Books and Book Chapters

  1. Patrick Traynor, Patrick McDaniel and Thomas La Porta, Security for Telecommunications Networks Springer, Series: Advances in Information Security, July, 2008, ISBN: 978-0-387-72441-6.
  2. Bolor-Erdene Zolbayar , Ryan Sheatsley and Patrick McDaniel, Evading Machine Learning based Network Intrusion Detection Systems with GANs, Game Theory and Machine Learning for Cyber Security, John Wiley & Sons, 2021. Eds. Charles A Kamhoua and Christopher D. Kiekintveld and Fei Fang and Quanyan Zhu. Hoboken, New Jersey.
  3. Kevin Butler, William Enck, Patrick Traynor, Jennifer Plasterr and Patrick McDaniel, Privacy Preserving Web-Based Email, Algorithms, Architectures and Information Systems Security, Statistical Science and Interdisciplinary Research, World Scientific Computing, Pages349-371, November, 2008. Eds. Bhargab Bhattacharya, Susmita Sur-Kolay, Subhas Nandy and Aditya Bagchi.
  4. Patrick McDaniel, Authentication, Handbook of Computer Networks, Volume II, Chapter 171, John Wiley and Sons, May, 2007. Eds. Hossein Bidgoli.
  5. Patrick McDaniel, Computer and Network Authentication, Handbook of Information Security, John Wiley and Sons, September, 2004. Eds. Hossein Bidgoli.
  6. Patrick McDaniel, IPsec, Encyclopedia of Information Security, Kluwer, 2003. Eds. Hossein Bidgoli.
  7. Patrick McDaniel, Policy, Encyclopedia of Information Security, Kluwer, 2003. Eds. Hossein Bidgoli.
  8. Patrick McDaniel, Authentication, The Internet Encyclopedia, John Wiley and Sons, 2002.

Journal Publications and Articles

  1. Anshul Gandhi, Dongyoon Lee, Zhenhua Liu, Shuai Mu, Erez Zadok, Kanad Ghose, Kartik Gopalan, David Yu Liu, Syed Rafiul Hussain and Patrick McDaniel, Metrics for Sustainability in Data Centers, SIGENERGY Energy Inform. Rev., ACM, Vol.3, No.3, Pages 40–46, October, 2023. [Link]
  2. Quinn Burke, Patrick McDaniel, Thomas La Porta, Mingli Yu and Ting He, Misreporting Attacks Against Load Balancers in Software-Defined Networking, Mobile Networks and Applications, Springer, 2023. (
    to appear
    )
  3. Tian Xie, Sanchal Thakkar, Ting He, Patrick McDaniel and Quinn Burke, Joint Caching and Routing in Cache Networks with Arbitrary Topology, IEEE Transactions on Parallel and Distributed Systems, May, 2023. (
    to appear
    )
  4. Ya Xiao, Wenjia Song, Jingyuan Qi, Bimal Viswanath, Patrick McDaniel and Danfeng Yao, Specializing Neural Networks for Cryptographic Code Completion Applications, IEEE Transactions on Software Engineering, IEEE, 2023. (
    to appear
    )
  5. Matthew Durbin, Ryan Sheatsley, Patrick McDaniel and Azaree Lintereur, Experimental tests of Gamma-ray Localization Aided with Machine-learning (GLAM) capabilities, Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment, Vol.1038, 2022. [Link]
  6. Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Hidayet Aksu, Patrick McDaniel, Engin Kirda and Selcuk Uluagac, Who’s Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment, ACM Transactions on Internet of Things, Association for Computing Machinery, May, 2022. [Link]
  7. Michael Norris, Z. Berkay Celik, Prasanna Venkatesh, Shulin Zhao, Patrick McDaniel, Anand Sivasubramaniam and Gang Tan, IoTRepair: Flexible Fault Handling in Diverse IoT Deployments, ACM Transactions on Internet of Things, ACM, 2022. [Link]
  8. Tian Xie, Namitha Nambiar, Ting He and Patrick McDaniel, Attack Resilience of Cache Replacement Policies: A Study Based on TTL Approximation, IEEE/ACM Transactions on Networking, 2022. [Link]
  9. Quinn Burke, Fidan Mehmeti, Rahul George, Kyle Ostrowski, Trent Jaeger, Thomas La Porta and Patrick Mcdaniel, Enforcing Multilevel Security Policies in Unstable Networks, IEEE Transactions on Network and Service Management, IEEE, June, 2022. [Link]
  10. Ryan Sheatsley, Nicolas Papernot, Michael J. Weisman, Gunjan Verma and Patrick McDaniel, Adversarial Examples for Network Intrusion Detection Systems, Journal of Computer Security (JCS), IOS Press, January, 2022. [Link]
  11. Quinn Burke, Patrick McDaniel, Thomas La Porta, Mingli Yu and Ting He, Misreporting Attacks Against Load Balancers in Software-Defined Networking, Mobile Networks and Applications, Springer, 2021. [Link]
  12. Daniel E. Krych and Patrick McDaniel, Exposing Android Social Applications: Linking Data Leakage to Privacy Policies, Journal of Cyber Security Technology, Taylor & Francis, Vol.5, No.3-4, 2021. [Link]
  13. Alejandro Andrade Salazar, Ryan Sheatsley, Jonathan Petit and Patrick McDaniel, Physics-based Misbehavior Detection System for V2X Communications, SAE International Journal of Connected and Automated Vehicles, SAE International, June, 2021. [Link]
  14. Mingli Yu, Tian Xie, Ting He, Patrick McDaniel and Quinn Burke, Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks, IEEE/ACM Transactions on Networking, Vol.29, No.6, Pages 1063-6692, December, 2021. [Link]
  15. Leonardo Babun, Kyle Denney, Z. Berkay Celik, Patrick McDaniel and Selcuk Uluagac, A Survey on IoT Platforms: Communication, Security, and Privacy Perspectives, Computer Networks, Vol.192, No.19, June, 2021. [Link]
  16. Ryan Sheatsley, Matthew Durbin, Azaree Lintereur and Patrick McDaniel, Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations, IEEE Sensors, Vol.21, No.8, April, 2021. [Link]
  17. Stefan Achleitner, Quinn Burke, Patrick McDaniel, Trent Jaeger, Thomas La Porta and Srikanth V. Krishnamurthy, MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking, IEEE Transactions on Network and Service Management, Vol.18, No.1, March, 2021. [Link]
  18. Dan Boneh, Andrew J. Grotto, Patrick McDaniel and Nicolas Papernot, Preparing for the Age of Deepfakes and Disinformation, Stanford HAI Policy Brief, 2020. [Link]
  19. Dan Boneh, Andrew J. Grotto, Patrick McDaniel and Nicolas Papernot, How Relevant Is the Turing Test in the Age of Sophisbots?, IEEE Security & Privacy Magazine, Vol.17, Pages 64-71, Nov/Dec, 2019. [Link]
  20. Z. Berkay Celik, Patrick McDaniel and Thomas Bowen, Malware Modeling and Experimentation through Parameterized Behavior, Journal of Defense Modeling and Simulation (JDMS), Vol.15, No.1, Pages 31-48, 2017. [Link]
  21. Z. Berkay Celik, Earlence Fernandes, Eric Pauley, Gang Tan and Patrick McDaniel, Program Analysis of Commodity IoT Applications for Security and Privacy: Opportunities and Challenges, ACM Computing Surveys (CSUR), ACM, Vol.42, No.4, 2019. [Link]
  22. Z. Berkay Celik, Patrick McDaniel, Gang Tan, Leonardo Babun and Selcuk Uluagac, Verifying IoT Safety and Security in Physical Spaces, IEEE Security & Privacy Magazine, IEEE, Vol.17, No.5, Pages 30-37, 2019. [Link]
  23. Ahmed Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Patrick McDaniel and Lisa Marvel, Catch Me if You Can: Malicious Co-Residency on the Cloud, IEEE/ACM Transactions on Networking, Vol.27, No.2, April, 2019. [Link]
  24. Ian Goodfellow, Patrick McDaniel and Nicolas Papernot, Making machine learning robust against adversarial inputs, Communications of the ACM, ACM, Vol.61, No.7, Pages 56-6, June/July, 2018. [Link]
  25. Dave Tian, Kevin Butler, Joseph Choi, Patrick McDaniel and Padma Krishnaswamy, Securing ARP/NDP From the Ground Up, IEEE Transactions on Information Forensics and Security, Vol.12, No.9, Pages 2131-2143, April, 2017. [Link]
  26. Stefan Achleitner, Thomas La Porta, Patrick McDaniel, Shridatt Sugrim, Srikanth V. Krishnamurthy and Ritu Chada, Deceiving Network Reconnaissance Unsing SDN-based Virtual Topologies, IEEE Transactions on Network and Service Management, Special Issue on Advances in Management of Softwarized Networks, Vol.14, No.4, July, 2017. [Link]
  27. Chaz Lever, Robert Walls, Yacin Nadji, David Dagon, Patrick McDaniel and Manos Antonakakis, Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains, IEEE Security & Privacy Magazine (Secure Systems issue column), April, 2017. [Link]
  28. Patrick McDaniel, Nicolas Papernot and Z. Berkay Celik, Machine Learning in Adversarial Settings, IEEE Security & Privacy Magazine, Vol.14, No.3, May/June, 2016. [Link]
  29. Patrick McDaniel and Ananthram Swami, The Cyber Security Collaborative Research Alliance:Unifying Detection, Agility, and Risk in Mission-Oriented Cyber Decision Making, CSIAC Journal, Army Research Laboratory (ARL) Cyber Science and Technology, Vol.5, No.1, January, 2017. [Link]
  30. Damien Octeau, Daniel Luchaup, Somesh Jha and Patrick McDaniel, Composite Constant Propagation and its Application to Android Program Analysis, IEEE Transactions on Software Engineering, Vol.42, No.11, Pages 999-1014, 2016. [Link]
  31. Alexander Kott, Ananthram Swami and Patrick McDaniel, Security Outlook: Six Cyber Game Changers for the Next 15 Years, IEEE Computer, Vol.47, No.12, Pages 104-106, 2014. [Link]
  32. Zhenfu Cao, Keqiu Li, Xu Li, Patrick McDaniel, Radha Poovendran, Guojun Wang and Yang Xiang, Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems, IEEE Transactions on Parallel and Distributed Systems, Vol.25, No.2, Pages 279-28, 2014. [Link]
  33. Patrick McDaniel, Brian Rivera and Ananthram Swami, Toward a Science of Secure Environments, IEEE Security & Privacy Magazine, Vol.12, No.4, July/August, 2014. [Link]
  34. William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon Cox, Jaeyeon Jung, Patrick McDaniel and Anmol Sheth, TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, ACM Transactions on Computer Systems (TOCS), Vol.32, No.2, June, 2014. [Link]
  35. William Enck, Peter Gilbert, Byung-Gon Chun, Landon Cox, Jaeyeon Jung, Patrick McDaniel and Anmol Sheth, TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, Communications of the ACM, Vol.57, No.3, March, 2014. (
    Research Highlight
    ) [Link]
  36. Machigar Ongtang, Stephen McLaughlin, William Enck and Patrick McDaniel, Semantically Rich Application-Centric Security in Android, Security and Communication Networks, Vol.5, No.6, Pages 658-673, 2012. [Link]
  37. Patrick McDaniel, Bloatware Comes to the Smartphone, IEEE Security & Privacy Magazine, Vol.10, No.4, July/August, 2011. [Link]
  38. Thomas Moyer, Kevin Butler, Joshua Schiffman, Patrick McDaniel and Trent Jaeger, Scalable Web Content Attestation, IEEE Transactions on Computers, Vol.61, No.5, Pages 686--699, April, 2011. [Link]
  39. Patrick McDaniel, Data Provenance and Security, IEEE Security & Privacy Magazine, Vol.9, No.3, March/April, 2011. [Link]
  40. Joshua Schiffman, Thomas Moyer, Trent Jaeger and Patrick McDaniel, Network-based Root of Trust for Installation, IEEE Security & Privacy Magazine, Pages 40-48, Jan/Feb, 2011. [Link]
  41. Kevin Butler, Stephen McLaughlin, Thomas Moyer and Patrick McDaniel, New Security Architectures Based on Emerging Disk Functionality, IEEE Security and Privacy Magazine, Vol.8, No.5, October, 2010. [Link]
  42. Patrick McDaniel and William Enck, Not So Great Expectations: Why Application Markets Haven't Failed Security, IEEE Security & Privacy Magazine, Vol.8, No.5, Pages 76--78, September/October, 2010. [Link]
  43. Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao, Trent Jaeger, Patrick McDaniel and Thomas La Porta, From Mobile Phones to Responsible Devices, Journal of Security and Communication Networks (SCN), Vol.4, No.6, Pages 719 -- 726, June, 2011. [Link]
  44. Patrick Traynor, Kevin Butler, William Enck, Kevin Borders and Patrick McDaniel, malnets: Large-Scale Malicious Networks via Compromised Wireless Access Points, Journal of Security and Communication Networks (SCN), Vol.2, No.3, Pages 102-113, March, 2010. [Link]
  45. Matthew Pirretti, Patrick Traynor, Patrick McDaniel and Brent Waters, Secure Attribute-Based Systems, Journal of Computer Security (JCS), Vol.18, No.5, Pages 799--837, 2010. [Link]
  46. Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger and Patrick McDaniel, A Logical Specification and Analysis for SELinux MLS Policy, ACM Transactions on Information and System Security (TISSEC), Vol.13, No.26, 2010. [Link]
  47. Kevin Butler, Toni Farley, Patrick McDaniel and J. Rexford, A Survey of BGP Security Issues and Solutions, Proceedings of the IEEE, Vol.2010, No.1, Pages 100-122, January, 2010. [Link]
  48. Kevin Butler, Sunam Ryu, Patrick Traynor and Patrick McDaniel, Leveraging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems, IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol.20, No.12, Pages 1803-1815, December, 2009. [Link]
  49. Patrick McDaniel and Stephen McLaughlin, Security and Privacy Challenges in the Smart Grid, IEEE Security & Privacy Magazine (Secure Systems issue column), Vol.7, No.3, Pages 75-77, May/June, 2009. [Link]
  50. Patrick Traynor, William Enck, Patrick McDaniel and Thomas La Porta, Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks, IEEE/ACM Transactions on Networking (TON), Vol.17, No.1, Pages 40-53, February, 2009. [Link]
  51. William Enck, Machigar Ongtang and Patrick McDaniel, Understanding Android Security, IEEE Security & Privacy Magazine, Vol.7, No.1, Pages 50--57, January/February, 2009. [Link]
  52. William Enck, Thomas Moyer, Patrick McDaniel, Shubho Sen, Panagiotis Sebos, Sylke Spoerel, Albert Greenberg, Yu-Wei Sung, Sanjay Rao and William Aiello, Configuration Management at Massive Scale: System Design and Experience, IEEE Journal on Selected Areas in Communications (JSAC), Vol.27, No.3, Pages 323-335, 2009. [Link]
  53. Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel and Thomas La Porta, ASR: Anonymous and Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks, Wireless Networks (WINET), ACM/Kluwer, Vol.15, No.4, Pages 525-539, May, 2009. [Link]
  54. Patrick Traynor, William Enck, Patrick McDaniel and Thomas La Porta, Exploiting Open Functionality in SMS-Capable Cellular Networks, Journal of Computer Security, Vol.16, No.6, Pages 713-742, Febraury, 2009. [Link]
  55. Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks and Patrick McDaniel, Non-Invasive Methods for Host Certification, ACM Transactions on Information and System Security (TISSEC), Vol.11, No.3, 2008. [Link]
  56. Patrick McDaniel and Bashar Nuseibeh, \it Guest Editorial: Special Issue on Software Engineering for Secure Systems, IEEE Transactions on Software Engineering, Vol.34, No.1, Pages 3--4, 2008. [Link]
  57. Wesam Lootah, William Enck and Patrick McDaniel, TARP: Ticket-based Address Resolution Protocol, Computer Networks, Elsevier, Vol.51, No.15, Pages 4322--4337, October, 2007. [Link]
  58. Patrick McDaniel and Avi Rubin, \it Guest Editoral: Special Issue on Web Security, Computer Networks, Elsevier, Vol.22, No.2, 2005. [Link]
  59. Patrick McDaniel and Atul Prakash, Enforcing Provisioning and Authorization Policy in the Antigone System, Journal of Computer Security, Vol.14, No.6, Pages 483--511, November, 2006. [Link]
  60. Patrick McDaniel and Atul Prakash, Methods and Limitations of Security Policy Reconciliation, ACM Transactions on Information and System Security (TISSEC), Association for Computing Machinery, Vol.9, No.3, Pages 259-291, August, 2006. [Link]
  61. Patrick McDaniel, William Aiello, Kevin Butler and John Ioannidis, Origin Authentication in Interdomain Routing, Journal of Communication Networks, Elsevier, Vol.50, No.16, Pages 2953-2980, November, 2006. [Link]
  62. Matthew Pirretti, Sencun Zhu, Vijaykrishnan Narayanan, Patrick McDaniel, Mahmut Kandemir and Richard Brooks, The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense, International Journal of Distributed Sensor Networks, Vol.2, No.3, Pages 267-287, June, 2005. [Link]
  63. Simon Byers, Lorrie Cranor, Eric Cronin, Dave Kormann and Patrick McDaniel, Analysis of Security Vulnerabilities in the Movie Production and Distribution Process, Telecommunications Policy, Vol.28, No.8, Pages 619-644, August, 2004. [Link]

