What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Patrick D. McDaniel
Google Scholar
79
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Efficient Storage Integrity in Adversarial Settings.
Quinn Burke
Ryan Sheatsley
Yohan Beugin
Eric Pauley
Owen Hines
Michael Swift
Patrick D. McDaniel
2025
conf/ndss
Secure IP Address Allocation at Cloud Scale.
Eric Pauley
Kyle Domico
Blaine Hoak
Ryan Sheatsley
Quinn Burke
Yohan Beugin
Engin Kirda
Patrick D. McDaniel
2024
journals/popets
Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving).
Yohan Beugin
Patrick D. McDaniel
2024
conf/sp
A Public and Reproducible Assessment of the Topics API on Real Data.
Yohan Beugin
Patrick D. McDaniel
2023
conf/uss
DScope: A Cloud-Native Internet Telescope.
Eric Pauley
Paul Barford
Patrick D. McDaniel
2023
conf/uss
The Space of Adversarial Strategies.
Ryan Sheatsley
Blaine Hoak
Eric Pauley
Patrick D. McDaniel
2022
journals/popets
Building a Privacy-Preserving Smart Camera System.
Yohan Beugin
Quinn Burke
Blaine Hoak
Ryan Sheatsley
Eric Pauley
Gang Tan
Syed Rafiul Hussain
Patrick D. McDaniel
2022
conf/sp
Measuring and Mitigating the Risk of IP Reuse on Public Clouds.
Eric Pauley
Ryan Sheatsley
Blaine Hoak
Quinn Burke
Yohan Beugin
Patrick D. McDaniel
2022
conf/cns
Performant Binary Fuzzing without Source Code using Static Instrumentation.
Eric Pauley
Gang Tan
Danfeng Zhang
Patrick D. McDaniel
2021
journals/popets
Real-time Analysis of Privacy-(un)aware IoT Applications.
Leonardo Babun
Z. Berkay Celik
Patrick D. McDaniel
A. Selcuk Uluagac
2021
conf/ccs
On the Robustness of Domain Constraints.
Ryan Sheatsley
Blaine Hoak
Eric Pauley
Yohan Beugin
Michael J. Weisman
Patrick D. McDaniel
2020
conf/ccsw-ws
Co-residency Attacks on Containers are Real.
Sushrut Shringarputale
Patrick D. McDaniel
Kevin R. B. Butler
Thomas La Porta
2020
conf/wisec
Kratos: multi-user multi-device-aware access control system for the smart home.
Amit Kumar Sikder
Leonardo Babun
Z. Berkay Celik
Abbas Acar
Hidayet Aksu
Patrick D. McDaniel
Engin Kirda
A. Selcuk Uluagac
2019
conf/uss
EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs.
Giuseppe Petracca
Yuqiong Sun
Ahmad Atamli-Reineh
Patrick D. McDaniel
Jens Grossklags
Trent Jaeger
2019
conf/ndss
IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT.
Z. Berkay Celik
Gang Tan
Patrick D. McDaniel
2018
conf/ccs
Detection under Privileged Information.
Z. Berkay Celik
Patrick D. McDaniel
Rauf Izmailov
Nicolas Papernot
Ryan Sheatsley
Raquel Alvarez
Ananthram Swami
2018
conf/uss
Sensitive Information Tracking in Commodity IoT.
Z. Berkay Celik
Leonardo Babun
Amit Kumar Sikder
Hidayet Aksu
Gang Tan
Patrick D. McDaniel
A. Selcuk Uluagac
2018
conf/sp
Extending Detection with Privileged Information via Generalized Distillation.
Z. Berkay Celik
Patrick D. McDaniel
2018
conf/eurosp
SoK: Security and Privacy in Machine Learning.
Nicolas Papernot
Patrick D. McDaniel
Arunesh Sinha
Michael P. Wellman
2017
journals/tifs
Securing ARP/NDP From the Ground Up.
Jing (Dave) Tian
Kevin R. B. Butler
Joseph I. Choi
Patrick D. McDaniel
Padma Krishnaswamy
2017
conf/ccs
Practical Black-Box Attacks against Machine Learning.
Nicolas Papernot
Patrick D. McDaniel
Ian J. Goodfellow
Somesh Jha
Z. Berkay Celik
Ananthram Swami
2017
conf/esorics
Adversarial Examples for Malware Detection.
Kathrin Grosse
Nicolas Papernot
Praveen Manoharan
Michael Backes
Patrick D. McDaniel
2016
conf/ccs
Cyber Deception: Virtual Networks to Defend Insider Reconnaissance.
Stefan Achleitner
Thomas La Porta
Patrick D. McDaniel
Shridatt Sugrim
Srikanth V. Krishnamurthy
Ritu Chadha
2016
conf/uss
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
Michael Backes
Sven Bugiel
Erik Derr
Patrick D. McDaniel
Damien Octeau
Sebastian Weisgerber
2016
conf/sp
Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains.
