Click the copy button to copy an entry to your clipboard.
Bellman23
@article{Bellman23,
author = {Barrera, David and Bellman, Christopher and van Oorschot, Paul C},
title = {{A Close Look at a Systematic Method for Analyzing Sets of Security Advice}},
journal = {Journal of Cybersecurity},
volume = {9},
number = {1},
year = {2023},
month = {Jul},
issn = {2057-2085},
doi = {10.1093/cybsec/tyad013},
url = {https://doi.org/10.1093/cybsec/tyad013},
eprint = {https://academic.oup.com/cybersecurity/article-pdf/9/1/tyad013/50781802/tyad013.pdf},
}
Bradley23
@inproceedings{Bradley23,
author = {Bradley, Conner and Barrera, David},
booktitle = {Foundations and Practice of Security},
editor = {Jourdan, Guy-Vincent and Mounier, Laurent and Adams, Carlisle and S{\`e}des, Florence and Garcia-Alfaro, Joaquin},
title = {{Towards Characterizing IoT Software Update Practices}},
doi = {10.1007/978-3-031-30122-3_25},
month = apr,
publisher = {Springer Nature Switzerland},
pages = {406--422},
year = {2023},
Tam23
@inproceedings{Tam23,
author = {Tam, Anthony and Alaca, Furkan and Barrera, David},
booktitle = {Foundations and Practice of Security},
editor = {Jourdan, Guy-Vincent and Mounier, Laurent and Adams, Carlisle and S{\`e}des, Florence and Garcia-Alfaro, Joaquin},
title = {{If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes}},
doi = {10.1007/978-3-031-30122-3_23},
month = apr,
publisher = {Springer Nature Switzerland},
pages = {373--388},
year = {2023},
neal20
@article{neal20,
author = {Neal, Christopher and de Miceli, Jean-Yves and Barrera, David and Fernandez, Jos\'{e} M.},
title = {{Ontology-Based Anomaly Detection for Air Traffic Control Systems}},
year = {2022},
journal = {arXiv/2207.00637},
archivePrefix = "arXiv",
eprint = {2207.00637},
Bellman22
@article{Bellman22,
author = {Barrera, David and Bellman, Christopher and van Oorschot, P.C.},
title = {{IoT Security Best Practices: A Critical Analysis}},
year = {2023},
journal = {ACM Transactions on Privacy and Security},
volume = {26},
number = {2},
pages = {13:1--13:30}
}
aranda21
@misc{aranda21,
author = {Jimenez Aranda, Itzael and Barrera, David},
title = {{Disco Inferno: Securing IoT Service Discovery Protocols}},
year = {2022},
bpfcontaintr
@article{bpfcontaintr,
author = {William Findlay and
David Barrera and
Anil Somayaji},
title = {{BPFContain: Fixing the Soft Underbelly of Container Security}},
journal = {arXiv/2102.06972},
archivePrefix = "arXiv",
year = {2021},
url = {https://arxiv.org/abs/2102.06972},
archivePrefix = {arXiv},
eprint = {2102.06972},
timestamp = {Thu, 18 Feb 2021 15:26:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2102-06972.bib},
bibsource = {dblp computer science bibliography, https://dblp.org},
Edit21
@article{Edit21,
author = {Kollek, Daniel and Barrera, David and Stobert, Elizabeth and Homier, Valerie},
title = {{The EDIT Survey: Identifying Emergency Department Information Technology Knowledge and Training Gaps}},
journal = {{Journal of Disaster Medicine and Public Health Preparedness}},
year = 2021,
publisher = {Cambridge University Press},
doi= {10.1017/dmp.2020.474}
}
Findlay20
@inproceedings{Findlay20,
author = {Findlay, William and Somayaji, Anil and Barrera, David},
title = "{{bpfbox: Simple Precise Process Confinement with eBPF}}",
booktitle = {ACM Cloud Computing Security Workshop (CCSW)},
year = 2020,
doi = {10.1145/3411495.3421358},
Thomasset20
@inproceedings{Thomasset20,
author = {{Thomasset}, Corentin and {Barrera}, David},
title = "{SERENIoT: Collaborative Network Security Policy Management and Enforcement for Smart Homes}",
booktitle = {Annual Computer Security Applications Conference (ACSAC)},
year = 2020,
pages = {542--555},
Stobert20
@inproceedings{Stobert20,
author = {Stobert, Elizabeth and Barrera, David and Homier, Val\'{e}rie and Kollek, Daniel},
title = {{Understanding Cybersecurity Practices in Emergency Departments}},
