Books
- Patrick Traynor, Patrick D McDaniel and Thomas F Laporta, 2008, Security for Telecommunications Networks, Springer, pp. 182 pages
- , 2005, Encyclopedia of Cryptography and Security, Springer
Journal Articles
- Ryan Sheatsley, Nicolas Papernot, Michael Weisman, Gunjan Verma and Patrick D McDaniel, 2022, "Adversarial Examples for Network Intrusion Detection Systems", Journal of Computer Security (JCS)
- Mingli Yu, Tian Xie, Ting , Patrick D McDaniel and Quinn Burke, 2021, "Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks", IEEE/ACM Transactions on Networking, 29, (6), pp. 2793 - 2806
- Leonardo Babun, Kyle Denney, Z. Berk Celik, Patrick D McDaniel and A. Selc Uluagac, 2021, "A survey on IoT platforms: Communication, security, and privacy perspectives", Computer Networks, 192
- Ryan Sheatsley, Matthew Durbin, Azaree Lintereur, Patrick D McDan andel, , 2021, "Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations", IEEE SENSORS JOURNAL, 21, (8), pp. 12
- Stefan Achleitner, Quinn Burke, Patrick D McDaniel, Trent R Jaeger, Thomas F Laporta and Srikanth Krishnamurthy, 2021, "MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking", IEEE Transactions on Network and Service Management, 18, (1)
- Daniel Krych and Patrick D McDaniel, 2021, "Exposing Android Social Applications: Linking Data Leakage to Privacy Policies.", Journal of Cyber Security Technology, 5, pp. 2
- Quinn Burke, Patrick D McDaniel, Thomas F Laporta, Mingli Yu and Ting He, 2021, "Misreporting Attacks Against Load Balancers in Software-Defined Networking", Mobile Networks and Applications
- Alejandro Salazar, Ryan Sheatsley, Jonathan Petit and Patrick D McDaniel, 2021, "Physics-based Misbehavior Detection System for V2X Communications", SAE International Journal of Connected and Automated Vehicles
- Ahmed Atya, Zhiyun Qian, Srikanth Krishnamurthy, Thomas LaPorta, Patrick Drew McDaniel Drew McDaniel and Lisa Marvel, 2019, "Catch Me if You Can: Malicious Co-Residency on the Cloud", IEEE/ACM Transactions on Networking, 27 (2)
- Z. Berkay Celik, Earlence Fernandes, Eric Pauley, Gang Tan and Patrick Drew McDaniel Drew McDaniel, 2019, "Program Analysis of Commodity IoT Applications for Security and Privacy: Opportunities and Challenges.", ACM Computing Surveys (CSUR), 42 (4)
- Z. Berkay Celik and Patrick Drew McDaniel Drew McDaniel, 2019, "Verifying IoT Safety and Security in Physical Spaces", IEEE Security & Privacy Magazine, 17 (5), pp. 30-37
- Daniel E Krych and Patrick Drew McDaniel Drew McDaniel, 2019, "Exposing Android Social Applications: Linking Data Leakage to Privacy Policies", Journal of Cyber Security Technology
- Ian Goodfellow, Patrick D McDaniel and Nicolas Papernot, 2018, "Making Machine Learning Robust Against Adversarial Inputs", COMMUNICATIONS OF THE ACM, 61, (7), pp. 56-66
- Chaz Lever, Robert J. Walls, Yacin Nadji, David Dagon, Patrick D McDaniel and Manos Antonakakis, 2017, "Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains", IEEE Security \& Privacy Magazine (Secure Systems issue column)
- Dave Tian, Katharine L Butler, Junghun Choi, Patrick D McDaniel and P. Krishnaswamy, 2017, "Securing ARP/NDP From the Ground Up", IEEE Transactions on Information Forensics and Security
- Patrick D McDaniel and Ananthram Swami, 2017, "The Cyber Security Collaborative Research Alliance:Unifying Detection, Agility, and Risk in Mission-Oriented Cyber Decision Making", CSIAC Journal, Army Research Laboratory (ARL) Cyber Science and Technology, 5, (1)
- S. Achleitner, T.F. La Porta, Patrick D McDaniel, S. Sugrim, S.V. Krishnamurthy and R. Chada, 2017, "Deceiving Network Reconnaissance Unsing SDN-based Virtual Topologies", IEEE Transactions on Network and Service Management, Special Issue on Advances in Management of Softwarized Networks
- Patrick D McDaniel, Nicolas Papernot and Berkay Celik, 2016, "Machine Learning in Adversarial Settings", IEEE Security \& Privacy Magazine, 14, (3)
- Nicolas Papernot, Patrick D McDaniel, Ian Goodfellow, Somesh Jha, Berkay Celik and Ananthram Swami, 2016, "Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples", arXiv preprint arXiv:1602.02697
- Nicolas Papernot, Patrick D McDaniel and Ian Goodfellow, 2016, "Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples", arXiv preprint arXiv:1605.07277
- Damien Octeau, Daniel Luchaup, Somesh Jha and Patrick D McDaniel, 2016, "Composite Constant Propagation and its Application to Android Program Analysis", IEEE Transactions on Software Engineering, 42, (11), pp. 999-1014
- Nicolas Papernot, Patrick D McDaniel, Xi Wu, Somesh Jha and Ananthram Swami, 2015, "Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks", CoRR, abs/1511.04508
- Alexander Kott, Ananthram Swami and Patrick D McDaniel, 2015, "Six Potential Game-Changers in Cyber Security: Towards Priorities in Cyber Science and Engineering", CoRR, abs/1511.00509
- Nicolas Papernot, Patrick D McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik* and Ananthram Swami, 2015, "The Limitations of Deep Learning in Adversarial Settings", CoRR, abs/1511.07528
- Alexander Kott, Ananthram Swami and Patrick D McDaniel, 2014, "Security Outlook: Six Cyber Game Changers for the Next 15 Years", IEEE Computer, 47, (12), pp. 104–106
- William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol N. Sheth, 2014, "TaintDroid: An Information-Flow Tracking System for Realtime PrivacyMonitoring on Smartphones", ACM Transactions on Computer Systems, 32, (2), pp. 5
- William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol Sheth, 2014, "TaintDroid: an information flow tracking system for real-time privacymonitoring on smartphones", Communications of the ACM, 57, (3), pp. 99–106
- Zhenfu Cao, Keqiu Li, Xu Li, Patrick D McDaniel, Radha Poovendran, Guojun Wang and Yang Xiang, 2014, "Guest Editors’ Introduction: Special Issue on Trust, Security, andPrivacy in Parallel and Distributed Systems", IEEE Trans. Parallel Distrib. Syst., 25, (2), pp. 279–282
- Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau* and Patrick D McDaniel, 2014, "I know what leaked in your pocket: uncovering privacy leaks on AndroidApps with Static Taint Analysis", CoRR, abs/1404.7431
- William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol Sheth, 2014, "TaintDroid: an information flow tracking system for real-time privacymonitoring on smartphones", Communications of the ACM, 57, (3), pp. 99–106
- William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol N. Sheth, 2014, "TaintDroid: An Information-Flow Tracking System for Realtime PrivacyMonitoring on Smartphones", ACM Transactions on Computer Systems, 32, (2), pp. 5:1–5:29
- Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau and Patrick D McDaniel, 2014, "I know what leaked in your pocket: uncovering privacy leaks on AndroidApps with Static Taint Analysis", CoRR, abs/1404.7431
- Patrick D McDaniel, Brian Rivera and Ananthram Swami, 2014, "Toward a Science of Secure Environments", IEEE Security & Privacy, 12, (4), pp. 68–70
- M. Ongtang*, S. McLaughlin*, W. Enck* and Patrick D McDaniel, 2012, "Semantically Rich Application-Centric Security in Android", Security and Communication Networks, 5, (6), pp. 658-673
- Patrick D McDaniel, 2012, "Bloatware Comes to the Smartphone", IEEE Security & Privacy, 10, (4), pp. 85–87
- P. Traynor*, C. Amrutkar, V. Rao, T. Jaeger, Patrick D McDaniel and T. F. La Porta, 2011, "From Mobile Phones to Responsible Devices", Journal of Security and Communication Networks (SCN), 4, (6), pp. 719-726
- T Moyer*, K Butler*, J Schiffman, Patrick D McDaniel and Trent R Jaeger, 2011, "Scalable Web Content Attestation", IEEE Transactions on Computers, pp. 15
- Patrick D McDaniel, 2011, "Data Provenance and Security", IEEE Security & Privacy Magazine, 9, (2), pp. 83-85
- J. Schiffman, T. Jaeger and Patrick D McDaniel, 2011, "Network-based Root of Trust for Installation", IEEE Security & Privacy Magazine, 9, (1), pp. 40-48
- Kevin Butler*, Stephen E. McLaughlin*, Thomas Moyer* and Patrick D McDaniel, 2010, "New Security Architectures Based on Emerging Disk Functionality", IEEE Security & Privacy, 8, (5), pp. 34–41
- Patrick D McDaniel and William Enck*, 2010, "Not So Great Expectations: Why Application Markets Haven't Failed Security", IEEE Security & Privacy, 8, (5), pp. 76–78
- Boniface Hicks*, Sandra Rueda, Luke St. Clair*, Trent R Jaeger and Patrick D McDaniel, 2010, "A logical specification and analysis for SELinux MLS policy", ACM Transactions on Information and System Security, 13, (3)
- Patrick Traynor*, Kevin Butler*, William Enck*, Patrick D McDaniel and Kevin Borders, 2010, "malnets: large-scale malicious networks via compromised wireless access points", Security and Communication Networks, 3, (2-3), pp. 102–113
- Kevin Butler*, Toni R. Farley, Patrick D McDaniel and Jennifer Rexford, 2010, "A Survey of BGP Security Issues and Solutions", Proceedings of the IEEE, 98, (1), pp. 100–122
- Matthew Pirretti, Patrick Traynor*, Patrick D McDaniel and Brent Waters, 2010, "Secure attribute-based systems", Journal of Computer Security, 18, (5), pp. 799–837
- Kevin R. B. Butler*, Sunam Ryu, Patrick Traynor* and Patrick D McDaniel, 2009, "Leveraging Identity-Based Cryptography for Node ID Assignment inStructured P2P Systems", IEEE Transactions on Parallel and Distributed Systems (TPDS), 20, (12), pp. 1803–1815
- J. Schiffman, T. Moyer, C. Shal, T. Jaeger and Patrick D McDaniel, 2009, "Justifying Integrity Using a Virtual Machine Verifier"
- M. Ongtang, S. McLaughlin, W. Enck and Patrick D McDaniel, 2009, "Semantically Rich Application-Centric Security in Android"
- Heesook Choi, William Enck, Jaesheung Shin, Patrick D McDaniel and Thomas F Laporta, 2009, "ASR: anonymous and secure reporting of traffic forwarding activityin mobile ad hoc networks", ACM Wireless Networks (WINET), 15, (4), pp. 525–539
- Patrick D McDaniel and Stephen E. McLaughlin, 2009, "Security and Privacy Challenges in the Smart Grid", IEEE Security & Privacy, 7, (3), pp. 75–77
- W. Enck, M. Ongtang and Patrick D McDaniel, 2009, "On Lightweight Mobile Phone App Certification"
- W Enck, T Moyer, Patrick D McDaniel, S Sen, P Sebos, S Spoerel, A Greenberg, Y W Sung, S Rao and W Aiello, 2009, "Configuration Management at Massive Scale: System Design and Experience", IEEE Journal on Selected Areas in Communications (JSAC), 27
- P. Traynor, M. Lin, M. Ongtang, V. Rao, T. F. La Porta and Patrick D McDaniel, 2009, "On Cellular Botnets: Measuring the Impact of Malicious Devices on the Network Core"
- J. Schiffman, T. Moyer, C. Shal, T. Jaeger and Patrick D McDaniel, 2009, "No Node Is an Island: Shamon Integrity Monitoring Approach"
- Patrick Traynor, William Enck, Patrick D McDaniel and Thomas F Laporta, 2009, "Mitigating attacks on open functionality in SMS-capable cellular networks", IEEE/ACM Transactions on Networking, 17, (1), pp. 40–53
- William Enck, Machigar Ongtang and Patrick D McDaniel, 2009, "Understanding Android Security", IEEE Security and Privacy Magazine, 7, (1), pp. 50–57
- B. Hicks, S. Rueda, Y. Sreenivasan, G. Jakka, D. King, T. Jaeger and Patrick D McDaniel, 2009, "An Architecture for Enforcing End-to-End Security Over Web Applications"
- Patrick Traynor, William Enck, Patrick D McDaniel and Thomas F Laporta, 2008, "Exploiting open functionality in SMS-capable cellular networks", Journal of Computer Security, 16, (6), pp. 713–742
- P Traynor, M Lin, M Ongtang, V Rao, T Jaeger, T F La Porta and Patrick D McDaniel, 2008, "On Cellular Botnets: Measuring the Impact of Malicious Devices on the Network Core"
- K Butler, S McLaughlin, T Moyer, Patrick D McDaniel and T Jaeger, 2008, "SwitchBlade: Policy-Driven Disk Segmentation"
- T Moyer, K Butler, J Schiffman, Patrick D McDaniel and T Jaeger, 2008, "Scalable Asynchronous Web Content Attestation"
- W Enck, M Ongtang and Patrick D McDaniel, 2008, "Automated Cellphone Application Certification in Android (or) Mitigating Phone Software Misuse Before it Happens"
- B Hicks, D King, Patrick D McDaniel and M Hicks, 2008, "Trusted Declassification: Policy Infrastructure for a Security-Typed Language"
- B Hicks, S Rueda, L St. Clair, T Jaeger and Patrick D McDaniel, 2008, "A Logical Specification and Analysis for SELinux MLS Policy"
- K Butler, S McLaughlin and Patrick D McDaniel, 2008, "Rootkit-Resistant Disks"
- Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks and Patrick D McDaniel, 2008, "Noninvasive Methods for Host Certification", ACM Transactions on Information and System Security (TISSEC), 11, (3)
- Patrick D McDaniel and Bashar Nuseibeh, 2008, "Guest Editors’ Introduction: Special Section on Software Engineeringfor Secure Systems", IEEE Transactions on Software Engineering, 34, (1), pp. 3–4
- P Traynor, J Schiffman, T F La Porta, Patrick D McDaniel, A Ghosh and F Anjum, 2007, "Constructing Secure Localization Systems with Adjustable Granularity"
- S McLaughlin, K Butler, W Enck and Patrick D McDaniel, 2007, "Genbd - A Generic Block Device"
- Wesam Lootah, William Enck and Patrick D McDaniel, 2007, "TARP: Ticket-based address resolution protocol", Computer Networks, 51, (15), pp. 4322–4337
- Patrick D McDaniel, and , , 2007, "Non-Volatile Memory and Disks: Avenues for Policy Architectures"
- W Enck, S Rueda, J Schiffman, Y Sreenivasan, L St. Clair, T Jaeger and Patrick D McDaniel, 2007, "Protecting Users From "Themselves.""