Chaz Lever
Robert J. Walls
Yacin Nadji
David Dagon
Patrick D. McDaniel
Manos Antonakakis
2016
conf/sp
Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks.
Nicolas Papernot
Patrick D. McDaniel
Xi Wu
Somesh Jha
Ananthram Swami
2016
conf/sp
SoK: Lessons Learned from Android Security Research for Appified Software Platforms.
Yasemin Acar
Michael Backes
Sven Bugiel
Sascha Fahl
Patrick D. McDaniel
Matthew Smith
2016
conf/eurosp
The Limitations of Deep Learning in Adversarial Settings.
Nicolas Papernot
Patrick D. McDaniel
Somesh Jha
Matt Fredrikson
Z. Berkay Celik
Ananthram Swami
2016
conf/dsn
Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols.
Devin J. Pohly
Patrick D. McDaniel
2014
conf/ccs
Security and Science of Agility.
Patrick D. McDaniel
Trent Jaeger
Thomas F. La Porta
Nicolas Papernot
Robert J. Walls
Alexander Kott
Lisa M. Marvel
Ananthram Swami
Prasant Mohapatra
Srikanth V. Krishnamurthy
Iulian Neamtiu
2014
conf/fc
An Analysis of Anonymity in Bitcoin Using P2P Network Traffic.
Philip Koshy
Diana Koshy
Patrick D. McDaniel
2014
conf/ndss
A Trusted Safety Verifier for Process Controller Code.
Stephen E. McLaughlin
Saman A. Zonouz
Devin J. Pohly
Patrick D. McDaniel
2014
conf/wisec
Duet: library integrity verification for android applications.
Wenhui Hu
Damien Octeau
Patrick D. McDaniel
Peng Liu
2013
conf/uss
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
Damien Octeau
Patrick D. McDaniel
Somesh Jha
Alexandre Bartel
Eric Bodden
Jacques Klein
Yves Le Traon
2012
conf/ccs
Minimizing private data disclosures in the smart grid.
Weining Yang
Ninghui Li
Yuan Qi
Wahbeh H. Qardaji
Stephen E. McLaughlin
Patrick D. McDaniel
2012
conf/ccs
SABOT: specification-based payload generation for programmable logic controllers.
Stephen E. McLaughlin
Patrick D. McDaniel
2012
conf/acsac
Hi-Fi: collecting high-fidelity whole-system provenance.
Devin J. Pohly
Stephen E. McLaughlin
Patrick D. McDaniel
Kevin R. B. Butler
2011
conf/ccs
Protecting consumer privacy from electric load monitoring.
Stephen E. McLaughlin
Patrick D. McDaniel
William Aiello
2011
conf/uss
A Study of Android Application Security.
William Enck
Damien Octeau
Patrick D. McDaniel
Swarat Chaudhuri
2010
conf/ccs
Protecting portable storage with host validation.
Kevin R. B. Butler
Stephen E. McLaughlin
Patrick D. McDaniel
2010
conf/ccs
Seeding clouds with trust anchors.
Joshua Schiffman
Thomas Moyer
Hayawardh Vijayakumar
Trent Jaeger
Patrick D. McDaniel
2010
conf/uss
Embedded Firmware Diversity for Smart Electric Meters.
Stephen E. McLaughlin
Dmitry Podkuiko
Adam Delozier
Sergei Miadzvezhanka
Patrick D. McDaniel
2010
conf/acsac
Kells: a protection framework for portable data.
Kevin R. B. Butler
Stephen E. McLaughlin
Patrick D. McDaniel
2010
conf/acsac
Multi-vendor penetration testing in the advanced metering infrastructure.
Stephen E. McLaughlin
Dmitry Podkuiko
Sergei Miadzvezhanka
Adam Delozier
Patrick D. McDaniel
2010
conf/acsac
Porscha: policy oriented secure content handling in Android.
Machigar Ongtang
Kevin R. B. Butler
Patrick D. McDaniel
2009
conf/ccs
On lightweight mobile phone application certification.
William Enck
Machigar Ongtang
Patrick D. McDaniel
2009
conf/ccs
On cellular botnets: measuring the impact of malicious devices on a cellular network core.
Patrick Traynor
Michael Lin
Machigar Ongtang
Vikhyath Rao
Trent Jaeger
Patrick D. McDaniel
Thomas La Porta
2009
conf/acsac
Semantically Rich Application-Centric Security in Android.
Machigar Ongtang
Stephen E. McLaughlin
William Enck
Patrick D. McDaniel
2009
conf/acsac
Justifying Integrity Using a Virtual Machine Verifier.
