Patrick Traynor

Orcid: 0000-0002-7143-5189

According to our database1, Patrick Traynor authored at least 120 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Every Breath You Don't Take: Deepfake Speech Detection Using Breath.
CoRR, 2024

Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations.
Proceedings of the 33rd USENIX Security Symposium, 2024

SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets.
Proceedings of the 33rd USENIX Security Symposium, 2024

Examining Cryptography and Randomness Failures in Open-Source Cellular Cores.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

"Better Be Computer or I'm Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake Detectors.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

"I Had Sort of a Sense that I Was Always Being Watched...Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing Applications.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Blue's Clues: Practical Discovery of Non-Discoverable Bluetooth Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

LeopardSeal: Detecting Call Interception via Audio Rogue Base Stations.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023

"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Analyzing the Monetization Ecosystem of Stalkerware.
Proc. Priv. Enhancing Technol., 2022

Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction.
Proceedings of the 31st USENIX Security Symposium, 2022

FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Demystifying Limited Adversarial Transferability in Automatic Speech Recognition Systems.
Proceedings of the Tenth International Conference on Learning Representations, 2022

HallMonitor: A Framework for Identifying Network Policy Violations in Software.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

SMS OTP Security (SOS): Hardening SMS-Based Two Factor Authentication.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Credit Card Fraud Is a Computer Security Problem.
IEEE Secur. Priv., 2021

Privacy-Preserving Localization using Enclaves.
Proceedings of the 12th IEEE Annual Ubiquitous Computing, 2021

SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021

Beyond L<sub>p</sub> Clipping: Equalization based Psychoacoustic Attacks against ASRs.
Proceedings of the Asian Conference on Machine Learning, 2021

2020
Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Truly Visual Caller ID? An Analysis of Anti-Robocall Applications and their Accessibility to Visually Impaired Users.
Proceedings of the IEEE International Symposium on Technology and Society, 2020

On the Detection of Disinformation Campaign Activity with Network Analysis.
Proceedings of the CCSW'20, 2020

2019
Characterizing the Security of the SMS Ecosystem with Public Gateways.
ACM Trans. Priv. Secur., 2019

Outsourcing computation for private function evaluation.
Int. J. Inf. Comput. Secur., 2019

More Cowbell: Lessons Learned in Developing the Skim Reaper.
IEEE Secur. Priv., 2019

Toward Automated Firmware Analysis in the IoT Era.
IEEE Secur. Priv., 2019

Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems.
CoRR, 2019

Enclave-based privacy-preserving localization: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Characterizing security and privacy practices in emerging digital credit applications.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

A Practical Intel SGX Setting for Linux Containers in the Cloud.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Examining DES-based Cipher Suite Support within the TLS Ecosystem.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

A Hybrid Approach to Secure Function Evaluation using SGX.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
OnionDNS: a seizure-resistant top-level domain.
Int. J. Inf. Sec., 2018

Hello, Is It Me You're Looking For?: Differentiating Between Human and Electronic Speakers for Voice Interface Security.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.
Proceedings of the 27th USENIX Security Symposium, 2018

Fear the Reaper: Characterization and Fast Detection of Card Skimmers.
Proceedings of the 27th USENIX Security Symposium, 2018

The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding Jitter.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Mitigating Risk while Complying with Data Retention Laws.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2MA: Verifying Voice Commands via Two Microphone Authentication.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

A Large Scale Investigation of Obfuscation Use in Google Play.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Detecting Mobile Malicious Webpages in Real Time.
IEEE Trans. Mob. Comput., 2017

Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications.
ACM Trans. Priv. Secur., 2017

Phonion: Practical Protection of Metadata in Telephony Networks.
Proc. Priv. Enhancing Technol., 2017

FinTechSec: Addressing the Security Challenges of Digital Financial Services.
IEEE Secur. Priv., 2017

AuthentiCall: Efficient Identity and Content Authentication for Phone Calls.
Proceedings of the 26th USENIX Security Symposium, 2017

Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Privacy preserving localization using a distributed particle filtering protocol.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

2016
Outsourcing secure two-party computation as a black box.
Secur. Commun. Networks, 2016

Secure outsourced garbled circuit evaluation for mobile devices.
J. Comput. Secur., 2016

OPFE: Outsourcing Computation for Private Function Evaluation.
IACR Cryptol. ePrint Arch., 2016

*droid: Assessment and Evaluation of Android Application Analysis Tools.
ACM Comput. Surv., 2016

