publications

publications by categories in reversed chronological order. generated by jekyll-scholar.

2026

  1. IEEE S&P
    Fizzle: A Framework for Deterministic and Reproducible Network Fuzzing
    Nathaniel Bennett, Tyler Tucker, Carson Stillman, and 3 more authors
    In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2026
  2. IEEE S&P
    AI Wrote My Paper and All I Got Was This False Negative: Measuring the Efficacy of Commercial AI Text Detectors
    Seth Layton, Bernardo Medeiros, Kevin Butler, and 1 more author
    In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2026

2025

  1. S&P Mag
    Extending the Heilmeier Catechism to Evaluate Security and Privacy Systems: Who is Left Out?
    Kevin Butler, Kurt Hugenberg, Eakta Jain, and 6 more authors
    IEEE Security and Privacy, May 2025
  2. ACSAC
    EM-Flow: Advanced Electromagnetic Control Flow Verification for Embedded Systems
    Carson Stillman, Jennifer Sheldon, Ian Garrett, and 4 more authors
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Dec 2025
  3. USENIX SEC
    SoK: Towards a Unified Approach to Applied Replicability for Computer Security
    Daniel Olszewski, Tyler Tucker, Kevin Butler, and 1 more author
    In Proceedings of the USENIX Security Symposium (Security), Aug 2025
  4. USENIX SEC
    Analyzing the AI Nudification Application Ecosystem
    Cassidy Gibson and Daniel Olszewski and Natalie Grace Brigham and Anna Crowder and Kevin R. B. Butler and Patrick Traynor and Elissa M. Redmiles and Tadayoshi Kohno
    In Proceedings of the USENIX Security Symposium (Security), Aug 2025
  5. ACM REP
    “Raise Your Hand If You’ve Been Personally Victimized By A Lack Of Reproducibility”: On Reproducibility in Tier 2 Security Conferences
    Daniel Olszewski, Allison Lu, Anna Crowder, and 10 more authors
    In Proceedings of ACM Conference on Reproducibility and Replicability (REP), Jul 2025
  6. IEEE S&P
    Data to Infinity and Beyond: Examining Data Sharing and Reuse Practices in the Computer Security Community
    Anna Crowder, Allison Lu, Kevin Childs, and 3 more authors
    In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2025
  7. ISOC NDSS
    Characterizing the Impact of Audio Deepfakes in the Presence of Cochlear Implant Simulated Audio
    Magdalena Pasternak, Kevin Warren, Daniel Olszewski, and 3 more authors
    In Symposium on Network and Distributed System Security (NDSS), Feb 2025
    (Acceptance Rate 16.1%)
  8. ISOC NDSS
    Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic
    Tyler Tucker, Nathaniel Bennett, Martin Kotuliak, and 4 more authors
    In Symposium on Network and Distributed System Security (NDSS), Feb 2025
    (Acceptance Rate 16.1%)

2024

  1. ACSAC
    I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques
    Anna Crowder, Daniel Olszewski, Patrick Traynor, and 1 more author
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Dec 2024
    (Acceptance Rate 21.8%)
  2. ACM CCS
    “I Had Sort of a Sense that I Was Always Being Watched... Since I Was”: Examining Interpersonal Discomfort From Continuous Location-Sharing Applications
    Kevin Childs, Cassidy Gibson, Anna Crowder, and 6 more authors
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Oct 2024
    (Acceptance Rate 16.9%)
  3. ACM CCS
    RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces
    Nathaniel Bennett, Weidong Zhu, Benjamin Simon, and 4 more authors
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Oct 2024
    (Acceptance Rate 16.9%)
  4. ACM CCS
    Better Be Computer or I’m Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake Detectors
    Kevin Warren, Tyler Tucker, Anna Crowder, and 8 more authors
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Oct 2024
    (Acceptance Rate 16.9%)
  5. USENIX SEC
    SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Current Deepfake Datasets
    Seth Layton, Tyler Tucker, Daniel Olszewski, and 4 more authors
    In Proceedings of the USENIX Security Symposium (Security), Aug 2024
    (Acceptance Rate 18.3%)
  6. USENIX SEC
    Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations
    Jianliang Wu, Patrick Traynor, Dongyan Xu, and 2 more authors
    In Proceedings of the USENIX Security Symposium (Security), Aug 2024
    (Acceptance Rate 18.3%)
  7. ACM CODASPY
    Examining Cryptography and Randomness Failures in Open-Source Cellular Cores
    K. Virgil English, Nathaniel Bennett, Seaver Thorn, and 3 more authors
    In Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), Jun 2024
    (Acceptance rate: 21.3%)
  8. USEC
    “I used to live in Florida”: Exploring the Impact of Spam Call Warning Accuracy on Callee Decision-Making
    Imani Munyaka, Daniel Delgado, Juan Gilbert, and 2 more authors
    In Symposium on Usable Security and Privacy (USEC), Feb 2024

