Patrick Drew Mcdaniel
#118,969
Most Influential Person Now
Patrick Drew Mcdaniel's AcademicInfluence.com Rankings
Patrick Drew Mcdanielcomputer-science Degrees
Computer Science
#4727
World Rank
#4990
Historical Rank
Database
#1930
World Rank
#2025
Historical Rank

Download Badge
Computer Science
Patrick Drew Mcdaniel's Degrees
- PhD Computer Science Pennsylvania State University
- Masters Computer Science Pennsylvania State University
- Bachelors Computer Science Pennsylvania State University
Similar Degrees You Can Earn
Why Is Patrick Drew Mcdaniel Influential?
(Suggest an Edit or Addition)Patrick Drew Mcdaniel's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones (2010) (3319)
- The Limitations of Deep Learning in Adversarial Settings (2015) (3097)
- Practical Black-Box Attacks against Machine Learning (2016) (2786)
- Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks (2015) (2490)
- Ensemble Adversarial Training: Attacks and Defenses (2017) (2060)
- FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps (2014) (1784)
- Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples (2016) (1374)
- Security and Privacy Challenges in the Smart Grid (2009) (1137)
- On lightweight mobile phone application certification (2009) (1064)
- A Study of Android Application Security (2011) (1041)
- Understanding Android Security (2009) (616)
- On the (Statistical) Detection of Adversarial Examples (2017) (607)
- IccTA: Detecting Inter-Component Privacy Leaks in Android Apps (2015) (559)
- Semantically Rich Application-Centric Security in Android (2009) (549)
- Secure attribute-based systems (2006) (542)
- Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples (2016) (453)
- The Space of Transferable Adversarial Examples (2017) (445)
- Adversarial Examples for Malware Detection (2017) (440)
- Towards the Science of Security and Privacy in Machine Learning (2016) (412)
- Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust Deep Learning (2018) (394)
- An Analysis of Anonymity in Bitcoin Using P2P Network Traffic (2014) (384)
- Technical Report on the CleverHans v2.1.0 Adversarial Examples Library (2016) (370)
- Crafting adversarial input sequences for recurrent neural networks (2016) (369)
- SoK: Security and Privacy in Machine Learning (2018) (361)
- Adversarial Perturbations Against Deep Neural Networks for Malware Classification (2016) (358)
- Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis (2013) (354)
- A Survey of BGP Security Issues and Solutions (2010) (352)
- Energy Theft in the Advanced Metering Infrastructure (2009) (283)
- Exploiting open functionality in SMS-capable cellular networks (2005) (264)
- Making machine learning robust against adversarial inputs (2018) (261)
- Protecting consumer privacy from electric load monitoring (2011) (252)
- Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing (2003) (250)
- Cleverhans V0.1: an Adversarial Machine Learning Library (2016) (241)
- On cellular botnets: measuring the impact of malicious devices on a cellular network core (2009) (236)
- Composite Constant Propagation: Application to Android Inter-Component Communication Analysis (2015) (209)
- Privacy Preserving Clustering (2005) (208)
- Sensitive Information Tracking in Commodity IoT (2018) (180)
- Soteria: Automated IoT Safety and Security Analysis (2018) (174)
- Methods and limitations of security policy reconciliation (2002) (162)
- IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT (2019) (157)
- Hi-Fi: collecting high-fidelity whole-system provenance (2012) (147)
- Multi-vendor penetration testing in the advanced metering infrastructure (2010) (142)
- Origin authentication in interdomain routing (2003) (142)
- TARP: ticket-based address resolution protocol (2005) (137)
- Minimizing private data disclosures in the smart grid (2012) (135)
- Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis (2013) (130)
- Limiting Sybil Attacks in Structured P2P Networks (2007) (129)
- TaintDroid (2014) (128)
- Retargeting Android applications to Java bytecode (2012) (126)
- The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense (2006) (125)
- Seeding clouds with trust anchors (2010) (122)
- Machine Learning in Adversarial Settings (2016) (119)
- Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks (2006) (118)
- Configuration management at massive scale: system design and experience (2007) (116)
- On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis (2016) (112)
