Photo of Patrick McDaniel

Patrick McDaniel

Distinguished Professor

Affiliation(s):

  • School of Electrical Engineering and Computer Science
  • Computer Science and Engineering

W329 Westgate Building

pdm12@psu.edu

814-863-3599

Personal or Departmental Website

Research Areas:

Interest Areas:

Systems and network security, security policy, networking, distributed systems, public policy, network management, applied cryptography, privacy.

 
 

 

Education

  • BS, Computer Science, Ohio State University, 1989
  • MS, Ball State University, 1991
  • MA, Computer Science and Engineering, University of Michigan, 2001

Publications

Books

  • Patrick Traynor, Patrick D McDaniel and Thomas F Laporta, 2008, Security for Telecommunications Networks, Springer, pp. 182 pages
  • , 2005, Encyclopedia of Cryptography and Security, Springer

Book, Chapters

  • K Butler, W Enck, P Traynor, J Plasterr and Patrick D McDaniel, 2008, Privacy Preserving Web-Based Email
  • Patrick D McDaniel, 2007, Authentication, John Wiley and Sons, Inc
  • Patrick D McDaniel, 2005, IPsec
  • Patrick D McDaniel, 2005, Policy
  • Patrick D McDaniel, 2004, Computer and Network Authentication, John Wiley and Sons Inc
  • Patrick D McDaniel, 2003, Encyclopedia of Information Security, Kluwer Academic Publishers
  • Patrick D McDaniel, 2002, The Internet Encyclopedia, John Wiley and Sons, Inc

Journal Articles

  • Chaz Lever, Robert J. Walls, Yacin Nadji, David Dagon, Patrick D McDaniel and Manos Antonakakis, 2017, "Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains", IEEE Security \& Privacy Magazine (Secure Systems issue column)
  • Dave Tian, Katharine L Butler, Junghun Choi, Patrick D McDaniel and P. Krishnaswamy, 2017, "Securing ARP/NDP From the Ground Up", IEEE Transactions on Information Forensics and Security
  • Patrick D McDaniel and Ananthram Swami, 2017, "The Cyber Security Collaborative Research Alliance:Unifying Detection, Agility, and Risk in Mission-Oriented Cyber Decision Making", CSIAC Journal, Army Research Laboratory (ARL) Cyber Science and Technology, 5, (1)
  • S. Achleitner, T.F. La Porta, Patrick D McDaniel, S. Sugrim, S.V. Krishnamurthy and R. Chada, 2017, "Deceiving Network Reconnaissance Unsing SDN-based Virtual Topologies", IEEE Transactions on Network and Service Management, Special Issue on Advances in Management of Softwarized Networks
  • Z. Berkay Celik, Patrick D McDaniel and Thomas Bowen, 2017, "Malware Modeling and Experimentation through Parameterized Behavior", Journal of Defense Modeling and Simulation (JDMS)
  • Patrick D McDaniel, Nicolas Papernot and Berkay Celik, 2016, "Machine Learning in Adversarial Settings", IEEE Security \& Privacy Magazine, 14, (3)
  • Nicolas Papernot, Patrick D McDaniel, Ian Goodfellow, Somesh Jha, Berkay Celik and Ananthram Swami, 2016, "Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples", arXiv preprint arXiv:1602.02697
  • Nicolas Papernot, Patrick D McDaniel and Ian Goodfellow, 2016, "Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples", arXiv preprint arXiv:1605.07277
  • Damien Octeau, Daniel Luchaup, Somesh Jha and Patrick D McDaniel, 2016, "Composite Constant Propagation and its Application to Android Program Analysis", IEEE Transactions on Software Engineering, 42, (11), pp. 999-1014
  • Nicolas Papernot, Patrick D McDaniel, Xi Wu, Somesh Jha and Ananthram Swami, 2015, "Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks", CoRR, abs/1511.04508
  • Alexander Kott, Ananthram Swami and Patrick D McDaniel, 2015, "Six Potential Game-Changers in Cyber Security: Towards Priorities in Cyber Science and Engineering", CoRR, abs/1511.00509
  • Nicolas Papernot, Patrick D McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik* and Ananthram Swami, 2015, "The Limitations of Deep Learning in Adversarial Settings", CoRR, abs/1511.07528
  • Alexander Kott, Ananthram Swami and Patrick D McDaniel, 2014, "Security Outlook: Six Cyber Game Changers for the Next 15 Years", IEEE Computer, 47, (12), pp. 104–106
  • William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol N. Sheth, 2014, "TaintDroid: An Information-Flow Tracking System for Realtime PrivacyMonitoring on Smartphones", ACM Transactions on Computer Systems, 32, (2), pp. 5
  • William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol Sheth, 2014, "TaintDroid: an information flow tracking system for real-time privacymonitoring on smartphones", Communications of the ACM, 57, (3), pp. 99–106
  • Zhenfu Cao, Keqiu Li, Xu Li, Patrick D McDaniel, Radha Poovendran, Guojun Wang and Yang Xiang, 2014, "Guest Editors’ Introduction: Special Issue on Trust, Security, andPrivacy in Parallel and Distributed Systems", IEEE Trans. Parallel Distrib. Syst., 25, (2), pp. 279–282
  • Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau* and Patrick D McDaniel, 2014, "I know what leaked in your pocket: uncovering privacy leaks on AndroidApps with Static Taint Analysis", CoRR, abs/1404.7431
  • William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol Sheth, 2014, "TaintDroid: an information flow tracking system for real-time privacymonitoring on smartphones", Communications of the ACM, 57, (3), pp. 99–106
  • William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol N. Sheth, 2014, "TaintDroid: An Information-Flow Tracking System for Realtime PrivacyMonitoring on Smartphones", ACM Transactions on Computer Systems, 32, (2), pp. 5:1–5:29
  • Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau and Patrick D McDaniel, 2014, "I know what leaked in your pocket: uncovering privacy leaks on AndroidApps with Static Taint Analysis", CoRR, abs/1404.7431
  • Patrick D McDaniel, Brian Rivera and Ananthram Swami, 2014, "Toward a Science of Secure Environments", IEEE Security & Privacy, 12, (4), pp. 68–70
  • M. Ongtang*, S. McLaughlin*, W. Enck* and Patrick D McDaniel, 2012, "Semantically Rich Application-Centric Security in Android", Security and Communication Networks, 5, (6), pp. 658-673
  • Patrick D McDaniel, 2012, "Bloatware Comes to the Smartphone", IEEE Security & Privacy, 10, (4), pp. 85–87
  • P. Traynor*, C. Amrutkar, V. Rao, T. Jaeger, Patrick D McDaniel and T. F. La Porta, 2011, "From Mobile Phones to Responsible Devices", Journal of Security and Communication Networks (SCN), 4, (6), pp. 719-726
  • T Moyer*, K Butler*, J Schiffman, Patrick D McDaniel and Trent R Jaeger, 2011, "Scalable Web Content Attestation", IEEE Transactions on Computers, pp. 15
  • Patrick D McDaniel, 2011, "Data Provenance and Security", IEEE Security & Privacy Magazine, 9, (2), pp. 83-85