- Patrick D McDaniel, P Traynor, R Kumar, H Choi, G Cao, S Zhu and T F La Porta, 2007, "Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks", IEEE Transactions on Mobile Computing, 6, (6), pp. 663-677
- D Bapat, K Butler and Patrick D McDaniel, 2007, "Towards Automated Privilege Separation"
- L St.Clair, J Schiffman, T Jaeger and Patrick D McDaniel, 2007, "Establishing and Sustaining System Integrity via Root of Trust Installation"
- W Enck, Patrick D McDaniel and T Jaeger, 2007, "Protecting User Files by Reducing Application Access"
- B Hicks, S Rueda, T Jaeger and Patrick D McDaniel, 2007, "From Trusted to Secure: Building and Executing Applications that Enforce System Security"
- L Johansen, K Butler, W Enck, P Traynor and Patrick D McDaniel, 2007, "Grains of SANs: Building Storage Area Networks from Memory Spots"
- P Traynor, V Rao, T Jaeger, Patrick D McDaniel and T F La Porta, 2007, "From Mobile Phones to Responsible Devices"
- B Hicks, S Rueda, T Jaeger and Patrick D McDaniel, 2007, "A Logical Specification and Analysis for SELinux MLS Policy"
- Patrick D McDaniel and Atul Prakash, 2006, "Enforcing provisioning and authorization policy in the Antigone system", Journal of Computer Security, 14, (6), pp. 483–511
- Patrick D McDaniel and Atul Prakash, 2006, "Methods and limitations of security policy reconciliation", ACM Transactions on Information and System Security (TISSEC), 9, (3), pp. 259–291
- Patrick D McDaniel, William Aiello, Kevin R. B. Butler and John Ioannidis, 2006, "Origin authentication in interdomain routing", Computer Networks, 50, (16), pp. 2953–2980
- Matthew Pirretti, Sencun Zhu, Vijaykrishnan Narayanan, Patrick D McDaniel, Mahmut T Kandemir and Richard R. Brooks, 2006, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methodsof Defense", International Journal of Distributed Sensor Networks, 2, (3), pp. 267–287
- H Choi, W Enck, J Shin, Patrick D McDaniel and T F La Porta, 2006, "ASR: Anonymous and Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks"
- B Hicks, D King, Patrick D McDaniel and M Hicks, 2006, "Trusted Declassification: High-level Policy for a Security-typed Language"
- B Hicks, K Ahmadizadeh and Patrick D McDaniel, 2006, "From Languages to Systems: Understanding Practical Application Development in Security-typed Languages"
- S Qiu, Patrick D McDaniel and F Monrose, 2006, "Toward Valley-Free Inter-Domain Routing"
- B Hicks, S Rueda, T Jaeger and Patrick D McDaniel, 2006, "Integrating SELinux with Security-typed Languages"
- P Traynor, W Enck, Patrick D McDaniel and T F La Porta, 2006, "Mitigating Attacks on Open Functionality in SMS-Capable Networks"
- S Ryu, K Butler, P Traynor and Patrick D McDaniel, 2006, "TARP: Ticket-based Address Resolution Protocol"
- Patrick D McDaniel, 2006, "Understanding Equivalance in High-Level and Information Flow Policy"
- L Johansen, K Butler, M Rowell and Patrick D McDaniel, 2006, "Email Communities of Interest"
- B Hicks, S Rueda, T Jaeger and Patrick D McDaniel, 2006, "Breaking Down the Walls of Mutual Distrust: Security-typed Email Using Labeled IPsec"
- M Pirretti, P Traynor, Patrick D McDaniel and B Waters, 2006, "Secure Attribute-Based Systems"
- W Enck, K Butler, T Richardson and Patrick D McDaniel, 2006, "Securing Non-Volatile Main Memory"
- L St. Clair, L Johansen, W Enck, M Pirretti, P Traynor, Patrick D McDaniel and T Jaeger, 2006, "Password Exhaustion: Predicting the End of Password Usefulness"
- Patrick D McDaniel and Aviel D. Rubin, 2005, "Web security", Computer Networks, 48, (5), pp. 697–699
- H Choi, Patrick D McDaniel and T F La Porta, 2005, "Privacy Preserving Communication in MANETs"
- M Pirretti, N Vijaykrishnan, Patrick D McDaniel and B Madan, 2005, "SLAT: Secure Localization with Attack Tolerance"
- S Qiu, Patrick D McDaniel, F Monrose and A Rubin, 2005, "Characterizing Address Use Structure and Stabillity of Origin Advertizement in Interdomain Routing"
- H Rowaihy, W Enck, Patrick D McDaniel and T F La Porta, 2005, "Limiting Sybil Attacks in Structured Peer-to-Peer Networks"
- W Lootah, W Enck and Patrick D McDaniel, 2005, "TARP: Ticket-Based Address Resolution Protocol"
- P Traynor, K Butler, W Enck, J Plasterr, S Weaver, J van Bremer and Patrick D McDaniel, 2005, "Privacy-Preserving Web-Based Email"
- W Enck, P Traynor, Patrick D McDaniel and T F La Porta, 2005, "Exploiting Open Functionality in SMS-Capable Cellular Networks"
- B P Hicks, D King and Patrick D McDaniel, 2005, "Declassification with Cryptographic Functions in a Security-Typed Language"
- B P Hicks, Patrick D McDaniel and A R Hurson, 2005, "Information Flow Control in Database Security: A Case Study for Secure Programming with Jif"
- Patrick D McDaniel and A Rubin, 2005, "Guest Editorial", Computer Networks, Special Issue on Web Security
- B P Hicks and Patrick D McDaniel, 2005, "Noninterference with Downgrading for Encryption"
- S Byers, L Cranor, E Cronin, D Korman and Patrick D McDaniel, 2004, "Analysis of Security Vulnerabilities in the Movie Production and Distribution Process", Telecommunications Policy, 28, (8), pp. 619-644
- T Farley, K Butler and Patrick D McDaniel, 2004, "A Survey of BGP Security Issues and Solutions"
- W Aiello, K Butler and Patrick D McDaniel, 2004, "Path Authentication in Interdomain Routing"
- E Cronin, S Jamin, T Malkin and Patrick D McDaniel, 2003, "Analysis of Security Vulnerabilities in the Movie Production and Distribution Process"
- Patrick D McDaniel and A Prakash, 2003, "Securing Distributed Applications Using a Policy-based Approach"
- W Aiello, J Ioannidis and Patrick D McDaniel, 2003, "Origin Authentication in Interdomain Routing"
- Eric Cronin, Sugih Jamin, Tal Malkin and Patrick D McDaniel, 2003, "On the performance, feasibility, and use of forward-secure signatures"
- S Byers, L Cranor, E Cronin, D Kormann and Patrick D McDaniel, 2003, "Analysis of Security Vulnerabilities in the Movie Production and Distribution Process", Analysis of Security Vulnerabilities in the Movie Production and Distribution Process