- A Trusted Safety Verifier for Process Controller Code (2014) (108)
- Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis (2016) (104)
- Program Analysis of Commodity IoT Applications for Security and Privacy (2018) (104)
- Highly precise taint analysis for Android applications (2013) (100)
- Extending Defensive Distillation (2017) (98)
- Porscha: policy oriented secure content handling in Android (2010) (97)
- Blocking-aware private record linkage (2005) (96)
- SABOT: specification-based payload generation for programmable logic controllers (2012) (94)
- SoK: Lessons Learned from Android Security Research for Appified Software Platforms (2016) (88)
- A logical specification and analysis for SELinux MLS policy (2007) (87)
- Building an Ontology of Cyber Security (2014) (86)
- On Attack Causality in Internet-Connected Cellular Networks (2007) (85)
- Principles of Policy in Secure Groups (2001) (82)
- Antigone: A Flexible Framework for Secure Group Communication (1999) (81)
- On context in authorization policy (2003) (80)
- I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis (2014) (79)
- IotSan: fortifying the safety of IoT systems (2018) (79)
- Analysis of Communities of Interest in Data Networks (2005) (78)
- Optimizing BGP security by exploiting path stability (2006) (74)
- Mitigating Android Software Misuse Before It Happens (2008) (72)
- Enterprise Security: A Community of Interest Based Approach (2006) (72)
- A survey on IoT platforms: Communication, security, and privacy perspectives (2021) (72)
- Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems (2007) (65)
- A Response to ''Can We Eliminate Certificate Revocation Lists?'' (2000) (64)
- Cyber Deception: Virtual Networks to Defend Insider Reconnaissance (2016) (63)
- Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains (2016) (59)
- From Languages to Systems: Understanding Practical Application Development in Security-typed Languages (2006) (58)
- Cimplifier: automatically debloating containers (2017) (57)
- On the Effectiveness of Defensive Distillation (2016) (57)
- Trusted declassification:: high-level policy for a security-typed language (2006) (52)
- Password Exhaustion: Predicting the End of Password Usefulness (2006) (52)
- Analysis of security vulnerabilities in the movie production and distribution process (2003) (51)
- EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing (2007) (48)
- From Trusted to Secure: Building and Executing Applications That Enforce System Security (2007) (47)
- Toward Valley-Free Inter-domain Routing (2007) (47)
- Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies (2017) (45)
- Malware traffic detection using tamper resistant features (2015) (44)
- Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine (2004) (43)
- Towards a Secure and Efficient System for End-to-End Provenance (2010) (42)
- Windowed certificate revocation (2000) (42)
- On the performance, feasibility, and use of forward-secure signatures (2003) (41)
- Rootkit-resistant disks (2008) (40)
- Malicious co-residency on the cloud: Attacks and defense (2017) (40)
- Limiting Sybil Attacks in Structured Peer-to-Peer Networks (2005) (39)
- Security policy reconciliation in distributed computing environments (2004) (38)
- Embedded Firmware Diversity for Smart Electric Meters (2010) (38)
- Measuring the Impact and Perception of Acceptable Advertisements (2015) (38)
- A Survey of BGP Security (2005) (37)
- Kratos: multi-user multi-device-aware access control system for the smart home (2019) (37)
- Security and Science of Agility (2014) (36)
- TaintDroid (2014) (35)
- Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems (2008) (35)
- Defending Against Attacks on Main Memory Persistence (2008) (35)
- Adversarial Network Forensics in Software Defined Networking (2017) (34)
- Mitigating attacks on open functionality in SMS-capable cellular networks (2009) (33)
- Privacy Preserving Communication in MANETs (2007) (33)
- Efficient Techniques for Detecting False Origin Advertisements in Inter-domain Routing (2006) (32)
- Not So Great Expectations: Why Application Markets Haven't Failed Security (2010) (32)
- Real-time Analysis of Privacy-(un)aware IoT Applications (2019) (30)
- Verifying Internet of Things Safety and Security in Physical Spaces (2019) (28)
- Establishing and Sustaining System Integrity via Root of Trust Installation (2007) (27)
