BibTeX References

Click the copy button to copy an entry to your clipboard.

Bellman23
@article{Bellman23,
    author = {Barrera, David and Bellman, Christopher and van Oorschot, Paul C},
    title = {{A Close Look at a Systematic Method for Analyzing Sets of Security Advice}},
    journal = {Journal of Cybersecurity},
    volume = {9},
    number = {1},
    year = {2023},
    month = {Jul},
    issn = {2057-2085},
    doi = {10.1093/cybsec/tyad013},
    url = {https://doi.org/10.1093/cybsec/tyad013},
    eprint = {https://academic.oup.com/cybersecurity/article-pdf/9/1/tyad013/50781802/tyad013.pdf},
}
Bradley23
@inproceedings{Bradley23,
	author = {Bradley, Conner and Barrera, David},
	booktitle = {Foundations and Practice of Security},
	editor = {Jourdan, Guy-Vincent and Mounier, Laurent and Adams, Carlisle and S{\`e}des, Florence and Garcia-Alfaro, Joaquin},
	title = {{Towards Characterizing IoT Software Update Practices}},
	doi       = {10.1007/978-3-031-30122-3_25},
	month = apr,
	publisher = {Springer Nature Switzerland},
	pages = {406--422},
	year = {2023},
Tam23
@inproceedings{Tam23,
	author = {Tam, Anthony and Alaca, Furkan and Barrera, David},
	booktitle = {Foundations and Practice of Security},
	editor = {Jourdan, Guy-Vincent and Mounier, Laurent and Adams, Carlisle and S{\`e}des, Florence and Garcia-Alfaro, Joaquin},
	title = {{If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes}},
	doi       = {10.1007/978-3-031-30122-3_23},
	month = apr,
	publisher = {Springer Nature Switzerland},
	pages = {373--388},
	year = {2023},
neal20
@article{neal20,
	author = {Neal, Christopher and de Miceli, Jean-Yves and Barrera, David and Fernandez, Jos\'{e} M.},
	title = {{Ontology-Based Anomaly Detection for Air Traffic Control Systems}},
    year = {2022},
	journal = {arXiv/2207.00637},
	archivePrefix = "arXiv",
	eprint = {2207.00637},
Bellman22
@article{Bellman22,
	author = {Barrera, David and Bellman, Christopher and van Oorschot, P.C.},
	title = {{IoT Security Best Practices: A Critical Analysis}},
	year = {2023},
	journal = {ACM Transactions on Privacy and Security},
	volume = {26},
	number = {2},
	pages = {13:1--13:30}
}
aranda21
@misc{aranda21,
	author = {Jimenez Aranda, Itzael and Barrera, David},
	title = {{Disco Inferno: Securing IoT Service Discovery Protocols}},
	year = {2022},
bpfcontaintr
@article{bpfcontaintr,
  author    = {William Findlay and
               David Barrera and
               Anil Somayaji},
  title     = {{BPFContain: Fixing the Soft Underbelly of Container Security}},
  journal = {arXiv/2102.06972},
  archivePrefix = "arXiv",
  year      = {2021},
  url       = {https://arxiv.org/abs/2102.06972},
  archivePrefix = {arXiv},
  eprint    = {2102.06972},
  timestamp = {Thu, 18 Feb 2021 15:26:00 +0100},
  biburl    = {https://dblp.org/rec/journals/corr/abs-2102-06972.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org},
Edit21
@article{Edit21,
    author = {Kollek, Daniel and Barrera, David and Stobert, Elizabeth and Homier, Valerie},
    title = {{The EDIT Survey: Identifying Emergency Department Information Technology Knowledge and Training Gaps}},
    journal = {{Journal of Disaster Medicine and Public Health Preparedness}},
    year = 2021,
    publisher = {Cambridge University Press},
	doi= {10.1017/dmp.2020.474}    
}
Findlay20
@inproceedings{Findlay20,
       author = {Findlay, William and Somayaji, Anil and Barrera, David},
