http://siis.cse.psu.edu/papers-yr.html2009William Enck, Thomas Moyer, Patrick McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert Greenberg, Yu-Wei Eric Sung, Sanjay Rao, and William Aiello, Configuration Management at Massive Scale: System Design and Experience. IEEE Journal on Selected Areas in Communications (JSAC) 2009. (to appear). 2008Patrick Traynor, William Enck, Patrick McDaniel and Thomas La Porta, Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks. IEEE/ACM Transactions on Networking (TON) 2008. To appear. [Full Paper,Abstract] Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, and Patrick McDaniel, Non-Invasive Methods for Host Certification. ACM Transactions on Information and System Security (TISSEC) 2008. To appear. [Abstract] Dave King, Boniface Hicks, Michael Hicks, and Trent Jaeger, Implicit Flows: Can't Live With 'Em, Can't Live Without 'Em. 4th International Conference on Information and Systems Security (ICISS 2008), December 2008. [Abstract] Albert Tannous, Jonathan Trostle, Mohamed Hassan, Stephen McLaughin, and Trent Jaeger, New Side Channel Attacks Targeting Passwords. Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC), December 2008. William Enck, Patrick McDaniel, and Trent Jaeger, PinUP: Pinning User Files to Known Applications. Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC), December 2008. William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick McDaniel, and Adam Smith, Defending Against Attacks on Main Memory Persistence. Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC), December 2008. Kevin R. B. Butler, Stephen McLaughlin and Patrick D. McDaniel, Rootkit-Resistant Disks. Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), October 2008. [Abstract] Srivatsava Ranjit Ganta, Shiva Kasiviswanathan and Adam Smith, Composition Attacks and Auxiliary Information in Data Privacy. 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'08), August 2008. [Abstract] Dave King, Trent Jaeger, Somesh Jha and Sanjit A. Seshia, Effective Blame for Information-Flow Violations. 16th ACM SIGSOFT, International Symposium on Foundations of Software Engineering, November 2008. To appear. [Abstract] Sandra Rueda, Dave King and Trent Jaeger, Verifying Compliance of Trusted Programs. 17th USENIX Security Symposium, July 2008. To appear. [Abstract] Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung and Trent Jaeger, Measuring Integrity on Mobile Phone Systems. 13th ACM Symposium on Access Control Models and Technologies (SACMAT), June 2008. To appear. [Abstract] Patrick Traynor, Kevin Butler, William Enck, and Patrick McDaniel, Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. ISOC Network & Distributed System Security Symposium (NDSS), February 2008. [Full Paper,Abstract] Dave King, Susmit Jha, Trent Jaeger, Somesh Jha, and Snajit A. Seshia, Towards Automated Security Mediation Placement. Technical Report NAS-TR-0100-2008, Network and Security Research Center, November 2008. [Abstract] William Enck, Machigar Ongtang, and Patrick McDaniel, Mitigating Android Software Misuse Before It Happens. Technical Report NAS-TR-0094-2008, Network and Security Research Center, September 2008. Updated November 2008. [Abstract] Divya Muthukumaran, Mohamed Hassan, Vikhyath Rao, and Trent Jaeger, Protecting Telephony Services in Mobile Phones. Technical Report NAS-TR-0096-2008, Network and Security Research Center, September 2008. [Abstract] Thomas Moyer, Kevin Butler, Joshua Schiffman, Patrick McDaniel, and Trent Jaeger, Scalable Asynchronous Web Content Attestation. Technical Report NAS-TR-0096-2008, Network and Security Research Center, September 2008. [Abstract] William Enck, Machigar Ongtang, and PatrickMcDaniel, Automated Cellphone Application Certification inAndroid (or) Mitigating Phone Software Misuse Before It Happens. Technical Report NAS-TR-0094-2008, Network and Security Research Center, September 2008. Dave King, Boniface Hicks, Michael Hicks, and Trent Jaeger, Implicit Flows: Can't Live With `Em, Can't Live Without `Em. Technical Report NAS-TR-0093-2008, Network and Security Research Center, July 2008. [Abstract] Boniface Hicks, David King, Patrick McDaniel, and Michael Hicks, Trusted Declassification: Policy Infrastructure for a Security-Typed Language. Technical Report NAS-TR-0092-2008, Network and Security Research Center, July 2008. [Abstract] Boniface Hicks, Sandra Rueda, Luke St.Clair, Trent Jaeger, and PatrickMcDaniel, A Logical Specification and Analysis for SELinux MLS Policy. Technical Report NAS-TR-0091-2008, Network and Security Research Center, July 