Photo of Patrick McDaniel

Patrick McDaniel

William L. Weiss Chair in Information and Communications Technology

Affiliation(s):

  • School of Electrical Engineering and Computer Science
  • Computer Science and Engineering
  • Law, Policy, and Engineering

W303 Westgate Building

pdm12@psu.edu

814-863-3599

Personal or Departmental Website

Research Areas:

LPE Academic Working Group; LPE Research Working Group; Network and Mobile Systems; Programming Languages and Compilers; Security and Privacy

Interest Areas:

Systems and network security, security policy, networking, distributed systems, public policy, network management, applied cryptography, privacy.

 
 

 

Education

  • BS, Computer Science, Ohio State University, 1989
  • MS, Ball State University, 1991
  • Ph D, Computer Science and Engineering, University of Michigan, 2001

Publications

Books

  • Patrick Traynor, Patrick D McDaniel and Thomas F Laporta, 2008, Security for Telecommunications Networks, Springer, pp. 182 pages
  • , 2005, Encyclopedia of Cryptography and Security, Springer

Book, Chapters

  • K Butler, W Enck, P Traynor, J Plasterr and Patrick D McDaniel, 2008, Privacy Preserving Web-Based Email
  • Patrick D McDaniel, 2007, Authentication, John Wiley and Sons, Inc
  • Patrick D McDaniel, 2005, IPsec
  • Patrick D McDaniel, 2005, Policy
  • Patrick D McDaniel, 2004, Computer and Network Authentication, John Wiley and Sons Inc
  • Patrick D McDaniel, 2003, Encyclopedia of Information Security, Kluwer Academic Publishers
  • Patrick D McDaniel, 2002, The Internet Encyclopedia, John Wiley and Sons, Inc