Conference Publications

  1. Yohan Beugin and Patrick McDaniel, Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving), Proceedings on Privacy Enhancing Technologies (PETS), July, 2024. [Link]
  2. Blaine Hoak and Patrick McDaniel, Explorations in Texture Learning, 12th International Conference on Learning Representations, Tiny Papers Track (ICLR), May, 2024. [Link]
  3. Tian Xie, Sanchal Thakkar, Ting He, Novella Bartolini and Patrick McDaniel, Host-based Flow Table Size Inference in Multi-hop SDN, Proceedings of the IEEE GLOBECOM, IEEE, December, 2023. Kuala Lumpur, Malaysia.
  4. Eric Pauley, Paul Barford and Patrick McDaniel, The CVE Wayback Machine: Measuring Coordinated Disclosure from Exploits Against Two Years of Zero-Days, Proceedings of the ACM 2023 Internet Measurement Conference (IMC), October, 2023. Montreal, Canada. (
    runner up-best paper award
    ) [Link]
  5. Mingli Yu, Quinn Burke, Thomas La Porta and Patrick McDaniel, mMLSnet: Multilevel Security Network With Mobility, Proceedings of the Military Communications Conference (MILCOM), IEEE, October, 2023. Boston, MA. [Link]
  6. Ryan Guide, Eric Pauley, Yohan Beugin, Ryan Sheatsley and Patrick McDaniel, Characterizing the Modification Space of Signature IDS Rules, MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM), IEEE, October, 2023. Boston, MA. [Link]
  7. Eric Pauley and Paul Barford Patrick McDaniel, DScope: A Cloud-Native Internet Telescope, 32nd USENIX Security Symposium (USENIX Security 23), USENIX Association, August, 2023. Anaheim, CA. [Link]
  8. Ryan Sheatsley, Blaine Hoak, Eric Pauley and Patrick McDaniel, The Space of Adversarial Strategies, 32nd USENIX Security Symposium (USENIX Security 23), USENIX Association, August, 2023. [Link]
  9. Eric Pauley, Gang Tan, Danfeng Zhang and Patrick McDaniel, Performant Binary Fuzzing without Source Code using Static Instrumentation, Conference on Communications and Network Security (CNS), IEEE, October, 2022. [Link]
  10. Patrick McDaniel, Keynote Address: Sustainability is a Security Problem (extended abstract), Proceedings of the ACM Conference on Computer and Communications Security (CCS), ACM, November, 2022. [Link]
  11. Kyle Domico, Ryan Sheatsley, Yohan Beugin, Quinn Burke and Patrick McDaniel, A Machine Learning and Computer Vision Approach to Geomagnetic Storm Forecasting, Machine Learning in Heliophysics (ML-Helio), AGU, November, 2022. [Link]
  12. Tian Xie, Sanchal Thakkar, Ting He, Patrick Mcdaniel and Quinn Burke, Joint Caching and Routing in Cache Networks with Arbitrary Topology, Proceedings of the International Conference on Distributed Computing Systems (ICDCS), July, 2022. [Link]
  13. Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain and Patrick McDaniel, Building a Privacy-Preserving Smart Camera System, Proceedings on Privacy Enhancing Technologies (PETS), July, 2022. [Link]
  14. Eric Pauley, Ryan Sheatsley, Blaine Hoak, Quinn Burke, Yohan Beugin and Patrick McDaniel, Measuring and Mitigating the Risk of IP Reuse on Public Clouds, 2022 IEEE Symposium on Security and Privacy (IEEE S&P), IEEE, May, 2022. San Francisco, CA. [Link]
  15. Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler Shipp and Patrick McDaniel, HoneyModels: Machine Learning Honeypots, Proceedings of the Military Communications Conference (MILCOM), IEE, November, 2021. [Link]
  16. Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman and Patrick McDaniel, On the Robustness of Domain Constraints, Proceedings of the ACM Conference on Computer and Communications Security (CCS), ACM, November, 2021. [Link]
  17. Tian Xie, Ting He, Patrick McDaniel and Namitha Nambiar, Attack Resilience of Cache Replacement Policies, IEEE International Conference on Computer Communications (INFOCOM), IEEE, May, 2021. [Link]
  18. Adrien Cosson, Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Patrick McDaniel and Selcuk Uluagac, Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information, In 6th ACM/IEEE Conference on Internet of Things Design and Implementation (IoTDI), April, 2021. [Link]
  19. Matthew Durbin, Ryan Sheatlsey, Patrick McDaniel and Azaree Lintereur, A Multi-Step Machine Learning Approach to Directional Gamma Ray Detection, 2020 IEEE Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC), October, 2020. [Link]
  20. Sayed M. Saghaian, Thomas La Porta, Simone Silvestri and Patrick McDaniel, Improving Robustness of a Popular Probabilistic Clustering Algorithm Against Insider Attacks, International Conference on Security and Privacy in Communication Networks (SecureComm 2020), EAI, October, 2020. [Link]
  21. Quinn Burke, Patrick McDaniel, Thomas La Porta, Mingli Yu and Ting He, Misreporting Attacks in Software-Defined Networking, International Conference on Security and Privacy in Communication Networks (SecureComm 2020), EAI, October, 2020. [Link]
  22. Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda and Selcuk Uluagac, KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home, 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20), ACM, July, 2020. [Link]
  23. Mingli Yu, Ting He, Patrick McDaniel and Quinn Burke, Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks, IEEE INFOCOM, IEEE Conference on Computer Communications, June, 2020. Beijing, China. [Link]
  24. Michael Norris, Z. Berkay Celik, Prasanna Venkatesh, Shulin Zhao, Patrick McDaniel, Anand Sivasubramaniam and Gang Tan, IoTRepair: Systematically addressing device faults in commodity IoT, In 5th ACM/IEEE Conference on Internet of Things Design and Implementation (IoTDI), April, 2020. [Link]
  25. Raquel Alvarez, Jake Levenson, Ryan Sheatsley and Patrick McDaniel, Application Transiency: Towards a Fair Trade of Personal Information for Application Services, Proceedings of the EAI Conference on Security and Privacy in Communication Networks (SecureComm), October, 2019. Orlando, FL. [Link]
  26. Giuseppe Petracca, Yuqiong Sun, Ahmad-Atamli Reineh, Jens Grossklags, Patrick McDaniel and Trent Jaeger, EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs, Proceedings of the 28th USENIX Security Symposium, Augus, 2019. Santa Clara, CA. [Link]
  27. Matthew Durbin, Ryan Sheatsley, Christopher Balbier, Tristan Grieve, Patrick McDaniel and Azaree Lintereur, Development of Machine Learning Algorithms for Directional Gamma Ray Detection, Proceedings of the Institute of Nuclear Materials Management Annual Meeting (INMM), July, 2019. Palm Desert, CA. (
    J. D. Williams student paper award, Nuclear Security and Physical Protection division
    ) [Link]
  28. Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Abbas Acar, Ryan Sheatsley, Selcuk Uluagac and Patrick McDaniel, Curie: Policy-based Secure Data Exchange, ACM Conference on Data and Applications Security (CODASPY), March, 2019. Dallas, TX. [Link]
  29. Z. Berkay Celik, Gang Tan and Patrick McDaniel, IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT, Network and Distributed System Security Symposium (NDSS), February, 2019. San Diego, CA. [Link]
  30. Dang Tu Nguyen, Chengyu Song, Zhiyun Qian, Srikanth V. Krishnamurthy, Edward J. M. Colbert and Patrick McDaniel, IoTSan: Fortifying the Safety of IoT Systems, Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '18), December, 2018. [Link]
  31. Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel and Selcuk Uluagac, Sensitive Information Tracking in Commodity IoT, Proceedings of the 27th USENIX Security Symposium, August, 2018. Baltimore, MD. [Link]
  32. Rauf Izmailov, Shridatt Sugrim, Ritu Chadha, Patrick McDaniel and Ananthram Swami, Enablers Of Adversarial Attacks in Machine Learning, Proceedings of the Military Communications Conference (MILCOM), IEEE, October, 2018. [Link]
  33. Sayed M. Saghaian, Thomas La Porta, Trent Jaeger, Z. Berkay Celik and Patrick McDaniel, Mission-oriented Security Model, Incorporating Security Risk, Cost and Payout, Proceedings of EAI SECURECOMM 2018, August, 2018. (
    best paper award
    ) [Link]
  34. Z. Berkay Celik, Patrick McDaniel and Gang Tan, Soteria: Automated IoT Safety and Security Analysis, USENIX Annual Technical Conference (USENIX ATC), July, 2018. Boston, MA. [Link]
  35. Z. Berkay Celik, Patrick McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez and Ananthram Swami, Detection under Privileged Information, ACM Asia Conference on Computer and Communications Security (ASIACCS), June, 2018. [Link]
  36. Florian Tramer, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh and Patrick McDaniel, Ensemble Adversarial Training: Attacks and Defenses, International Conference on Learning Representations (ICLR), 2018. Vancouver, Canada. [Link]
  37. Nicolas Papernot, Patrick McDaniel, Arunesh Sinha and Michael Wellman, SoK: Security and Privacy in Machine Learning, Security and Privacy (EuroS&P), 2018 IEEE European Symposium on on Security and Privacy (EuroS&P), IEEE, April, 2018. London, UK. [Link]
  38. Chun-Ming Lai, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, Felix Wu , Patrick McDaniel and Hasan Cam, Attacking Strategies and Temporal Analysis Involving Facebook Discussion Groups, 13th IEEE International Conference on Network and Service Management, November, 2017. Tokyo, Japan. [Link]
  39. Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes and Patrick McDaniel, Adversarial Examples for Malware Detection, 22nd European Symposium on Research in Computer Security (ESORICS '17), September, 2017. Oslo, Norway. [Link]
  40. Z. Berkay Celik, David Lopez-Paz and Patrick McDaniel, Patient-Driven Privacy Control through Generalized Distillation, Proceedings of the Privacy-Aware Computing (PAC), IEEE, 2017. [Link]
  41. Abbas Acar, Z. Berkay Celik, Hidayet Aksu, Selcuk Uluagac and Patrick McDaniel, Achieving Secure and Differentially Private Computations in Multiparty Settings, Proceedings of the Privacy-Aware Computing (PAC), IEEE, 2017. [Link]
  42. Vaibhav Rastogi, Drew Davidson, Lorenzo De Carli, Somesh Jha and Patrick McDaniel, Cimplifier: Automatically Debloating Containers, 11Th Joint Meeting of the European Software Engineering Conference and the Acm Sigsoft Symposium on the Foundations of Software Engineering, September, 2017. Paderborn, Germany. [Link]
  43. Yunfeng Hong, Yongjian Hu, Chun-Ming Lai, Felix Wu, Iulian Neamtiu, Yu Paul, Patrick McDaniel, Hasan Cam and Gail-Joon Ahn, Defining and Detecting Environment Discrimination in Android Apps, The 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 17), October, 2017. [Link]
  44. Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z. Berkay Celik and Ananthram Swami, Practical Black-Box Attacks against Machine Learning, ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017, April, 2017. [Link]
  45. Stefan Achleitner, Thomas La Porta, Trent Jaeger and Patrick McDaniel, Adversarial Network Forensics in Software Defined Networking, ACM Symposium on SDN Research (SOSR), ACM, April, 2017. (
    best student paper award
    ) [Link]
  46. Stefan Achleitner, Thomas La Porta, Patrick McDaniel, Srikanth V. Krishnamurthy, Alexander Poylisher and Constantin Serban, Stealth Migration: Hiding Virtual Machines on the Network, IEEE International Conference on Computer Communications (INFOCOM), IEEE, 2017. [Link]
  47. Ahmed Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Patrick McDaniel and Lisa Marvel, Malicious Co-Residency on the Cloud: Attacks and Defense, IEEE International Conference on Computer Communications (INFOCOM), IEEE, 2017. [Link]
  48. Nathaniel Lageman, Eric Kilmer, Robert Walls and Patrick McDaniel, BinDNN: Resilient Function Matching Using Deep Learning, 2016 International Conference on Security and Privacy in Communication Networks (SECURECOMM), October, 2016. [Link]
  49. Z. Berkay Celik, Nan Hu, Yun Li, Nicolas Papernot, Patrick McDaniel, Jeff Rowe, Robert Walls, Karl Levitt, Novella Bartolini, Thomas La Porta and Ritu Chadha, Mapping Sample Scenarios to Operational Models, Proceedings of the Military Communications Conference (MILCOM), IEEE, 2016. [Link]
  50. Nicolas Papernot, Patrick McDaniel, Ananthram Swami and Richard Harang, Crafting Adversarial Input Sequences for Recurrent Neural Networks, Proceedings of the Military Communications Conference (MILCOM), IEEE, 2016. [Link]
  51. Michael Backes, Sven Bugiel, Erik Derr, Patrick McDaniel, Damien Octeau and Sebastian Weisgerber, On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis, Proceedings of the 25th USENIX Security Symposium, August, 2016. [Link]
  52. Devin Pohly and Patrick McDaniel, Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols, 46th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June, 2016. [Link]
  53. Chaz Lever, Robert Walls, Yacin Nadji, David Dagon, Patrick McDaniel and Manos Antonakakis, Domain-Z: 28 Registrations Later, Proceedings of the 37th IEEE Symposium on Security and Privacy, May, 2016. San Francisco, CA. [Link]
  54. Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick McDaniel and Matthew Smith, SoK: Lessons Learned From Android Security Research For Appified Software Platforms, Proceedings of the 37th IEEE Symposium on Security and Privacy, May, 2016. San Francisco, CA. [Link]
  55. Nicolas Papernot, Patrick McDaniel, Xi Wu, Somesh Jha and Ananthram Swami, Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks, Proceedings of the 37th IEEE Symposium on Security and Privacy, May, 2016. San Francisco, CA. [Link]
  56. Charles Huber, Scott Brown, Patrick McDaniel and Lisa Marvel, Cyber Fighter Associate: A Decision Support System for Cyber Agility, Proceedings of the 50th Annual Conference on Information Sciences and Systems (CISS), March, 2016. Princeton, NJ. [Link]
  57. Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matthew Fredrikson, Z. Berkay Celik and Ananthram Swami, The Limitations of Deep Learning in Adversarial Settings, Proceedings of the 1st IEEE European Symposium on Security and Privacy, IEEE, 2016. Saarbrucken, Germany. [Link]
  58. Damien Octeau, Somesh Jha, Matthew Dering, Patrick McDaniel, Alexandre Bartel, Li Li, Jacques Klein and Yves Le Traon, Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-Component Analysis, Proceedings of the 43rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), January, 2016. St. Petersburg, Florida, USA. [Link]
  59. Devin Pohly and Patrick McDaniel, MICSS: A Realistic Multichannel Secrecy Protocol, IEEE Global Communications Conference (GLOBECOM), December, 2015. San Diego, CA. [Link]
  60. Robert Walls, Eric Kilmer, Nathaniel Lageman and Patrick McDaniel, Measuring the Impact and Perception of Acceptable Advertisements, Proceedings of the ACM 2015 Internet Measurement Conference (IMC), October, 2015. Tokyo, Japan. [Link]
  61. Nicolas Papernot, Patrick McDaniel and Robert Walls, Enforcing Agile Access Control Policies in Relational Databases using Views, Proceedings of the Military Communications Conference (MILCOM), October, 2015. Tampa, FL. [Link]
  62. Alessandro Oltramari, Lorrie Cranor, Robert Walls and Patrick McDaniel, Computational Ontology of Network Operations, Proceedings of the Military Communications Conference (MILCOM), October, 2015. Tampa, FL. [Link]
  63. Z. Berkay Celik, Robert Walls, Patrick McDaniel and Ananthram Swami, Malware Traffic Detection using Tamper Resistant Features, Proceedings of the Military Communications Conference (MILCOM), October, 2015. Tampa, FL. [Link]
  64. Devin Pohly, Charles Sestito and Patrick McDaniel, Adaptive Protocol Switching Using Dynamically Insertable Bumps in the Stack, Proceedings of the Military Communications Conference (MILCOM), October, 2015. Tampa, FL. [Link]
  65. Azeem Aqil, Ahmed Atya, Trent Jaeger, Srikanth V. Krishnamurthy, Karl Levitt, Patrick McDaniel, Jeff Rowe and Ananthram Swami, Detection of Stealthy TCP-based DoS Attacks, Proceedings of the Military Communications Conference (MILCOM), October, 2015. Tampa, FL. [Link]
  66. Daniel E. Krych, Stephen Lange-Maney, Patrick McDaniel and William Glodek, Investigating Weaknesses in Android Certificate Security, SPIE 9478, Modeling and Simulation for Defense Systems and Applications X, May, 2015. [Link]
  67. Damien Octeau, Daniel Luchaup, Matthew Dering, Somesh Jha and Patrick McDaniel, Composite Constant Propagation: Application to Android Inter-Component Communication Analysis, Proceedings of the 37th International Conference on Software Engineering (ICSE), May, 2015. Florence, Italy. [Link]
  68. Li Li, Alexandre Bartel, Tegawende Bissyande, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau and Patrick McDaniel, IccTA: Detecting Inter-Component Privacy Leaks in Android Apps, Proceedings of the 37th International Conference on Software Engineering (ICSE), May, 2015. Florence, Italy. [Link]
  69. Jing Tian, Kevin Butler, Patrick McDaniel and Padma Krishnaswamy, Securing ARP From the Ground Up, CODASPY '15: Proceedings of the 5th ACM Conference on Data Application and Security and Privacy, March, 2015. San Antonio, TX, USA. [Link]
  70. Alessandro Oltramari, Lorrie Cranor, Robert Walls and Patrick McDaniel, Building an Ontology of Cyber Security, Proc. Intl. Conference on Semantic Technologies for Intelligence, Defense, and Security (STIDS), November, 2014. [Link]
  71. Matthew Dering and Patrick McDaniel, Android Market Reconstruction and Analysis, Proceedings of the Military Communications Conference (MILCOM), October, 2014. Baltimore, MD. [Link]