2023

  1. ACM CCS
    “Get in Researchers; We’re Measuring Reproducibility”: A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
    Daniel Olszewski, Allison Lu, Carson Stillman, and 6 more authors
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Nov 2023
    (Acceptance rate: 19.8%)
  2. ACM MobiSys
    LeopardSeal: Detecting Call Interception via Audio Rogue Base Stations
    Christian Peeters, Tyler Tucker, Anushri Jain, and 2 more authors
    In Proceedings of the ACM International Conference on Mobile Systems, Applications and Services (MobiSys), Jun 2023
    (Acceptance rate: 21%)
  3. IEEE S&P
    Blue’s Clues: Practical Discovery of Non-Discoverable Bluetooth Devices
    Tyler Tucker, Hunter Searle, Kevin Butler, and 1 more author
    In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2023
    (Acceptance rate: 14%)
  4. ISOC NDSS
    Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
    Hadi Abdullah, Aditya Karlekar, Saurabh Prasad, and 5 more authors
    In Symposium on Network and Distributed System Security (NDSS), Feb 2023
    (Acceptance rate: 16%)

2022

  1. PETS
    Analyzing the Monetization Ecosystem of Stalkerware
    Cassidy Gibson, Vanessa Frost, Katie Platt, and 6 more authors
    Proceedings on Privacy Enhancing Technologies (PoPETs), Jun 2022
    (Acceptance rate: 24%)
  2. IEEE CNS
    HallMonitor: A Framework for Identifying Network Policy Violations in Software
    Daniel Olszewski, Sandeep Sathyanarayana, Weidong Zhu, and 2 more authors
    In IEEE Conference on Communications and Network Security (CNS), Oct 2022
  3. USENIX SEC
    Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction
    Logan Blue, Kevin Warren, Hadi Abdullah, and 5 more authors
    In Proceedings of the USENIX Security Symposium (SECURITY), Aug 2022
    (Acceptance rate: 17.2%)
  4. ACM AsiaCCS
    SMS OTP Security (SOS): Hardening SMS-Based Two Factor Authentication
    Christian Peeters, Christopher Patton, Imani N. Sherman, and 3 more authors
    In ACM Asia Conference on Computer and Communications Security (ASIACCS), Jun 2022
    (Acceptance rate: 18.2%)
  5. ICLR
    Demystifying Limited Adversarial Transferability in Automatic Speech Recognition Systems
    Hadi Abdullah, Aditya Karlekar, Vincent Bindschaedler, and 1 more author
    In Proceedings of the International Conference on Learning Representations (ICLR), Apr 2022
    (Acceptance rate: 32%)
  6. ISOC NDSS
    FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware
    Grant Hernandez, Marius Muench, Dominik Maier, and 6 more authors
    In Symposium on Network and Distributed System Security (NDSS) , Feb 2022
    (Acceptance rate: 16.2%)

2021

  1. ACML
    Beyond L_p Clipping: Equalization based Psychoacoustic Attacks against ASRs
    Hadi Abdullah, Muhammad Sajidur Rahman, Christian Peeters, and 5 more authors
    In The Asian Conference on Machine Learning (ACML), Nov 2021
  2. TPRC
    Characterizing User Comprehension in the STIR/SHAKEN Anti-Robocall Standard
    Imani Sherman and Daniel Delgado and Juan Gilbert and Jaime Ruiz and Patrick Traynor
    In Proceedings of the Annual Research Conference on Comunications Information and Internet Policy (TPRC 49), Sep 2021
  3. IEEE S&P
    The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
    Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, and 2 more authors
    In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2021
    (Acceptance rate: 12.1%)
  4. IEEE S&P
    Hear “No Evil”, See “Kenansville”: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
    Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, and 5 more authors
    In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2021
    (Acceptance rate: 12.1%)

