Patrick Traynor
Patrick Traynor
Verified email at cise.ufl.edu - Homepage
Title
Cited by
Cited by
Year
Secure attribute-based systems
M Pirretti, P Traynor, P McDaniel, B Waters
Journal of Computer Security 18 (5), 799-837, 2010
6862010
Exploiting open functionality in SMS-capable cellular networks
P Traynor, W Enck, P McDaniel, T La Porta
Journal of Computer Security 16 (6), 713-742, 2008
319*2008
Cryptolock (and drop it): stopping ransomware attacks on user data
N Scaife, H Carter, P Traynor, KRB Butler
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
2892016
On cellular botnets: measuring the impact of malicious devices on a cellular network core
P Traynor, M Lin, M Ongtang, V Rao, T Jaeger, P McDaniel, T La Porta
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2872009
Mast: Triage for market-scale mobile malware analysis
S Chakradeo, B Reaves, P Traynor, W Enck
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
2082013
(sp) iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers
P Marquardt, A Verma, H Carter, P Traynor
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1922011
Robust signatures for kernel data structures
B Dolan-Gavitt, A Srivastava, P Traynor, J Giffin
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1792009
Mitigating attacks on open functionality in SMS-capable cellular networks
P Traynor, W Enck, P McDaniel, T La Porta
IEEE/ACM Transactions on Networking 17 (1), 40-53, 2008
1512008
Efficient hybrid security mechanisms for heterogeneous sensor networks
P Traynor, R Kumar, H Choi, G Cao, S Zhu, T La Porta
IEEE Transactions on mobile computing 6 (6), 663-677, 2007
1302007
Establishing pair-wise keys in heterogeneous sensor networks
P Traynor, H Choi, G Cao, S Zhu, T La Porta
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006
1272006
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens
I Dacosta, S Chakradeo, M Ahamad, P Traynor
ACM Transactions on Internet Technology (TOIT) 12 (1), 1-24, 2012
121*2012
Evaluating bluetooth as a medium for botnet command and control
K Singh, S Sangal, N Jain, P Traynor, W Lee
International Conference on Detection of Intrusions and Malware, and …, 2010
1122010
Secure outsourced garbled circuit evaluation for mobile devices
H Carter, B Mood, P Traynor, K Butler
Journal of Computer Security 24 (2), 137-180, 2016
1042016
On attack causality in internet-connected cellular networks
P Traynor, P McDaniel, T La Porta
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium …, 2007
982007
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
962017
Measuring SSL indicators on mobile browsers: Extended life, or end of the road?
C Amrutkar, P Traynor, PC Van Oorschot
International Conference on Information Security, 86-103, 2012
86*2012
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
C Lever, M Antonakakis, B Reaves, P Traynor, W Lee
NDSS, 2013
782013
Trust no one else: Detecting MITM attacks against SSL/TLS without third-parties
I Dacosta, M Ahamad, P Traynor
European Symposium on Research in Computer Security, 199-216, 2012
732012
PinDr0p: using single-ended audio features to determine call provenance
VA Balasubramaniyan, A Poonawalla, M Ahamad, MT Hunter, P Traynor
Proceedings of the 17th ACM conference on Computer and communications …, 2010
702010
Frigate: A validated, extensible, and efficient compiler and interpreter for secure computation
B Mood, D Gupta, H Carter, K Butler, P Traynor
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 112-127, 2016
692016
The system can't perform the operation now. Try again later.
Articles 1–20