  • J. Schiffman, T. Jaeger and Patrick D McDaniel, 2011, "Network-based Root of Trust for Installation", IEEE Security & Privacy Magazine, 9, (1), pp. 40-48
  • Kevin Butler*, Stephen E. McLaughlin*, Thomas Moyer* and Patrick D McDaniel, 2010, "New Security Architectures Based on Emerging Disk Functionality", IEEE Security & Privacy, 8, (5), pp. 34–41
  • Patrick D McDaniel and William Enck*, 2010, "Not So Great Expectations: Why Application Markets Haven't Failed Security", IEEE Security & Privacy, 8, (5), pp. 76–78
  • Boniface Hicks*, Sandra Rueda, Luke St. Clair*, Trent R Jaeger and Patrick D McDaniel, 2010, "A logical specification and analysis for SELinux MLS policy", ACM Transactions on Information and System Security, 13, (3)
  • Patrick Traynor*, Kevin Butler*, William Enck*, Patrick D McDaniel and Kevin Borders, 2010, "malnets: large-scale malicious networks via compromised wireless access points", Security and Communication Networks, 3, (2-3), pp. 102–113
  • Kevin Butler*, Toni R. Farley, Patrick D McDaniel and Jennifer Rexford, 2010, "A Survey of BGP Security Issues and Solutions", Proceedings of the IEEE, 98, (1), pp. 100–122
  • Matthew Pirretti, Patrick Traynor*, Patrick D McDaniel and Brent Waters, 2010, "Secure attribute-based systems", Journal of Computer Security, 18, (5), pp. 799–837
  • Kevin R. B. Butler*, Sunam Ryu, Patrick Traynor* and Patrick D McDaniel, 2009, "Leveraging Identity-Based Cryptography for Node ID Assignment inStructured P2P Systems", IEEE Transactions on Parallel and Distributed Systems (TPDS), 20, (12), pp. 1803–1815
  • Heesook Choi, William Enck, Jaesheung Shin, Patrick D McDaniel and Thomas F Laporta, 2009, "ASR: anonymous and secure reporting of traffic forwarding activityin mobile ad hoc networks", ACM Wireless Networks (WINET), 15, (4), pp. 525–539
  • Patrick D McDaniel and Stephen E. McLaughlin, 2009, "Security and Privacy Challenges in the Smart Grid", IEEE Security & Privacy, 7, (3), pp. 75–77
  • W Enck, T Moyer, Patrick D McDaniel, S Sen, P Sebos, S Spoerel, A Greenberg, Y W Sung, S Rao and W Aiello, 2009, "Configuration Management at Massive Scale: System Design and Experience", IEEE Journal on Selected Areas in Communications (JSAC), 27
  • Patrick Traynor, William Enck, Patrick D McDaniel and Thomas F Laporta, 2009, "Mitigating attacks on open functionality in SMS-capable cellular networks", IEEE/ACM Transactions on Networking, 17, (1), pp. 40–53
  • William Enck, Machigar Ongtang and Patrick D McDaniel, 2009, "Understanding Android Security", IEEE Security and Privacy Magazine, 7, (1), pp. 50–57
  • Patrick Traynor, William Enck, Patrick D McDaniel and Thomas F Laporta, 2008, "Exploiting open functionality in SMS-capable cellular networks", Journal of Computer Security, 16, (6), pp. 713–742
  • Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks and Patrick D McDaniel, 2008, "Noninvasive Methods for Host Certification", ACM Transactions on Information and System Security (TISSEC), 11, (3)
  • Patrick D McDaniel and Bashar Nuseibeh, 2008, "Guest Editors’ Introduction: Special Section on Software Engineeringfor Secure Systems", IEEE Transactions on Software Engineering, 34, (1), pp. 3–4
  • Wesam Lootah, William Enck and Patrick D McDaniel, 2007, "TARP: Ticket-based address resolution protocol", Computer Networks, 51, (15), pp. 4322–4337
  • Patrick D McDaniel, P Traynor, R Kumar, H Choi, G Cao, S Zhu and T F La Porta, 2007, "Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks", IEEE Transactions on Mobile Computing, 6, (6), pp. 663-677
  • Patrick D McDaniel and Atul Prakash, 2006, "Enforcing provisioning and authorization policy in the Antigone system", Journal of Computer Security, 14, (6), pp. 483–511
  • Patrick D McDaniel and Atul Prakash, 2006, "Methods and limitations of security policy reconciliation", ACM Transactions on Information and System Security (TISSEC), 9, (3), pp. 259–291
  • Patrick D McDaniel, William Aiello, Kevin R. B. Butler and John Ioannidis, 2006, "Origin authentication in interdomain routing", Computer Networks, 50, (16), pp. 2953–2980
  • Matthew Pirretti, Sencun Zhu, Vijaykrishnan Narayanan, Patrick D McDaniel, Mahmut T Kandemir and Richard R. Brooks, 2006, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methodsof Defense", International Journal of Distributed Sensor Networks, 2, (3), pp. 267–287
  • Patrick D McDaniel and Aviel D. Rubin, 2005, "Web security", Computer Networks, 48, (5), pp. 697–699
  • Patrick D McDaniel and A Rubin, 2005, "Guest Editorial", Computer Networks, Special Issue on Web Security
  • S Byers, L Cranor, E Cronin, D Korman and Patrick D McDaniel, 2004, "Analysis of Security Vulnerabilities in the Movie Production and Distribution Process", Telecommunications Policy, 28, (8), pp. 619-644
  • E Cronin, S Jamin, T Malkin and Patrick D McDaniel, 2003, "Analysis of Security Vulnerabilities in the Movie Production and Distribution Process"
  • Ian Goodfellow, Patrick D McDaniel and Nicolas Papernot, , "The challenges of making machine learning robust against adversarial inputs", Communications of the ACM