2020

  1. IEEE ISTAS
    Truly Visual Caller ID? An Analysis of Anti-Robocall Applications and their Accessibility to Visually Impaired Users
    Imani Sherman, Jasmine Bowers, Liz-Laure Laborde, and 3 more authors
    In IEEE International Symposium on Technology and Society (IEEE ISTAS), Nov 2020
  2. ACM CCSW
    On the Detection of Disinformation Campaign Activity with Network Analysis
    Luis Vargas, Patrick Emami, and Patrick Traynor
    In Proceedings of the 2020 ACM SIGSAC Cloud Computing Security Workshop, Nov 2020
  3. ISOC NDSS
    Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators
    Imani Sherman, Jasmine Bowers, Keith McNamara, and 3 more authors
    In Proceedings of the ISOC Network & Distributed Systems Security Symposium (NDSS), Feb 2020
    (Acceptance rate: 17.4%)

2019

  1. ACM AsiaCCS
    A Hybrid Approach to Secure Function Evaluation Using SGX
    Joseph Choi, Dave Tian, Grant Hernandez, and 5 more authors
    In Procedings of the ACM ASIA Conference on Computer and Communications Security (ASIACCS’19), Jul 2019
    (Acceptance Rate: 17.0% for full papers)
  2. ACM AsiaCCS
    Examining DES-based Cipher Suite Support within the TLS Ecosystem
    Vanessa Frost, Dave Tian, Christie Ruales, and 2 more authors
    In Proceedings of the ACM ASIA Conference on Computer and Communications Security (ASIACCS’19), Jul 2019
    (Acceptance Rate: 22.0% for all papers)
  3. IEEE S&P
    Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers
    Nolen Scaife, Jasmine Bowers, Christian Peeters, and 4 more authors
    In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2019
    (Acceptance rate: 12.0%)
  4. ACM CODASPY
    A Practical Intel SGX Setting for Linux Containers in the Cloud
    Dave Tian, Joseph Choi, Grant Hernandez, and 2 more authors
    In Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY’19), Mar 2019
    (Acceptance rate: 23.5%)
  5. ACM WiSec
    Characterizing Security and Privacy Practices in Emerging Digital Credit Applications
    Jasmine Bowers, Imani Sherman, Kevin Butler, and 1 more author
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May 2019
    (Acceptance rate: 25.6%)
  6. ISOC NDSS
    Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
    Hadi Abdullah, Washington Garcia, Christian Peeters, and 3 more authors
    In Proceedings of the ISOC Network & Distributed Systems Security Symposium (NDSS), Feb 2019
    (Acceptance Rate: 17.1%)
  7. ISOC NDSS
    Digital Healthcare-Associated Infection Analysis of a Major Multi-Campus Hospital System
    Lius Vargas, Logan Blue, Vanessa Frost, and 4 more authors
    In Proceedings of the ISOC Network & Distributed Systems Security Symposium (NDSS), Feb 2019
    (Acceptance Rate: 17.1%)

2018

  1. ACM TOPS
    Characterizing the Security of the SMS Ecosystem with Public Gateways
    Bradley Reaves, Luis Vargas, Nolen Scaife, and 4 more authors
    ACM Transactions on Privacy and Security (TOPS), Feb 2018
  2. ACSAC
    A Large Scale Investigation of Obfuscation Use in Google Play
    Dominik Wermke, Nicolas Huaman, Yasemin Acar, and 3 more authors
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Dec 2018
    Acceptance Rate: 20.1%
  3. ACM CCS
    Mitigating Risk while Complying with Data Retention Laws
    Luis Vargas, Gyan Hazarika, Rachel Culpepper, and 4 more authors
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Oct 2018
  4. USENIX SEC
    Fear the Reaper: Characterization and Fast Detection of Card Skimmers
    Nolen Scaife, Christian Peeters, and Patrick Traynor
    In Proceedings of the USENIX Security Symposium (SECURITY), Aug 2018
    Acceptance Rate: 19.0%
  5. USENIX SEC
    ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem
    Dave (Jing) Tian, Grant Hernandez, Joseph Choi, and 8 more authors
    In Proceedings of the USENIX Security Symposium (SECURITY), Aug 2018
    Acceptance Rate: 19.0%
  6. ACM WiSec
    Hello, Is It Me You’re Looking For? Differentiating Between Human and Electronic Speakers for Voice Interface Security
    Logan Blue, Luis Vargas, and Patrick Traynor
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Jun 2018
  7. ACM AsiaCCS
    2MA: Verifying Voice Commands via Two Microphone Authentication
    Logan Blue, Hadi Abdullah, Luis Vargas, and 1 more author
    In ACM Asia Conference on Computer and Communications Security (ASIACCS), Jun 2018
    (Acceptance Rate: 20.0%)
  8. IEEE S&P
    The Cards Aren’t Alright: Detecting Counterfeit Gift Cards Using Encoding Jitter
    Nolen Scaife, Christian Peeters, Camilo Velez, and 3 more authors
    In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2018
    (Acceptance Rate: 10.4%)
  9. IEEE S&P
    Sonar: Detecting SS7 Redirection Attacks Via Call Audio-Based Distance Bounding
    Christian Peeters, Hadi Abdullah, Nolen Scaife, and 4 more authors
    In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2018
    (Acceptance Rate: 10.4%)