year = {2020},
isbn = {9781450367080},
publisher = {ACM},
url = {https://doi-org.proxy.library.carleton.ca/10.1145/3313831.3376881},
doi = {10.1145/3313831.3376881},
booktitle = {Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems},
keywords = {hospitals, usability, medicine, security},
location = {Honolulu, HI, USA},
series = {CHI’20},
pages = {1--8},
Barrera2018
@inproceedings{Barrera2018,
author = {Barrera, David and Molloy, Ian and Huang, Heqing},
title = {{Standardizing IoT Network Security Policy Enforcement}},
booktitle = {Proceedings of the NDSS Workshop on Decentralized IoT Security and Standards (DISS)},
year = {2018},
Chen2018
@inproceedings{Chen2018,
author = {Chen, Chen and Asoni, Daniele E. and Perrig, Adrian and Barrera, David and Danezis, George and Troncoso, Carmela},
title = {{TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer}},
booktitle = {Proceedings of the IEEE European Symposium on Security and Privacy (EuroS\&P)},
pages = {137-152},
year = {2018},
scionbook
@book{scionbook,
booktitle = "SCION: A Secure Internet Architecture",
publisher = "Springer International Publishing",
author = {Perrig, Adrian and Szalachowski, Pawel and Reischuk, Raphael M. and Chuat, Laurent},
doi = "10.1007/978-3-319-67080-5",
isbn = "978-3-319-67079-9",
edition = 1,
year = 2017
}
scionbookchp1
@incollection{scionbookchp1,
author = "Barrera, David and Chuat, Laurent and Perrig, Adrian and Reischuk, Raphael M. and Szalachowski, Pawel",
title = "Introduction",
booktitle = "SCION: A Secure Internet Architecture",
publisher = "Springer International Publishing",
year = 2017,
pages = "1-16",
chapter = 1,
}
scionbookchp2
@incollection{scionbookchp2,
author = "Barrera, David and Chuat, Laurent and Perrig, Adrian and Reischuk, Raphael M. and Szalachowski, Pawel",
title = {{The SCION Architecture}},
booktitle = "SCION: A Secure Internet Architecture",
publisher = "Springer International Publishing",
year = 2017,
pages = "17-45",
chapter = 2,
}
scionbookchp13
@incollection{scionbookchp13,
author = "Barrera, David and Klenze, Tobias and Perrig, Adrian and Reischuk, Raphael M. and Rothenberger, Benjamin and Szalachowski, Pawel",
title = "{{Security Analysis}}",
booktitle = "SCION: A Secure Internet Architecture",
publisher = "Springer International Publishing",
year = 2017,
pages = "319-351",
chapter = 13,
}
scionbookchp14
@incollection{scionbookchp14,
author = "Barrera, David and Chen, Chen and Perrig, Adrian",
title = "{{Power Consumption}}",
booktitle = "SCION: A Secure Internet Architecture",
publisher = "Springer International Publishing",
year = 2017,
pages = "353-360",
chapter = 14,
}
scioncacm
@article{scioncacm,
author = {Barrera, David and Chuat, Laurent and Perrig, Adrian and Reischuk, Raphael M. and Szalachowski, Pawel},
title = {{The SCION Internet Architecture}},
journal = {Communications of the ACM},
issue_date = {June 2017},
volume = {60},
number = {6},
month = may,
year = {2017},
issn = {0001-0782},
pages = {56--65},
numpages = {10},
url = {http://doi.acm.org/10.1145/3085591},
doi = {10.1145/3085591},
acmid = {3085591},
publisher = {ACM},
}
Rothenbergerks
@inproceedings{Rothenbergerks,
author = {Rothenberger, Benjamin and Asoni, Daniele E. and Barrera, David and Perrig, Adrian},
title = {{Internet Kill Switches Demystified}},
booktitle = {Proceedings of the 10th European Workshop on Systems Security},
series = {EuroSec'17},
year = {2017},
isbn = {978-1-4503-4935-2},
location = {Belgrade, Serbia},
month = apr,
pages = {1--6},
articleno = {5},
numpages = {6},
url = {http://doi.acm.org/10.1145/3065913.3065922},
doi = {10.1145/3065913.3065922},
acmid = {3065922},
publisher = {ACM},
keywords = {BGPsec, Centralized key architectures, DNSSEC, Kill switches},
Apna2016
@inproceedings{Apna2016,
author = {Lee, Taeho and Pappas, Christos and Barrera, David and Szalachowski, Pawel and Perrig, Adrian},
