Zobrazeno 1 - 10
of 103
pro vyhledávání: '"Patrick Traynor"'
Autor:
Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin Butler
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2022:105-119
Stalkerware is a form of malware that allows for the abusive monitoring of intimate partners. Primarily deployed on information-rich mobile platforms, these malicious applications allow for collecting information about a victim’s actions and behavi
Audio Rogue Base Stations (ARBSs) allow an adversary to intercept cellular calls. These devices represent a substantial escalation in the threat posed by traditional rogue base stations, which only collect device identity information. This work prese
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::15c3bf5b3e4284356fe35c967e247e5d
Publikováno v:
2022 IEEE Conference on Communications and Network Security (CNS).
Autor:
Nolen Scaife, Hari Venugopala, Christian Peeters, Zainul Abi Din, Samuel T. King, Patrick Traynor
Publikováno v:
IEEE Security & Privacy. 19:65-69
Most apps and merchants do not want to deal with financial fraud, but, if they accept payments, they will eventually have to. Our position is that credit card fraud prevention is a technical problem that needs technical solutions.
Autor:
Grant Hernandez, Marius Muench, Dominik Maier, Alyssa Milburn, Shinjo Park, Tobias Scharnowski, Tyler Tucker, Patrick Traynor, Kevin Butler
Publikováno v:
Proceedings 2022 Network and Distributed System Security Symposium.
Autor:
Arslan Khan, Joseph I. Choi, Dave Jing Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, John M. Shea, Tan F. Wong
Publikováno v:
2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).
Publikováno v:
IEEE Security & Privacy. 17:10-17
Payment card fraud results in billions of dollars in losses annually. We developed the Skim Reaper, the first device that detects the physical properties of skimmers. We discuss the challenges and key lessons learned in transitioning our technology t
Autor:
Logan Blue, Luis Vargas, Dave (Jing) Tian, Nolen Scaife, Kevin R. B. Butler, Bradley Reaves, Patrick Traynor
Publikováno v:
ACM Transactions on Privacy and Security. 22:1-31
Recent years have seen the Short Message Service (SMS) become a critical component of the security infrastructure, assisting with tasks including identity verification and second-factor authentication. At the same time, this messaging infrastructure
Publikováno v:
IoTDI
Smart speakers are increasingly appearing in homes, enterprises, and businesses including hotels. These systems serve as hubs for other IoT devices and deliver content from streaming media services. However, such an arrangement creates a number of se
Autor:
Kevin Warren, Tom Shrimpton, Hadi Abdullah, Washington Garcia, Muhammad Sajidur Rahman, Anurag Swarnim Yadav, Patrick Traynor
Publikováno v:
IEEE Symposium on Security and Privacy
Automatic speech recognition and voice identification systems are being deployed in a wide array of applications, from providing control mechanisms to devices lacking traditional interfaces, to the automatic transcription of conversations and authent