- Scalable Web Content Attestation (2009) (27)
- Email Communities of Interest (2007) (27)
- An architecture for enforcing end-to-end access control over web applications (2010) (27)
- Justifying Integrity Using a Virtual Machine Verifier (2009) (26)
- From mobile phones to responsible devices (2011) (25)
- Composite Constant Propagation and its Application to Android Program Analysis (2016) (23)
- How Relevant Is the Turing Test in the Age of Sophisbots? (2019) (23)
- An analysis of security vulnerabilities in the movie production and distribution process (2004) (22)
- Network-Based Root of Trust for Installation (2011) (22)
- Duet: library integrity verification for android applications (2014) (22)
- Kells: a protection framework for portable data (2010) (22)
- Security for Telecommunications Networks (2008) (21)
- Malnets: Large-scale Malicious Networks via Compromised Wireless Access Points (2010) (21)
- Web security (2005) (21)
- ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks (2009) (19)
- Data Provenance and Security (2011) (19)
- PinUP: Pinning User Files to Known Applications (2008) (19)
- Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST (2008) (18)
- Patient-Driven Privacy Control through Generalized Distillation (2016) (17)
- Achieving Secure and Differentially Private Computations in Multiparty Settings (2017) (17)
- A Scalable Key Distribution Hierarchy (2000) (16)
- Voice-over-IP Security: Research and Practice (2010) (16)
- Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud (2019) (15)
- Securing ARP/NDP From the Ground Up (2017) (15)
- Jifclipse: development tools for security-typed languages (2007) (14)
- Existing Applications Interactions in Android Semantically Rich Application-Centric Security in Android (2009) (14)
- Bloatware Comes to the Smartphone (2012) (14)
- Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing (2006) (14)
- IotSan (2018) (13)
- Non-volatile memory and disks:: avenues for policy architectures (2007) (13)
- Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks (2020) (13)
- Adversarial Examples in Constrained Domains (2020) (12)
- Android market reconstruction and analysis (2014) (12)
- Ismene: Provisioning and Policy Reconciliation in Secure Group Communication (2000) (12)
- A Detection Mechanism for SMS Flooding Attacks in Cellular Networks (2012) (12)
- Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware (2010) (11)
- SLAT : Secure Localization with Attack Tolerance (2005) (11)
- Security Outlook: Six Cyber Game Changers for the Next 15 Years (2014) (10)
- A flexible architecture for security policy enforcement (2003) (10)
- Computational ontology of network operations (2015) (10)
- Privacy Preserving Web-Based Email (2006) (10)
- On the Robustness of Domain Constraints (2021) (10)
- IoTRepair: Systematically Addressing Device Faults in Commodity IoT (2020) (9)
- Enablers of Adversarial Attacks in Machine Learning (2018) (9)
- Secure reporting of traffic forwarding activity in mobile ad hoc networks (2005) (9)
- Noninvasive Methods for Host Certification (2008) (9)
- Analysis of the IPv4 Address Space Delegation Structure (2007) (9)
- Co-residency Attacks on Containers are Real (2020) (9)
- Cyber Fighter Associate: A Decision Support System for cyber agility (2016) (8)
- *Policy management in secure group communication (2001) (8)
- Toward a Science of Secure Environments (2014) (8)
- Detection of stealthy TCP-based DoS attacks (2015) (8)
- Shame on Trust in Distributed Systems (2006) (8)
- Declassification with Cryptographic Functions in a Security-Typed Language (2005) (8)
- Design, implementation and evaluation of security in iSCSI-based network storage systems (2006) (8)
- BinDNN: Resilient Function Matching Using Deep Learning (2016) (8)
- Windowed Key Revocation in Public Key Infrastructures (2000) (8)
- Multi-User Multi-Device-Aware Access Control System for Smart Home (2019) (7)
- Channels: Runtime System Infrastructure for Security-Typed Languages (2007) (7)
- Detection under Privileged Information (2016) (7)
- Analysis techniques for mobile operating system security (2011) (7)
- New Security Architectures Based on Emerging Disk Functionality (2010) (6)
- Adversarial examples for network intrusion detection systems (2022) (6)
- EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs (2019) (6)
- Stealth migration: Hiding virtual machines on the network (2017) (6)
- Extending Detection with Forensic Information (2016) (6)