Journal Articles

  • Ahmed Atya, Zhiyun Qian, Srikanth Krishnamurthy, Thomas LaPorta, Patrick Drew McDaniel Drew McDaniel and Lisa Marvel, 2019, "Catch Me if You Can: Malicious Co-Residency on the Cloud", IEEE/ACM Transactions on Networking, 27 (2)
  • Z. Berkay Celik, Earlence Fernandes, Eric Pauley, Gang Tan and Patrick Drew McDaniel Drew McDaniel, 2019, "Program Analysis of Commodity IoT Applications for Security and Privacy: Opportunities and Challenges.", ACM Computing Surveys (CSUR), 42 (4)
  • Z. Berkay Celik and Patrick Drew McDaniel Drew McDaniel, 2019, "Verifying IoT Safety and Security in Physical Spaces", IEEE Security & Privacy Magazine, 17 (5)
  • Daniel E Krych and Patrick Drew McDaniel Drew McDaniel, 2019, "Exposing Android Social Applications: Linking Data Leakage to Privacy Policies", Journal of Cyber Security Technology
  • Ian Goodfellow, Patrick D McDaniel and Nicolas Papernot, 2018, "Making Machine Learning Robust Against Adversarial Inputs", COMMUNICATIONS OF THE ACM, 61, (7), pp. 56-66
  • Chaz Lever, Robert J. Walls, Yacin Nadji, David Dagon, Patrick D McDaniel and Manos Antonakakis, 2017, "Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains", IEEE Security \& Privacy Magazine (Secure Systems issue column)
  • Dave Tian, Katharine L Butler, Junghun Choi, Patrick D McDaniel and P. Krishnaswamy, 2017, "Securing ARP/NDP From the Ground Up", IEEE Transactions on Information Forensics and Security
  • Patrick D McDaniel and Ananthram Swami, 2017, "The Cyber Security Collaborative Research Alliance:Unifying Detection, Agility, and Risk in Mission-Oriented Cyber Decision Making", CSIAC Journal, Army Research Laboratory (ARL) Cyber Science and Technology, 5, (1)
  • S. Achleitner, T.F. La Porta, Patrick D McDaniel, S. Sugrim, S.V. Krishnamurthy and R. Chada, 2017, "Deceiving Network Reconnaissance Unsing SDN-based Virtual Topologies", IEEE Transactions on Network and Service Management, Special Issue on Advances in Management of Softwarized Networks
  • Z. Berkay Celik, Patrick D McDaniel and Thomas Bowen, 2017, "Malware Modeling and Experimentation through Parameterized Behavior", Journal of Defense Modeling and Simulation (JDMS)
  • Patrick D McDaniel, Nicolas Papernot and Berkay Celik, 2016, "Machine Learning in Adversarial Settings", IEEE Security \& Privacy Magazine, 14, (3)
  • Nicolas Papernot, Patrick D McDaniel, Ian Goodfellow, Somesh Jha, Berkay Celik and Ananthram Swami, 2016, "Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples", arXiv preprint arXiv:1602.02697
  • Nicolas Papernot, Patrick D McDaniel and Ian Goodfellow, 2016, "Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples", arXiv preprint arXiv:1605.07277
  • Damien Octeau, Daniel Luchaup, Somesh Jha and Patrick D McDaniel, 2016, "Composite Constant Propagation and its Application to Android Program Analysis", IEEE Transactions on Software Engineering, 42, (11), pp. 999-1014
  • Nicolas Papernot, Patrick D McDaniel, Xi Wu, Somesh Jha and Ananthram Swami, 2015, "Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks", CoRR, abs/1511.04508
  • Alexander Kott, Ananthram Swami and Patrick D McDaniel, 2015, "Six Potential Game-Changers in Cyber Security: Towards Priorities in Cyber Science and Engineering", CoRR, abs/1511.00509
  • Nicolas Papernot, Patrick D McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik* and Ananthram Swami, 2015, "The Limitations of Deep Learning in Adversarial Settings", CoRR, abs/1511.07528
  • Alexander Kott, Ananthram Swami and Patrick D McDaniel, 2014, "Security Outlook: Six Cyber Game Changers for the Next 15 Years", IEEE Computer, 47, (12), pp. 104–106
  • William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol N. Sheth, 2014, "TaintDroid: An Information-Flow Tracking System for Realtime PrivacyMonitoring on Smartphones", ACM Transactions on Computer Systems, 32, (2), pp. 5
  • William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol Sheth, 2014, "TaintDroid: an information flow tracking system for real-time privacymonitoring on smartphones", Communications of the ACM, 57, (3), pp. 99–106
  • Zhenfu Cao, Keqiu Li, Xu Li, Patrick D McDaniel, Radha Poovendran, Guojun Wang and Yang Xiang, 2014, "Guest Editors’ Introduction: Special Issue on Trust, Security, andPrivacy in Parallel and Distributed Systems", IEEE Trans. Parallel Distrib. Syst., 25, (2), pp. 279–282
  • Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau* and Patrick D McDaniel, 2014, "I know what leaked in your pocket: uncovering privacy leaks on AndroidApps with Static Taint Analysis", CoRR, abs/1404.7431
  • William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol Sheth, 2014, "TaintDroid: an information flow tracking system for real-time privacymonitoring on smartphones", Communications of the ACM, 57, (3), pp. 99–106
  • William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol N. Sheth, 2014, "TaintDroid: An Information-Flow Tracking System for Realtime PrivacyMonitoring on Smartphones", ACM Transactions on Computer Systems, 32, (2), pp. 5:1–5:29
  • Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau and Patrick D McDaniel, 2014, "I know what leaked in your pocket: uncovering privacy leaks on AndroidApps with Static Taint Analysis", CoRR, abs/1404.7431
  • Patrick D McDaniel, Brian Rivera and Ananthram Swami, 2014, "Toward a Science of Secure Environments", IEEE Security & Privacy, 12, (4), pp. 68–70
  • M. Ongtang*, S. McLaughlin*, W. Enck* and Patrick D McDaniel, 2012, "Semantically Rich Application-Centric Security in Android", Security and Communication Networks, 5, (6), pp. 658-673