title = {{Source Accountability with Domain-brokered Privacy}},
booktitle = {Proceedings of the ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT)},
year = {2016},
isbn = {978-1-4503-4292-6},
location = {Irvine, California, USA},
pages = {345--358},
numpages = {14},
month = dec,
url = {http://doi.acm.org/10.1145/2999572.2999581},
doi = {10.1145/2999572.2999581},
acmid = {2999581},
publisher = {ACM},
keywords = {accountability, network architecture, privacy},
ChenEnergy2016
@InProceedings{ChenEnergy2016,
author = {Chen, Chen and Barrera, David and Perrig, Adrian},
title = {{Modeling Data-Plane Power Consumption of Future Internet Architectures}},
booktitle = {Proceedings of the IEEE Conference on Collaboration and Internet Computing (CIC)},
url = {http://www.netsec.ethz.ch/publications/papers/chen_energy_cic16.pdf},
doi = {10.1109/CIC.2016.031},
pages={149-158},
year = 2016,
month = nov
}
Stobert2016
@inproceedings{Stobert2016,
author = {Elizabeth Stobert and David Barrera},
title = {{Picking a (Smart)Lock: Locking Relationships on Mobile Devices (short paper)}},
booktitle = {Proceedings of Who Are You?!: Adventures in Authentication Workshop (WAY)},
year = 2016,
month = jun,
Asoni2015
@inproceedings{Asoni2015,
author = {Asoni, Daniele E. and Chen, Chen and Barrera, David and Perrig, Adrian},
booktitle = {IFIP WG 11.4 International Workshop (iNetSec). Revised Selected Papers},
series = {Open Problems in Network Security},
editor = {Kesdogan, Dogan and Camenisch, Jan},
title = {{On Building Onion Routing into Future Internet Architectures}},
url = {http://www.netsec.ethz.ch/publications/papers/inetsec_2015_onion_routing.pdf},
doi = {10.1007/978-3-319-39028-4_6},
month = oct,
publisher = {Springer LNCS vol. 9591},
pages = {71--81},
year = {2015}
}
Abdou2015
@inproceedings{Abdou2015,
author = {AbdelRahman Abdou and David Barrera and Paul C. van Oorschot},
title = {{What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks}},
booktitle = {{Proceedings of the International Conference on Passwords}},
year = {2015},
pages = {72-91},
url = {http://people.inf.ethz.ch/barrerad/files/passwords15-abdou.pdf}
}
dena
@article{dena,
author = {Tae-Ho Lee and Pawel Szalachowski and David Barrera and Adrian Perrig and Heejo Lee and David Watrin},
title = "{Bootstrapping Real-world Deployment of Future Internet Architectures}",
journal = {arXiv/1508.02240},
archivePrefix = "arXiv",
primaryClass = "cs.NI",
year = 2015,
month = aug,
online = {http://arxiv.org/abs/1508.02240},
hidden = 1,
Chen2015
@inproceedings{Chen2015,
author = {Chen, Chen and Asoni, Daniele E. and Barrera, David and Danezis, George and Perrig, Adrian},
title = {{HORNET: High-speed Onion Routing at the Network Layer}},
booktitle = {Proceedings of the Conference on Computer and Communications Security (CCS)},
year = {2015},
isbn = {978-1-4503-3832-5},
location = {Denver, Colorado, USA},
pages = {1441--1454},
numpages = {14},
url = {http://doi.acm.org/10.1145/2810103.2813628},
doi = {10.1145/2810103.2813628},
acmid = {2813628},
url = {http://people.inf.ethz.ch/barrerad/files/ccs15-chen.pdf},
publisher = {ACM},
keywords = {anonymity, network layer, onion routing},
Eskandari2015
@inproceedings{Eskandari2015,
author = {Eskandari, Shayan and Barrera, David and Stobert, Elizabeth and Clark, Jeremy},
booktitle = {Proceedings of the NDSS Workshop on Usable Security (USEC)},
title = {{A First Look at the Usability of Bitcoin Key Management}},
year = {2015},
month = feb,
Barrera2014
@inproceedings{Barrera2014,
author = {Barrera, David and McCarney, Daniel and Clark, Jeremy and van Oorschot, P.C.},
booktitle = {Proceedings of the Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)},
title = {{Baton: Certificate Agility for Android's Decentralized Signing Infrastructure}},
year = {2014},
pages = {1--12},
isbn = {978-1-4503-2972-9},
location = {Oxford, United Kingdom},
doi = {10.1145/2627393.2627397},