2008. [Abstract] Kevin Butler, William Enck, Harri Hursti, Stephen McLaughlin, Patrick Traynor, and Patrick McDaniel, Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections Following Project EVEREST. Proceedings of the USENIX/ACCURATE Electronic Voting Technology (EVT) Workshop, July 2008. [Abstract] Patrick Traynor, Patrick McDaniel and Thomas La Porta, Security for Telecommunications Networks. Springer, Advances in Information Security, 40, 2008. [Book] Trent Jaeger, Operating System Security. Morgan and Claypool, Synthesis Lectures on Information Security, Privacy and Trust, 2008. [Book] 2007Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta, Exploiting Open Functionality in SMS-Capable Cellular Networks. Journal of Computer Security, IOS Press 2007. (to appear). [Full Paper,Abstract] K.C.K. Lee, Josh Schiffman, B. Zheng, and W.C. Lee, Round-Eye: A System for Tracking Nearest Surrounders in Moving Object Environments. Journal of Systems and Software, Elsevier, 80:2063-2076 2007. [Abstract] Wesam Lootah, William Enck, and Patrick McDaniel, TARP: Ticket-based Address Resolution Protocol. Computer Networks, Elsevier 2007. (to appear). [Full Paper,Abstract] Patrick Traynor, Raju Kumar, Heesook Choi, Sencun Zhu, Guohong Cao, and Thomas La Porta, Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. IEEE Transactions on Mobile Computing, 6(6):663-677, June 2007. [Full Paper,Abstract] Heesok Choi, William Enck, Jaesheung Shin, Patrick McDaniel, and Thomas La Porta, ASR: Anonymous and Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks. Wireless Networks (WINET), ACM/Kluwer, May 2007. [Full Paper,Abstract] Boniface Hicks, Timothy Misiak, and Patrick McDaniel, Channels: Runtime System Infrastructure for Security-typed Languages. 23rd Annual Computer Security Applications Conference (ACSAC), December 2007. [Full Paper,Abstract] Luke St.Clair, Joshua Schiffman, Trent Jaeger, and Patrick McDaniel, Establishing and Sustaining System Integrity via Root of Trust Installation. 23rd Annual Computer Security Applications Conference (ACSAC), December 2007. [Full Paper,Abstract] K. Nissim, S. Raskhodnikova, and A. Smith, Smooth Sensitivity and Sampling in Private Data Analysis. The 39th ACM Symposium on Theory of Computing (STOC 2007), August 2007. [Full Paper,Abstract] Patrick Traynor, Patrick McDaniel, and Thomas La Porta, On Attack Causality in Internet-Connected Cellular Networks. Proceedings of the USENIX Security Symposium (Sec'07), August 2007. [Full Paper,Abstract] Lisa Johansen, Michael Rowell, Kevin Butler, and Patrick McDaniel, Email Communities of Interest. Fourth Conference on Email and Anti-Spam (CEAS 2007), August 2007. [Full Paper,Abstract] Anusha Sriraman, Kevin Butler, Patrick McDaniel, and Padma Raghavan, Analysis of IPv4 Address Space Delegation Structure. 12th IEEE Symposium on Computers and Communications (ISCC), July 2007. [Full Paper,Abstract] Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel, From Trusted to Secure: Building and Executing Applications that Enforce System Security. Proceedings of the USENIX Annual Technical Conference, June 2007. [Full Paper,Abstract] William Enck, Patrick McDaniel, Shubho Sen, Panagiotis Sebos, Sylke Spoerel, Albert Greenberg, Sanjay Rao, and William Aiello, Configuration Management at Massive Scale: System Design and Experience. Proceedings of the USENIX Annual Technical Conference, June 2007. [Full Paper,Abstract] Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, and Patrick McDaniel, A Logical Specification and Analysis for SELinux MLS Policy. Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT), June 2007. [Full Paper,Abstract] Trent Jaeger, Reiner Sailer, and Yogesh Sreenivasan, Managing the Risk of Covert Information Flows in Virtual Machine Systems. ACM Symposium on Access Control Models and Technologies (SACMAT), June 2007. [Abstract] Heesook Choi, Thomas F. La Porta, and Patrick McDaniel, Privacy Preserving Communication in MANETs. Proceedings of Fourth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, June 2007. [Full Paper,Abstract] Sophie Qui, Patrick McDaniel, and Fabian Monrose, Toward Valley-Free Inter-domain Routing. Proceedings of 2007 IEEE International Conference on Communications (ICC 2007), June 2007. [Full Paper,Abstract] Vinod Ganapathy, Dave King, Trent Jaeger, and Somesh Jha, Mining Security-Sensitive Operations in Legacy Code using Concept Analysis. Proceedings of the 29th International Conference on Software Engineering (ICSE '07), May 2007. [Full Paper,Abstract] S. Ryu, K. Butler, P. Traynor, and