Conference Proceedings

  • Florian Tramer, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh and Patrick D McDaniel, 2018, "Ensemble Adversarial Training: Attacks and Defenses", International Conference on Learning Representations
  • Nicolas Papernot, Patrick D McDaniel, Arunesh Sinha and Michael Wellman, 2018, "Security and Privacy in Machine Learning", London, UK
  • Chun-Ming Lai, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, Felix Wu, Patrick D McDaniel and Hasan Cam, 2017, "Attacking Strategies and Temporal Analysis Involving Facebook Discussion Groups"
  • Yunfeng Hong, Yongjian Hu, Chun-Ming Lai, Felix Wu, Iulian Neamtiu, Yu Paul, Patrick D McDaniel, Hasan Cam and Gail-Joon Ahn, 2017, "Defining and Detecting Environment Discrimination in Android Apps"
  • Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes and Patrick D McDaniel, 2017, "Adversarial Examples for Malware Detection"
  • Vaibhav Rastogi, Drew Davidson, Lorenzo De Carli, Somesh Jha and Patrick D McDaniel, 2017, "Cimplifier: Automatically Debloating Containers", Paderborn, Germany
  • Nicolas Papernot, Patrick D McDaniel, Ian Goodfellow, Somesh Jha, Z. Berkay Celik and Ananthram Swami, 2017, "Practical Black-Box Attacks against Machine Learning"
  • Stefan Achleitner, Thomas La Porta, Trent R Jaeger and Patrick D McDaniel, 2017, "Adversarial Network Forensics in Software Defined Networking"
  • Berkay Celik, Patrick D McDaniel and Rauf Izmailov, 2017, "Feature Cultivation in Privileged Information-augmented Detection"
  • Stefan Achleitner, Thomas La Porta, Patrick D McDaniel, Srikanth V. Krishnamurthy, Alexander Poylisher and Constantin Serban, 2017, "Malicious Co-Residency on the Cloud: Attacks and Defense"
  • Z. Berkay Celik, David Lopez-Paz and Patrick D McDaniel, 2017, "Patient-Driven Privacy Control through Generalized Distillation"
  • Ahmed Fathy Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Patrick D McDaniel and Lisa Marvel, 2017, "Stealth Migration: Hiding Virtual Machines on the Network"
  • Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac and Patrick D McDaniel, 2017, "Achieving Secure and Differentially Private Computations in Multiparty Settings"
  • Nathaniel Lageman, Eric Kilmer, Robert J. Walls and Patrick D McDaniel, 2016, "BinDNN: Resilient Function Matching Using Deep Learning"
  • Michael Backes, ven Bugiel, Erik Derr, Patrick McDaniel Damien Octeau and Sebastian Weisgerber, 2016, "On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis"
  • Devin J. Pohly and Patrick D McDaniel, 2016, "Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols"
  • Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick D McDaniel and Matthew Smith, 2016, "SoK: Lessons Learned From Android Security Research For Appified Software Platforms", San Francisco, CA
  • Nicolas Papernot, Patrick D McDaniel, Xi Wu, Somesh Jha and Ananthram Swami, 2016, "Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks", San Francisco, CA
  • Chaz Lever, Robert Walls, Yacin Nadji, David Dagon, Patrick D McDaniel and Manos Antonakakis, 2016, "Domain-Z: 28 Registrations Later", San Francisco, CA
  • Charles J. Huber, Scott E. Brown, Patrick D McDaniel and Lisa M. Marvel, 2016, "Cyber Fighter Associate: A Decision Support System for Cyber Agility", Princeton, NJ
  • Z. Berkay Celik, Nan Hu, Yun Li, Nicolas Papernot, Patrick D McDaniel, Jeff Rowe, Robert Walls, Karl Levitt, Novella Bartolini, Thomas La Porta and Ritu Chadha, 2016, "Mapping Sample Scenarios to Operational Models"
  • Damien Octeau, Somesh Jha, Matthew Dering, Patrick D McDaniel, Alexandre Bartel, Li Li, Jacques Klein and Yves Le Traon, 2016, "Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-Component Analysis", St. Petersburg, Florida, USA
  • Nicolas Papernot, Patrick D McDaniel, Ananthram Swami and Richard Harang, 2016, "Crafting Adversarial Input Sequences for Recurrent Neural Networks"
  • Stefan Achleitner, Thomas La Porta, Patrick D McDaniel, Shridatt Sugrim, Srikanth Krishnamurthy and Ritu Chadha, 2016, "Cyber Deception: Virtual Networks to Defend Insider Reconnaissance"
  • Nicolas Papernot, Patrick D McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik and Ananthram Swami, 2016, "The Limitations of Deep Learning in Adversarial Settings", Saarbrucken, Germany
  • D. J. Pohly*, C. Sestito and Patrick D McDaniel, 2015, "Adaptive protocol switching using Dynamically Insertable Bumps in the stack", pp. 342-347
  • N. Papernot, Patrick D McDaniel and R. J. Walls, 2015, "Enforcing agile access control policies in relational databases using views", pp. 7-12
  • Z. Berkay Celik*, R. J. Walls, Patrick D McDaniel and A. Swami, 2015, "Malware traffic detection using tamper resistant features", pp. 330-335
  • A. Oltramari, L. F. Cranor, R. J. Walls and Patrick D McDaniel, 2015, "Computational ontology of network operations", pp. 318-323
  • A. Aqil, A. O. F. Atya, Trent R Jaeger, S. V. Krishnamurthy, K. Levitt, Patrick D McDaniel, J. Rowe and A. Swami, 2015, "Detection of stealthy TCP-based DoS attacks", pp. 348-353
  • Robert J. Walls, Eric D. Kilmer, Nathaniel Lageman and Patrick D McDaniel, 2015, "Measuring the Impact and Perception of Acceptable Advertisements", pp. 107–120
  • Li Li, Alexandre Bartel, Tegawendé F Bissyandé, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau and Patrick D McDaniel, 2015, "IccTA: Detecting Inter-Component Privacy Leaks in Android Apps"
  • Damien Octeau, Daniel Luchaup, Matthew Dering, Somesh Jha and Patrick D McDaniel, 2015, "Composite Constant Propagation: Application to Android Inter-Component Communication Analysis"