        title = "{{bpfbox: Simple Precise Process Confinement with eBPF}}",
        booktitle = {ACM Cloud Computing Security Workshop (CCSW)},
        year = 2020,
        doi = {10.1145/3411495.3421358},
Thomasset20
@inproceedings{Thomasset20,
       author = {{Thomasset}, Corentin and {Barrera}, David},
        title = "{SERENIoT: Collaborative Network Security Policy Management and Enforcement for Smart Homes}",
        booktitle = {Annual Computer Security Applications Conference (ACSAC)},
         year = 2020,
        pages = {542--555},
Stobert20
@inproceedings{Stobert20,
 author = {Stobert, Elizabeth and Barrera, David and Homier, Val\'{e}rie and Kollek, Daniel},
 title = {{Understanding Cybersecurity Practices in Emergency Departments}},
 year = {2020},
 isbn = {9781450367080},
 publisher = {ACM},
 url = {https://doi-org.proxy.library.carleton.ca/10.1145/3313831.3376881},
 doi = {10.1145/3313831.3376881},
 booktitle = {Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems},
 keywords = {hospitals, usability, medicine, security},
 location = {Honolulu, HI, USA},
 series = {CHI’20},
 pages = {1--8},
Barrera2018
@inproceedings{Barrera2018,
 author = {Barrera, David and Molloy, Ian and Huang, Heqing},
 title = {{Standardizing IoT Network Security Policy Enforcement}},
 booktitle = {Proceedings of the NDSS Workshop on Decentralized IoT Security and Standards (DISS)},
 year = {2018},
Chen2018
@inproceedings{Chen2018,
 author = {Chen, Chen and Asoni, Daniele E. and Perrig, Adrian and Barrera, David and Danezis, George and Troncoso, Carmela},
 title = {{TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer}},
 booktitle = {Proceedings of the IEEE European Symposium on Security and Privacy (EuroS\&P)},
 pages = {137-152},
 year = {2018},
scionbook
@book{scionbook,
	booktitle   = "SCION: A Secure Internet Architecture",
 	publisher   = "Springer International Publishing",
 	author = {Perrig, Adrian and Szalachowski, Pawel and Reischuk, Raphael M. and Chuat, Laurent},
 	doi = "10.1007/978-3-319-67080-5",
 	isbn = "978-3-319-67079-9",
 	edition = 1,
 	year = 2017

}
scionbookchp1
@incollection{scionbookchp1,
  author      = "Barrera, David and Chuat, Laurent and Perrig, Adrian and Reischuk, Raphael M. and Szalachowski, Pawel",
  title       = "Introduction",
  booktitle   = "SCION: A Secure Internet Architecture",
  publisher   = "Springer International Publishing",
  year        = 2017,
  pages       = "1-16",
  chapter     = 1,
}
scionbookchp2
@incollection{scionbookchp2,
  author      = "Barrera, David and Chuat, Laurent and Perrig, Adrian and Reischuk, Raphael M. and Szalachowski, Pawel",
  title       = {{The SCION Architecture}},
  booktitle   = "SCION: A Secure Internet Architecture",
  publisher   = "Springer International Publishing",
  year        = 2017,
  pages       = "17-45",
  chapter     = 2,
}
scionbookchp13
@incollection{scionbookchp13,
  author      = "Barrera, David and Klenze, Tobias and Perrig, Adrian and Reischuk, Raphael M. and Rothenberger, Benjamin and Szalachowski, Pawel",
  title       = "{{Security Analysis}}",
  booktitle   = "SCION: A Secure Internet Architecture",
  publisher   = "Springer International Publishing",
  year        = 2017,
  pages       = "319-351",
  chapter     = 13,
}
scionbookchp14
@incollection{scionbookchp14,