  • Patrick D McDaniel, 2012, "Bloatware Comes to the Smartphone", IEEE Security & Privacy, 10, (4), pp. 85–87
  • P. Traynor*, C. Amrutkar, V. Rao, T. Jaeger, Patrick D McDaniel and T. F. La Porta, 2011, "From Mobile Phones to Responsible Devices", Journal of Security and Communication Networks (SCN), 4, (6), pp. 719-726
  • T Moyer*, K Butler*, J Schiffman, Patrick D McDaniel and Trent R Jaeger, 2011, "Scalable Web Content Attestation", IEEE Transactions on Computers, pp. 15
  • Patrick D McDaniel, 2011, "Data Provenance and Security", IEEE Security & Privacy Magazine, 9, (2), pp. 83-85
  • J. Schiffman, T. Jaeger and Patrick D McDaniel, 2011, "Network-based Root of Trust for Installation", IEEE Security & Privacy Magazine, 9, (1), pp. 40-48
  • Kevin Butler*, Stephen E. McLaughlin*, Thomas Moyer* and Patrick D McDaniel, 2010, "New Security Architectures Based on Emerging Disk Functionality", IEEE Security & Privacy, 8, (5), pp. 34–41
  • Patrick D McDaniel and William Enck*, 2010, "Not So Great Expectations: Why Application Markets Haven't Failed Security", IEEE Security & Privacy, 8, (5), pp. 76–78
  • Boniface Hicks*, Sandra Rueda, Luke St. Clair*, Trent R Jaeger and Patrick D McDaniel, 2010, "A logical specification and analysis for SELinux MLS policy", ACM Transactions on Information and System Security, 13, (3)
  • Patrick Traynor*, Kevin Butler*, William Enck*, Patrick D McDaniel and Kevin Borders, 2010, "malnets: large-scale malicious networks via compromised wireless access points", Security and Communication Networks, 3, (2-3), pp. 102–113
  • Kevin Butler*, Toni R. Farley, Patrick D McDaniel and Jennifer Rexford, 2010, "A Survey of BGP Security Issues and Solutions", Proceedings of the IEEE, 98, (1), pp. 100–122
  • Matthew Pirretti, Patrick Traynor*, Patrick D McDaniel and Brent Waters, 2010, "Secure attribute-based systems", Journal of Computer Security, 18, (5), pp. 799–837
  • Kevin R. B. Butler*, Sunam Ryu, Patrick Traynor* and Patrick D McDaniel, 2009, "Leveraging Identity-Based Cryptography for Node ID Assignment inStructured P2P Systems", IEEE Transactions on Parallel and Distributed Systems (TPDS), 20, (12), pp. 1803–1815
  • Heesook Choi, William Enck, Jaesheung Shin, Patrick D McDaniel and Thomas F Laporta, 2009, "ASR: anonymous and secure reporting of traffic forwarding activityin mobile ad hoc networks", ACM Wireless Networks (WINET), 15, (4), pp. 525–539
  • Patrick D McDaniel and Stephen E. McLaughlin, 2009, "Security and Privacy Challenges in the Smart Grid", IEEE Security & Privacy, 7, (3), pp. 75–77
  • W Enck, T Moyer, Patrick D McDaniel, S Sen, P Sebos, S Spoerel, A Greenberg, Y W Sung, S Rao and W Aiello, 2009, "Configuration Management at Massive Scale: System Design and Experience", IEEE Journal on Selected Areas in Communications (JSAC), 27
  • Patrick Traynor, William Enck, Patrick D McDaniel and Thomas F Laporta, 2009, "Mitigating attacks on open functionality in SMS-capable cellular networks", IEEE/ACM Transactions on Networking, 17, (1), pp. 40–53
  • William Enck, Machigar Ongtang and Patrick D McDaniel, 2009, "Understanding Android Security", IEEE Security and Privacy Magazine, 7, (1), pp. 50–57
  • Patrick Traynor, William Enck, Patrick D McDaniel and Thomas F Laporta, 2008, "Exploiting open functionality in SMS-capable cellular networks", Journal of Computer Security, 16, (6), pp. 713–742
  • Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks and Patrick D McDaniel, 2008, "Noninvasive Methods for Host Certification", ACM Transactions on Information and System Security (TISSEC), 11, (3)
  • Patrick D McDaniel and Bashar Nuseibeh, 2008, "Guest Editors’ Introduction: Special Section on Software Engineeringfor Secure Systems", IEEE Transactions on Software Engineering, 34, (1), pp. 3–4
  • Wesam Lootah, William Enck and Patrick D McDaniel, 2007, "TARP: Ticket-based address resolution protocol", Computer Networks, 51, (15), pp. 4322–4337
  • Patrick D McDaniel, P Traynor, R Kumar, H Choi, G Cao, S Zhu and T F La Porta, 2007, "Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks", IEEE Transactions on Mobile Computing, 6, (6), pp. 663-677
  • Patrick D McDaniel and Atul Prakash, 2006, "Enforcing provisioning and authorization policy in the Antigone system", Journal of Computer Security, 14, (6), pp. 483–511
  • Patrick D McDaniel and Atul Prakash, 2006, "Methods and limitations of security policy reconciliation", ACM Transactions on Information and System Security (TISSEC), 9, (3), pp. 259–291
  • Patrick D McDaniel, William Aiello, Kevin R. B. Butler and John Ioannidis, 2006, "Origin authentication in interdomain routing", Computer Networks, 50, (16), pp. 2953–2980
  • Matthew Pirretti, Sencun Zhu, Vijaykrishnan Narayanan, Patrick D McDaniel, Mahmut T Kandemir and Richard R. Brooks, 2006, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methodsof Defense", International Journal of Distributed Sensor Networks, 2, (3), pp. 267–287
  • Patrick D McDaniel and Aviel D. Rubin, 2005, "Web security", Computer Networks, 48, (5), pp. 697–699
  • Patrick D McDaniel and A Rubin, 2005, "Guest Editorial", Computer Networks, Special Issue on Web Security
  • S Byers, L Cranor, E Cronin, D Korman and Patrick D McDaniel, 2004, "Analysis of Security Vulnerabilities in the Movie Production and Distribution Process", Telecommunications Policy, 28, (8), pp. 619-644
  • E Cronin, S Jamin, T Malkin and Patrick D McDaniel, 2003, "Analysis of Security Vulnerabilities in the Movie Production and Distribution Process"
  • Ian Goodfellow, Patrick D McDaniel and Nicolas Papernot, , "The challenges of making machine learning robust against adversarial inputs", Communications of the ACM

