Patrick McDaniel
Patrick McDaniel
William L. Weiss Professor, Computer Science and Engineering, Penn State Unviersity
Verified email at cse.psu.edu
TitleCited byYear
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
W Enck, P Gilbert, S Han, V Tendulkar, BG Chun, LP Cox, J Jung, ...
ACM Transactions on Computer Systems (TOCS) 32 (2), 5, 2014
31172014
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
S Arzt, S Rasthofer, C Fritz, E Bodden, A Bartel, J Klein, Y Le Traon, ...
Acm Sigplan Notices 49 (6), 259-269, 2014
10962014
On lightweight mobile phone application certification
W Enck, M Ongtang, P McDaniel
Proceedings of the 16th ACM conference on Computer and communications …, 2009
10522009
A study of android application security.
W Enck, D Octeau, PD McDaniel, S Chaudhuri
USENIX security symposium 2, 2, 2011
10412011
Security and privacy challenges in the smart grid
P McDaniel, S McLaughlin
IEEE Security & Privacy, 75-77, 2009
9602009
Understanding android security
W Enck, M Ongtang, P McDaniel
IEEE security & privacy, 50-57, 2009
7492009
Semantically rich application‐centric security in Android
M Ongtang, S McLaughlin, W Enck, P McDaniel
Security and Communication Networks 5 (6), 658-673, 2012
6392012
The limitations of deep learning in adversarial settings
N Papernot, P McDaniel, S Jha, M Fredrikson, ZB Celik, A Swami
Security and Privacy (EuroS&P), 2016 IEEE European Symposium on, 372-387, 2016
6372016
Secure attribute-based systems
M Pirretti, P Traynor, P McDaniel, B Waters
Journal of Computer Security 18 (5), 799-837, 2010
5942010
Distillation as a defense to adversarial perturbations against deep neural networks
N Papernot, P McDaniel, X Wu, S Jha, A Swami
2016 IEEE Symposium on Security and Privacy (SP), 582-597, 2016
5242016
A survey of BGP security issues and solutions
K Butler, TR Farley, P McDaniel, J Rexford
Proceedings of the IEEE 98 (1), 100-122, 2010
3912010
Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis
D Octeau, P McDaniel, S Jha, A Bartel, E Bodden, J Klein, Y Le Traon
Effective Inter-Component Communication Mapping in Android with Epicc: An …, 2013
3732013
Practical black-box attacks against machine learning
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
3562017
Iccta: Detecting inter-component privacy leaks in android apps
L Li, A Bartel, TF Bissyandé, J Klein, Y Le Traon, S Arzt, S Rasthofer, ...
Proceedings of the 37th International Conference on Software Engineering …, 2015
3132015
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing.
G Goodell, W Aiello, T Griffin, J Ioannidis, PD McDaniel, AD Rubin
NDSS 23, 156, 2003
2942003
Transferability in machine learning: from phenomena to black-box attacks using adversarial samples
N Papernot, P McDaniel, I Goodfellow
arXiv preprint arXiv:1605.07277, 2016
2712016
Method and system for determining and enforcing security policy in a communication session
P McDaniel, A Prakash
US Patent App. 10/006,552, 2003
2712003
On cellular botnets: measuring the impact of malicious devices on a cellular network core
P Traynor, M Lin, M Ongtang, V Rao, T Jaeger, P McDaniel, T La Porta
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2682009
Ensemble adversarial training: Attacks and defenses
F Tramèr, A Kurakin, N Papernot, I Goodfellow, D Boneh, P McDaniel
arXiv preprint arXiv:1705.07204, 2017
2612017
Exploiting open functionality in SMS-capable cellular networks
W Enck, P Traynor, P McDaniel, T La Porta
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2602005
The system can't perform the operation now. Try again later.
Articles 1–20