- Patrick D McDaniel, 2003, "On Context in Authorization Policy", Analysis of Security Vulnerabilities in the Movie Production and Distribution Process
- Patrick D McDaniel and A Prakash, 2002, "An Architecture for Security Policy Enforcement"
- Patrick D McDaniel and A Prakash, 2002, "Methods and Limitations of Security Policy Reconciliation"
- Patrick D McDaniel and A Prakash, 2000, "Ismene: Provisioning and Policy Reconciliation in Secure Group Communication"
- Patrick D McDaniel and A Prakash, 2000, "Lightweight Failure Detection in Secure Group Communication"
- Patrick D McDaniel and A Prakash, 2000, "Antigone: Implementing Policy in Secure Group Communication"
- Patrick D McDaniel and S Jamin, 1999, "Windowed Certificate Revocation"
- Patrick D McDaniel, A Prakash and P Honeyman, 1999, "Antigone: A Flexible Framework for Secure Group Communication"
- Patrick D McDaniel and A Rubin, 1999, "A Response to "Can We Eliminate Certificate Revocation Lists?""
- Patrick D McDaniel, 1999, "Secure Distributed Virtual Conferencing: Multicast or Bust"
- Patrick D McDaniel and S Jamin, 1998, "Windowed Key Revocation in Public Key Infrastructures"
- Patrick D McDaniel and S Jamin, 1998, "A Scalable Key Distribution Hierarchy. Technical Report"
- Patrick D McDaniel, P Honeyman and A Prakash, 1998, "Lightweight Secure Group Communication"
- W Zage, D Zage, Patrick D McDaniel and I Khan, 1991, "Evaluating Design Metrics on Large-Scale Software"
- Ian Goodfellow, Patrick D McDaniel and Nicolas Papernot, , "The challenges of making machine learning robust against adversarial inputs", Communications of the ACM
Conference Proceedings
- Ahmed Abdou, Ryan Sheatsley, Beugin, Shipp and Patrick D McDaniel, 2021, "HoneyModels: Machine Learning Honeypots.", Proceedings of the Military Communications Conference (MILCOM), IEEE
- Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael Weisman and Patrick D McDaniel, 2021, "On the Robustness of Domain Constraints.", SIGSAC: ACM Special Interest Group on Security, Audit, and Control, ACM
- Tian Xie, Ting He, Patrick D McDaniel and Namitha Nambiar, 2021, "Attack Resilience of Cache Replacement Policies", INFOCOM, IEEE Computer and Communications Societies, IEEE
- Patrick D McDaniel, 2021, "Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information", IoTDI 2021 - Proceedings of the 2021 International Conference on Internet-of-Things Design and Implementation
- Giuseppe Petracca, Yuqiong Sun, Ahmad-Atamli Reineh, Jens Grossklags, Patrick Drew McDaniel Drew McDaniel and Trent Jaeger, 2019, "EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs"
- Z. Berkay CelikMcDaniel, Gang Tan and Patrick Drew McDaniel Drew McDaniel, 2019, "IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT"
- Matt Durbin, Ryan Sheatsley, Christopher Balbier, Tristan Grieve, Azaree Lintereur and Patrick D McDaniel, 2019, "Development of Machine Learning Algorithms for Directional Gamma Ray Detection"
- Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Ryan Sheatsley, Patrick D McDaniel and A. Secuk Uluagac, 2019, "Curie: Policy-based Secure Data Exchange"
- Z. Berkay Celik, Patrick D McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez and Ananthram Swami, 2018, "Detection Under Privileged Information"
- Florian Tramer, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh and Patrick D McDaniel, 2018, "Ensemble Adversarial Training: Attacks and Defenses", International Conference on Learning Representations
- Nicolas Papernot, Patrick D McDaniel, Arunesh Sinha and Michael Wellman, 2018, "Security and Privacy in Machine Learning", London, UK
- Rauf Izmailov, Shridatt Sugrim, Ritu Chadha, Patrick D McDaniel and Ananthram Swami, 2018, "Enablers Of Adversarial Attacks in Machine Learning", 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), pp. 425-430
- Dang Tu Nguyen, Chengyu Song, Zhiyun Qian, Srikanth V. Krishnamurthy, Colbert, Edward J. M. and Patrick D McDaniel, 2018, "IOTSAN: Fortifying the Safety of IoT Systems", CONEXT'18: PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES, pp. 191-203
- Chun-Ming Lai, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, Felix Wu, Patrick D McDaniel and Hasan Cam, 2017, "Attacking Strategies and Temporal Analysis Involving Facebook Discussion Groups"
- Yunfeng Hong, Yongjian Hu, Chun-Ming Lai, Felix Wu, Iulian Neamtiu, Yu Paul, Patrick D McDaniel, Hasan Cam and Gail-Joon Ahn, 2017, "Defining and Detecting Environment Discrimination in Android Apps"
- Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes and Patrick D McDaniel, 2017, "Adversarial Examples for Malware Detection"
- Vaibhav Rastogi, Drew Davidson, Lorenzo De Carli, Somesh Jha and Patrick D McDaniel, 2017, "Cimplifier: Automatically Debloating Containers", Paderborn, Germany
- Nicolas Papernot, Patrick D McDaniel, Ian Goodfellow, Somesh Jha, Z. Berkay Celik and Ananthram Swami, 2017, "Practical Black-Box Attacks against Machine Learning"
- Stefan Achleitner, Thomas La Porta, Trent R Jaeger and Patrick D McDaniel, 2017, "Adversarial Network Forensics in Software Defined Networking"
- Berkay Celik, Patrick D McDaniel and Rauf Izmailov, 2017, "Feature Cultivation in Privileged Information-augmented Detection"
- Stefan Achleitner, Thomas La Porta, Patrick D McDaniel, Srikanth V. Krishnamurthy, Alexander Poylisher and Constantin Serban, 2017, "Malicious Co-Residency on the Cloud: Attacks and Defense"
- Z. Berkay Celik, David Lopez-Paz and Patrick D McDaniel, 2017, "Patient-Driven Privacy Control through Generalized Distillation"
- Ahmed Fathy Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Patrick D McDaniel and Lisa Marvel, 2017, "Stealth Migration: Hiding Virtual Machines on the Network"
- Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac and Patrick D McDaniel, 2017, "Achieving Secure and Differentially Private Computations in Multiparty Settings"