2017

  1. S&P Mag
    FinTechSec: Addressing the Scurity Challenges of Digital Financial Services
    Patrick Traynor, Kevin Butler, Jasmine Bowers, and 1 more author
    IEEE S&P Magazine, May 2017
  2. IEEE MILCOM
    Privacy Preserving Localization Using a Distributed Particle Filtering Protocol
    Tyler Ward, Joseph Choi, Kevin Butler, and 3 more authors
    In IEEE MILCOM, Oct 2017
    (Acceptance Rate: 56%)
  3. IJIS
    OnionDNS: A Seizure-Resistant Top-level Domain
    Nolen Sciafe, Henry Carter, Rachel Jones, and 2 more authors
    International Journal of Information Security (IJIS), Oct 2017
  4. USENIX SOUPS
    Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Applications
    Jasmine Bowers and Bradley Reaves and Imani N. Sherman and Patrick Traynor and Kevin Butler
    In Proceedings of the USENIX Symposium on Usable Privacy and Security (SOUPS), Aug 2017
    (Acceptance Rate: 26.5%)
  5. USENIX SEC
    AuthentiCall: Efficient Identity and Content Authentication for Phone Calls
    Bradley Reaves and Logan Blue and Hadi Abdullah and Luis Vargas and Patrick Traynor and Thomas Shrimpton
    In Proceedings of the USENIX Security Symposium (SECURITY), Aug 2017
    (Acceptance Rate: 16.3%)
  6. IJICS
    OPFE: Outsourcing Computation for Private Function Evaluation
    Henry Carter and Patrick Traynor
    International Journal of Information and Computer Security (IJICS), Aug 2017
  7. ACM TOPS
    Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World
    Bradley Reaves, Jasmine Bowers, Nolen Scaife, and 4 more authors
    ACM Transactions on Privacy and Seurity (TOPS), Aug 2017
  8. PETS
    Phonion: Practical Protection of Metadata in Telephony Networks
    Stephan Heuser, Bradley Reaves, Praveen Kumar Pendyala, and 6 more authors
    Proceedings on Privacy Enhancing Technologies (PoPETs), Jun 2017

2016

  1. ACM CSUR
    *droid: Assessment and Evaluation of Android Application Analysis Tools
    Bradley Reaves, Jasmine Bowers, Sigmond A. Gorski III, and 11 more authors
    ACM Computing Surveys (CSUR), Jun 2016
  2. SPC
    Efficient and Secure Template Blinding for Biometric Authentication
    Siddhant Deshmukh, Henry Carter, Grant Hernandez, and 2 more authors
    In IEEE Workshop on Security and Privacy in the Cloud (SPC), Aug 2016
  3. IEEE TMC
    Detecting Mobile Malicious Webpages in Real Time
    Chaitrali Amrutkar, Young Seuk Kim, and Patrick Traynor
    IEEE Transactions on Mobile Computing (TMC), Aug 2016
  4. USENIX SEC
    AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels
    Bradley Reaves, Logan Blue, and Patrick Traynor
    In Proceedings of the USENIX Security Symposium (SECURITY), Aug 2016
    (Acceptance Rate: 15.5%)
  5. USENIX SEC
    Making USB Great Again with USBFILTER
    Dave Tian, Nolen Scaife, Adam Bates, and 2 more authors
    In Proceedings of the USENIX Security Symposium (SECURITY), Aug 2016
    (Acceptance Rate: 15.5%)
  6. SCN
    Outsourcing Secure Two-Party Computation as a Black Box
    Henry Carter, Benjamin Mood, Patrick Traynor, and 1 more author
    Journal of Security and Communication Networks (SCN), Aug 2016
  7. ACM WiSec
    Detecting SMS Spam in the Age of Legitimate Bulk Messaging
    Bradley Reaves, Dave Tian, Logan Blue, and 2 more authors
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Jul 2016
    (Acceptance Rate: 35.0%)
  8. IEEE ICDCS
    CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
    Nolen Scaife, Henry Carter, Patrick Traynor, and 1 more author
    In IEEE International Conference on Distributed Computing Systems (ICDCS), Jul 2016
    (Acceptance Rate: 17.6%)
  9. IEEE S&P
    Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
    Bradley Reaves, Nolen Scaife, Dave Tian, and 3 more authors
    In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2016
    (Acceptance Rate: 13.0%)
  10. JCS
    Secure Outsourced Garbled Circuit Evaluation for Mobile Devices
    Henry Carter, Benjamin Mood, Patrick Traynor, and 1 more author
    Journal of Computer Security (JCS), May 2016
  11. WAHC
    Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation
    Debayan Gupta, Benjamin Mood, Joan Feigenbaum, and 2 more authors
    In Workshop on Encrypted Computing and Applied Homomorphic Cryptography (WAHC), Feb 2016
  12. IEEE Euro S&P
    Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation
    Benjamin Mood, Debayan Gupta, Henry Carter, and 2 more authors
    In Proceedings of the IEEE European Symposium on Security and Privacy, Feb 2016
    (Acceptance Rate: 17.3%)

