Patrick D. McDaniel

According to our database1, Patrick D. McDaniel authored at least 172 papers between 1999 and 2019.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2015, "For contributions to computer and mobile systems security.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud.
IEEE/ACM Trans. Netw., 2019

IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Curie: Policy-based Secure Data Exchange.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Making machine learning robust against adversarial inputs.
Commun. ACM, 2018

Sensitive Information Tracking in Commodity IoT.
Proceedings of the 27th USENIX Security Symposium, 2018

Soteria: Automated IoT Safety and Security Analysis.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Extending Detection with Privileged Information via Generalized Distillation.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout.
Proceedings of the Security and Privacy in Communication Networks, 2018

Enablers of Adversarial Attacks in Machine Learning.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Ensemble Adversarial Training: Attacks and Defenses.
Proceedings of the 6th International Conference on Learning Representations, 2018

SoK: Security and Privacy in Machine Learning.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

IotSan: fortifying the safety of IoT systems.
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, 2018

Detection under Privileged Information.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies.
IEEE Trans. Network and Service Management, 2017

Securing ARP/NDP From the Ground Up.
IEEE Trans. Information Forensics and Security, 2017

Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains.
IEEE Security & Privacy, 2017

Adversarial Network Forensics in Software Defined Networking: Demo.
Proceedings of the Symposium on SDN Research, 2017

Adversarial Network Forensics in Software Defined Networking.
Proceedings of the Symposium on SDN Research, 2017

Cimplifier: automatically debloating containers.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Defining and Detecting Environment Discrimination in Android Apps.
Proceedings of the Security and Privacy in Communication Networks, 2017

Patient-Driven Privacy Control through Generalized Distillation.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Achieving Secure and Differentially Private Computations in Multiparty Settings.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Malicious co-residency on the cloud: Attacks and defense.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Stealth migration: Hiding virtual machines on the network.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Adversarial Examples for Malware Detection.
Proceedings of the Computer Security - ESORICS 2017, 2017

Tracing the Arc of Smartphone Application Security.
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017

Feature Cultivation in Privileged Information-augmented Detection.
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017

Attacking strategies and temporal analysis involving Facebook discussion groups.
Proceedings of the 13th International Conference on Network and Service Management, 2017

Practical Black-Box Attacks against Machine Learning.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Composite Constant Propagation and its Application to Android Program Analysis.
IEEE Trans. Software Eng., 2016

Machine Learning in Adversarial Settings.
IEEE Security & Privacy, 2016

On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
Proceedings of the 25th USENIX Security Symposium, 2016

Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

SoK: Lessons Learned from Android Security Research for Appified Software Platforms.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

BinDNN: Resilient Function Matching Using Deep Learning.
Proceedings of the Security and Privacy in Communication Networks, 2016

Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

Crafting adversarial input sequences for recurrent neural networks.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Mapping sample scenarios to operational models.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

The Limitations of Deep Learning in Adversarial Settings.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Cyber Fighter Associate: A Decision Support System for cyber agility.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

Cyber Deception: Virtual Networks to Defend Insider Reconnaissance.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
Adaptive protocol switching using Dynamically Insertable Bumps in the stack.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Enforcing agile access control policies in relational databases using views.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Computational ontology of network operations.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Malware traffic detection using tamper resistant features.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Detection of stealthy TCP-based DoS attacks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Measuring the Impact and Perception of Acceptable Advertisements.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Composite Constant Propagation: Application to Android Inter-Component Communication Analysis.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

A New Science of Security Decision Making.
Proceedings of the ICISSP 2015, 2015

MICSS: A Realistic Multichannel Secrecy Protocol.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Securing ARP From the Ground Up.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems.
IEEE Trans. Parallel Distrib. Syst., 2014

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
ACM Trans. Comput. Syst., 2014

Toward a Science of Secure Environments.
IEEE Security & Privacy, 2014

Security Outlook: Six Cyber Game Changers for the Next 15 Years.
IEEE Computer, 2014

TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones.
Commun. ACM, 2014

Duet: library integrity verification for android applications.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Building an Ontology of Cyber Security.
Proceedings of the Ninth Conference on Semantic Technology for Intelligence, 2014

FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014

A Trusted Safety Verifier for Process Controller Code.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

An Analysis of Anonymity in Bitcoin Using P2P Network Traffic.
Proceedings of the Financial Cryptography and Data Security, 2014

Security and Science of Agility.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

2013
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
Bloatware Comes to the Smartphone.
IEEE Security & Privacy, 2012

Retargeting Android applications to Java bytecode.
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012

A Detection Mechanism for SMS Flooding Attacks in Cellular Networks.
Proceedings of the Security and Privacy in Communication Networks, 2012

Structured security testing in the smart grid.
Proceedings of the 5th International Symposium on Communications, 2012

Minimizing private data disclosures in the smart grid.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

SABOT: specification-based payload generation for programmable logic controllers.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Scalable Integrity-Guaranteed AJAX.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

Hi-Fi: collecting high-fidelity whole-system provenance.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
From mobile phones to responsible devices.
Security and Communication Networks, 2011

Network-Based Root of Trust for Installation.
IEEE Security & Privacy, 2011

Data Provenance and Security.
IEEE Security & Privacy, 2011

A Study of Android Application Security.
Proceedings of the 20th USENIX Security Symposium, 2011

Protecting consumer privacy from electric load monitoring.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
malnets: large-scale malicious networks via compromised wireless access points.
Security and Communication Networks, 2010

A Survey of BGP Security Issues and Solutions.
Proceedings of the IEEE, 2010

Not So Great Expectations: Why Application Markets Haven't Failed Security.
IEEE Security & Privacy, 2010

New Security Architectures Based on Emerging Disk Functionality.
IEEE Security & Privacy, 2010