  • Daniel Krych, Stephen Lange-Maney, Patrick D McDaniel and William Glodek, 2015, "Investigating weaknesses in Android certificate security"
  • Jing (Dave) Tian, Kevin R. B. Butler, Patrick D McDaniel and Padma Krishnaswamy, 2015, "Securing ARP From the Ground Up", ACM, pp. 305–312
  • Patrick D McDaniel, 2015, "A New Science of Security Decision Making", pp. IS–13
  • Alessandro Oltramari, Lorrie Faith Cranor, Robert J. Walls and Patrick D McDaniel, 2014, "Building an Ontology of Cyber Security", pp. 6
  • Matthew Dering* and Patrick D McDaniel, 2014, "Android market reconstruction and analysis", pp. 300-305
  • Wenhui Hu*, Damien Octeau*, Patrick D McDaniel and Peng Liu, 2014, "Duet: library integrity verification for android applications", ACM, pp. 141–152
  • Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau* and Patrick D McDaniel, 2014, "FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps", pp. 29
  • Philip Koshy*, Diana Koshy* and Patrick D McDaniel, 2014, "An Analysis of Anonymity in Bitcoin Using P2P Network Traffic", Springer-Verlag LNCS, 8437, pp. 469–485
  • Stephen E. McLaughlin*, Saman A. Zonouz, Devin J. Pohly* and Patrick D McDaniel, 2014, "A Trusted Safety Verifier for Process Controller Code", The Internet Society, pp. 15
  • Damien Octeau*, Patrick D McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein and Yves Le Traon, 2013, "Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis", pp. 543–558
  • Devin J. Pohly*, Stephen E. McLaughlin*, Patrick D McDaniel and Kevin Butler*, 2012, "Hi-Fi: collecting high-fidelity whole-system provenance", pp. 259–268
  • Weining Yang, Ninghui Li, Yuan Qi, Wahbeh H. Qardaji, Stephen E. McLaughlin* and Patrick D McDaniel, 2012, "Minimizing private data disclosures in the smart grid", pp. 415–427
  • Damien Octeau*, Somesh Jha and Patrick D McDaniel, 2012, "Retargeting Android applications to Java bytecode", pp. 6
  • Stephen E. McLaughlin* and Patrick D McDaniel, 2012, "SABOT: specification-based payload generation for programmable logic controllers", pp. 439–449
  • Eun-Kyoung Kim, Patrick D McDaniel and Thomas F Laporta, 2012, "A Detection Mechanism for SMS Flooding Attacks in Cellular Networks", pp. 76–93
  • Thomas Moyer*, Trent R Jaeger and Patrick D McDaniel, 2012, "Scalable Integrity-Guaranteed AJAX", pp. 1–19
  • Stephen E. McLaughlin*, Patrick D McDaniel and William Aiello, 2011, "Protecting consumer privacy from electric load monitoring", pp. 87–98
  • William Enck*, Damien Octeau*, Patrick D McDaniel and Swarat Chaudhuri, 2011, "A Study of Android Application Security"
  • M Ongtang*, Joshua Schiffman, Thomas F Laporta, Patrick D McDaniel, Abhrajit Ghosh and F Anjum, 2010, "Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware", pp. 6
  • Kevin R. B. Butler*, Stephen E. McLaughlin* and Patrick D McDaniel, 2010, "Kells: a protection framework for portable data", pp. 231–240
  • Stephen E. McLaughlin*, Dmitry Podkuiko*, Sergei Miadzvezhanka*, Adam Delozier* and Patrick D McDaniel, 2010, "Multi-vendor penetration testing in the advanced metering infrastructure", pp. 107–116
  • Machigar Ongtang*, Kevin Butler* and Patrick D McDaniel, 2010, "Porscha: policy oriented secure content handling in Android", pp. 221–230
  • Kevin R. B. Butler*, Stephen E. McLaughlin* and Patrick D McDaniel, 2010, "Protecting portable storage with host validation", pp. 651–653
  • Joshua Schiffman, Thomas Moyer*, Hayawardh Vijayakumar, Trent R Jaeger and Patrick D McDaniel, 2010, "Seeding clouds with trust anchors", pp. 43–46
  • William Enck*, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol Sheth, 2010, "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones", pp. 393–407
  • Toby Ehrenkranz, Jun Li and Patrick D McDaniel, 2010, "Realizing a Source Authentic Internet", pp. 217–234
  • Stephen E. McLaughlin*, Dmitry Podkuiko*, Adam Delozier*, Sergei Miadzvezhanka* and Patrick D McDaniel, 2010, "Embedded Firmware Diversity for Smart Electric Meters"
  • Boniface Hicks*, Sandra Rueda Rodreguez, Dave King, Thomas Moyer*, Joshua Schiffman, Yogesh Sreenivasan, Patrick D McDaniel and Trent R Jaeger, 2010, "An architecture for enforcing end-to-end access control over web applications", pp. 163–172
  • Kevin R. B. Butler*, Stephen E. McLaughlin* and Patrick D McDaniel, 2010, "Disk-enabled authenticated encryption", pp. 1–6
  • Patrick D McDaniel, Kevin R. B. Butler*, Stephen E. McLaughlin*, Erez Zadok, Radu Sion and Marianne Winslett, 2010, "Towards a Secure and Efficient System for End-to-End Provenance", pp. 5
  • Thomas Moyer*, Kevin R. B. Butler*, Joshua Schiffman, Patrick D McDaniel and Trent R Jaeger, 2009, "Scalable Web Content Attestation", pp. 95–104
  • Machigar Ongtang, Stephen E. McLaughlin, William Enck and Patrick D McDaniel, 2009, "Semantically Rich Application-Centric Security in Android", pp. 340–349
  • J. Schiffman, T. Moyer*, C. Shal, Trent R Jaeger and Patrick D McDaniel, 2009, "Justifying Integrity Using a Virtual Machine Verifier", pp. 83-92
  • T. La Porta, Patrick D McDaniel, K. Rauscher and J. Shu, 2009, "The Impact of Supply Chain on Information and Communications Technology Security", pp. 7
  • Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent R Jaeger, Thomas F Laporta and Patrick D McDaniel, 2009, "On cellular botnets: measuring the impact of malicious devices ona cellular network core", pp. 223–234