  author      = "Barrera, David and Chen, Chen and Perrig, Adrian",
  title       = "{{Power Consumption}}",
  booktitle   = "SCION: A Secure Internet Architecture",
  publisher   = "Springer International Publishing",
  year        = 2017,
  pages       = "353-360",
  chapter     = 14,
}
scioncacm
@article{scioncacm,
 author = {Barrera, David and Chuat, Laurent and Perrig, Adrian and Reischuk, Raphael M. and Szalachowski, Pawel},
 title = {{The SCION Internet Architecture}},
 journal = {Communications of the ACM},
 issue_date = {June 2017},
 volume = {60},
 number = {6},
 month = may,
 year = {2017},
 issn = {0001-0782},
 pages = {56--65},
 numpages = {10},
 url = {http://doi.acm.org/10.1145/3085591},
 doi = {10.1145/3085591},
 acmid = {3085591},
 publisher = {ACM},
}
Rothenbergerks
@inproceedings{Rothenbergerks,
 author = {Rothenberger, Benjamin and Asoni, Daniele E. and Barrera, David and Perrig, Adrian},
 title = {{Internet Kill Switches Demystified}},
 booktitle = {Proceedings of the 10th European Workshop on Systems Security},
 series = {EuroSec'17},
 year = {2017},
 isbn = {978-1-4503-4935-2},
 location = {Belgrade, Serbia},
 month = apr,
 pages = {1--6},
 articleno = {5},
 numpages = {6},
 url = {http://doi.acm.org/10.1145/3065913.3065922},
 doi = {10.1145/3065913.3065922},
 acmid = {3065922},
 publisher = {ACM},
 keywords = {BGPsec, Centralized key architectures, DNSSEC, Kill switches},
Apna2016
@inproceedings{Apna2016,
 author = {Lee, Taeho and Pappas, Christos and Barrera, David and Szalachowski, Pawel and Perrig, Adrian},
 title = {{Source Accountability with Domain-brokered Privacy}},
 booktitle = {Proceedings of the ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT)},
 year = {2016},
 isbn = {978-1-4503-4292-6},
 location = {Irvine, California, USA},
 pages = {345--358},
 numpages = {14},
 month = dec,
 url = {http://doi.acm.org/10.1145/2999572.2999581},
 doi = {10.1145/2999572.2999581},
 acmid = {2999581},
 publisher = {ACM},
 keywords = {accountability, network architecture, privacy},
ChenEnergy2016
@InProceedings{ChenEnergy2016,
    author = {Chen, Chen and Barrera, David and Perrig, Adrian},
    title = {{Modeling Data-Plane Power Consumption of Future Internet Architectures}},
    booktitle = {Proceedings of the IEEE Conference on Collaboration and Internet Computing (CIC)},
    url = {http://www.netsec.ethz.ch/publications/papers/chen_energy_cic16.pdf},
    doi = {10.1109/CIC.2016.031},
    pages={149-158}, 
    year = 2016,
    month = nov
}
Stobert2016
@inproceedings{Stobert2016,
	author = {Elizabeth Stobert and David Barrera},
	title = {{Picking a (Smart)Lock: Locking Relationships on Mobile Devices (short paper)}},
	booktitle = {Proceedings of Who Are You?!: Adventures in Authentication Workshop (WAY)},
	year = 2016,
	month = jun,
Asoni2015
@inproceedings{Asoni2015,
	author = {Asoni, Daniele E. and Chen, Chen and Barrera, David and Perrig, Adrian},
	booktitle = {IFIP WG 11.4 International Workshop (iNetSec). Revised Selected Papers},
	series = {Open Problems in Network Security},
	editor = {Kesdogan, Dogan and Camenisch, Jan},
	title = {{On Building Onion Routing into Future Internet Architectures}},
	url = {http://www.netsec.ethz.ch/publications/papers/inetsec_2015_onion_routing.pdf},
	doi       = {10.1007/978-3-319-39028-4_6},
	month = oct,
	publisher = {Springer LNCS vol. 9591},
	pages = {71--81},
	year = {2015}
}
Abdou2015
