Papers with keyword 'security'
That is, papers related to Security
[Also available in BibTeX]
[See also: all keywords]
These papers relate to cybersecurity.
Papers are listed in reverse-chronological order.
Follow updates with RSS.
- 2025:
- 2024:
-
Timothy J. Pierson, Cesar Arguello, Beatrice Perez, Wondimu Zegeye, Kevin Kornegay, Carl Gunter, and David Kotz.
We need a “building inspector for IoT” when smart homes are sold.
IEEE Security & Privacy, volume 22, number 6, pages 75–84.
IEEE, Nov-Dec. 2024.
doi:10.1109/MSEC.2024.3386467.
[Details]
-
Beatrice Perez, Timothy Pierson, Gregory Mazzaro, and David Kotz.
Harmonic Radar Scanner for Electronics.
Patent Application 18/749,826, published as US2024/0426974, December 26, 2024.
Priority date 6/21/23; filed 6/21/24; published 12/26/24.
[Details]
-
Chixiang Wang, Weijia He, Timothy Pierson, and David Kotz.
Moat: Adaptive Inside/Outside Detection System for Smart Homes.
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), volume 8, number 4, article 157, 31 pages.
ACM, September 2024.
doi:10.1145/3699751.
[Details]
-
Weijia He, Nathan Reitinger, Atheer Almogbil, Yi-Shyuan Chiang, Timothy J. Pierson, and David Kotz.
Contextualizing Interpersonal Data Sharing in Smart Homes.
Proceedings of the Privacy Enhancing Technologies Symposium (PETS), volume 2024, number 2, pages 295–312.
July 2024.
doi:10.56553/popets-2024-0051.
[Details]
-
Ravindra Mangar, Timothy J. Pierson, and David Kotz.
A framework for evaluating the security and privacy of smart-home devices, and its application to common platforms.
IEEE Pervasive Computing, volume 23, number 3, pages 7–19.
IEEE, July 2024.
doi:10.1109/MPRV.2024.3421668.
[Details]
-
Cesar Arguello, Beatrice Perez, Timothy J. Pierson, and David Kotz.
Detecting Battery Cells with Harmonic Radar.
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), pages 231–236.
ACM, May 2024.
doi:10.1145/3643833.3656137.
[Details]
-
Mounib Khanafer, Logan Kostick, Chixiang Wang, Wondimu Zegeye, Weijia He, Berkay Kaplan, Nurzaman Ahmed, Kevin Kornegay, David Kotz, and Timothy Pierson.
Device Discovery in the Smart Home Environment.
Proceedings of the IEEE/ACM Workshop on the Internet of Safe Things (SafeThings), pages 298–304.
IEEE, May 2024.
doi:10.1109/SPW63631.2024.10705647.
[Details]
-
Tushar Jois, Tina Pavlovich, Brigid McCarron, David Kotz, and Timothy Pierson.
Smart Use of Smart Devices in Your Home: A Smart Home Security and Privacy Workshop for the General Public.
Proceedings of the ACM Technical Symposium on Computer Science Education (SIGCSE), pages 611–617.
ACM, March 2024.
doi:10.1145/3626252.3630925.
[Details]
-
Ravindra Mangar, Jingyu Qian, Wondimu Zegeye, Mounib Khanafer, Abdulrahman AlRabah, Ben Civjan, Shalni Sundram, Sam Yuan, Carl Gunter, Kevin Kornegay, Timothy J. Pierson, and David Kotz.
Designing and Evaluating a Testbed for the Matter Protocol: Insights into User Experience.
Proceedings of the NDSS Workshop on Security and Privacy in Standardized IoT (SDIoTSec).
NDSS, February 2024.
doi:10.14722/sdiotsec.2024.23012.
Distinguished Paper Award.
[Details]
-
Chixiang Wang, Liam Cassidy, Weijia He, Timothy J. Pierson, and David Kotz.
Challenges and opportunities in onboarding smart-home devices.
Proceedings of the International Workshop on Mobile Computing Systems and Applications (HotMobile), pages 60–65.
ACM, February 2024.
doi:10.1145/3638550.3641137.
[Details]
-
Timothy J. Pierson, Ronald Peterson, and David Kotz.
Apparatuses, Methods, and Software For Secure Short-Range Wireless Communication.
U.S. Patent 11,894,920, February 6, 2024.
Priority date 2017-09-06; WO Filed 2018-09-06, US Filed 2020-02-26, Continuation of 11,153,026; Issued 2024-02-06.
[Details]
-
Timothy J. Pierson, Ronald Peterson, and David F. Kotz.
System and method for proximity detection with single-antenna device.
U.S. Patent 11,871,233; International Patent Application WO2019210201A1, January 9, 2024.
Priority date 2018-04-27; Filed 2019-04-26; Published 2021-07-29, Issued 2024-01-09.
[Details]
- 2023:
-
Beatrice Perez, Cesar Arguello, Timothy J. Pierson, Gregory Mazzaro, and David Kotz.
Evaluating the practical range of harmonic radar to detect smart electronics.
Proceedings of the IEEE Military Communications Conference (MILCOM), pages 528–535.
IEEE, October 2023.
doi:10.1109/MILCOM58377.2023.10356371.
[Details]
-
Beatrice Perez, Timothy J. Pierson, Gregory Mazzaro, and David Kotz.
Identification and Classification of Electronic Devices Using Harmonic Radar.
Proceedings of the Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), pages 248–255.
IEEE, June 2023.
doi:10.1109/DCOSS-IoT58021.2023.00050.
[Details]
-
Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz.