- Nathaniel Lageman, Eric Kilmer, Robert J. Walls and Patrick D McDaniel, 2016, "BinDNN: Resilient Function Matching Using Deep Learning"
- Michael Backes, ven Bugiel, Erik Derr, Patrick McDaniel Damien Octeau and Sebastian Weisgerber, 2016, "On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis"
- Devin J. Pohly and Patrick D McDaniel, 2016, "Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols"
- Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick D McDaniel and Matthew Smith, 2016, "SoK: Lessons Learned From Android Security Research For Appified Software Platforms", San Francisco, CA
- Nicolas Papernot, Patrick D McDaniel, Xi Wu, Somesh Jha and Ananthram Swami, 2016, "Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks", San Francisco, CA
- Chaz Lever, Robert Walls, Yacin Nadji, David Dagon, Patrick D McDaniel and Manos Antonakakis, 2016, "Domain-Z: 28 Registrations Later", San Francisco, CA
- Charles J. Huber, Scott E. Brown, Patrick D McDaniel and Lisa M. Marvel, 2016, "Cyber Fighter Associate: A Decision Support System for Cyber Agility", Princeton, NJ
- Z. Berkay Celik, Nan Hu, Yun Li, Nicolas Papernot, Patrick D McDaniel, Jeff Rowe, Robert Walls, Karl Levitt, Novella Bartolini, Thomas La Porta and Ritu Chadha, 2016, "Mapping Sample Scenarios to Operational Models"
- Damien Octeau, Somesh Jha, Matthew Dering, Patrick D McDaniel, Alexandre Bartel, Li Li, Jacques Klein and Yves Le Traon, 2016, "Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-Component Analysis", St. Petersburg, Florida, USA
- Nicolas Papernot, Patrick D McDaniel, Ananthram Swami and Richard Harang, 2016, "Crafting Adversarial Input Sequences for Recurrent Neural Networks"
- Stefan Achleitner, Thomas La Porta, Patrick D McDaniel, Shridatt Sugrim, Srikanth Krishnamurthy and Ritu Chadha, 2016, "Cyber Deception: Virtual Networks to Defend Insider Reconnaissance"
- Nicolas Papernot, Patrick D McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik and Ananthram Swami, 2016, "The Limitations of Deep Learning in Adversarial Settings", Saarbrucken, Germany
- D. J. Pohly*, C. Sestito and Patrick D McDaniel, 2015, "Adaptive protocol switching using Dynamically Insertable Bumps in the stack", pp. 342-347
- N. Papernot, Patrick D McDaniel and R. J. Walls, 2015, "Enforcing agile access control policies in relational databases using views", pp. 7-12
- Z. Berkay Celik*, R. J. Walls, Patrick D McDaniel and A. Swami, 2015, "Malware traffic detection using tamper resistant features", pp. 330-335
- A. Oltramari, L. F. Cranor, R. J. Walls and Patrick D McDaniel, 2015, "Computational ontology of network operations", pp. 318-323
- A. Aqil, A. O. F. Atya, Trent R Jaeger, S. V. Krishnamurthy, K. Levitt, Patrick D McDaniel, J. Rowe and A. Swami, 2015, "Detection of stealthy TCP-based DoS attacks", pp. 348-353
- Robert J. Walls, Eric D. Kilmer, Nathaniel Lageman and Patrick D McDaniel, 2015, "Measuring the Impact and Perception of Acceptable Advertisements", pp. 107–120
- Li Li, Alexandre Bartel, Tegawendé F Bissyandé, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau and Patrick D McDaniel, 2015, "IccTA: Detecting Inter-Component Privacy Leaks in Android Apps"
- Damien Octeau, Daniel Luchaup, Matthew Dering, Somesh Jha and Patrick D McDaniel, 2015, "Composite Constant Propagation: Application to Android Inter-Component Communication Analysis"
- Daniel Krych, Stephen Lange-Maney, Patrick D McDaniel and William Glodek, 2015, "Investigating weaknesses in Android certificate security"
- Jing (Dave) Tian, Kevin R. B. Butler, Patrick D McDaniel and Padma Krishnaswamy, 2015, "Securing ARP From the Ground Up", ACM, pp. 305–312
- Patrick D McDaniel, 2015, "A New Science of Security Decision Making", pp. IS–13
- Alessandro Oltramari, Lorrie Faith Cranor, Robert J. Walls and Patrick D McDaniel, 2014, "Building an Ontology of Cyber Security", pp. 6
- Matthew Dering* and Patrick D McDaniel, 2014, "Android market reconstruction and analysis", pp. 300-305
- Wenhui Hu*, Damien Octeau*, Patrick D McDaniel and Peng Liu, 2014, "Duet: library integrity verification for android applications", ACM, pp. 141–152
- Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau* and Patrick D McDaniel, 2014, "FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps", pp. 29
- Philip Koshy*, Diana Koshy* and Patrick D McDaniel, 2014, "An Analysis of Anonymity in Bitcoin Using P2P Network Traffic", Springer-Verlag LNCS, 8437, pp. 469–485
- Stephen E. McLaughlin*, Saman A. Zonouz, Devin J. Pohly* and Patrick D McDaniel, 2014, "A Trusted Safety Verifier for Process Controller Code", The Internet Society, pp. 15
- Damien Octeau*, Patrick D McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein and Yves Le Traon, 2013, "Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis", pp. 543–558
- Devin J. Pohly*, Stephen E. McLaughlin*, Patrick D McDaniel and Kevin Butler*, 2012, "Hi-Fi: collecting high-fidelity whole-system provenance", pp. 259–268
- Weining Yang, Ninghui Li, Yuan Qi, Wahbeh H. Qardaji, Stephen E. McLaughlin* and Patrick D McDaniel, 2012, "Minimizing private data disclosures in the smart grid", pp. 415–427
- Damien Octeau*, Somesh Jha and Patrick D McDaniel, 2012, "Retargeting Android applications to Java bytecode", pp. 6
- Stephen E. McLaughlin* and Patrick D McDaniel, 2012, "SABOT: specification-based payload generation for programmable logic controllers", pp. 439–449
- Eun-Kyoung Kim, Patrick D McDaniel and Thomas F Laporta, 2012, "A Detection Mechanism for SMS Flooding Attacks in Cellular Networks", pp. 76–93
- Thomas Moyer*, Trent R Jaeger and Patrick D McDaniel, 2012, "Scalable Integrity-Guaranteed AJAX", pp. 1–19
- Stephen E. McLaughlin*, Patrick D McDaniel and William Aiello, 2011, "Protecting consumer privacy from electric load monitoring", pp. 87–98
- William Enck*, Damien Octeau*, Patrick D McDaniel and Swarat Chaudhuri, 2011, "A Study of Android Application Security"
- M Ongtang*, Joshua Schiffman, Thomas F Laporta, Patrick D McDaniel, Abhrajit Ghosh and F Anjum, 2010, "Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware", pp. 6