Detecting SMS Spam in the Age of Legitimate Bulk Messaging.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Making USB Great Again with USBFILTER.
Proceedings of the 25th USENIX Security Symposium, 2016

AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels.
Proceedings of the 25th USENIX Security Symposium, 2016

Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation.
Proceedings of the Financial Cryptography and Data Security, 2016

Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Efficient and secure template blinding for biometric authentication.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
An Empirical Evaluation of Security Indicators in Mobile Web Browsers.
IEEE Trans. Mob. Comput., 2015

Accountable wiretapping - or - I know they can hear you now.
J. Comput. Secur., 2015

Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World.
Proceedings of the 24th USENIX Security Symposium, 2015

Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge.
Proceedings of the 24th USENIX Security Symposium, 2015

More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

OnionDNS: A seizure-resistant top-level Domain.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Uncovering Use-After-Free Conditions in Compiled Code.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
For your phone only: custom protocols for efficient secure function evaluation on mobile devices.
Secur. Commun. Networks, 2014

Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices.
IACR Cryptol. ePrint Arch., 2014

2013
MAST: triage for market-scale mobile malware analysis.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Why is my smartphone slow? On the fly diagnosis of underperformance on the mobile Internet.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens.
ACM Trans. Internet Techn., 2012

Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services.
IEEE Trans. Mob. Comput., 2012

ARDEN: Anonymous networking in delay tolerant networks.
Ad Hoc Networks, 2012

Under New Management: Practical Attacks on SNMPv3.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012

Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road?
Proceedings of the Information Security - 15th International Conference, 2012

VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security.
Proceedings of the Information Systems Security, 8th International Conference, 2012

Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties.
Proceedings of the Computer Security - ESORICS 2012, 2012

Short paper: rethinking permissions for mobile web apps: barriers and the road ahead.
Proceedings of the SPSM'12, 2012

2011
Improving Authentication Performance of Distributed SIP Proxies.
IEEE Trans. Parallel Distributed Syst., 2011

From mobile phones to responsible devices.
Secur. Commun. Networks, 2011

No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects.
Proceedings of the Network and Distributed System Security Symposium, 2011

Impeding Individual User Profiling in Shopper Loyalty Programs.
Proceedings of the Financial Cryptography and Data Security, 2011

(sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

"Mix-in-Place" anonymous networking using secure function evaluation.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

Automated remote repair for mobile malware.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
malnets: large-scale malicious networks <i>via</i> compromised wireless access points.
Secur. Commun. Networks, 2010

Secure attribute-based systems.
J. Comput. Secur., 2010

Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks.
Proceedings of the 2010 USENIX Annual Technical Conference, 2010

Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware.
Proceedings of the Global Communications Conference, 2010

Evaluating Bluetooth as a Medium for Botnet Command and Control.
Proceedings of the Detection of Intrusions and Malware, 2010

PinDr0p: using single-ended audio features to determine call provenance.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems.
IEEE Trans. Parallel Distributed Syst., 2009

Mitigating attacks on open functionality in SMS-capable cellular networks.
IEEE/ACM Trans. Netw., 2009

Securing Cellular Infrastructure: Challenges and Opportunities.
IEEE Secur. Priv., 2009

On cellular botnets: measuring the impact of malicious devices on a cellular network core.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Robust signatures for kernel data structures.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Leveraging Cellular Infrastructure to Improve Fraud Prevention.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Noninvasive Methods for Host Certification.
ACM Trans. Inf. Syst. Secur., 2008

Exploiting open functionality in SMS-capable cellular networks.
J. Comput. Secur., 2008

Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Proceedings of the Network and Distributed System Security Symposium, 2008

Security for Telecommunications Networks
Advances in Information Security 40, Springer, ISBN: 978-0-387-72441-6, 2008

2007
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks.
IEEE Trans. Mob. Comput., 2007

2006
The effects of probabilistic key management on secure routing in sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Efficient Group Mobility for Heterogeneous Sensor Networks.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

Non-Invasive Methods for Host Certification.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks.
Proceedings of the 4th International Conference on Mobile Systems, 2006

Establishing Pair-Wise Keys in Heterogeneous Sensor Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Password Exhaustion: Predicting the End of Password Usefulness.
Proceedings of the Information Systems Security, Second International Conference, 2006

Privacy Preserving Web-Based Email.
Proceedings of the Information Systems Security, Second International Conference, 2006

Identification of Patients with Coronary Heart Disease: Meeting Regulatory Standards vs. Improving Overall Care.
Proceedings of the AMIA 2006, 2006


  Loading...