Towards a Scalable Group Vehicle-based Security System |
Jason Carter and Nathanael Paul. In Proceedings of the Fourth Embedded Security in Cars (ESCAR) Conference. 2016. |
|
Analysis of Vehicle-based Security Operations |
Jason Carter and Nathanael Paul. In the Proceedings of the 24th Enhanced Safety of Vehicles Conference. Paper no. 15-0457. 2015. |
|
A Deployable SCADA Authentication Technique for Modern Power |
Curtis R. Taylor, Craig A. Shue, Nathanael R. Paul. IEEE International Energy Conference (ENERGYCON). May 2014 |
|
Using Bowel Sounds to Create a Forensically-aware Insulin Pump System |
Nathan Henry, Nathanael Paul, and Nicole McFarlane. 2013 USENIX Workshop on Health Information Technologies. August 2013. |
|
From an IP Address to a Street Address: Using Wireless Signals to Locate a Target |
Craig A. Shue, Nathanael Paul, and Curtis R. Taylor. Seventh USENIX Workshop on Offensive Technologies. August 2013. |
|
Security Risks, Low-tech User Interfaces, and Implantable Medical Devices: A Case Study with Insulin Pump Infusion Systems |
Nathanael Paul and Tadayoshi Kohno. Third USENIX Workshop on Health Security and Privacy. August 2012. |
|
A Review of the Security of Insulin Pump Infusion Systems |
Nathanael Paul, Ph.D., Tadayoshi Kohno, Ph.D., and David C. Klonoff, M.D., FACP. Journal of Diabetes Science and Technology, 5(6):1557-1562. November 2011. |
|
Insulin Pump System Security |
Nathanael Paul, Ph.D. and David C. Klonoff, M.D., FACP. First USENIX Workshop on Health Security and Privacy. August 2010. |
|
The Design of a Trustworthy Voting System |
Nathanael Paul and Andrew S. Tanenbaum. Twenty-Fifth Annual Computer Security Applications Conference (ACSAC). pp. 507-517, December 7-11, 2009. |
|
Trustworthy Voting: From Machine to System |
Nathanael Paul and Andrew S. Tanenbaum. IEEE Computer, May 2009. |
|
Comparing Java and .NET Security: Lessons Learned and Missed |
Nathanael Paul and David Evans. Computers & Security, Volume 25, Issue 5, July 2006. (extended version of ACSAC 2004 paper) |
|
Thermal Attacks on Storage Systems |
Nathanael Paul, Sudhanva Gurumurthi, and David Evans. NASA/IEEE Conference on Mass Storage Systems and Technologies (MSST), May 2006. |
|
Towards Disk-level Malware Detection |
Nathanael Paul, Sudhanva Gurumurthi, and David Evans. Workshop on Code Based Software Security Assessments (CoBaSSA), Pittsburgh, PA. November 7, 2005. For more information, go to: http://www.cs.virginia.edu/malware |
|
Where's the FEEB? The Effectiveness of Instruction Set Randomization (PDF, HTML) |
Ana Sovarel, David Evans, Nathanael Paul. Fourteenth USENIX Security Conference. July 31 - August 5, 2005, Baltimore, MD. |
|
.NET Security: Lessons Learned and Missed from Java |
Nathanael Paul and David Evans. Twentieth Annual Computer Security Applications Conference (ACSAC). December 6-10, 2004, Tucson, AZ. (slides: PPT) |
|
Election Security: Perception and Reality |
David Evans and Nathanael Paul. IEEE Security and Privacy, January-February 2004. |
|
Authentication for Remote Voting |
Nathanael Paul, David Evans, Avi Rubin, Dan Wallach. Workshop on Human-Computer Interaction and Security Systems. April 6, 2003, Ft. Lauderdale, FL. |
|
Abstracts |
Mitigating Solutions in Insulin Pump System Security |
Nathanael Paul and Brent Lagesse. Journal of Diabetes Science and Technology, 5(2):A128. March 2011. |
|