P. McDaniel, Leveraging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems. IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS), May 2007. [Full Paper,Abstract] Hosam Rowaihy, William Enck, Patrick McDaniel, and Thomas La Porta, Limiting Sybil Attacks in Structured Peer-to-Peer Networks. Proceedings of IEEE INFOCOM 2007 MiniSymposium, May 2007. [Full Paper,Abstract] Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel, Integrating SELinux with Security-typed Languages. Third Annual Security Enhanced Linux Symposium, March 2007. [Full Paper,Abstract] Adam Smith, Scrambling Adversarial Errors Using Few Random Bits. The ACM-SIAM Symposium on Discrete Algorithms (SODA 2007), January 2007. [Full Paper,Abstract] Dave King, Susmit Jha, Trent Jaeger, Somesh Jha, and and Sanjit A. Seshia, On Automatic Placement of Declassifiers for Information-Flow Security. Technical Report NAS-TR-0083-2007, Network and Security Research Center, November 2007. Updated January 2008. In submission. [Abstract] Kevin Butler, Stephen McLaughlin, and Patrick McDaniel, Non-Volatile Memory and Disks: Avenues for Policy Architectures. Technical Report NAS-TR-0074-2007, Network and Security Research Center, June 2007. [Abstract] William Enck, Sandra Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger, and Patrick McDaniel, Protecting Users From "Themselves". Technical Report NAS-TR-0073-2007, Network and Security Research Center, June 2007. [Abstract] Dhananjay Bapat, Kevin Butler, and Patrick McDaniel, Towards Automated Privilege Separation. Technical Report NAS-TR-0071-2007, Network and Security Research Center, May 2007. [Abstract] Dave King, Trent Jaeger, Somesh Jha, and Sanjit A. Seshia, Effective Blame for Information-Flow Violations. Technical Report NAS-TR-0069-2007, Network and Security Research Center, May 2007. Updated March 2008. [Abstract] Luke St.Clair, Josh Schiffman, Trent Jaeger, and Patrick McDaniel, Establishing and Sustaining System Integrity via Root of Trust Installation. Technical Report NAS-TR-0067-2007, Network and Security Research Center, April 2007. [Abstract] William Enck, Patrick McDaniel, and Trent Jaeger, PinUP: Protecting User Files by Reducing Application Access. Technical Report NAS-TR-0063-2007, Network and Security Research Center, February 2007. Updated January 2008. [Abstract] Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta, Exploiting Open Functionality in SMS-Capable Cellular Networks. Technical Report NAS-TR-0007-2007, Network and Security Research Center, February 2007. Lisa Johansen, Kevin Butler, William Enck, Patrick Traynor, and Patrick McDaniel, Grains of SANs: Building Storage Area Networks from Memory Spots. Technical Report NAS-TR-0060-2007, Network and Security Research Center, January 2007. [Abstract] Patrick Traynor, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, and Thomas La Porta, From Mobile Phones to Responsible Devices. Technical Report NAS-TR-0059-2007, Network and Security Research Center, January 2007. [Abstract] Trent Jaeger, Reiner Sailer, and Yogesh Sreenivasan, Managing the Risk of Covert Information Flows in Virtual Machine Systems. Technical Report RC24154, IBM, January 2007. [Full Paper,Abstract] Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel, From Trusted to Secure: Building and Executing Applications that Enforce System Security. Technical Report NAS-TR-0061-2007, Network and Security Research Center, January 2007. William Enck, Sandra Rueda, Yogesh Sreenivasan, Joshua Schiffman, Luke St. Clair, Trent Jaeger, and Patrick McDaniel, Protecting Users from "Themselves". Proceedings of the 1st ACM Computer Security Architectures Workshop, November 2007. [Full Paper,Abstract] Kevin Butler, Stephen McLaughlin, and Patrick McDaniel, Non-Volatile Memory and Disks: Avenues for Policy Architectures. First Computer Security Architecture Workshop (CSAW 2007), November 2007. [Full Paper,Abstract] S. Raskhodnikova, D. Ron, R. Rubinfeld, and A. Smith, Sublinear Algorithms for Approximating String Compressibility. The 11th International Workshop on Randomization and Computation (RANDOM 2007), August 2007. [Full Paper,Abstract] Boniface Hicks, Dave King, and Patrick McDaniel, Jifclipse: Development Tools for Security-Typed Applications. Proceedings of the 2nd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '07), ACM Press, June 14 2007. Editor: Michael Hicks. [Full Paper,Abstract] 2006Patrick McDaniel, B. Aiello, Kevin Butler, and J. Ioannidis, Origin Authentication in Interdomain Routing. Computer Networks, 50(16):2953-2980, November 2006. [Full Paper,Abstract] Patrick McDaniel and Atul Prakash, Enforcing Provisioning and Authorization Policy in the Antigone System. Journal of Computer Security, 14(9):483-511, November 2006. [Full Paper,Abstract] Patrick McDaniel and Atul Prakash, Methods and Limitations of Security Policy Reconciliation. ACM Transactions on Information and System Security (TISSEC), Association for Computing Machinery, 9(3):259-291, August 2006. [Full Paper,Abstract] Boniface Hicks, Kiyan Ahmadizadeh, and Patrick McDaniel, Understanding Practical Application Development in Security-typed Languages. 