.

Books

P. Traynor, P. McDaniel and T. La Porta, Security for Telecommunications Networks. Springer, Series: Advances in Information Security, August, 2008. ISBN: 978-0-387-72441-6. (Amazon)

Book Chapters

Andrew Harris, Frank S. Park, Seymour Goodman and P. Traynor, Emerging Privacy and Security Concerns for Digital Wallet Deployment, Privacy in America: Interdisciplinary Perspectives, Scarecrow Press, July 2011, Editors: William Aspray and Philip Doty.

K. Butler, W. Enck, P. Traynor, J. Plasterr and P. McDaniel. Privacy Preserving Web-Based Email, Algorithms, Architectures and Information Systems Security, Statistical Science and Interdisciplinary Research, World Scientific Computing. November 2008. Editors: Bhargab Bhattacharya, Susmita Sur-Kolay, Subhas Nandy and Aditya Bagchi.

Journals

A. Bates, K. Butler, M. Sherr, C. Shields, P. Traynor, and D. Wallach, Accountable Wiretapping -or- I Know They Can Hear You Now, Journal of Computer Security (JCS), To Appear 2014.

H. Carter, C. Amrutkar, I. Dacosta and P. Traynor, For Your Phone Only: Custom Protocols for Efficient Secure Function Evaluation on Mobile Devices, Journal of Security and Communication Networks (SCN), To Appear 2014.

C. Amrutkar, P. Traynor and P. van Oorschot, An Empirical Evaluation of Security Indicators in Mobile Web Browsers, IEEE Transactions on Mobile Computing (TMC), To Appear 2014.

A. Harris, S. Goodman, and P. Traynor. Privacy and Security Concerns Associated with Mobile Money Applications in Africa, Washington Journal of Law, Technology & Arts, 8(3), 2013.

I. Dacosta, S. Chakradeo, M. Ahamad, and P. Traynor. One-Time Cookies: Preventing Session Hijacking Attacks with Stateless Authentication Tokens, ACM Transactions on Internet Technology (TOIT), 12(1), 2012.

C. Shi, X. Luo, P. Traynor, M. Ammar, and E. Zegura. ARDEN: Anonymous netwoRking in Delay tolErant Networks, Journal of Ad Hoc Networks, 10(6):918-930, 2012.

P. Traynor, Characterizing the Security Implications of Third-Party EAS Over Cellular Text Messaging Services, IEEE Transactions on Mobile Computing (TMC), 11(6):983-994, 2012.

I. Dacosta, V. Balasubramaniyan, M. Ahamad and P. Traynor, Improving Authentication Performance of Distributed SIP Proxies, IEEE Transactions on Parallel and Distributed Systems (TPDS), 22(11):1804 - 1812, November 2011.

P. Traynor, C. Amrutkar, V. Rao, T. Jaeger, P. McDaniel and T. La Porta, From Mobile Phones to Responsible Devices, Journal of Security and Communication Networks (SCN), 4(6):719-726, June 2011.

M. Pirretti, P. Traynor, P. McDaniel and B. Waters, Secure Attribute-Based Systems, Journal of Computer Security (JCS), 18(5):799-837, 2010.

P. Traynor, K. Butler, W. Enck, K. Borders and P. McDaniel, malnets: Large-Scale Malicious Networks via Compromised Wireless Access Points, Journal of Security and Communication Networks (SCN), 3(2):102-113, 2010.

P. Traynor, Securing Cellular Infrastructure: Challenges and Opportunities, IEEE Security & Privacy Magazine, 7(4):77-79, July/August, 2009. (pdf)

K. Butler, S. Ryu, P. Traynor and P. McDaniel, Leveraging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems, IEEE Transactions on Parallel and Distributed Systems (TPDS), 20(11):1-1, 2009. (pdf)

P. Traynor, W. Enck, P. McDaniel and T. La Porta, Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks, IEEE/ACM Transactions on Networking (TON), 17(1):40-53, 2009. (pdf)

P. Traynor, M. Chien, S. Weaver, B. Hicks, P. McDaniel, Non-Invasive Methods for Host Certification, ACM Transactions on Information and System Security (TISSEC), 11(3):1-23, 2008. (pdf)

P. Traynor, W. Enck, P. McDaniel and T. La Porta, Exploiting Open Functionality in SMS-Capable Cellular Networks, Journal of Computer Security (JCS), 16(6):713-742, 2008. (pdf)

