Seguir
Patrick Traynor
Patrick Traynor
Dirección de correo verificada de cise.ufl.edu - Página principal
Título
Citado por
Citado por
Año
Secure attribute-based systems
M Pirretti, P Traynor, P McDaniel, B Waters
Proceedings of the 13th ACM conference on Computer and communications …, 2006
8132006
Cryptolock (and drop it): stopping ransomware attacks on user data
N Scaife, H Carter, P Traynor, KRB Butler
2016 IEEE 36th international conference on distributed computing systems …, 2016
5882016
Exploiting open functionality in SMS-capable cellular networks
P Traynor, W Enck, P McDaniel, T La Porta
Journal of Computer Security 16 (6), 713-742, 2008
349*2008
On cellular botnets: measuring the impact of malicious devices on a cellular network core
P Traynor, M Lin, M Ongtang, V Rao, T Jaeger, P McDaniel, T La Porta
Proceedings of the 16th ACM conference on Computer and communications …, 2009
3132009
Mast: Triage for market-scale mobile malware analysis
S Chakradeo, B Reaves, P Traynor, W Enck
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
2532013
(sp) iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers
P Marquardt, A Verma, H Carter, P Traynor
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2402011
Robust signatures for kernel data structures
B Dolan-Gavitt, A Srivastava, P Traynor, J Giffin
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2172009
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
206*2017
Practical hidden voice attacks against speech and speaker recognition systems
H Abdullah, W Garcia, C Peeters, P Traynor, KRB Butler, J Wilson
arXiv preprint arXiv:1904.05734, 2019
1672019
Identity and content authentication for phone calls
PG Traynor, BG Reaves, LE Blue, L Vargas, H Abdullah, T Shrimpton
US Patent 10,764,043, 2020
1662020
Mitigating attacks on open functionality in SMS-capable cellular networks
P Traynor, W Enck, P McDaniel, T La Porta
Proceedings of the 12th annual international conference on Mobile computing …, 2006
1652006
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens
I Dacosta, S Chakradeo, M Ahamad, P Traynor
ACM Transactions on Internet Technology (TOIT) 12 (1), 1-24, 2012
159*2012
Efficient hybrid security mechanisms for heterogeneous sensor networks
P Traynor, R Kumar, H Choi, G Cao, S Zhu, T La Porta
IEEE Transactions on mobile computing 6 (6), 663-677, 2007
1432007
Establishing pair-wise keys in heterogeneous sensor networks
P Traynor, H Choi, G Cao, S Zhu, T La Porta
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006
1342006
Secure outsourced garbled circuit evaluation for mobile devices
H Carter, B Mood, P Traynor, K Butler
Journal of Computer Security 24 (2), 137-180, 2016
1322016
Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems
H Abdullah, K Warren, V Bindschaedler, N Papernot, P Traynor
2021 IEEE symposium on security and privacy (SP), 730-747, 2021
1272021
Evaluating bluetooth as a medium for botnet command and control
K Singh, S Sangal, N Jain, P Traynor, W Lee
Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010
1202010
Frigate: A validated, extensible, and efficient compiler and interpreter for secure computation
B Mood, D Gupta, H Carter, K Butler, P Traynor
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 112-127, 2016
1192016
A large scale investigation of obfuscation use in google play
D Wermke, N Huaman, Y Acar, B Reaves, P Traynor, S Fahl
Proceedings of the 34th annual computer security applications conference …, 2018
1092018
On attack causality in internet-connected cellular networks
P Traynor, P McDaniel, T La Porta
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium …, 2007
1072007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20