- Kevin R. B. Butler*, Stephen E. McLaughlin* and Patrick D McDaniel, 2010, "Kells: a protection framework for portable data", pp. 231–240
- Stephen E. McLaughlin*, Dmitry Podkuiko*, Sergei Miadzvezhanka*, Adam Delozier* and Patrick D McDaniel, 2010, "Multi-vendor penetration testing in the advanced metering infrastructure", pp. 107–116
- Machigar Ongtang*, Kevin Butler* and Patrick D McDaniel, 2010, "Porscha: policy oriented secure content handling in Android", pp. 221–230
- Kevin R. B. Butler*, Stephen E. McLaughlin* and Patrick D McDaniel, 2010, "Protecting portable storage with host validation", pp. 651–653
- Joshua Schiffman, Thomas Moyer*, Hayawardh Vijayakumar, Trent R Jaeger and Patrick D McDaniel, 2010, "Seeding clouds with trust anchors", pp. 43–46
- William Enck*, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol Sheth, 2010, "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones", pp. 393–407
- Toby Ehrenkranz, Jun Li and Patrick D McDaniel, 2010, "Realizing a Source Authentic Internet", pp. 217–234
- Stephen E. McLaughlin*, Dmitry Podkuiko*, Adam Delozier*, Sergei Miadzvezhanka* and Patrick D McDaniel, 2010, "Embedded Firmware Diversity for Smart Electric Meters"
- Boniface Hicks*, Sandra Rueda Rodreguez, Dave King, Thomas Moyer*, Joshua Schiffman, Yogesh Sreenivasan, Patrick D McDaniel and Trent R Jaeger, 2010, "An architecture for enforcing end-to-end access control over web applications", pp. 163–172
- Kevin R. B. Butler*, Stephen E. McLaughlin* and Patrick D McDaniel, 2010, "Disk-enabled authenticated encryption", pp. 1–6
- Patrick D McDaniel, Kevin R. B. Butler*, Stephen E. McLaughlin*, Erez Zadok, Radu Sion and Marianne Winslett, 2010, "Towards a Secure and Efficient System for End-to-End Provenance", pp. 5
- Thomas Moyer*, Kevin R. B. Butler*, Joshua Schiffman, Patrick D McDaniel and Trent R Jaeger, 2009, "Scalable Web Content Attestation", pp. 95–104
- Machigar Ongtang, Stephen E. McLaughlin, William Enck and Patrick D McDaniel, 2009, "Semantically Rich Application-Centric Security in Android", pp. 340–349
- J. Schiffman, T. Moyer*, C. Shal, Trent R Jaeger and Patrick D McDaniel, 2009, "Justifying Integrity Using a Virtual Machine Verifier", pp. 83-92
- T. La Porta, Patrick D McDaniel, K. Rauscher and J. Shu, 2009, "The Impact of Supply Chain on Information and Communications Technology Security", pp. 7
- Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent R Jaeger, Thomas F Laporta and Patrick D McDaniel, 2009, "On cellular botnets: measuring the impact of malicious devices ona cellular network core", pp. 223–234
- William Enck, Machigar Ongtang and Patrick D McDaniel, 2009, "On lightweight mobile phone application certification", pp. 235–245
- Stephen E. McLaughlin, Dmitry Podkuiko and Patrick D McDaniel, 2009, "Energy Theft in the Advanced Metering Infrastructure", pp. 176–187
- Matt Blaze and Patrick D McDaniel, 2009, "Below the Salt: The Dangers of Unfulfilled Physical Media Assumptions", pp. 24–27
- William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick D McDaniel and Adam D Smith, 2008, "Defending Against Attacks on Main Memory Persistence", pp. 65–74
- William Enck, Patrick D McDaniel and Trent R Jaeger, 2008, "PinUP: Pinning User Files to Known Applications", pp. 55–64
- Kevin R. B. Butler, Stephen E. McLaughlin and Patrick D McDaniel, 2008, "Rootkit-resistant disks", pp. 403–416
- Kevin R. B. Butler, William Enck, Harri Hursti, Stephen E. McLaughlin, Patrick Traynor and Patrick D McDaniel, 2008, "Systemic Issues in the Hart InterCivic and Premier Voting Systems:Reflections on Project EVEREST"
- Patrick Traynor, Kevin R. B. Butler, William Enck and Patrick D McDaniel, 2008, "Realizing Massive-Scale Conditional Access Systems Through Attribute-BasedCryptosystems"
- Dhananjay Bapat, Kevin R. B. Butler and Patrick D McDaniel, 2007, "Towards Automated Privilege Separation", pp. 272–276
- Boniface Hicks, Tim Misiak and Patrick D McDaniel, 2007, "Channels: Runtime System Infrastructure for Security-Typed Languages", pp. 443–452
- Luke St. Clair, Joshua Schiffman, Trent R Jaeger and Patrick D McDaniel, 2007, "Establishing and Sustaining System Integrity via Root of Trust Installation", pp. 19–29
- Kevin R. B. Butler, Stephen E. McLaughlin and Patrick D McDaniel, 2007, "Non-volatile memory and disks: avenues for policy architectures", pp. 77–84
- P Traynor, Patrick D McDaniel and T F La Porta, 2007, "On Attack Causality in Internet-Connected Cellular Networks", pp. 307-322
- Lisa Johansen, Michael Rowell, Kevin R. B. Butler and Patrick D McDaniel, 2007, "Email Communities of Interest"
- Anusha Sriraman, Kevin R. B. Butler, Patrick D McDaniel and Padma Raghavan, 2007, "Analysis of the IPv4 Address Space Delegation Structure", pp. 501–508
- Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent R Jaeger and Patrick D McDaniel, 2007, "A logical specification and analysis for SELinux MLS policy", pp. 91–100
- William Enck, Patrick D McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert G. Greenberg, Sanjay G. Rao and William Aiello, 2007, "Configuration Management at Massive Scale: System Design and Experience", pp. 73–86
- Boniface Hicks, Sandra Rueda, Trent R Jaeger and Patrick D McDaniel, 2007, "From Trusted to Secure: Building and Executing Applications That EnforceSystem Security", pp. 205–218
- Boniface Hicks, Dave King and Patrick D McDaniel, 2007, "Jifclipse: development tools for security-typed languages", pp. 1–10
- Heesook Choi, Thomas F Laporta and Patrick D McDaniel, 2007, "Privacy Preserving Communication in MANETs", pp. 233–242
- William Enck, Sandra Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent R Jaeger and Patrick D McDaniel, 2007, "Protecting users from "themselves"", pp. 29–36
- Sophie Y. Qiu, Patrick D McDaniel and Fabian Monrose, 2007, "Toward Valley-Free Inter-domain Routing", pp. 2009–2016
