Patrick D. McDaniel

Orcid: 0000-0003-2091-7484

Affiliations:
  • Pennsylvania State University, School of Electrical Engineering and Computer Science


According to our database1, Patrick D. McDaniel authored at least 242 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving).
Proc. Priv. Enhancing Technol., January, 2024

A Public and Reproducible Assessment of the Topics API on Real Data.
CoRR, 2024

Explorations in Texture Learning.
CoRR, 2024

A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems.
CoRR, 2024

2023
Joint Caching and Routing in Cache Networks With Arbitrary Topology.
IEEE Trans. Parallel Distributed Syst., August, 2023

Specializing Neural Networks for Cryptographic Code Completion Applications.
IEEE Trans. Software Eng., June, 2023

Systematic Evaluation of Geolocation Privacy Mechanisms.
CoRR, 2023

Verifiable Sustainability in Data Centers.
CoRR, 2023

Securing Cloud File Systems using Shielded Execution.
CoRR, 2023

The Space of Adversarial Strategies.
Proceedings of the 32nd USENIX Security Symposium, 2023

DScope: A Cloud-Native Internet Telescope.
Proceedings of the 32nd USENIX Security Symposium, 2023

mMLSnet: Multilevel Security Network with Mobility.
Proceedings of the IEEE Military Communications Conference, 2023

The Efficacy of Transformer-based Adversarial Attacks in Security Domains.
Proceedings of the IEEE Military Communications Conference, 2023

Characterizing the Modification Space of Signature IDS Rules.
Proceedings of the IEEE Military Communications Conference, 2023

The CVE Wayback Machine: Measuring Coordinated Disclosure from Exploits against Two Years of Zero-Days.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Host-Based Flow Table Size Inference in Multi-Hop SDN.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Attack Resilience of Cache Replacement Policies: A Study Based on TTL Approximation.
IEEE/ACM Trans. Netw., 2022

Enforcing Multilevel Security Policies in Unstable Networks.
IEEE Trans. Netw. Serv. Manag., 2022

Who's Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment.
ACM Trans. Internet Things, 2022

IoTRepair: Flexible Fault Handling in Diverse IoT Deployments.
ACM Trans. Internet Things, 2022

Building a Privacy-Preserving Smart Camera System.
Proc. Priv. Enhancing Technol., 2022

Adversarial examples for network intrusion detection systems.
J. Comput. Secur., 2022

EIPSIM: Modeling Secure IP Address Allocation at Cloud Scale.
CoRR, 2022

Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices.
CoRR, 2022

Adversarial Plannning.
CoRR, 2022

A Machine Learning and Computer Vision Approach to Geomagnetic Storm Forecasting.
CoRR, 2022

Generating Practical Adversarial Network Traffic Flows Using NIDSGAN.
CoRR, 2022

Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations.
CoRR, 2022

Measuring and Mitigating the Risk of IP Reuse on Public Clouds.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Performant Binary Fuzzing without Source Code using Static Instrumentation.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Sustainability is a Security Problem.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks.
IEEE/ACM Trans. Netw., 2021

MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking.
IEEE Trans. Netw. Serv. Manag., 2021

Real-time Analysis of Privacy-(un)aware IoT Applications.
Proc. Priv. Enhancing Technol., 2021

A survey on IoT platforms: Communication, security, and privacy perspectives.
Comput. Networks, 2021

HoneyModels: Machine Learning Honeypots.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021

Attack Resilience of Cache Replacement Policies.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

On the Robustness of Domain Constraints.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Adversarial Examples in Constrained Domains.
CoRR, 2020

IoTRepair: Systematically Addressing Device Faults in Commodity IoT (Extended Paper).
CoRR, 2020

Kratos: multi-user multi-device-aware access control system for the smart home.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Improving Robustness of a Popular Probabilistic Clustering Algorithm Against Insider Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2020

Misreporting Attacks in Software-Defined Networking.
Proceedings of the Security and Privacy in Communication Networks, 2020

IoTRepair: Systematically Addressing Device Faults in Commodity IoT.
Proceedings of the Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2020

Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Co-residency Attacks on Containers are Real.
Proceedings of the CCSW'20, 2020

2019
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud.
IEEE/ACM Trans. Netw., 2019

Verifying Internet of Things Safety and Security in Physical Spaces.
IEEE Secur. Priv., 2019

How Relevant Is the Turing Test in the Age of Sophisbots?
IEEE Secur. Priv., 2019

Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities.
ACM Comput. Surv., 2019

Multi-User Multi-Device-Aware Access Control System for Smart Home.
CoRR, 2019

EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs.
Proceedings of the 28th USENIX Security Symposium, 2019

Application Transiency: Towards a Fair Trade of Personal Information for Application Services.
Proceedings of the Security and Privacy in Communication Networks, 2019

IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Curie: Policy-based Secure Data Exchange.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
More or Less? Predict the Social Influence of Malicious URLs on Social Media.
CoRR, 2018

Regulating Access to System Sensors in Cooperating Programs.
CoRR, 2018

Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust Deep Learning.
CoRR, 2018

Making machine learning robust against adversarial inputs.
Commun. ACM, 2018

Sensitive Information Tracking in Commodity IoT.
Proceedings of the 27th USENIX Security Symposium, 2018

Soteria: Automated IoT Safety and Security Analysis.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Extending Detection with Privileged Information via Generalized Distillation.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout.
Proceedings of the Security and Privacy in Communication Networks, 2018

Enablers of Adversarial Attacks in Machine Learning.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Ensemble Adversarial Training: Attacks and Defenses.
Proceedings of the 6th International Conference on Learning Representations, 2018

SoK: Security and Privacy in Machine Learning.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

IotSan: fortifying the safety of IoT systems.
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, 2018

Detection under Privileged Information.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies.
IEEE Trans. Netw. Serv. Manag., 2017

Securing ARP/NDP From the Ground Up.
IEEE Trans. Inf. Forensics Secur., 2017

Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains.
IEEE Secur. Priv., 2017

The Space of Transferable Adversarial Examples.
CoRR, 2017

Ensemble Adversarial Training: Attacks and Defenses.
CoRR, 2017

Extending Defensive Distillation.
CoRR, 2017

On the (Statistical) Detection of Adversarial Examples.
CoRR, 2017

Adversarial Network Forensics in Software Defined Networking: Demo.
Proceedings of the Symposium on SDN Research, 2017

Adversarial Network Forensics in Software Defined Networking.
Proceedings of the Symposium on SDN Research, 2017

Cimplifier: automatically debloating containers.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Defining and Detecting Environment Discrimination in Android Apps.
Proceedings of the Security and Privacy in Communication Networks, 2017

Patient-Driven Privacy Control through Generalized Distillation.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Achieving Secure and Differentially Private Computations in Multiparty Settings.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Malicious co-residency on the cloud: Attacks and defense.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Stealth migration: Hiding virtual machines on the network.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Adversarial Examples for Malware Detection.
Proceedings of the Computer Security - ESORICS 2017, 2017

Tracing the Arc of Smartphone Application Security.
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017

Feature Cultivation in Privileged Information-augmented Detection.
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017

Attacking strategies and temporal analysis involving Facebook discussion groups.
Proceedings of the 13th International Conference on Network and Service Management, 2017

Practical Black-Box Attacks against Machine Learning.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Composite Constant Propagation and its Application to Android Program Analysis.
IEEE Trans. Software Eng., 2016

Machine Learning in Adversarial Settings.
IEEE Secur. Priv., 2016

Towards Least Privilege Containers with Cimplifier.
CoRR, 2016

Towards the Science of Security and Privacy in Machine Learning.
CoRR, 2016

Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples.
CoRR, 2016

Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples.
CoRR, 2016

On the Effectiveness of Defensive Distillation.
CoRR, 2016

Adversarial Perturbations Against Deep Neural Networks for Malware Classification.
CoRR, 2016

cleverhans v0.1: an adversarial machine learning library.
CoRR, 2016

Building Better Detection with Privileged Information.
CoRR, 2016

On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
Proceedings of the 25th USENIX Security Symposium, 2016

Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

SoK: Lessons Learned from Android Security Research for Appified Software Platforms.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

BinDNN: Resilient Function Matching Using Deep Learning.
Proceedings of the Security and Privacy in Communication Networks, 2016

Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

Crafting adversarial input sequences for recurrent neural networks.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Mapping sample scenarios to operational models.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

The Limitations of Deep Learning in Adversarial Settings.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Cyber Fighter Associate: A Decision Support System for cyber agility.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

Cyber Deception: Virtual Networks to Defend Insider Reconnaissance.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
Six Potential Game-Changers in Cyber Security: Towards Priorities in Cyber Science and Engineering.
CoRR, 2015

