Patrick Traynor
Orcid: 0000-0002-7143-5189
According to our database1,
Patrick Traynor
authored at least 120 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations.
Proceedings of the 33rd USENIX Security Symposium, 2024
SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
"Better Be Computer or I'm Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake Detectors.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
"I Had Sort of a Sense that I Was Always Being Watched...Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing Applications.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023
"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proc. Priv. Enhancing Technol., 2022
Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Demystifying Limited Adversarial Transferability in Automatic Speech Recognition Systems.
Proceedings of the Tenth International Conference on Learning Representations, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Proceedings of the 12th IEEE Annual Ubiquitous Computing, 2021
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021
Beyond L<sub>p</sub> Clipping: Equalization based Psychoacoustic Attacks against ASRs.
Proceedings of the Asian Conference on Machine Learning, 2021
2020
Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Truly Visual Caller ID? An Analysis of Anti-Robocall Applications and their Accessibility to Visually Impaired Users.
Proceedings of the IEEE International Symposium on Technology and Society, 2020
Proceedings of the CCSW'20, 2020
2019
ACM Trans. Priv. Secur., 2019
Int. J. Inf. Comput. Secur., 2019
Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems.
CoRR, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Characterizing security and privacy practices in emerging digital credit applications.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Hello, Is It Me You're Looking For?: Differentiating Between Human and Electronic Speakers for Voice Interface Security.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
ACM Trans. Priv. Secur., 2017
Proc. Priv. Enhancing Technol., 2017
IEEE Secur. Priv., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the 2017 IEEE Military Communications Conference, 2017
2016
Secur. Commun. Networks, 2016
J. Comput. Secur., 2016
IACR Cryptol. ePrint Arch., 2016
ACM Comput. Surv., 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation.
Proceedings of the Financial Cryptography and Data Security, 2016
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
IEEE Trans. Mob. Comput., 2015
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World.
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
For your phone only: custom protocols for efficient secure function evaluation on mobile devices.
Secur. Commun. Networks, 2014
IACR Cryptol. ePrint Arch., 2014
2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Why is my smartphone slow? On the fly diagnosis of underperformance on the mobile Internet.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
2012
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens.
ACM Trans. Internet Techn., 2012
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services.
IEEE Trans. Mob. Comput., 2012
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Short paper: rethinking permissions for mobile web apps: barriers and the road ahead.
Proceedings of the SPSM'12, 2012
2011
IEEE Trans. Parallel Distributed Syst., 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
(sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
malnets: large-scale malicious networks <i>via</i> compromised wireless access points.
Secur. Commun. Networks, 2010
Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks.
Proceedings of the 2010 USENIX Annual Technical Conference, 2010
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware.
Proceedings of the Global Communications Conference, 2010
Proceedings of the Detection of Intrusions and Malware, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems.
IEEE Trans. Parallel Distributed Syst., 2009
IEEE/ACM Trans. Netw., 2009
IEEE Secur. Priv., 2009
On cellular botnets: measuring the impact of malicious devices on a cellular network core.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
J. Comput. Secur., 2008
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Proceedings of the Network and Distributed System Security Symposium, 2008
Advances in Information Security 40, Springer, ISBN: 978-0-387-72441-6, 2008
2007
IEEE Trans. Mob. Comput., 2007
2006
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks.
Proceedings of the 4th International Conference on Mobile Systems, 2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Identification of Patients with Coronary Heart Disease: Meeting Regulatory Standards vs. Improving Overall Care.
Proceedings of the AMIA 2006, 2006