Publications can also be viewed by type, with superceded, or all publications.

2017

  1. Chaz Lever, Robert J. Walls, Yacin Nadji, David Dagon, Patrick McDaniel, and Manos Antonakakis, Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains. IEEE Security & Privacy Magazine (Secure Systems issue column), 2017. to appear.
  2. Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z. Berkay Celik, and Ananthram Swami. Practical Black-Box Attacks against Machine Learning. ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017, April 2017.
    (acceptance rate=209%)
  3. Stefan Achleitner, Thomas La Porta, Trent Jaeger, and Patrick McDaniel. Adversarial Network Forensics in Software Defined Networking. ACM Symposium on SDN Research, ACM, April 2017.
  4. Ahmed Fathy Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Patrick McDaniel, and Lisa Marvel. Stealth Migration: Hiding Virtual Machines on the Network. IEEE International Conference on Computer Communications (INFOCOM), IEEE 2017.
  5. Stefan Achleitner, Thomas La Porta, Patrick McDaniel, Srikanth V. Krishnamurthy, Alexander Poylisher, and Constantin Serban. Malicious Co-Residency on the Cloud: Attacks and Defense. IEEE International Conference on Computer Communications (INFOCOM), IEEE 2017.
  6. Berkay Celik, Patrick McDaniel, and Rauf Izmailov. Building Better Detection with Privileged Information. Proceedings of the International Workshop on Security And Privacy Analytics (IWSPA 2017) 2017. Invited Paper.

2016

  1. Patrick McDaniel, Nicolas Papernot, and Berkay Celik, Machine Learning in Adversarial Settings. IEEE Security & Privacy Magazine, 14(3), May/June, 2016.
  2. Patrick McDaniel and Ananthram Swami, The Cyber Security Collaborative Research Alliance:Unifying Detection, Agility, and Risk in Mission-Oriented Cyber Decision Making. CSIAC Journal, Army Research Laboratory (ARL) Cyber Science and Technology, 5(1), December, 2016.
  3. Damien Octeau, Daniel Luchaup, Somesh Jha, and Patrick McDaniel, Composite Constant Propagation and its Application to Android Program Analysis. IEEE Transactions on Software Engineering, 42(11):999-1014, 2016.
  4. Nathaniel Lageman, Eric Kilmer, Robert J. Walls, and Patrick McDaniel. BinDNN: Resilient Function Matching Using Deep Learning. 2016 International Conference on Security and Privacy in Communication Networks (SECURECOMM), October 2016.
  5. Z. Berkay Celik, Nan Hu, Yun Li, Nicolas Papernot, Patrick McDaniel, Jeff Rowe, Robert Walls, Karl Levitt, Novella Bartolini, Thomas F. La Porta, and and Ritu Chadha. Mapping Sample Scenarios to Operational Models. Proceedings of the Military Communications Conference (MILCOM), IEEE 2016.
  6. Nicolas Papernot, Patrick McDaniel, Ananthram Swami, and Richard Harang. Crafting Adversarial Input Sequences for Recurrent Neural Networks. Proceedings of the Military Communications Conference (MILCOM), IEEE 2016.
  7. Michael Backes, ven Bugiel, Erik Derr, Patrick McDaniel Damien Octeau, and Sebastian Weisgerber. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. Proceedings of the 25th USENIX Security Symposium, August 2016. [pdf]
  8. Devin J. Pohly and Patrick McDaniel. Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols. 46th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2016.
  9. Chaz Lever, Robert Walls, Yacin Nadji, David Dagon, Patrick McDaniel, and Manos Antonakakis. Domain-Z: 28 Registrations Later. Proceedings of the 37th IEEE Symposium on Security and Privacy, May 2016. San Francisco, CA.
  10. Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick McDaniel, and Matthew Smith. SoK: Lessons Learned From Android Security Research For Appified Software Platforms. Proceedings of the 37th IEEE Symposium on Security and Privacy, May 2016. San Francisco, CA.
  11. Nicolas Papernot, Patrick McDaniel, Xi Wu, Somesh Jha, and Ananthram Swami. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks. Proceedings of the 37th IEEE Symposium on Security and Privacy, May 2016. San Francisco, CA.
  12. Charles J. Huber, Scott E. Brown, Patrick McDaniel, and Lisa M. Marvel. Cyber Fighter Associate: A Decision Support System for Cyber Agility. Proceedings of the 50th Annual Conference on Information Sciences and Systems (CISS), March 2016. Princeton, NJ.
  13. Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, and Ananthram Swami. The Limitations of Deep Learning in Adversarial Settings. Proceedings of the 1st IEEE European Symposium on Security and Privacy, IEEE 2016. Saarbrucken, Germany.
  14. Damien Octeau, Somesh Jha, Matthew Dering, Patrick McDaniel, Alexandre Bartel, Li Li, Jacques Klein, and Yves Le Traon. Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-Component Analysis. Proceedings of the 43rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), January 2016. St. Petersburg, Florida, USA. [pdf]
  15. Stefan Achleitner, Thomas La Porta, Patrick McDaniel, Shridatt Sugrim, Srikanth Krishnamurthy, and Ritu Chadha. Cyber Deception: Virtual Networks to Defend Insider Reconnaissance. Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, ACM 2016.
  16. Nicolas Papernot, Patrick McDaniel, and Ian Goodfellow, Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples. arXiv preprint arXiv:1605.07277, 2016.
  17. Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Berkay Celik, and Ananthram Swami, Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples. arXiv preprint arXiv:1602.02697, 2016.

Technical Reports
  • Devin J. Pohly and Patrick McDaniel, Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols. Technical Report NAS-TR-0188-2016, Institute of Networking and Security Research, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, January 2016.

2015

  1. Robert J. Walls, Eric D. Kilmer, Nathaniel Lageman, and Patrick D. McDaniel. Measuring the Impact and Perception of Acceptable Advertisements. Proceedings of the ACM 2015 Internet Measurement Conference (IMC), October 2015. Tokyo, Japan. [pdf]
  2. Nicolas Papernot, Patrick McDaniel, and Robert Walls. Enforcing Agile Access Control Policies in Relational Databases using Views. Proceedings of the Military Communications Conference (MILCOM), October 2015. Tampa, FL.
  3. Alessandro Oltramari, Lorrie Faith Cranor, Robert Walls, and Patrick McDaniel. Computational Ontology of Network Operations. Proceedings of the Military Communications Conference (MILCOM), October 2015. Tampa, FL.
  4. Berkay Celik, Robert Walls, Patrick McDaniel, and Ananthram Swami. Malware Traffic Detection using Tamper Resistant Features. Proceedings of the Military Communications Conference (MILCOM), October 2015. Tampa, FL.
  5. Devin Pohly, Charles Sestito, and Patrick McDaniel. Adaptive Protocol Switching Using Dynamically Insertable Bumps in the Stack. Proceedings of the Military Communications Conference (MILCOM), October 2015. Tampa, FL.
  6. Azeem Aqil, Ahmed Atya, Trent Jaeger, Srikanth Krishnamurthy, Karl Levitt, Patrick McDaniel, Jeff Rowe, and Ananthram Swami. Detection of Stealthy TCP-based DoS Attacks. Proceedings of the Military Communications Conference (MILCOM), October 2015. Tampa, FL.
  7. Daniel E. Krych, Stephen Lange-Maney, Patrick McDaniel, and William Glodek. Investigating Weaknesses in Android Certificate Security. SPIE 9478, Modeling and Simulation for Defense Systems and Applications X, May 2015.
  8. Damien Octeau, Daniel Luchaup, Matthew Dering, Somesh Jha, and Patrick McDaniel. Composite Constant Propagation: Application to Android Inter-Component Communication Analysis. Proceedings of the 37th International Conference on Software Engineering (ICSE), May 2015. Florence, Italy. [pdf]
  9. Li Li, Alexandre Bartel, Tegawende Bissyande, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick McDaniel. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. Proceedings of the 37th International Conference on Software Engineering (ICSE), May 2015. Florence, Italy. [pdf]
  10. Jing Tian, Kevin R. B. Butler, Patrick McDaniel, and Padma Krishnaswamy. Securing ARP From the Ground Up. CODASPY '15: Proceedings of the 5th ACM Conference on Data Application and Security and Privacy, March 2015. San Antonio, TX, USA. [pdf]

Technical Reports
  • Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, and Z. Berkay Celik nad Ananthram Swami, The Limitations of Deep Learning in Adversarial Settings. Technical Report NAS-TR-0172-2014, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, October 2015.