Apparatus for securely configuring a target device.
U.S. Patent 11,683,071, June 20, 2023.
Continuation of U.S. Patent 10,574,298. Priority date 2015-06-23; Filed 2020-01-20; Allowed 2023-02-10; Issued 2023-06-20.
[Details]
-
Shrirang Mare, David Kotz, and Ronald Peterson.
Effortless authentication for desktop computers using wrist wearable tokens.
U.S. Patent 11,574,039, February 7, 2023.
Priority date 2018-07-20; International application Filed 2019-07-19; National stage Filed 2021-01-20; Issued 2023-02-07.
[Details]
- 2022:
-
Taylor Hardin and David Kotz.
Amanuensis: provenance, privacy, and permission in TEE-enabled blockchain data systems.
Proceedings of the IEEE International Conference on Distributed Computing Systems, pages 144–156.
IEEE, July 2022.
doi:10.1109/ICDCS54860.2022.00023.
[Details]
-
Adam Vandenbussche.
TorSH: Obfuscating consumer Internet-of-Things traffic with a collaborative smart-home router network.
June 2022.
Undergraduate Thesis.
[Details]
-
Taylor Hardin.
Information Provenance for Mobile Health Data.
PhD thesis, Dartmouth Computer Science, Hanover, NH, May 2022.
[Details]
-
Namya Malik.
SPLICEcube Architecture: An Extensible Wi-Fi Monitoring Architecture for Smart-Home Networks.
Master's thesis, Dartmouth Computer Science, Hanover, NH, May 2022.
[Details]
- 2021:
-
Sougata Sen and David Kotz.
VibeRing: Using vibrations from a smart ring as an out-of-band channel for sharing secret keys.
Journal of Pervasive and Mobile Computing, volume 78, article 101505, 16 pages.
Elsevier, December 2021.
doi:10.1016/j.pmcj.2021.101505.
[Details]
-
Timothy J. Pierson, Ronald Peterson, and David Kotz.
Apparatuses, Methods, and Software For Secure Short-Range Wireless Communication.
U.S. Patent 11,153,026, October 19, 2021.
Priority date 2017-09-06; WO Filed 2018-09-06, US Filed 2020-02-26, US amendment filed 2021-01-29; Issued 2021-10-19.
[Details]
-
Taylor Hardin and David Kotz.
Data system with information provenance.
U.S. Patent application US20210273812A1, based on Provisional Patent application 62/984,045, September 2021.
Priority date March 2, 2020. Application March 2, 2021. Publication date September 2, 2021. Notice of Allowance November 19, 2024.
[Details]
-
Travis Peters, Timothy J. Pierson, Sougata Sen, José Camacho, and David Kotz.
Recurring Verification of Interaction Authenticity Within Bluetooth Networks.
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2021), pages 192–203.
ACM, June 2021.
doi:10.1145/3448300.3468287.
[Details]
-
Paul Gralla.
An inside vs. outside classification system for Wi-Fi IoT devices.
June 2021.
Undergraduate Thesis.
[Details]
-
Taylor Hardin and David Kotz.
Amanuensis: Information Provenance for Health-Data Systems.
Journal of Information Systems Management and Security, volume 58, number 2, article 102460, 21 pages.
Elsevier, March 2021.
doi:10.1016/j.ipm.2020.102460.
[Details]
- 2020:
-
Carl Landwehr and David Kotz.
THaW publications.
Technical Report number TR2020-904, Dartmouth Computer Science, December 2020.
[Details]
-
Sougata Sen and David Kotz.
VibeRing: Using vibrations from a smart ring as an out-of-band channel for sharing secret keys.
Proceedings of the International Conference on the Internet of Things (IoT), article 13, 8 pages.
ACM, October 2020.
doi:10.1145/3410992.3410995.
ISBN13: 9781450387583.
Nominated for Best-Paper award.
[Details]
-
Travis Peters.
Trustworthy Wireless Personal Area Networks.
PhD thesis, Dartmouth Computer Science, Hanover, NH, August 2020.
Available as Dartmouth Computer Science Technical Report TR2020-878.
[Details]
-
Xiaohui Liang, Ronald Peterson, and David Kotz.
Securely Connecting Wearables to Ambient Displays with User Intent.
IEEE Transactions on Dependable and Secure Computing, volume 17, number 4, pages 676–690.
IEEE, July 2020.
doi:10.1109/TDSC.2018.2840979.
Date of Publication: 28 May 2018.
[Details]
-
Xiaohui Liang, Tianlong Yun, Ron Peterson, and David Kotz.
Secure System For Coupling Wearable Devices To Computerized Devices with Displays.
U.S. Patent 10,581,606, March 3, 2020.
Priority date 2014-08-18, Filed 2015-08-18; Issued 2020-03-03.
[Details]
-
Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz.
Apparatus for Securely Configuring A Target Device and Associated Methods.
U.S. Patent 10,574,298, February 25, 2020.
Priority date 2015-06-23; Filed 2016-06-23; Issued 2020-02-25.
[Details]
- 2019:
-
George Boateng, Vivian Genaro Motti, Varun Mishra, John A. Batsis, Josiah Hester, and David Kotz.
Experience: Design, Development and Evaluation of a Wearable Device for mHealth Applications.
Proceedings of the International Conference on Mobile Computing and Networking (MobiCom), article 31, 14 pages.
ACM, October 2019.
doi:10.1145/3300061.3345432.
[Details]
-
Taylor Hardin and David Kotz.
Blockchain in Healthcare Data Systems: a Survey.
Proceedings of the International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pages 490–497.