Adaptive protocol switching using Dynamically Insertable Bumps in the stack.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Enforcing agile access control policies in relational databases using views.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Computational ontology of network operations.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Malware traffic detection using tamper resistant features.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Detection of stealthy TCP-based DoS attacks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Measuring the Impact and Perception of Acceptable Advertisements.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Composite Constant Propagation: Application to Android Inter-Component Communication Analysis.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

A New Science of Security Decision Making.
Proceedings of the ICISSP 2015, 2015

MICSS: A Realistic Multichannel Secrecy Protocol.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Securing ARP From the Ground Up.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
ACM Trans. Comput. Syst., 2014

Toward a Science of Secure Environments.
IEEE Secur. Priv., 2014

I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
CoRR, 2014

Security Outlook: Six Cyber Game Changers for the Next 15 Years.
Computer, 2014

TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones.
Commun. ACM, 2014

Duet: library integrity verification for android applications.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Building an Ontology of Cyber Security.
Proceedings of the Ninth Conference on Semantic Technology for Intelligence, 2014

FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014

A Trusted Safety Verifier for Process Controller Code.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Android market reconstruction and analysis.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

An Analysis of Anonymity in Bitcoin Using P2P Network Traffic.
Proceedings of the Financial Cryptography and Data Security, 2014


2013
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
Scalable Web Content Attestation.
IEEE Trans. Computers, 2012

Semantically rich application-centric security in Android.
Secur. Commun. Networks, 2012

Bloatware Comes to the Smartphone.
IEEE Secur. Priv., 2012

Retargeting Android applications to Java bytecode.
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012

A Detection Mechanism for SMS Flooding Attacks in Cellular Networks.
Proceedings of the Security and Privacy in Communication Networks, 2012

Structured security testing in the smart grid.
Proceedings of the 5th International Symposium on Communications, 2012

Minimizing private data disclosures in the smart grid.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

SABOT: specification-based payload generation for programmable logic controllers.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Scalable Integrity-Guaranteed AJAX.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

Hi-Fi: collecting high-fidelity whole-system provenance.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
From mobile phones to responsible devices.
Secur. Commun. Networks, 2011

Network-Based Root of Trust for Installation.
IEEE Secur. Priv., 2011

Data Provenance and Security.
IEEE Secur. Priv., 2011

A Study of Android Application Security.
Proceedings of the 20th USENIX Security Symposium, 2011

Protecting consumer privacy from electric load monitoring.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
A logical specification and analysis for SELinux MLS policy.
ACM Trans. Inf. Syst. Secur., 2010

malnets: large-scale malicious networks <i>via</i> compromised wireless access points.
Secur. Commun. Networks, 2010

A Survey of BGP Security Issues and Solutions.
Proc. IEEE, 2010

Secure attribute-based systems.
J. Comput. Secur., 2010

Not So Great Expectations: Why Application Markets Haven't Failed Security.
IEEE Secur. Priv., 2010

New Security Architectures Based on Emerging Disk Functionality.
IEEE Secur. Priv., 2010

Embedded Firmware Diversity for Smart Electric Meters.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

Towards a Secure and Efficient System for End-to-End Provenance.
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010

Realizing a Source Authentic Internet.
Proceedings of the Security and Privacy in Communication Networks, 2010

An architecture for enforcing end-to-end access control over web applications.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

Disk-enabled authenticated encryption.
Proceedings of the IEEE 26th Symposium on Mass Storage Systems and Technologies, 2010

Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware.
Proceedings of the Global Communications Conference, 2010

Seeding clouds with trust anchors.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

Protecting portable storage with host validation.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Porscha: policy oriented secure content handling in Android.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

Multi-vendor penetration testing in the advanced metering infrastructure.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

Kells: a protection framework for portable data.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks.
Wirel. Networks, 2009

Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems.
IEEE Trans. Parallel Distributed Syst., 2009

Mitigating attacks on open functionality in SMS-capable cellular networks.
IEEE/ACM Trans. Netw., 2009

Configuration management at massive scale: system design and experience.
IEEE J. Sel. Areas Commun., 2009

Security and Privacy Challenges in the Smart Grid.
IEEE Secur. Priv., 2009

Understanding Android Security.
IEEE Secur. Priv., 2009

Below the Salt.
Proceedings of the Security Protocols XVII, 2009

Energy Theft in the Advanced Metering Infrastructure.
Proceedings of the Critical Information Infrastructures Security, 2009

On cellular botnets: measuring the impact of malicious devices on a cellular network core.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

On lightweight mobile phone application certification.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Justifying Integrity Using a Virtual Machine Verifier.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Guest Editors' Introduction: Special Section on Software Engineering for Secure Systems.
IEEE Trans. Software Eng., 2008

Noninvasive Methods for Host Certification.
ACM Trans. Inf. Syst. Secur., 2008

Exploiting open functionality in SMS-capable cellular networks.
J. Comput. Secur., 2008

Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Proceedings of the Network and Distributed System Security Symposium, 2008

Rootkit-resistant disks.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

PinUP: Pinning User Files to Known Applications.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

Defending Against Attacks on Main Memory Persistence.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

Security for Telecommunications Networks
Advances in Information Security 40, Springer, ISBN: 978-0-387-72441-6, 2008

2007
TARP: Ticket-based address resolution protocol.
Comput. Networks, 2007

On Attack Causality in Internet-Connected Cellular Networks.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

From Trusted to Secure: Building and Executing Applications That Enforce System Security.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Configuration Management at Massive Scale: System Design and Experience.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Privacy Preserving Communication in MANETs.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

Jifclipse: development tools for security-typed languages.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007

Analysis of the IPv4 Address Space Delegation Structure.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Limiting Sybil Attacks in Structured P2P Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Towards Automated Privilege Separation.
Proceedings of the Information Systems Security, Third International Conference, 2007

Toward Valley-Free Inter-domain Routing.
Proceedings of IEEE International Conference on Communications, 2007

Email Communities of Interest.
Proceedings of the CEAS 2007, 2007

Protecting users from "themselves".
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

Non-volatile memory and disks: avenues for policy architectures.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

Channels: Runtime System Infrastructure for Security-Typed Languages.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

Establishing and Sustaining System Integrity via Root of Trust Installation.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Methods and limitations of security policy reconciliation.
ACM Trans. Inf. Syst. Secur., 2006

Enforcing provisioning and authorization policy in the Antigone system.
J. Comput. Secur., 2006

The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense.
Int. J. Distributed Sens. Networks, 2006

Origin authentication in interdomain routing.
Comput. Networks, 2006

Shame on Trust in Distributed Systems.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006

Design, implementation and evaluation of security in iSCSI-based network storage systems.
Proceedings of the 2006 ACM Workshop On Storage Security And Survivability, 2006

Non-Invasive Methods for Host Certification.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Trusted declassification: : high-level policy for a security-typed language.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006

Enterprise Security: A Community of Interest Based Approach.
Proceedings of the Network and Distributed System Security Symposium, 2006

Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Password Exhaustion: Predicting the End of Password Usefulness.
Proceedings of the Information Systems Security, Second International Conference, 2006

Privacy Preserving Web-Based Email.
Proceedings of the Information Systems Security, Second International Conference, 2006

Optimizing BGP security by exploiting path stability.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

From Languages to Systems: Understanding Practical Application Development in Security-typed Languages.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Policy.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

IPsec.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Web security.
Comput. Networks, 2005

Analysis of Communities of Interest in Data Networks.
Proceedings of the Passive and Active Network Measurement, 6th International Workshop, 2005

Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Blocking-aware private record linkage.
Proceedings of the IQIS 2005, 2005

Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior.
Proceedings of the Information Systems Security, First International Conference, 2005

Privacy Preserving Clustering.
Proceedings of the Computer Security, 2005

2004
Security Policy Reconciliation in Distributed Computing Environments.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

2003
On context in authorization policy.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing.
Proceedings of the Network and Distributed System Security Symposium, 2003

Analysis of security vulnerabilities in the movie production and distribution process.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003

A Flexible Architecture for Security Policy Enforcement.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

On the performance, feasibility, and use of forward-secure signatures.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

Origin authentication in interdomain routing.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2001
*Policy management in secure group communication.
PhD thesis, 2001

Principles of Policy in Secure Groups.
Proceedings of the Network and Distributed System Security Symposium, 2001

2000
Windowed Certificate Revocation.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

A Response to ''Can We Eliminate Certificate Revocation Lists?''.
Proceedings of the Financial Cryptography, 2000

1999
Antigone: A Flexible Framework for Secure Group Communication.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

Secure Distributed Virtual Conferencing.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999


  Loading...