2014

  1. Patrick McDaniel, Brian Rivera, and Ananthram Swami, Toward a Science of Secure Environments. IEEE Security & Privacy Magazine, 12(4), July/August, 2014.
  2. Alexander Kott, Ananthram Swami, and Patrick Drew McDaniel, Security Outlook: Six Cyber Game Changers for the Next 15 Years. IEEE Computer, 47(12):104-106, 2014.
  3. Zhenfu Cao, Keqiu Li, Xu Li, Patrick McDaniel, Radha Poovendran, Guojun Wang, and Yang Xiang, Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems. IEEE Transactions on Parallel and Distributed Systems, 25(2):279-282, 2014.
  4. William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol Sheth, TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. ACM Transactions on Computer Systems (TOCS), 32(2), June, 2014.
    (extends egc+10) [pdf]
  5. William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth, TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. Communications of the ACM, 57(3), March, 2014. Research Highlight.
  6. Alessandro Oltramari, Lorrie Cranor, Robert J. Walls, and Patrick McDaniel. Building an Ontology of Cyber Security. Proc. Intl. Conference on Semantic Technologies for Intelligence, Defense, and Security (STIDS), November 2014.
  7. Matthew Dering and Patrick McDaniel. Android Market Reconstruction and Analysis. Proceedings of the Military Communications Conference (MILCOM), October 2014. Baltimore, MD.
  8. Wenhui Hu, Damien Octeau, Patrick McDaniel, and Peng Liu. Duet: Library Integrity Verification for Android Applications. Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), July 2014. Oxford, United Kingdom. [pdf]
  9. Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps. Proceedings of the 35th Conference on Programming Language Design and Implementation (PLDI), June 2014. Edinburgh, UK. [pdf]
  10. Phillip Koshy, Diana Koshy, and Patrick McDaniel. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic. Proceedings of Financial Cryptography 2014, International Financial Cryptography Association (IFCA), February 2014. Christ Church, Barbados.
  11. Stephen McLaughlin, Devin Pohly, Patrick McDaniel, and Saman Zonouz. A Trusted Safety Verifier for Process Controller Code. Proc. ISOC Network and Distributed Systems Security Symposium (NDSS), February 2014. San Diego, CA.
  12. Patrick McDaniel, Trent Jaeger†, Thomas F. La Porta†, Nicolas Papernot Robert J. Walls, Alexander Kott, Lisa Marvel, Ananthram Swami Prasant Mohapatra, Srikanth V. Krishnamurthy, and Iulian Neamtiu. Security and Science of Agility. First ACM Workshop on Moving Target Defense (MTD 2014), November 2014. Scottsdale, AZ. [pdf]

Technical Reports
  • Wenhui Hu, Damien Octeau, Patrick McDaniel, and Peng Liu, Duet: Library Integrity Verification for Android Applications. Technical Report NAS-TR-0172-2014, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, February 2014.

2013

  1. Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, and Yves Le Traon. Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis. Proceedings of the 22th USENIX Security Symposium, August 2013. Washington, DC.
    (acceptance rate=16.2%) [pdf]

2012

  1. Machigar Ongtang, Stephen McLaughlin, William Enck, and Patrick McDaniel, Semantically Rich Application-Centric Security in Android. Security and Communication Networks, 5(6):658-673, 2012. [pdf]
  2. Devin J. Pohly, Stephen McLaughlin, Patrick McDaniel, and Kevin Butler. Hi-Fi: Collecting High-Fidelity Whole-System Provenance. Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC), December 2012. Orlando, Florida. [pdf]
  3. Stephen McLaughlin and Patrick McDaniel. SABOT: Specification-based Payload Generation for Programmable Logic Controllers. 19th ACM Conference on Computer and Communications Security (CCS), October 2012.
    (acceptance rate=18.9%) [pdf]
  4. Weining Yang, Ninghui Li, Yuan Qi, Wahbeh Qardaji, Stephen McLaughlin, and Patrick McDaniel. Minimizing Private Data Disclosures in the Smart Grid. 19th ACM Conference on Computer and Communications Security (CCS), October 2012.
    (acceptance rate=18.9%) [pdf]
  5. Eun Kyoung Kim, Patrick McDaniel, and Thomas La Porta. A Detection Mechanism for SMS Flooding Attacks in Cellular Networks. Proceedings of the 8th International Conference on Security and Privacy in Communication Networks (SECURECOMM 2012), September 2012. Padua, Italy.
    (acceptance rate=30%) [pdf]
  6. Damien Octeau, Somesh Jha, and Patrick McDaniel. Retargeting Android Applications to Java Bytecode. 20th International Symposium on the Foundations of Software Engineering (FSE), November 2012. Research Triangle Park, NC. (best artifact award).
    (acceptance rate=17.4%) [pdf]
  7. Thomas Moyer, Trent Jaeger, and Patrick McDaniel. Scalable Integrity-Guaranteed AJAX. Proceedings of the 14th Asia-Pacific Web Conference (APWeb), April 2012. Kunming, China. Invited Paper.
  8. Patrick McDaniel and Stephen McLaughlin. Structured Security Testing in the Smartgrid. Proceedings of 5th International Symposium on Communications, Control, and Signal Processing, May 2012. Rome, Italy. Invited Paper.
    (extends mdd+10) [pdf]

Technical Reports
  • Devin J. Pohly, Stephen McLaughlin, Patrick McDaniel, and Kevin Butler , Hi-Fi: Collecting High-Fidelity Whole-System Provenance. Technical Report NAS-TR-0160-2012, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, June 2012.

2011

  1. Patrick McDaniel, Bloatware Comes to the Smartphone. IEEE Security & Privacy Magazine, 10(4), July/August, 2011. [pdf]
  2. Patrick McDaniel, Data Provenance and Security. IEEE Security & Privacy Magazine, 9(3), March/April, 2011. [pdf]
  3. Thomas Moyer, Kevin Butler, Joshua Schiffman, Patrick McDaniel, and Trent Jaeger, Scalable Web Content Attestation. IEEE Transactions on Computers, 61(5):686--699, April, 2011.
    (extends mbs+09)
  4. Joshua Schiffman, Thomas Moyer, Trent Jaeger, and Patrick McDaniel, Network-based Root of Trust for Installation. IEEE Security & Privacy Magazine, pages 40-48, Jan/Feb, 2011. [pdf]
  5. Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, and Thomas La Porta, From Mobile Phones to Responsible Devices. Journal of Security and Communication Networks (SCN), 4(6):719 -- 726, June, 2011. [pdf]
  6. Stephen McLaughlin, Patrick McDaniel, and William Aiello. Protecting Consumer Privacy from Electric Load Monitoring. The 18th ACM Conference on Computer and Communications Security (CCS), October 2011. Chicago, IL.
    (acceptance rate=13.9%) [pdf]
  7. William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. A Study of Android Application Security. Proceedings of the 20th USENIX Security Symposium, August 2011. San Francisco, CA.
    (acceptance rate=17.2%) [pdf]

Technical Reports
  • Damien Octeau, Somesh Jha, and Patrick McDaniel, Retargeting Android Applications to Java Bytecode. Technical Report NAS-TR-0150-2011, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, September 2011.
  • Stephen McLaughlin and Patrick McDaniel, Protecting Consumer Privacy from Electric Load Monitoring. Technical Report NAS-TR-0147-2011, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, March 2011.