IEEE, October 2019.
doi:10.1109/IOTSMS48152.2019.8939174.
[Details]
-
Timothy J. Pierson, Travis Peters, Ronald Peterson, and David Kotz.
Proximity Detection with Single-Antenna IoT Devices.
Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom), article 21, 15 pages.
ACM, October 2019.
doi:10.1145/3300061.3300120.
[Details]
-
Sougata Sen, Varun Mishra, and David Kotz.
Using vibrations from a SmartRing as an out-of-band channel for sharing secret keys.
Adjunct Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), pages 198–201.
ACM, September 2019.
doi:10.1145/3341162.3343818.
[Details]
-
Timothy J. Pierson, Travis Peters, Ronald Peterson, and David Kotz.
CloseTalker: secure, short-range ad hoc wireless communication.
Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 340–352.
ACM, June 2019.
doi:10.1145/3307334.3326100.
[Details]
-
Emily Greene, Patrick Proctor, and David Kotz.
Secure Sharing of mHealth Data Streams through Cryptographically-Enforced Access Control.
Journal of Smart Health, volume 12, pages 49–65.
Elsevier, April 2019.
doi:10.1016/j.smhl.2018.01.003.
[Details]
-
Shrirang Mare, Reza Rawassizadeh, Ronald Peterson, and David Kotz.
Continuous Smartphone Authentication using Wristbands.
Proceedings of the Workshop on Usable Security (USEC), 12 pages.
Internet Society, February 2019.
doi:10.14722/usec.2019.23013.
[Details]
-
David Kotz.
Amulet: an open-source wrist-worn platform for mHealth research and education.
Proceedings of the Workshop on Networked Healthcare Technology (NetHealth), pages 891–897.
IEEE, January 2019.
doi:10.1109/COMSNETS.2019.8711407.
[Details]
- 2018:
-
Timothy J. Pierson, Travis Peters, Ronald Peterson, and David Kotz.
Poster: Proximity Detection with Single-Antenna IoT Devices.
Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom), pages 663–665.
ACM, October 2018.
doi:10.1145/3241539.3267751.
Best poster award.
[Details]
-
Shrirang Mare, Reza Rawassizadeh, Ronald Peterson, and David Kotz.
SAW: Wristband-based authentication for desktop computers.
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (Ubicomp), volume 2, number 3, article 125, 29 pages.
ACM, September 2018.
doi:10.1145/3264935.
[Details]
-
Taylor Hardin, Ryan Scott, Patrick Proctor, Josiah Hester, Jacob Sorber, and David Kotz.
Application Memory Isolation on Ultra-Low-Power MCUs.
Proceedings of the USENIX Annual Technical Conference (USENIX ATC), pages 127–132.
USENIX Association, July 2018.
[Details]
-
Travis Peters, Reshma Lal, Srikanth Varadarajan, Pradeep Pappachan, and David Kotz.
BASTION-SGX: Bluetooth and Architectural Support for Trusted I/O on SGX.
Proceedings of the International Workshop on Hardware and Architectural Support for Security and Privacy (HASP), article 3, 9 pages.
ACM, June 2018.
doi:10.1145/3214292.3214295.
[Details]
-
Timothy J. Pierson.
Secure Short-range Communications.
PhD thesis, Dartmouth Computer Science, Hanover, NH, June 2018.
Available as Dartmouth Computer Science Technical Report TR2018-845.
[Details]
-
Andrés D. Molina-Markham, Shrirang Mare, Ronald Peterson, and David Kotz.
Continuous seamless mobile device authentication using a separate electronic wearable apparatus.
U.S. Patent 9,961,547, May 1, 2018.
Priority date 2016-09-30, Filed 2016-09-30; Issued 2018-05-01.
[Details]
-
David Kotz, Ryan Halter, Cory Cornelius, Jacob Sorber, Minho Shin, Ronald Peterson, Shrirang Mare, Aarathi Prasad, Joseph Skinner, and Andrés Molina-Markham.
Wearable computing device for secure control of physiological sensors and medical devices, with secure storage of medical records, and bioimpedance biometric.
U.S. Patent 9,936,877; International Patent Application WO2013096954A1, April 10, 2018.
This patent adds claims to its predecessor; Priority date 2011-12-23; Filed 2017-02-07; Issued 2018-04-10.
[Details]
-
Rui Liu, Cory Cornelius, Reza Rawassizadeh, Ron Peterson, and David Kotz.
Vocal Resonance: Using Internal Body Voice for Wearable Authentication.
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (UbiComp), volume 2, number 1, article 19, 23 pages.
ACM, March 2018.
doi:10.1145/3191751.
[Details]
-
Reza Rawassizadeh, Timothy Pierson, Ronald Peterson, and David Kotz.
NoCloud: Experimenting with Network Disconnection by Design.
IEEE Pervasive Computing, volume 17, number 1, pages 64–74.
IEEE, January 2018.
doi:10.1109/MPRV.2018.011591063.
[Details]
- 2017:
-
David Kotz and Travis Peters.
Challenges to ensuring human safety throughout the life-cycle of Smart Environments.
Proceedings of the ACM Workshop on the Internet of Safe Things (SafeThings), pages 1–7.
ACM, November 2017.
doi:10.1145/3137003.3137012.
[Details]
-
Aarathi Prasad, Xiaohui Liang, and David Kotz.
SPICE: Secure Proximity-based Infrastructure for Close Encounters.
Proceedings of the ACM Workshop on Mobile Crowdsensing Systems and Applications (CrowdSense), pages 56–61.
ACM, November 2017.
doi:10.1145/3139243.3139245.