acmid = {2627397},
url = {http://people.inf.ethz.ch/barrerad/files/wisec14-barrera.pdf},
Skillen2013a
@inproceedings{Skillen2013a,
author = {Skillen, Adam and Barrera, David and van Oorschot, P.C.},
booktitle = {Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)},
title = {{Deadbolt: Locking Down Android Encryption}},
year = {2013},
month = nov,
url = {http://people.inf.ethz.ch/barrerad/files/spsm13-skillen.pdf},
gsid = {5658174206702416292},
isbn = {978-1-4503-2491-5},
location = {Berlin, Germany},
doi = {10.1145/2516760.2516771},
acmid = {2516771},
pages = {3--14},
numpages = {12},
TR-13-03
@techreport{TR-13-03,
author = {Barrera, David and McCarney, Daniel and Clark, Jeremy and van Oorschot, P.C.},
title = {{Baton: Key Agility for Android without a Centralized Certificate Infrastructure}},
institution = {{School of Computer Science, Carleton University}},
year = {2013},
number = {TR-13-03},
url = {http://people.inf.ethz.ch/barrerad/files/TR-13-03.pdf}
}
Jarabek2012
@inproceedings{Jarabek2012,
author = {Jarabek, Chris and Barrera, David and Aycock, John},
booktitle = {Proceedings of the Annual Computer Security Applications Conference (ACSAC)},
keywords = {cloud-based anti-malware, android},
title = {{ThinAV: Truly Lightweight Mobile Cloud-based Anti-malware}},
year = {2012},
isbn = {978-1-4503-1312-4},
location = {Orlando, Florida, USA},
pages = {209--218},
numpages = {10},
doi = {10.1145/2420950.2420983},
month = dec,
acmid = {2420983},
url = {http://people.inf.ethz.ch/barrerad/files/acsac12-jarabek.pdf},
gsid = {2733144770976543485},
Mccarney2012
@inproceedings{Mccarney2012,
author = {McCarney, Daniel and Barrera, David and Clark, Jeremy and Chiasson, Sonia and van Oorschot, P.C.},
booktitle = {Proceedings of the Annual Computer Security Applications Conference (ACSAC)},
keywords = {Authentication, smartphones, password managers},
title = {{Tapas: Design, Implementation, and Usability Evaluation of a Password Manager}},
gsid = {62662389496250191},
year = {2012},
pages = {89--98},
doi = {10.1145/2420950.2420964},
acmid = {2420964},
isbn = {978-1-4503-1312-4},
location = {Orlando, Florida, USA},
month = dec,
publisher = {ACM}
}
Barrera2012a
@inproceedings{Barrera2012a,
author = {Barrera, David and Clark, Jeremy and McCarney, Daniel and van Oorschot, P.C.},
booktitle = {Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)},
keywords = {Android, app markets, software installation, smartphones},
title = {{Understanding and Improving App Installation Security Mechanisms through Empirical Analysis of Android}},
year = {2012},
gsid = {8143814181445194737},
url = {http://people.inf.ethz.ch/barrerad/files/spsm12-barrera.pdf},
pages = {81--92},
isbn = {978-1-4503-1666-8},
location = {Raleigh, North Carolina, USA},
month = oct,
doi = {10.1145/2381934.2381949},
acmid = {2381949},
Barrera2012
@inproceedings{Barrera2012,
author = {Barrera, David and Enck, William and van Oorschot, P.C.},
booktitle = {Proceedings of the Mobile Security Technologies Workshop (MoST)},
keywords = {Android, app markets, software installation, smartphones},
title = {{Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems}},
url = {http://people.inf.ethz.ch/barrerad/files/most12-barrera.pdf},
year = {2012},
month = may,
Barrera2011
@article{Barrera2011,
author = {Barrera, David and van Oorschot, P.C.},
doi = {10.1109/MSP.2010.202},
url = {http://people.inf.ethz.ch/barrerad/files/spmag11-barrera.pdf},
issn = {1540-7993},
journal = {IEEE Security \& Privacy Magazine},
month = may,
number = {3},
pages = {42--48},
publisher = {IEEE},
title = {{Secure Software Installation on Smartphones}},
gsid = {16547079747952868433,16567674645391066203},
volume = {9},
keywords = {software installation, smartphones},
year = {2011}
}
Barrera2011a
@article{Barrera2011a,
author = {Barrera, David and Wurster, Glenn and van Oorschot, P.C.},