  • William Enck, Machigar Ongtang and Patrick D McDaniel, 2009, "On lightweight mobile phone application certification", pp. 235–245
  • Stephen E. McLaughlin, Dmitry Podkuiko and Patrick D McDaniel, 2009, "Energy Theft in the Advanced Metering Infrastructure", pp. 176–187
  • Matt Blaze and Patrick D McDaniel, 2009, "Below the Salt: The Dangers of Unfulfilled Physical Media Assumptions", pp. 24–27
  • William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick D McDaniel and Adam D Smith, 2008, "Defending Against Attacks on Main Memory Persistence", pp. 65–74
  • William Enck, Patrick D McDaniel and Trent R Jaeger, 2008, "PinUP: Pinning User Files to Known Applications", pp. 55–64
  • Kevin R. B. Butler, Stephen E. McLaughlin and Patrick D McDaniel, 2008, "Rootkit-resistant disks", pp. 403–416
  • Kevin R. B. Butler, William Enck, Harri Hursti, Stephen E. McLaughlin, Patrick Traynor and Patrick D McDaniel, 2008, "Systemic Issues in the Hart InterCivic and Premier Voting Systems:Reflections on Project EVEREST"
  • Patrick Traynor, Kevin R. B. Butler, William Enck and Patrick D McDaniel, 2008, "Realizing Massive-Scale Conditional Access Systems Through Attribute-BasedCryptosystems"
  • Dhananjay Bapat, Kevin R. B. Butler and Patrick D McDaniel, 2007, "Towards Automated Privilege Separation", pp. 272–276
  • Boniface Hicks, Tim Misiak and Patrick D McDaniel, 2007, "Channels: Runtime System Infrastructure for Security-Typed Languages", pp. 443–452
  • Luke St. Clair, Joshua Schiffman, Trent R Jaeger and Patrick D McDaniel, 2007, "Establishing and Sustaining System Integrity via Root of Trust Installation", pp. 19–29
  • Kevin R. B. Butler, Stephen E. McLaughlin and Patrick D McDaniel, 2007, "Non-volatile memory and disks: avenues for policy architectures", pp. 77–84
  • P Traynor, Patrick D McDaniel and T F La Porta, 2007, "On Attack Causality in Internet-Connected Cellular Networks", pp. 307-322
  • Lisa Johansen, Michael Rowell, Kevin R. B. Butler and Patrick D McDaniel, 2007, "Email Communities of Interest"
  • Anusha Sriraman, Kevin R. B. Butler, Patrick D McDaniel and Padma Raghavan, 2007, "Analysis of the IPv4 Address Space Delegation Structure", pp. 501–508
  • Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent R Jaeger and Patrick D McDaniel, 2007, "A logical specification and analysis for SELinux MLS policy", pp. 91–100
  • William Enck, Patrick D McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert G. Greenberg, Sanjay G. Rao and William Aiello, 2007, "Configuration Management at Massive Scale: System Design and Experience", pp. 73–86
  • Boniface Hicks, Sandra Rueda, Trent R Jaeger and Patrick D McDaniel, 2007, "From Trusted to Secure: Building and Executing Applications That EnforceSystem Security", pp. 205–218
  • Boniface Hicks, Dave King and Patrick D McDaniel, 2007, "Jifclipse: development tools for security-typed languages", pp. 1–10
  • Heesook Choi, Thomas F Laporta and Patrick D McDaniel, 2007, "Privacy Preserving Communication in MANETs", pp. 233–242
  • William Enck, Sandra Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent R Jaeger and Patrick D McDaniel, 2007, "Protecting users from "themselves"", pp. 29–36
  • Sophie Y. Qiu, Patrick D McDaniel and Fabian Monrose, 2007, "Toward Valley-Free Inter-domain Routing", pp. 2009–2016
  • H. Rowaihy, W. Enck, Patrick D McDaniel and T. F. LaPorta, 2007, "Limiting Sybil Attacks in Structured Peer-to-Peer Networks", Proceedings of the Twenty-Sixth Annual IEEE Conference on Computer Communications (INFOCOM 2007) Mini-Symposium on Security, Streaming, and Overlays, pp. 2596-2600
  • Sunam Ryu, Kevin R. B. Butler, Patrick Traynor and Patrick D McDaniel, 2007, "Leveraging Identity-Based Cryptography for Node ID Assignment inStructured P2P Systems", 1, pp. 519–524
  • Hosam Rowaihy, William Enck, Patrick D McDaniel and Thomas F Laporta, 2007, "Limiting Sybil Attacks in Structured P2P Networks", pp. 2596–2600
  • B Hicks, S Rueda, T Jaeger and Patrick D McDaniel, 2007, "Integration of SELinux and Security-typed Languages"
  • , 2007, "CEAS 2007 - The Fourth Conference on Email and Anti-Spam, 2-3 August 2007, Mountain View, California, USA"
  • Boniface Hicks, Kiyan Ahmadizadeh and Patrick D McDaniel, 2006, "From Languages to Systems: Understanding Practical Application Developmentin Security-typed Languages", pp. 153–164
  • Patrick Traynor, Kevin R. B. Butler, William Enck, Jennifer N Plasterr, S Weaver, J van Bremer and Patrick D McDaniel, 2006, "Privacy Preserving Web-Based Email", pp. 116–131
  • Matthew Pirretti, Patrick Traynor, Patrick D McDaniel and Brent Waters, 2006, "Secure attribute-based systems", pp. 99–112
  • Kevin R. B. Butler, William Aiello and Patrick D McDaniel, 2006, "Optimizing BGP security by exploiting path stability", pp. 298–310
  • Shiva Chaitanya, Kevin R. B. Butler, Anand Sivasubramaniam, Patrick D McDaniel and Murali Vilayannur, 2006, "Design, implementation and evaluation of security in iSCSI-based networkstorage systems", pp. 17–28
  • Patrick Traynor, William Enck, Patrick D McDaniel and Thomas F Laporta, 2006, "Mitigating attacks on open functionality in SMS-capable cellular networks", pp. 182–193
  • Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks and Patrick D McDaniel, 2006, "Non-Invasive Methods for Host Certification", pp. 1–10
  • Trent R Jaeger, Patrick D McDaniel, Luke St. Clair, Ramón Cáceres and Reiner Sailer, 2006, "Shame on Trust in Distributed Systems", pp. 19-24