22st Annual Computer Security Applications Conference (ACSAC), December 2006. [Full Paper,Abstract] Jonathon McCune, Stefan Berger, Ramon Caceres, Trent Jaeger, and Reiner Sailer, Shamon: A system for distributed mandatory access control. The Proceedings of the 2006 Annual Computer Security Applications Conference, December 2006. [Full Paper,Abstract] Kevin Butler, William Enck, Jennifer Plasterr, Patrick Traynor, and Patrick McDaniel, Privacy-Preserving Web-Based Email. 2nd International Conference on Information Systems Security (ICISS 2006), December 2006. [Full Paper,Abstract] Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger, Password Exhaustion: Predicting the End of Password Usefulness. 2nd International Conference on Information Systems Security (ICISS 2006), December 2006. Invited Paper. [Full Paper,Abstract] Kevin Butler, Patrick McDaniel, and William Aiello, Optimizing BGP Security by Exploiting Path Stability. 13th ACM Conference on Computer and Communications Security (CCS'06), November 2006. [Full Paper,Abstract] Matthew Pirretti, Patrick Traynor, Patrick McDaniel , and Brent Waters, Secure Attribute-Based Systems. 13th ACM Conference on Computer and Communications Security (CCS'06), November 2006. [Full Paper,Abstract] Michael Ben-Or, Claude Crepeau, Daniel Gottesman, Avinatan Hassidim, and Adam Smith, Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority. Foundations of Computer Science (FOCS 2006), October 2006. [Full Paper,Abstract] Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta, Mitigating Open Functionality in SMS-Capable Cellular Networks. Proceedings of the ACM Twelfth Annual International Conference on Mobile Computing and Networking (MobiCom), September 2006. [Full Paper,Abstract] Patrick Traynor, JaeShung Shin, Barat Madan, Shashi Phoha, and Thomas La Porta, Efficient Group Mobility for Heterogeneous Sensor Networks. Proceedings of the IEEE Vehicular Technology Conference (VTC Fall), September 2006. [Full Paper,Abstract] Moni Naor, Gil Segev, and Adam Smith, Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared key Models. The 26th Annual International Cryptology Conference (CRYPTO'06), August 2006. [Full Paper,Abstract] Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, and Adam Smith, Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets. The 26th Annual International Cryptology Conference (CRYPTO'06), August 2006. [Full Paper] Trent Jaeger, Kevin Butler, David King, Jonathan McCune, Ramon Caceres, Serge Hallyn, Joy Latten, Reiner Sailer, and Xiolan Zhang, Leveraging IPsec for Distributed Authorization. 2nd IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm'06), August 2006. [Full Paper,Abstract] Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, and Patrick McDaniel, Non-Invasive Methods for Host Certification. 2nd IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm'06), August 2006. [Full Paper,Abstract] Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, and Guillaume Marceau, The case for analysis preserving language transformations. Proceedings of the 2006 International Symposium on Software Testing and Analysis, pages 191-201, July 2006. Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guohong Cao, and Thomas La Porta, LIGER: Implementing Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. Proceedings of the 4th ACM International Conference on Mobile Systems, Applications and Services (MobiSys), June 2006. [Full Paper,Abstract] Sophie Qiu, Patrick McDaniel, Fabian Monrose, and Avi Rubin, Characterizing Address Use Structure and Stabillity of Origin Advertisement in Interdomain Routing. 11th IEEE Symposium on Computers and Communications, pages 489-496, June 2006. [Full Paper,Abstract] V. Ganapathy, T. Jaeger, and S. Jha, Retrofitting Legacy Code for Authorization Policy Enforcement. Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006. [Full Paper,Abstract] Patrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu, and Thomas La Porta, Establishing Pair-Wise Keys In Heterogeneous Sensor Networks. Proceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM), April 2006. [Full Paper,Abstract] Patrick Traynor, Guohong Cao, and Thomas La Porta, The Effects of Probabilistic Key Management on Secure Routing in Sensor Networks. Proceedings of the 2006 IEEE Wireless Communications and Networking Conference (WCNC), April 2006. [Full Paper,Abstract] Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith, Calibrating Noise to Sensitivity in Private Data Analysis. Theory of Cryptography Conference (TCC '06), March 2006. [Full Paper,Abstract] Patrick McDaniel, Shubho Sen, Oliver Spatscheck, Jacobus Van der Merwe Bill Aiello, and Charles Kalmanek, Enterprise Security: A Community of Interest Based Approach. Proceedings of Network and Distributed Systems Security 2006 (NDSS), February 2006. [Full Paper,Abstract] U. Shankar, T. Jaeger, and R. Sailer, Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. Proceedings of the 2006 ISOC Networked and Distributed Systems Security Symposium, February 2006. [Full Paper,Abstract] Luke St. Clair, Josh Schiffman, Trent Jaeger, and Patrick McDaniel, Sum of the Parts: Composing Trust from Validation Primitives. Technical Report NAS-TR-0056-2006, Network and Security Research Center, November 2006. [Abstract] Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta, Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks. Technical Report NAS-TR-0051-2006, Network and Security Research Center, October 2006. Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel, Breaking Down the Walls of Mutual Distrust: Security-typed Email Using Labeled IPsec. Technical Report NAS-TR-0049-2006, Network and Security Research Center, September 2006. Patrick Traynor, Raju Kumar, Heesook Choi, Guohong Cao, Sencun Zhu, and Thomas La Porta, Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. Technical Report NAS-TR-0044-2006, Network and Security Research Center, August 2006. Patrick McDaniel, Understanding Equivalence in High-Level and Information Flow Policy. Technical Report NAS-TR-0042-2006, Network and Security Research Center, July 2006. Lisa Johansen, Kevin Butler, Mike Rowell, and Patrick McDaniel, Email Communities of Interest. Technical Report NAS-TR-0040-2006, Network and Security Research Center, May 2006. Boniface Hicks, Kiyan Ahmadizadeh, and Patrick McDaniel, From Languages to Systems: Understanding Practical Application Development in Security-typed Languages. Technical Report NAS-TR-0035-2006, Network and Security Research Center, April 2006. Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel, and Tom LaPorta, ASR: Anonymous and Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks. Technical Report NAS-TR-0034-2006, Network and Security Research Center, March 2006. J. McCune, S. Berger, R. Caceres, T. Jaeger, and R. Sailer, DeuTeRiuM: A system for distributed mandatory access control. Technical Report RC23865, IBM T.J. Watson Research Center, February 2006. Submitted for publication. William Enck, Kevin Butler, Thomas Richardson, and Patrick McDaniel, Securing Non-Volatile Main Memory. Technical Report NAS-TR-0029-2006, Network and Security Research Center, February 2006. Shiva Chaitanya, Kevin Butler, Anand Sivasubramaniam , Patrick McDaniel, and Murali Vilayannur, Design, implementation and evaluation of security in iSCSI-based network storage systems. The 2nd International Workshop on Storage Security and Survivability (StorageSS 2006), October 2006. [Full Paper,Abstract] Trent Jaeger, Patrick McDaniel, Luke St.Clair, Ramon Caceres, and Reiner Sailer, Shame on Trust in Distributed Systems. Proceedings of the First Workshop on Hot Topics in Security (HotSec '06), July 2006. [Full Paper,Abstract] Kevin Butler and Patrick McDaniel, Testing Large Scale BGP Security in Replayable Network Environments. DETER Community Workshop on Cyber Security Experimentation and Test, June 2006. [Full Paper,Abstract] Kevin Butler, Patrick McDaniel, and Sophie Qui, BGPRV: Retrieving and Processing BGP Data with Efficiency and Convenience. DETER Community Workshop on Cyber Security Experimentation and Test, June 2006. [Full Paper,Abstract] Boniface Hicks, Dave King, Patrick McDaniel, and Michael Hicks, Trusted Declassification: High-level policy for a security-typed language. Proceedings of the 1st ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '06), ACM Press, June 2006. [Full Paper,Abstract] 2005P. McDaniel and A. Prakash, Security Policy Enforcement in the Antigone System. Journal of Computer Security 2005. Accepted for publication. Draft. [Full Paper,Abstract] Matthew