  72. Wenhui Hu, Damien Octeau, Patrick McDaniel and Peng Liu, Duet: Library Integrity Verification for Android Applications, Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), July, 2014. Oxford, United Kingdom. [Link]
  73. Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau and Patrick McDaniel, FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps, Proceedings of the 35th Conference on Programming Language Design and Implementation (PLDI), June, 2014. Edinburgh, UK. [Link]
  74. Phillip Koshy, Diana Koshy and Patrick McDaniel, An Analysis of Anonymity in Bitcoin Using P2P Network Traffic, Proceedings of Financial Cryptography 2014, International Financial Cryptography Association (IFCA), February, 2014. Christ Church, Barbado. [Link]
  75. Stephen McLaughlin, Devin Pohly, Patrick McDaniel and Saman Zonouz, A Trusted Safety Verifier for Process Controller Code, Proc. ISOC Network and Distributed Systems Security Symposium (NDSS), February, 2014. San Diego, CA. [Link]
  76. Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein and Yves Le Traon, Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis, Proceedings of the 22th USENIX Security Symposium, August, 2013. Washington, DC. [Link]
  77. Devin J. Pohly, Stephen McLaughlin, Patrick McDaniel and Kevin Butler, Hi-Fi: Collecting High-Fidelity Whole-System Provenance, Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC), December, 2012. Orlando, Florida. [Link]
  78. Stephen McLaughlin and Patrick McDaniel, SABOT: Specification-based Payload Generation for Programmable Logic Controllers, 19th ACM Conference on Computer and Communications Security (CCS), October, 2012. [Link]
  79. Weining Yang, Ninghui Li, Yuan Qi, Wahbeh Qardaji, Stephen McLaughlin and Patrick McDaniel, Minimizing Private Data Disclosures in the Smart Grid, 19th ACM Conference on Computer and Communications Security (CCS), October, 2012. [Link]
  80. Eun Kyoung Kim, Patrick McDaniel and Thomas La Porta, A Detection Mechanism for SMS Flooding Attacks in Cellular Networks, Proceedings of the 8th International Conference on Security and Privacy in Communication Networks (SECURECOMM 2012), September, 2012. Padua, Italy. [Link]
  81. Damien Octeau, Somesh Jha and Patrick McDaniel, Retargeting Android Applications to Java Bytecode, 20th International Symposium on the Foundations of Software Engineering (FSE), November, 2012. Research Triangle Park, NC. (
    best artifact award
    ) [Link]
  82. Thomas Moyer, Trent Jaeger and Patrick McDaniel, Scalable Integrity-Guaranteed AJAX, Proceedings of the 14th Asia-Pacific Web Conference (APWeb), April, 2012. Kunming, China. (
    Invited Paper
    ) [Link]
  83. Patrick McDaniel and Stephen McLaughlin, Structured Security Testing in the Smartgrid, Proceedings of 5th International Symposium on Communications, Control, and Signal Processing, May, 2012. Rome, Italy. (
    Invited Paper
    ) [Link]
  84. Stephen McLaughlin, Patrick McDaniel and William Aiello, Protecting Consumer Privacy from Electric Load Monitoring, The 18th ACM Conference on Computer and Communications Security (CCS), October, 2011. Chicago, IL. [Link]
  85. William Enck, Damien Octeau, Patrick McDaniel and Swarat Chaudhuri, A Study of Android Application Security, Proceedings of the 20th USENIX Security Symposium, August, 2011. San Francisco, CA. [Link]
  86. Kevin Butler, Stephen McLaughlin and Patrick McDaniel, Kells: A Protection Framework for Portable Data, Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC), December, 2010. Austin, TX. [Link]
  87. Stephen McLaughlin, Dmitry Podkuiko, Adam Delozier, Sergei Miadzvezhanka and Patrick McDaniel, Multi-vendor Penetration Testing in the Advanced Metering Infrastructure, Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC), December, 2010. Austin, TX. [Link]
  88. Machigar Ongtang, Kevin Butler and Patrick McDaniel, Porscha: Policy Oriented Secure Content Handling in Android, Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC), December, 2010. Austin, TX. [Link]
  89. Patrick Traynor, Joshua Schiffman, Thomas La Porta, Patrick McDaniel, Abhrajit Ghosh and Farooq Anjum, Constructing Secure Localization Systems with Adjustable Granularity, IEEE Global Communications Conference (GLOBECOM), December, 2010. Miami, FL. [Link]
  90. William Enck, Peter Gilbert, Byung-Gon Chun, Landon Cox, Jaeyeon Jung, Patrick McDaniel and Anmol Sheth, TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI), October, 2010. Vancouver, BC. [Link]
  91. Toby Ehrenkranz, Jun Li and Patrick McDaniel, Realizing A Source Authentic Internet, Proceedings of the 6th International ICST Conference on Security and Privacy in Communications Networks (Securecomm), September, 2010. Singapore. [Link]
  92. Boniface Hicks, Sandra Rueda, David King, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick McDaniel and Trent Jaeger, An Architecture for Enforcing End-to-End Access Control over Web Applications, Proceedings of the Fifteenth ACM Symposium on Access Control Models and Technologies (SACMAT 2010), Pages 163-172, June, 2010. Pittsburgh, PA. [Link]
  93. Kevin Butler, Stephen McLaughlin and Patrick McDaniel, Disk-Enabled Authenticated Encryption, Proceedings of the 26th IEEE Symposium on Massive Storage Systems and Technologies (MSST), May, 2010. [Link]
  94. Machigar Ongtang, Stephen McLaughlin, William Enck and Patrick McDaniel, Semantically Rich Application-Centric Security in Android, Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC), Pages 340-349, December, 2009. Honolulu, Hawaii. (
    best paper
    ) [Link]
  95. Thomas Moyer, Kevin Butler, Joshua Schiffman, Patrick McDaniel and Trent Jaeger, Scalable Asynchronous Web Content Attestation, Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC), Pages 95-104, December, 2009. Honolulu, Hawaii. [Link]
  96. Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger and Patrick McDaniel, Justifying Integrity Using a Virtual Machine Verifier, Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC), Pages 83-92, December, 2009. Honolulu, Hawai. [Link]
  97. William Enck, Machigar Ongtang and Patrick McDaniel, On Lightweight Mobile Phone App Certification, Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), Pages 235-245, November, 2009. [Link]
  98. Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Thomas La Porta and Patrick McDaniel, On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core, Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), Pages 223-234, November, 2009. [Link]
  99. William Enck, Patrick McDaniel and Trent Jaeger, PinUP: Pinning User Files to Known Applications, Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC), December, 2008. [Link]
  100. William Enck, Kevin Butler, Thomas Richardson, Patrick McDaniel and Adam Smith, Defending Against Attacks on Main Memory Persistence, Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC), December, 2008. [Link]
  101. Kevin Butler, Stephen McLaughlin and Patrick McDaniel, Rootkit-Resistant Disks, Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), November, 2008. Alexandria, VA. [Link]
  102. Patrick Traynor, Kevin Butler, William Enck and Patrick McDaniel, Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems, ISOC Network & Distributed System Security Symposium (NDSS), February, 2008. San Diego, CA. [Link]
  103. Luke St. Clair, Joshua Schiffman, Trent Jaeger and Patrick McDaniel, Establishing and Sustaining System Integrity via Root of Trust Installation, 23rd Annual Computer Security Applications Conference (ACSAC), Pages 19-29, December, 2007. Miami, FL. [Link]
  104. Boniface Hicks, Tim Misiak and Patrick McDaniel, Channels: Runtime System Infrastructure for Security-typed Languages, 23rd Annual Computer Security Applications Conference (ACSAC), Pages 443-452, December, 2007. Miami, FL. [Link]
  105. Dhananjay Bapat, Kevin Butler and Patrick McDaniel, Towards Automated Privilege Separation, Proceedings of 2nd International Conference on Information Systems Security (short paper), December, 2007. Delhi, India. [Link]
  106. Lisa Johansen, Kevin Butler, Michael Rowell and Patrick McDaniel, Email Communities of Interest, Fourth Conference on Email and Anti-Spam (CEAS 2007, August, 2007. Mountain View, California. [Link]
  107. Patrick Traynor, Patrick McDaniel and Thomas La Porta, On Attack Causality in Internet-Connected Cellular Networks, Proceedings of the 16th USENIX Security Symposium, Pages 1--16, August, 2007. Boston, MA. [Link]
  108. Boniface Hicks, Sandra Rueda, Trent Jaeger and Patrick McDaniel, From Trusted to Secure: Building and Executing Applications that Enforce System Security, Proceedings of the USENIX Annual Technical Conference, June, 2007. Santa Clara, CA. [Link]
  109. William Enck, Patrick McDaniel, Shubho Sen, Panagiotis Sebos, Sylke Spoerel, Albert Greenberg, Sanjay Rao and William Aiello, Configuration Management at Massive Scale: System Design and Experience, Proceedings of the USENIX Annual Technical Conference, June, 2007. Santa Clara, CA. [Link]
  110. Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger and Patrick McDaniel, A Logical Specification and Analysis for SELinux MLS, 12th ACM Symposium on Access Control Models and Technologies (SACMAT), ACM, June, 2007. Sophia Antipolis, France. [Link]
  111. Anusha Sriraman, Kevin Butler, Patrick McDaniel and Padma Raghavan, Analysis of IPv4 Address Space Delegation Structure, 12th IEEE Symposium on Computers and Communications (ISCC), July, 2007. Aveiro, Portugal. [Link]
  112. Heesook Choi, Thomas La Porta and Patrick McDaniel, Privacy Preserving Communication in MANETs, Proceedings of Fourth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON 07), June, 2007. San Diego, CA. [Link]
  113. Sophie Qiu, Patrick McDaniel and Fabian Monrose, Toward Valley-Free Inter-domain Routing, Proceedings of 2007 IEEE International Conference on Communications (ICC 2007), June, 2007. Glasgow, Scottlan. [Link]
  114. Sunam Ryu, Kevin Butler, Patrick Traynor and Patrick McDaniel, Leveraging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems, Proceedings of the 3rd IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS-07), June, 2007. Niagra Falls, Canada. [Link]
  115. Hosam Rowaihy, William Enck, Patrick McDaniel and Thomas La Porta, Limiting Sybil Attacks in Structured Peer-to-Peer Networks, Proceedings of IEEE INFOCOM 2007 MiniSymposiu, May, 2007. Anchorage, AK. [Link]
  116. Boniface Hicks, Kiyan Ahmadizadeh and Patrick McDaniel, Understanding Practical Application Development in Security-Typed Languages, 22st Annual Computer Security Applications Conference (ACSAC), Pages 153--164, December, 2006. Miami, Fl. (
    best student paper
    ) [Link]
  117. Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel and Trent Jaeger, Password Exhaustion: Predicting the End of Password Usefulness, Proceedings of 2nd International Conference on Information Systems Security (ICISS), Pages 37--55, December, 2006. Kolkata, India. [Link]
  118. Kevin Butler, William Enck, Jennifer Plasterr, Patrick Traynor and Patrick McDaniel, Privacy-Preserving Web-Based Email, Proceedings of 2nd International Conference on Information Systems Security (ICISS), Pages 116--131, December, 2006. Kolkata, India. [Link]
  119. Matthew Pirretti, Patrick Traynor, Patrick McDaniel and Brent Waters, Secure Attribute-Based Systems, Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), Pages 99-112, November, 2006. Alexandria, VA. [Link]
  120. Kevin Butler, William Aiello and Patrick McDaniel, Optimizing BGP Security by Exploiting Path Stability, Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), Pages 298-310, November, 2006. Alexandria, VA. [Link]
  121. Patrick Traynor, William Enck, Patrick McDaniel and Thomas La Porta, Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks, Proceedings of the Twelfth Annual International Conference on Mobile Computing and Networking (MobiCom), Pages 182-193, September, 2006. Los Angeles, CA. [Link]
  122. Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks and Patrick McDaniel, Non-Invasive Methods for Host Certification, Proceedings of the Second IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm), August, 2006. Baltimore, MD. [Link]
  123. Sophie Qiu, Patrick McDaniel, Fabian Monrose and Avi Rubin, Characterizing Address Use Structure and Stabillity of Origin Advertisement in Interdomain Routing, 11th IEEE Symposium on Computers and Communications, Pages 489-496, June, 2006. Pula-Cagliari, Sardinia, Italy. [Link]
  124. Patrick McDaniel, Shubho Sen, Oliver Spatscheck, Jacobus Van der Merwe, William Aiello and Charles Kalmanek, Enterprise Security: A Community of Interest Based Approach, Proceedings of Network and Distributed Systems Security 2006 (NDSS), February, 2006. San Diego, CA. [Link]
  125. Kevin Butler and Patrick McDaniel, Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior, Proceedings of 1st International Conference on Information Systems Security (ICISS), Springer-Verlag Lecture Notes in Computer Science, volume 3803, Pages 36-48, December, 2005. Kolkata, India. (
    Invited Paper
    ) [Link]
  126. Wesam Lootah, William Enck and Patrick McDaniel, TARP: Ticket-Based Address Resolution Protocol, 21st Annual Computer Security Applications Conference (ACSAC), Pages 95-103, December, 2005. Tuscon, AZ. [Link]
  127. William Enck, Patrick Traynor, Patrick McDaniel and Thomas La Porta, Exploiting Open Functionality in SMS-Capable Cellular Networks, Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS), Pages 393--404, May, 2005. Alexandria, VA. [Link]
  128. Matthew Pirretti, Sencun Zhu, Vijaykrishnan Narayanan, Patrick McDaniel, Mahmut Kandemir and Richard Brooks, The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense, Proceedings of the Innovations and Commercial Applications of Distributed Sensor Networks Symposi, October, 2005. Bethesda, Maryland. (
    best paper
    ) [Link]
  129. Louis Kruger, Somesh Jha and Patrick McDaniel, Privacy Preserving Clustering, 10th European Symposium on Research in Computer Security (ESORICS '05), September, 2005. Milan, Italy. [Link]
  130. Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel and Thomas La Porta, Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks, MobiQuitous 2005, July, 2005. San Diego, CA. [Link]
  131. Simon Byers, Lorrie Cranor, Eric Cronin, Dave Kormann and Patrick McDanie, Exposing Digital Content Piracy: Approaches, Issues and Experiences, Thirty-Eighth Conference on Signals, Systems, and Computers, Pages 45--50, Nov, 2004. Monterey, CA. (
    Invited paper
    ) [Link]
  132. William Aiello, John Ioannidis and Patrick McDaniel, Origin Authentication in Interdomain Routing, Proceedings of 10th ACM Conference on Computer and Communications Security (CCS), ACM, Pages 165-178, October, 2003. Washington, DC. [Link]
  133. Eric Cronin, Sugih Jamin, Tal Malkin and Patrick McDaniel, On the Performance, Feasibility, and Use of Forward Secure Signatures, Proceedings of 10th ACM Conference on Computer and Communications Security (CCS), ACM, Pages 131-144, October, 2003. Washington, DC. [Link]
  134. Patrick McDaniel, On Context in Authorization Policy, 8th ACM Symposium on Access Control Models and Technologies (SACMAT), ACM, Pages 80-8, June, 2003. Como, Italy. [Link]
  135. Geoff Goodell, William Aiello, Tim Griffin, John Ioannidis, Patrick McDaniel and Avi Rubin, Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing, Proceedings of Network and Distributed Systems Security 2003 (NDSS), Internet Society, Pages 75-8, February, 2003. San Diego, CA. [Link]
  136. Patrick McDaniel and Atul Prakash, Methods and Limitations of Security Policy Reconciliation, 2002 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Pages 73-87, May, 2002. Oakland, CA. [Link]
  137. Patrick McDaniel, Atul Prakash, Jim Irrer, Sharad Mittal and Thai-Chuin Thuang, Flexibly Constructing Secure Groups in Antigone 2.0, Proceedings of DARPA Information Survivability Conference and Exposition II, IEEE Computer Society Press, Pages 55-67, June, 2001. Los Angeles, CA. [Link]
  138. Hugh Harney, Andrea Colegrove and Patrick McDaniel, Principles of Policy in Secure Groups, Proceedings of Network and Distributed Systems Security 2001 (NDSS), Internet Society, Pages 125-13, February, 2001. San Diego, CA. [Link]
  139. Patrick McDaniel and Sugih Jamin, Windowed Certificate Revocation, Proceedings of IEEE INFOCOM 2000, IEEE, Pages 1406-1414, March, 2000. Tel Aviv, Israel. [Link]
  140. Patrick McDaniel and Avi Rubin, A Response to `Can We Eliminate Certificate Revocation Lists?', Proceedings of Financial Cryptography 2000, International Financial Cryptography Association (IFCA), February, 2000. Anguilla, British West Indies. [Link]
  141. Andrew Adamson, Charles J. Antonelli, Kevin Coffman, Patrick McDaniel and Jim Rees, Secure Distributed Virtual Conferencing, Proceedings of Communications and Multimedia Security (CMS '99), Pages 176-190, September, 1999. Katholieke Universiteit, Leuven, Belgium. [Link]
  142. Patrick McDaniel, Atul Prakash and Peter Honeyman, Antigone: A Flexible Framework for Secure Group Communication, Proceedings of the 8th USENIX Security Symposium, Pages 99-114, August, 1999. Washington, DC. [Link]