P. Traynor, R. Kumar, H. Choi, G. Cao, S. Zhu and T. La Porta, Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks, IEEE Transactions on Mobile Computing (TMC), 6(6): 663-677, June 2007. (pdf)

Conferences

H. Carter, B. Mood, P. Traynor and K. Butler. Secure Outsourced Garbled Circuit Evaluation for Mobile Devices, In Proceedings of the USENIX Security Symposium (SECURITY), 2013. (acceptance rate: 16.2%) (pdf)

C. Amrutkar, M. Hiltunen, T. Jim, K. Joshi, O. Spatscheck, P. Traynor and S. Venkataraman, Why is My Smartphone Slow? On The Fly Diagnosis of Poor Performance on the Mobile Internet, Proceedings of The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013. (acceptance Rate: 19.6%) (pdf)

S. Chakradeo, B. Reaves, P. Traynor and W. Enck, MAST: Triage for Market-scale Mobile Malware Analysis, In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2013. (acceptance Rate: 15.0%) (pdf) (best paper)

C. Lever, M. Antonakakis, B. Reaves, P. Traynor and W Lee. The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers, In Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS), 2013. (acceptance rate: 18.8%) (pdf)

C. Amrutkar, K. Singh, A. Verma and P. Traynor, VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security, In Proceedings of the International Conference on Information Systems Security (ICISS), 2012. (acceptance rate: 25%) (pdf)

C. Amrutkar, P. Traynor and P. van Oorschot, Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road?, In Proceedings of the Information Security Conference (ISC), 2012. (acceptance rate: 32%) (pdf) (best student paper)

I. Dacosta, M. Ahamad and P. Traynor, Trust No One Else: Detecting MITM Attacks Against SSL/TLS Without Third-Parties, In Proceedings of the European Symposium on Research in Computer Security (ESORICS), 2012. (acceptance rate: 20.2%) (pdf)

A. Bates, K. Butler, M. Sherr, C. Shields, P. Traynor, and D. Wallach, Accountable Wiretapping -or- I Know They Can Hear You Now, In Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS), 2012. (acceptance rate: 17.8%) (pdf)

Y. Nadji, J. Giffin and P. Traynor, Automated Remote Repair for Mobile Malware, Proceedings of the Annual Computer Security Applications Conference (ACSAC), December 2011. (acceptance rate: 18.5%) (pdf)

N. Nipane, I. Dacosta and P. Traynor "Mix-In-Place" Anonymous Networking Using Secure Function Evaluation, Proceedings of the Annual Computer Security Applications Conference (ACSAC), December 2011. (acceptance rate: 18.5%) (pdf)

P. Marquardt, A. Verma, H. Carter and P. Traynor, (sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers, Proceedings of the ACM Conference on Computer and Communications Security (CCS), October, 2011. (acceptance rate: 13.9%) (pdf)

P. Marquardt, D. Dagon and P. Traynor, Impeding Individual User Profiling in Shopper Loyalty Programs, Proceedings of the International Conference on Financial Cryptography and Data Security (FC), February, 2011. (acceptance rate: 35.1%) (pdf)

D. Dewey and P. Traynor, No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects, Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS), February, 2011. (acceptance rate: 20.1%) (pdf)

V. Balasubramaniyan, A. Poonawalla, M. Ahamad, M. Hunter and P. Traynor, PinDr0p: Using Single-Ended Audio Features to Determine Call Provenance, Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2010. (pdf) (acceptance rate: 17.2%)

P. Traynor, J. Schiffman, T. La Porta, P. McDaniel and A. Ghosh, Constructing Secure Localization Systems with Adjustable Granularity, Proceedings of the IEEE Global Communications Conference (GLOBECOM), December 2010. (acceptance rate: 35.6%)

P. Traynor, Characterizing the Security Implications of Third-Party EAS Over Cellular Text Messaging Services, Proceedings of the IEEE International Conference on Security and Privacy in Communication Networks (SecureComm), September 2010. (pdf) (acceptance rate: 25.0%)

K. Singh, S. Sangal, N. Jain, P. Traynor and W. Lee, Evaluating Bluetooth as a Medium for Botnet Command and Control, Proceedings of the International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA), 2010. (pdf) (acceptance rate: 30%)