2010

  1. Patrick McDaniel and William Enck, Not So Great Expectations: Why Application Markets Haven't Failed Security. IEEE Security & Privacy Magazine, 8(5):76--78, September/October, 2010. [pdf]
  2. Kevin Butler, Stephen McLaughlin, Thomas Moyer, and Patrick McDaniel, New Security Architectures Based on Emerging Disk Functionality. IEEE Security and Privacy Magazine, 8(5), October, 2010.
  3. Patrick Traynor, Kevin Butler, William Enck, Kevin Borders, and Patrick McDaniel, malnets: Large-Scale Malicious Networks via Compromised Wireless Access Points. Journal of Security and Communication Networks (SCN), 2(3):102-113, March, 2010. [pdf]
  4. Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Brent Waters, Secure Attribute-Based Systems. Journal of Computer Security (JCS), 18(5):799--837, 2010.
    (extends ptmw06)
  5. Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, and Patrick McDaniel, A Logical Specification and Analysis for SELinux MLS Policy. ACM Transactions on Information and System Security (TISSEC), 13(26), 2010.
    (extends hrs+07) [pdf]
  6. Kevin Butler, Toni Farley, Patrick McDaniel, and J. Rexford, A Survey of BGP Security Issues and Solutions. Proceedings of the IEEE, 2010(1):100-122, January, 2010. [pdf]
  7. Kevin Butler, Stephen McLaughlin, and Patrick McDaniel. Kells: A Protection Framework for Portable Data. Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC), December 2010. Austin, TX.
    (acceptance rate=16.3%) [pdf]
  8. Stephen McLaughlin, Dmitry Podkuiko, Adam Delozier, Sergei Miadzvezhanka, and Patrick McDaniel. Multi-vendor Penetration Testing in the Advanced Metering Infrastructure. Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC), December 2010. Austin, TX.
    (acceptance rate=16.3%) [pdf]
  9. Machigar Ongtang, Kevin Butler, and Patrick McDaniel. Porscha: Policy Oriented Secure Content Handling in Android. Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC), December 2010. Austin, TX.
    (acceptance rate=16.3%) [pdf]
  10. Patrick Traynor, Joshua Schiffman, Thomas La Porta, Patrick McDaniel, Abhrajit Ghosh, and Farooq Anjum. Constructing Secure Localization Systems with Adjustable Granularity. IEEE Global Communications Conference (GLOBECOM), December 2010. Miami, FL.
    (acceptance rate=36%) [pdf]
  11. William Enck, Peter Gilbert, Byung-gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI), October 2010. Vancouver, BC.
    (acceptance rate=16.1%) [pdf]
  12. Toby Ehrenkranz, Jun Li, and Patrick McDaniel. Realizing A Source Authentic Internet. Proceedings of the 6th International ICST Conference on Security and Privacy in Communications Networks (Securecomm), September 2010. Singapore.
    (acceptance rate=25%) [pdf]
  13. Boniface Hicks, Sandra Rueda, David King, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick McDaniel, and Trent Jaeger. An Architecture for Enforcing End-to-End Access Control over Web Applications. Proceedings of the Fifteenth ACM Symposium on Access Control Models and Technologies (SACMAT 2010), pages 163-172, June 2010. Pittsburgh, PA. [pdf]
  14. Kevin Butler, Stephen McLaughlin, and Patrick McDaniel. Disk-Enabled Authenticated Encryption. Proceedings of the 26th IEEE Symposium on Massive Storage Systems and Technologies (MSST), May 2010.
    (acceptance rate=45.5%) [pdf]
  15. Joshua Schiffman, Thomas Moyer, Hayawardh Vijayakumar, Trent Jaeger, and Patrick McDaniel. Seeding Clouds with Trust Anchors. Proccedings of CCSW 2010: The ACM Cloud Computing Security Workshop, October 2010. Chicago, IL. [pdf]
  16. Stephen McLaughlin, Dmitry Podkuiko, Adam Delozier, Sergei Miadzvezhanka, and Patrick McDaniel. Embedded Firmware Diversity for Smart Electric Meters. Proceedings of the 5th Workshop on Hot Topics in Security (HotSec '10), August 2010. Washington, DC.
    (acceptance rate=19.6%) [pdf]
  17. Patrick McDaniel, Kevin Butler, Stephen McLaughlin, Radu Sion, Erez Zadok, and Marianne Winslett. Towards a Secure and Efficient System for End-to-End Provenance. the 2nd USENIX Workshop on the Theory and Practice of Provenance, February 2010. San Jose, CA.

Technical Reports
  • William Enck and Patrick McDaniel, Federated Information Flow Control for Mobile Phones. Technical Report NAS-TR-0136-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, July 2010.
  • Kevin Butler, Stephen McLaughlin, and Patrick McDaniel, Kells: A Protection Framework for Portable Data. Technical Report NAS-TR-0134-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, June 2010.
  • Stephen McLaughlin, Dmitry Podkuiko, Adam Delozier, Sergei Miadzvezhanka, and Patrick McDaniel, Multi-vendor Penetration Testing in the Advanced Metering Infrastructure. Technical Report NAS-TR-0133-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, June 2010.
  • Machigar Ongtang, Kevin Butler, and Patrick McDaniel, Porscha: Policy Oriented Secure Content Handling in Android . Technical Report NAS-TR-0132-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, June 2010.
  • Joshua Schiffman, Thomas Moyer, Hayawardh Vijayakumar, Trent Jaeger, and Patrick McDaniel, Seeding Clouds with Trust Anchors. Technical Report NAS-TR-0127-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, April 2010.
  • William Enck, Machigar Ongtang, and Patrick McDaniel, TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. Technical Report NAS-TR-0120-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, February 2010. Updated 13 July 2010.

2009

  1. Patrick McDaniel and Stephen McLaughlin, Security and Privacy Challenges in the Smart Grid. IEEE Security & Privacy Magazine (Secure Systems issue column), 7(3):75-77, May/June, 2009. [pdf]
  2. Kevin Butler, Sunam Ryu, Patrick Traynor, and Patrick McDaniel, Leveraging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems. IEEE Transactions on Parallel and Distributed Systems (TPDS), 20(12):1803-1815, December, 2009.
    (extends rbtm07) [pdf]
  3. Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta, Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks. IEEE/ACM Transactions on Networking (TON), 17(1):40-53, 2009. [pdf]
  4. William Enck, Machigar Ongtang, and Patrick McDaniel, Understanding Android Security. IEEE Security & Privacy Magazine, 7(1):50--57, January/February, 2009. [pdf]
  5. William Enck, Thomas Moyer, Patrick McDaniel, Shubho Sen, Panagiotis Sebos, Sylke Spoerel, Albert Greenberg, Yu-Wei Sung, Sanjay Rao, and William Aiello, Configuration Management at Massive Scale: System Design and Experience. IEEE Journal on Selected Areas in Communications (JSAC), 27(3):323-335, 2009.
    (extends ems+07) [pdf]
  6. Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel, and Thomas La Porta, ASR: Anonymous and Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks. Wireless Networks (WINET), ACM/Kluwer, 15(4):525--539, MAY, 2009.
    (extends ces+05) [pdf]
  7. Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta, Exploiting Open Functionality in SMS-Capable Cellular Networks. Journal of Computer Security, 16(6):713-742, Febraury, 2009.
    (extends etml05) [pdf]
  8. Machigar Ongtang, Stephen McLaughlin, William Enck, and Patrick McDaniel. Semantically Rich Application-Centric Security in Android. Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC), pages 340-349, December 2009. Honolulu, Hawaii. (best paper).
    (acceptance rate=19.0%) [pdf]
  9. Thomas Moyer, Kevin Butler, Joshua Schiffman, Patrick McDaniel, and Trent Jaeger. Scalable Asynchronous Web Content Attestation. Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC), pages 95-104, December 2009. Honolulu, Hawaii.
    (acceptance rate=19.0%) [pdf]
  10. Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger, and Patrick McDaniel. Justifying Integrity Using a Virtual Machine Verifier. Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC), pages 83-92, December 2009. Honolulu, Hawaii.
    (acceptance rate=19.0%) [pdf]
  11. William Enck, Machigar Ongtang, and Patrick McDaniel. On Lightweight Mobile Phone App Certification. Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), pages 235-245, November 2009.
    (acceptance rate=18.4%) [pdf]
  12. Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Thomas La Porta, and Patrick McDaniel. On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core. Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), pages 223-234, November 2009.
    (acceptance rate=18.4%) [pdf]
  13. Thomas La Porta, Patrick McDaniel, Karl Rauscher, and Jun Shu. The Impact of Supply Chain on Information and Communications Technology Security. In the 1st Workshop on Workshop on Telecommunications Infrastructure Protection and Security, December 2009. Honolulu, Hawaii.
  14. Stephen McLaughlin, Dmitry Podkuiko, and Patrick McDaniel. Energy Theft in the Advanced Metering Infrastructure. In the 4th International Workshop on Critical Information Infrastructure Security, September 2009. Bonn, Germany. [pdf]
  15. Matt Blaze and Patrick McDaniel. Below the Salt: The Dangers of Unfulfilled Physical Media Assumptions. In Proceedings of Seventeenth International Workshop on Security Protocols, April 2009. Cambridge, England.