Workshop Publications

  1. Yohan Beugin and Patrick McDaniel, A Public and Reproducible Assessment of the Topics API on Real Data, SecWeb 2024 Workshop, IEEE Security and Privacy Workshops (SPW), May, 2024. [Link]
  2. Kunyang Li, Kyle D Domico, Jean-Charles Noirot Ferrand and Patrick McDaniel, The Efficacy of Transformer-Based Adversarial Attacks in Security Domains, Workshop on Artificial Intelligence for Cyber (MILCOM 2023, October, 2023. Boston, MA.
  3. Eric Pauley and Patrick McDaniel, Understanding the Ethical Frameworks of Internet Measurement Studies, The 2nd International Workshop on Ethics in Computer Security (EthiCS 2023), February, 2023. San Diego, CA. (
    best paper award
    ) [Link]
  4. Anshul Gandhi, Kanad Ghose, Kartik Gopalan, Syed Rafiul Hussain, Dongyoon Lee, David Liu, Zhenhua Liu, Patrick McDaniel, Shuai Mu and Erez Zadok, Metrics for Sustainability in Data Centers, Proceedings of the 1st Workshop on Sustainable Computer Systems Design and Implementation (HotCarbon'22), USENIX, July, 2022. San Diego, CA. [Link]
  5. Leonardo Babun, Z. Berkay Celik, Patrick McDaniel and Selcuk Uluagac, Real-time Analysis of Privacy-(un)aware IoT Applications, Privacy Enhancing Technologies Symposium (PETS), 2021. [Link]
  6. Sushrut Shringarputale, Patrick McDaniel, Kevin Butler and Thomas La Porta, Co-residency Attacks on Containers are Real, The ACM Cloud Computing Security Workshop (CCSW 2020), 2020. [Link]
  7. Z. Berkay Celik and Patrick McDaniel, Extending Detection with Privileged Information via Generalized Distillation, IEEE Security & Privacy Workshop on Deep Learning and Security (IEEE S&P DLS), 2018. [Link]
  8. Alexander Alexeev, Diane Henshel, Karl Levitt, Patrick McDaniel, Brian Rivera, Steve Templeton and Michael J. Weisma, Constructing a Science of Cyber-Resilience for Military Systems, Information Systems and Technology (IST) Panel, IST-153/RWS-21, CEUR Workshop Proceeding, Pages 30-42, October, 2017. [Link]
  9. Z. Berkay Celik, Patrick McDaniel and Rauf Izmailov, Feature Cultivation in Privileged Information-augmented Detection, Proceedings of the International Workshop on Security And Privacy Analytics (IWSPA 2017), 2017. (
    Invited Paper
    ) [Link]
  10. Stefan Achleitner, Thomas La Porta, Patrick McDaniel, Shridatt Sugrim, Srikanth V. Krishnamurthy and Ritu Chadha, Cyber Deception: Virtual Networks to Defend Insider Reconnaissance, Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, ACM, 2016. [Link]
  11. Patrick McDaniel and Robert Walls, Estimating Attack Intent and Mission Impact from Detection Signals, Proceedings of the NATO IST-128 Workshop: Assessing Mission Impact of Cyberattacks, Army Research Laboratory, July, 2015. [Link]
  12. Patrick McDaniel, Trent Jaeger, Thomas La Porta, Nicolas Papernot, Robert Walls, Alexander Kott, Lisa Marvel, Ananthram Swami, Prasant Mohapatra, Srikanth V. Krishnamurthy and Iulian Neamtiu, Security and Science of Agility, First ACM Workshop on Moving Target Defense (MTD 2014), November, 2014. Scottsdale, AZ. [Link]
  13. Joshua Schiffman, Thomas Moyer, Hayawardh Vijayakumar, Trent Jaeger and Patrick McDaniel, Seeding Clouds with Trust Anchors, Proccedings of CCSW 2010: The ACM Cloud Computing Security Workshop, October, 2010. Chicago, IL. [Link]
  14. Stephen McLaughlin, Dmitry Podkuiko, Adam Delozier, Sergei Miadzvezhanka and Patrick McDaniel, Embedded Firmware Diversity for Smart Electric Meters, Proceedings of the 5th Workshop on Hot Topics in Security (HotSec '10), August, 2010. Washington, DC. [Link]
  15. Patrick McDaniel, Kevin Butler, Stephen McLaughlin, Radu Sion, Erez Zadok and Marianne Winslett, Towards a Secure and Efficient System for End-to-End Provenance, the 2nd USENIX Workshop on the Theory and Practice of Provenance, February, 2010. San Jose, CA. [Link]
  16. Thomas La Porta, Patrick McDaniel, Karl Rauscher and Jun Shu, The Impact of Supply Chain on Information and Communications Technology Security, In the 1st Workshop on Workshop on Telecommunications Infrastructure Protection and Security, December, 2009. Honolulu, Hawaii.
  17. Stephen McLaughlin, Dmitry Podkuiko and Patrick McDaniel, Energy Theft in the Advanced Metering Infrastructure, In the 4th International Workshop on Critical Information Infrastructure Security, September, 2009. Bonn, Germany. [Link]
  18. Matthew Blaze and Patrick McDaniel, Below the Salt: The Dangers of Unfulfilled Physical Media Assumptions, In Proceedings of Seventeenth International Workshop on Security Protocols, April, 2009. Cambridge, England. [Link]
  19. Kevin Butler, William Enck, Harri Hursti, Stephen McLaughlin, Patrick Traynor and Patrick McDaniel, Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections Following Project EVEREST, In Proceedings of the 3rd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '08), July, 2008. [Link]
  20. Kevin Butler, Stephen McLaughlin and Patrick McDaniel, Non-Volatile Memory and Disks: Avenues for Policy Architectures, Proceedings of the 1st ACM Computer Security Architectures Workshop, November, 2007. Alexandria, VA. [Link]
  21. William Enck, Sandra Rueda, Yogesh Sreenivasan, Joshua Schiffman, Luke St. Clair, Trent Jaeger and Patrick McDaniel, Protecting Users from "Themselves", Proceedings of the 1st ACM Computer Security Architectures Workshop, November, 2007. Alexandria, VA. [Link]
  22. Boniface Hicks, David King and Patrick McDaniel, Jifclipse: Development Tools for Security-Typed Applications, Proceedings of the 2nd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '07), ACM Press, June, 2007. San Diego, CA. [Link]
  23. Boniface Hicks, Sandra Rueda, Trent Jaeger and Patrick McDaniel, Integration of SELinux and Security-typed Languages, Proceedings of the 2007 Security-Enhanced Linux Workshop, March, 2007. Baltimore, MD. [Link]
  24. Sophie Qiu, Fabian Monrose, Andreas Terzis and Patrick McDaniel, Efficient Techniques for Detecting False Origin Advertisements in Inter-domain Routing, Proceedings of The Second Workshop on Secure Network Protocols (NPSec), November, 2006. Santa Barbara. [Link]
  25. Shiva Chaitanya, Kevin Butler, Patrick McDaniel and Anand Sivasubramaniam, Design, Implementation and Evaluation of Security in iSCSI-based Network Storage Systems, Proceedings of 2nd International Workshop on Storage Security and Survivability (StorageSS 2006), October, 2006. Alexandria, Virginia. [Link]
  26. Trent Jaeger, Patrick McDaniel, Luke St. Clair, Ramon Caceres and Reiner Sailer, Shame on Trust in Distributed Systems, Proceedings of the First Workshop on Hot Topics in Security (HotSec '06), July, 2006. Vancouver, B.C., Canada. [Link]
  27. Kevin Butler, Patrick McDaniel and Sophie Qiu, BGPRV: A Library for Fast and Efficient Routing Data Manipulation, Proceedings of DETER Community Workshop, June, 2006. Arlington, VA. [Link]
  28. Kevin Butler and Patrick McDaniel, Testing Large Scale BGP Security in Replayable Network Environments, Proceedings of DETER Community Workshop, June, 2006. Arlington, VA. [Link]
  29. Boniface Hicks, David King, Patrick McDaniel and Michael Hicks, Trusted Declassification: High-level Policy for a Security-Typed Language, Proceedings of ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, Pages 65-74, June, 2006. Ottawa, Canada. [Link]
  30. Ali Al-Lawati, Dongwon Lee and Patrick McDaniel, Blocking in Private Information Matching, Proceedings of Second International ACM SIGMOD Workshop on Information Quality in Information Systems, June, 2005. Baltimore, MD. [Link]
  31. William Aiello, Charles Kalmanek, Patrick McDaniel, Shubho Sen, Oliver Spatscheck and Jacobus Van der Merwe, Analysis of Communities Of Interest in Data Networks, Passive and Active Measurement Workshop 2005, March, 2005. Boston, M. [Link]
  32. Simon Byers, Lorrie Cranor, David Kormann and Patrick McDaniel, Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine, Proceedings of 2004 Workshop on Privacy Enhancing Technologies (PETS), May, 2004. Toronto, Canad. [Link]
  33. Hao Wang, Somesh Jha, Patrick McDaniel and Miron Livn, Security Policy Reconciliation in Distributed Computing Environments, Proceedings of 5th International Workshop on Policies for Distributed Systems and Networks (Policy 2004), IEEE Computer Society Press, Pages 137-146, June, 2004. Yorktown Heights, N. [Link]
  34. Simon Byers, Lorrie Cranor, Eric Cronin, Dave Kormann and Patrick McDaniel, Analysis of Security Vulnerabilities in the Movie Production and Distribution Process, Proceedings of 2003 ACM Workshop on Digital Rights Management, ACM, October, 2003. Washington, DC, also appeared in Telecommunications Policy Research Conference -- September 2003. [Link]

Patents

  1. U.S. Patent No. 7,873,350, Patrick McDaniel and Martin Strauss, End-to-end secure wireless communication for requesting a more secure channel, January, 2011.
  2. U.S. Patent No. 7,975,044, Oliver Spatscheck, Subhabrata Sen, Jacobus Van der Merwe and Patrick McDaniel, Automated disambiguation of fixed-serverport-based applications from ephemeral applications, July, 2011.
  3. U.S. Patent No. 8,175,580, Patrick McDaniel and Martin Strauss, End-to-end secure wireless communication for requesting a more secure channel, May, 2012.
  4. U.S. Patent No. 8,453,227, William Aiello, Charles Kalmanek, William Leighton III, Patrick McDaniel, Subhabrata Sen, Oliver Spatscheck and Jacobus Van der Merwe, Reverse firewall with self-provisioning, May, 2013.
  5. U.S. Patent No. 8,732,293, Patrick McDaniel, Subhabrata Sen, Oliver Spatscheck and Jacobus Van der Merwe, System and method for tracking individuals on a data network using communities of interest, May, 2014.
  6. U.S. Patent No. 8,813,213, William Aiello, Charles Kalmanek, William Leighton III, Patrick McDaniel, Subhabrata Sen, Oliver Spatscheck and Jacobus Van der Merwe, Reverse firewall with self-provisioning, August, 2014.