I. Dacosta and P. Traynor, Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks, Proceedings of the USENIX Annual Technical Conference (ATC), 2010. (pdf) (acceptance rate: 17.0%)

F. Park, C. Gangakhedkar and P. Traynor, Leveraging Cellular Infrastructure to Improve Fraud Prevention, Proceedings of the Annual Computer Security Applications Conference (ACSAC), December 2009. (pdf) (acceptance rate: 19.0%)

P. Traynor, M. Lin, M. Ongtang, V. Rao, T. Jaeger, T. La Porta and P. McDaniel, On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core, Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2009. (pdf) (acceptance rate: 18.4%)

B. Dolan-Gavitt, A. Srivastava, P. Traynor and J. Giffin, Robust Signatures for Kernel Data Structures, Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2009. (pdf) (acceptance rate: 18.4%)

I. Dacosta, V. Balasubramaniyan, M. Ahamad and P. Traynor, Improving Authentication Performance of Distributed SIP Proxies, Proceedings of the Conference on Principles, Systems and Applications of IP Telecommunications (IPTComm), July, 2009. (pdf) (acceptance rate: 43%)

P. Traynor, K. Butler, W. Enck and P. McDaniel, Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems, ISOC Network & Distributed System Security Symposium (NDSS), February, 2008. (pdf) (acceptance rate: 17.7%)

P. Traynor, P. McDaniel and T. La Porta, On Attack Causality in Internet-Connected Cellular Networks, USENIX Security Symposium (SECURITY), August, 2007. (pdf) (acceptance rate: 12.3%)

S. Ryu, K. Butler, P. Traynor and P. McDaniel, Leveraging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems, IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS), May, 2007. (acceptance rate: 40%)

L. St. Clair, L. Johansen, W. Enck, M. Pirretti, P. Traynor, P. McDaniel and T. Jaeger, Password Exhaustion: Predicting the End of Password Usefulness, International Conference on Information Systems Security (ICISS), December, 2006. (pdf) (Invited paper)

K. Butler, W. Enck, J. Plasterr, P. Traynor and P. McDaniel, Privacy-Preserving Web-Based Email, International Conference on Information Systems Security (ICISS), December, 2006. (pdf) (acceptance rate: 30.4%)

M. Pirretti, P. Traynor, P. McDaniel and B. Waters, Secure Attribute-Based Systems, Proceedings of the Thirteenth ACM Conference on Computer and Communications Security (CCS), November 2006. (pdf) (acceptance rate: 14.8%)

P. Traynor, W. Enck, P. McDaniel and T. La Porta, Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks, Proceedings of the Twelfth Annual ACM International Conference on Mobile Computing and Networking (MobiCom), September 2006. (pdf)
(acceptance rate: 11.7%)

P. Traynor, M. Chien, S. Weaver, B. Hicks, P. McDaniel, Non-Invasive Methods for Host Certification, Proceedings of the Second IEEE International Conference on Security and Privacy in Communication Networks (SecureComm), August 2006. (pdf) (acceptance rate: 25.4%)

P. Traynor, J. Shin, B. Madan, S. Phoha, T. La Porta, Efficient Group Mobility for Heterogeneous Sensor Networks, Proceedings of the IEEE Vehicular Technology Conference (VTC Fall), September 2006. (pdf) (acceptance rate: 58%)

P. Traynor, R. Kumar, H. Bin Saad, G. Cao and T. La Porta, LIGER: Implementing Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks, Proceedings of the ACM/USENIX Fourth International Conference on Mobile Systems Applications and Services (MobiSys), June 2006. (pdf) (acceptance rate: 15.4%)

P. Traynor, G. Cao and T. La Porta, The Effects of Probabilistic Key Management on Secure Routing in Sensor Networks, Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), April 2006. (pdf) (acceptance rate: 38.8%)

P. Traynor, H. Choi, G. Cao, S. Zhu and T. La Porta, Establishing Pair-Wise Keys in Heterogeneous Sensor Networks, Proceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM), April 2006. (pdf) (acceptance rate: 18%)

W. Enck, P. Traynor, P. McDaniel and T. La Porta, Exploiting Open Functionality in SMS-Capable Cellular Networks, Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS), November 2005. (pdf) (acceptance rate: 15%)

Workshops

C. Amrutkar and P. Traynor, Rethinking Permissions for Mobile Web Apps: Barriers and the Road Ahead, Proceedings of the ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2012.