[Details]
-
Shrirang Mare, Andrés Molina-Markham, Ronald Peterson, and David Kotz.
System, Method and Authorization Device for Biometric Access Control to Digital Devices.
U.S. Patent 9,832,206; International Patent Application WO2014153528A2, November 28, 2017.
Priority date 2013-03-21; Filed 2014-03-21; Issued 2017-11-28.
[Details]
-
Timothy J. Pierson, Ronald Peterson, and David Kotz.
Secure Information Transfer Between Nearby Wireless Devices.
Proceedings of the Mobicom S3 workshop, pages 11–13.
ACM, October 2017.
doi:10.1145/3131348.3131355.
[Details]
-
Emily Greene.
ShareABEL: Secure Sharing of mHealth Data through Cryptographically-Enforced Access Control.
Technical Report number TR2017-827, Dartmouth College, Computer Science, Hanover, NH, July 2017.
Senior Honors Thesis.
[Details]
-
Taylor Hardin, Josiah Hester, Patrick Proctor, Jacob Sorber, and David Kotz.
Poster: Memory Protection in Ultra-Low-Power Multi-Application Wearables.
Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), page 170.
ACM, June 2017.
doi:10.1145/3081333.3089314.
[Details]
-
Xiaohui Liang and David Kotz.
AuthoRing: Wearable User-presence Authentication.
Proceedings of the ACM Workshop on Wearable Systems and Applications (WearSys), pages 5–10.
ACM, June 2017.
doi:10.1145/3089351.3089357.
[Details]
-
Rui Liu, Cory Cornelius, Reza Rawassizadeh, Ron Peterson, and David Kotz.
Poster: Vocal Resonance as a Passive Biometric.
Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), page 160.
ACM, June 2017.
doi:10.1145/3081333.3089304.
[Details]
-
Rui Liu, Reza Rawassizadeh, and David Kotz.
Toward Accurate and Efficient Feature Selection for Speaker Recognition on Wearables.
Proceedings of the ACM Workshop on Wearable Systems and Applications (WearSys), pages 41–46.
ACM, June 2017.
doi:10.1145/3089351.3089352.
[Details]
-
Aarathi Prasad and David Kotz.
ENACT: Encounter-based Architecture for Contact Tracing.
Proceedings of the ACM Workshop on Physical Analytics (WPA), pages 37–42.
ACM, June 2017.
doi:10.1145/3092305.3092310.
[Details]
-
Xiaohui Liang, Tianlong Yun, Ronald Peterson, and David Kotz.
LightTouch: Securely Connecting Wearables to Ambient Displays with User Intent.
Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), pages 1–9.
IEEE, May 2017.
doi:10.1109/INFOCOM.2017.8057210.
[Details]
-
David B. Harmon.
Cryptographic transfer of sensor data from the Amulet to a smartphone.
Technical Report number TR2017-826, Dartmouth College, Computer Science, Hanover, NH, May 2017.
Senior Honors Thesis.
[Details]
-
David Kotz, Ryan Halter, Cory Cornelius, Jacob Sorber, Minho Shin, Ronald Peterson, Shrirang Mare, Aarathi Prasad, Joseph Skinner, and Andrés Molina-Markham.
Wearable computing device for secure control of physiological sensors and medical devices, with secure storage of medical records, and bioimpedance biometric.
U.S. Patent 9,595,187; International Patent Application WO2013096954A1, March 14, 2017.
Priority date 2011-12-23; Filed 2012-12-24; Issued 2017-03-14.
[Details]
- 2016:
-
Josiah Hester, Travis Peters, Tianlong Yun, Ronald Peterson, Joseph Skinner, Bhargav Golla, Kevin Storer, Steven Hearndon, Sarah Lord, Ryan Halter, David Kotz, and Jacob Sorber.
The Amulet Wearable Platform: Demo Abstract.
Proceedings of the ACM Conference on Embedded Networked Sensor Systems (SenSys), pages 290–291.
ACM, November 2016.
doi:10.1145/2994551.2996527.
[Details]
-
Josiah Hester, Travis Peters, Tianlong Yun, Ronald Peterson, Joseph Skinner, Bhargav Golla, Kevin Storer, Steven Hearndon, Kevin Freeman, Sarah Lord, Ryan Halter, David Kotz, and Jacob Sorber.
Amulet: An Energy-Efficient, Multi-Application Wearable Platform.
Proceedings of the ACM Conference on Embedded Networked Sensor Systems (SenSys), pages 216–229.
ACM, November 2016.
doi:10.1145/2994551.2994554.
[Details]
-
David Kotz, Carl A. Gunter, Santosh Kumar, and Jonathan P. Weiner.
Privacy and Security in Mobile Health – A Research Agenda.
IEEE Computer, volume 49, number 6, pages 22–30.
IEEE, June 2016.
doi:10.1109/MC.2016.185.
[Details]
-
Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz.
Demo: Wanda, securely introducing mobile devices.
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), page 113.
ACM, June 2016.
doi:10.1145/2938559.2938581.
[Details]
-
Shrirang Mare.
Seamless Authentication for Ubiquitous Devices.
PhD thesis, Dartmouth College Computer Science, Hanover, NH, May 2016.
Available as Dartmouth Computer Science Technical Report TR2016-793.
[Details]
-
Aarathi Prasad.
Privacy-preserving controls for sharing mHealth data.
PhD thesis, Dartmouth College Computer Science, Hanover, NH, May 2016.
Available as Dartmouth Computer Science Technical Report TR2016-794.
[Details]
-
Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz.
Wanda: securely introducing mobile devices.
Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), pages 1–9.
IEEE, April 2016.
doi:10.1109/INFOCOM.2016.7524366.
[Details]
-
Bingyue Wang.
Learning Device Usage in Context: A Continuous and Hierarchical Smartphone Authentication Scheme.
Technical Report number TR2016-790, Dartmouth Computer Science, Hanover, NH, March 2016.
Senior Honors Thesis.
[Details]
-
Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz.
Wanda: securely introducing mobile devices -- Extended version.
Technical Report number TR2016-789, Dartmouth Computer Science, February 2016.
Expanded version of the INFOCOM 2016 paper by the same title.
[Details]
- 2015:
-
David Kotz, Kevin Fu, Carl Gunter, and Avi Rubin.
Security for Mobile and Cloud Frontiers in Healthcare.
Communications of the ACM, volume 58, number 8, pages 21–23.
ACM, August 2015.
doi:10.1145/2790830.
[Details]
-
Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, and David Kotz.
Location Privacy for Mobile Crowd Sensing through Population Mapping.
Sensors, volume 15, number 7, pages 15285–15310.
Open access, June 2015.
doi:10.3390/s150715285.
[Details]
- 2014:
-
Andrés Molina-Markham, Ronald Peterson, Joseph Skinner, Tianlong Yun, Bhargav Golla, Kevin Freeman, Travis Peters, Jacob Sorber, Ryan Halter, and David Kotz.
Amulet: A secure architecture for mHealth applications for low-power wearable devices.
Proceedings of the Workshop on Mobile Medical Applications-- Design and Development (WMMADD), pages 16–21.
ACM, November 2014.
doi:10.1145/2676431.2676432.
[Details]
-
Xiaohui Liang and David Kotz.
Securely Connecting Wearable Health Devices to External Displays.
Proceedings of the USENIX Summit on Health Information Technologies.
USENIX Association, August 2014.
No paper -- workshop presentation only.
[Details]
-
Cory Cornelius, Ronald Peterson, Joseph Skinner, Ryan Halter, and David Kotz.
A wearable system that knows who wears it.
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 55–67.
ACM, June 2014.
doi:10.1145/2594368.2594369.
[Details]
-
Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz.
Hide-n-Sense: preserving privacy efficiently in wireless mHealth.
Mobile Networks and Applications (MONET), volume 19, number 3, pages 331–344.
Springer-Verlag, June 2014.
doi:10.1007/s11036-013-0447-x.
Special issue on Wireless Technology for Pervasive Healthcare.
[Details]
-
Andrés Molina-Markham, Ronald A. Peterson, Joseph Skinner, Ryan J. Halter, Jacob Sorber, and David Kotz.
Poster: Enabling Computational Jewelry for mHealth Applications.
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 374–375.
ACM, June 2014.
doi:10.1145/2594368.2601454.
[Details]
-
Aarathi Prasad, Xiaohui Liang, and David Kotz.
Poster: Balancing Disclosure and Utility of Personal Information.
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 380–381.
ACM, June 2014.
doi:10.1145/2594368.2601448.
[Details]
-
Shrirang Mare, Andrés Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz.
ZEBRA: Zero-Effort Bilateral Recurring Authentication (Companion report).
Technical Report number TR2014-748, Dartmouth Computer Science, May 2014.
This project has been renamed CSAW.
[Details]
-
Shrirang Mare, Andrés Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz.
ZEBRA: Zero-Effort Bilateral Recurring Authentication.
Proceedings of the IEEE Symposium on Security & Privacy, pages 705–720.
IEEE, May 2014.
doi:10.1109/SP.2014.51.
This project has been renamed CSAW.
[Details]
-
Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare, and David Kotz.
Vocal resonance as a biometric for pervasive wearable devices.
Technical Report number TR2014-747, Dartmouth Computer Science, February 2014.
[Details]
-
Keren Tan, Chris McDonald, Bennet Vance, Chrisil Arackaparambil, Sergey Bratus, and David Kotz.
From MAP to DIST: the evolution of a large-scale WLAN monitoring system.
IEEE Transactions on Mobile Computing, volume 13, number 1, pages 216–229.
IEEE, January 2014.
doi:10.1109/TMC.2012.237.
[Details]
- 2013:
-
Denise Anthony, Andrew Campbell, Thomas Candon, Andrew Gettinger, Carl A. Gunter, M. Eric Johnson, David Kotz, Lisa Marsch, Andrés Molina-Markham, Karen Page, and Sean Smith.
Securing Information Technology in Healthcare.
IEEE Security & Privacy, volume 11, number 6, pages 25–33.
IEEE, November 2013.
doi:10.1109/MSP.2013.104.
Invited paper.
[Details]
-
Cory T. Cornelius.
Usable Security for Wireless Body-Area Networks.
PhD thesis, Dartmouth College Computer Science, Hanover, NH, September 2013.
Available as Dartmouth Computer Science Technical Report TR2013-741.
[Details]
-
Aarathi Prasad, Ronald Peterson, Shrirang Mare, Jacob Sorber, Kolin Paul, and David Kotz.
Provenance framework for mHealth.
Proceedings of the Workshop on Networked Healthcare Technology (NetHealth), pages 1–6.
IEEE, January 2013.
doi:10.1109/COMSNETS.2013.6465599.
[Details]
- 2012:
-
Cory Cornelius and David Kotz.
Recognizing whether sensors are on the same body.
Journal of Pervasive and Mobile Computing, volume 8, number 6, pages 822–836.
Elsevier, December 2012.
doi:10.1016/j.pmcj.2012.06.005.