Other Publications

  1. Patrick McDaniel and Farinaz Koushanfar, NSF Secure and Trustworthy Computing 2.0 Vision Statement, Public Report, August, 2023. [Link]
  2. Patrick McDaniel, Thorsten Holz, Indra Spiecker, Genannt Dohmann, Christopher Burchard, Ahmad-Reza Sadeghi, Konrad Rieck, Kamalika Chaudhuri, Somesh Jha, Andrea Matwyshyn, David Evans, Felix Freiling and Amy Hasan, Cybersecurity and Machine Learning: Vision Document, Report on the joint NSF/DFG Cybersecurity and Machine Learning Research Workshop, Public Report, National Science Foundation/Deutsche Forschungsgemeinschaf, December, 2021. [Link]
  3. Patrick McDaniel and John Launchbury, Artificial Intelligence and Cybersecurity: Opportunities and Challenges 2019 Technical Workshop Report, Public Report, Networking and Information Technology Research and Development Subcommittee, Machine Learning and Artificial Intelligence Subcommittee, and the Special Cyber Operations Research and Engineering Subcommittee of the National Science and Technology Council, 2020. [Link]
  4. Patrick McDaniel and Avi Rubin, Conference Proceedings, 2008 IEEE Symposium on Security and Privacy, IEEE, May, 2008. Oakland, CA.
  5. Patrick McDaniel, Kevin Butler, William Enck, Harri Hursti, Stephen McLaughlin, Patrick Traynor, Matthew Blaze, Adam Aviv, Pavol Cerny, Sandy Clark, Eric Cronin, Gaurav Shah, Micah Sherr, Giovanni Vigna, Richard Kemmerer, David Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, William Robertson, Fredrik Valeur, Joseph Lorenzo Hall and Laura Quilter, EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing, Ohio Secretary of State, Public Report, 2007. [Link]
  6. Patrick McDaniel and Shyam K. Gupta, Conference Proceedings, The Third International Conference Information Systems Security, Springer, December, 2007. Delhi, India.
  7. Birgit Pfitzmann and Patrick McDaniel, Conference Proceedings, 2007 IEEE Symposium on Security and Privacy, IEEE, May, 2007. Oakland, CA.
  8. Patrick McDaniel, Conference Proceedings, The 14th USENIX Security Symposium, USENIX, August, 2005. Baltimore, MD.
  9. Patrick McDaniel, Policy Evolution: Autonomic Environmental Security, Software Engineering Research Center Showcase, USA, December, 2004. [Link]
  10. Hugh Harney, Uri Meth, Andrea Colegrove, Angela Schuett, Patrick McDaniel, Gavin Kenny, Haitham Cruickshank and Sunil Iyengar, GSAKMP (\it Draft), Internet Research Task Force, August, 2003. [Link]
  11. Patrick McDaniel and Atul Prakash, A Flexible Architecture for Security Policy Enforcement, Proceedings of DARPA Information Survivability Conference and Exposition III, Research Summaries, Pages 234-239, April, 2003. [Link]
  12. Jim Irrer, Atul Prakash and Patrick McDaniel, Antigone: Policy-Based Secure Group Communications Systems and AMirD: Antigone-Based Secure File Mirroring System, Proceedings of DARPA Information Survivability Conference and Exposition III, Demo Summaries, Pages 44-4, April, 2003. [Link]
  13. Patrick McDaniel and Sugih Jamin, Windowed Key Revocation in Public Key Infrastructures, NASA Tech Briefs, Pages 55, August, 2002. [Link]
  14. Patrick McDaniel and Atul Prakash, Antigone Secure Group Communication System, NASA Tech Briefs, 2001. [Link]
  15. Patrick McDaniel, Policy Management in Secure Group Communication, PhD Thesis, University of Michigan, Ann Arbor, MI, August, 2001. [Link]
  16. Patrick McDaniel, Hugh Harney, Andrea Colegrove, Atul Prakash and Peter Dinsmore, Multicast Security Policy Requirements and Building Blocks (\it Draft), Internet Research Task Force, Secure Multicast Research Group (SMuG), November, 2000. [Link]
  17. Tom Hardjono, Hugh Harney, Patrick McDaniel, Andrea Colegrove and Peter Dinsmore, Group Security Policy Token (\it Draft), Internet Research Task Force, Secure Multicast Research Group (SMuG), November, 2001. [Link]
  18. Patrick McDaniel, Hugh Harney, Peter Dinsmore and Atul Prakash, Multicast Security Policy (\it Draft), Internet Research Task Force, Secure Multicast Research Group (SMuG), June, 2000. [Link]
  19. Patrick McDaniel, 8th USENIX Security Symposium Conference Summaries, Potpourri Session, USENIX Login Magazine, Pages 9-12, November, 1999. [Link]
  20. Patrick McDaniel, The Analysis of $D_i$, a Detailed Design Metric on Large Scale Software, Masters Thesis, Ball State University, Muncie, IN, June, 1991. [Link]