Conference Proceedings

  • Giuseppe Petracca, Yuqiong Sun, Ahmad-Atamli Reineh, Jens Grossklags, Patrick Drew McDaniel Drew McDaniel and Trent Jaeger, 2019, "EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs"
  • Z. Berkay CelikMcDaniel, Gang Tan and Patrick Drew McDaniel Drew McDaniel, 2019, "IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT"
  • Matt Durbin, Ryan Sheatsley, Christopher Balbier, Tristan Grieve, Azaree Lintereur and Patrick D McDaniel, 2019, "Development of Machine Learning Algorithms for Directional Gamma Ray Detection"
  • Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Ryan Sheatsley, Patrick D McDaniel and A. Secuk Uluagac, 2019, "Curie: Policy-based Secure Data Exchange"
  • Z. Berkay Celik, Patrick D McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez and Ananthram Swami, 2018, "Detection Under Privileged Information"
  • Florian Tramer, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh and Patrick D McDaniel, 2018, "Ensemble Adversarial Training: Attacks and Defenses", International Conference on Learning Representations
  • Nicolas Papernot, Patrick D McDaniel, Arunesh Sinha and Michael Wellman, 2018, "Security and Privacy in Machine Learning", London, UK
  • Rauf Izmailov, Shridatt Sugrim, Ritu Chadha, Patrick D McDaniel and Ananthram Swami, 2018, "Enablers Of Adversarial Attacks in Machine Learning", 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), pp. 425-430
  • Dang Tu Nguyen, Chengyu Song, Zhiyun Qian, Srikanth V. Krishnamurthy, Colbert, Edward J. M. and Patrick D McDaniel, 2018, "IOTSAN: Fortifying the Safety of IoT Systems", CONEXT'18: PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES, pp. 191-203
  • Chun-Ming Lai, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, Felix Wu, Patrick D McDaniel and Hasan Cam, 2017, "Attacking Strategies and Temporal Analysis Involving Facebook Discussion Groups"
  • Yunfeng Hong, Yongjian Hu, Chun-Ming Lai, Felix Wu, Iulian Neamtiu, Yu Paul, Patrick D McDaniel, Hasan Cam and Gail-Joon Ahn, 2017, "Defining and Detecting Environment Discrimination in Android Apps"
  • Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes and Patrick D McDaniel, 2017, "Adversarial Examples for Malware Detection"
  • Vaibhav Rastogi, Drew Davidson, Lorenzo De Carli, Somesh Jha and Patrick D McDaniel, 2017, "Cimplifier: Automatically Debloating Containers", Paderborn, Germany
  • Nicolas Papernot, Patrick D McDaniel, Ian Goodfellow, Somesh Jha, Z. Berkay Celik and Ananthram Swami, 2017, "Practical Black-Box Attacks against Machine Learning"
  • Stefan Achleitner, Thomas La Porta, Trent R Jaeger and Patrick D McDaniel, 2017, "Adversarial Network Forensics in Software Defined Networking"
  • Berkay Celik, Patrick D McDaniel and Rauf Izmailov, 2017, "Feature Cultivation in Privileged Information-augmented Detection"
  • Stefan Achleitner, Thomas La Porta, Patrick D McDaniel, Srikanth V. Krishnamurthy, Alexander Poylisher and Constantin Serban, 2017, "Malicious Co-Residency on the Cloud: Attacks and Defense"
  • Z. Berkay Celik, David Lopez-Paz and Patrick D McDaniel, 2017, "Patient-Driven Privacy Control through Generalized Distillation"
  • Ahmed Fathy Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Patrick D McDaniel and Lisa Marvel, 2017, "Stealth Migration: Hiding Virtual Machines on the Network"
  • Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac and Patrick D McDaniel, 2017, "Achieving Secure and Differentially Private Computations in Multiparty Settings"
  • Nathaniel Lageman, Eric Kilmer, Robert J. Walls and Patrick D McDaniel, 2016, "BinDNN: Resilient Function Matching Using Deep Learning"
  • Michael Backes, ven Bugiel, Erik Derr, Patrick McDaniel Damien Octeau and Sebastian Weisgerber, 2016, "On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis"
  • Devin J. Pohly and Patrick D McDaniel, 2016, "Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols"
  • Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick D McDaniel and Matthew Smith, 2016, "SoK: Lessons Learned From Android Security Research For Appified Software Platforms", San Francisco, CA
  • Nicolas Papernot, Patrick D McDaniel, Xi Wu, Somesh Jha and Ananthram Swami, 2016, "Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks", San Francisco, CA
  • Chaz Lever, Robert Walls, Yacin Nadji, David Dagon, Patrick D McDaniel and Manos Antonakakis, 2016, "Domain-Z: 28 Registrations Later", San Francisco, CA
  • Charles J. Huber, Scott E. Brown, Patrick D McDaniel and Lisa M. Marvel, 2016, "Cyber Fighter Associate: A Decision Support System for Cyber Agility", Princeton, NJ
  • Z. Berkay Celik, Nan Hu, Yun Li, Nicolas Papernot, Patrick D McDaniel, Jeff Rowe, Robert Walls, Karl Levitt, Novella Bartolini, Thomas La Porta and Ritu Chadha, 2016, "Mapping Sample Scenarios to Operational Models"
  • Damien Octeau, Somesh Jha, Matthew Dering, Patrick D McDaniel, Alexandre Bartel, Li Li, Jacques Klein and Yves Le Traon, 2016, "Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-Component Analysis", St. Petersburg, Florida, USA
  • Nicolas Papernot, Patrick D McDaniel, Ananthram Swami and Richard Harang, 2016, "Crafting Adversarial Input Sequences for Recurrent Neural Networks"
  • Stefan Achleitner, Thomas La Porta, Patrick D McDaniel, Shridatt Sugrim, Srikanth Krishnamurthy and Ritu Chadha, 2016, "Cyber Deception: Virtual Networks to Defend Insider Reconnaissance"
  • Nicolas Papernot, Patrick D McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik and Ananthram Swami, 2016, "The Limitations of Deep Learning in Adversarial Settings", Saarbrucken, Germany
  • D. J. Pohly*, C. Sestito and Patrick D McDaniel, 2015, "Adaptive protocol switching using Dynamically Insertable Bumps in the stack", pp. 342-347
  • N. Papernot, Patrick D McDaniel and R. J. Walls, 2015, "Enforcing agile access control policies in relational databases using views", pp. 7-12
  • Z. Berkay Celik*, R. J. Walls, Patrick D McDaniel and A. Swami, 2015, "Malware traffic detection using tamper resistant features", pp. 330-335