[Details]
-
Aarathi Prasad, Ronald Peterson, Jacob Sorber, and David Kotz.
A Provenance Framework for mHealth.
Proceedings of the Workshop for Mobile Systems, Applications, and Services for Healthcare (mHealthSys) Poster Track, article 9, 2 pages.
ACM, November 2012.
doi:10.1145/2396276.2396287.
[Details]
-
Cory Cornelius, Jacob Sorber, Ronald Peterson, Joe Skinner, Ryan Halter, and David Kotz.
Who wears me? Bioimpedance as a passive biometric.
Proceedings of the USENIX Workshop on Health Security and Privacy, 10 pages.
USENIX Association, August 2012.
[Details]
-
Jacob Sorber, Minho Shin, Ron Peterson, and David Kotz.
Plug-n-Trust: Practical trusted sensing for mHealth.
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 309–322.
ACM, June 2012.
doi:10.1145/2307636.2307665.
[Details]
-
Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare, and David Kotz.
Passive Biometrics for Pervasive Wearable Devices (Poster paper).
Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), 1 page.
ACM, February 2012.
[Details]
-
Jacob Sorber, Minho Shin, Ronald Peterson, Cory Cornelius, Shrirang Mare, Aarathi Prasad, Zachary Marois, Emma Smithayer, and David Kotz.
An Amulet for trustworthy wearable mHealth.
Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), article 7, 6 pages.
ACM, February 2012.
doi:10.1145/2162081.2162092.
[Details]
- 2011:
-
Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz.
Adapt-lite: Privacy-aware, secure, and efficient mHealth sensing.
Proceedings of the Workshop on Privacy in the Electronic Society (WPES), pages 137–142.
ACM, October 2011.
doi:10.1145/2046556.2046574.
[Details]
-
Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz.
Hide-n-Sense: Privacy-aware secure mHealth sensing.
Technical Report number TR2011-702, Dartmouth Computer Science, September 2011.
[Details]
-
Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz.
Adaptive security and privacy for mHealth sensing.
Proceedings of the USENIX Workshop on Health Security (HealthSec), 5 pages.
USENIX Association, August 2011.
Short paper.
[Details]
-
Cory Cornelius and David Kotz.
Recognizing whether sensors are on the same body.
Proceedings of the International Conference on Pervasive Computing (Pervasive), volume 6696 in Lecture Notes in Computer Science, pages 332–349.
Springer-Verlag, June 2011.
doi:10.1007/978-3-642-21726-5_21.
[Details]
-
Jacob Sorber, Minho Shin, Ron Peterson, and David Kotz.
Poster: Practical Trusted Computing for mHealth Sensing.
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 405–406.
ACM, June 2011.
doi:10.1145/1999995.2000058.
[Details]
-
Minho Shin, Cory Cornelius, Dan Peebles, Apu Kapadia, David Kotz, and Nikos Triandopoulos.
AnonySense: A System for Anonymous Opportunistic Sensing.
Journal of Pervasive and Mobile Computing, volume 7, number 1, pages 16–30.
Elsevier, February 2011.
doi:10.1016/j.pmcj.2010.04.001.
[Details]
-
David Kotz.
A threat taxonomy for mHealth privacy.
Proceedings of the Workshop on Networked Healthcare Technology (NetHealth), article 1, 6 pages.
IEEE, January 2011.
doi:10.1109/COMSNETS.2011.5716518.
[Details]
- 2010:
-
Cory Cornelius and David Kotz.
On Usable Authentication for Wireless Body Area Networks.
Proceedings of the USENIX Workshop on Health Security (HealthSec), 2 pages.
USENIX Association, August 2010.
Position paper.
[Details]
-
Shrirang Mare and David Kotz.
Is Bluetooth the right technology for mHealth?
Proceedings of the USENIX Workshop on Health Security (HealthSec), 2 pages.
USENIX Association, August 2010.
Position paper.
[Details]
-
Keren Tan and David Kotz.
Saluki: a High-Performance Wi-Fi Sniffing Program.
Proceedings of the International Workshop on Wireless Network Measurements (WiNMee), pages 591–596.
IEEE, May 2010.
Invited paper.
[Details]
-
Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, and David Kotz.
On the Reliability of Wireless Fingerprinting using Clock Skews.
Proceedings of the ACM Conference on Wireless Network Security (WiSec), 6 pages, pages 169–174.
ACM, March 2010.
doi:10.1145/1741866.1741894.
[Details]
-
Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, and David Kotz.
On the Reliability of Wireless Fingerprinting using Clock Skews.
Technical Report number TR2010-661, Dartmouth Computer Science, Hanover, NH, January 2010.
[Details]
-
Dan Peebles, Cory Cornelius, Apu Kapadia, David Kotz, Minho Shin, and Nikos Triandopoulos.
AnonyTL Specification.
Technical Report number TR2010-660, Dartmouth Computer Science, January 2010.
[Details]
- 2009:
-
Kazuhiro Minami and David Kotz.
Distributed proof systems for cross-domain authorization.
Information Assurance, Security and Privacy Services, chapter 1.
Edited by H. Raghav Rao and Shambhu Upadhyaya.
Volume 4 in Handbooks in Information Systems, Emerald Group Publishing Limited, 2009.
ISBN13: 9781848551947.
[Details]
-
Sergey Bratus, David Kotz, Keren Tan, William Taylor, Anna Shubina, Bennet Vance, and Michael E. Locasto.
Dartmouth Internet Security Testbed (DIST): building a campus-wide wireless testbed.
Proceedings of the Workshop on Cyber Security Experimentation and Test (CSET), 6 pages.