- H. Rowaihy, W. Enck, Patrick D McDaniel and T. F. LaPorta, 2007, "Limiting Sybil Attacks in Structured Peer-to-Peer Networks", Proceedings of the Twenty-Sixth Annual IEEE Conference on Computer Communications (INFOCOM 2007) Mini-Symposium on Security, Streaming, and Overlays, pp. 2596-2600
- Sunam Ryu, Kevin R. B. Butler, Patrick Traynor and Patrick D McDaniel, 2007, "Leveraging Identity-Based Cryptography for Node ID Assignment inStructured P2P Systems", 1, pp. 519–524
- Hosam Rowaihy, William Enck, Patrick D McDaniel and Thomas F Laporta, 2007, "Limiting Sybil Attacks in Structured P2P Networks", pp. 2596–2600
- B Hicks, S Rueda, T Jaeger and Patrick D McDaniel, 2007, "Integration of SELinux and Security-typed Languages"
- , 2007, "CEAS 2007 - The Fourth Conference on Email and Anti-Spam, 2-3 August
2007, Mountain View, California, USA"
- Boniface Hicks, Kiyan Ahmadizadeh and Patrick D McDaniel, 2006, "From Languages to Systems: Understanding Practical Application Developmentin Security-typed Languages", pp. 153–164
- Patrick Traynor, Kevin R. B. Butler, William Enck, Jennifer N Plasterr, S Weaver, J van Bremer and Patrick D McDaniel, 2006, "Privacy Preserving Web-Based Email", pp. 116–131
- Matthew Pirretti, Patrick Traynor, Patrick D McDaniel and Brent Waters, 2006, "Secure attribute-based systems", pp. 99–112
- Kevin R. B. Butler, William Aiello and Patrick D McDaniel, 2006, "Optimizing BGP security by exploiting path stability", pp. 298–310
- Shiva Chaitanya, Kevin R. B. Butler, Anand Sivasubramaniam, Patrick D McDaniel and Murali Vilayannur, 2006, "Design, implementation and evaluation of security in iSCSI-based networkstorage systems", pp. 17–28
- Patrick Traynor, William Enck, Patrick D McDaniel and Thomas F Laporta, 2006, "Mitigating attacks on open functionality in SMS-capable cellular networks", pp. 182–193
- Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks and Patrick D McDaniel, 2006, "Non-Invasive Methods for Host Certification", pp. 1–10
- Trent R Jaeger, Patrick D McDaniel, Luke St. Clair, Ramón Cáceres and Reiner Sailer, 2006, "Shame on Trust in Distributed Systems", pp. 19-24
- Boniface Hicks, Dave King, Patrick D McDaniel and Michael Hicks, 2006, "Trusted declassification: : high-level policy for a security-typedlanguage", pp. 65–74
- Sophie Y. Qiu, Patrick D McDaniel, Fabian Monrose and Aviel D. Rubin, 2006, "Characterizing Address Use Structure and Stability of Origin Advertisementin Inter-domain Routing", pp. 489–496
- , 2006, "Information Systems Security, Second International Conference, ICISS
2006, Kolkata, India, December 19-21, 2006, Proceedings", Springer, 4332
- Patrick D McDaniel, Subhabrata Sen, Oliver Spatscheck, Jacobus E. van der Merwe, William Aiello and Charles R. Kalmanek, 2006, "Enterprise Security: A Community of Interest Based Approach", pp. 123-137
- L St. Clair, L Johansen, W Enck, M Pirretti, P Traynor, Patrick D McDaniel and T Jaeger, 2006, "Password Exhaustion: Predicting the End of Password Usefulness", pp. 37-55
- Patrick D McDaniel, K Butler and S Qiu, 2006, "Testing Large Scale BGP Security in Replayable Network Environments"
- K Butler, Patrick D McDaniel and S Qiu, 2006, "BGPRV: A Library for Fast and Efficient Routing Data Manipulation"
- Wesam Lootah, William Enck and Patrick D McDaniel, 2005, "TARP: Ticket-based Address Resolution Protocol", pp. 95-103
- Kevin R. B. Butler and Patrick D McDaniel, 2005, "Understanding Mutable Internet Pathogens, or How I Learned to StopWorrying and Love Parasitic Behavior", Springer-Verlag LNCS, 3803, (1), pp. 36–48
- William Enck, Patrick Traynor, Patrick D McDaniel and Thomas F Laporta, 2005, "Exploiting open functionality in SMS-capable cellular networks", pp. 393–404
- Louis Kruger, Somesh Jha and Patrick D McDaniel, 2005, "Privacy Preserving Clustering", Springer-Verlag LNCS, 3679, (1), pp. 397–417
- Heesook Choi, William Enck, Jaesheung Shin, Patrick D McDaniel and Thomas F Laporta, 2005, "Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks", pp. 12–21
- William Aiello, Charles R. Kalmanek, Patrick D McDaniel, Subhabrata Sen, Oliver Spatscheck and Jacobus E. van der Merwe, 2005, "Analysis of Communities of Interest in Data Networks", Springer-Verlag LNCS, 3431, (1), pp. 83–96
- Ali Al-Lawati, Dongwon Lee and Patrick D McDaniel, 2005, "Blocking-aware private record linkage", pp. 59–68
- , 2005, "Computer Security - ESORICS 2005, 10th European Symposium on Research
in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings", Springer, 3679
- , 2005, "Information Systems Security, First International Conference, ICISS
2005, Kolkata, India, December 19-21, 2005, Proceedings", Springer, 3803
- , 2005, "IQIS 2005, International Workshop on Information Quality in Information
Systems, 17 June 2005, Baltimore, Maryland, USA (SIGMOD 2005 Workshop)", ACM
- , 2005, "Passive and Active Network Measurement, 6th International Workshop,
PAM 2005, Boston, MA, USA, March 31 - April 1, 2005, Proceedings", Springer, 3431
- , 2005, "Privacy Enhancing Technologies, 4th International Workshop, PET
2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers", Springer, 3424
- , 2005, "Proceedings of the 12th ACM Conference on Computer and Communications
Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005", ACM
- , 2005, "Proceedings of the 14th USENIX Security Symposium, Baltimore, MD,
USA, July 31 - August 5, 2005", USENIX Association
- M Pirretti, S Zhu, N Vijaykrishnan, Patrick D McDaniel, M Kandemir and R Brooks, 2005, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense"
- A Al-Lawati, D Lee and Patrick D McDaniel, 2005, "Blocking in Private Information Matching", 59-68
- Hao Wang, Somesh Jha, Patrick D McDaniel and Miron Livny, 2004, "Security Policy Reconciliation in Distributed Computing Environments", pp. 137-148
- Simon Byers, Lorrie Faith Cranor, David P. Kormann and Patrick D McDaniel, 2004, "Searching for Privacy: Design and Implementation of a P3P-EnabledSearch Engine", pp. 314–328
