Patrick D. McDaniel
Orcid: 0000-0003-2091-7484Affiliations:
- University of Wisconsin-Madison, WI, USA
- Pennsylvania State University, School of Electrical Engineering and Computer Science (former)
According to our database1,
Patrick D. McDaniel
authored at least 247 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on eecs.psu.edu
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE/ACM Trans. Netw., August, 2024
Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving).
Proc. Priv. Enhancing Technol., January, 2024
A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems.
CoRR, 2024
Proceedings of the IEEE Security and Privacy, 2024
Proceedings of the Second Tiny Papers Track at ICLR 2024, 2024
2023
IEEE Trans. Parallel Distributed Syst., August, 2023
Mob. Networks Appl., August, 2023
IEEE Trans. Software Eng., June, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the IEEE Military Communications Conference, 2023
Proceedings of the IEEE Military Communications Conference, 2023
Proceedings of the IEEE Military Communications Conference, 2023
The CVE Wayback Machine: Measuring Coordinated Disclosure from Exploits against Two Years of Zero-Days.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
Proceedings of the IEEE Global Communications Conference, 2023
2022
IEEE/ACM Trans. Netw., 2022
IEEE Trans. Netw. Serv. Manag., 2022
Who's Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment.
ACM Trans. Internet Things, 2022
ACM Trans. Internet Things, 2022
Proc. Priv. Enhancing Technol., 2022
J. Comput. Secur., 2022
CoRR, 2022
Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations.
CoRR, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE/ACM Trans. Netw., 2021
MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking.
IEEE Trans. Netw. Serv. Manag., 2021
Proc. Priv. Enhancing Technol., 2021
Comput. Networks, 2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IoTRepair: Systematically Addressing Device Faults in Commodity IoT (Extended Paper).
CoRR, 2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Improving Robustness of a Popular Probabilistic Clustering Algorithm Against Insider Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
2019
IEEE/ACM Trans. Netw., 2019
IEEE Secur. Priv., 2019
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities.
ACM Comput. Surv., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Application Transiency: Towards a Fair Trade of Personal Information for Application Services.
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
CoRR, 2018
CoRR, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 6th International Conference on Learning Representations, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Netw. Serv. Manag., 2017
IEEE Secur. Priv., 2017
Proceedings of the Symposium on SDN Research, 2017
Proceedings of the Symposium on SDN Research, 2017
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017
Proceedings of the 13th International Conference on Network and Service Management, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
IEEE Trans. Software Eng., 2016
Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples.
CoRR, 2016
Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples.
CoRR, 2016
CoRR, 2016
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
2015
Six Potential Game-Changers in Cyber Security: Towards Priorities in Cyber Science and Engineering.
CoRR, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 2015 ACM Internet Measurement Conference, 2015
Composite Constant Propagation: Application to Android Inter-Component Communication Analysis.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2014
Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
ACM Trans. Comput. Syst., 2014
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
CoRR, 2014
TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones.
Commun. ACM, 2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the Ninth Conference on Semantic Technology for Intelligence, 2014
FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 2014 IEEE Military Communications Conference, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the First ACM Workshop on Moving Target Defense, 2014
2013
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
2012
Secur. Commun. Networks, 2012
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012
Proceedings of the Security and Privacy in Communication Networks, 2012
Proceedings of the 5th International Symposium on Communications, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
ACM Trans. Inf. Syst. Secur., 2010
malnets: large-scale malicious networks <i>via</i> compromised wireless access points.
Secur. Commun. Networks, 2010
IEEE Secur. Priv., 2010
IEEE Secur. Priv., 2010
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010
Proceedings of the IEEE 26th Symposium on Mass Storage Systems and Technologies, 2010
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware.
Proceedings of the Global Communications Conference, 2010
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks.
Wirel. Networks, 2009
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems.
IEEE Trans. Parallel Distributed Syst., 2009
IEEE/ACM Trans. Netw., 2009
IEEE J. Sel. Areas Commun., 2009
Proceedings of the Critical Information Infrastructures Security, 2009
On cellular botnets: measuring the impact of malicious devices on a cellular network core.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Guest Editors' Introduction: Special Section on Software Engineering for Secure Systems.
IEEE Trans. Software Eng., 2008
J. Comput. Secur., 2008
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
Advances in Information Security 40, Springer, ISBN: 978-0-387-72441-6, 2008
2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
From Trusted to Secure: Building and Executing Applications That Enforce System Security.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007
Proceedings of the 2007 USENIX Annual Technical Conference, 2007
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Proceedings of the Information Systems Security, Third International Conference, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
ACM Trans. Inf. Syst. Secur., 2006
J. Comput. Secur., 2006
Int. J. Distributed Sens. Networks, 2006
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006
Design, implementation and evaluation of security in iSCSI-based network storage systems.
Proceedings of the 2006 ACM Workshop On Storage Security And Survivability, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006
Proceedings of the Network and Distributed System Security Symposium, 2006
Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Proceedings of the Passive and Active Network Measurement, 6th International Workshop, 2005
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005
Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior.
Proceedings of the Information Systems Security, First International Conference, 2005
2004
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing.
Proceedings of the Network and Distributed System Security Symposium, 2003
Analysis of security vulnerabilities in the movie production and distribution process.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2001
Proceedings of the Network and Distributed System Security Symposium, 2001
2000
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000
Proceedings of the Financial Cryptography, 2000
1999
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999
Secure Distributed Virtual Conferencing.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999