USENIX Association, August 2009.
[Details]
-
Janani Sriram, Minho Shin, David Kotz, Anand Rajan, Manoj Sastry, and Mark Yarvis.
Challenges in Data Quality Assurance in Pervasive Health Monitoring Systems.
Future of Trust in Computing, pages 129–142.
Edited by David Gawrock, Helmut Reimer, Ahmad-Reza Sadeghi, and Claire Vishik.
Vieweg+Teubner Verlag, July 2009.
doi:10.1007/978-3-8348-9324-6_14.
ISBN13: 978-3-8348-9324-6.
[Details]
-
Jean Camp, Lorrie Cranor, Nick Feamster, Joan Feigenbaum, Stephanie Forrest, Dave Kotz, Wenke Lee, Patrick Lincoln, Vern Paxson, Mike Reiter, Ron Rivest, William Sanders, Stefan Savage, Sean Smith, Eugene Spafford, and Sal Stolfo.
Data for Cybersecurity Research: Process and ‘Wish List’.
June 10, 2009.
Informal report.
[Details]
-
Apu Kapadia, David Kotz, and Nikos Triandopoulos.
Opportunistic Sensing: Security Challenges for the New Paradigm.
Proceedings of the International Conference on COMmunication Systems and NETworkS (COMSNETS), 10 pages.
IEEE, January 2009.
doi:10.1109/COMSNETS.2009.4808850.
Invited paper.
[Details]
- 2008:
-
Yong Sheng, Guanling Chen, Hongda Yin, Keren Tan, Udayan Deshpande, Bennet Vance, David Kotz, Andrew Campbell, Chris McDonald, Tristan Henderson, and Joshua Wright.
MAP: A scalable monitoring system for dependable 802.11 wireless networks.
IEEE Wireless Communications, volume 15, number 5, pages 10–18.
IEEE, October 2008.
doi:10.1109/MWC.2008.4653127.
[Details]
-
Sergey Bratus, Joshua Brody, David Kotz, and Anna Shubina.
Streaming Estimation of Information-theoretic Metrics for Anomaly Detection (Extended Abstract).
Proceedings of the International Symposium on Recent Advances in Intrusion Detection--- Posters, volume 5230 in Lecture Notes in Computer Science, pages 412–414.
Springer-Verlag, Cambridge, MA, September 2008.
doi:10.1007/978-3-540-87403-4_32.
[Details]
-
Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin, and Nikos Triandopoulos.
AnonySense: Privacy-Aware People-Centric Sensing.
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 211–224.
ACM, June 2008.
doi:10.1145/1378600.1378624.
[Details]
-
Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin, and Patrick Tsang.
Poster Abstract: Reliable People-Centric Sensing with Unreliable Voluntary Carriers.
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), 1 page.
ACM, June 2008.
[Details]
-
Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, Dan Peebles, and David Kotz.
AnonySense: Opportunistic and Privacy-Preserving Context Collection.
Proceedings of the International Conference on Pervasive Computing (Pervasive), volume 5013 in Lecture Notes in Computer Science, pages 280–297.
Springer-Verlag, May 2008.
doi:10.1007/978-3-540-79576-6_17.
[Details]
-
Udayan Deshpande.
A Dynamically Refocusable Sampling Infrastructure for 802.11 Networks.
PhD thesis, Dartmouth College Computer Science, Hanover, NH, May 2008.
Available as Dartmouth Computer Science Technical Report TR2008-620.
[Details]
-
Udayan Deshpande, Chris McDonald, and David Kotz.
Refocusing in 802.11 Wireless Measurement.
Proceedings of the Passive and Active Measurement Conference (PAM 2008), volume 4979 in Lecture Notes in Computer Science, pages 142–151.
Springer-Verlag, April 2008.
doi:10.1007/978-3-540-79232-1_15.
[Details]
-
Yong Sheng, Keren Tan, Guanling Chen, David Kotz, and Andrew Campbell.
Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength.
Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pages 1768–1776.
IEEE, April 2008.
doi:10.1109/INFOCOM.2007.239.
[Details]
-
Sergey Bratus, Cory Cornelius, Daniel Peebles, and David Kotz.
Active Behavioral Fingerprinting of Wireless Devices.
Technical Report number TR2008-610, Dartmouth Computer Science, Hanover, NH, March 2008.
[Details]
-
Sergey Bratus, Cory Cornelius, David Kotz, and Dan Peebles.
Active Behavioral Fingerprinting of Wireless Devices.
Proceedings of the ACM Conference on Wireless Network Security (WiSec), pages 56–61.
ACM, March 2008.
doi:10.1145/1352533.1352543.
[Details]
- 2007:
- 2006:
-
Kazuhiro Minami and David Kotz.
Scalability in a Secure Distributed Proof System.
Proceedings of the International Conference on Pervasive Computing (Pervasive), volume 3968 in Lecture Notes in Computer Science, pages 220–237.
Springer-Verlag, Dublin, Ireland, May 2006.
doi:10.1007/11748625_14.
[Details]
-
Udayan Deshpande, Tristan Henderson, and David Kotz.
Channel Sampling Strategies for Monitoring Wireless Networks.
Proceedings of the International Workshop on Wireless Network Measurement (WiNMee), 7 pages.
IEEE, April 2006.
doi:10.1109/WIOPT.2006.1666486.
[Details]
-
Kazuhiro Minami.
Secure Context-sensitive Authorization.
PhD thesis, Dartmouth College Computer Science, Hanover, NH, February 2006.
Available as Dartmouth Computer Science Technical Report TR2006-571.