2015

  1. CANS
    Outsourcing Secure Two-Party Computation as a Black Box
    Henry Carter, Benjamin Mood, Patrick Traynor, and 1 more author
    In Proceedings of the International Conference on Cryptology and Network Security, Nov 2015
    (Acceptance Rate: 52.9%)
  2. IEEE CNS
    OnionDNS: A Seizure-Resistant Top-level Domain
    Nolen Sciafe, Henry Carter, and Patrick Traynor
    In Proceedings of the IEEE Conference on Communications and Network Security (CNS), Sep 2015
    (Acceptance Rate: 28.1%)
  3. ARES
    Uncovering Use-After-Free Conditions In Compiled Code
    David Dewey, Bradley Reaves, and Patrick Traynor
    In Proceedings of the International Conference on Availability, Reliability and Security (ARES), Aug 2015
    (Acceptance Rate: 22%)
  4. USENIX SEC
    Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World
    Bradley Reaves, Nolen Scaife, Adam Bates, and 2 more authors
    In Proceedings of the USENIX Security Symposium (SECURITY), Aug 2015
    (Acceptance Rate: 15.7%)
  5. USENIX SEC
    Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge
    Bradley Reaves, Ethan Shernan, Adam Bates, and 2 more authors
    In Proceedings of the USENIX Security Symposium (SECURITY), Aug 2015
    (Acceptance Rate: 15.7%)
  6. DIMVA
    More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations
    Ethan Shernan, Henry Carter, Dave Tian, and 2 more authors
    In Proceedings of the International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA), Jul 2015
    (Acceptance Rate: 22.7%)
  7. JCS
    Accountable Wiretapping -or- I Know They Can Hear You Now
    Adam Bates, Kevin Butler, Micah Sherr, and 3 more authors
    Journal of Computer Security (JCS), Jul 2015
  8. IEEE TMC
    An Empirical Evaluation of Security Indicators in Mobile Web Browsers
    Chaitrali Amrutkar, Patrick Traynor, and Paul Oorschot
    IEEE Transactions on Mobile Computing (TMC), Jul 2015

2014

  1. ACSAC
    Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices
    Henry Carter, Charles Lever, and Patrick Traynor
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Dec 2014
    (Acceptance Rate: 19.9%)
  2. SCN
    For Your Phone Only: Custom Protocols for Efficient Secure Function Evaluation on Mobile Devices
    Henry Carter, Chaitrali Amrutkar, Italo Dacosta, and 1 more author
    Journal of Security and Communication Networks (SCN), Dec 2014

2013

  1. USENIX SEC
    Secure Outsourced Garbled Circuit Evaluation for Mobile Devices
    Henry Carter, Benjamin Mood, Patrick Traynor, and 1 more author
    In Proceedings of the USENIX Security Symposium (SECURITY), Aug 2013
    (Acceptance Rate: 16.2%)
  2. IEEE DSN
    Why is My Smartphone Slow? On The Fly Diagnosis of Poor Performance on the Mobile Internet
    Chaitrali Amrutkar, Matti Hiltunen, Shobha Venkataraman, and 4 more authors
    In Proceedings of The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2013
    (Acceptance Rate: 19.6%)
  3. ACM WiSec
    MAST: Triage for Market-scale Mobile Malware Analysis
    Saurabh Chakradeo, Brad Reaves, Patrick Traynor, and 1 more author
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Apr 2013
    (Acceptance Rate: 15.0%)(Best Paper)
  4. ISOC NDSS
    The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers
    Charles Lever, Manos Antonakakis, Brad Reaves, and 2 more authors
    In Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS), Feb 2013
    (Acceptance rate: 18.8%)
  5. WJLTA
    Privacy and Security Concerns Associated with Mobile Money Applications in Africa
    Andrew Harris, Seymour Goodman, and Patrick Traynor
    Washington Journal of Law, Technology & Arts, Feb 2013

