David Barrera

Orcid: 0000-0003-2319-9916

Affiliations:
  • Carleton University, Canada
  • Polytechnique Montréal, Canada (former)
  • ETH Zürich, Switzerland (former)


According to our database1, David Barrera authored at least 38 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Security Best Practices: A Critical Analysis Using IoT as a Case Study.
ACM Trans. Priv. Secur., May, 2023

A close look at a systematic method for analyzing sets of security advice.
J. Cybersecur., January, 2023

Escaping Vendor Mortality: A New Paradigm for Extending IoT Device Longevity.
Proceedings of the 2023 New Security Paradigms Workshop, 2023

2022
Toward Identification and Characterization of IoT Software Update Practices.
CoRR, 2022

Ontology-Based Anomaly Detection for Air Traffic Control Systems.
CoRR, 2022

If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

Towards Characterizing IoT Software Update Practices.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

2021
BPFContain: Fixing the Soft Underbelly of Container Security.
CoRR, 2021

2020
SERENIoT: Collaborative Network Security Policy Management and Enforcement for Smart Homes.
CoRR, 2020

Understanding Cybersecurity Practices in Emergency Departments.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

bpfbox: Simple Precise Process Confinement with eBPF.
Proceedings of the CCSW'20, 2020

SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2018
A first look at the usability of bitcoin key management.
CoRR, 2018

TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
IDIoT: Securing the Internet of Things like it's 1994.
CoRR, 2017

The SCION internet architecture.
Commun. ACM, 2017

Internet Kill Switches Demystified.
Proceedings of the 10th European Workshop on Systems Security, 2017

2016
Picking a (Smart)Lock: Locking Relationships on Mobile Devices.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Source Accountability with Domain-brokered Privacy.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016

Modeling Data-Plane Power Consumption of Future Internet Architectures.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2015
Bootstrapping Real-world Deployment of Future Internet Architectures.
CoRR, 2015

SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks.
CoRR, 2015

What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks.
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015

On Building Onion Routing into Future Internet Architectures.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015

HORNET: High-speed Onion Routing at the Network Layer.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Baton: certificate agility for android's decentralized signing infrastructure.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

2013
Deadbolt: locking down android disk encryption.
Proceedings of the SPSM'13, 2013

2012
Understanding and improving app installation security mechanisms through empirical analysis of android.
Proceedings of the SPSM'12, 2012

Tapas: design, implementation, and usability evaluation of a password manager.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

ThinAV: truly lightweight mobile cloud-based anti-malware.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Back to the Future: Revisiting IPv6 Privacy Extensions.
login Usenix Mag., 2011

Accommodating IPv6 Addresses in Security Visualization Tools.
Inf. Vis., 2011

Secure Software Installation on Smartphones.
IEEE Secur. Priv., 2011

Mercury: Recovering Forgotten Passwords Using Personal Devices.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
A methodology for empirical analysis of permission-based security models and its application to android.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Security visualization tools and IPv6 addresses.
Proceedings of the 6th International Workshop on Visualization for Cyber Security, 2009

FiGD: An Open Source Intellectual Property Violation Detector.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

2008
Improving Security Visualization with Exposure Map Filtering.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008


  Loading...