Stephen E. McLaughlin

Affiliations:
  • Penn State, University Park, USA


According to our database1, Stephen E. McLaughlin authored at least 28 papers between 2007 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Horizontal Privilege Escalation in Trusted Applications.
Proceedings of the 29th USENIX Security Symposium, 2020

2014
Detecting Industrial Control Malware Using Automated PLC Code Analytics.
IEEE Secur. Priv., 2014

Controller-aware false data injection against programmable logic controllers.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Covert channel communication through physical interdependencies in cyber-physical infrastructures.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

A Trusted Safety Verifier for Process Controller Code.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures.
IEEE J. Sel. Areas Commun., 2013

Securing Control Systems from the Inside: A Case for Mediating Physical Behaviors.
IEEE Secur. Priv., 2013

CPS: stateful policy enforcement for control system device usage.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Semantically rich application-centric security in Android.
Secur. Commun. Networks, 2012

AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Minimizing private data disclosures in the smart grid.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

SABOT: specification-based payload generation for programmable logic controllers.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Hi-Fi: collecting high-fidelity whole-system provenance.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
On Dynamic Malware Payloads Aimed at Programmable Logic Controllers.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

Protecting consumer privacy from electric load monitoring.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
New Security Architectures Based on Emerging Disk Functionality.
IEEE Secur. Priv., 2010

Embedded Firmware Diversity for Smart Electric Meters.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

Towards a Secure and Efficient System for End-to-End Provenance.
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010

Disk-enabled authenticated encryption.
Proceedings of the IEEE 26th Symposium on Mass Storage Systems and Technologies, 2010

Protecting portable storage with host validation.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Multi-vendor penetration testing in the advanced metering infrastructure.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

Kells: a protection framework for portable data.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Security and Privacy Challenges in the Smart Grid.
IEEE Secur. Priv., 2009

Energy Theft in the Advanced Metering Infrastructure.
Proceedings of the Critical Information Infrastructures Security, 2009

2008
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Rootkit-resistant disks.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

New Side Channels Targeted at Passwords.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Non-volatile memory and disks: avenues for policy architectures.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007


  Loading...