Joshua Schiffman
Thomas Moyer
Christopher Shal
Trent Jaeger
Patrick D. McDaniel
2009
conf/acsac
Scalable Web Content Attestation.
Thomas Moyer
Kevin R. B. Butler
Joshua Schiffman
Patrick D. McDaniel
Trent Jaeger
2008
conf/ccs
Rootkit-resistant disks.
Kevin R. B. Butler
Stephen E. McLaughlin
Patrick D. McDaniel
2008
conf/uss
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST.
Kevin R. B. Butler
William Enck
Harri Hursti
Stephen E. McLaughlin
Patrick Traynor
Patrick D. McDaniel
2008
conf/ndss
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Patrick Traynor
Kevin R. B. Butler
William Enck
Patrick D. McDaniel
2008
conf/acsac
PinUP: Pinning User Files to Known Applications.
William Enck
Patrick D. McDaniel
Trent Jaeger
2008
conf/acsac
Defending Against Attacks on Main Memory Persistence.
William Enck
Kevin R. B. Butler
Thomas Richardson
Patrick D. McDaniel
Adam D. Smith
2007
conf/ccs
Protecting users from "themselves".
William Enck
Sandra Julieta Rueda
Joshua Schiffman
Yogesh Sreenivasan
Luke St. Clair
Trent Jaeger
Patrick D. McDaniel
2007
conf/ccs
Non-volatile memory and disks: avenues for policy architectures.
Kevin R. B. Butler
Stephen E. McLaughlin
Patrick D. McDaniel
2007
conf/uss
On Attack Causality in Internet-Connected Cellular Networks.
Patrick D. McDaniel
2007
conf/iciss
Towards Automated Privilege Separation.
Dhananjay Bapat
Kevin R. B. Butler
Patrick D. McDaniel
2007
conf/acsac
Establishing and Sustaining System Integrity via Root of Trust Installation.
Luke St. Clair
Joshua Schiffman
Trent Jaeger
Patrick D. McDaniel
2007
conf/acsac
Channels: Runtime System Infrastructure for Security-Typed Languages.
Boniface Hicks
Tim Misiak
Patrick D. McDaniel
2006
conf/ccs
Optimizing BGP security by exploiting path stability.
Kevin R. B. Butler
Patrick D. McDaniel
William Aiello
2006
conf/ccs
Secure attribute-based systems.
Matthew Pirretti
Patrick Traynor
Patrick D. McDaniel
Brent Waters
2006
conf/uss
Shame on Trust in Distributed Systems.
Trent Jaeger
Patrick D. McDaniel
Luke St. Clair
Ramón Cáceres
Reiner Sailer
2006
conf/iciss
Password Exhaustion: Predicting the End of Password Usefulness.
Luke St. Clair
Lisa Johansen
William Enck
Matthew Pirretti
Patrick Traynor
Patrick D. McDaniel
Trent Jaeger
2006
conf/iciss
Privacy Preserving Web-Based Email.
Kevin R. B. Butler
William Enck
Jennifer Plasterr
Patrick Traynor
Patrick D. McDaniel
2006
conf/ndss
Enterprise Security: A Community of Interest Based Approach.
Patrick D. McDaniel
Subhabrata Sen
Oliver Spatscheck
Jacobus E. van der Merwe
William Aiello
Charles R. Kalmanek
2006
conf/acsac
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages.
Boniface Hicks
Kiyan Ahmadizadeh
Patrick D. McDaniel
2005
conf/ccs
Exploiting open functionality in SMS-capable cellular networks.
William Enck
Patrick Traynor
Patrick D. McDaniel
Thomas F. La Porta
2005
conf/iciss
Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior.
Kevin R. B. Butler
Patrick D. McDaniel
2005
conf/esorics
Privacy Preserving Clustering.
Somesh Jha
Louis Kruger
Patrick D. McDaniel
2005
conf/acsac
TARP: Ticket-based Address Resolution Protocol.
Wesam Lootah
William Enck
Patrick D. McDaniel
2003
conf/ccs
On the performance, feasibility, and use of forward-secure signatures.
Eric Cronin
Sugih Jamin
Tal Malkin
Patrick D. McDaniel
2003
conf/ccs
Origin authentication in interdomain routing.
William Aiello
John Ioannidis
Patrick D. McDaniel
2003
conf/ndss
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing.
Geoffrey Goodell
William Aiello
Timothy Griffin
John Ioannidis
Patrick D. McDaniel
Aviel D. Rubin
2002
conf/sp
Methods and Limitations of Security Policy Reconciliation.
Patrick D. McDaniel
Atul Prakash
2001
conf/ndss
Principles of Policy in Secure Groups.
