Follow
Patrick Traynor
Patrick Traynor
Verified email at cise.ufl.edu - Homepage
Title
Cited by
Cited by
Year
Secure attribute-based systems
M Pirretti, P Traynor, P McDaniel, B Waters
Proceedings of the 13th ACM conference on Computer and communications …, 2006
7782006
Cryptolock (and drop it): stopping ransomware attacks on user data
N Scaife, H Carter, P Traynor, KRB Butler
2016 IEEE 36th international conference on distributed computing systems …, 2016
4862016
Exploiting open functionality in SMS-capable cellular networks
P Traynor, W Enck, P McDaniel, T La Porta
Journal of Computer Security 16 (6), 713-742, 2008
343*2008
On cellular botnets: measuring the impact of malicious devices on a cellular network core
P Traynor, M Lin, M Ongtang, V Rao, T Jaeger, P McDaniel, T La Porta
Proceedings of the 16th ACM conference on Computer and communications …, 2009
3092009
Mast: Triage for market-scale mobile malware analysis
S Chakradeo, B Reaves, P Traynor, W Enck
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
2432013
(sp) iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers
P Marquardt, A Verma, H Carter, P Traynor
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2202011
Robust signatures for kernel data structures
B Dolan-Gavitt, A Srivastava, P Traynor, J Giffin
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2072009
Mitigating attacks on open functionality in SMS-capable cellular networks
P Traynor, W Enck, P McDaniel, T La Porta
Proceedings of the 12th annual international conference on Mobile computing …, 2006
1612006
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens
I Dacosta, S Chakradeo, M Ahamad, P Traynor
ACM Transactions on Internet Technology (TOIT) 12 (1), 1-24, 2012
144*2012
Efficient hybrid security mechanisms for heterogeneous sensor networks
P Traynor, R Kumar, H Choi, G Cao, S Zhu, T La Porta
IEEE Transactions on mobile computing 6 (6), 663-677, 2007
1402007
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
1372017
Establishing pair-wise keys in heterogeneous sensor networks
P Traynor, H Choi, G Cao, S Zhu, T La Porta
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006
1352006
Identity and content authentication for phone calls
PG Traynor, BG Reaves, LE Blue, L Vargas, H Abdullah, T Shrimpton
US Patent 10,764,043, 2020
1302020
Secure outsourced garbled circuit evaluation for mobile devices
H Carter, B Mood, P Traynor, K Butler
Journal of Computer Security 24 (2), 137-180, 2016
1232016
Evaluating bluetooth as a medium for botnet command and control
K Singh, S Sangal, N Jain, P Traynor, W Lee
Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010
1212010
Practical hidden voice attacks against speech and speaker recognition systems
H Abdullah, W Garcia, C Peeters, P Traynor, KRB Butler, J Wilson
arXiv preprint arXiv:1904.05734, 2019
1162019
Frigate: A validated, extensible, and efficient compiler and interpreter for secure computation
B Mood, D Gupta, H Carter, K Butler, P Traynor
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 112-127, 2016
1082016
On attack causality in internet-connected cellular networks
P Traynor, P McDaniel, T La Porta
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium …, 2007
1072007
Measuring SSL indicators on mobile browsers: Extended life, or end of the road?
C Amrutkar, P Traynor, PC Van Oorschot
Information Security: 15th International Conference, ISC 2012, Passau …, 2012
98*2012
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
C Lever, M Antonakakis, B Reaves, P Traynor, W Lee
NDSS, 2013
962013
The system can't perform the operation now. Try again later.
Articles 1–20