  • A. Oltramari, L. F. Cranor, R. J. Walls and Patrick D McDaniel, 2015, "Computational ontology of network operations", pp. 318-323
  • A. Aqil, A. O. F. Atya, Trent R Jaeger, S. V. Krishnamurthy, K. Levitt, Patrick D McDaniel, J. Rowe and A. Swami, 2015, "Detection of stealthy TCP-based DoS attacks", pp. 348-353
  • Robert J. Walls, Eric D. Kilmer, Nathaniel Lageman and Patrick D McDaniel, 2015, "Measuring the Impact and Perception of Acceptable Advertisements", pp. 107–120
  • Li Li, Alexandre Bartel, Tegawendé F Bissyandé, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau and Patrick D McDaniel, 2015, "IccTA: Detecting Inter-Component Privacy Leaks in Android Apps"
  • Damien Octeau, Daniel Luchaup, Matthew Dering, Somesh Jha and Patrick D McDaniel, 2015, "Composite Constant Propagation: Application to Android Inter-Component Communication Analysis"
  • Daniel Krych, Stephen Lange-Maney, Patrick D McDaniel and William Glodek, 2015, "Investigating weaknesses in Android certificate security"
  • Jing (Dave) Tian, Kevin R. B. Butler, Patrick D McDaniel and Padma Krishnaswamy, 2015, "Securing ARP From the Ground Up", ACM, pp. 305–312
  • Patrick D McDaniel, 2015, "A New Science of Security Decision Making", pp. IS–13
  • Alessandro Oltramari, Lorrie Faith Cranor, Robert J. Walls and Patrick D McDaniel, 2014, "Building an Ontology of Cyber Security", pp. 6
  • Matthew Dering* and Patrick D McDaniel, 2014, "Android market reconstruction and analysis", pp. 300-305
  • Wenhui Hu*, Damien Octeau*, Patrick D McDaniel and Peng Liu, 2014, "Duet: library integrity verification for android applications", ACM, pp. 141–152
  • Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau* and Patrick D McDaniel, 2014, "FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps", pp. 29
  • Philip Koshy*, Diana Koshy* and Patrick D McDaniel, 2014, "An Analysis of Anonymity in Bitcoin Using P2P Network Traffic", Springer-Verlag LNCS, 8437, pp. 469–485
  • Stephen E. McLaughlin*, Saman A. Zonouz, Devin J. Pohly* and Patrick D McDaniel, 2014, "A Trusted Safety Verifier for Process Controller Code", The Internet Society, pp. 15
  • Damien Octeau*, Patrick D McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein and Yves Le Traon, 2013, "Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis", pp. 543–558
  • Devin J. Pohly*, Stephen E. McLaughlin*, Patrick D McDaniel and Kevin Butler*, 2012, "Hi-Fi: collecting high-fidelity whole-system provenance", pp. 259–268
  • Weining Yang, Ninghui Li, Yuan Qi, Wahbeh H. Qardaji, Stephen E. McLaughlin* and Patrick D McDaniel, 2012, "Minimizing private data disclosures in the smart grid", pp. 415–427
  • Damien Octeau*, Somesh Jha and Patrick D McDaniel, 2012, "Retargeting Android applications to Java bytecode", pp. 6
  • Stephen E. McLaughlin* and Patrick D McDaniel, 2012, "SABOT: specification-based payload generation for programmable logic controllers", pp. 439–449
  • Eun-Kyoung Kim, Patrick D McDaniel and Thomas F Laporta, 2012, "A Detection Mechanism for SMS Flooding Attacks in Cellular Networks", pp. 76–93
  • Thomas Moyer*, Trent R Jaeger and Patrick D McDaniel, 2012, "Scalable Integrity-Guaranteed AJAX", pp. 1–19
  • Stephen E. McLaughlin*, Patrick D McDaniel and William Aiello, 2011, "Protecting consumer privacy from electric load monitoring", pp. 87–98
  • William Enck*, Damien Octeau*, Patrick D McDaniel and Swarat Chaudhuri, 2011, "A Study of Android Application Security"
  • M Ongtang*, Joshua Schiffman, Thomas F Laporta, Patrick D McDaniel, Abhrajit Ghosh and F Anjum, 2010, "Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware", pp. 6
  • Kevin R. B. Butler*, Stephen E. McLaughlin* and Patrick D McDaniel, 2010, "Kells: a protection framework for portable data", pp. 231–240
  • Stephen E. McLaughlin*, Dmitry Podkuiko*, Sergei Miadzvezhanka*, Adam Delozier* and Patrick D McDaniel, 2010, "Multi-vendor penetration testing in the advanced metering infrastructure", pp. 107–116
  • Machigar Ongtang*, Kevin Butler* and Patrick D McDaniel, 2010, "Porscha: policy oriented secure content handling in Android", pp. 221–230
  • Kevin R. B. Butler*, Stephen E. McLaughlin* and Patrick D McDaniel, 2010, "Protecting portable storage with host validation", pp. 651–653
  • Joshua Schiffman, Thomas Moyer*, Hayawardh Vijayakumar, Trent R Jaeger and Patrick D McDaniel, 2010, "Seeding clouds with trust anchors", pp. 43–46
  • William Enck*, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol Sheth, 2010, "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones", pp. 393–407
  • Toby Ehrenkranz, Jun Li and Patrick D McDaniel, 2010, "Realizing a Source Authentic Internet", pp. 217–234
  • Stephen E. McLaughlin*, Dmitry Podkuiko*, Adam Delozier*, Sergei Miadzvezhanka* and Patrick D McDaniel, 2010, "Embedded Firmware Diversity for Smart Electric Meters"
  • Boniface Hicks*, Sandra Rueda Rodreguez, Dave King, Thomas Moyer*, Joshua Schiffman, Yogesh Sreenivasan, Patrick D McDaniel and Trent R Jaeger, 2010, "An architecture for enforcing end-to-end access control over web applications", pp. 163–172
  • Kevin R. B. Butler*, Stephen E. McLaughlin* and Patrick D McDaniel, 2010, "Disk-enabled authenticated encryption", pp. 1–6
  • Patrick D McDaniel, Kevin R. B. Butler*, Stephen E. McLaughlin*, Erez Zadok, Radu Sion and Marianne Winslett, 2010, "Towards a Secure and Efficient System for End-to-End Provenance", pp. 5
  • Thomas Moyer*, Kevin R. B. Butler*, Joshua Schiffman, Patrick D McDaniel and Trent R Jaeger, 2009, "Scalable Web Content Attestation", pp. 95–104
  • Machigar Ongtang, Stephen E. McLaughlin, William Enck and Patrick D McDaniel, 2009, "Semantically Rich Application-Centric Security in Android", pp. 340–349
  • J. Schiffman, T. Moyer*, C. Shal, Trent R Jaeger and Patrick D McDaniel, 2009, "Justifying Integrity Using a Virtual Machine Verifier", pp. 83-92
  • T. La Porta, Patrick D McDaniel, K. Rauscher and J. Shu, 2009, "The Impact of Supply Chain on Information and Communications Technology Security", pp. 7
  • Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent R Jaeger, Thomas F Laporta and Patrick D McDaniel, 2009, "On cellular botnets: measuring the impact of malicious devices ona cellular network core", pp. 223–234
  • William Enck, Machigar Ongtang and Patrick D McDaniel, 2009, "On lightweight mobile phone application certification", pp. 235–245
  • Stephen E. McLaughlin, Dmitry Podkuiko and Patrick D McDaniel, 2009, "Energy Theft in the Advanced Metering Infrastructure", pp. 176–187
  • Matt Blaze and Patrick D McDaniel, 2009, "Below the Salt: The Dangers of Unfulfilled Physical Media Assumptions", pp. 24–27
  • William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick D McDaniel and Adam D Smith, 2008, "Defending Against Attacks on Main Memory Persistence", pp. 65–74
  • William Enck, Patrick D McDaniel and Trent R Jaeger, 2008, "PinUP: Pinning User Files to Known Applications", pp. 55–64
  • Kevin R. B. Butler, Stephen E. McLaughlin and Patrick D McDaniel, 2008, "Rootkit-resistant disks", pp. 403–416
  • Kevin R. B. Butler, William Enck, Harri Hursti, Stephen E. McLaughlin, Patrick Traynor and Patrick D McDaniel, 2008, "Systemic Issues in the Hart InterCivic and Premier Voting Systems:Reflections on Project EVEREST"
  • Patrick Traynor, Kevin R. B. Butler, William Enck and Patrick D McDaniel, 2008, "Realizing Massive-Scale Conditional Access Systems Through Attribute-BasedCryptosystems"
  • Dhananjay Bapat, Kevin R. B. Butler and Patrick D McDaniel, 2007, "Towards Automated Privilege Separation", pp. 272–276
  • Boniface Hicks, Tim Misiak and Patrick D McDaniel, 2007, "Channels: Runtime System Infrastructure for Security-Typed Languages", pp. 443–452
  • Luke St. Clair, Joshua Schiffman, Trent R Jaeger and Patrick D McDaniel, 2007, "Establishing and Sustaining System Integrity via Root of Trust Installation", pp. 19–29
  • Kevin R. B. Butler, Stephen E. McLaughlin and Patrick D McDaniel, 2007, "Non-volatile memory and disks: avenues for policy architectures", pp. 77–84
  • P Traynor, Patrick D McDaniel and T F La Porta, 2007, "On Attack Causality in Internet-Connected Cellular Networks", pp. 307-322
  • Lisa Johansen, Michael Rowell, Kevin R. B. Butler and Patrick D McDaniel, 2007, "Email Communities of Interest"
  • Anusha Sriraman, Kevin R. B. Butler, Patrick D McDaniel and Padma Raghavan, 2007, "Analysis of the IPv4 Address Space Delegation Structure", pp. 501–508
  • Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent R Jaeger and Patrick D McDaniel, 2007, "A logical specification and analysis for SELinux MLS policy", pp. 91–100
  • William Enck, Patrick D McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert G. Greenberg, Sanjay G. Rao and William Aiello, 2007, "Configuration Management at Massive Scale: System Design and Experience", pp. 73–86
  • Boniface Hicks, Sandra Rueda, Trent R Jaeger and Patrick D McDaniel, 2007, "From Trusted to Secure: Building and Executing Applications That EnforceSystem Security", pp. 205–218
  • Boniface Hicks, Dave King and Patrick D McDaniel, 2007, "Jifclipse: development tools for security-typed languages", pp. 1–10
  • Heesook Choi, Thomas F Laporta and Patrick D McDaniel, 2007, "Privacy Preserving Communication in MANETs", pp. 233–242
  • William Enck, Sandra Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent R Jaeger and Patrick D McDaniel, 2007, "Protecting users from "themselves"", pp. 29–36
  • Sophie Y. Qiu, Patrick D McDaniel and Fabian Monrose, 2007, "Toward Valley-Free Inter-domain Routing", pp. 2009–2016
  • H. Rowaihy, W. Enck, Patrick D McDaniel and T. F. LaPorta, 2007, "Limiting Sybil Attacks in Structured Peer-to-Peer Networks", Proceedings of the Twenty-Sixth Annual IEEE Conference on Computer Communications (INFOCOM 2007) Mini-Symposium on Security, Streaming, and Overlays, pp. 2596-2600
  • Sunam Ryu, Kevin R. B. Butler, Patrick Traynor and Patrick D McDaniel, 2007, "Leveraging Identity-Based Cryptography for Node ID Assignment inStructured P2P Systems", 1, pp. 519–524
  • Hosam Rowaihy, William Enck, Patrick D McDaniel and Thomas F Laporta, 2007, "Limiting Sybil Attacks in Structured P2P Networks", pp. 2596–2600
  • B Hicks, S Rueda, T Jaeger and Patrick D McDaniel, 2007, "Integration of SELinux and Security-typed Languages"
  • , 2007, "CEAS 2007 - The Fourth Conference on Email and Anti-Spam, 2-3 August 2007, Mountain View, California, USA"
  • Boniface Hicks, Kiyan Ahmadizadeh and Patrick D McDaniel, 2006, "From Languages to Systems: Understanding Practical Application Developmentin Security-typed Languages", pp. 153–164
  • Patrick Traynor, Kevin R. B. Butler, William Enck, Jennifer N Plasterr, S Weaver, J van Bremer and Patrick D McDaniel, 2006, "Privacy Preserving Web-Based Email", pp. 116–131
  • Matthew Pirretti, Patrick Traynor, Patrick D McDaniel and Brent Waters, 2006, "Secure attribute-based systems", pp. 99–112
  • Kevin R. B. Butler, William Aiello and Patrick D McDaniel, 2006, "Optimizing BGP security by exploiting path stability", pp. 298–310
  • Shiva Chaitanya, Kevin R. B. Butler, Anand Sivasubramaniam, Patrick D McDaniel and Murali Vilayannur, 2006, "Design, implementation and evaluation of security in iSCSI-based networkstorage systems", pp. 17–28
  • Patrick Traynor, William Enck, Patrick D McDaniel and Thomas F Laporta, 2006, "Mitigating attacks on open functionality in SMS-capable cellular networks", pp. 182–193
  • Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks and Patrick D McDaniel, 2006, "Non-Invasive Methods for Host Certification", pp. 1–10
  • Trent R Jaeger, Patrick D McDaniel, Luke St. Clair, Ramón Cáceres and Reiner Sailer, 2006, "Shame on Trust in Distributed Systems", pp. 19-24
  • Boniface Hicks, Dave King, Patrick D McDaniel and Michael Hicks, 2006, "Trusted declassification: : high-level policy for a security-typedlanguage", pp. 65–74
  • Sophie Y. Qiu, Patrick D McDaniel, Fabian Monrose and Aviel D. Rubin, 2006, "Characterizing Address Use Structure and Stability of Origin Advertisementin Inter-domain Routing", pp. 489–496