Technical Reports

  1. Alban Héon, Ryan Sheatsley, Quinn Burke, Blaine Hoak, Eric Pauley, Yohan Beugin and Patrick McDaniel, Systematic Evaluation of Geolocation Privacy Mechanisms, Technical Report 2309.06263, arXiv preprint, September, 2023. [Link]
  2. Yohan Beugin and Patrick McDaniel, Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (Not Preserving), Technical Report 2306.03825, arXiv preprint, May, 2023. [Link]
  3. Quinn Burke, Yohan Beugin, Blaine Hoak, Rachel King, Eric Pauley, Ryan Sheatsley, Mingli Yu, Ting He, Thomas La Porta and Patrick McDaniel, Securing Cloud File Systems using Shielded Execution, Technical Report 2305.18639, arXiv preprint, May, 2023. [Link]
  4. Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain and Patrick McDaniel, Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices, Technical Report 2208.09776, arXiv preprint, August, 2022. [Link]
  5. Pauley, Eric, Domico, Kyle, Hoak, Blaine, Sheatsley, Ryan, Burke, Quinn, Beugin, Yohan and McDaniel, Patrick, EIPSIM: Modeling Secure IP Address Allocation at Cloud Scale, Technical Report arXiv:2210.14999, arXiv preprint, 2022. [Link]
  6. Bolor-Erdene Zolbayarn, Ryan Sheatsley, Patrick McDaniel, Michael J. Weisman, Sencun Zhu, Shitong Zhu and Srikanth V. Krishnamurthy, Generating Practical Adversarial Network Traffic Flows using NIDSGAN, Technical Report arXiv:2203.06694, arXiv preprint, March, 2022. [Link]
  7. Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman and Patrick McDaniel, On the Robustness of Domain Constraints, Technical Report arXiv:2105.08619, arXiv preprint, 2021. [Link]
  8. Ryan Sheatsley, Nicolas Papernot, Michael J. Weisman, Gunjan Verma and Patrick McDaniel, Adversarial Examples in Constrained Domains, Technical Report arXiv:2011.01183, arXiv preprint, 2020. [Link]
  9. Stefan Achleitner, Quinn Burke, Patrick McDaniel, Trent Jaeger, Thomas La Porta and Srikanth V. Krishnamurthy, MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking, Technical Report INSR-500-TR-0500-2019, Institute of Networking and Security Research, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, January, 2019. [Link]
  10. Michael Norris, Z. Berkay Celik, Patrick McDaniel, Gang Tan, Prasanna Venkatesh, Shulin Zhao and Anand Sivasubramaniam, IoTRepair: Systematically Addressing Device Faults in Commodity IoT (Extended Paper), Technical Report arXiv:2002.07641, arXiv preprint, 2020. [Link]
  11. Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda and Selcuk Uluagac, KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home, Technical Report arXiv:1911.10186, arXiv preprint, 2020. [Link]
  12. Leonardo Babun, Z. Berkay Celik, Patrick McDaniel and Selcuk Uluagac, Real-time Analysis of Privacy-(un)aware IoT Applications, Technical Report arXiv:1911.10461, arXiv preprint, 2019. [Link]
  13. Dan Boneh, Andrew J. Grotto, Patrick McDaniel and Nicolas Papernot, How Relevant is the Turing Test in the Age of Sophisbots?, Technical Report arXiv:1909.00056, arXiv preprint, 2019. [Link]
  14. Chun-Ming Lai, Xiaoyun Wang, Jon W. Chapman, Yu-Cheng Lin, Yu-Chang Ho, Felix Wu, Patrick McDaniel and Hasan Cam, More or Less? Predict the Social Influence of Malicious URLs on Social Media, Technical Report arXiv:1812.02978, arXiv preprint, 2018. [Link]
  15. Dang Tu Nguyen, Chengyu Song, Zhiyun Qian, Srikanth V. Krishnamurthy, Edward J. M. Colbert and Patrick McDaniel, IoTSan: Fortifying the Safety of IoT Systems, Technical Report arXiv:1810.09551, arXiv preprint, 2018. [Link]
  16. Z. Berkay Celik, Earlence Fernandes, Eric Pauley, Gang Tan and Patrick McDaniel, Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities, Technical Report arXiv:1809.06962, arXiv preprint, 2018. [Link]
  17. Giuseppe Petracca, Jens Grossklags, Patrick McDaniel and Trent Jaeger, Regulating Access to System Sensors in Cooperating Programs, Technical Report arXiv:1808.05579, arXiv preprint, 2018. [Link]
  18. Z. Berkay Celik, Patrick McDaniel and Gang Tan, Soteria: Automated IoT Safety and Security Analysis, Technical Report arXiv:1805.08876, arXiv preprint, 2018. [Link]
  19. Nicolas Papernot and Patrick McDaniel, Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust Deep Learning, Technical Report arXiv:1803.04765, arXiv preprint, 2018. [Link]
  20. Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel and Selcuk Uluagac, Sensitive Information Tracking in Commodity IoT, Technical Report arXiv:1802.08307, arXiv preprint, 2018. [Link]
  21. Chun-Ming Lai, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, Felix Wu, Patrick McDaniel and Hasan Cam, Attacking Strategies and Temporal Analysis Involving Facebook Discussion Groups, Technical Report arXiv:1802.04500, arXiv preprint, 2017. [Link]
  22. Abbas Acar, Z. Berkay Celik, Hidayet Aksu, Selcuk Uluagac and Patrick McDaniel, Achieving Secure and Differentially Private Computations in Multiparty Settings, Technical Report arXiv:1707.01871, arXiv preprint, 2017. [Link]
  23. Florian Tramer, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh and Patrick McDaniel, Ensemble Adversarial Training: Attacks and Defenses, Technical Report arXiv:1705.07204, arXiv preprint, 2017. [Link]
  24. Nicolas Papernot and Patrick McDaniel, Extending Defensive Distillation, Technical Report arXiv:1705.05264, arXiv preprint, 2017. [Link]
  25. Florian Tramer, Nicolas Papernot, Ian Goodfellow, Dan Boneh and Patrick McDaniel, The Space of Transferable Adversarial Examples, Technical Report arXiv:1704.03453, arXiv preprint, 2017. [Link]
  26. Z. Berkay Celik, Hidayet Aksu, Abbas Acar, Ryan Sheatsley, Selcuk Uluagac and Patrick McDaniel, Curie: Policy-based Secure Data Exchange, Technical Report arXiv:1702.08342, arXiv preprint, 2017. [Link]
  27. Kathrin Grosse, Praveen Manoharan, Nicolas Papernot, Michael Backes and Patrick McDaniel, On the (Statistical) Detection of Adversarial Examples, Technical Report arXiv:1702.06280, arXiv preprint, 2017. [Link]
  28. Z. Berkay Celik, David Lopez-Paz and Patrick McDaniel, Patient-Driven Privacy Control through Generalized Distillation, Technical Report arXiv:1611.08648, arXiv preprint, 2017. [Link]
  29. Nicolas Papernot, Patrick McDaniel, Arunesh Sinha and Michael Wellman, Towards the Science of Security and Privacy in Machine Learning, Technical Report arXiv:1611.03814, arXiv preprint, 2016. [Link]
  30. Nicolas Papernot, Ian Goodfellow, Ryan Sheatsley, Reuben Feinman and Patrick McDaniel, cleverhans v1.0.0: an adversarial machine learning library, Technical Report arXiv:1610.0076, arXiv preprint, 2016.
  31. Nicolas Papernot and Patrick McDaniel, On the Effectiveness of Defensive Distillation, Technical Report arXiv:1607.05113, arXiv preprint, 2016. [Link]
  32. Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes and Patrick McDaniel, Adversarial Perturbations Against Deep Neural Networks for Malware Classification, Technical Report arXiv:1606.04435, arXiv preprint, 2016. [Link]
  33. Nicolas Papernot, Patrick McDaniel and Ian Goodfellow, Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples, Technical Report arXiv:1605.07277, arXiv preprint, 2016. [Link]
  34. Nicolas Papernot, Patrick McDaniel, Ananthram Swami and Richard Harang, Crafting Adversarial Input Sequences for Recurrent Neural Networks, Technical Report arXiv:1604.08275, arXiv preprint, 2016. [Link]
  35. Z. Berkay Celik, Patrick McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez and Ananthram Swami, Detection under Privileged Information, Technical Report arXiv:1603.09638, arXiv preprint, 2016. [Link]
  36. Vaibhav Rastogi, Drew Davidson, Lorenzo De Carli, Somesh Jha and Patrick McDaniel, Towards Least Privilege Containers with Cimplifier, Technical Report arXiv:1602.08410, arXiv preprint, 2016. [Link]
  37. Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z. Berkay Celik and Ananthram Swami, Practical Black-Box Attacks against Machine Learning, Technical Report arXiv:1602.02697, arXiv preprint, 2016. [Link]
  38. Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matthew Fredrikson, Z. Berkay Celik and Ananthram Swami, The Limitations of Deep Learning in Adversarial Settings, Technical Report arXiv:1511.07528, arXiv preprint, 2015. [Link]
  39. Nicolas Papernot, Patrick McDaniel, Xi Wu, Somesh Jha and Ananthram Swami, Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks, Technical Report arXiv:1511.04508, arXiv preprint, 2015. [Link]
  40. Alexander Kott, Ananthram Swami and Patrick McDaniel, Six Potential Game-Changers in Cyber Security: Towards Priorities in Cyber Science and Engineering, Technical Report arXiv:1511.00509, arXiv preprint, 2015. [Link]
  41. Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau and Patrick McDaniel, I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis, Technical Report arXiv:1404.7431, arXiv preprint, 2014. [Link]
  42. Devin Pohly and Patrick McDaniel, Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols, Technical Report NAS-TR-0188-2016, Institute of Networking and Security Research, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, January, 2016.
  43. Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matthew Fredrikson, Z. Berkay Celik and Ananthram Swami, The Limitations of Deep Learning in Adversarial Settings, Technical Report NAS-TR-0172-2014, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, October, 2016.
  44. Wenhui Hu, Damien Octeau, Patrick McDaniel and Peng Liu, Duet: Library Integrity Verification for Android Applications, Technical Report NAS-TR-0172-2014, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, February, 2016.
  45. Devin Pohly, Stephen McLaughlin, Patrick McDaniel and Kevin Butler, Hi-Fi: Collecting High-Fidelity Whole-System Provenance, Technical Report NAS-TR-0160-2012, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, June, 2016.
  46. Damien Octeau, Somesh Jha and Patrick McDaniel, Retargeting Android Applications to Java Bytecode, Technical Report NAS-TR-0150-2011, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, September, 2011.
  47. Stephen McLaughlin and Patrick McDaniel, Protecting Consumer Privacy from Electric Load Monitoring, Technical Report NAS-TR-0147-2011, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, March, 2011.
  48. William Enck and Patrick McDaniel, Federated Information Flow Control for Mobile Phones, Technical Report NAS-TR-0136-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, July, 2010.
  49. Kevin Butler, Stephen McLaughlin and Patrick McDaniel, Kells: A Protection Framework for Portable Data, Technical Report NAS-TR-0134-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, June, 2010.
  50. Stephen McLaughlin, Dmitry Podkuiko, Adam Delozier, Sergei Miadzvezhanka and Patrick McDaniel, Multi-vendor Penetration Testing in the Advanced Metering Infrastructure, Technical Report NAS-TR-0133-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, June, 2010.
  51. Machigar Ongtang, Kevin Butler and Patrick McDaniel, Porscha: Policy Oriented Secure Content Handling in Android , Technical Report NAS-TR-0132-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, June, 2010.
  52. Joshua Schiffman, Thomas Moyer, Hayawardh Vijayakumar, Trent Jaeger and Patrick McDaniel, Seeding Clouds with Trust Anchors, Technical Report NAS-TR-0127-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, April, 2010.
  53. William Enck, Machigar Ongtang and Patrick McDaniel, TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, Technical Report NAS-TR-0120-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, February, 2010.
  54. Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger and Patrick McDaniel, Justifying Integrity Using a Virtual Machine Verifier, Technical Report NAS-TR-0119-2009, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, August, 2010.
  55. Machigar Ongtang, Stephen McLaughlin, William Enck and Patrick McDaniel, Semantically Rich Application-Centric Security in Android, Technical Report NAS-TR-0116-2009, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, June, 2010.
  56. Stephen McLaughlin, Dmitry Podkuiko and Patrick McDaniel, Energy Theft in the Advanced Metering Infrastructure, Technical Report NAS-TR-0115-2009, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, June, 2010.
  57. Kevin Butler, Stephen McLaughlin, Thomas Moyer, Joshua Schiffman, Patrick McDaniel and Trent Jaeger, Firma: Disk-Based Foundations for Trusted Operating Systems, Technical Report NAS-TR-0114-2009, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, April, 2010.
  58. William Enck, Machigar Ongtang and Patrick McDaniel, On Lightweight Mobile Phone App Certification, Technical Report NAS-TR-0113-2009, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, April, 2010.
  59. Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Thomas La Porta and Patrick McDaniel, On Cellular Botnets: Measuring the Impact of Malicious Devices on the Network Core, Technical Report NAS-TR-0110-2009, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, March, 2010.
  60. Boniface Hicks, Sandra Rueda, Yogesh Sreenivasan, Guruprasad Jakka, David King, Trent Jaeger and Patrick McDaniel, An Architecture for Enforcing End-to-End Security Over Web Applications, Technical Report NAS-TR-0104-2009, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, January, 2009.
  61. Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger and Patrick McDaniel, No Node Is an Island: Shamon Integrity Monitoring Approach, Technical Report NAS-TR-0103-2009, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, February, 2009.
  62. Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Thomas La Porta and Patrick McDaniel, On Cellular Botnets: Measuring the Impact of Malicious Devices on the Network Core, Technical Report NAS-TR-0099-2008, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, Novemeber, 2008.
  63. Kevin Butler, Stephen McLaughlin, Thomas Moyer, Patrick McDaniel and Trent Jaeger, SwitchBlade: Policy-Driven Disk Segmentation, Technical Report NAS-TR-0098-2008, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, November, 2008.
  64. Thomas Moyer, Kevin Butler, Joshua Schiffman, Patrick McDaniel and Trent Jaeger, Scalable Asynchronous Web Content Attestation, Technical Report NAS-TR-0095-2008, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, September, 2008.
  65. William Enck, Machigar Ongtang and Patrick McDaniel, Automated Cellphone Application Certification in Android (or) Mitigating Phone Software Misuse Before It Happens, Technical Report NAS-TR-0094-2008, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, September, 2008.
  66. Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger and Patrick McDaniel, A Logical Specification and Analysis for SELinux MLS Policy, Technical Report NAS-TR-0091-2008, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, July, 2008.
  67. Kevin Butler, Stephen McLaughlin and Patrick McDaniel, Rootkit-Resistant Disks, Technical Report NAS-TR-0089-2008, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, April, 2008.
  68. Patrick Traynor, Joshua Schiffman, Thomas La Porta, Patrick McDaniel, Abhrajit Ghosh and Farooq Anjum, Constructing Secure Localization Systems with Adjustable Granularity, Technical Report NAS-TR-0084-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, December, 2007.
  69. Stephen McLaughlin, Kevin Butler, William Enck and Patrick McDaniel, Genbd - A Generic Block Device, Technical Report NAS-TR-0082-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, November, 2007.
  70. Kevin Butler, Stephen McLaughlin and Patrick McDaniel, Non-Volatile Memory and Disks: Avenues for Policy Architectures, Technical Report NAS-TR-0074-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, June, 2007.
  71. William Enck, Sandra Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger and Patrick McDaniel, Protecting Users From ``Themselves'', Technical Report NAS-TR-0073-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, June, 2007.
  72. Dhananjay Bapat, Kevin Butler and Patrick McDaniel, Towards Automated Privilege Separation, Technical Report NAS-TR-0071-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, May, 2007.
  73. Patrick Traynor, Kevin Butler, William Enck and Patrick McDaniel, Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems, Technical Report NAS-TR-0070-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, May, 2007.
  74. Luke St. Clair, Joshua Schiffman, Trent Jaeger and Patrick McDaniel, Establishing and Sustaining System Integrity via Root of Trust Installation, Technical Report NAS-TR-0067-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, April, 2007.
  75. Boniface Hicks, David King and Patrick McDaniel, Jifclipse: Development Tools for Security-Typed Language, Technical Report NAS-TR-0065-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, April, 2007.
  76. William Enck, Patrick McDaniel and Trent Jaeger, Protecting User Files by Reducing Application Access, Technical Report NAS-TR-0063-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, February, 2007.
  77. Boniface Hicks, Sandra Rueda, Trent Jaeger and Patrick McDaniel, A Logical Specification and Analysis for SELinux MLS Policy, Technical Report NAS-TR-0058-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, January, 2007.
  78. Boniface Hicks, Sandra Rueda, Trent Jaeger and Patrick McDaniel, From Trusted to Secure: Building and Executing Applications that Enforce System Security, Technical Report NAS-TR-0061-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, January, 2007.
  79. Lisa Johansen, Kevin Butler, William Enck, Patrick Traynor and Patrick McDaniel, Grains of SANs: Building Storage Area Networks from Memory Spots, Technical Report NAS-TR-0060-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, January, 2007.
  80. Patrick Traynor, Vikhyath Rao, Trent Jaeger, Patrick McDaniel and Thomas La Porta, From Mobile Phones to Responsible Devices, Technical Report NAS-TR-0059-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, January, 2007.
  81. Anusha Sriraman, Kevin Butler, Patrick McDaniel and Padma Raghavan, Analysis of the IPv4 Address Space Delegation Structure, Technical Report NAS-TR-0057-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, December, 2006.
  82. Luke St. Clair, Joshua Schiffman, Trent Jaeger and Patrick McDaniel, Sum of the Parts: Composing Trust from Validation Primitives, Technical Report NAS-TR-0056-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, November, 2006.
  83. Sophie Qiu, Patrick McDaniel and Fabian Monrose, Toward Valley-Free Inter-domain Routing, Technical Report NAS-TR-0054-2006, Network and Security Research Center, Department of Computer Science and Engineeering, Pennsylvania State University, University Park, PA, USA, October, 2006.
  84. Boniface Hicks, Sandra Rueda, Trent Jaeger and Patrick McDaniel, Integrating SELinux with Security-typed Languages, Technical Report NAS-TR-0052-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, October, 2006.
  85. Patrick Traynor, William Enck, Patrick McDaniel and Thomas La Porta, Mitigating Attacks on Open Functionality in SMS-Capable Networks, Technical Report NAS-TR-0051-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, October, 2006.
  86. Patrick Traynor, Kevin Butler, William Enck, Kevin Borders and Patrick McDaniel, \em malnets: Large-Scale Malicious Networks via Compromised Wireless Access Points, Technical Report NAS-TR-0048-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, September, 2006.
  87. Boniface Hicks, Sandra Rueda, Trent Jaeger and Patrick McDaniel, Breaking Down the Walls of Mutual Distrust: Security-typed Email Using Labeled IPsec, Technical Report NAS-TR-0049-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, September, 2006.
  88. Sunam Ryu, Kevin Butler, Patrick Traynor and Patrick McDaniel, Leveraging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems, Technical Report NAS-TR-0043-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, August, 2006.
  89. Wesam Lootah, William Enck and Patrick McDaniel, TARP: Ticket-based Address Resolution Protocol (\it extended version), Technical Report NAS-TR-0046-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, August, 2006.
  90. Patrick McDaniel, Understanding Equivalance in High-Level and Information Flow Policy, Technical Report NAS-TR-0042-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, July, 2006.
  91. Trent Jaeger, Patrick McDaniel, Luke St. Clair, Ramon Caceres and Reiner Sailer, Shame on Trust in Distributed Systems, Technical Report RC239664 (W0605-129), IBM Research Division, Yorktown Heights, NY, May, 2006.
  92. Lisa Johansen, Kevin Butler, Michael Rowell and Patrick McDaniel, Email Communities of Interest, Technical Report NAS-TR-0040-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, May, 2006.
  93. Boniface Hicks, Kiyan Ahmadizadeh and Patrick McDaniel, From Languages to Systems: Understanding Practical Application Development in Security-typed Languages, Technical Report NAS-TR-0035-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, April, 2006.
  94. Boniface Hicks, David King, Patrick McDaniel and Michael Hicks, Trusted Declassification: High-level policy for a security-typed language, Technical Report NAS-TR-0033-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, March, 2006.
  95. Matthew Pirretti, Patrick Traynor, Patrick McDaniel and Brent Waters, Secure Attribute-Based Systems, Technical Report NAS-TR-0028-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, February, 2006.
  96. William Enck, Kevin Butler, Thomas Richardson and Patrick McDaniel, Securing Non-Volatile Main Memory, Technical Report NAS-TR-0029-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, February, 2006.
  97. Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel and Trent Jaeger, Password Exhaustion: Predicting the End of Password Usefulness, Technical Report NAS-TR-0030-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, February, 2006.
  98. Heesook Choi, Patrick McDaniel and Thomas La Porta, Privacy Preserving Communication in MANETs, Technical Report NAS-TR-0031-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, December, 2005.
  99. Matthew Pirretti, Vijaykrishnan Narayanan, Patrick McDaniel and Bharat Madan, SLAT: Secure Localization with Attack Tolerance, Technical Report NAS-TR-0024-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, August, 2005.
  100. Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks and Patrick McDaniel, Non-Invasive Methods for Host Certification, Technical Report NAS-TR-0025-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, September, 2005.
  101. Sophie Qiu, Patrick McDaniel, Fabian Monrose and Avi Rubin, Characterizing Address Use Structure and Stabillity of Origin Advertizement in Interdomain Routing, Technical Report NAS-TR-0018-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, July, 2005.
  102. Hosam Rowaihy, William Enck, Patrick McDaniel and Thomas La Porta, Limiting Sybil Attacks in Structured Peer-to-Peer Networks, Technical Report NAS-TR-0017-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, July, 2005.
  103. Boniface Hicks, Patrick McDaniel and Ali Hurson, Information Flow Control in Database Security: A Case Study for Secure Programming with Jif, Technical Report NAS-TR-0011-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, Uni versity Park, PA, USA, April, 2005.
  104. Wesam Lootah, William Enck and Patrick McDaniel, TARP: Ticket-Based Address Resolution Protocol, Technical Report NAS-TR-0010-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, June, 2005.
  105. Patrick Traynor, Kevin Butler, William Enck, Jennifer Plasterr, Scott Weaver, John van Bramer and Patrick McDaniel, Privacy-Preserving Web-Based Email, Technical Report NAS-TR-0009-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, June, 2005.
  106. William Enck, Patrick Traynor, Patrick McDaniel and Thomas La Porta, Exploiting Open Functionality in SMS-Capable Cellular Networks, Technical Report NAS-TR-0007-2005, Network and Security Center, Department of Computer Science, Pennsylvania State University, May, 2005.
  107. Boniface Hicks, David King and Patrick McDaniel, Declassification with Cryptographic Functions in a Security-Typed Language, Technical Report NAS-TR-0004-2005, Network and Security Center, Department of Computer Science, Pennsylvania State University, January, 2005.
  108. William Aiello, Kevin Butler and Patrick McDaniel, Path Authentication in Interdomain Routing, Technical Report TR NAS-TR-0002-2004, Network and Security Center, Department of Computer Science and Engineering, Penn State University, November, 2004. [Link]
  109. Dan Pei, William Aiello, Anna Gilbert and Patrick McDaniel, Origin Disturbances in BGP, Technical Report TD-62TJJF8, AT&T Labs - Research, Florham Park, NJ, July, 2004. [Link]
  110. Kevin Butler, Toni Farley, Patrick McDaniel and Jennifer Rexford, A Survey of BGP Security Issues and Solutions, Technical Report TD-5UGJ33, AT&T Labs - Research, Florham Park, NJ, February, 2004. [Link]
  111. Patrick McDaniel and Atul Prakash, Securing Distributed Applications Using a Policy-based Approach, Technical Report TD-5UDKVD, AT&T Labs - Research, Florham Park, NJ, December, 2003. [Link]
  112. William Aiello, John Ioannidis and Patrick McDaniel, Origin Authentication in Interdomain Routing, Technical Report TD-5QHG2G, AT&T Labs - Research, Florham Park, NJ, August, 2003. [Link]
  113. Eric Cronin, Sugih Jamin, Tal Malkin and Patrick McDaniel, On the Performance, Feasibility, and Use of Forward Secure Signatures, Technical Report TD-5QHGBK, AT&T Labs - Research, Florham Park, NJ, August, 2003. [Link]
  114. Simon Byers, Lorrie Cranor, Eric Cronin, Dave Kormann and Patrick McDaniel, Analysis of Security Vulnerabilities in the Movie Production and Distribution Process, Technical Report TD-5N6SJ4, AT&T Labs - Research, Florham Park, NJ, August, 2003. [Link]
  115. Patrick McDaniel, On Context in Authorization Policy, Technical Report TD-5JCJCK, AT&T Labs - Research, Florham Park, NJ, January, 2003. [Link]
  116. Patrick McDaniel and Atul Prakash, An Architecture for Security Policy Enforcement, Technical Report TD-5C6JFV, AT&T Labs - Research, Florham Park, NJ, July, 2002. [Link]
  117. Patrick McDaniel and Atul Prakash, Methods and Limitations of Security Policy Reconciliation, Technical Report TD57-PAW, AT&T Labs - Research, Florham Park, NJ, February, 2002. [Link]
  118. Patrick McDaniel and Atul Prakash, Ismene: Provisioning and Policy Reconciliation in Secure Group Communication, Technical Report CSE-TR-438-00, Electrical Engineering and Computer Science, University of Michigan, December, 2000. [Link]
  119. Patrick McDaniel and Atul Prakash, Lightweight Failure Detection in Secure Group Communication, Technical Report CSE-TR-428-00, Electrical Engineering and Computer Science, University of Michigan, June, 2000. [Link]
  120. Patrick McDaniel and Atul Prakash, Antigone: Implementing Policy in Secure Group Communication, Technical Report CSE-TR-426-00, Electrical Engineering and Computer Science, University of Michigan, May, 2000. [Link]
  121. Patrick McDaniel and Sugih Jamin, Windowed Certificate Revocation, Technical Report CSE-TR-413-99, Electrical Engineering and Computer Science, University of Michigan, November, 1999. [Link]
  122. Patrick McDaniel, Atul Prakash and Peter Honeyman, Antigone: A Flexible Framework for Secure Group Communication, Technical Report 99-2, Center for Information Technology Integration, September, 1999. [Link]
  123. Patrick McDaniel and Avi Rubin, A Response to ``Can We Eliminate Certificate Revocation Lists?'', Technical Report 99.8.1, AT&T Labs - Research, Florham Park, NJ, August, 1999. [Link]
  124. Andrew Adamson, Charles J. Antonelli, Kevin Coffman, Patrick McDaniel and Jim Rees, Secure Distributed Virtual Conferencing: Multicast or Bust, Technical Report 99-1, Center for Information Technology Integration, January, 1999. [Link]
  125. Patrick McDaniel and Sugih Jamin, Windowed Key Revocation in Public Key Infrastructures, Technical Report CSE-TR-376-98, Electrical Engineering and Computer Science, University of Michigan, , 1998. [Link]
  126. Patrick McDaniel and Sugih Jamin, A Scalable Key Distribution Hierarchy, Technical Report CSE-TR-366-98, Electrical Engineering and Computer Science, University of Michigan, , 1998. [Link]
  127. Patrick McDaniel, Peter Honeyman and Atul Prakash, Lightweight Secure Group Communication, Technical Report 98-2, Center for Information Technology Integration, University of Michigan, April, 1998. [Link]
  128. Wayne Zage, Delores Zage, Patrick McDaniel and Irshad Khan, Evaluating Design Metrics on Large-Scale Software, Technical Report SERC-TR-106-P, Software Engineering Resource Center, Purdue University, September, 1991. [Link]

Invited Talks

  1. The Security of AI (what organizations need to know), TEDxUWMadison, Madison, WI, November, 2023.
  2. The Challenges of Machine Learning in Adversarial Settings: A Systems Perspective, Michigan State University, Lansing, MI, November, 2023.
  3. The Security of AI (what organizations need to know), Greater Madison Chamber of Commerce, Madison, WI, September, 2023.
  4. Security’s Role in Achieving Sustainability, Center for Sustainability and the Global Environment, Madison, WI, February, 2023.
  5. Security’s Role in Achieving Sustainability, 29th ACM Conference on Computer and Communications Security (CCS), Los Angeles, CA, November, 2022.
  6. Security, Game Theory, and Their Role in Achieving Sustainability, Conference on Decision and Game Theory for Security, Pittsburgh, PA, October, 2022.
  7. NSF Funding: Why, What and How, School of Computer, Data & Information Sciences, UW-Madison, Madison, WI, October, 2022.
  8. Prognosticating the Future of IoT Security, 2022 IEEE SafeThings Workshop, San Francisco, CA, May, 2022.
  9. The Challenges of Machine Learning in Adversarial Settings: A Systems Perspective, Temple University, Philadelphia, PA, March, 2022.
  10. The Challenges of Machine Learning in Adversarial Settings: A Systems Perspective, CACR Security Speaker Series, Indiana University, Online, August, 2021.
  11. The Challenges of Machine Learning in Adversarial Settings: A Systems Perspective, Robustness of AI Systems to Adversarial Attacks (RAISA3), Online, August, 2020.
  12. The Challenges of Machine Learning in Adversarial Settings: A Systems Perspective, Computer Science Department, University of Wisconsin-Madison, Madison, WI, February, 2020.
  13. The Challenges of Machine Learning in Adversarial Settings, Computer Science Department, Stonybrook University, Stonybrook, NY, December, 2019.
  14. The Challenges of Machine Learning in Adversarial Settings, Cylab Security and Privacy Institute, Carnegie Mellon University, Pittsburgh, PA, December, 2019.
  15. The Challenges of Machine Learning in Adversarial Settings, S2ERC, Ball State University, Muncie, IN, November, 2019.
  16. The Challenges of Machine Learning in Adversarial Settings, Triangle Area Privacy and Security Day, Durham, NC, October, 2019.
  17. AI-Cybersecurity Workshop Briefing to the NITRD and MLAI Subcommittees, NITRD and MLAI Subcommittees Quarterly Meeting, Washington, DC, July, 2019.
  18. Workshop on the Security and Privacy of Machine Learning, Workshop on the Security and Privacy of Machine Learning, International Conference on Machine Learning, Long Beach, CA, June, 2019.
  19. The Challenges of Machine Learning in Adversarial Settings, 2019 Subversion and Assurance of AI Workshop, US National Reconnaissance Office, Washington, DC, March, 2019.
  20. The Challenges of Machine Learning in Adversarial Settings, National Science Foundation, Alexandria, VA, March, 2019.
  21. Convergence of AI and IoT, Intelligence Community Studies Board, Division on Engineering and Physical Sciences, The National Academy of Sciences/Engineering, Washington, DC, February, 2019.
  22. Tracing the Arc of Smartphone Application Security, Duke University, Durham, NC, February, 2019.
  23. The Challenges of Machine Learning in Adversarial Settings, Department of Computer Science, University at Buffalo, Buffalo, NY, November, 2018.
  24. The Challenges of Machine Learning in Adversarial Settings, Department of Computer Science, Purdue University, West Lafeyette, Indiana, November, 2018.
  25. The Challenges of Machine Learning in Adversarial Settings, Computer Science Department, Indiana University of Pennsylvania, Indiana, PA, October, 2018.
  26. The Challenges of Machine Learning in Adversarial Settings, Penn State University Alumni Association, University Park, PA, September, 2018.
  27. The Challenges of Machine Learning in Adversarial Settings, Department of Software and Information Systems, University of North Carolina at Charlotte, Charlotte, NC, February, 2018.
  28. Tracing the Arc of Smartphone Application Security, School of Electrical and Computer Engineering, Georgia Tech University, Atlanta, GA, December, 2017.
  29. Tracing the Arc of Smartphone Application Security, Department of Electrical Engineering and Computer Science, Ohio University, Athens, OH, October, 2017.
  30. Attacks, Defenses, and Impacts of Machine Learning in Adversarial Settings, 2017 Conference on Security and Privacy in Communication Networks (SecureComm), Niagara Falls, Canada, October, 2017.
  31. Attacks, Defenses, and Impacts of Machine Learning in Adversarial Settings, Celebrating 50 Years of Computer Science @ NC State, North Carolina State University, Raleigh, NC, October, 2017.
  32. Tracing the Arc of Smartphone Application Security, Computer Science Department and the Electrical and Computer Engineering Department Seminar Series, Colorado State University, Fort Collins, CO, October, 2017.
  33. Tracing the Arc of Smartphone Application Security, Rochester Institute of Technology, College of Computing and Information Sciences, Rochester, NY, September, 2017.
  34. Tracing the Arc of Smartphone Application Security, University of Texas-Dallas, Department of Computer Science, Dallas, TX, May, 2017.
  35. Tracing the Arc of Smartphone Application Security, 2017 ACM on International Workshop on Security And Privacy Analytics, Scottsdale, AZ, March, 2017.
  36. Tracing the Arc of Smartphone Application Security, The Ohio State University, Department of Computer Science and Engineering, Columbus, OH, March, 2017.
  37. Tracing the Arc of Smartphone Application Security, University of California-Irvine, Computer Science Department, Irvine, CA, March, 2017.
  38. Tracing the Arc of Smartphone Application Security, Virginia Technical University, Department of Computer Science, Blacksburg, VA, March, 2017.
  39. Tracing the Arc of Smartphone Application Security, 12th International Conference on Information Systems Security , Jaipur, India, December, 2016.
  40. Tracing the Arc of Smartphone Application Security, University of Michigan, Ann Arbor, Ann Arbor, MI, November, 2016.
  41. Machine Intelligence in Adversarial Settings, Developing a Normative Framework for Cyberwarfare, United States Naval Academy, Annapolis, MD, September, 2016.
  42. Eight Years of Mobile Smartphone Security, University of Pittsburgh, Pittsburgh, PA, September, 2016.
  43. Eight Years of Mobile Smartphone Security, New Jersey Institute of Technology, Newark, NJ, September, 2016.
  44. Setting a Cyber-Security Baseline for Physical Systems: Terminology, Technologies, and Goals, Pacific Northwest Clean Water Association, webinar, August, 2016.
  45. The Limitations of Machine Learning in Adversarial Settings, 25th International Conference on Computer Communication and Networks (ICCCN 2016), Waikoloa, HI, August, 2016.
  46. Learning from Ourselves: Where are we and where can we go in mobile systems security?, Mobile Security Technologies (MOST) 2016 Workshop, IEEE Computer Society Security and Privacy Workshops, San Jose, CA, May, 2016.
  47. Eight Years of Mobile Smartphone Security, Center for Secure and Dependable Systems (CSDS) Cybersecurity Symposium, Coeur d'Alene, April, 2016.
  48. Eight Years of Mobile Smartphone Security, University of Idaho, Moscow, ID, April, 2016.
  49. Army Installation 2035: Cyber Challenges and Opportunities, US Department of Defense, Arlington, VA, April, 2016.
  50. The Limitations of Machine Learning in Adversarial Settings, Florida Institute on National Security Assured Autonomy Workshop, Fort Myers, FL, February, 2016.
  51. SABOT: Specification-based Payload Generation for Programmable Logic Controllers, Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) , San Francisco, CA, February, 2016.
  52. Seven Years of Mobile Smartphone Security, Computer and Information Sciences Department, Temple University, Philadelphia, PA, January, 2016.
  53. Seven Years of Mobile Smartphone Security, Massachusetts Institute of Technology--Lincoln Labs, Lexington, MA, January, 2016.
  54. Six Years of Mobile Smartphone Security, Information Trust Institute, University of Illinois at Urbana-Champaign, Urbana-Champaign, IL, September, 2015.
  55. The Importance of Measurement and Decision Making to a Science of Security, 2015 IEEE Conference on Communications and Network Security, Florence, Italy, September, 2015.
  56. The Importance of Measurement and Decision Making to a Science of Security, 3rd International Symposium on Resilient Cyber Systems, Philadelphia, PA, August, 2015.
  57. Six Years of Mobile Smartphone Security, CISPA Distinguished Lecture Series, Max Planck Institute/Saarland University, Saarbrucken Germany, July, 2015.
  58. Six Years of Mobile Smartphone Security, Technische Universtat Darmstadt, Darmstadt Germany, July, 2015.
  59. Estimating Attack Intent and Mission Impact From Detection Signals, Workshop on Cyber Attack Detection, Forensics and Attribution for Assessment of Mission Impact, NATO Science and Technology Organization, Information Systems Technology Panel, Istanbul, Turkey, June, 2015.
  60. The Importance of Measurement and Decision Making to a Science of Security, 2015 Symposium And Bootcamp on the Science of Security (Hotsos), University of Illinois at Urbana-Champaign, April, 2015.
  61. Security and Science of Agility, First ACM Workshop on Moving Target Defense (MTD 2014), Scottsdale, AZ, November, 2014.
  62. Evaluating Mobile Smartphone Security: The First Five Years, Computer Science Colloquium Series, Harvard School of Engineering and Applied Sciences, Harvard University, Boston, MA, October, 2014.
  63. A Secondary Internet Revolution: How the Smart Device has Changed the Information Security Landscape, IEEE New Technology Industry Seminar (NTIS `13), Everett, WA, August, 2013.
  64. Geotargeting: Mobile Device Privacy and Security, National Academy of Sciences, Washington DC, February, 2013.
  65. Authentication and Web Security, Security and Privacy in IT-EMTM 604 Guest Lecture, University of Pennsylvania, Philadelphia, PA, February, 2013.
  66. The Realities of Voting: A Retrospective of Ten Years of Information Security and Electronic Voting Systems, 2012 Information Assurance Day, Computer Science Department, Indiana University of Pennsylvania, Indiana, PA, November, 2012.
  67. Permission-based Application Governance; A Step Forward or Backward?, 26th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec'12), Paris, France, July, 2012.
  68. Evaluating Mobile Smartphone Security: The First Four Years, Carnegie Mellon University, Pittsburgh, PA, April, 2012.
  69. Scalable Integrity-Guaranteed AJAX, The 14th Asia-Pacific Web Conference (APWeb), Kunming, China, April, 2012.
  70. Evaluating Mobile Smartphone Application Security, Singapore Management University, Singapore, September, 2011.
  71. Evaluating Mobile Smartphone Application Security, Computer Security Foundations Symposium, Florham Park, NJ, July, 2011.
  72. Security Challenges and Solutions in Mobile Smartphone Applications, Computer Security Foundations Symposium, Domaine de l'Abbaye des Vaux de Cernay, France, June, 2011.
  73. Security Challenges and Solutions in Mobile Smartphone Applications, Computer and Information Science Department, University of Oregon, Eugene, OR, April, 2011.
  74. Identifying (and Addressing) Security and Privacy Issues in Smart Electric Meters, Center for Non-Linear Studies, Los Alamos, NM, February, 2011.
  75. Security Challenges and Solutions in Mobile Smartphone Applications, Department of Software Information Systems College of Computing and Informatics, UNC Charlotte, Charlotte, NC, December, 2010.
  76. Security Challenges and Solutions in Mobile Smartphone Applications, Computer Science Department, Indiana University of Pennsylvania, Indiana, PA, December, 2010.
  77. Security Challenges and Solutions in Mobile Smartphone Applications, Computer Science Department, Georgetown University, Washington D.C., November, 2010.
  78. Security Challenges and Solutions in Mobile Smartphone Applications, Networking and Security Research Center, Computer Science and Engineering, Pennsylvania State University, University Park, PA, October, 2010.
  79. Security Challenges and Solutions in Mobile Smartphone Applications, Security Day Seminar, Penn State University, University Park, PA, October, 2010.
  80. The Changing Vulnerability Landscape, Association for Computing Machinery, Penn State Student Chapter, University Park, PA, September, 2010.
  81. The Changing Vulnerability Landscape, ExxonMobil, Falls Church, VA, March, 2010.
  82. The Impact of Supply Chain on Information and Communications Technology Security, The 1st Workshop on Telecommunications Infrastructure Protection and Security, Honolulu, HI, December, 2000.
  83. Energy Theft in the Advanced Metering Infrastructure, Networking and Security Research Center, Computer Science and Engineering, Pennsylvania State University, State College, PA, October, 2009.
  84. Secure Provenance in High-End Computing Systems, NSF HECURA FSIO PI Meeting, Arlington, VA, August, 2009.
  85. Missing Glue: Architectural Support for Security Annotations, National Science Foundation Security Driven Architecture Workshop, Arlington, VA, July, 2009.
  86. Scalable Integrity-Justified Content Provenance, NSERC ISSNet Workshop, Ottawa, Canada, June, 2009.
  87. Utility Grid Automation and Risk Management, Clean Technology Conference and Expo, Houston, Texas, May, 2009.
  88. Scalable Integrity-Justified Content Provenance, Center for Applied Cybersecurity Research, Indiana University, Bloomington, IN, April, 2009.
  89. Scalable Integrity-Justified Content Provenance, Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI, April, 2009.
  90. What is Security, Dickenson Law School, Penn State University, State College, PA, April, 2009.
  91. Scalable Integrity-Justified Content Provenance, Department of Computer Science and Engineering, Notre Dame University, South Bend, IN, April, 2009.
  92. Electronic Voting: The Good, the Bad, and the Reality, Software Engineering Research Center Showcase, Muncie, IN, November, 2008.
  93. Ohio Voting Systems Integrity: The EVEREST Report, Networking and Security Research Center, Computer Science and Engineering, Pennsylvania State University, State College, PA, October, 2008.
  94. Data Provenance: Challenges and Technology, Cyber Physical System Security Forum, Cyber Security Research and Development Review, Washington DC, October, 2008.
  95. System-Wide Information Flow Enforcement, NICIAR PI Meeting, Washington DC, September, 2008.
  96. Presto: Configuration Management at Massive Scale, NSF Workshop on Assurable and Usable Security Configuration, George Mason University, Fairfax, VA, August, 2008.