Hugh Harney
Andrea Colgrove
Patrick D. McDaniel
2000
conf/fc
A Response to ''Can We Eliminate Certificate Revocation Lists?''.
Patrick D. McDaniel
Aviel D. Rubin
1999
conf/uss
Antigone: A Flexible Framework for Secure Group Communication.
Patrick D. McDaniel
Atul Prakash
Peter Honeyman
Coauthors
A. Selcuk Uluagac
(3)
Abbas Acar
(1)
Adam D. Smith
(1)
Adam Delozier
(2)
Ahmad Atamli-Reineh
(1)
Alexander Kott
(1)
Alexandre Bartel
(1)
Amit Kumar Sikder
(2)
Ananthram Swami
(5)
Andrea Colgrove
(1)
Arunesh Sinha
(1)
Atul Prakash
(2)
Aviel D. Rubin
(2)
Blaine Hoak
(5)
Boniface Hicks
(2)
Brent Waters
(1)
Charles R. Kalmanek
(1)
Chaz Lever
(1)
Christopher Shal
(1)
Damien Octeau
(4)
Danfeng Zhang
(1)
David Dagon
(1)
Devin J. Pohly
(3)
Dhananjay Bapat
(1)
Diana Koshy
(1)
Dmitry Podkuiko
(2)
Engin Kirda
(2)
Eric Bodden
(1)
Eric Cronin
(1)
Eric Pauley
(8)
Erik Derr
(1)
Gang Tan
(4)
Geoffrey Goodell
(1)
Giuseppe Petracca
(1)
Harri Hursti
(1)
Hayawardh Vijayakumar
(1)
Hidayet Aksu
(2)
Hugh Harney
(1)
Ian J. Goodfellow
(1)
Iulian Neamtiu
(1)
Jacobus E. van der Merwe
(1)
Jacques Klein
(1)
Jennifer Plasterr
(1)
Jens Grossklags
(1)
Jing (Dave) Tian
(1)
John Ioannidis
(2)
Joseph I. Choi
(1)
Joshua Schiffman
(5)
Kathrin Grosse
(1)
Kevin R. B. Butler
(16)
Kiyan Ahmadizadeh
(1)
Kyle Domico
(1)
Leonardo Babun
(3)
Lisa Johansen
(1)
Lisa M. Marvel
(1)
Louis Kruger
(1)
Luke St. Clair
(4)
Machigar Ongtang
(4)
Manos Antonakakis
(1)
Matt Fredrikson
(1)
Matthew Pirretti
(2)
Matthew Smith
(1)
Michael Backes
(3)
Michael J. Weisman
(1)
Michael Lin
(1)
Michael P. Wellman
(1)
Michael Swift
(1)
Nicolas Papernot
(7)
Ninghui Li
(1)
Oliver Spatscheck
(1)
Owen Hines
(1)
Padma Krishnaswamy
(1)
Patrick D. McDaniel
(79)
Patrick Traynor
(7)
Paul Barford
(1)
Peng Liu
(1)
Peter Honeyman
(1)
Philip Koshy
(1)
Prasant Mohapatra
(1)
Praveen Manoharan
(1)
Quinn Burke
(4)
Ramón Cáceres
(1)
Raquel Alvarez
(1)
Rauf Izmailov
(1)
Reiner Sailer
(1)
Ritu Chadha
(1)
Robert J. Walls
(2)
Ryan Sheatsley
(7)
Saman A. Zonouz
(1)
Sandra Julieta Rueda
(1)
Sascha Fahl
(1)
Sebastian Weisgerber
(1)
Sergei Miadzvezhanka
(2)
Shridatt Sugrim
(1)
Somesh Jha
(5)
Srikanth V. Krishnamurthy
(2)
Stefan Achleitner
(1)
Stephen E. McLaughlin
(13)
Subhabrata Sen
(1)
Sugih Jamin
(1)
Sushrut Shringarputale
(1)
Sven Bugiel
(2)
Swarat Chaudhuri
(1)
Syed Rafiul Hussain
(1)
Tal Malkin
(1)
Thomas F. La Porta
(2)
Thomas La Porta
(3)
Thomas Moyer
(3)
Thomas Richardson
(1)
Tim Misiak
(1)
Timothy Griffin
(1)
Trent Jaeger
(11)
Vikhyath Rao
(1)
Wahbeh H. Qardaji
(1)
Weining Yang
(1)
Wenhui Hu
(1)
Wesam Lootah
(1)
William Aiello
(5)
William Enck
(12)
Xi Wu
(1)
Yacin Nadji
(1)
Yasemin Acar
(1)
Yogesh Sreenivasan
(1)
Yohan Beugin
(7)
Yuan Qi
(1)
Yuqiong Sun
(1)
Yves Le Traon
(1)
Z. Berkay Celik
(8)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to