Up a level |
Abdou, A.R., Barrera, D., & Oorschot, P. C. (2015, December). What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks [Paper]. International Conference on Passwords (PASSWORDS 2015), Cambridge, UK. External link
Alsaleh, M., Barrera, D., & Oorschot, P. C. (2008, December). Improving Security Visualization with Exposure Map Filtering [Paper]. Annual Computer Security Applications Conference (ACSAC 2008), Anaheim, CA. External link
Barrera, D., McCarney, D., Clark, J., & Oorschot, P. C. (2014, July). Baton: certificate agility for android's decentralized signing infrastructure [Paper]. ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec 2014), Oxford, United Kingdom (12 pages). External link
Barrera, D., Enck, W., & Oorschot, P. C. (2012, May). Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems [Paper]. Mobile Security Technologies Workshop (IEEE MoST 2012), San Francisco, Calif. (10 pages). External link
Barrera, D., Clark, J., McCarney, D., & Oorschot, P. C. (2012, October). Understanding and improving app installation security mechanisms through empirical analysis of android [Paper]. 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Raleigh, North Carolina. External link
Barrera, D., Wurster, G., & Oorschot, P. C. (2011). Back to the Future: Revisiting IPv6 Privacy Extensions. ;Login:, 36(1), 16-26. External link
Barrera, D., & Oorschot, P. C. (2011). Secure Software Installation on Smartphones. IEEE Security & Privacy Magazine, 9(3), 42-48. External link
Barrera, D., & Oorschot, P. C. (2010). Accommodating IPv6 Addresses in Security Visualization Tools. Information Visualization, 10(2), 107-116. External link
Barrera, D., Kayacic, H. G., Oorschot, P. C. , & Somayaji, A. (2010, October). A methodology for empirical analysis of permission-based security models and its application to android [Paper]. 17th ACM Conference on Computer and Communications Security (CCS 2010), Chicago, Illinois. External link
Barrera, D., & Oorschot, P. C. (2009, October). Security visualization tools and IPv6 addresses [Paper]. 6th International Workshop on Visualization for Cyber Security (VizSec 2009), Atlantic City, NJ. External link
McCarney, D., Barrera, D., Clark, J., Chiasson, S., & Oorschot, P. C. (2012, December). Tapas: design, implementation, and usability evaluation of a password manager [Paper]. 28th Annual Computer Security Applications Conference (ACSAC 2012), Orlando, Florida. External link
Mannan, M., Barrera, D., Brown, C. D., Lie, D., & Oorschot, P. C. (2011, February). Mercury: Recovering Forgotten Passwords Using Personal Devices [Paper]. 15th International Conference on Financial Cryptography and Data Security (FC 2011), Gros Islet, St. Lucia. External link
Skillen, A., Barrera, D., & Oorschot, P. C. (2013, November). Deadbolt: locking down android disk encryption [Paper]. ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Berlin, Germany. External link