  • Boniface Hicks, Dave King, Patrick D McDaniel and Michael Hicks, 2006, "Trusted declassification: : high-level policy for a security-typedlanguage", pp. 65–74
  • Sophie Y. Qiu, Patrick D McDaniel, Fabian Monrose and Aviel D. Rubin, 2006, "Characterizing Address Use Structure and Stability of Origin Advertisementin Inter-domain Routing", pp. 489–496
  • , 2006, "Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings", Springer, 4332
  • Patrick D McDaniel, Subhabrata Sen, Oliver Spatscheck, Jacobus E. van der Merwe, William Aiello and Charles R. Kalmanek, 2006, "Enterprise Security: A Community of Interest Based Approach", pp. 123-137
  • L St. Clair, L Johansen, W Enck, M Pirretti, P Traynor, Patrick D McDaniel and T Jaeger, 2006, "Password Exhaustion: Predicting the End of Password Usefulness", pp. 37-55
  • Patrick D McDaniel, K Butler and S Qiu, 2006, "Testing Large Scale BGP Security in Replayable Network Environments"
  • K Butler, Patrick D McDaniel and S Qiu, 2006, "BGPRV: A Library for Fast and Efficient Routing Data Manipulation"
  • Wesam Lootah, William Enck and Patrick D McDaniel, 2005, "TARP: Ticket-based Address Resolution Protocol", pp. 95-103
  • Kevin R. B. Butler and Patrick D McDaniel, 2005, "Understanding Mutable Internet Pathogens, or How I Learned to StopWorrying and Love Parasitic Behavior", Springer-Verlag LNCS, 3803, (1), pp. 36–48
  • William Enck, Patrick Traynor, Patrick D McDaniel and Thomas F Laporta, 2005, "Exploiting open functionality in SMS-capable cellular networks", pp. 393–404
  • Louis Kruger, Somesh Jha and Patrick D McDaniel, 2005, "Privacy Preserving Clustering", Springer-Verlag LNCS, 3679, (1), pp. 397–417
  • Heesook Choi, William Enck, Jaesheung Shin, Patrick D McDaniel and Thomas F Laporta, 2005, "Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks", pp. 12–21
  • William Aiello, Charles R. Kalmanek, Patrick D McDaniel, Subhabrata Sen, Oliver Spatscheck and Jacobus E. van der Merwe, 2005, "Analysis of Communities of Interest in Data Networks", Springer-Verlag LNCS, 3431, (1), pp. 83–96
  • Ali Al-Lawati, Dongwon Lee and Patrick D McDaniel, 2005, "Blocking-aware private record linkage", pp. 59–68
  • , 2005, "Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings", Springer, 3679
  • , 2005, "Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings", Springer, 3803
  • , 2005, "IQIS 2005, International Workshop on Information Quality in Information Systems, 17 June 2005, Baltimore, Maryland, USA (SIGMOD 2005 Workshop)", ACM
  • , 2005, "Passive and Active Network Measurement, 6th International Workshop, PAM 2005, Boston, MA, USA, March 31 - April 1, 2005, Proceedings", Springer, 3431
  • , 2005, "Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers", Springer, 3424
  • , 2005, "Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005", ACM
  • , 2005, "Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005", USENIX Association
  • M Pirretti, S Zhu, N Vijaykrishnan, Patrick D McDaniel, M Kandemir and R Brooks, 2005, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense"
  • A Al-Lawati, D Lee and Patrick D McDaniel, 2005, "Blocking in Private Information Matching", 59-68
  • Hao Wang, Somesh Jha, Patrick D McDaniel and Miron Livny, 2004, "Security Policy Reconciliation in Distributed Computing Environments", pp. 137-148
  • Simon Byers, Lorrie Faith Cranor, David P. Kormann and Patrick D McDaniel, 2004, "Searching for Privacy: Design and Implementation of a P3P-EnabledSearch Engine", pp. 314–328
  • , 2004, "Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004", ACM
  • S Byers, L F Cranor, E Cronin, D Korman and Patrick D McDaniel, 2004, "Exposing Digital Content Piracy: Approaches, Issues and Experiences"
  • Eric Cronin, Sugih Jamin, Tal Malkin and Patrick D McDaniel, 2003, "On the performance, feasibility, and use of forward-secure signatures", pp. 131–144
  • William Aiello, John Ioannidis and Patrick D McDaniel, 2003, "Origin authentication in interdomain routing", pp. 165–178
  • Simon Byers, Lorrie Faith Cranor, Eric Cronin, David P. Kormann and Patrick D McDaniel, 2003, "Analysis of security vulnerabilities in the movie production and distribution process", pp. 1–12
  • Patrick D McDaniel, 2003, "On context in authorization policy", pp. 80–89
  • Patrick D McDaniel and Atul Prakash, 2003, "A Flexible Architecture for Security Policy Enforcement", pp. 234–239
  • Jim Irrer, Atul Prakash and Patrick D McDaniel, 2003, "Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System", pp. 44–46
  • Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick D McDaniel and Aviel D. Rubin, 2003, "Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing", pp. 75-85
  • Patrick D McDaniel and Atul Prakash, 2002, "Methods and Limitations of Security Policy Reconciliation", pp. 73–87
  • Hugh Harney, Andrea Colgrove and Patrick D McDaniel, 2001, "Principles of Policy in Secure Groups"
  • Patrick D McDaniel, A Prakash, J Irrer, S Mittal and T Thuang, 2001, "Flexibly Constructing Secure Groups in Antigone 2.0", pp. 55-67
  • Patrick D McDaniel and Sugih Jamin, 2000, "Windowed Certificate Revocation", pp. 1406–1414
  • Patrick D McDaniel and Aviel D. Rubin, 2000, "A Response to "Can We Eliminate Certificate Revocation Lists?"", pp. 245–258
  • William A. Adamson, Charles J. Antonelli, Kevin Coffman, Patrick D McDaniel and Jim Rees, 1999, "Secure Distributed Virtual Conferencing", pp. 176–190
  • Patrick D McDaniel, Atul Prakash and Peter Honeyman, 1999, "Antigone: A Flexible Framework for Secure Group Communication", pp. 99-114