  • , 2006, "Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings", Springer, 4332
  • Patrick D McDaniel, Subhabrata Sen, Oliver Spatscheck, Jacobus E. van der Merwe, William Aiello and Charles R. Kalmanek, 2006, "Enterprise Security: A Community of Interest Based Approach", pp. 123-137
  • L St. Clair, L Johansen, W Enck, M Pirretti, P Traynor, Patrick D McDaniel and T Jaeger, 2006, "Password Exhaustion: Predicting the End of Password Usefulness", pp. 37-55
  • Patrick D McDaniel, K Butler and S Qiu, 2006, "Testing Large Scale BGP Security in Replayable Network Environments"
  • K Butler, Patrick D McDaniel and S Qiu, 2006, "BGPRV: A Library for Fast and Efficient Routing Data Manipulation"
  • Wesam Lootah, William Enck and Patrick D McDaniel, 2005, "TARP: Ticket-based Address Resolution Protocol", pp. 95-103
  • Kevin R. B. Butler and Patrick D McDaniel, 2005, "Understanding Mutable Internet Pathogens, or How I Learned to StopWorrying and Love Parasitic Behavior", Springer-Verlag LNCS, 3803, (1), pp. 36–48
  • William Enck, Patrick Traynor, Patrick D McDaniel and Thomas F Laporta, 2005, "Exploiting open functionality in SMS-capable cellular networks", pp. 393–404
  • Louis Kruger, Somesh Jha and Patrick D McDaniel, 2005, "Privacy Preserving Clustering", Springer-Verlag LNCS, 3679, (1), pp. 397–417
  • Heesook Choi, William Enck, Jaesheung Shin, Patrick D McDaniel and Thomas F Laporta, 2005, "Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks", pp. 12–21
  • William Aiello, Charles R. Kalmanek, Patrick D McDaniel, Subhabrata Sen, Oliver Spatscheck and Jacobus E. van der Merwe, 2005, "Analysis of Communities of Interest in Data Networks", Springer-Verlag LNCS, 3431, (1), pp. 83–96
  • Ali Al-Lawati, Dongwon Lee and Patrick D McDaniel, 2005, "Blocking-aware private record linkage", pp. 59–68
  • , 2005, "Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings", Springer, 3679
  • , 2005, "Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings", Springer, 3803
  • , 2005, "IQIS 2005, International Workshop on Information Quality in Information Systems, 17 June 2005, Baltimore, Maryland, USA (SIGMOD 2005 Workshop)", ACM
  • , 2005, "Passive and Active Network Measurement, 6th International Workshop, PAM 2005, Boston, MA, USA, March 31 - April 1, 2005, Proceedings", Springer, 3431
  • , 2005, "Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers", Springer, 3424
  • , 2005, "Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005", ACM
  • , 2005, "Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005", USENIX Association
  • M Pirretti, S Zhu, N Vijaykrishnan, Patrick D McDaniel, M Kandemir and R Brooks, 2005, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense"
  • A Al-Lawati, D Lee and Patrick D McDaniel, 2005, "Blocking in Private Information Matching", 59-68
  • Hao Wang, Somesh Jha, Patrick D McDaniel and Miron Livny, 2004, "Security Policy Reconciliation in Distributed Computing Environments", pp. 137-148
  • Simon Byers, Lorrie Faith Cranor, David P. Kormann and Patrick D McDaniel, 2004, "Searching for Privacy: Design and Implementation of a P3P-EnabledSearch Engine", pp. 314–328
  • , 2004, "Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004", ACM
  • S Byers, L F Cranor, E Cronin, D Korman and Patrick D McDaniel, 2004, "Exposing Digital Content Piracy: Approaches, Issues and Experiences"
  • Eric Cronin, Sugih Jamin, Tal Malkin and Patrick D McDaniel, 2003, "On the performance, feasibility, and use of forward-secure signatures", pp. 131–144
  • William Aiello, John Ioannidis and Patrick D McDaniel, 2003, "Origin authentication in interdomain routing", pp. 165–178
  • Simon Byers, Lorrie Faith Cranor, Eric Cronin, David P. Kormann and Patrick D McDaniel, 2003, "Analysis of security vulnerabilities in the movie production and distribution process", pp. 1–12
  • Patrick D McDaniel, 2003, "On context in authorization policy", pp. 80–89
  • Patrick D McDaniel and Atul Prakash, 2003, "A Flexible Architecture for Security Policy Enforcement", pp. 234–239
  • Jim Irrer, Atul Prakash and Patrick D McDaniel, 2003, "Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System", pp. 44–46
  • Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick D McDaniel and Aviel D. Rubin, 2003, "Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing", pp. 75-85
  • Patrick D McDaniel and Atul Prakash, 2002, "Methods and Limitations of Security Policy Reconciliation", pp. 73–87
  • Hugh Harney, Andrea Colgrove and Patrick D McDaniel, 2001, "Principles of Policy in Secure Groups"
  • Patrick D McDaniel, A Prakash, J Irrer, S Mittal and T Thuang, 2001, "Flexibly Constructing Secure Groups in Antigone 2.0", pp. 55-67
  • Patrick D McDaniel and Sugih Jamin, 2000, "Windowed Certificate Revocation", pp. 1406–1414
  • Patrick D McDaniel and Aviel D. Rubin, 2000, "A Response to "Can We Eliminate Certificate Revocation Lists?"", pp. 245–258
  • William A. Adamson, Charles J. Antonelli, Kevin Coffman, Patrick D McDaniel and Jim Rees, 1999, "Secure Distributed Virtual Conferencing", pp. 176–190
  • Patrick D McDaniel, Atul Prakash and Peter Honeyman, 1999, "Antigone: A Flexible Framework for Secure Group Communication", pp. 99-114
  • Patrick D McDaniel, Z Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksuta and Gang Tan, , "Sensitive Information Tracking in Commodity IoT"
  • Patrick D McDaniel, Sayed M Saghaian, Thomas F Laporta, Trent R Jaeger and Z Berkay Celik, , "Mission-oriented Security Model, Incorporating Security Risk, Cost and Payout"
  • Patrick D McDaniel, Z Berkay Celik and Gang Tan, , "Automated IoT Safety and Security Analysis"
  • Patrick D McDaniel, Z Berkay Celik, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez and Ananthram Swami, , "Detection under Privileged Information"
  • Patrick D McDaniel, Nicolas Papernot, Arunesh Sinha, Michael Wellman, and , , , "Security and Privacy in Machine Learning"
  • Patrick D McDaniel and Z Berkay Celik, , "Extending Detection with Privileged Information via Generalized Distillation"