Technical Reports
  • Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger, and Patrick McDaniel, Justifying Integrity Using a Virtual Machine Verifier. Technical Report NAS-TR-0119-2009, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, August 2009.
  • Machigar Ongtang, Stephen McLaughlin, William Enck, and Patrick McDaniel, Semantically Rich Application-Centric Security in Android. Technical Report NAS-TR-0116-2009, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, June 2009.
  • Stephen McLaughlin, Dmitry Podkuiko, and Patrick McDaniel, Energy Theft in the Advanced Metering Infrastructure. Technical Report NAS-TR-0115-2009, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, June 2009.
  • William Enck, Machigar Ongtang, and Patrick McDaniel, On Lightweight Mobile Phone App Certification. Technical Report NAS-TR-0113-2009, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, April 2009.
  • Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Thomas La Porta, and Patrick McDaniel, On Cellular Botnets: Measuring the Impact of Malicious Devices on the Network Core. Technical Report NAS-TR-0110-2009, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, March 2009.
  • Boniface Hicks, Sandra Rueda, Yogesh Sreenivasan, Guruprasad Jakka, David King, Trent Jaeger, and Patrick McDaniel, An Architecture for Enforcing End-to-End Security Over Web Applications. Technical Report NAS-TR-0104-2009, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, January 2009.
  • Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger, and Patrick McDaniel, No Node Is an Island: Shamon Integrity Monitoring Approach. Technical Report NAS-TR-0103-2009, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, February 2009.

2008

  1. Patrick Traynor, Patrick McDaniel, and Thomas La Porta, Security for Telecommunications Networks. Springer, Series: Advances in Information Security, July, 2008. ISBN: 978-0-387-72441-6. [http://www.springer.com/computer/security+and+cryptology/book/978-0-387-72441-6]
  2. Kevin Butler, William Enck, Patrick Traynor, Jennifer Plasterr, and Patrick McDaniel. Privacy Preserving Web-Based Email. Algorithms, Architectures and Information Systems Security, Statistical Science and Interdisciplinary Research, World Scientific Computing, pages 349-371. November 2008. Editor: Bhargab Bhattacharya, Susmita Sur-Kolay, Subhas Nandy and Aditya Bagchi.
    (extends iciss06b)
  3. Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, and Patrick McDaniel, Non-Invasive Methods for Host Certification. ACM Transactions on Information and System Security (TISSEC), 11(3), 2008.
    (extends tcw+06) [pdf]
  4. Patrick McDaniel and Bashar Nuseibeh, Guest Editorial: Special Issue on Software Engineering for Secure Systems. IEEE Transactions on Software Engineering, 34(1):3--4, 2008. [pdf]
  5. William Enck, Patrick McDaniel, and Trent Jaeger. PinUP: Pinning User Files to Known Applications. Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC), December 2008.
    (acceptance rate=24.3%) [pdf]
  6. William Enck, Kevin Butler, Thomas Richardson, Patrick McDaniel, and Adam Smith. Defending Against Attacks on Main Memory Persistence. Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC), December 2008.
    (acceptance rate=24.3%) [pdf]
  7. Kevin Butler, Stephen McLaughlin, and Patrick McDaniel. Rootkit-Resistant Disks. Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), November 2008. Alexandria, VA.
    (acceptance rate=18.1%%) [pdf]
  8. Patrick Traynor, Kevin Butler, William Enck, and Patrick McDaniel. Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. ISOC Network & Distributed System Security Symposium (NDSS), February 2008. San Diego, CA.
    (acceptance rate=17.7%%) [pdf]
  9. Kevin Butler, William Enck, Harri Hursti, Stephen McLaughlin, Patrick Traynor, and Patrick McDaniel. Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections Following Project EVEREST. In Proceedings of the 3rd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '08), July 2008.
  10. Patrick McDaniel and Avi Rubin. Conference Proceedings. 2008 IEEE Symposium on Security and Privacy, IEEE. May 2008.

Technical Reports
  • Kevin Butler, Stephen McLaughlin, Thomas Moyer, Patrick McDaniel, and Trent Jaeger, SwitchBlade: Policy-Driven Disk Segmentation. Technical Report NAS-TR-0098-2008, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, November 2008.
  • Thomas Moyer, Kevin Butler, Joshua Schiffman, Patrick McDaniel, and Trent Jaeger, Scalable Asynchronous Web Content Attestation. Technical Report NAS-TR-0095-2008, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, September 2008.
  • Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, and Patrick McDaniel, A Logical Specification and Analysis for SELinux MLS Policy. Technical Report NAS-TR-0091-2008, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, July 2008.
  • Kevin Butler, Stephen McLaughlin, and Patrick McDaniel, Rootkit-Resistant Disks. Technical Report NAS-TR-0089-2008, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, April 2008.

2007

  1. Patrick McDaniel. Authentication. Handbook of Computer Networks, Volume II, Chapter 171, John Wiley and Sons. May 2007. Editor: Hossein Bidgoli.
  2. Wesam Lootah, William Enck, and Patrick McDaniel, TARP: Ticket-based Address Resolution Protocol. Computer Networks, Elsevier, 51(15):4322--4337, October, 2007.
    (extends lem05) [http://dx.doi.org/10.1016/j.comnet.2007.05.007/]
  3. Luke St. Clair, Joshua Schiffman, Trent Jaeger, and Patrick McDaniel. Establishing and Sustaining System Integrity via Root of Trust Installation. 23rd Annual Computer Security Applications Conference (ACSAC), pages 19-29, December 2007. Miami, FL.
    (acceptance rate=21.9%) [pdf]
  4. Boniface Hicks, Tim Misiak, and Patrick McDaniel. Channels: Runtime System Infrastructure for Security-typed Languages. 23rd Annual Computer Security Applications Conference (ACSAC), pages 443-452, December 2007. Miami, FL.
    (acceptance rate=21.9%) [pdf]
  5. Dhananjay Bapat, Kevin Butler, and Patrick McDaniel. Towards Automated Privilege Separation. Proceedings of 2nd International Conference on Information Systems Security (short paper), December 2007. Delhi, India.
    (acceptance rate=31.5%) [pdf]
  6. Lisa Johansen, Kevin Butler, Michael Rowell, and Patrick McDaniel. Email Communities of Interest. Fourth Conference on Email and Anti-Spam (CEAS 2007), August 2007. Mountain View, California.
    (acceptance rate=18.9%) [pdf]
  7. Patrick Traynor, Patrick McDaniel, and Thomas La Porta. On Attack Causality in Internet-Connected Cellular Networks. Proceedings of the 16th USENIX Security Symposium, pages 1--16, August 2007. Boston, MA.
    (acceptance rate=12.28%) [pdf]
  8. Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel. From Trusted to Secure: Building and Executing Applications that Enforce System Security. Proceedings of the USENIX Annual Technical Conference, June 2007. Santa Clara, CA.
    (acceptance rate=23.8%) [pdf]
  9. William Enck, Patrick McDaniel, Shubho Sen, Panagiotis Sebos, Sylke Spoerel, Albert Greenberg, Sanjay Rao, and William Aiello. Configuration Management at Massive Scale: System Design and Experience. Proceedings of the USENIX Annual Technical Conference, June 2007. Santa Clara, CA.
    (acceptance rate=23.8%) [pdf]
  10. Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, and Patrick McDaniel. A Logical Specification and Analysis for SELinux MLS. 12th ACM Symposium on Access Control Models and Technologies (SACMAT), ACM, June 2007. Sophia Antipolis, France.
    (acceptance rate=23.75%) [pdf]
  11. Anusha Sriraman, Kevin Butler, Patrick McDaniel, and Padma Raghavan. Analysis of IPv4 Address Space Delegation Structure. 12th IEEE Symposium on Computers and Communications (ISCC), July 2007. Aveiro, Portugal.
    (acceptance rate=40%) [pdf]
  12. Heesook Choi, Thomas La Porta, and Patrick McDaniel. Privacy Preserving Communication in MANETs. Proceedings of Fourth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON 07), June 2007. San Diego, CA.
    (acceptance rate=20%) [pdf]
  13. Sophie Qiu, Patrick McDaniel, and Fabian Monrose. Toward Valley-Free Inter-domain Routing. Proceedings of 2007 IEEE International Conference on Communications (ICC 2007), June 2007. Glasgow, Scottland. [pdf]
  14. Sunam Ryu, Kevin Butler, Patrick Traynor, and Patrick McDaniel. Leveraging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems. Proceedings of the 3rd IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS-07), June 2007. Niagra Falls, Canada.
    (acceptance rate=40%) [pdf]
  15. Hosam Rowaihy, William Enck, Patrick McDaniel, and Thomas La Porta. Limiting Sybil Attacks in Structured Peer-to-Peer Networks. Proceedings of IEEE INFOCOM 2007 MiniSymposium, May 2007. Anchorage, AK.
    (acceptance rate=25%) [pdf]
  16. Kevin Butler, Stephen McLaughlin, and Patrick McDaniel. Non-Volatile Memory and Disks: Avenues for Policy Architectures. Proceedings of the 1st ACM Computer Security Architectures Workshop, November 2007. Alexandria, VA.
    (acceptance rate=30%) [pdf]
  17. William Enck, Sandra Rueda, Yogesh Sreenivasan, Joshua Schiffman, Luke St. Clair, Trent Jaeger, and Patrick McDaniel. Protecting Users from "Themselves". Proceedings of the 1st ACM Computer Security Architectures Workshop, November 2007. Alexandria, VA.
    (acceptance rate=30%)
  18. Boniface Hicks, David King, and Patrick McDaniel. Jifclipse: Development Tools for Security-Typed Applications. Proceedings of the 2nd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '07), ACM Press, June 2007. San Diego, CA.
    (acceptance rate=39%) [pdf]
  19. Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel. Integration of SELinux and Security-typed Languages. Proceedings of the 2007 Security-Enhanced Linux Workshop, March 2007. Baltimore, MD.
    (acceptance rate=75%) [pdf]
  20. Patrick McDaniel, Kevin Butler, William Enck, Harri Hursti, Stephen McLaughlin, Patrick Traynor, Matt Blaze, Adam Aviv, Pavol Cerny, Sandy Clark, Eric Cronin, Gaurav Shah, Micah Sherr, Giovanni Vigna, Richard Kemmerer, David Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, William Robertson, Fredrik Valeur, Joseph Lorenzo Hall, and Laura Quilter, EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing. Public Report, Ohio Secretary of State 2007. [pdf]
  21. Patrick McDaniel and Shyam K. Gupta. Conference Proceedings. The Third International Conference Information Systems Security, Springer. December 2007.
  22. Birgit Pfitzmann and Patrick McDaniel. Conference Proceedings. 2007 IEEE Symposium on Security and Privacy, IEEE. May 2007.

Technical Reports
  • Patrick Traynor, Joshua Schiffman, Thomas La Porta, Patrick McDaniel, Abhrajit Ghosh, and Farooq Anjum, Constructing Secure Localization Systems with Adjustable Granularity. Technical Report NAS-TR-0084-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, December 2007.
  • Stephen McLaughlin, Kevin Butler, William Enck, and Patrick McDaniel, Genbd - A Generic Block Device. Technical Report NAS-TR-0082-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, November 2007.
  • Kevin Butler, Stephen McLaughlin, and Patrick McDaniel, Non-Volatile Memory and Disks: Avenues for Policy Architectures. Technical Report NAS-TR-0074-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, June 2007.
  • William Enck, Sandra Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger, and Patrick McDaniel, Protecting Users From ``Themselves''. Technical Report NAS-TR-0073-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, June 2007.
  • Dhananjay Bapat, Kevin Butler, and Patrick McDaniel, Towards Automated Privilege Separation. Technical Report NAS-TR-0071-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, May 2007.
  • Patrick Traynor, Kevin Butler, William Enck, and Patrick McDaniel, Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. Technical Report NAS-TR-0070-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, May 2007.
  • Luke St. Clair, Joshua Schiffman, Trent Jaeger, and Patrick McDaniel, Establishing and Sustaining System Integrity via Root of Trust Installation. Technical Report NAS-TR-0067-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, April 2007.
  • Boniface Hicks, David King, and Patrick McDaniel, Jifclipse: Development Tools for Security-Typed Language. Technical Report NAS-TR-0065-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, April 2007.
  • William Enck, Patrick McDaniel, and Trent Jaeger, Protecting User Files by Reducing Application Access. Technical Report NAS-TR-0063-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, February 2007.
  • Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel, A Logical Specification and Analysis for SELinux MLS Policy. Technical Report NAS-TR-0058-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, January 2007.
  • Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel, From Trusted to Secure: Building and Executing Applications that Enforce System Security. Technical Report NAS-TR-0061-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, January 2007.
  • Lisa Johansen, Kevin Butler, William Enck, Patrick Traynor, and Patrick McDaniel, Grains of SANs: Building Storage Area Networks from Memory Spots. Technical Report NAS-TR-0060-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, January 2007.
  • Patrick Traynor, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, and Thomas La Porta, From Mobile Phones to Responsible Devices. Technical Report NAS-TR-0059-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, January 2007.

2006

  1. Patrick McDaniel and Atul Prakash, Enforcing Provisioning and Authorization Policy in the Antigone System. Journal of Computer Security, 14(9):483--511, November, 2006. [pdf]
  2. Patrick McDaniel and Atul Prakash, Methods and Limitations of Security Policy Reconciliation. ACM Transactions on Information and System Security (TISSEC), Association for Computing Machinery, 9(3):259-291, August, 2006.
    (extends mp02) [pdf]
  3. Patrick McDaniel, William Aiello, Kevin Butler, and John Ioannidis, Origin Authentication in Interdomain Routing. Journal of Communication Networks, Elsevier, 50(16):2953-2980, November, 2006.
    (extends aim03) [pdf]
  4. Boniface Hicks, Kiyan Ahmadizadeh, and Patrick McDaniel. Understanding Practical Application Development in Security-Typed Languages. 22st Annual Computer Security Applications Conference (ACSAC), pages 153--164, December 2006. Miami, Fl. (best student paper).
    (acceptance rate=30.3%) [pdf]
  5. Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger. Password Exhaustion: Predicting the End of Password Usefulness. Proceedings of 2nd International Conference on Information Systems Security (ICISS), pages 37--55, December 2006. Kolkata, India. [pdf]
  6. Kevin Butler, William Enck, Jennifer Plasterr, Patrick Traynor, and Patrick McDaniel. Privacy-Preserving Web-Based Email. Proceedings of 2nd International Conference on Information Systems Security (ICISS), pages 116--131, December 2006. Kolkata, India.
    (acceptance rate=30.4%) [pdf]
  7. Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Brent Waters. Secure Attribute-Based Systems. Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), pages 99-112, November 2006. Alexandria, VA.
    (acceptance rate=14.7%) [pdf]
  8. Kevin Butler, William Aiello, and Patrick McDaniel. Optimizing BGP Security by Exploiting Path Stability. Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), pages 298-310, November 2006. Alexandria, VA.
    (acceptance rate=14.7%) [pdf]
  9. Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta. Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks. Proceedings of the Twelfth Annual International Conference on Mobile Computing and Networking (MobiCom), pages 182-193, September 2006. Los Angeles, CA.
    (acceptance rate=11.7%) [pdf]
  10. Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, and Patrick McDaniel. Non-Invasive Methods for Host Certification. Proceedings of the Second IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm), August 2006. Baltimore, MD.
    (acceptance rate=25.4%) [pdf]
  11. Sophie Qiu, Patrick McDaniel, Fabian Monrose, and Avi Rubin. Characterizing Address Use Structure and Stabillity of Origin Advertisement in Interdomain Routing. 11th IEEE Symposium on Computers and Communications, pages 489-496, June 2006. Pula-Cagliari, Sardinia, Italy.
    (acceptance rate=49.4%) [pdf]
  12. Patrick McDaniel, Shubho Sen, Oliver Spatscheck, Jacobus Van der Merwe, William Aiello, and Charles Kalmanek. Enterprise Security: A Community of Interest Based Approach. Proceedings of Network and Distributed Systems Security 2006 (NDSS), February 2006. San Diego, CA.
    (acceptance rate=13.6%) [pdf]
  13. Sophie Qiu, Fabian Monrose, Andreas Terzis, and Patrick McDaniel. Efficient Techniques for Detecting False Origin Advertisements in Inter-domain Routing. Proceedings of The Second Workshop on Secure Network Protocols (NPSec), November 2006. Santa Barbara.
    (acceptance rate=40%) [pdf]
  14. Shiva Chaitanya, Kevin Butler, Patrick McDaniel, and Anand Sivasubramaniam. Design, Implementation and Evaluation of Security in iSCSI-based Network Storage Systems. Proceedings of 2nd International Workshop on Storage Security and Survivability (StorageSS 2006), October 2006. Alexandria, Virginia.
    (acceptance rate=68.7%) [pdf]
  15. Trent Jaeger, Patrick McDaniel, Luke St. Clair, Ramon Caceres, and Reiner Sailer. Shame on Trust in Distributed Systems. Proceedings of the First Workshop on Hot Topics in Security (HotSec '06), July 2006. Vancouver, B.C., Canada.
    (acceptance rate=19.6%) [pdf]
  16. Kevin Butler, Patrick McDaniel, and Sophie Qiu. BGPRV: A Library for Fast and Efficient Routing Data Manipulation. Proceedings of DETER Community Workshop, June 2006. Arlington, VA. [pdf]
  17. Kevin Butler and Patrick McDaniel. Testing Large Scale BGP Security in Replayable Network Environments. Proceedings of DETER Community Workshop, June 2006. Arlington, VA. [pdf]
  18. Boniface Hicks, David King, Patrick McDaniel, and Michael Hicks. Trusted Declassification: High-level Policy for a Security-Typed Language. Proceedings of ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, pages 65-74, June 2006. Ottawa, Canada.
    (acceptance rate=58.8%) [pdf]

Technical Reports
  • Anusha Sriraman, Kevin Butler, Patrick McDaniel, and Padma Raghavan, Analysis of the IPv4 Address Space Delegation Structure. Technical Report NAS-TR-0057-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, December 2006.
  • Luke St. Clair, Joshua Schiffman, Trent Jaeger, and Patrick McDaniel, Sum of the Parts: Composing Trust from Validation Primitives. Technical Report NAS-TR-0056-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, November 2006.
  • Sophie Qiu, Patrick McDaniel, and Fabian Monrose, Toward Valley-Free Inter-domain Routing. Technical Report NAS-TR-0054-2006, Network and Security Research Center, Department of Computer Science and Engineeering, Pennsylvania State University, University Park, PA, USA, October 2006.
  • Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel, Integrating SELinux with Security-typed Languages. Technical Report NAS-TR-0052-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, October 2006.
  • Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta, Mitigating Attacks on Open Functionality in SMS-Capable Networks. Technical Report NAS-TR-0051-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, October 2006.
  • Patrick Traynor, Kevin Butler, William Enck, Kevin Borders, and Patrick McDaniel, malnets: Large-Scale Malicious Networks via Compromised Wireless Access Points. Technical Report NAS-TR-0048-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, September 2006.
  • Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel, Breaking Down the Walls of Mutual Distrust: Security-typed Email Using Labeled IPsec. Technical Report NAS-TR-0049-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, September 2006.
  • Sunam Ryu, Kevin Butler, Patrick Traynor, and Patrick McDaniel, Leveraging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems. Technical Report NAS-TR-0043-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, August 2006.
  • Wesam Lootah, William Enck, and Patrick McDaniel, TARP: Ticket-based Address Resolution Protocol (extended version). Technical Report NAS-TR-0046-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, August 2006.
    (extends lem05)
  • Patrick McDaniel, Understanding Equivalance in High-Level and Information Flow Policy. Technical Report NAS-TR-0042-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, July 2006.
  • Trent Jaeger, Patrick McDaniel, Luke St. Clair, Ramon Caceres, and Reiner Sailer, Shame on Trust in Distributed Systems. Technical Report RC239664 (W0605-129), IBM Research Division, Yorktown Heights, NY, May 2006.
  • Lisa Johansen, Kevin Butler, Michael Rowell, and Patrick McDaniel, Email Communities of Interest. Technical Report NAS-TR-0040-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, May 2006.
  • Boniface Hicks, Kiyan Ahmadizadeh, and Patrick McDaniel, From Languages to Systems: Understanding Practical Application Development in Security-typed Languages. Technical Report NAS-TR-0035-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, April 2006.
  • Boniface Hicks, David King, Patrick McDaniel, and Michael Hicks, Trusted Declassification: High-level policy for a security-typed language. Technical Report NAS-TR-0033-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, March 2006.
  • Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Brent Waters, Secure Attribute-Based Systems. Technical Report NAS-TR-0028-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, February 2006.
  • William Enck, Kevin Butler, Thomas Richardson, and Patrick McDaniel, Securing Non-Volatile Main Memory. Technical Report NAS-TR-0029-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, February 2006.
  • Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger, Password Exhaustion: Predicting the End of Password Usefulness. Technical Report NAS-TR-0030-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, February 2006.

2005

  1. Patrick McDaniel and Avi Rubin, Guest Editoral: Special Issue on Web Security. Computer Networks, Elsevier, 22(2), 2005. [pdf]
  2. Matthew Pirretti, Sencun Zhu, Vijaykrishnan Narayanan, Patrick McDaniel, Mahmut Kandemir, and Richard Brooks, The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. International Journal of Distributed Sensor Networks, 2(3):267-287, June, 2005.
    (extends pzn+05) [pdf]
  3. Kevin Butler and Patrick McDaniel. Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. Proceedings of 1st International Conference on Information Systems Security (ICISS), Springer-Verlag Lecture Notes in Computer Science, volume 3803, pages 36-48, December 2005. Kolkata, India. Invited Paper. [pdf]
  4. Wesam Lootah, William Enck, and Patrick McDaniel. TARP: Ticket-Based Address Resolution Protocol. 21st Annual Computer Security Applications Conference (ACSAC), pages 95-103, December 2005. Tuscon, AZ.
    (acceptance rate=19.2%) [pdf]
  5. William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta. Exploiting Open Functionality in SMS-Capable Cellular Networks. Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS), pages 393--404, November 2005. Alexandria, VA.
    (acceptance rate=15.0%) [pdf]
  6. Matthew Pirretti, Sencun Zhu, Vijaykrishnan Narayanan, Patrick McDaniel, Mahmut Kandemir, and Richard Brooks. The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. Proceedings of the Innovations and Commercial Applications of Distributed Sensor Networks Symposia, October 2005. Bethesda, Maryland. (best paper).
    (acceptance rate=27.2%) [pdf]
  7. Louis Kruger, Somesh Jha, and Patrick McDaniel. Privacy Preserving Clustering. 10th European Symposium on Research in Computer Security (ESORICS '05), September 2005. Milan, Italy.
    (acceptance rate=16.4%) [pdf]
  8. Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel, and Thomas La Porta. Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks. MobiQuitous 2005, July 2005. San Diego, CA.
    (acceptance rate=35%) [pdf]
  9. Ali Al-Lawati, Dongwon Lee, and Patrick McDaniel. Blocking in Private Information Matching. Proceedings of Second International ACM SIGMOD Workshop on Information Quality in Information Systems, July 2005. Baltimore, MD.
    (acceptance rate=42.3%) [pdf]
  10. William Aiello, Charles Kalmanek, Patrick McDaniel, Shubho Sen, Oliver Spatscheck, and Jacobus Van der Merwe. Analysis of Communities Of Interest in Data Networks. Passive and Active Measurement Workshop 2005, March 2005. Boston, MA.
    (acceptance rate=28.5%) [pdf]
  11. Patrick McDaniel. Conference Proceedings. The 14th USENIX Security Symposium, USENIX. August 2005.