@inproceedings{Abdou2015,
	author = {AbdelRahman Abdou and David Barrera and Paul C. van Oorschot},
	title = {{What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks}},
	booktitle = {{Proceedings of the International Conference on Passwords}},
	year = {2015},
	pages = {72-91},
  url = {http://people.inf.ethz.ch/barrerad/files/passwords15-abdou.pdf}
}
dena
@article{dena,
    author = {Tae-Ho Lee and Pawel Szalachowski and David Barrera and Adrian Perrig and Heejo Lee and David Watrin},
    title = "{Bootstrapping Real-world Deployment of Future Internet Architectures}",
    journal = {arXiv/1508.02240},
    archivePrefix = "arXiv",
    primaryClass = "cs.NI",
    year = 2015,
    month = aug,
    online = {http://arxiv.org/abs/1508.02240},
    hidden = 1,
Chen2015
@inproceedings{Chen2015,
 author = {Chen, Chen and Asoni, Daniele E. and Barrera, David and Danezis, George and Perrig, Adrian},
 title = {{HORNET: High-speed Onion Routing at the Network Layer}},
 booktitle = {Proceedings of the Conference on Computer and Communications Security (CCS)},
 year = {2015},
 isbn = {978-1-4503-3832-5},
 location = {Denver, Colorado, USA},
 pages = {1441--1454},
 numpages = {14},
 url = {http://doi.acm.org/10.1145/2810103.2813628},
 doi = {10.1145/2810103.2813628},
 acmid = {2813628},
 url = {http://people.inf.ethz.ch/barrerad/files/ccs15-chen.pdf},
 publisher = {ACM},
 keywords = {anonymity, network layer, onion routing},
Eskandari2015
@inproceedings{Eskandari2015,
	author = {Eskandari, Shayan and Barrera, David and Stobert, Elizabeth and Clark, Jeremy},
	booktitle = {Proceedings of the NDSS Workshop on Usable Security (USEC)},
	title = {{A First Look at the Usability of Bitcoin Key Management}},
	year = {2015},
	month = feb,
Barrera2014
@inproceedings{Barrera2014,
	author = {Barrera, David and McCarney, Daniel and Clark, Jeremy and van Oorschot, P.C.},
	booktitle = {Proceedings of the Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)},
	title = {{Baton: Certificate Agility for Android's Decentralized Signing Infrastructure}},
	year = {2014},
	pages = {1--12},
	 isbn = {978-1-4503-2972-9},
 location = {Oxford, United Kingdom},
  doi = {10.1145/2627393.2627397},
 acmid = {2627397},
	url = {http://people.inf.ethz.ch/barrerad/files/wisec14-barrera.pdf},
Skillen2013a
@inproceedings{Skillen2013a,
  author = {Skillen, Adam and Barrera, David and van Oorschot, P.C.},
  booktitle = {Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)},
  title = {{Deadbolt: Locking Down Android Encryption}},
  year = {2013},
  month = nov,
  url = {http://people.inf.ethz.ch/barrerad/files/spsm13-skillen.pdf},
  gsid = {5658174206702416292},
   isbn = {978-1-4503-2491-5},
 location = {Berlin, Germany},
  doi = {10.1145/2516760.2516771},
 acmid = {2516771},
 pages = {3--14},
 numpages = {12},
TR-13-03
@techreport{TR-13-03,
	author = {Barrera, David and McCarney, Daniel and Clark, Jeremy and van Oorschot, P.C.},
	title = {{Baton: Key Agility for Android without a Centralized Certificate Infrastructure}},
	institution = {{School of Computer Science, Carleton University}},
	year = {2013},
	number = {TR-13-03},
	url = {http://people.inf.ethz.ch/barrerad/files/TR-13-03.pdf}
}
Jarabek2012
@inproceedings{Jarabek2012,
	author = {Jarabek, Chris and Barrera, David and Aycock, John},
	booktitle = {Proceedings of the Annual Computer Security Applications Conference (ACSAC)},