[Details]
- 2005:
-
Javed Aslam, Sergey Bratus, David Kotz, Ronald Peterson, and Daniela Rus.
The Kerf toolkit for intrusion analysis.
IAnewsletter, volume 8, number 2, pages 12–16.
Information Assurance Technology Analysis Center (IATAC), Summer 2005.
[Details]
-
Kazuhiro Minami and David Kotz.
Secure Context-sensitive Authorization.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom), pages 257–268.
IEEE, Kauai, Hawaii, March 2005.
doi:10.1109/PERCOM.2005.37.
[Details]
-
Kazuhiro Minami and David Kotz.
Secure Context-sensitive Authorization.
Journal of Pervasive and Mobile Computing, volume 1, number 1, pages 123–156.
Elsevier, March 2005.
doi:10.1016/j.pmcj.2005.01.004.
[Details]
- 2004:
-
Kazuhiro Minami and David Kotz.
Secure Context-sensitive Authorization.
Technical Report number TR2004-529, Dartmouth Computer Science, December 2004.
[Details]
-
Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson, Daniela Rus, and Brett Tofel.
The Kerf toolkit for intrusion analysis.
IEEE Security and Privacy, volume 2, number 6, pages 42–52.
IEEE, November 2004.
doi:10.1109/MSP.2004.113.
[Details]
-
Kwang-Hyun Baek, Sean W. Smith, and David Kotz.
A Survey of WPA and 802.11i RSN Authentication Protocols.
Technical Report number TR2004-524, Dartmouth Computer Science, Hanover, NH, November 2004.
[Details]
-
Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson, and Daniela Rus.
Kerf: Machine Learning to Aid Intrusion Analysts.
Proceedings of the USENIX Security Symposium, 1 page.
USENIX Association, August 2004.
Work-in-progress report.
[Details]
-
Guanling Chen.
Solar: Building A Context Fusion Network for Pervasive Computing.
PhD thesis, Dartmouth College Computer Science, Hanover, NH, August 2004.
Available as Dartmouth Computer Science Technical Report TR2004-514.
[Details]
-
Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson, Daniela Rus, and Brett Tofel.
The Kerf toolkit for intrusion analysis.
Technical Report number TR2004-493, Dartmouth Computer Science, March 2004.
[Details]
- 2003:
- 2002:
-
David Kotz, Robert Gray, and Daniela Rus.
Future Directions for Mobile-Agent Research.
IEEE Distributed Systems Online, volume 3, number 8, 6 pages.
IEEE, August 2002.
Based on a conversation with Jeff Bradshaw, Colin Harrison, Guenter Karjoth, Amy Murphy, Gian Pietro Picco, M. Ranganathan, Niranjan Suri, and Christian Tschudin.
[Details]
-
Christopher P. Masone.
Role Definition Language (RDL): A Language to Describe Context-Aware Roles.
Technical Report number TR2002-426, Dartmouth Computer Science, Hanover, NH, May 2002.
Available as Dartmouth Computer Science Technical Report TR2002-426.
Senior Honors Thesis. Advisor: David Kotz.
[Details]
-
Kazuhiro Minami and David Kotz.
Controlling access to pervasive information in the “Solar” system.
Technical Report number TR2002-422, Dartmouth Computer Science, February 2002.
[Details]
-
David Kotz, Robert Gray, and Daniela Rus.
Future Directions for Mobile-Agent Research.
Technical Report number TR2002-415, Dartmouth Computer Science, January 2002.
Based on a conversation with Jeff Bradshaw, Colin Harrison, Guenter Karjoth, Amy Murphy, Gian Pietro Picco, M. Ranganathan, Niranjan Suri, and Christian Tschudin.
[Details]
- 2001:
- 2000:
-
Jon Howell and David Kotz.
End-to-end authorization.
Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI), pages 151–164.
USENIX Association, October 2000.
[Details]
-
Jon Howell and David Kotz.
A Formal Semantics for SPKI.
Proceedings of the European Symposium on Research in Computer Security (ESORICS), volume 1895 in Lecture Notes in Computer Science, pages 140–158.
Springer-Verlag, October 2000.
doi:10.1007/10722599_9.
[Details]
-
Jonathan R. Howell.
Naming and sharing resources across administrative boundaries.
PhD thesis, Dartmouth College Computer Science, Hanover, NH, June 2000.
Available as Dartmouth Computer Science Technical Reports TR2000-378, 379, and 380.
[Details]
-
Jon Howell and David Kotz.
Restricted delegation: seamlessly spanning administrative boundaries.
ACM Operating Systems Review, volume 34, number 2, pages 38–39.
ACM, April 2000.
doi:10.1145/346152.346268.
[Details]
-
Jon Howell and David Kotz.
A Formal Semantics for SPKI.
Technical Report number TR2000-363, Dartmouth Computer Science, March 2000.
[Details]
- 1999:
- 1998:
-
Robert S. Gray, David Kotz, George Cybenko, and Daniela Rus.
D’Agents: Security in a multiple-language, mobile-agent system.
Mobile Agents and Security, chapter 9, pages 154–187.
Edited by Giovanni Vigna.
Volume 1419 in Lecture Notes in Computer Science, Springer-Verlag, 1998.
doi:10.1007/3-540-68671-1.
ISBN13: 978-3-540-68671-2.
[Details]
-
Jon Howell and David Kotz.
Snowflake: Spanning Administrative Domains.
Technical Report number PCS-TR98-343, Dartmouth Computer Science, December 1998.
[Details]
- 1996:
- 1994:
- 1993:
[Kotz research]