N. Lawrence and P. Traynor, Under New Management: Practical Attacks on SNMPv3, Proceedings of the USENIX Workshop on Offensive Technologies (WOOT '12), 2012.

A. Harris, F. Park, S. Goodman and P. Traynor, Emerging Privacy Concerns for Digital Wallet Deployment, Proceedings of the Workshop on Making Privacy in America, December, 2009.

P. Traynor, Privacy and Security Concerns for Personal and Mobile Health Devices, Proceedings of the Workshop to Set A Research Agenda for Privacy and Security of Healthcare Technologies, October, 2009.

K. Butler, W. Enck, H. Hursti, S. McLaughlin, P. Traynor and P. McDaniel, Systemic Issues in the Hart InterCivic and Premier Voting System: Reflections Following Project EVEREST, Proceedings of the USENIX/ACCURATE Electronic Voting Technology (EVT) Workshop, July, 2008.

Technical Reports

Patrick Traynor, Characterizing the Limitations of Third-Party EAS Over Cellular Text Messaging Services, 3G Americas Whitepaper, September, 2008.

Lisa Johansen, Kevin Butler, William Enck, Patrick Traynor, and Patrick McDaniel. Grains of SANs: Building Storage Area Networks from Memory Spots Technical Report NAS-TR-0060-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, January 2007.

Kevin Butler, William Enck, Harri Hursti, Stephen McLaughlin, Patrick Traynor, and Patrick McDaniel. Systemic Issues in the Premier Voting System: Reflections Following Project EVEREST Technical Report NAS-TR-0087-2008, Networking and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, April 2008.

Kevin Butler, William Enck, Harri Hursti, Stephen McLaughlin, Patrick Traynor, and Patrick McDaniel. Systemic Issues in the Hart InterCivic System: Reflections Following Project EVEREST Technical Report NAS-TR-0088-2008, Networking and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, April 2008.

Invited Talks

Analyzing Malicious Traffic in Cellular Networks, GSM Association's (GSMA) Mobile Malware Community Workshop, Mountain View, CA, July 2013.

Threats to Mobile Devices, US Federal Trade Commission (FTC), Washington D.C., June 2013.

Chasing Telephony Security: Where the Wild Things... Are?, University of Wisconsin Security Seminar, March 2013. Madison, WI.

The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers, Centre for Secure Information Technologies (CSIT), Queen's University, Belfast, Northern Ireland, March 2013.

Chasing Telephony Security: Where the Wild Things... Are?, Stanford Security Seminar, March 2013. Stanford, CA.

Chasing Telephony Security: Where the Wild Things... Are?, University of California, Berkeley, Security Group, March 2013, Berkeley, CA.

Chasing Telephony Security: Where the Wild Things... Are?, Carnegie Mellon University CyLab Seminar, February 2013. Pittsburgh, PA.

Chasing Telephony Security: Where the Wild Things... Are?, University of Oregon Department of Computer Science Colloquium, November 2012. Eugene, OR.

Chasing Telephony Security: Where the Wild Things... Are?, University of Washington Department of Electrical Engineering, Network Security Lab (NSL): Invited Talk, November 2012. Seattle, WA.

Needles and Haystacks: Digging for Ground Truth on Mobile Malware, ZISC Workshop on Secure Mobile and Cloud Computing, ETH Zurich, Zurich, Switzerland, June 2012.

Advice from Early Career Faculty, CRA Career Mentoring Workshop, Invited Panelist, February 2012, Washington, D.C.

Research Challenges in Cellular and Mobile Network Security, US-China Software Workshop (Co-Sponsored by NSF and NSFC), September 2011, Beijing, China.

Mobile Security: Understanding Risks to Critical Infrastructure, US Department of State East African Workshop on Cyberspace Security, July 2011. Nairobi, Kenya.

Tomorrows Issues: Solving the Mobile Security Threat, Centre for Secure Information Technologies (CSIT), Queen's University, Belfast, Northern Ireland, March 2011.

PinDr0p: Using Single-Ended Audio Features to Determine Call Provenance MITRE Corporation, Burlington, MA, March 2011.

Defeating Session Hijacking Attacks with Disposable Web Credentials Facebook, Palo Alto, CA, February 2011.