- , 2004, "Proceedings of the 11th ACM Conference on Computer and Communications
Security, CCS 2004, Washington, DC, USA, October 25-29, 2004", ACM
- S Byers, L F Cranor, E Cronin, D Korman and Patrick D McDaniel, 2004, "Exposing Digital Content Piracy: Approaches, Issues and Experiences"
- Eric Cronin, Sugih Jamin, Tal Malkin and Patrick D McDaniel, 2003, "On the performance, feasibility, and use of forward-secure signatures", pp. 131–144
- William Aiello, John Ioannidis and Patrick D McDaniel, 2003, "Origin authentication in interdomain routing", pp. 165–178
- Simon Byers, Lorrie Faith Cranor, Eric Cronin, David P. Kormann and Patrick D McDaniel, 2003, "Analysis of security vulnerabilities in the movie production and distribution process", pp. 1–12
- Patrick D McDaniel, 2003, "On context in authorization policy", pp. 80–89
- Patrick D McDaniel and Atul Prakash, 2003, "A Flexible Architecture for Security Policy Enforcement", pp. 234–239
- Jim Irrer, Atul Prakash and Patrick D McDaniel, 2003, "Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System", pp. 44–46
- Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick D McDaniel and Aviel D. Rubin, 2003, "Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing", pp. 75-85
- Patrick D McDaniel and Atul Prakash, 2002, "Methods and Limitations of Security Policy Reconciliation", pp. 73–87
- Hugh Harney, Andrea Colgrove and Patrick D McDaniel, 2001, "Principles of Policy in Secure Groups"
- Patrick D McDaniel, A Prakash, J Irrer, S Mittal and T Thuang, 2001, "Flexibly Constructing Secure Groups in Antigone 2.0", pp. 55-67
- Patrick D McDaniel and Sugih Jamin, 2000, "Windowed Certificate Revocation", pp. 1406–1414
- Patrick D McDaniel and Aviel D. Rubin, 2000, "A Response to "Can We Eliminate Certificate Revocation Lists?"", pp. 245–258
- William A. Adamson, Charles J. Antonelli, Kevin Coffman, Patrick D McDaniel and Jim Rees, 1999, "Secure Distributed Virtual Conferencing", pp. 176–190
- Patrick D McDaniel, Atul Prakash and Peter Honeyman, 1999, "Antigone: A Flexible Framework for Secure Group Communication", pp. 99-114
- Patrick D McDaniel, Z Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksuta and Gang Tan, , "Sensitive Information Tracking in Commodity IoT"
- Patrick D McDaniel, Sayed M Saghaian, Thomas F Laporta, Trent R Jaeger and Z Berkay Celik, , "Mission-oriented Security Model, Incorporating Security Risk, Cost and Payout"
- Patrick D McDaniel, Z Berkay Celik and Gang Tan, , "Automated IoT Safety and Security Analysis"
- Patrick D McDaniel, Z Berkay Celik, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez and Ananthram Swami, , "Detection under Privileged Information"
- Patrick D McDaniel, Nicolas Papernot, Arunesh Sinha, Michael Wellman, and , , , "Security and Privacy in Machine Learning"
- Patrick D McDaniel and Z Berkay Celik, , "Extending Detection with Privileged Information via Generalized Distillation"
Other
- Patrick D McDaniel, Thorsten Holz, Indra Spiecker genannt Dohmann, Christopher Burchard, Ahmad-Reza Sadeghi, Konrad Rieck, Kamalika Chaudhuri, Somesh Jha, Andrea Matwyshyn, David Evans, Felix Freiling and Amy Hasan, 2021, "Cybersecurity and Machine Learning: Vision Document, Report on the joint NSF/DFG Cybersecurity and Machine Learning Research Workshop"
- Leonardo Babun, Z Berkay Celik, Patrick D McDaniel and Selcuk Uluagac, 2021, "Real-time Analysis of Privacy-(un)aware IoT Applications.", Privacy Enhancing Technologies Symposium (PETS)
- Ryan Sheatsley, Nicolas Papernot, Mike Weisman, Gunjun Verma and Patrick D McDaniel, 2019, "Adversarial Examples in Constrained Domains."
- Patrick D McDaniel, 2019, "Artificial Intelligence and Cybersecurity: Opportunities and Challenges 2019 Technical Workshop Report”"
- Patrick D McDaniel, 2019, "Artificial Intellegence and Cybersecurity: Opportunities and Challenges 2019"
- Patrick D McDaniel, 2018, "A Vision Toward an Internet of Battlefield Things (IoBT): Autonomous Classifying Sensor Network"
- Nicolas Papernot, Ian Goodfellow, Ryan Sheatsley, Reuben Feinman and Patrick D McDaniel, 2016, "cleverhans v1.0.0: an adversarial machine learning library", (arXiv:1610.00768)
- Devin J. Pohly and Patrick D McDaniel, 2016, "Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols", (NAS-TR-0188-2016)
- Nicolas Papernot, Patrick D McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik* and Ananthram Swami, 2015, "The Limitations of Deep Learning in Adversarial Settings"
- Wenhui Hu*, Damien Octeau*, Patrick D McDaniel and Peng Liu, 2014, "Duet: library integrity verification for android applications"
- Devin J. Pohly*, Stephen E. McLaughlin*, Patrick D McDaniel and Kevin Butler*, 2012, "Hi-Fi: collecting high-fidelity whole-system provenance"
- D. Octeau*, S. Jha and Patrick D McDaniel, 2011, "Retargeting Android Applications to Java Bytecode"
- S. McLaughlin* and Patrick D McDaniel, 2011, "Protecting Consumer Privacy from Electric Load Monitoring"
- Stephen E. McLaughlin*, Dmitry Podkuiko*, Adam Delozier*, Sergei Miadzvezhanka* and Patrick D McDaniel, 2010, "Multi-vendor penetration testing in the advanced metering infrastructure"
- William Enck* and Patrick D McDaniel, 2010, "Federated Information Flow Control for Mobile Phones"
- Joshua Schiffman, Thomas Moyer*, Hayawardh Vijayakumar, Trent R Jaeger and Patrick D McDaniel, 2010, "Seeding clouds with trust anchors"
- Patrick D McDaniel, K. Butler, W. Enck, H. Hursti, S. McLaughlin, P. Traynor, M. Blaze, A. Aviv, P. Cerny, S. Clark, E. Cronin, G. Shah, M. Sherr, G. Vigna, R. Kemmerer, D. Balzarotti, G. Banks, M. Cova, V. Felmetsger, W. Robertson, F. Valeur, J. Lorenzo Hall and L. Quilter, 2007, "EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing", pp. 350
- T Jaeger, Patrick D McDaniel, L St. Clair, R Caceres and R Sailer, 2006, "Shame on Trust in Distributed Systems"
- Patrick D McDaniel, Florian Tramer, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow and Dan Boneh, , "Ensemble Adversarial Training: Attacks and Defenses"