2012

  1. ICISS
    VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security
    Chaitrali Amrutkar, Kapil Singh, Arunabh Verma, and 1 more author
    In Proceedings of the International Conference on Information Systems Security (ICISS), Dec 2012
    (Acceptance rate: 25%) (Best Paper - SAIC Student Paper Competition (GT)) (Finalist - CSAW AT&T Applied Security Research Best Paper Competition 2012)
  2. ACM SPSM
    Rethinking Permissions for Mobile Web Apps: Barriers and the Road Ahead
    Chaitrali Amrutkar and Patrick Traynor
    In Proceedings of the ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Nov 2012
  3. ISC
    A Measurement Study of SSL Indicators on Mobile Browsers: Extended Life, or End of the Road?
    Chaitrali Amrutkar, Patrick Traynor, and Paul Oorschot
    In Proceedings of the Information Security Conference (ISC), Sep 2012
    (Acceptance rate: 32%)
  4. ESORICS
    Trust No One Else: Detecting MITM Attacks Against SSL/TLS Without Third-Parties
    Italo Dacosta, Mustaque Ahamad, and Patrick Traynor
    In Proceedings of the European Symposium on Research in Computer Security (ESORICS), Sep 2012
    (Acceptance Rate: 20.2%)
  5. WOOT
    Under New Management: Practical Attacks on SNMPv3
    Nigel Lawrence and Patrick Traynor
    In Proceedings of the USENIX Workshop on Offensive Technologies (WOOT), Aug 2012
  6. ACM TOIT
    One-Time Cookies: Preventing Session Hijacking Attacks with Stateless Authentication Tokens
    Italo Dacosta, Saurabh Chakradeo, Mustaque Ahamad, and 1 more author
    ACM Transactions on Internet Technology (TOIT), Aug 2012
  7. JAN
    ARDEN: Anonymous netwoRking in Delay tolErant Networks
    Cong Shi, Xiapu Luo, Patrick Traynor, and 2 more authors
    Journal of Ad Hoc Networks, Aug 2012
  8. ISOC NDSS
    Accountable Wiretapping -or- I Know They Can Hear You Now
    Adam Bates, Kevin Butler, Micah Sherr, and 3 more authors
    In Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS), Feb 2012
    (Acceptance Rate: 17.8%)
  9. IEEE TMC
    Characterizing the Security Implications of Third-Party EAS Over Cellular Text Messaging Services
    Patrick Traynor
    IEEE Transactions on Mobile Computing (TMC), Feb 2012

2011

  1. Book Chapter
    Emerging Privacy and Security Concerns for Digital Wallet Deployment
    Andrew Harris, Frank S. Park, Seymour Goodman, and 1 more author
    Jul 2011
  2. ACSAC
    Automated Remote Repair for Mobile Malware
    Yacin Nadji, Jon Giffin, and Patrick Traynor
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Dec 2011
    (Acceptance Rate: 18.5%)
  3. ACSAC
    “Mix-In-Place" Anonymous Networking Using Secure Function Evaluation
    Nilesh Nipane, Italo Dacosta, and Patrick Traynor
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Dec 2011
    (Acceptance Rate: 18.5%)
  4. ACM CCS
    (sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers
    Philip Marquardt, Arunabh Verma, Henry Carter, and 1 more author
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Oct 2011
    (Acceptance Rate: 13.9%)
  5. FC
    Impeding Individual User Profiling in Shopper Loyalty Programs
    Philip Marquardt, David Dagon, and Patrick Traynor
    In Proceedings of the International Conference on Financial Cryptography and Data Security (FC), Feb 2011
    (Acceptance Rate: 35.1%)
  6. ISOC NDSS
    No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects
    David Dewey and Patrick Traynor
    In Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS), Feb 2011
    (Acceptance Rate: 20.1%)
  7. IEEE TPDS
    Improving Authentication Performance of Distributed SIP Proxies
    Italo Dacosta, Vijay Balasubramaniyan, Mustaque Ahamad, and 1 more author
    IEEE Transactions on Parallel and Distributed Systems (TPDS), Feb 2011
  8. SCN
    From Mobile Phones to Responsible Devices
    Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao, and 3 more authors
    Journal of Security and Communication Networks (SCN), Feb 2011