Understanding the Disruptive Potential of Malware in Cellular Networks Invited Talk: RSA Conference, San Francisco, CA, February 2011.

Voice Security - Now Just a False Sense of Security and Privacy Invited Panelist: Mobile Security Symposium, San Francisco, CA, February 2011.

Understanding the Disruptive Potential of Malware in Cellular Networks Invited Speaker, Concordia University, Montreal, QC, Canada, May 2010.

Characterizing the Impact of Rigidity on the Security of Cellular Networks Qualcomm Research, San Diego, CA, March 2010.

Privacy and Security Concerns for Personal and Mobile Health Devices Workshop to Set A Research Agenda for Privacy and Security of Healthcare Technologies, Indianapolis, Indiana, October 2009.

Considerations for EAS Over Cellular Text Messaging Services 3G Americas Webinar, Invited Speaker, July 2009.

The Evolving Mobile Landscape: Emerging Security Threats Mobile Security eConference, Invited Speaker, SC Magazine, June 2008.

Characterizing the Impact of Rigidity on the Security of Cellular Networks University of Washington, Seattle, WA, February 2009.

Characterizing the Impact of Rigidity on the Security of Cellular Networks Microsoft Research, Redmond, WA, February 2009.

Next Year's Problems, Secure Computing (SC) Magazine Webinar, November 2008. (Audio)

Can you DoS me now? Security Issues in Cellular Networks Georgia Institute of Technology, Atlanta, GA, September 2008.

Characterizing the Impact of Rigidity on the Security of Cellular Networks Georgia Institute of Technology, Atlanta, GA, April 2008.

Characterizing the Impact of Rigidity on the Security of Cellular Networks AT&T Labs - Research, Florham Park, NJ, April 2008.

Characterizing the Impact of Rigidity on the Security of Cellular Networks The University of Arizona, Tucson, AZ, March 2008.

Cellular Networks Security Panel USENIX Security Symposium, Boston, MA, August 2007.

malnets:Large-Scale Malicious Networks via Compromised Access Points The Pennsylvania State University - ACM Club Invited Speaker, October 2006.

malnets: Large-Scale Malicious Networks via Compromised Access Points The University of Michigan, Ann Arbor, MI, October 2006.

Exploiting Open Functionality in SMS-Capable Cellular Networks The University of Michigan, Ann Arbor, MI, October 2006.

Exploiting Open Functionality in SMS-Capable Cellular Networks High Technology Crime Investigation Association (HTCIA), Pittsburgh, PA, September 2006.

Trends in Security: Critical Engineering in the Large Schlumberger Innovate IT! Workshop, MIT Media Labs, May 2006. (joint with Patrick McDaniel)

Exploiting Open Functionality in SMS-Capable Cellular Networks InfraGard Pittsburgh Chapter General Meeting, Pittsburgh, PA, March, 2006. (joint with Patrick McDaniel)

Exploiting Open Functionality in SMS-Capable Cellular Networks The University of Richmond, Richmond, VA, October 2005.

Media Coverage

The Threat in the Pocket, The Economist - (10/18/13)

Let's Dump Anti-Virus and Move On, ComputerWorld - (10/14/13)

Android Threat Exaggerated, or is it? ITWeb - (10/10/13)

Google: Don't Fear Android Malware, InformationWeek - (10/8/13)

Mobile malware prevalence expands, but privacy-abusing apps should be top of mind, SC Magazine - (6/27/13)

Mobile Web Browsers Full of Security Risks, Tech Professor Finds, WABE - NPR Atlanta - (12/11/12)

Georgia Tech: mobile browsers fail safety test, Consumer Affairs - (12/06/12)

Blame Screen Size: Mobile Browsers Flunk Security Testsm InformationWeek - (12/06/12)

Ga. Tech researchers: Mobile Browsers need better HTTPS indicators, Network World - (12/05/12)

Study: Most mobile Web browsers unsafe UPI - (12/05/12)

Mobile browser woes can fool even experts: report, NBC News - (12/05/12)

3 hot security startups to watch, VentureBeat - (2/27/12)

Phone hack logs keystrokes from nearby computers, MSNBC.com - (10/21/11)

iPhone keylogger can snoop on desktop typing, New Scientist - (10/18/11)

iPhone Keylogger Can Snoop On Desktop Typing, Slashdot - (10/18/11)

Smart Phones Could Hear Your Password, Technology Review - (10/18/11)

Turning iPhone into spiPhone: Smartphones' accelerometer can track strokes on nearby keyboards, PhysOrg.com - (10/18/11)

Bad vibrations: How smart phones could steal PC passwords, Government Computer News - (10/18/11)

Securo-boffins call for 'self-aware' defensive technologies, The Register (9/14/11)

Voice Phishing: System to Trace Telephone Call Paths Across Multiple Networks Developed, Science Daily - (10/9/10)

'PinDr0p' Tech Uses Unique Noise Fingerprints to Trace Calls, Popular Science - (10/6/10)

Voice-routing call fingerprint system fights vishing, The Register - (10/6/10)

To text or not to text during emergencies, Nextgov - (9/14/10)

'Operation Chokehold': Fake Steve Jobs Rallies iPhone Users to Cripple AT&T Network, ABC News - (12/16/09)

Researchers Set Their Sights on iPhones, Mobile Malware, PC World Magazine - (11/11/09)

Mobile botnets show their disruptive potential, NewScientist Magazine - (11/11/09)

Remote repair for infected phones in development, SC Magazine - (11/11/09)

iPhone worms, other smartphone malware in researchers' sights, Network World - (11/11/09)

GT researchers work to secure cellphones, Atlanta Business Chronicle - (11/10/09)

Making Carriers Shoulder Smartphone Security, Slashdot - (11/10/09)

Georgia Tech to Lead Fight Against Cell Phone Hackers NBC 11 Atlanta - (7/14/09)

Safeguarding your mobile networks, SC Magazine - (6/16/09)

Four Free Cellphone Apps to Help Manage Your Money, SmartMoney Magazine - (5/27/09)

Technology's limitations in alerting campus danger UWire Magazine - (2/10/09)

Compromise Allows Obama To Keep BlackBerry National Public Radio (NPR) - (1/23/09)

Questions abound as emergency alert flops: Virginia Tech's text-message alert system failed when the sound of gunfire was heard on campus; officials scramble to understand why eSchool News - (11/17/08)

Study: Text alerts may fail in real emergency Diamondback Online - (10/14/08)

College alert systems unreliable, study says, Associated Press - (9/25/08)

Study: Campus alerts unreliable, Athens Banner Herald - (9/25/08)

3G Americas warns against text warning systems, The Register - (9/18/08)

3G Americas Highlights New Research Report on Use of Cellular Text Messaging for Emergency Alert Services, 3G Americas - (9/17/08)

Web Exclusive: From Messaging to Management Duty, Wireless Week - (5/1/08)

How Do You Intercept a Text Message? Turn your cell phone into a spy gadget, Slate Magazine - (3/7/07)

Jamming Cellphones with Text Messages, Slashdot - (10/5/2005)

Cell phone networks at risk? CNN - (10/5/2005)

Text Hackers Could Jam Cellphones, a Paper Says, The New York Times - (10/5/2005)

Miscellaneous

Patrick McDaniel, Kevin Butler, William Enck, Harri Hursti, Stephen McLaughlin, Patrick Traynor, Matt Blaze, Adam Aviv, Pavol Cerny, Sandy Clark, Eric Cronin, Gaurav Shah, Micah Sherr, Giovanni Vigna, Richard Kemmerer, David Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, William Robertson, Fredrik Valeur, Joseph Lorenzo Hall and Laura Quilter, EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing, Public Report, December 14, 2007.

USENIX Security Symposium Conference Summaries. USENIX ;login Magazine, December 2007.

USENIX Security Symposium Conference Summaries. USENIX ;login Magazine, December 2006.

Fine-Grained Secure Localization for 802.11 Networks Work in Progress Presentations, 15th USENIX Security Symposium, August 2006.

Fundamental Limitations of Sensor Network Security Work in Progress Presentations, ACM/USENIX Fourth International Conference on Mobile Systems Applications and Services (MobiSys), June 2006. (Award: Most Entertaining WIP)

Patrick Traynor, Heesook Choi, Guohong Cao and Thomas La Porta, Probabilistic Unbalanced Key Distribution and Its Effects on Distributed Sensor Networks, Poster Session at ACM Workshop on Wireless Security (WiSe), October 1, 2004.