Pirretti, Sencun Zhu, Vijaykrishnan Narayanan, Patrick McDaniel, Mahmut Kandemir, and and Richard Brooks, The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. International Journal of Distributed Sensor Networks, 2(3):267-287, June 2005. [Full Paper,Abstract] Kevin Butler and Patrick McDaniel, Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. Proceedings of 1st International Conference on Information Systems Security (ICISS), December 2005. Invited Paper. [Full Paper,Abstract] R. Sailer, T. Jaeger, E. Valdez, R. Caceres, R. Perez , S. Berger, J. L. Griffin, and L. van Doorn, Building a MAC-based Security Architecture for the Xen Open-Source Hypervisor. Proceedings of the 21st Annual Computer Security Applications Conference, December 2005. [Full Paper,Abstract] Wesam Lootah, William Enck, and Patrick McDaniel, TARP: Ticket-Based Address Resolution Protocol. 21st Annual Computer Security Applications Conference (ACSAC), December 2005. [Full Paper,Abstract] V. Ganapathy, T. Jaeger, and S. Jha, Automatic placement of authorization hooks in the Linux security modules framework. Proceedings of the 12th ACM Conference on Computer and Communications Security, November 2005. [Full Paper,Abstract] William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta, Exploiting Open Functionality in SMS-Capable Cellular Networks. Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS), November 2005. [Full Paper,Abstract] Matthew Pirretti, Sencun Zhu, Vijaykrishnan Narayanan, Patrick McDaniel, Mahmut Kandemir, and and Richard Brooks, The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. Proceedings of the Innovations and Commercial Applications of Distributed Sensor Networks Symposium, October 2005. (best paper). [Full Paper,Abstract] Luis Kruger, Somesh Jha, and Patrick McDaniel, Privacy Preserving Clustering. 10th European Symposium on Research in Computer Security (ESORICS '05), September 2005. Milan, Italy. [Full Paper,Abstract] Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel, and Thomas F. La Porta, Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks. MobiQuitous 2005, July 2005. San Diego, CA. [Full Paper,Abstract] Yevgeniy Dodis and Adam Smith, Correcting Errors Without Leaking Partial Information. ACM Symposium on Theory of Computing (STOC), May 2005. Baltimore, MD. [Full Paper,Abstract] Claude Cr�peau, Daniel Gottesman, and Adam Smith, Approximate Quantum Error Correcting Codes and Verifiable Secret Sharing. Eurocrypt 2005, May 2005. Aarhus, Denmark. [Full Paper,Abstract] Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, and Adam Smith, Secure Remote Authentication Using Biometric Data. Eurocrypt 2005, May 2005. Aarhus, Denmark. [Full Paper,Abstract] Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam Smith, and Hoeteck Wee, Towards Privacy in Public Databases. Theory of Cryptography (TCC) 2005, February 2005. Cambridge, MA. [Full Paper,Abstract] Yevgeniy Dodis and Adam Smith, Entropic Security and the Encryption of High Entropy Messages. Theory of Cryptography (TCC) 2005, February 2005. Cambridge, MA. [Full Paper,Abstract] S. Qiu, P. McDaniel, F. Monrose, and A. Rubin, Characterizing Address Use Structure and Stabillity of Origin Advertisement in Interdomain Routing. Technical Report NAS-TR-0018-2005, Network and Security Research Center, July 2005. T. Jaeger, S. Hallyn, and J. Latten, Leveraging IPsec for Mandatory Access Control of Linux Network Communications. Technical Report RC23642, IBM T.J. Watson Research Center, April 2005. Presented at 21st Annual Computer Security Applications Conference; Tucson, Arizona; December 2005. Boniface Hicks, Patrick McDaniel, and Ali Hurson, Information flow control in database security: A case study for secure programming with JIF. Technical Report NAS-TR-0011-2005, Network and Security Center, April 2005. [Full Paper,Abstract] Boniface Hicks, Dave King, and Patrick McDaniel, Declassification with Cryptographic Functions in a Security-Typed Language. Technical Report NAS-TR-0004-2005, Network and Security Center, January 2005. (updated May 2005). [Abstract] Ali Al-Lawati, Dongwon Lee, and Patrick McDaniel, Blocking in Private Information Matching. Proceedings of Second International ACM SIGMOD Workshop on Information Quality in Information Systems, July 2005. Baltimore, MD. [Full Paper,Abstract] J. Linwood Griffin, T. Jaeger, R. Perez , R. Sailer, L. van Doorn, and R. Caceres, Analysis of Communities Of Interest in Data Networks. Passive and Active Measurement Workshop 2005, March 2005. Boston, MA. [Full Paper,Abstract] Michael Hicks, Stephen