Technical Reports

  • Ryan Sheatsley, Nicolas Papernot, Mike Weisman, Gunjun Verma and Patrick D McDaniel, 2019, "Adversarial Examples in Constrained Domains."
  • Patrick D McDaniel, 2019, "Artificial Intelligence and Cybersecurity: Opportunities and Challenges 2019 Technical Workshop Report”"
  • Patrick D McDaniel, 2018, "A Vision Toward an Internet of Battlefield Things (IoBT): Autonomous Classifying Sensor Network"
  • Nicolas Papernot, Ian Goodfellow, Ryan Sheatsley, Reuben Feinman and Patrick D McDaniel, 2016, "cleverhans v1.0.0: an adversarial machine learning library", (arXiv:1610.00768)
  • Devin J. Pohly and Patrick D McDaniel, 2016, "Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols", (NAS-TR-0188-2016)
  • Nicolas Papernot, Patrick D McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik* and Ananthram Swami, 2015, "The Limitations of Deep Learning in Adversarial Settings"
  • Wenhui Hu*, Damien Octeau*, Patrick D McDaniel and Peng Liu, 2014, "Duet: library integrity verification for android applications"
  • Devin J. Pohly*, Stephen E. McLaughlin*, Patrick D McDaniel and Kevin Butler*, 2012, "Hi-Fi: collecting high-fidelity whole-system provenance"
  • D. Octeau*, S. Jha and Patrick D McDaniel, 2011, "Retargeting Android Applications to Java Bytecode"
  • S. McLaughlin* and Patrick D McDaniel, 2011, "Protecting Consumer Privacy from Electric Load Monitoring"
  • Stephen E. McLaughlin*, Dmitry Podkuiko*, Adam Delozier*, Sergei Miadzvezhanka* and Patrick D McDaniel, 2010, "Multi-vendor penetration testing in the advanced metering infrastructure"
  • William Enck* and Patrick D McDaniel, 2010, "Federated Information Flow Control for Mobile Phones"
  • Joshua Schiffman, Thomas Moyer*, Hayawardh Vijayakumar, Trent R Jaeger and Patrick D McDaniel, 2010, "Seeding clouds with trust anchors"

Other

  • Patrick D McDaniel, 2019, "Artificial Intellegence and Cybersecurity: Opportunities and Challenges 2019"
  • Patrick D McDaniel, K. Butler, W. Enck, H. Hursti, S. McLaughlin, P. Traynor, M. Blaze, A. Aviv, P. Cerny, S. Clark, E. Cronin, G. Shah, M. Sherr, G. Vigna, R. Kemmerer, D. Balzarotti, G. Banks, M. Cova, V. Felmetsger, W. Robertson, F. Valeur, J. Lorenzo Hall and L. Quilter, 2007, "EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing", pp. 350
  • T Jaeger, Patrick D McDaniel, L St. Clair, R Caceres and R Sailer, 2006, "Shame on Trust in Distributed Systems"
  • Patrick D McDaniel, Florian Tramer, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow and Dan Boneh, , "Ensemble Adversarial Training: Attacks and Defenses"

Research Projects

Honors and Awards

Service

Service to Penn State:

Service to External Organizations: