Follow
Patrick Traynor
Patrick Traynor
Verified email at cise.ufl.edu - Homepage
Title
Cited by
Cited by
Year
Secure attribute-based systems
M Pirretti, P Traynor, P McDaniel, B Waters
Proceedings of the 13th ACM conference on Computer and communications …, 2006
8312006
Cryptolock (and drop it): stopping ransomware attacks on user data
N Scaife, H Carter, P Traynor, KRB Butler
2016 IEEE 36th international conference on distributed computing systems …, 2016
6242016
Exploiting open functionality in SMS-capable cellular networks
P Traynor, W Enck, P McDaniel, T La Porta
Journal of Computer Security 16 (6), 713-742, 2008
350*2008
On cellular botnets: measuring the impact of malicious devices on a cellular network core
P Traynor, M Lin, M Ongtang, V Rao, T Jaeger, P McDaniel, T La Porta
Proceedings of the 16th ACM conference on Computer and communications …, 2009
3132009
Mast: Triage for market-scale mobile malware analysis
S Chakradeo, B Reaves, P Traynor, W Enck
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
2552013
(sp) iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers
P Marquardt, A Verma, H Carter, P Traynor
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2492011
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
223*2017
Robust signatures for kernel data structures
B Dolan-Gavitt, A Srivastava, P Traynor, J Giffin
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2192009
Practical hidden voice attacks against speech and speaker recognition systems
H Abdullah, W Garcia, C Peeters, P Traynor, KRB Butler, J Wilson
arXiv preprint arXiv:1904.05734, 2019
1892019
Identity and content authentication for phone calls
PG Traynor, BG Reaves, LE Blue, L Vargas, H Abdullah, T Shrimpton
US Patent 10,764,043, 2020
1882020
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens
I Dacosta, S Chakradeo, M Ahamad, P Traynor
ACM Transactions on Internet Technology (TOIT) 12 (1), 1-24, 2012
167*2012
Mitigating attacks on open functionality in SMS-capable cellular networks
P Traynor, W Enck, P McDaniel, T La Porta
Proceedings of the 12th annual international conference on Mobile computing …, 2006
1672006
Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems
H Abdullah, K Warren, V Bindschaedler, N Papernot, P Traynor
2021 IEEE symposium on security and privacy (SP), 730-747, 2021
1582021
Efficient hybrid security mechanisms for heterogeneous sensor networks
P Traynor, R Kumar, H Choi, G Cao, S Zhu, T La Porta
IEEE Transactions on mobile computing 6 (6), 663-677, 2007
1452007
Secure outsourced garbled circuit evaluation for mobile devices
H Carter, B Mood, P Traynor, K Butler
Journal of Computer Security 24 (2), 137-180, 2016
1402016
Establishing pair-wise keys in heterogeneous sensor networks
P Traynor, H Choi, G Cao, S Zhu, T La Porta
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006
1352006
Hear" no evil", see" kenansville": Efficient and transferable black-box attacks on speech recognition and voice identification systems
H Abdullah, MS Rahman, W Garcia, K Warren, AS Yadav, T Shrimpton, ...
2021 IEEE Symposium on Security and Privacy (SP), 712-729, 2021
1242021
Frigate: A validated, extensible, and efficient compiler and interpreter for secure computation
B Mood, D Gupta, H Carter, K Butler, P Traynor
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 112-127, 2016
1242016
Evaluating bluetooth as a medium for botnet command and control
K Singh, S Sangal, N Jain, P Traynor, W Lee
Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010
1192010
A large scale investigation of obfuscation use in google play
D Wermke, N Huaman, Y Acar, B Reaves, P Traynor, S Fahl
Proceedings of the 34th annual computer security applications conference …, 2018
1152018
The system can't perform the operation now. Try again later.
Articles 1–20