2010

  1. IEEE GLOBECOM
    Constructing Secure Localization Systems with Adjustable Granularity
    Patrick Traynor, Joshua Schiffman, Thomas La Porta, and 3 more authors
    In IEEE Global Communications Conference (GLOBECOM), Dec 2010
    (Acceptance Rate: 35.6%)
  2. ACM CCS
    PinDr0p: Using Single-Ended Audio Features to Determine Call Provenance
    Vijay Balasubramaniyan, Aamir Poonawalla, Mustaque Ahamad, and 2 more authors
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Oct 2010
    (Acceptance Rate: 17.2%)
  3. IEEE SecureComm
    Characterizing the Security Implications of Third-Party EAS Over Cellular Text Messaging Services
    Patrick Traynor
    In Proceedings of the Second IEEE International Conference on Security and Privacy in Communication Networks (SecureComm), Sep 2010
    (Acceptance Rate: 25.0%)
  4. DIMVA
    Evaluating Bluetooth as a Medium for Botnet Command and Control
    Kapil Singh, Samrit Sangal, Nehil Jain, and 2 more authors
    In Proceedings of the International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA), Jul 2010
    (Acceptance Rate: 30.7%)
  5. USENIX ATC
    Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks
    Italo Dacosta and Patrick Traynor
    In Proceedings of the USENIX Annual Technical Conference (ATC), Jun 2010
    (Acceptance Rate: 17.0%)
  6. SCN
    malnets: Large-Scale Malicious Networks via Compromised Wireless Access Points
    Patrick Traynor, Kevin Butler, William Enck, and 2 more authors
    Journal of Security and Communication Networks (SCN), Jun 2010
  7. JCS
    Secure Attribute-Based Systems
    Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and 1 more author
    Journal of Computer Security (JCS), Jun 2010

2009

  1. Book Chapter
    Emerging Privacy Concerns for Digital Wallet Deployment
    Andrew Harris, Frank S. Park, Seymour Goodman, and 1 more author
    In Proceedings of the Workshop on Making Privacy in America, Jun 2009
  2. ACSAC
    Leveraging Cellular Infrastructure to Improve Fraud Prevention
    Frank S. Park, Chinmay Gangakhedkar, and Patrick Traynor
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Dec 2009
    (Acceptance Rate: 19.0%)
  3. PSHT
    Privacy and Security Concerns for Personal and Mobile Health Devices
    Patrick Traynor
    In Proceedings of the Workshop to Set A Research Agenda for Privacy and Security of Healthcare Technologies, Oct 2009
  4. S&P Mag
    Securing Cellular Infrastructure: Challenges and Opportunities
    Patrick Traynor
    IEEE Security & Privacy Magazine, Oct 2009
  5. ACM CCS
    On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core
    Patrick Traynor, Michael Lin, Machigar Ongtang, and 4 more authors
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Oct 2009
    (Acceptance Rate: 18.4%)
  6. ACM CCS
    Robust Signatures for Kernel Data Structures
    Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick Traynor, and 1 more author
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Oct 2009
    (Acceptance Rate: 18.4%)
  7. IEEE TPDS
    Leveraging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems
    Kevin Butler, Sunam Ryu, Patrick Traynor, and 1 more author
    IEEE Transactions on Parallel and Distributed Systems (TPDS), Oct 2009
  8. IEEE TON
    Mitigating Attacks On Open Functionality in SMS-Capable Cellular Networks
    Patrick Traynor, William Enck, Patrick McDaniel, and 1 more author
    IEEE/ACM Transactions on Networking (TON), Oct 2009
  9. IPTCOMM
    Improving Authentication Performance of Distributed SIP Proxies
    Italo Dacosta, Vijay Balasubramaniyan, Mustaque Ahamad, and 1 more author
    In Proceedings of the Conference on Principles, Systems and Applications of IP Telecommunications (IPTComm), Jul 2009
    (Acceptance Rate: 43.3%)

2008

  1. Book Chapter
    Privacy Preserving Web-Based Email
    Kevin Butler, William Enck, Patrick Traynor, and 2 more authors
    Nov 2008
  2. EVT
    Systemic Issues in the Hart InterCivic and Premier Voting System: Reflections Following Project EVEREST
    Kevin Butler, William Enck, Harri Hursti, and 3 more authors
    In Proceedings of the USENIX/ACCURATE Electronic Voting Technology (EVT) Workshop, Aug 2008
  3. ACM TISSEC
    Non-Invasive Methods for Host Certification
    Patrick Traynor, Michael Chien, Scott Weaver, and 2 more authors
    ACM Transactions on Information and System Security (TISSEC), Aug 2008
  4. ISOC NDSS
    Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems
    Patrick Traynor, Kevin Butler, William Enck, and 1 more author
    In Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS), Feb 2008
    (Acceptance Rate: 17.7%)
  5. JCS
    Exploiting Open Functionality in SMS-Capable Cellular Networks
    Patrick Traynor, William Enck, Patrick McDaniel, and 1 more author
    Journal of Computer Security (JCS), Feb 2008
  6. Book
    Security for Telecommunications Networks
    Patrick Traynor, Patrick McDaniel, and Thomas La Porta
    Aug 2008
  7. Dissertation
    Characterizing the Impact of Rigidity on the Security of Cellular Telecommunications Networks
    Patrick Gerard Traynor
    The Pennsylvania State University, May 2008