	keywords = {cloud-based anti-malware, android},
	title = {{ThinAV: Truly Lightweight Mobile Cloud-based Anti-malware}},
	year = {2012},
	isbn = {978-1-4503-1312-4},
	location = {Orlando, Florida, USA},
	pages = {209--218},
	numpages = {10},
	doi = {10.1145/2420950.2420983},
	month = dec,
	acmid = {2420983},
	url = {http://people.inf.ethz.ch/barrerad/files/acsac12-jarabek.pdf},
	gsid = {2733144770976543485},
Mccarney2012
@inproceedings{Mccarney2012,
  author = {McCarney, Daniel and Barrera, David and Clark, Jeremy and Chiasson, Sonia and van Oorschot, P.C.},
  booktitle = {Proceedings of the Annual Computer Security Applications Conference (ACSAC)},
  keywords = {Authentication, smartphones, password managers},
  title = {{Tapas: Design, Implementation, and Usability Evaluation of a Password Manager}},
  gsid = {62662389496250191},
  year = {2012},
  pages = {89--98},
  doi = {10.1145/2420950.2420964},
  acmid = {2420964},
  isbn = {978-1-4503-1312-4},
  location = {Orlando, Florida, USA},
  month = dec,
  publisher = {ACM}
}
Barrera2012a
@inproceedings{Barrera2012a,
	author = {Barrera, David and Clark, Jeremy and McCarney, Daniel and van Oorschot, P.C.},
	booktitle = {Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)},
	keywords = {Android, app markets, software installation, smartphones},
	title = {{Understanding and Improving App Installation Security Mechanisms through Empirical Analysis of Android}},
	year = {2012},
	gsid = {8143814181445194737},
	url = {http://people.inf.ethz.ch/barrerad/files/spsm12-barrera.pdf},
	pages = {81--92},
	isbn = {978-1-4503-1666-8},
 	location = {Raleigh, North Carolina, USA},
 	month = oct,
 	doi = {10.1145/2381934.2381949},
 	acmid = {2381949},
Barrera2012
@inproceedings{Barrera2012,
	author = {Barrera, David and Enck, William and van Oorschot, P.C.},
	booktitle = {Proceedings of the Mobile Security Technologies Workshop (MoST)},
	keywords = {Android, app markets, software installation, smartphones},
	title = {{Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems}},
	url = {http://people.inf.ethz.ch/barrerad/files/most12-barrera.pdf},
	year = {2012},
	month = may,
Barrera2011
@article{Barrera2011,
	author = {Barrera, David and van Oorschot, P.C.},
	doi = {10.1109/MSP.2010.202},
	url = {http://people.inf.ethz.ch/barrerad/files/spmag11-barrera.pdf},
	issn = {1540-7993},
	journal = {IEEE Security \& Privacy Magazine},
	month = may,
	number = {3},
	pages = {42--48},
	publisher = {IEEE},
	title = {{Secure Software Installation on Smartphones}},
	gsid = {16547079747952868433,16567674645391066203},
	volume = {9},
	keywords = {software installation, smartphones},
	year = {2011}
}
Barrera2011a
@article{Barrera2011a,
	author = {Barrera, David and Wurster, Glenn and van Oorschot, P.C.},
	journal = {;LOGIN: The USENIX Magazine},
	number = {1},
	pages = {16--26},
	title = {{Back to the Future: Revisiting IPv6 Privacy Extensions}},
	url = {http://people.inf.ethz.ch/barrerad/files/login11-barrera.pdf},
	volume = {36},
	gsid = {1895826470863550510},
	keywords = {IPv6, privacy},
	year = {2011}
}
Mannan2011
@inproceedings{Mannan2011,
	author = {Mannan, Mohammad and Barrera, David and Brown, Carson and Lie, David and van Oorschot, P.C.},
	booktitle = {Proceedings of the International Conference on Financial Cryptography and Data Security (FC)},
	title = {{Mercury: Recovering Forgotten Passwords Using Personal Devices}},