Technical Reports
  • Heesook Choi, Patrick McDaniel, and Thomas La Porta, Privacy Preserving Communication in MANETs. Technical Report NAS-TR-0031-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, December 2005.
  • Matthew Pirretti, Vijaykrishnan Narayanan, Patrick McDaniel, and Bharat Madan, SLAT: Secure Localization with Attack Tolerance. Technical Report NAS-TR-0024-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, August 2005.
  • Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, and Patrick McDaniel, Non-Invasive Methods for Host Certification. Technical Report NAS-TR-0025-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, September 2005.
  • Sophie Qiu, Patrick McDaniel, Fabian Monrose, and Avi Rubin, Characterizing Address Use Structure and Stabillity of Origin Advertizement in Interdomain Routing. Technical Report NAS-TR-0018-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, July 2005.
  • Hosam Rowaihy, William Enck, Patrick McDaniel, and Thomas La Porta, Limiting Sybil Attacks in Structured Peer-to-Peer Networks. Technical Report NAS-TR-0017-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, July 2005.
  • Boniface Hicks, Patrick McDaniel, and Ali Hurson, Information Flow Control in Database Security: A Case Study for Secure Programming with Jif. Technical Report NAS-TR-0011-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, Uni versity Park, PA, USA, April 2005.
  • Wesam Lootah, William Enck, and Patrick McDaniel, TARP: Ticket-Based Address Resolution Protocol. Technical Report NAS-TR-0010-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, June 2005.
  • Patrick Traynor, Kevin Butler, William Enck, Jennifer Plasterr, Scott Weaver, John van Bramer, and Patrick McDaniel, Privacy-Preserving Web-Based Email. Technical Report NAS-TR-0009-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, June 2005.
  • William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta, Exploiting Open Functionality in SMS-Capable Cellular Networks. Technical Report NAS-TR-0007-2005, Network and Security Center, Department of Computer Science, Pennsylvania State University, May 2005.
  • Boniface Hicks, David King, and Patrick McDaniel, Declassification with Cryptographic Functions in a Security-Typed Language. Technical Report NAS-TR-0004-2005, Network and Security Center, Department of Computer Science, Pennsylvania State University, January 2005. (updated May 2005).

2004

  1. Patrick McDaniel. Computer and Network Authentication. Handbook of Information Security, John Wiley and Sons. September 2004. Editor: Hossein Bidgoli. [pdf]
  2. Simon Byers, Lorrie Cranor, Eric Cronin, Dave Kormann, and Patrick McDaniel, Analysis of Security Vulnerabilities in the Movie Production and Distribution Process. Telecommunications Policy, 28(8):619-644, August, 2004.
    (extends bcc+03) [pdf]
  3. Simon Byers, Lorrie Cranor, Eric Cronin, Dave Kormann, and Patrick McDaniel. Exposing Digital Content Piracy: Approaches, Issues and Experiences. Thirty-Eighth Conference on Signals, Systems, and Computers, pages 45--50, Nov 2004. Monterey, CA. Invited paper.
  4. Simon Byers, Lorrie Cranor, David Kormann, and Patrick McDaniel. Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine. Proceedings of 2004 Workshop on Privacy Enhancing Technologies (PETS), May 2004. Toronto, Canada.
    (acceptance rate=28.7%) [pdf]
  5. Hao Wang, Somesh Jha, Patrick McDaniel, and Miron Livny. Security Policy Reconciliation in Distributed Computing Environments. Proceedings of 5th International Workshop on Policies for Distributed Systems and Networks (Policy 2004), IEEE Computer Society Press, pages 137-146, June 2004. Yorktown Heights, NY.
    (acceptance rate=20.6%) [pdf]
  6. Patrick McDaniel, Policy Evolution: Autonomic Environmental Security. Software Engineering Research Center Showcase, USA, December 2004.

Technical Reports
  • William Aiello, Kevin Butler, and Patrick McDaniel, Path Authentication in Interdomain Routing. Technical Report TR NAS-TR-0002-2004, Network and Security Center, Department of Computer Science and Engineering, Penn State University, November 2004. [pdf]
  • Dan Pei, William Aiello, Anna Gilbert, and Patrick McDaniel, Origin Disturbances in BGP. Technical Report TD-62TJJF8, AT&T Labs - Research, Florham Park, NJ, July 2004. [pdf]
  • Kevin Butler, Toni Farley, Patrick McDaniel, and J. Rexford, A Survey of BGP Security Issues and Solutions. Technical Report TD-5UGJ33, AT&T Labs - Research, Florham Park, NJ, February 2004. (revised June 2004). [pdf]

2003

  1. Patrick McDaniel. IPsec. Encyclopedia of Information Security, Kluwer. 2003. Editor: Hossein Bidgoli. [pdf]
  2. Patrick McDaniel. Policy. Encyclopedia of Information Security, Kluwer. 2003. Editor: Hossein Bidgoli. [pdf]
  3. William Aiello, John Ioannidis, and Patrick McDaniel. Origin Authentication in Interdomain Routing. Proceedings of 10th ACM Conference on Computer and Communications Security (CCS), ACM, pages 165-178, October 2003. Washington, DC.
    (acceptance rate=13.8%) [pdf]
  4. Eric Cronin, Sugih Jamin, Tal Malkin, and Patrick McDaniel. On the Performance, Feasibility, and Use of Forward Secure Signatures. Proceedings of 10th ACM Conference on Computer and Communications Security (CCS), ACM, pages 131-144, October 2003. Washington, DC.
    (acceptance rate=13.8%) [pdf]
  5. Patrick McDaniel. On Context in Authorization Policy. 8th ACM Symposium on Access Control Models and Technologies (SACMAT), ACM, pages 80-89, June 2003. Como, Italy.
    (acceptance rate=37.0%) [pdf]
  6. Geoff Goodell, William Aiello, Tim Griffin, John Ioannidis, Patrick McDaniel, and Avi Rubin. Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing. Proceedings of Network and Distributed Systems Security 2003 (NDSS), Internet Society, pages 75-85, February 2003. San Diego, CA.
    (acceptance rate=20.5%) [pdf]
  7. Simon Byers, Lorrie Cranor, Eric Cronin, Dave Kormann, and Patrick McDaniel. Analysis of Security Vulnerabilities in the Movie Production and Distribution Process. Proceedings of 2003 ACM Workshop on Digital Rights Management, ACM, October 2003. Washington, DC, also appeared in Telecommunications Policy Research Conference -- September 2003.
    (acceptance rate=40.0%) [pdf]
  8. Hugh Harney, Uri Meth, Andrea Colegrove, Angela Schuett, Patrick McDaniel, Gavin Kenny, and Haitham Cruickshank, and Sunil Iyengar, GSAKMP (Draft). Internet Research Task Force, August 2003. [txt]
  9. Patrick McDaniel and Atul Prakash. A Flexible Architecture for Security Policy Enforcement. Proceedings of DARPA Information Survivability Conference and Exposition III, Research Summaries, pages 234-239, April 2003. [pdf]
  10. Jim Irrer, Atul Prakash, and Patrick McDaniel. Antigone: Policy-Based Secure Group Communications Systems and AMirD: Antigone-Based Secure File Mirroring System. Proceedings of DARPA Information Survivability Conference and Exposition III, Demo Summaries, pages 44-46, April 2003.