journal = {;LOGIN: The USENIX Magazine},
number = {1},
pages = {16--26},
title = {{Back to the Future: Revisiting IPv6 Privacy Extensions}},
url = {http://people.inf.ethz.ch/barrerad/files/login11-barrera.pdf},
volume = {36},
gsid = {1895826470863550510},
keywords = {IPv6, privacy},
year = {2011}
}
Mannan2011
@inproceedings{Mannan2011,
author = {Mannan, Mohammad and Barrera, David and Brown, Carson and Lie, David and van Oorschot, P.C.},
booktitle = {Proceedings of the International Conference on Financial Cryptography and Data Security (FC)},
title = {{Mercury: Recovering Forgotten Passwords Using Personal Devices}},
url = {http://people.inf.ethz.ch/barrerad/files/fc11-mannan.pdf},
keywords= {smartphones, authentication},
gsid = {2154434835358577395},
isbn = {978-3-642-27575-3},
location = {Gros Islet, St. Lucia},
pages = {315--330},
numpages = {16},
acmid = {2186410},
publisher = {Springer},
Barrera2010a
@inproceedings{Barrera2010a,
author = {Barrera, David and Kayacik, H.G. and van Oorschot, P.C. and Somayaji, Anil},
booktitle = {Proceedings of the Conference on Computer and Communications Security (CCS)},
isbn = {9781450302449},
pages = {73--84},
publisher = {ACM},
location = {Chicago, Illinois, USA},
acmid = {1866317},
doi = {10.1145/1866307.1866317},
month = oct,
title = {{A Methodology for Empirical Analysis of Permission-based Security Models and its Application to Android}},
url = {http://people.inf.ethz.ch/barrerad/files/ccs10-barrera.pdf},
gsid = {8975566474498956442},
keywords = {Android, permissions, visualization},
Brown2009
@inproceedings{Brown2009,
author = {Brown, Carson and Barrera, David and Deugo, Dwight},
booktitle = {Proceedings of the International Conference on Software Engineering and Knowledge Engineering (SEKE)},
pages = {536--541},
title = {{FiGD: An Open Source Intellectual Property Violation Detector}},
gsid = {16350193836452516369},
url = {http://people.inf.ethz.ch/barrerad/files/seke09-brown.pdf},
location = {Boston, MA},
year = {2009}
}
Barrera2009
@inproceedings{Barrera2009,
author = {Barrera, David and van Oorschot, P.C.},
booktitle = {Proceedings of the International Workshop on Visualization for Cyber Security (VizSec)},
doi = {10.1109/VIZSEC.2009.5375538},
pages = {21--26},
title = {{Security Visualization Tools and IPv6 Addresses}},
url = {http://people.inf.ethz.ch/barrerad/files/vizsec09-barrera.pdf},
gsid = {4022150601082550908},
keywords = {IPv6, visualization},
Barrera2010
@article{Barrera2010,
author = {Barrera, David and van Oorschot, P.C.},
journal = {SAGE Information Visualization},
doi = {10.1057/ivs.2010.9},
pages = {107--116},
volume = {10},
number = {2},
title = {{Accommodating IPv6 Addresses in Security Visualization Tools}},
url = {http://people.inf.ethz.ch/barrerad/files/infovis10-barrera.pdf},
keywords = {IPv6, visualization},
publisher = {SAGE},
year = {2010}
}
Alsaleh2008
@inproceedings{Alsaleh2008,
author = {Alsaleh, Mansour and Barrera, David and van Oorschot, P.C.},
booktitle = {Proceedings of the Annual Computer Security Applications Conference (ACSAC)},
doi = {10.1109/ACSAC.2008.16},
isbn = {978-0-7695-3447-3},
month = dec,
pages = {205--214},
publisher = {ACM},
title = {{Improving Security Visualization with Exposure Map Filtering}},
url = {http://people.inf.ethz.ch/barrerad/files/acsac08-alsaleh.pdf},
gsid = {18024151230118129763},
keywords = {visualization},
Barrera2009a
@mastersthesis{Barrera2009a,
title = {{Towards Classifying and Selecting Appropriate Security Visualization Techniques}},
author = {David Barrera},
url = {http://people.inf.ethz.ch/barrerad/files/barrera-thesis09.pdf},
school = {Carleton University},
year = {2009}
}
Barrera2014a
@phdthesis{Barrera2014a,
title = {{Securing Decentralized Software Installation and Updates}},
author = {David Barrera},
url = {http://people.inf.ethz.ch/barrerad/files/Barrera_PhD.pdf},
school = {Carleton University},
year = {2014}
}