Journals

  1. N. Scaife, P. Traynor, H. Carter, L. Lidsky, R. Jones, OnionDNS: A Seizure-Resistant Top-Level Domain, International Journal of Information Security (IJIS), to appear 2018.
  2. H. Carter and P. Traynor, Outsourcing Computation for Private Function Evaluation, International Journal of Information and Computer Security (IJICS), to appear 2017.
  3. H. Carter, B. Mood, P. Traynor, K. Butler, Outsourcing Secure Two-Party Computation as a Black Box, Journal of Security and Communication Networks (SCN), 9(14):2261-2275, 2016.
  4. H. Carter, B. Mood, P. Traynor, K. Butler, Secure Outsourced Garbled Circuit Evaluation for Mobile Devices, Journal of Computer Security (JCS), 24(2):137-180, 2016.
  5. H. Carter, C. Amrutkar, I. Dacosta, P. Traynor, For Your Phone Only: Custom Protocols for Efficient Secure Function Evaluation on Mobile Devices, Journal of Security and Communication Networks (SCN), 7(7):1165-1176, 2014.

Conferences

  1. S. Heuser, B. Reaves, P. Pendyala, H. Carter, A. Dmitrienko, W. Enck, N. Kiyavash, A. Sadeghi, P. Traynor, Phonion: Practical Protection of Metadata in Telephony Networks, Proceedings on Privacy Enhancing Technologies (PoPETs), July 2017. (acceptance rate: 22.5%) (De Gruyter)
  2. N. Scaife, H. Carter, P. Traynor, K. Butler, CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data, Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), June 2016. (acceptance rate: 17.6%) (pdf)
  3. B. Mood, D. Gupta, H. Carter, K. Butler, P. Traynor, Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation, Proceedings of the IEEE European Symposium on Security and Privacy (Euro S&P), March 2016. (acceptance rate: 17.3%)
  4. H. Carter, B. Mood, P. Traynor, K. Butler, Outsourcing Secure Two-Party Computation as a Black Box, Proceedings of the International Conference on Cryptology and Network Security (CANS), December 2015. (acceptance rate: 52.9%) (ePrint)
  5. N. Scaife, H. Carter, P. Traynor, OnionDNS: A Seizure-Resistant Top-Level Domain, Proceedings of the IEEE Conference on Communications and Network Security (CNS), September 2015. (acceptance rate: 28.1%) (pdf)
  6. B. Reaves, E. Shernan, A. Bates, H. Carter, P. Traynor, Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge, Proceedings of the USENIX Security Symposium (SECURITY), August 2015. (acceptance rate: 15.7%) (usenix)
  7. E. Shernan, H. Carter, D. Tian, P. Traynor, K. Butler, More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations, Proceedings of the International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA), July 2015. (acceptance rate: 22.7%) (pdf)
  8. H. Carter, C. Lever, P. Traynor, Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices, Proceedings of the Annual Computer Security Applications Conference (ACSAC), December 2014. (acceptance rate: 19.9%) (pdf) (ePrint)
  9. H. Carter, B. Mood, P. Traynor, K. Butler, Secure Outsourced Garbled Circuit Evaluation for Mobile Devices, Proceedings of the USENIX Security Symposium (SECURITY), August 2013. (acceptance rate: 16.2%) (usenix)
  10. P. Marquardt, A. Verma, H. Carter, P. Traynor, (sp)iPhone: Decoding Vibrations from Nearby Keyboards Using Mobile Phone Accelerometers, Proceedings of the ACM Conference on Computer and Communications Security (CCS), October 2011. (acceptance rate: 13.9%) (pdf)
  11. H. Carter and R. Bhandari, Improved Sliding Shortest Path Algorithm: Performance Analysis, Proceedings of the Southeastern International Conference on Combinatorics, Graph Theory and Computing, Congressus Numerantium, 207, March 2011. (pdf)

Workshops

  1. S. Deshmukh, H. Carter, G. Hernandez, P. Traynor, K. Butler, Efficient and Secure Template Blinding for Biometric Authentication, Proceedings of the IEEE Workshop on Security and Privacy in the Cloud (SPC), 2016.

Presentations

Cloud Computing: It’s a Fly Ball, NALS of Philadelphia Saturday CLE, Philadelphia, PA, March 2017.

Improving biometric authentication with Cloud-based SMC, New Jersey Institute of Technology CS Department Seminar, Newark, NJ, October 2016.

Outsourcing Secure Two-Party Computation as a Black Box, Poster presentation, USENIX Security Symposium, Washington, DC, August 2015.

Outsourcing Secure Two-Party Computation as a Black Box, Poster presentation, ISOC Network & Distributed System Security Symposium, San Diego, CA, February 2015.

Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices, Microsoft Research Workshop on Applied Multi-Party Computation, Redmond, WA, February 2014.

Outsourcing Secure Function Evaluation: set it and forget it!, Rump session, ISOC Network & Distributed System Security Symposium, San Diego, CA, February 2013.

Efficient Mobile Oblivious Computation (EMOC), Poster presentation, USENIX Security Symposium, San Francisco, CA, August 2011.

Media Coverage

Age of Pennsylvania's voting machines serves as safeguard against cyberattack, WHYY Morning Edition - (10/25/16)

Ransomware Attack In The Season Premier Of Mr. Robot Could Have Probably Been Stopped By CryptoDrop, Forbes - (7/14/16)

Ransomware 'stopped' by new software, BBC News - (7/12/16)

Researchers Develop A Way To Stop Ransomware By Watching The Filesystem, Slashdot - (7/8/16)

Extortion extinction: Researchers develop a way to stop ransomware, University of Florida News - (7/7/16)

Malware Uses Smartphone Accelerometers to Steal Keystrokes, PCWorld - (10/19/11)

iPhone keylogger can snoop on desktop typing, New Scientist - (10/18/11)

iPhone Keylogger Can Snoop On Desktop Typing, Slashdot - (10/18/11)

Smart Phones Could Hear Your Password, Technology Review - (10/18/11)

Turning iPhone into spiPhone: Smartphones' accelerometer can track strokes on nearby keyboards, PhysOrg.com - (10/18/11)

Bad vibrations: How smart phones could steal PC passwords, Government Computer News - (10/18/11)