Technical Reports

  • Nicolas Papernot, Ian Goodfellow, Ryan Sheatsley, Reuben Feinman and Patrick D McDaniel, 2016, "cleverhans v1.0.0: an adversarial machine learning library", (arXiv:1610.00768)
  • Devin J. Pohly and Patrick D McDaniel, 2016, "Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols", (NAS-TR-0188-2016)
  • Nicolas Papernot, Patrick D McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik* and Ananthram Swami, 2015, "The Limitations of Deep Learning in Adversarial Settings"
  • Wenhui Hu*, Damien Octeau*, Patrick D McDaniel and Peng Liu, 2014, "Duet: library integrity verification for android applications"
  • Devin J. Pohly*, Stephen E. McLaughlin*, Patrick D McDaniel and Kevin Butler*, 2012, "Hi-Fi: collecting high-fidelity whole-system provenance"
  • D. Octeau*, S. Jha and Patrick D McDaniel, 2011, "Retargeting Android Applications to Java Bytecode"
  • S. McLaughlin* and Patrick D McDaniel, 2011, "Protecting Consumer Privacy from Electric Load Monitoring"
  • Stephen E. McLaughlin*, Dmitry Podkuiko*, Adam Delozier*, Sergei Miadzvezhanka* and Patrick D McDaniel, 2010, "Multi-vendor penetration testing in the advanced metering infrastructure"
  • William Enck* and Patrick D McDaniel, 2010, "Federated Information Flow Control for Mobile Phones"
  • Joshua Schiffman, Thomas Moyer*, Hayawardh Vijayakumar, Trent R Jaeger and Patrick D McDaniel, 2010, "Seeding clouds with trust anchors"

Other

  • Patrick D McDaniel, K. Butler, W. Enck, H. Hursti, S. McLaughlin, P. Traynor, M. Blaze, A. Aviv, P. Cerny, S. Clark, E. Cronin, G. Shah, M. Sherr, G. Vigna, R. Kemmerer, D. Balzarotti, G. Banks, M. Cova, V. Felmetsger, W. Robertson, F. Valeur, J. Lorenzo Hall and L. Quilter, 2007, "EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing", pp. 350
  • T Jaeger, Patrick D McDaniel, L St. Clair, R Caceres and R Sailer, 2006, "Shame on Trust in Distributed Systems"

Research Projects

Honors and Awards

Service

Service to Penn State:

Service to External Organizations:

 


 

About

The School of Electrical Engineering and Computer Science was created in the spring of 2015 to allow greater access to courses offered by both departments for undergraduate and graduate students in exciting collaborative research in fields.

We offer B.S. degrees in electrical engineering, computer science, computer engineering and data science and graduate degrees (master's degrees and Ph.D.'s) in electrical engineering and computer science and engineering. EECS focuses on the convergence of technologies and disciplines to meet today’s industrial demands.

School of Electrical Engineering and Computer Science

The Pennsylvania State University

207 Electrical Engineering West

University Park, PA 16802

814-863-6740

Department of Computer Science and Engineering

814-865-9505

Department of Electrical Engineering

814-865-7667