Embedded Firmware Diversity for Smart Electric Meters.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

Towards a Secure and Efficient System for End-to-End Provenance.
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010

Realizing a Source Authentic Internet.
Proceedings of the Security and Privacy in Communication Networks, 2010

An architecture for enforcing end-to-end access control over web applications.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

Disk-enabled authenticated encryption.
Proceedings of the IEEE 26th Symposium on Mass Storage Systems and Technologies, 2010

Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware.
Proceedings of the Global Communications Conference, 2010

Seeding clouds with trust anchors.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

Protecting portable storage with host validation.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Porscha: policy oriented secure content handling in Android.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

Multi-vendor penetration testing in the advanced metering infrastructure.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

Kells: a protection framework for portable data.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks.
Wireless Networks, 2009

Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems.
IEEE Trans. Parallel Distrib. Syst., 2009

Configuration management at massive scale: system design and experience.
IEEE Journal on Selected Areas in Communications, 2009

Security and Privacy Challenges in the Smart Grid.
IEEE Security & Privacy, 2009

Understanding Android Security.
IEEE Security & Privacy, 2009

Below the Salt.
Proceedings of the Security Protocols XVII, 2009

Energy Theft in the Advanced Metering Infrastructure.
Proceedings of the Critical Information Infrastructures Security, 2009

On cellular botnets: measuring the impact of malicious devices on a cellular network core.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

On lightweight mobile phone application certification.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Justifying Integrity Using a Virtual Machine Verifier.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Semantically Rich Application-Centric Security in Android.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Scalable Web Content Attestation.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Guest Editors' Introduction: Special Section on Software Engineering for Secure Systems.
IEEE Trans. Software Eng., 2008

Noninvasive Methods for Host Certification.
ACM Trans. Inf. Syst. Secur., 2008

Exploiting open functionality in SMS-capable cellular networks.
Journal of Computer Security, 2008

Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Proceedings of the Network and Distributed System Security Symposium, 2008

Rootkit-resistant disks.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

PinUP: Pinning User Files to Known Applications.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

Defending Against Attacks on Main Memory Persistence.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

Security for Telecommunications Networks
Advances in Information Security 40, Springer, ISBN: 978-0-387-72441-6, 2008

2007
On Attack Causality in Internet-Connected Cellular Networks.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

From Trusted to Secure: Building and Executing Applications That Enforce System Security.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Configuration Management at Massive Scale: System Design and Experience.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Privacy Preserving Communication in MANETs.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

A logical specification and analysis for SELinux MLS policy.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Jifclipse: development tools for security-typed languages.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007

Analysis of the IPv4 Address Space Delegation Structure.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Limiting Sybil Attacks in Structured P2P Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Towards Automated Privilege Separation.
Proceedings of the Information Systems Security, Third International Conference, 2007

Toward Valley-Free Inter-domain Routing.
Proceedings of IEEE International Conference on Communications, 2007

Email Communities of Interest.
Proceedings of the CEAS 2007, 2007

Protecting users from "themselves".
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

Non-volatile memory and disks: avenues for policy architectures.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Channels: Runtime System Infrastructure for Security-Typed Languages.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

Establishing and Sustaining System Integrity via Root of Trust Installation.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Enforcing provisioning and authorization policy in the Antigone system.
Journal of Computer Security, 2006

The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense.
IJDSN, 2006

Origin authentication in interdomain routing.
Computer Networks, 2006

Shame on Trust in Distributed Systems.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006

Design, implementation and evaluation of security in iSCSI-based network storage systems.
Proceedings of the 2006 ACM Workshop On Storage Security And Survivability, 2006

Non-Invasive Methods for Host Certification.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Trusted declassification: : high-level policy for a security-typed language.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006

Enterprise Security: A Community of Interest Based Approach.
Proceedings of the Network and Distributed System Security Symposium, 2006

Mitigating attacks on open functionality in SMS-capable cellular networks.
Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, 2006

Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Password Exhaustion: Predicting the End of Password Usefulness.
Proceedings of the Information Systems Security, Second International Conference, 2006

Privacy Preserving Web-Based Email.
Proceedings of the Information Systems Security, Second International Conference, 2006

Secure attribute-based systems.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

Optimizing BGP security by exploiting path stability.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

From Languages to Systems: Understanding Practical Application Development in Security-typed Languages.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Policy.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

IPsec.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Web security.
Computer Networks, 2005

Analysis of Communities of Interest in Data Networks.
Proceedings of the Passive and Active Network Measurement, 6th International Workshop, 2005

Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Blocking-aware private record linkage.
Proceedings of the IQIS 2005, 2005

Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior.
Proceedings of the Information Systems Security, First International Conference, 2005

Privacy Preserving Clustering.
Proceedings of the Computer Security, 2005

Exploiting open functionality in SMS-capable cellular networks.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

TARP: Ticket-based Address Resolution Protocol.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Security Policy Reconciliation in Distributed Computing Environments.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

2003
On context in authorization policy.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing.
Proceedings of the Network and Distributed System Security Symposium, 2003

Analysis of security vulnerabilities in the movie production and distribution process.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003

A Flexible Architecture for Security Policy Enforcement.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

On the performance, feasibility, and use of forward-secure signatures.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

Origin authentication in interdomain routing.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
Methods and Limitations of Security Policy Reconciliation.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

2001
Principles of Policy in Secure Groups.
Proceedings of the Network and Distributed System Security Symposium, 2001

2000
Windowed Certificate Revocation.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

A Response to ''Can We Eliminate Certificate Revocation Lists?''.
Proceedings of the Financial Cryptography, 2000

1999
Antigone: A Flexible Framework for Secure Group Communication.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

Secure Distributed Virtual Conferencing.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999


  Loading...