- Feature Cultivation in Privileged Information-augmented Detection (2017) (6)
- Proof and Implementation of Algorithmic Realization of Learning Using Privileged Information ( LUPI ) Paradigm : SVM + (2015) (6)
- Integrating SELinux with Security-typed Languages (2007) (5)
- Lightweight Secure Group Communication (1998) (5)
- Secure Distributed Virtual Conferencing (1999) (5)
- Protecting users from "themselves" (2007) (5)
- Antigone: Implementing Policy in Secure Group Communication (2000) (5)
- Enforcing provisioning and authorization policy in the Antigone system (2006) (5)
- Structured security testing in the smart grid (2012) (5)
- MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking (2020) (5)
- Attack Resilience of Cache Replacement Policies (2021) (4)
- Towards Least Privilege Containers with Cimplifier (2016) (4)
- Firma : Disk-Based Foundations for Trusted Operating Systems (2009) (4)
- Preparing for the Age of Deepfakes and Disinformation (2020) (4)
- Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information (2021) (4)
- Attacking strategies and temporal analysis involving Facebook discussion groups (2017) (4)
- Securing mobile phones in the evolving mobile ecosystem (2010) (4)
- Extending Detection with Privileged Information via Generalized Distillation (2018) (4)
- Curie: Policy-based Secure Data Exchange (2017) (4)
- Building a Privacy-Preserving Smart Camera System (2022) (4)
- Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols (2016) (4)
- Who’s Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment (2022) (4)
- Defining and Detecting Environment Discrimination in Android Apps (2017) (3)
- Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems (2014) (3)
- Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations (2021) (3)
- Generating Practical Adversarial Network Traffic Flows Using NIDSGAN (2022) (3)
- Securing Non-Volatile Main Memory (2006) (3)
- Mapping sample scenarios to operational models (2016) (3)
- Testing Large Scale BGP Security in Replayable Network Environments (2006) (3)
- Malware modeling and experimentation through parameterized behavior (2018) (3)
- Non-Invasive Methods for Host Certification (2006) (2)
- Lightweight Failure Detection in Secure Group Communication (2000) (2)
- Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004 (2004) (2)
- Adaptive protocol switching using Dynamically Insertable Bumps in the stack (2015) (2)
- Enforcing Multilevel Security Policies in Unstable Networks (2022) (2)
- MICSS: A Realistic Multichannel Secrecy Protocol (2014) (2)
- Six Potential Game-Changers in Cyber Security: Towards Priorities in Cyber Science and Engineering (2015) (2)
- Secure Distributed Virtual Conferencing: Multicast or Bust (1999) (2)
- Enforcing agile access control policies in relational databases using views (2015) (2)
- Misreporting Attacks in Software-Defined Networking (2020) (2)
- Guest Editors' Introduction: Special Section on Software Engineering for Secure Systems (2008) (2)
- Securing ARP From the Ground Up (2015) (2)
- Antigone: policy-based secure group communication system and AMirD: Antigone-based secure file mirroring system (2003) (2)
- Realizing a Source Authentic Internet (2010) (2)
- Towards Automated Privilege Separation (2007) (2)
- Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections Following Project EVEREST∗ (2008) (2)
- Vulnerabilities in Cellular Data Networks (2008) (2)
- Origin Disturbances in BGP (2004) (2)
- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior (2005) (2)
- Proceedings of the 6th USENIX conference on Hot topics in security (2011) (1)
- Implications of Path Stability on Efficient Authentication in Interdomain Routing (2005) (1)
- Attack Resilience of Cache Replacement Policies: A Study Based on TTL Approximation (2022) (1)
- Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices (2022) (1)
- Tracing the Arc of Smartphone Application Security (2017) (1)
- SwitchBlade : Policy-Driven Disk Segmentation (2009) (1)
- IoTRepair: Flexible Fault Handling in Diverse IoT Deployments (2022) (1)
- Building Better Detection with Privileged Information (2016) (1)
- Application Transiency: Towards a Fair Trade of Personal Information for Application Services (2019) (1)
- B IN DNN : Resilient Function Matching Using Deep Learning (2016) (1)
- Milcom 2015 Track 3: Milcom 2015 Track 3 - Cyber Security and Trusted Computing (2015) (1)
- Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks (2021) (1)
- Evading Machine Learning Based Network Intrusion Detection Systems with GANs (2021) (1)
- Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains (2017) (1)
- Protecting portable storage with host validation (2010) (1)
- Exposing digital content piracy: approaches, issues and experiences (2004) (1)
- Measuring and Mitigating the Risk of IP Reuse on Public Clouds (2022) (1)
- Poster : On Demystifying the Android Application Framework : ReVisiting Android Permission Specification Analysis (2016) (0)
- Characterizing the impact of rigidity on the security of cellular telecommunications networks (2008) (0)
- Below the Salt (2009) (0)
- Peer Review Process (2020) (0)
- Vulnerabilities in the Short Messaging Service (SMS) (2008) (0)
- The analysis of Di, a detailed design metric, on large-scale software (1991) (0)
- Trust , Security , and Privacy in Parallel and Distributed Systems (2013) (0)
- On the Integrity of Deep Learning Oracles (2016) (0)
- Physics-Based Misbehavior Detection System for V2X Communications (2022) (0)
- IPsec Patrick McDaniel (2004) (0)
- IBM Research Report Shame on Trust in Distributed Systems (2006) (0)
- EIPSIM: Modeling Secure IP Address Allocation at Cloud Scale (2022) (0)
- Protecting Portable Data with Host Validation (2010) (0)
- Security Policy Enforcement in the Antigone System (2005) (0)
- Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout (2018) (0)
- Program Twenty-Second Annual Computer Security Applications Conference ( ACSAC ) Practical Solutions (0)
- Proceedings of the 2nd USENIX workshop on Hot topics in security (2007) (0)
- logical methods in security and Privacy (2010) (0)
- Technical Report NAS-TR-0042-2006 Understanding Equivalance in High-Level and Information Flow Policy (2006) (0)
- An Enhanced Cluster Gateway Switch Routing Protocol (ECGSR) for Congestion Control using AODV Algorithm in MANET (2016) (0)
- SmartThings architecture IoT App PermissionSystem Smart Device Cloud Backend Groovy Sandbox Hub ZigBee , Zwave , WiFi SmartThings Mobile App (2018) (0)
- Tamper Resistant Features (2015) (0)
- More or Less? Predict the Social Influence of Malicious URLs on Social Media (2018) (0)
- Building scalable document integrity systems (2011) (0)
- Proceedings of the 3rd international conference on Information systems security (2007) (0)
- Framework for Flexible Security in Group Communications (2006) (0)
- NetCrypt : A Transparent Secure Communication (1997) (0)
- Poster: Extending Defensive Distillation (2017) (0)
- BGPRV : A Library for Fast and Efficient Routing Data Manipulation (2006) (0)
- HoneyModels: Machine Learning Honeypots (2021) (0)
- A New Science of Security Decision Making (2015) (0)
- Future Directions and Challenges (2008) (0)
- A Secure and Efficient End-to-End Provenance System ( EEPS ) (2010) (0)
- Adversarial Network Forensics in Software Defined Networking: Demo (2017) (0)
- Autonomously Secure Disks (2010) (0)
- Vulnerabilities in Voice over IP (2008) (0)
- Joint Caching and Routing in Cache Networks with Arbitrary Topology (2022) (0)
- Improving Robustness of a Popular Probabilistic Clustering Algorithm Against Insider Attacks (2020) (0)
- Scalable Integrity-Guaranteed AJAX (2012) (0)
- Wireless Networks Interactive Media (2006) (0)
- Compliance of Multilayer Information Flow Policies (2007) (0)
- Secure Systems Definition and History of Provenance (0)
- Sustainability is a Security Problem (2022) (0)
- Vulnerabilities in the Telephony (2008) (0)
- Securing ARP From the Bottom Up (2014) (0)
- Performant Binary Fuzzing without Source Code using Static Instrumentation (2022) (0)
- Grains of SANs : Building Storage Area Networks from Memory Spots (2007) (0)
- The Space of Adversarial Strategies (2022) (0)
- Adversarial Plannning (2022) (0)
- Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings (2007) (0)
- Regulating Access to System Sensors in Cooperating Programs (2018) (0)
- Investigating weaknesses in Android certificate security (2015) (0)
- Exposing Android social applications: linking data leakage to privacy policies (2021) (0)
- Disk-enabled authenticated encryption (2010) (0)
- Poster: Comparing Neural Network Solutions in Cryptographic API Completion (2022) (0)
- State University Network-Based Root of Trust for Installation (0)
- Session details: Attacks I (2009) (0)
This paper list is powered by the following services: