@article{8006282, title = "Robust Smartphone App Identification Via Encrypted Network Traffic Analysis", author = "V. F. Taylor and R. Spolaor and M. Conti and I. Martinovic", year = "2017", issn = "1556-6013", journal = "IEEE Transactions on Information Forensics and Security", number = "99", pages = "1-1", volume = "PP", doi = "10.1109/TIFS.2017.2737970", } @inproceedings{Taylor:2017:MAQ:3098243.3098266, title = "There Are Many Apps for That: Quantifying the Availability of Privacy-preserving Apps", author = "Taylor, Vincent F. and Beresford, Alastair R. and Martinovic, Ivan", year = "2017", address = "New York, NY, USA", booktitle = "Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks", isbn = "978-1-4503-5084-6", location = "Boston, Massachusetts", pages = "247--252", publisher = "ACM", series = "WiSec '17", url = "http://doi.acm.org/10.1145/3098243.3098266", doi = "10.1145/3098243.3098266", } @inproceedings{Taylor:2017:UUI:3052973.3052990, title = "To Update or Not to Update: Insights From a Two-Year Study of Android App Evolution", author = "Taylor, Vincent F. and Martinovic, Ivan", year = "2017", address = "New York, NY, USA", booktitle = "Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security", isbn = "978-1-4503-4944-4", keywords = "android, app, longitudinal, permission, vulnerability", location = "Abu Dhabi, United Arab Emirates", pages = "45--57", publisher = "ACM", series = "ASIA CCS '17", url = "http://doi.acm.org/10.1145/3052973.3052990", doi = "10.1145/3052973.3052990", } @inproceedings{12334, title = "Short Paper: A Longitudinal Study of Financial Apps in the Google Play Store", author = "V. F. Taylor and I. Martinovic", year = "2017", booktitle = "Financial Cryptography and Data Security (FC 2017)", month = "To appear", doi = "10", } @inproceedings{7467370, title = "SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis", author = "V. F. Taylor and I. Martinovic", year = "2016", booktitle = "5th ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016)", keywords = "Android (operating system);mobile computing;smart phones;Android apps;;Google Play Store;", month = "October", doi = "10.1145/2994459.2994474", } @inproceedings{7467370, title = "DEMO: Starving Permission-Hungry Android Apps Using SecuRank", author = "V. F. Taylor and I. Martinovic", year = "2016", booktitle = "23rd ACM Conference on Computer and Communications Security (ACM CCS) 2016", keywords = "Android (operating system);mobile computing;smart phones;Android apps;;Google Play Store;", month = "October", doi = "10.1145/2976749.2989032", } @inproceedings{7467370, title = "AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic", author = "V. F. Taylor and R. Spolaor and M. Conti and I. Martinovic", year = "2016", booktitle = "IEEE European Symposium on Security and Privacy (Euro S&P) 2016", keywords = "Android (operating system);mobile computing;smart phones;Android apps;AppScanner;Google Play Store;HTTPS/TLS;app fingerprinting;app fingerprints;automatic fingerprinting;encrypted network traffic;fingerprint generation methodology;marketing agencies;network planning;packet payloads;payload encryption protocols;smartphone apps;supervised learning algorithms;Cryptography;Feature extraction;IP networks;Mobile communication;Payloads;Ports (Computers);Web pages", month = "March", pages = "439-454", doi = "10.1109/EuroSP.2016.40", } @inproceedings{6835013, title = "Mitigating black hole attacks in wireless sensor networks using node-resident expert systems", author = "Taylor, V.F. and Fokum, D.T.", year = "2014", booktitle = "IEEE Wireless Telecommunications Symposium 2014", keywords = "expert systems;telecommunication computing;telecommunication network routing;telecommunication security;telecommunication traffic;wireless sensor networks;autonomous self-organizing low-power nodes;black hole attacks;flexible attack detection scheme;lightweight expert system;malicious node;network traffic;node-resident expert systems;resource-preserving mechanisms;spurious route updates;watchdog mechanism;wireless sensor networks;Cryptography;Expert systems;Intrusion detection;Monitoring;Routing;Routing protocols;Wireless sensor networks", month = "April", pages = "1-7", doi = "10.1109/WTS.2014.6835013", } @inproceedings{6567421, title = "Securing wireless sensor networks from denial-of-service attacks using artificial intelligence and the CLIPS expert system tool", author = "Taylor, V.F. and Fokum, D.T.", year = "2013", booktitle = "IEEE Southeastcon 2013", issn = "1091-0050", keywords = "C language;artificial intelligence;cryptography;expert systems;telecommunication computing;telecommunication security;wireless sensor networks;C language integrated production system tool;CLIPS expert system tool;artificial intelligence;autonomous sensor nodes;base station;cryptographic key protection;data collection;denial-of-service attacks;energy constraints;environmental monitoring applications;false routing information;healthcare applications;home applications;limited processing power;malicious nodes;military applications;sensitive data protection;spurious control information;strong encryption approaches;tamper proof packaging;unwelcome sensor network;wireless sensor network security;Computer crime;Expert systems;Intrusion detection;Monitoring;Peer-to-peer computing;Wireless sensor networks", month = "April", pages = "1-6", doi = "10.1109/SECON.2013.6567421", }