Tse, Boniface Hicks, and Steve Zdancewic, Dynamic updating of information-flow policies. Proceedings of the Foundations of Computer Security Workshop (FCS '05), March 2005. [Full Paper,Abstract] 2004S. Byers, L. Cranor, E. Cronin, D. Kormann, and P. McDaniel, Analysis of Security Vulnerabilities in the Movie Production and Distribution Process. Telecommunications Policy, 28(8):619-644, August 2004. [Full Paper,Abstract] T. Jaeger, A. Edwards, and X. Zhang, Consistency Analysis of Authorization Hook Placement in the Linux Security Modules Framework. ACM Transactions on Information and System Security (TISSEC), 7(2):175-205, May 2004. [Full Paper,Abstract] S. Byers, L. Cranor, E. Cronin, D. Kormann, and P. McDaniel, Exposing Digital Content Piracy: Approaches, Issues and Experiences. Thirty-Eighth Conference on Signals, Systems, and Computers, Nov 2004. Monterey, CA. Invited paper. R. Sailer, T. Jaeger, X. Zhang, and L. van Doorn, Attestation-based policy enforcement for remote access. ACM Conference on Computer and Communications Security, pages 308-317 2004. [Full Paper,Abstract] R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, Design and Implementation of a TCG-based Integrity Measurement Architecture. USENIX Security Symposium, pages 223-238 2004. [Full Paper,Abstract] T. Jaeger, R. Sailer, and X. Zhang, Resolving Constraint Conflicts. Proceedings of the 2004 ACM Symposium on Access Control Models and Technologies, June 2004. [Full Paper,Abstract] W. Aiello, K. Butler, and P. McDaniel, Path Authentication in Interdomain Routing. Technical Report TR NAS-TR-0002-2004, Network and Security Center, Department of Computer Science and Engineering, Penn State University, November 2004. [Full Paper,Abstract] Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer Rexford, A Survey of BGP Security Issues and Solutions. Technical Report TR TD-5UGJ33, Network and Security Center, AT&T Labs - Research, Florham Park, NJ, February 2004. (updated June 2004). H.B. Wang, S. Jha, P. McDaniel, and M. Livny, Security Policy Reconciliation in Distributed Computing Environments. Proceedings of 5th International Workshop on Policies for Distributed Systems and Networks (Policy 2004), IEEE, June 2004. [Full Paper,Abstract] Simon Byers, Lorrie Faith Cranor, Dave Kormann, and Patrick McDaniel, Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine. Proceedings of 2004 Workshop on Privacy Enhancing Technologies (PETS), May 2004. Toronto, Canada. [Full Paper,Abstract] 2003T. Jaeger, X. Zhang, and A. Edwards, Policy Management Using Access Control Spaces. ACM Transactions on Information and System Security (TISSEC), 6(3):327-364, August 2003. [Full Paper,Abstract] W. Aiello, J. Ioannidis, and P. McDaniel, Origin Authentication in Interdomain Routing. Proceedings of 10th ACM Conference on Computer and Communications Security, ACM, pages 165-178, October 2003. Washington, DC. [Full Paper,Abstract] E. Cronin, S. Jamin, T. Malkin, and P. McDaniel, On the Performance, Feasibility, and Use of Forward Secure Signatures. Proceedings of 10th ACM Conference on Computer and Communications Security, ACM, pages 131-144, October 2003. Washington, DC. [Full Paper,Abstract] T. Jaeger, R. Sailer, and X. Zhang, Analyzing Integrity Protection in the SElinux Example Policy. Proceedings of the 12th USENIX Security Symposium, pages 59-74, August 2003. [Full Paper,Abstract] Geoff Goodell, William Aiello, Tim Griffin, John Ioannidis, Patrick McDaniel, and Avi Rubin, Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing. Proceedings of Network and Distributed Systems Security 2003 (NDSS), Internet Society, pages 75-85, February 2003. San Diego, CA. [Full Paper,Abstract] Simon Byers, Lorrie Cranor, Eric Cronin, Dave Kormann, and Patrick McDaniel, Analysis of Security Vulnerabilities in the Movie Production and Distribution Process. Proceedings of 2003 ACM Workshop on Digital Rights Management, ACM, October 2003. Washington, DC. [Full Paper,Abstract] 2002A. Edwards, X. Zhang, and T. Jaeger, Runtime Verification of Authorization Hook Placement for the Linux Security Modules Framework. Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 225-234, October 2002. Washington, DC. [Full Paper,Abstract] X. Zhang, A. Edwards, and T. Jaeger, Using CQUAL for Static Analysis of Authorization Hook Placement. Proceedings of the 11th USENIX Security Symposium, pages 33-48, August 2002. [Full Paper,Abstract] Patrick McDaniel and Atul Prakash, Methods and Limitations of Security Policy Reconciliation. 2002 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, pages 73-87, MAY 2002. Oakland, CA. [Full Paper,Abstract] 2001T. Jaeger and J. Tidswell, Practical safety in flexible access control models. ACM Transactions on Information and System Security (TISSEC), 4(2):158-190 2001. [Full Paper,Abstract] Patrick McDaniel, Atul Prakash, Jim Irrer, Sharad Mittal, and Thai-Chuin Thuang, Flexibly Constructing Secure Groups in Antigone 2.0. Proceedings of DARPA Information Survivability Conference and Exposition II, IEEE Computer Society Press, pages 55-67, June 2001. Los Angeles, CA. [Full Paper,Abstract] Trent Jaeger, Managing access control complexity using metrics. Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies (SACMAT-01), pages 131-152, May 2001. [Full Paper,Abstract] Hugh Harney, Andrea Colegrove, and Patrick McDaniel, Principles of Policy in Secure Groups. Proceedings of Network and Distributed Systems Security 2001 (NDSS), Internet Society, February 2001. San Diego, CA. [Full Paper,Abstract] Mohit Aron, Jochen Liedtke, Kevin Elphinstone , Yoonho Park, Trent Jaeger, and Luke Deller, The SawMill Framework for Virtual Memory Diversity. Proceedings of the 2001 Australian Computer Systems Architecture Conference, pages 3-10 2001. 2000Moreno Falaschi, Patrick Hicks, and William Winsborough, Demand Transformation Analysis for Concurrent Constraint Programs. Journal of Logic Programming, 41(3):185-215, MAR 2000. [Abstract] John Hannan and Patrick Hicks, Higher-Order Uncurrying. Journal of Higher Order and Symbolic Computation, 13(3):179--216 2000. [Abstract] Jonathon Tidswell and Trent Jaeger, An access control model for simplifying constraint _expression_. Proceedings of the ACM Conference on Computer and Communications Security (CCS), pages 154-163 2000. [Full Paper] Patrick McDaniel and Sugih Jamin, Windowed Certificate Revocation. Proceedings of IEEE INFOCOM 2000, IEEE, pages 1406-1414, March 2000. Tel Aviv, Israel. [Full Paper,Abstract] Patrick McDaniel and Avi Rubin, A Response to `Can We Eliminate Certificate Revocation Lists?'. Proceedings of Financial Cryptography 2000, International Financial Cryptography Association (IFCA), pages 245-258, February 2000. Anguilla, British West Indies. [Full Paper,Abstract] T. Jaeger, J. Tidswell, A. Gefflautand Y. Park, K. Elphinstone, and J.Liedtke, Synchronous IPC over transparent monitors. ACM SIGOPS European Workshop, pages 189-194 2000. Alain Gefflaut, Trent Jaeger, Yoonho Park and Jochen Liedtke, Kevin Elphinstone, Volkmar Uhlig , Jonathon Tidswell, Luke Deller, and Lars Reuther, The SawMill multiserver approach. Proceedings of the ACM SIGOPS European Workshop, pages 109-114 2000. [Full Paper] Jonathan F. Tidswell and Trent Jaeger, Integrated Constraints and Inheritance in DTAC. Proceedings of the 5th ACM Workshop on Role-Based Access Control (RBAC-00), pages 93-102, July 2000. [Abstract] 1999T. Jaeger, A. Prakash, J. Liedtke, and N. Islam, Flexible Control of Downloaded Executable Content. ACM Transactions on Information and System Security, 2(2):177-228, May 1999. [Full Paper,Abstract] Trent Jaeger, Access Control in Configurable Systems. pages 289-316 1999. Andrwe Adamson, C.J. Antonelli, Kevin Coffman, Patrick McDaniel, and Jim Rees, Secure Distributed Virtual Conferencing. Proceedings of Communications and Multimedia Security (CMS '99), pages 176-190, September 1999. Katholieke Universiteit, Leuven, Belgium. [Full Paper,Abstract] Patrick McDaniel, Atul Prakash, and Peter Honeyman, Antigone: A Flexible Framework for Secure Group Communication. Proceedings of the 8th USENIX Security Symposium, pages 99-114, August 1999. Washington, DC. [Full Paper,Abstract] Trent Jaeger, On the Increasing Importance of Constraints. Proceedings of the Fourth ACM Wokshop on Role-Based Access Control, pages 33-42, October 1999. Trent Jaeger, Tony Michailidis, and Roy Rada, Access Control in a Virtual University. Proceedings of the Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, pages 135-140 1999. Jochen Liedtke, Volkmar Uhlig, Kevin Elphinstone , Trent Jaeger, and Yoonho Park, How To Schedule Unlimited Memory Pinning of Untrusted Processes Or Provisional Ideas about Service-Neutrality. Proceedings of the Workshop on Hot Topics in Operating Systems, pages 153-158 1999. [Abstract] T. Jaeger, K. Elphinstone, J. Liedtkeand V. Panteleenko, and Y. Park, Flexible Access Control using IPC Redirection. Workshop on Hot Topics in Operating Systems 1999. [Abstract] 1997Nayeem Islam, Rangachari Anand, Trent Jaeger, and Josyula R. Rao, A flexible security system for using Internet content. IEEE Software, 14(5):52-59, September 1997. [Abstract] |
