What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Patrick Traynor
Google Scholar
76
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Data to Infinity and Beyond: Examining Data Sharing and Reuse Practices in the Computer Security Community.
Anna Crowder
Allison Lu
Kevin Childs
Carson Stillman
Patrick Traynor
Kevin R. B. Butler
2025
conf/ndss
Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic.
Tyler Tucker
Nathaniel Bennett
Martin Kotuliak
Simon Erni
Srdjan Capkun
Kevin R. B. Butler
Patrick Traynor
2025
conf/ndss
Characterizing the Impact of Audio Deepfakes in the Presence of Cochlear Implant.
Magdalena Pasternak
Kevin Warren
Daniel Olszewski
Susan Nittrouer
Patrick Traynor
Kevin R. B. Butler
2025
conf/uss
SoK: Towards a Unified Approach to Applied Replicability for Computer Security.
Daniel Olszewski
Tyler Tucker
Kevin R. B. Butler
Patrick Traynor
2025
conf/uss
Analyzing the AI Nudification Application Ecosystem.
Cassidy Gibson
Daniel Olszewski
Natalie Grace Brigham
Anna Crowder
Kevin R. B. Butler
Patrick Traynor
Elissa M. Redmiles
Tadayoshi Kohno
2024
conf/ccs
"Better Be Computer or I'm Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake Detectors.
Kevin Warren
Tyler Tucker
Anna Crowder
Daniel Olszewski
Allison Lu
Caroline Fedele
Magdalena Pasternak
Seth Layton
Kevin R. B. Butler
Carrie Gates
Patrick Traynor
2024
conf/ccs
"I Had Sort of a Sense that I Was Always Being Watched...Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing Applications.
Kevin Childs
Cassidy Gibson
Anna Crowder
Kevin Warren
Carson Stillman
Elissa M. Redmiles
Eakta Jain
Patrick Traynor
Kevin R. B. Butler
2024
conf/ccs
RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces.
Nathaniel Bennett
Weidong Zhu
Benjamin Simon
Ryon Kennedy
William Enck
Patrick Traynor
Kevin R. B. Butler
2024
conf/uss
SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets.
Seth Layton
Tyler Tucker
Daniel Olszewski
Kevin Warren
Kevin R. B. Butler
Patrick Traynor
2024
conf/uss
Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations.
Jianliang Wu
Patrick Traynor
Dongyan Xu
Dave (Jing) Tian
Antonio Bianchi
2024
conf/acsac
I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques.
Anna Crowder
Daniel Olszewski
Patrick Traynor
Kevin R. B. Butler
2023
conf/ccs
"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences.
Daniel Olszewski
Allison Lu
Carson Stillman
Kevin Warren
Cole Kitroser
Alejandro Pascual
Divyajyoti Ukirde
Kevin R. B. Butler
Patrick Traynor
2023
conf/sp
Blue's Clues: Practical Discovery of Non-Discoverable Bluetooth Devices.
Tyler Tucker
Hunter Searle
Kevin R. B. Butler
Patrick Traynor
2023
conf/ndss
Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems.
Hadi Abdullah
Aditya Karlekar
Saurabh Prasad
Muhammad Sajidur Rahman
Logan Blue
Luke A. Bauer
Vincent Bindschaedler
Patrick Traynor
2022
journals/popets
Analyzing the Monetization Ecosystem of Stalkerware.
Cassidy Gibson
Vanessa Frost
Katie Platt
Washington Garcia
Luis Vargas
Sara Rampazzi
Vincent Bindschaedler
Patrick Traynor
Kevin R. B. Butler
2022
conf/uss
Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction.
Logan Blue
Kevin Warren
Hadi Abdullah
Cassidy Gibson
Luis Vargas
Jessica O'Dell
Kevin R. B. Butler
Patrick Traynor
2022
conf/asiaccs
SMS OTP Security (SOS): Hardening SMS-Based Two Factor Authentication.
Christian Peeters
Christopher Patton
Imani N. S. Munyaka
Daniel Olszewski
Thomas Shrimpton
Patrick Traynor
2022
conf/cns
HallMonitor: A Framework for Identifying Network Policy Violations in Software.
Daniel Olszewski
Weidong Zhu
Sandeep Sathyanarayana
Kevin R. B. Butler
Patrick Traynor
2022
conf/ndss
FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware.
Grant Hernandez
Marius Muench
Dominik Christian Maier
Alyssa Milburn
Shinjo Park
Tobias Scharnowski
Tyler Tucker
Patrick Traynor
Kevin R. B. Butler
2021
conf/sp
Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems.
Hadi Abdullah
Muhammad Sajidur Rahman
Washington Garcia
Kevin Warren
Anurag Swarnim Yadav
Tom Shrimpton
Patrick Traynor
2021
conf/sp
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems.
Hadi Abdullah
Kevin Warren
Vincent Bindschaedler
Nicolas Papernot
Patrick Traynor
2020
conf/ccsw-ws
On the Detection of Disinformation Campaign Activity with Network Analysis.
Luis Vargas
Patrick Emami
Patrick Traynor
2020
conf/ndss
Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators.
Imani N. Sherman
Jasmine D. Bowers
Keith McNamara Jr.
Juan E. Gilbert
Jaime Ruiz
Patrick Traynor
2019
conf/ccs
Examining DES-based Cipher Suite Support within the TLS Ecosystem.
Vanessa Frost
Dave (Jing) Tian
Christie Ruales
Vijay Prakash
Patrick Traynor
Kevin R. B. Butler
2019
conf/ccs
A Hybrid Approach to Secure Function Evaluation using SGX.
Joseph I. Choi
Dave (Jing) Tian
Grant Hernandez
Christopher Patton
Benjamin Mood
Thomas Shrimpton
Kevin R. B. Butler
Patrick Traynor
2019
conf/sp
Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers.
Nolen Scaife
Jasmine D. Bowers
Christian Peeters
Grant Hernandez
Imani N. Sherman
Patrick Traynor
Lisa Anthony
2019
conf/ndss
Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System.
Luis Vargas
Logan Blue
Vanessa Frost
Christopher Patton
Nolen Scaife
Kevin R. B. Butler
Patrick Traynor
2019
conf/ndss
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems.
Hadi Abdullah
Washington Garcia
Christian Peeters
Patrick Traynor
Kevin R. B. Butler
Joseph Wilson
2019
conf/wisec
Characterizing security and privacy practices in emerging digital credit applications.
Jasmine D. Bowers
Imani N. Sherman
Kevin R. B. Butler
Patrick Traynor
2019
conf/wisec
Enclave-based privacy-preserving localization: poster.
Joseph I. Choi
Dave (Jing) Tian
Tyler Ward
Kevin R. B. Butler
Patrick Traynor
John M. Shea
Tan F. Wong
2018
conf/ccs
Mitigating Risk while Complying with Data Retention Laws.
Luis Vargas
Gyan Hazarika
Rachel Culpepper
Kevin R. B. Butler
Thomas Shrimpton
Doug Szajda
Patrick Traynor
2018
conf/ccs
2MA: Verifying Voice Commands via Two Microphone Authentication.
Logan Blue
Hadi Abdullah
Luis Vargas
Patrick Traynor
2018
conf/uss
Fear the Reaper: Characterization and Fast Detection of Card Skimmers.
Nolen Scaife
Christian Peeters
Patrick Traynor
2018
conf/uss
ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.
Dave (Jing) Tian
Grant Hernandez
Joseph I. Choi
Vanessa Frost
Christie Ruales
Patrick Traynor
Hayawardh Vijayakumar
Lee Harrison
Amir Rahmati
Michael Grace
Kevin R. B. Butler
2018
conf/sp
Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding.
Christian Peeters
Hadi Abdullah
Nolen Scaife
Jasmine D. Bowers
Patrick Traynor
Bradley Reaves
Kevin R. B. Butler
2018
conf/sp
The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding Jitter.
Nolen Scaife
Christian Peeters
Camilo Velez
Hanqing Zhao
Patrick Traynor
David Arnold
2018
conf/acsac
A Large Scale Investigation of Obfuscation Use in Google Play.
Dominik Wermke
Nicolas Huaman
Yasemin Acar
Bradley Reaves
Patrick Traynor
Sascha Fahl
2018
conf/wisec
Hello, Is It Me You're Looking For?: Differentiating Between Human and Electronic Speakers for Voice Interface Security.
Logan Blue
Luis Vargas
Patrick Traynor
2017
journals/popets
Phonion: Practical Protection of Metadata in Telephony Networks.
Stephan Heuser
Bradley Reaves
Praveen Kumar Pendyala
Henry Carter
Alexandra Dmitrienko
William Enck
Negar Kiyavash
Ahmad-Reza Sadeghi
Patrick Traynor
2017
conf/uss
AuthentiCall: Efficient Identity and Content Authentication for Phone Calls.
Bradley Reaves
Logan Blue
Hadi Abdullah
Luis Vargas
Patrick Traynor
Thomas Shrimpton
2017
conf/soups
Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services.
Jasmine D. Bowers
Bradley Reaves
Imani N. Sherman
Patrick Traynor
Kevin R. B. Butler
2016
conf/uss
AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels.
Bradley Reaves
Logan Blue
Patrick Traynor
2016
conf/uss
Making USB Great Again with USBFILTER.
Dave (Jing) Tian
Nolen Scaife
Adam Bates
Kevin R. B. Butler
Patrick Traynor
2016
conf/fc
Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation.
Debayan Gupta
Benjamin Mood
Joan Feigenbaum
Kevin R. B. Butler
Patrick Traynor
2016
conf/sp
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways.
Bradley Reaves
Nolen Scaife
Dave Tian
Logan Blue
Patrick Traynor
Kevin R. B. Butler
2016
conf/eurosp
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation.
Benjamin Mood
Debayan Gupta
Henry Carter
Kevin R. B. Butler
Patrick Traynor
2016
conf/cns
Efficient and secure template blinding for biometric authentication.
Siddhant Deshmukh
Henry Carter
Grant Hernandez
Patrick Traynor
Kevin R. B. Butler
2016
conf/wisec
Detecting SMS Spam in the Age of Legitimate Bulk Messaging.
Bradley Reaves
Logan Blue
Dave Tian
Patrick Traynor
Kevin R. B. Butler
2015
conf/uss
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge.
Bradley Reaves
Ethan Shernan
Adam Bates
Henry Carter
Patrick Traynor
2015
conf/uss
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World.
Bradley Reaves
Nolen Scaife
Adam Bates
Patrick Traynor
Kevin R. B. Butler
2015
conf/cns
OnionDNS: A seizure-resistant top-level Domain.
Nolen Scaife
Henry Carter
Patrick Traynor
2015
conf/cans
Outsourcing Secure Two-Party Computation as a Black Box.
Henry Carter
Benjamin Mood
Patrick Traynor
Kevin R. B. Butler
2014
conf/acsac
Whitewash: outsourcing garbled circuit generation for mobile devices.
Henry Carter
Charles Lever
Patrick Traynor
2013
conf/uss
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices.
Henry Carter
Benjamin Mood
Patrick Traynor
Kevin R. B. Butler
2013
conf/ndss
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
Charles Lever
Manos Antonakakis
Bradley Reaves
Patrick Traynor
Wenke Lee
2013
conf/dsn
Why is my smartphone slow? On the fly diagnosis of underperformance on the mobile Internet.
Chaitrali Amrutkar
Matti A. Hiltunen
Trevor Jim
Kaustubh R. Joshi
Oliver Spatscheck
Patrick Traynor
Shobha Venkataraman
2013
conf/wisec
MAST: triage for market-scale mobile malware analysis.
Saurabh Chakradeo
Bradley Reaves
Patrick Traynor
William Enck
2012
conf/ccs
Short paper: rethinking permissions for mobile web apps: barriers and the road ahead.
Chaitrali Amrutkar
Patrick Traynor
2012
conf/iciss
VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security.
Chaitrali Amrutkar
Kapil Singh
Arunabh Verma
Patrick Traynor
2012
conf/esorics
Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties.
Italo Dacosta
Mustaque Ahamad
Patrick Traynor
2012
conf/ndss
Accountable Wiretapping -or- I know they can hear you now.
Adam Bates
Kevin R. B. Butler
Micah Sherr
Clay Shields
Patrick Traynor
Dan S. Wallach
2011
conf/ccs
(sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers.
Philip Marquardt
Arunabh Verma
Henry Carter
Patrick Traynor
2011
conf/fc
Impeding Individual User Profiling in Shopper Loyalty Programs.
Philip Marquardt
David Dagon
Patrick Traynor
2011
conf/ndss
No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects.
David Dewey
Patrick Traynor
2011
conf/acsac
Automated remote repair for mobile malware.
Yacin Nadji
Jonathon T. Giffin
Patrick Traynor
2011
conf/acsac
"Mix-in-Place" anonymous networking using secure function evaluation.
Nilesh Nipane
Italo Dacosta
Patrick Traynor
2010
conf/ccs
PinDr0p: using single-ended audio features to determine call provenance.
Vijay A. Balasubramaniyan
Aamir Poonawalla
Mustaque Ahamad
Michael T. Hunter
Patrick Traynor
2009
conf/ccs
Robust signatures for kernel data structures.
Brendan Dolan-Gavitt
Abhinav Srivastava
Patrick Traynor
Jonathon T. Giffin
2009
conf/ccs
On cellular botnets: measuring the impact of malicious devices on a cellular network core.
Patrick Traynor
Michael Lin
Machigar Ongtang
Vikhyath Rao
Trent Jaeger
Patrick D. McDaniel
Thomas La Porta
2009
conf/acsac
Leveraging Cellular Infrastructure to Improve Fraud Prevention.
Frank S. Park
Chinmay Gangakhedkar
Patrick Traynor
2008
conf/uss
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST.
Kevin R. B. Butler
William Enck
Harri Hursti
Stephen E. McLaughlin
Patrick Traynor
Patrick D. McDaniel
2008
conf/ndss
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Patrick Traynor
Kevin R. B. Butler
William Enck
Patrick D. McDaniel
2006
conf/ccs
Secure attribute-based systems.
Matthew Pirretti
Patrick Traynor
Patrick D. McDaniel
Brent Waters
2006
conf/iciss
Password Exhaustion: Predicting the End of Password Usefulness.
Luke St. Clair
Lisa Johansen
William Enck
Matthew Pirretti
Patrick Traynor
Patrick D. McDaniel
Trent Jaeger
2006
conf/iciss
Privacy Preserving Web-Based Email.
Kevin R. B. Butler
William Enck
Jennifer Plasterr
Patrick Traynor
Patrick D. McDaniel
2005
conf/ccs
Exploiting open functionality in SMS-capable cellular networks.
William Enck
Patrick Traynor
Patrick D. McDaniel
Thomas F. La Porta
Coauthors
Aamir Poonawalla
(1)
Abhinav Srivastava
(1)
Adam Bates
(4)
Aditya Karlekar
(1)
Ahmad-Reza Sadeghi
(1)
Alejandro Pascual
(1)
Alexandra Dmitrienko
(1)
Allison Lu
(3)
Alyssa Milburn
(1)
Amir Rahmati
(1)
Anna Crowder
(5)
Antonio Bianchi
(1)
Anurag Swarnim Yadav
(1)
Arunabh Verma
(2)
Benjamin Mood
(5)
Benjamin Simon
(1)
Bradley Reaves
(12)
Brendan Dolan-Gavitt
(1)
Brent Waters
(1)
Camilo Velez
(1)
Caroline Fedele
(1)
Carrie Gates
(1)
Carson Stillman
(3)
Cassidy Gibson
(4)
Chaitrali Amrutkar
(3)
Charles Lever
(2)
Chinmay Gangakhedkar
(1)
Christian Peeters
(6)
Christie Ruales
(2)
Christopher Patton
(3)
Clay Shields
(1)
Cole Kitroser
(1)
Dan S. Wallach
(1)
Daniel Olszewski
(9)
Dave (Jing) Tian
(6)
Dave Tian
(2)
David Arnold
(1)
David Dagon
(1)
David Dewey
(1)
Debayan Gupta
(2)
Divyajyoti Ukirde
(1)
Dominik Christian Maier
(1)
Dominik Wermke
(1)
Dongyan Xu
(1)
Doug Szajda
(1)
Eakta Jain
(1)
Elissa M. Redmiles
(2)
Ethan Shernan
(1)
Frank S. Park
(1)
Grant Hernandez
(5)
Gyan Hazarika
(1)
Hadi Abdullah
(8)
Hanqing Zhao
(1)
Harri Hursti
(1)
Hayawardh Vijayakumar
(1)
Henry Carter
(9)
Hunter Searle
(1)
Imani N. S. Munyaka
(1)
Imani N. Sherman
(4)
Italo Dacosta
(2)
Jaime Ruiz
(1)
Jasmine D. Bowers
(5)
Jennifer Plasterr
(1)
Jessica O'Dell
(1)
Jianliang Wu
(1)
Joan Feigenbaum
(1)
John M. Shea
(1)
Jonathon T. Giffin
(2)
Joseph I. Choi
(3)
Joseph Wilson
(1)
Juan E. Gilbert
(1)
Kapil Singh
(1)
Katie Platt
(1)
Kaustubh R. Joshi
(1)
Keith McNamara Jr.
(1)
Kevin Childs
(2)
Kevin R. B. Butler
(39)
Kevin Warren
(8)
Lee Harrison
(1)
Lisa Anthony
(1)
Lisa Johansen
(1)
Logan Blue
(9)
Luis Vargas
(8)
Luke A. Bauer
(1)
Luke St. Clair
(1)
Machigar Ongtang
(1)
Magdalena Pasternak
(2)
Manos Antonakakis
(1)
Marius Muench
(1)
Martin Kotuliak
(1)
Matthew Pirretti
(2)
Matti A. Hiltunen
(1)
Micah Sherr
(1)
Michael Grace
(1)
Michael Lin
(1)
Michael T. Hunter
(1)
Muhammad Sajidur Rahman
(2)
Mustaque Ahamad
(2)
Natalie Grace Brigham
(1)
Nathaniel Bennett
(2)
Negar Kiyavash
(1)
Nicolas Huaman
(1)
Nicolas Papernot
(1)
Nilesh Nipane
(1)
Nolen Scaife
(9)
Oliver Spatscheck
(1)
Patrick D. McDaniel
(7)
Patrick Emami
(1)
Patrick Traynor
(76)
Philip Marquardt
(2)
Praveen Kumar Pendyala
(1)
Rachel Culpepper
(1)
Ryon Kennedy
(1)
Sandeep Sathyanarayana
(1)
Sara Rampazzi
(1)
Sascha Fahl
(1)
Saurabh Chakradeo
(1)
Saurabh Prasad
(1)
Seth Layton
(2)
Shinjo Park
(1)
Shobha Venkataraman
(1)
Siddhant Deshmukh
(1)
Simon Erni
(1)
Srdjan Capkun
(1)
Stephan Heuser
(1)
Stephen E. McLaughlin
(1)
Susan Nittrouer
(1)
Tadayoshi Kohno
(1)
Tan F. Wong
(1)
Thomas F. La Porta
(1)
Thomas La Porta
(1)
Thomas Shrimpton
(4)
Tobias Scharnowski
(1)
Tom Shrimpton
(1)
Trent Jaeger
(2)
Trevor Jim
(1)
Tyler Tucker
(6)
Tyler Ward
(1)
Vanessa Frost
(4)
Vijay A. Balasubramaniyan
(1)
Vijay Prakash
(1)
Vikhyath Rao
(1)
Vincent Bindschaedler
(3)
Washington Garcia
(3)
Weidong Zhu
(2)
Wenke Lee
(1)
William Enck
(8)
Yacin Nadji
(1)
Yasemin Acar
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to