	url = {http://people.inf.ethz.ch/barrerad/files/fc11-mannan.pdf},
	keywords= {smartphones, authentication},
	gsid = {2154434835358577395},
	isbn = {978-3-642-27575-3},
	location = {Gros Islet, St. Lucia},
	pages = {315--330},
	numpages = {16},
	acmid = {2186410},
	publisher = {Springer},
Barrera2010a
@inproceedings{Barrera2010a,
	author = {Barrera, David and Kayacik, H.G. and van Oorschot, P.C. and Somayaji, Anil},
	booktitle = {Proceedings of the Conference on Computer and Communications Security (CCS)},
	isbn = {9781450302449},
	pages = {73--84},
	publisher = {ACM},
	location = {Chicago, Illinois, USA},
	acmid = {1866317},
	doi = {10.1145/1866307.1866317},
	month = oct,
	title = {{A Methodology for Empirical Analysis of Permission-based Security Models and its Application to Android}},
	url = {http://people.inf.ethz.ch/barrerad/files/ccs10-barrera.pdf},
	gsid = {8975566474498956442},
	keywords = {Android, permissions, visualization},
Brown2009
@inproceedings{Brown2009,
	author = {Brown, Carson and Barrera, David and Deugo, Dwight},
	booktitle = {Proceedings of the International Conference on Software Engineering and Knowledge Engineering (SEKE)},
	pages = {536--541},
	title = {{FiGD: An Open Source Intellectual Property Violation Detector}},
	gsid = {16350193836452516369},
	url = {http://people.inf.ethz.ch/barrerad/files/seke09-brown.pdf},
    location = {Boston, MA},
	year = {2009}
}
Barrera2009
@inproceedings{Barrera2009,
	author = {Barrera, David and van Oorschot, P.C.},
	booktitle = {Proceedings of the International Workshop on Visualization for Cyber Security (VizSec)},
	doi = {10.1109/VIZSEC.2009.5375538},
	pages = {21--26},
	title = {{Security Visualization Tools and IPv6 Addresses}},
	url = {http://people.inf.ethz.ch/barrerad/files/vizsec09-barrera.pdf},
	gsid = {4022150601082550908},
	keywords = {IPv6, visualization},
Barrera2010
@article{Barrera2010,
	author = {Barrera, David and van Oorschot, P.C.},
	journal = {SAGE Information Visualization},
	doi = {10.1057/ivs.2010.9},
	pages = {107--116},
	volume = {10},
	number = {2},
	title = {{Accommodating IPv6 Addresses in Security Visualization Tools}},
	url = {http://people.inf.ethz.ch/barrerad/files/infovis10-barrera.pdf},
	keywords = {IPv6, visualization},
	publisher = {SAGE},
	year = {2010}
}
Alsaleh2008
@inproceedings{Alsaleh2008,
	author = {Alsaleh, Mansour and Barrera, David and van Oorschot, P.C.},
	booktitle = {Proceedings of the Annual Computer Security Applications Conference (ACSAC)},
	doi = {10.1109/ACSAC.2008.16},
	isbn = {978-0-7695-3447-3},
	month = dec,
	pages = {205--214},
	publisher = {ACM},
	title = {{Improving Security Visualization with Exposure Map Filtering}},
	url = {http://people.inf.ethz.ch/barrerad/files/acsac08-alsaleh.pdf},
	gsid = {18024151230118129763},
	keywords = {visualization},
Barrera2009a
@mastersthesis{Barrera2009a,
	title = {{Towards Classifying and Selecting Appropriate Security Visualization Techniques}},
	author = {David Barrera},
	url = {http://people.inf.ethz.ch/barrerad/files/barrera-thesis09.pdf},
	school = {Carleton University},
	year = {2009}
}
Barrera2014a
@phdthesis{Barrera2014a,
	title = {{Securing Decentralized Software Installation and Updates}},
	author = {David Barrera},
	url = {http://people.inf.ethz.ch/barrerad/files/Barrera_PhD.pdf},
	school = {Carleton University},
	year = {2014}
}