Technical Reports
  • Patrick McDaniel and Atul Prakash, Securing Distributed Applications Using a Policy-based Approach. Technical Report TD-5UDKVD, AT&T Labs - Research, Florham Park, NJ, December 2003. [pdf]
  • William Aiello, Johyn Ioannidis, and Patrick McDaniel, Origin Authentication in Interdomain Routing. Technical Report TD-5QHG2G, AT&T Labs - Research, Florham Park, NJ, August 2003. [pdf]
  • Eric Cronin, Sugih Jamin, Tal Malkin, and Patrick McDaniel, On the Performance, Feasibility, and Use of Forward Secure Signatures. Technical Report TD-5QHGBK, AT&T Labs - Research, Florham Park, NJ, August 2003. [pdf]
  • Simon Byers, Lorrie Cranor, Eric Cronin, Dave Kormann, and Patrick McDaniel, Analysis of Security Vulnerabilities in the Movie Production and Distribution Process. Technical Report TD-5N6SJ4, AT&T Labs - Research, Florham Park, NJ, August 2003. [pdf]
  • Patrick McDaniel, On Context in Authorization Policy. Technical Report TD-5JCJCK, AT&T Labs - Research, Florham Park, NJ, January 2003. [pdf]

2002

  1. Patrick McDaniel. Authentication. The Internet Encyclopedia, John Wiley and Sons. 2002. [pdf]
  2. Patrick McDaniel and Atul Prakash. Methods and Limitations of Security Policy Reconciliation. 2002 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, pages 73-87, May 2002. Oakland, CA.
    (acceptance rate=17.8%) [pdf]
  3. Patrick McDaniel and Sugih Jamin, Windowed Key Revocation in Public Key Infrastructures. NASA Tech Briefs, pages 55, August, 2002. [html]

Technical Reports
  • Patrick McDaniel and Atul Prakash, An Architecture for Security Policy Enforcement. Technical Report TD-5C6JFV, AT&T Labs - Research, Florham Park, NJ, July 2002. [pdf]
  • Patrick McDaniel and Atul Prakash, Methods and Limitations of Security Policy Reconciliation. Technical Report TD57-PAW, AT&T Labs - Research, Florham Park, NJ, February 2002. [pdf]

2001

  1. Patrick McDaniel, Atul Prakash, Jim Irrer, Sharad Mittal, and Thai-Chuin Thuang. Flexibly Constructing Secure Groups in Antigone 2.0. Proceedings of DARPA Information Survivability Conference and Exposition II, IEEE Computer Society Press, pages 55-67, June 2001. Los Angeles, CA. [pdf]
  2. Hugh Harney, Andrea Colegrove, and Patrick McDaniel. Principles of Policy in Secure Groups. Proceedings of Network and Distributed Systems Security 2001 (NDSS), Internet Society, pages 125-135, February 2001. San Diego, CA.
    (acceptance rate=24.2%) [pdf]
  3. Patrick McDaniel and Atul Prakash, Antigone Secure Group Communication System. NASA Tech Briefs, 2001. [html]
  4. Patrick McDaniel, Policy Management in Secure Group Communication. PhD Thesis, University of Michigan, Ann Arbor, MI, August 2001. [pdf]
  5. Tom Hardjono, Hugh Harney, Patrick McDaniel, Andrea Colegrove , and Peter Dinsmore, Group Security Policy Token (Draft). Internet Research Task Force, Secure Multicast Research Group (SMuG), November 2001. [txt]

2000

  1. Patrick McDaniel and Sugih Jamin. Windowed Certificate Revocation. Proceedings of IEEE INFOCOM 2000, IEEE, pages 1406-1414, March 2000. Tel Aviv, Israel.
    (acceptance rate=26%) [pdf]
  2. Patrick McDaniel and Avi Rubin. A Response to `Can We Eliminate Certificate Revocation Lists?'. Proceedings of Financial Cryptography 2000, International Financial Cryptography Association (IFCA), February 2000. Anguilla, British West Indies.
    (acceptance rate=26.1%) [pdf]
  3. Patrick McDaniel, Hugh Harney, Andrea Colegrove, Atul Prakash, and P. Dinsmore, Multicast Security Policy Requirements and Building Blocks (Draft). Internet Research Task Force, Secure Multicast Research Group (SMuG), November 2000. [txt]
  4. Patrick McDaniel, Hugh Harney, Peter Dinsmore, and Atul Prakash, Multicast Security Policy (Draft). Internet Research Task Force, Secure Multicast Research Group (SMuG), June 2000. [txt]

Technical Reports
  • Patrick McDaniel and Atul Prakash, Ismene: Provisioning and Policy Reconciliation in Secure Group Communication. Technical Report CSE-TR-438-00, Electrical Engineering and Computer Science, University of Michigan, December 2000. [pdf]
  • Patrick McDaniel and Atul Prakash, Lightweight Failure Detection in Secure Group Communication. Technical Report CSE-TR-428-00, Electrical Engineering and Computer Science, University of Michigan, June 2000. [pdf]
  • Patrick McDaniel and Atul Prakash, Antigone: Implementing Policy in Secure Group Communication. Technical Report CSE-TR-426-00, Electrical Engineering and Computer Science, University of Michigan, May 2000. [pdf]

1999

  1. Andrwe Adamson, C.J. Antonelli, Kevin Coffman, Patrick McDaniel, and Jim Rees. Secure Distributed Virtual Conferencing. Proceedings of Communications and Multimedia Security (CMS '99), pages 176-190, September 1999. Katholieke Universiteit, Leuven, Belgium.
    (acceptance rate=70%) [pdf]
  2. Patrick McDaniel, Atul Prakash, and Peter Honeyman. Antigone: A Flexible Framework for Secure Group Communication. Proceedings of the 8th USENIX Security Symposium, pages 99-114, August 1999. Washington, DC.
    (acceptance rate=26.8%) [pdf]
  3. Patrick McDaniel, 8th USENIX Security Symposium Conference Summaries, Potpourri Session. USENIX Login Magazine, pages 9-12, November, 1999. [html]

Technical Reports
  • Patrick McDaniel and Sugih Jamin, Windowed Certificate Revocation. Technical Report CSE-TR-413-99, Electrical Engineering and Computer Science, University of Michigan, November 1999. [pdf]
  • Patrick McDaniel, Atul Prakash, and Peter Honeyman, Antigone: A Flexible Framework for Secure Group Communication. Technical Report 99-2, Center for Information Technology Integration, September 1999. [pdf]
  • Patrick McDaniel and Avi Rubin, A Response to ``Can We Eliminate Certificate Revocation Lists?''. Technical Report 99.8.1, AT&T Labs - Research, Florham Park, NJ, August 1999. [pdf]
  • Andrew Adamson, C.J. Antonelli, Kevin Coffman, Patrick McDaniel, and Jim Rees, Secure Distributed Virtual Conferencing: Multicast or Bust. Technical Report 99-1, Center for Information Technology Integration, January 1999. [pdf]

1998


Technical Reports
  • Patrick McDaniel and Sugih Jamin, Windowed Key Revocation in Public Key Infrastructures. Technical Report CSE-TR-376-98, Electrical Engineering and Computer Science, University of Michigan 1998. [pdf]
  • Patrick McDaniel and Sugih Jamin, A Scalable Key Distribution Hierarchy. Technical Report CSE-TR-366-98, Electrical Engineering and Computer Science, University of Michigan 1998.
  • Patrick McDaniel, Peter Honeyman, and Atul Prakash, Lightweight Secure Group Communication. Technical Report 98-2, Center for Information Technology Integration, University of Michigan, April 1998. [pdf]

1991

  1. Patrick McDaniel, The Analysis of $D_i$, a Detailed Design Metric on Large Scale Software. Masters Thesis, Ball State University, Muncie, IN, June 1991.

Technical Reports
  • Wayne Zage, Delores Zage, Patrick McDaniel, and Irshad Khan, Evaluating Design Metrics on Large-Scale Software. Technical Report SERC-TR-106-P, Software Engineering Resource Center, Purdue University, September 1991. [html]