  97. Asymmetry in Performance and Security Requirements for I/O in High-end Computing, NSF HECURA FSIO PI Meeting, Arlington, VA, August, 2008.
  98. Authentication and Web Security, Security and Privacy in IT-EMTM 604 Guest Lecture, University of Pennsylvania, Philadelphia, PA, May, 2008.
  99. SPAM and SPAM Mitigation, Computer Science Department, St. Vincent's University, Latrobe, PA, April, 2008.
  100. Phones, The Press, Research and Grad School ... or how to make trouble and have fun doing it, Computer Science Department, St. Vincent's University, Latrobe, PA, April, 2008.
  101. Applications and Services in Telecommunications Networks, NSF Wireless Security Workshop, Georgia Institute of Technology, Atlanta, GA, March, 2008.
  102. Vulnerabilities and Opportunities in SMS-Capable Cellular Networks, Computer Science Department, Carleton University, Ottawa, Canada, March, 2008.
  103. Ohio Voting Systems Integrity: The EVEREST Report, Case-Western Reserve University, Cleveland, OH, February, 2007.
  104. Ohio Voting Systems Integrity: The EVEREST Report, Ohio State University, Columbus, OH, February, 2007.
  105. Ohio Voting Systems Integrity: The EVEREST Report, Ohio University, Athens, OH, February, 2007.
  106. Ohio Voting Systems Integrity: The EVEREST Report, Miami University, Ohio, Oxford, OH, February, 2007.
  107. Ohio Voting Systems Integrity: The EVEREST Report, Bowling Green State University, Bowling Green, OH, February, 2007.
  108. Vulnerabilities and Opportunities in SMS-Capable Cellular Networks, Computer Science Department, Indiana University of Pennsylvania, Indiana, PA, September, 2007.
  109. Asymmetry in Performance and Security Requirements for I/O in High-End Computing, HECIWG FSIO 2007 Workshop, NSF, Arlington, VA, August, 2007.
  110. Toward Valley-Free Interdomain Routing, IEEE International Conference on Communications (ICC) 2007, Glasgow, Scotland, June, 2007.
  111. Extending Developer Tools for Security-Typed Languages, Software Engineering Research Center Fall Showcase, West Lafayette, IN, June, 2007.
  112. Open Functionality in SMS/Cellular Networks, Computer and Information Science, University of Oregon, Eugene, OR, May, 2007.
  113. Open Functionality in SMS/Cellular Networks, Computer Security Symposium, St. Cloud State University, St. Cloud, MN, May, 2007.
  114. Authentication and Web Security, Security and Privacy in IT-EMTM 604 Guest Lecture, University of Pennsylvania, Philadelphia, PA, April, 2007.
  115. Grains of SANs: Building Storage Area Networks from Memory Spots, CISCO Remote Faculty Seminar, University Park, PA, April, 2007.
  116. Grains of SANs: Building Storage Area Networks from Memory Spots, 2007 IEEE Security and Privacy Crystal Ball Workshop, Hawthorne, NY, January, 2007.
  117. Password Exhaustion: Predicting the End of Password Usefulness, 2nd International Conference on Information Systems Security , Kolkata, India, December, 2006.
  118. Privacy Preserving Web-based Email, 2nd International Conference on Information Systems Security, Kolkata, India, December, 2006.
  119. Physical and Digital Convergence: Where the Internet is the Enemy, Eighth International Conference on Information and Communications Security (ICICS '06), Raleigh, NC, December, 2006.
  120. Extending Developer Tools for Security-Typed Languages, Software Engineering Research Center Fall Showcase, Muncie, IN, November, 2006.
  121. Open Functionality in SMS/Cellular Networks, Johns Hopkins University, Computer Science Department, Baltimore, MD, September, 2006.
  122. Open Functionality in SMS/Cellular Networks, George Mason University, Computer Science Department, Fairfax, VA, September, 2006.
  123. Exploiting Open Functionality in SMS-Capable Cellular Networks, Motorola Security Symposium, Itasca, Il, September, 2006.
  124. lseb: Testing Large Scale BGP Security in Replayable Network Environments, NSF/DETER Community Workshop, Arlington, VA, June, 2006.
  125. BGPRV: A Library for Fast and Efficient Routing Data Manipulation, NSF/DETER Community Workshop, Arlington, VA, June, 2006.
  126. JifClipse: Extending Developer Tools for Security-Typed Languages, Software Engineering Research Center Spring Showcase, Shaumburg, IL, June, 2006.
  127. Trends in Security: Critical Engineering in the Large, Schlumberger InnovateIT! 2006, Cambridge, MA, May, 2006.
  128. Information Flow Revisited: Software Engineering to Provable Security, Network Center of Excellence, Motorola Labs, Shaumburg, IL, May, 2006.
  129. Authentication and Web Security, Security and Privacy in IT-EMTM 604 Guest Lecture, University of Pennsylvania, Philadelphia, PA, April, 2006.
  130. Exploiting Open Functionality in SMS-Capable Cellular Networks, InfraGard Pittsburgh Chapter General Meeting, Pittsburgh, PA, March, 2006.
  131. Exploiting Open Functionality in SMS-Capable Cellular Networks, Computer Science Department, University of Virginia, Charlottesville, VA, January, 2006.
  132. Software Engineering Tools for Security-Typed Languages: Using Eclipse to Make Secure Programming Practical, Software Engineering Research Center Showcase, Muncie, IN, November, 2005.
  133. Exploiting Open Functionality in SMS-Capable Cellular Networks, AT&T IP Services Security Council, Middletown, NJ, October, 2005.
  134. Exploiting Open Functionality in SMS-Capable Cellular Networks, Computer Science Department, Carnegie Mellon University, Pittsburgh, PA, October, 2005.
  135. Exploiting Open Functionality in SMS-Capable Cellular Networks, Computer Science Department, Yale University, New Haven, CT, October, 2005.
  136. Exploiting Open Functionality in SMS-Capable Cellular Networks, Computer Science Department, SUNY-Stony Brook, Stony Brook, NY, October, 2005.
  137. Exploiting Open Functionality in SMS-Capable Cellular Networks, Networking and Security Research Center, Computer Science and Engineering, Pennsylvania State University, State College, PA, October, 2005.
  138. lseb: Trace Driven Modeling of Internet-Scale BGP Attacks and Countermeasures, 2nd Annual DETER/EMIST Workshop, Newport Beach, CA, September, 2005.
  139. Critical Infrastructure Security through Provably Secure Network Mediation, 2nd Japan/US Workshop on Critical Information Infrastructure Protection (CIIP), Tokyo, Japan, June, 2005.
  140. Extending Developer Tools for Security-typed Languages, Software Engineering Research Center Showcase, West Lafayette, IN, June, 2005.
  141. Origin Authentication in Interdomain Routing, 2005 IEEE Communications Quality and Reliability (CQR) International Workshop, St. Petersburg, FL, April, 2005.
  142. Analysis of Security Vulnerabilities in the Movie Production and Distribution Process, Messiah College, Senior Seminar Series, Grantham, PA, April, 2005.
  143. Origin Authentication in Interdomain Routing, Intel Research, Folsom CA, April, 2005.
  144. Key Distribution Strategies For Low-Power Wireless Networks, Network Center of Excellence, Motorola Labs, Shaumburg, IL, April, 2005.
  145. Policy Evolution: Autonomic Environmental Security, Software Engineering Research Center Showcase, Muncie, IN, December, 2004.
  146. Information Assurance for Enterprise Networks, BAE Systems, Networking Seminar, Reston, VA, November, 2004.
  147. Origin Authentication in Interdomain Routing, Computer Science Department, Purdue University, West Lafayette, IN, October, 2004.
  148. Origin Authentication in Interdomain Routing, Electrical Engineering and Computer Science Department, University of Michigan, Ann Arbor, MI, October, 2004.
  149. Origin Authentication in Interdomain Routing, Computer Science Department, University of Wisconsin, Madison, MD, September, 2004.
  150. Analysis of Security Vulnerabilities in the Movie Production and Distribution Process, Computer Science and Engineering Student Organization, University Park, PA, September, 2004.
  151. Useless Metaphors? Why Specifying Policy is So Hard, Workshop on Usable Privacy and Security Software, Center for Discrete Mathematics and Theoretical Computer Science (DIMACS), New Brunswick, New Jersey, July, 2004.
  152. Analysis of Security Vulnerabilities in the Movie Production and Distribution Process, Information Systems Research Seminar, Stern School of Business, New York University, New York, NY, April, 2004.
  153. Analysis of Security Vulnerabilities in the Movie Production and Distribution Process, Ball State University, Muncie, IN, April, 2004.
  154. Origin Authentication in Interdomain Routing, Computer Science Department, University of Illinois, Champaign, IL, March, 2004.
  155. Origin Authentication in Interdomain Routing, Computer Science and Engineering Department, University of Minnesota, Minneapolis, MN, March, 2004.
  156. Origin Authentication in Interdomain Routing, Computer Science Department, Johns Hopkins University, Baltimore, MD, March, 2004.
  157. Origin Authentication in Interdomain Routing, Department of Computer Science, University of Massachusetts - Amherst, Amherst, MA, March, 2004.
  158. Origin Authentication in Interdomain Routing, Computer Science and Engineering Department, Penn State University, University Park, PA, March, 2004.
  159. Origin Authentication in Interdomain Routing, School of Electrical Engineering and Computer Science, Oregon State University, Corvallis, OR, February, 2004.
  160. Origin Authentication in Interdomain Routing, Computer Science Department, Northwestern University, Evanston, IL, February, 2004.
  161. Origin Authentication in Interdomain Routing, Computer Science Department, SUNY-Stony Brook, Stony Brook, NY, February, 2004.
  162. Attack Profiling and Simulation in Interdomain Routing, P2INGS Quarterly Meeting, Tempe, AZ, February, 2004.
  163. Analysis of Security Vulnerabilities in the Movie Production and Distribution Process, AT&T Finance Lunch, Morristown, NJ, January, 2004.
  164. Origin Authentication in Interdomain Routing, AT&T IP Security Conference, Middletown, NJ, November, 2003.
  165. Origin Authentication in Interdomain Routing, 10th ACM Conference on Computer and Communications Security (CCS), Washington, DC, October, 2003.
  166. Origin Authentication in Interdomain Routing, Computer Science Department, Stevens Institute of Technology, Hoboken, NJ, October, 2003.
  167. Origin Authentication in Interdomain Routing, Computer Science Department, Arizona State University, Mesa, AZ, September, 2003.
  168. Analysis of Security Vulnerabilities in the Movie Production and Distribution Process, 31st Technology Policy Research Conference (TPRC), Arlington, VA, September, 2003.
  169. On Context in Authorization Policy, 8th ACM Symposium on Access Control Models and Technologies, Como, Italy, June, 2003.
  170. The Antigone Project, DARPA Principal Investigator Meeting, San Antonio, TX, January, 2003.
  171. Methods and Limitations of Security Policy Reconciliation, 2002 IEEE Symposium on Security and Privacy, Oakland, CA, May, 2002.
  172. Policy Management in Distributed Systems, Cigital, Washington, DC, April, 2002.
  173. Antigone: Policy Management in Secure Group Communication, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, April, 2001.
  174. Antigone: Policy Management in Secure Group Communication, Computer Science Department, University of Wisconsin, Madison, MD, April, 2001.
  175. Antigone: Policy Management in Secure Group Communication, Computer Science Department, University of Maryland, College Park, MD, April, 2001.
  176. Antigone: Policy Management in Secure Group Communication, Computer Science Department, University of North Carolina, Chapel Hill, Chapel Hill, NC, April, 2001.
  177. Antigone: Policy Management in Secure Group Communication, Computer Science Department, Johns Hopkins University, Baltimore, MD, March, 2001.
  178. Antigone: Policy Management in Secure Group Communication, AT&T Shannon Laboratory, Florham Park, NJ, February, 2001.
  179. Antigone: Policy Management in Secure Group Communication, Telcordia Applied Research Laboratory, Morristown, NJ, February, 2001.
  180. Policy Problem Area 3 - Overview and Requirements, Internet Engineering Task Force MSEC BOF, San Diego, CA, December, 2000.
  181. Multicast Security Policy Requirements and Building Blocks, Quarterly Secure Multicast Research Group Meeting (SMuG), San Diego, CA, December, 2000.
  182. Antigone: Implementing Policy in Secure Multiparty Communication, Systems Design and Implementation (SDI) / Laboratory for Computer Systems (LCS) seminar series, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, November, 2000.
  183. Secure Group Communication in Antigone 2.0, 11th Annual IPoCSE Research Symposium, Ann Arbor, MI, October, 2000.
  184. Antigone Secure Group Communication, Bi-Annual DARPA Visit, Software System Research Laboratory, Ann Arbor, MI, September, 2000.
  185. Problem Area 3: Policy, Quarterly Secure Multicast Research Group Meeting (SMuG), Pittsburgh, PA, July, 2000.
  186. Windowed Certificate Revocation, IEEE INFOCOM 2000, Tel Aviv, Israel, March, 2000.
  187. A Response to `Can We Eliminate Certificate Revocation Lists?', Financial Cryptography 2000, Anguilla, British West Indies, February, 2000.
  188. Multicast Security Policy Definition, Quarterly Secure Multicast Research Group Meeting (SMuG), Washington, DC, November, 1999.
  189. Antigone: A Flexible Framework for Secure Group Communication, Quarterly Secure Multicast Research Group Meeting (SMuG, NAI Labs, Baltimore, MD, September, 1999.
  190. Antigone: A Flexible Framework for Secure Group Communication, 10th Annual IPoCSE Research Symposium, Ann Arbor, MI, September, 1999.
  191. Antigone: A Flexible Framework for Secure Group Communication, 8th USENIX Security Symposium, Washington, DC, August, 1999.
  192. Antigone: A Flexible Framework for Secure Group Communication, IBM Watson Security Seminar, Westchester County, NY, July, 1999.
  193. Windowed Revocation in Public Key Infrastructures, Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI, September, 1998.
  194. Scalable Key Distribution Hierarchy, 9th Annual IPoCSE Research Symposium, Ann Arbor, MI, March, 1998.
  195. JavaLauncher Applet Platform, NASA, Kennedy Space Center Security Seminar, Kennedy Space Center, FL, January, 1998.
  196. Secure High Performance Group Communication, Directed Study Defense, Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI, September, 1997.

Tutorials

  1. Understanding Android's Security Framework, ACM Conference on Computer and Communications Security (CCS), New York, NY, October, 2008.
  2. Web Security, The Thirteenth International World Wide Web Conference (WWW2004), New York, NY, May, 2004.
  3. Network and Information Security, Regional Laboratory for Network Engineering Research and Training Institute, National Science Foundation,Jackson State University, Jackson, MS, March, 2003.

Patrick McDaniel - patrickmcdaniel.org