| Towards a Scalable Group Vehicle-based Security System |
| Jason Carter and Nathanael Paul. In Proceedings of the Fourth Embedded Security in Cars (ESCAR) Conference. 2016. |
|
| Analysis of Vehicle-based Security Operations |
| Jason Carter and Nathanael Paul. In the Proceedings of the 24th Enhanced Safety of Vehicles Conference. Paper no. 15-0457. 2015. |
|
| A Deployable SCADA Authentication Technique for Modern Power |
| Curtis R. Taylor, Craig A. Shue, Nathanael R. Paul. IEEE International Energy Conference (ENERGYCON). May 2014 |
|
| Using Bowel Sounds to Create a Forensically-aware Insulin Pump System |
| Nathan Henry, Nathanael Paul, and Nicole McFarlane. 2013 USENIX Workshop on Health Information Technologies. August 2013. |
|
| From an IP Address to a Street Address: Using Wireless Signals to Locate a Target |
| Craig A. Shue, Nathanael Paul, and Curtis R. Taylor. Seventh USENIX Workshop on Offensive Technologies. August 2013. |
|
| Security Risks, Low-tech User Interfaces, and Implantable Medical Devices: A Case Study with Insulin Pump Infusion Systems |
| Nathanael Paul and Tadayoshi Kohno. Third USENIX Workshop on Health Security and Privacy. August 2012. |
|
| A Review of the Security of Insulin Pump Infusion Systems |
| Nathanael Paul, Ph.D., Tadayoshi Kohno, Ph.D., and David C. Klonoff, M.D., FACP. Journal of Diabetes Science and Technology, 5(6):1557-1562. November 2011. |
|
| Insulin Pump System Security |
| Nathanael Paul, Ph.D. and David C. Klonoff, M.D., FACP. First USENIX Workshop on Health Security and Privacy. August 2010. |
|
| The Design of a Trustworthy Voting System |
| Nathanael Paul and Andrew S. Tanenbaum. Twenty-Fifth Annual Computer Security Applications Conference (ACSAC). pp. 507-517, December 7-11, 2009. |
|
| Trustworthy Voting: From Machine to System |
| Nathanael Paul and Andrew S. Tanenbaum. IEEE Computer, May 2009. |
|
| Comparing Java and .NET Security: Lessons Learned and Missed |
| Nathanael Paul and David Evans. Computers & Security, Volume 25, Issue 5, July 2006. (extended version of ACSAC 2004 paper) |
|
| Thermal Attacks on Storage Systems |
| Nathanael Paul, Sudhanva Gurumurthi, and David Evans. NASA/IEEE Conference on Mass Storage Systems and Technologies (MSST), May 2006. |
|
| Towards Disk-level Malware Detection |
Nathanael Paul, Sudhanva Gurumurthi, and David Evans. Workshop on Code Based Software Security Assessments (CoBaSSA), Pittsburgh, PA. November 7, 2005. For more information, go to: http://www.cs.virginia.edu/malware |
|
| Where's the FEEB? The Effectiveness of Instruction Set Randomization (PDF, HTML) |
| Ana Sovarel, David Evans, Nathanael Paul. Fourteenth USENIX Security Conference. July 31 - August 5, 2005, Baltimore, MD. |
|
| .NET Security: Lessons Learned and Missed from Java |
Nathanael Paul and David Evans. Twentieth Annual Computer Security Applications Conference (ACSAC). December 6-10, 2004, Tucson, AZ. (slides: PPT) |
|
| Election Security: Perception and Reality |
| David Evans and Nathanael Paul. IEEE Security and Privacy, January-February 2004. |
|
| Authentication for Remote Voting |
| Nathanael Paul, David Evans, Avi Rubin, Dan Wallach. Workshop on Human-Computer Interaction and Security Systems. April 6, 2003, Ft. Lauderdale, FL. |
|
Abstracts |
| Mitigating Solutions in Insulin Pump System Security |
| Nathanael Paul and Brent Lagesse. Journal of Diabetes Science and Technology, 5(2):A128. March 2011. |
|