2007

  1. EVEREST
    EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing
    Patrick McDaniel, Kevin Butler, William Enck, and 20 more authors
    May 2007
  2. USENIX SEC
    On Attack Causality in Internet-Connected Cellular Networks
    Patrick Traynor, Patrick McDaniel, and Thomas La Porta
    In Proceedings of the USENIX Security Symposium (SECURITY), Aug 2007
    (Acceptance Rate: 12.3%)
  3. IEEE TMC
    Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
    Patrick Traynor, Raju Kumar, Heesook Choi, and 3 more authors
    IEEE Transactions on Mobile Computing (TMC), Aug 2007
  4. IEEE SSNDS
    Leveraging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems
    Sunam Ryu, Kevin Butler, Patrick Traynor, and 1 more author
    In Proceedings of the IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS), Jul 2007
    (Acceptance Rate: 40%)

2006

  1. ICISS
    Password Exhaustion: Predicting the End of Password Usefulness
    Luke St. Clair, Lisa Johansen, William Enck, and 4 more authors
    In Proceedings of the International Conference on Information Systems Security (ICISS), Dec 2006
  2. ICISS
    Privacy-Preserving Web-Based Email
    Kevin Butler, William Enck, Jennifer Plasterr, and 2 more authors
    In Proceedings of the International Conference on Information Systems Security (ICISS), Dec 2006
    (Acceptance Rate: 30.4%)
  3. ACM CCS
    Secure Attribute-Based Systems
    Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and 1 more author
    In Proceedings of the Thirteenth ACM Conference on Computer and Communications Security (CCS), Nov 2006
    (Acceptance Rate: 14.8%)
  4. ACM MobiCom
    Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks
    Patrick Traynor, William Enck, Patrick McDaniel, and 1 more author
    In Proceedings of the Twelfth Annual ACM International Conference on Mobile Computing and Networking (MobiCom), Sep 2006
    (Acceptance Rate: 11.7%)
  5. IEEE SecureComm
    Non-Invasive Methods for Host Certification
    Patrick Traynor, Michael Chien, Scott Weaver, and 2 more authors
    In Proceedings of the Second IEEE International Conference on Security and Privacy in Communication Networks (SecureComm), Aug 2006
    (Acceptance Rate: 25.4%)
  6. IEEE VTC
    Efficient Group Mobility for Heterogeneous Sensor Networks
    Patrick Traynor, JaeShung Shin, Barat Madan, and 2 more authors
    In Proceedings of the IEEE Vehicular Technology Conference (VTC Fall), Sep 2006
    (Acceptance Rate: 58%)
  7. ACM MobiSys
    LIGER: Implementing Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
    Patrick Traynor, Raju Kumar, Hussain Bin Saad, and 2 more authors
    In Proceedings of the 4th ACM International Conference on Mobile Systems, Applications and Services (MobiSys), Jun 2006
    (Acceptance Rate: 15.4%)
  8. IEEE WCNC
    The Effects of Probabilistic Key Management on Secure Routing in Sensor Networks
    Patrick Traynor, Guohong Cao, and Thomas La Porta
    In Proceedings of the 2006 IEEE Wireless Communications and Networking Conference (WCNC), Apr 2006
    (Acceptance Rate: 38.8%)
  9. IEEE INFOCOM
    Establishing Pair-Wise Keys In Heterogeneous Sensor Networks
    Patrick Traynor, Heesook Choi, Guohong Cao, and 2 more authors
    In Proceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM), Apr 2006
    (Acceptance Rate: 18%)

2005

  1. ACM CCS
    Exploiting Open Functionality in SMS-Capable Cellular Networks
    William Enck, Patrick Traynor, Patrick McDaniel, and 1 more author
    In Proceedings of the Twelfth ACM Conference on Computer and Communications Security (CCS), Nov 2005
    (Acceptance Rate: 15%)