Henry Carter, Patrick Traynor, Kevin R. B. Butler:
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data. ICDCS 2016: 303-312 - [c49]Bradley Reaves, Nolen Scaife, Dave Tian, Logan Blue, Patrick Traynor, Kevin R. B. Butler:
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways. IEEE Symposium on Security and Privacy 2016: 339-356 - [c48]Dave (Jing) Tian, Nolen Scaife, Adam Bates, Kevin R. B. Butler, Patrick Traynor:
Making USB Great Again with USBFILTER. USENIX Security Symposium 2016: 415-430 - [c47]Bradley Reaves, Logan Blue, Patrick Traynor:
AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels. USENIX Security Symposium 2016: 963-978 - [c46]Bradley Reaves, Logan Blue, Dave Tian, Patrick Traynor, Kevin R. B. Butler:
Detecting SMS Spam in the Age of Legitimate Bulk Messaging. WISEC 2016: 165-170 - [e3]Natalie Silvanovich, Patrick Traynor:
10th USENIX Workshop on Offensive Technologies, WOOT 16, Austin, TX, USA, August 8-9, 2016. USENIX Association 2016 [contents] - [i3]Henry Carter, Patrick Traynor:
OPFE: Outsourcing Computation for Private Function Evaluation. IACR Cryptol. ePrint Arch. 2016: 67 (2016) - 2015
- [j16]Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable wiretapping - or - I know they can hear you now. J. Comput. Secur. 23(2): 167-195 (2015) - [j15]Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot:
An Empirical Evaluation of Security Indicators in Mobile Web Browsers. IEEE Trans. Mob. Comput. 14(5): 889-903 (2015) - [c45]David Dewey, Bradley Reaves, Patrick Traynor:
Uncovering Use-After-Free Conditions in Compiled Code. ARES 2015: 90-99 - [c44]Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Outsourcing Secure Two-Party Computation as a Black Box. CANS 2015: 214-222 - [c43]Nolen Scaife, Henry Carter, Patrick Traynor:
OnionDNS: A seizure-resistant top-level Domain. CNS 2015: 379-387 - [c42]Ethan Shernan, Henry Carter, Dave Tian, Patrick Traynor, Kevin R. B. Butler:
More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations. DIMVA 2015: 239-260 - [c41]Bradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor, Kevin R. B. Butler:
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World. USENIX Security Symposium 2015: 17-32 - [c40]Bradley Reaves, Ethan Shernan, Adam Bates, Henry Carter, Patrick Traynor:
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge. USENIX Security Symposium 2015: 833-848 - 2014
- [j14]Henry Carter, Chaitrali Amrutkar, Italo Dacosta, Patrick Traynor:
For your phone only: custom protocols for efficient secure function evaluation on mobile devices. Secur. Commun. Networks 7(7): 1165-1176 (2014) - [c39]Henry Carter, Charles Lever, Patrick Traynor:
Whitewash: outsourcing garbled circuit generation for mobile devices. ACSAC 2014: 266-275 - [e2]Gergely Ács, Andrew P. Martin, Ivan Martinovic, Claude Castelluccia, Patrick Traynor:
7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014. ACM 2014, ISBN 978-1-4503-2972-9 [contents] - [i2]Henry Carter, Charles Lever, Patrick Traynor:
Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices. IACR Cryptol. ePrint Arch. 2014: 224 (2014) - [i1]Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Outsourcing Secure Two-Party Computation as a Black Box. IACR Cryptol. ePrint Arch. 2014: 936 (2014) - 2013
- [c38]Chaitrali Amrutkar, Matti A. Hiltunen, Trevor Jim, Kaustubh R. Joshi, Oliver Spatscheck, Patrick Traynor, Shobha Venkataraman:
Why is my smartphone slow? On the fly diagnosis of underperformance on the mobile Internet. DSN 2013: 1-8 - [c37]Charles Lever, Manos Antonakakis, Bradley Reaves, Patrick Traynor, Wenke Lee:
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers. NDSS 2013 - [c36]Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. USENIX Security Symposium 2013: 289-304 - [c35]Saurabh Chakradeo, Bradley Reaves, Patrick Traynor, William Enck:
MAST: triage for market-scale mobile malware analysis. WISEC 2013: 13-24 - 2012
- [j13]Cong Shi, Xiapu Luo, Patrick Traynor, Mostafa H. Ammar, Ellen W. Zegura:
ARDEN: Anonymous networking in delay tolerant networks. Ad Hoc Networks 10(6): 918-930 (2012) - [j12]Patrick Traynor:
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services. IEEE Trans. Mob. Comput. 11(6): 983-994 (2012) - [j11]Italo Dacosta, Saurabh Chakradeo, Mustaque Ahamad, Patrick Traynor:
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens. ACM Trans. Internet Techn. 12(1): 1:1-1:24 (2012) - [c34]Chaitrali Amrutkar, Patrick Traynor:
Short paper: rethinking permissions for mobile web apps: barriers and the road ahead. SPSM@CCS 2012: 15-20 - [c33]Italo Dacosta, Mustaque Ahamad, Patrick Traynor:
Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties. ESORICS 2012: 199-216 - [c32]Chaitrali Amrutkar, Kapil Singh, Arunabh Verma, Patrick Traynor:
VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security. ICISS 2012: 16-34 - [c31]Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot:
Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road? ISC 2012: 86-103 - [c30]Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable Wiretapping -or- I know they can hear you now. NDSS 2012 - [c29]Nigel Lawrence, Patrick Traynor:
Under New Management: Practical Attacks on SNMPv3. WOOT 2012 - [e1]Patrick Traynor:
7th USENIX Workshop on Hot Topics in Security, HotSec'12, Bellevue, WA, USA, August 7, 2012. USENIX Association 2012 [contents] - 2011
- [j10]Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao, Trent Jaeger, Patrick D. McDaniel, Thomas La Porta:
From mobile phones to responsible devices. Secur. Commun. Networks 4(6): 719-726 (2011) - [j9]Italo Dacosta, Vijay Balasubramaniyan, Mustaque Ahamad, Patrick Traynor:
Improving Authentication Performance of Distributed SIP Proxies. IEEE Trans. Parallel Distributed Syst. 22(11): 1804-1812 (2011) - [c28]Nilesh Nipane, Italo Dacosta, Patrick Traynor:
"Mix-in-Place" anonymous networking using secure function evaluation. ACSAC 2011: 63-72 - [c27]Yacin Nadji, Jonathon T. Giffin, Patrick Traynor:
Automated remote repair for mobile malware. ACSAC 2011: 413-422 - [c26]Philip Marquardt, Arunabh Verma, Henry Carter, Patrick Traynor:
(sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers. CCS 2011: 551-562 - [c25]Philip Marquardt, David Dagon, Patrick Traynor:
Impeding Individual User Profiling in Shopper Loyalty Programs. Financial Cryptography 2011: 93-101 - [c24]David Dewey, Patrick Traynor:
No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects. NDSS 2011 - 2010
- [j8]Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Brent Waters:
Secure attribute-based systems. J. Comput. Secur. 18(5): 799-837 (2010) - [j7]Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick D. McDaniel, Kevin Borders:
malnets: large-scale malicious networks via compromised wireless access points. Secur. Commun. Networks 3(2-3): 102-113 (2010) - [c23]Vijay A. Balasubramaniyan, Aamir Poonawalla, Mustaque Ahamad, Michael T. Hunter, Patrick Traynor:
PinDr0p: using single-ended audio features to determine call provenance. CCS 2010: 109-120 - [c22]Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor, Wenke Lee:
Evaluating Bluetooth as a Medium for Botnet Command and Control. DIMVA 2010: 61-80 - [c21]Patrick Traynor, Joshua Schiffman, Thomas La Porta, Patrick D. McDaniel, Abhrajit Ghosh:
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware. GLOBECOM 2010: 1-6 - [c20]Patrick Traynor:
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services. SecureComm 2010: 125-143 - [c19]Italo Dacosta, Patrick Traynor:
Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks. USENIX ATC 2010
2000 – 2009
- 2009
- [j6]Patrick Traynor:
Securing Cellular Infrastructure: Challenges and Opportunities. IEEE Secur. Priv. 7(4): 77-79 (2009) - [j5]Patrick Traynor, William Enck, Patrick D. McDaniel, Thomas La Porta:
Mitigating attacks on open functionality in SMS-capable cellular networks. IEEE/ACM Trans. Netw. 17(1): 40-53 (2009) - [j4]Kevin R. B. Butler, Sunam Ryu, Patrick Traynor, Patrick D. McDaniel:
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. IEEE Trans. Parallel Distributed Syst. 20(12): 1803-1815 (2009) - [c18]Frank S. Park, Chinmay Gangakhedkar, Patrick Traynor:
Leveraging Cellular Infrastructure to Improve Fraud Prevention. ACSAC 2009: 350-359 - [c17]Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick D. McDaniel, Thomas La Porta:
On cellular botnets: measuring the impact of malicious devices on a cellular network core. CCS 2009: 223-234 - [c16]Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick Traynor, Jonathon T. Giffin:
Robust signatures for kernel data structures. CCS 2009: 566-577 - [c15]Italo Dacosta, Vijay Balasubramaniyan, Mustaque Ahamad, Patrick Traynor:
Improving authentication performance of distributed SIP proxies. IPTComm 2009: 1 - 2008
- [b1]Patrick Traynor, Patrick D. McDaniel, Thomas La Porta:
Security for Telecommunications Networks. Advances in Information Security 40, Springer 2008, ISBN 978-0-387-72441-6, pp. 1-162 - [j3]Patrick Traynor, William Enck, Patrick D. McDaniel, Thomas La Porta:
Exploiting open functionality in SMS-capable cellular networks. J. Comput. Secur. 16(6): 713-742 (2008) - [j2]Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick D. McDaniel:
Noninvasive Methods for Host Certification. ACM Trans. Inf. Syst. Secur. 11(3): 16:1-16:23 (2008) - [c14]Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick D. McDaniel:
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. NDSS 2008 - [c13]Kevin R. B. Butler, William Enck, Harri Hursti, Stephen E. McLaughlin, Patrick Traynor, Patrick D. McDaniel:
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST. EVT 2008 - 2007
- [j1]Patrick Traynor, Raju Kumar, Heesook Choi, Guohong Cao, Sencun Zhu, Thomas La Porta:
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. IEEE Trans. Mob. Comput. 6(6): 663-677 (2007) - [c12]Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Patrick D. McDaniel:
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. AINA Workshops (1) 2007: 519-524 - 2006
- [c11]Song Wang, Richard M. Reichley, Laura A. Noirot, Patricia Storey, Patrick Traynor, W. Claiborne Dunagan, Thomas C. Bailey:
Identification of Patients with Coronary Heart Disease: Meeting Regulatory Standards vs. Improving Overall Care. AMIA 2006 - [c10]Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Brent Waters:
Secure attribute-based systems. CCS 2006: 99-112 - [c9]Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Trent Jaeger:
Password Exhaustion: Predicting the End of Password Usefulness. ICISS 2006: 37-55 - [c8]Kevin R. B. Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick D. McDaniel:
Privacy Preserving Web-Based Email. ICISS 2006: 116-131 - [c7]Patrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu, Thomas La Porta:
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks. INFOCOM 2006 - [c6]Patrick Traynor, William Enck, Patrick D. McDaniel, Thomas La Porta:
Mitigating attacks on open functionality in SMS-capable cellular networks. MobiCom 2006: 182-193 - [c5]Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guohong Cao, Thomas La Porta:
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks. MobiSys 2006: 15-27 - [c4]Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick D. McDaniel:
Non-Invasive Methods for Host Certification. SecureComm 2006: 1-10 - [c3]Patrick Traynor, Jaesheung Shin, Bharat B. Madan, Shashi Phoha, Thomas La Porta:
Efficient Group Mobility for Heterogeneous Sensor Networks. VTC Fall 2006: 1-5 - [c2]Patrick Traynor, Guohong Cao, Thomas La Porta:
The effects of probabilistic key management on secure routing in sensor networks. WCNC 2006: 659-664 - 2005
- [c1]William Enck, Patrick Traynor, Patrick D. McDaniel, Thomas F. La Porta:
Exploiting open functionality in SMS-capable cellular networks. CCS 2005: 393-404
Coauthor Index
aka: Thomas F. La Porta
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-19 00:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint