Funded by the NSF Secure and Trustworthy Computing program
Aarathi Prasad and David Kotz. ENACT: Encounter-based Architecture for Contact Tracing. In ACM Workshop on Physical Analytics (WPA), pages 37-42, June 2017. ACM Press. DOI 10.1145/3092305.3092310.
Rui Liu, Reza Rawassizadeh, and David Kotz. Toward Accurate and Efficient Feature Selection for Speaker Recognition on Wearables. InProceedings of the ACM Workshop on Wearable Systems and Applications (WearSys), pages 41-46, 2017. ACM Press. DOI 10.1145/3089351.3089352.
Rui Liu, Cory Cornelius, Reza Rawassizadeh, Ron Peterson, and David Kotz. Poster: Vocal Resonance as a Passive Biometric. In Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 160, 2017. ACM Press. DOI 10.1145/3081333.3089304.
Xiaohui Liang and David Kotz. AuthoRing: Wearable User-presence Authentication. In Proceedings of the ACM Workshop on Wearable Systems and Applications (WearSys), pages 5-10, 2017. ACM Press. DOI 10.1145/3089351.3089357.
Xiaohui Liang, Tianlong Yun, Ronald Peterson, and David Kotz. LightTouch: Securely Connecting Wearables to Ambient Displays with User Intent. In IEEE International Conference on Computer Communications (INFOCOM), May 2017.
Fu Kevin, Thimbleby Harold. Ransomware: How we can climb out of this mess.Healthcare IT News, Jun 5 2017.(2017 Article)
Travis W. Peters. A Survey of Trustworthy Computing on Mobile & Wearable Systems.Dartmouth Computer Science Technical Report TR2017-823, May 2017.(2017 Report)
Meystre SM, Lovis C, Bürkle T, Tognola G, Budrionis A, Lehmann CU. Clinical Data Reuse or Secondary Use: Current Status and Potential Future Progress.Med Inform. May 2017.(Med Inform 2017 Paper)
Lehmann CU, Kressly S, Hart WW, Johnson KB, Frisse ME. Barriers to Pediatric Health Information Exchange.Pediatrics 2017.(Pediatrics 2017 Paper)
Tsou AY, Lehmann CU, Michel J, Solomon R, Possanza L, Gandhi T. Safe Practices for Copy and Paste in the EHR. Systematic Review, Recommendations, and Novel Model for Health IT Collaboration.Appl Clin Inform. January 2017.(Appl Clin Inform 2017 Paper)
Trippel, Timothy, Weisse, Ofir, Xu, Wenyuan, Honeyman, Peter, and Fu, Kevin. WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks.Proceedings of the 2nd Annual IEEE European Symposium on Security and Privacy, April 2017.(EURO S&P 2017 Paper)
Haiming Jin, Lu Su, Klara Nahrstedt. CENTURION: Incentivizing Multi-Requester Mobile Crowd Sensing.The IEEE International Conference on Computer Communications 2017.(INFOCOM 2017 Paper)
Sayed Hadi Hashemi, Faraz Faghri, Paul Rausch, Roy H Campbell. World of Empowered IoT Users. 2016 IEEE First International Conference on Internet-of-Things Design and Implementation April, 2016. (IoTDI 2016 paper)
Guliz Seray Tuncay, Soteris Demetriou, Carl A. Gunter. Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android. ACM Computer and Communications Security (CCS ’16) October, 2016. (CCS ’16 paper)
A.J. Burns, Eric Johnson and Peter Honeyman. A brief chronology of medical device security.Communications of the ACM. October 2016. (CACM [paper and video]).
Paul Martin, Michael Rushanan, Thomas Tantillo, Christoph Lehmann and Aviel Rubin. Applications of Secure Location Sensing in Healthcare.Proceedings of the 7th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics, October 2016.
Kevin Fu, John Halamka, Jack Kufahl, and Mary Logan. Hospitals need better cybersecurity, not more fear (commentary).Modern Healthcare. September 2016. [Modern Healthcare]
Tuo Yu, Haiming Jin, Klara Nahrstedt. WritingHacker: Audio-based Eavesdropping of Handwriting via Mobile Devices.2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2016), Heidelberg, Germany. September 2016. [UbiComp 2016]
AG Fiks, N duRivage, SL Mayne, S Finch, ME Ross, K Giacomini, A Suh, B McCarn, E Brandt, D Karavite, EW Staton, L Shone, V McGoldrick, K Noon, D Miller, CU Lehmann, WD Pace, RW Grundmeier. Adoption of a Portal for the Primary Care Management of Pediatric Asthma: A Mixed Methods Implementation Study.Journal of Medical Internet Research. [Journal of Medical Internet Research]
Haiming Jin, Lu Su, Houping Xiao, Klara Nahrstedt. INCEPTION: Incentivizing Privacy-Preserving Data Aggregation for Mobile Crowd Sensing Systems.The 17th ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2016). Paderborn, Germany. July 2016. [pdf]
David Kotz, Carl A. Gunter, Santosh Kumar, Jonathan P. Weiner, Privacy and Security in Mobile Health: A Research Agenda, Computer, June 2016. [IEEE link]
David Kotz. Security and Privacy: Mobile Medical Applications. The 1st ACM MobiSys Workshop on Mobile Data (MOBIDATA 2016).Singapore. June 2016. [keynote]
Timothy Pierson, Xiaohui Liang, Ronald Peterson and David Kotz . Demo: Wanda, Securely Introducing Mobile Devices. MobiSys 2016. Singapore. June 2016. [conference]
Haiming Jin, Lu Su, Bolin Ding, Klara Nahrstedt, Nikita Borisov. Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing Systems. The 36th IEEE International Conference on Distributed Computing Systems(ICDCS 2016). Nara, Japan. June 2016. [pdf]
CU Lehmann, MC Jaulent, B Séroussi. Silver Anniversary: 25 Editions of the IMIA Yearbook. Yearb Med Inform. 2016 May 20;25(Suppl. 1). [Epub ahead of print].
Aarathi Prasad. Privacy-preserving Controls for Sharing mHealth Data. Ph.D. Thesis, Dartmouth College Computer Science. Available as Dartmouth Computer Science Technical Report TR2016-794. May, 2016. [CS Department]
Shrirang Mare. Seamless Authentication for Ubiquitous Devices. Ph.D. Thesis, Dartmouth College Computer Science. Available as Dartmouth Computer Science Technical Report TR2016-793. May, 2016. [CS Department]
Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz. Wanda: securely introducing mobile devices. IEEE International Conference on Computer Communications (INFOCOM). April 2016. [IEEE – published version]
JA George, PS Park, J Hunsberger, JE Shay, CU Lehmann, ED White, BH Lee, M Yaster. An Analysis of 34,218 Pediatric Outpatient Controlled Substance Prescriptions.Anesthesia & Analgesia. March 2016. [Anesthesia & Analgesia TOC]
Bingyue Wang. Learning Device Usage in Context: A Continuous and Hierarchical Smartphone Authentication Scheme. Dartmouth Computer Science Technical Report TR2016-790 (Senior Honors Thesis), March 2016. (CS Department)
Joseph Carrigan, Paul D. Martin and Michael Rushanan. KBID: Kerberos Bracelet Identification. Financial Cryptography and Data Security 2016. Christ Church, Barbados. February 2016. [Paper from Proceedings]
Soteris Demetriou. Free for All! Assessing User Data Exposure to Advertising Libraries on Android, Network and Distributed System Security (NDSS) Symposium [Poster],San Diego, CA, February 2016 [poster].
J Kannry, P Sengstack, TP Thyvalikakath, Poikonen J, Middleton B, Payne T, Lehmann CU. The Chief Clinical Informatics Officer (CCIO). AMIA Task Force Report on CCIO Knowledge, Education, and Skillset Requirements.Applied Clinical Informatics. 2016; 7(1). [ACI TOC]
H Silverman, CU Lehmann, B Munger. Milestones: Critical Elements in Clinical Informatics Fellowship Programs.Applied Clinical Informatics. 2016 7(1). [ACI TOC]
MW Temple MW, CU Lehmann, D Fabbri. Natural Language Processing for Cohort Discovery in a Discharge Prediction Model for the Neonatal ICU. Applied Clinical Informatics. 2016 7(1). [ACI TOC]
KR Dufendach, CU Lehmann. Topics in Neonatal Informatics: Essential Functionalities of the Neonatal Electronic Health Record.NeoReviews, 2015 Dec 1. 16(12).
Juhee Kwon and M. Eric Johnson. Do Patients Care about Data Breaches?Workshop on Information Systems and Economics. Dallas, TX. December 2015 [Program link]
Abhishek Bafna and Jenna Wiens. Learning Useful Abstractions from the Web.Symposium of the American Medical Informatics Association. San Francisco, CA. November 2015
Abhishek Bafna and Jenna Wiens. Automated Feature Learning: Mining Unstructured Data for Useful Abstractions.IEEE International Conference on Data Mining. Atlantic City, NJ. November 2015 [pdf].
Eric Johnson and Juhee Kwon. Patient Reaction to Healthcare Data Breaches.Informs Annual Conference. Philadelphia, PA. November 2015 [Poster Only]
M. Eric Johnson. Healthcare in the Age of Analytics. INFORMS Editors Cut, INFORMS. Catonsville, MD. October 2015 [INFORMS]
AJ Burns, Jacob Young, Tom L. Roberts, James F. Courtney and T. Selwyn Ellis. Exploring the Role of Contextual Integrity in Electronic Medical Record (EMR) System Workaround Decisions: An Information Security and Privacy Perspective.Association for Informatic Systems Transactions on Human-Computer Interactions. September 2015 [Paper]
Juhee Kwon and M. Eric Johnson. Protecting Patient Data-The Economic Perspective of Healthcare Security.IEEE Security and Privacy. September-October 2015 [IEEE Security and Privacy]
Sai Gouravajhala, Sree Vadrevu, Matthew Hicks, Jenna Wiens and Kevin Fu. An LED Blink is Worth a Thousand Packets: Inferring a Networked Device’s Activity from its LED Blinks.USENIX Summit on Information Technologies for Health. Washington, DC. August 2015
Devendra Goyal, Zeeshan Syed and Jenna Wiens. Predicting Disease Progression in Alzheimer’s Disease.The Meaningful Use of Complex Medical Data Symposium. Los Angeles, CA. August 2015
David Kotz, Kevin Fu, Carl Gunter and Avi Rubin. Security for Mobile and Cloud Frontiers in Healthcare. Communications of the ACM. August 2015 [CACM]
Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, and XiaoFeng Wang. Privacy in the Genomic Era.ACM Computing Surveys, August 2015
Haiming Jin, Lu Su, Danyang Chen, Klara Nahrstedt and Jinhui Xu. Quality of Information Aware Incentive Mechanisms for Mobile Crowd Sensing Systems. The 16th ACM Symposium on Mobile Ad Hoc Networking and Computing(ACM MobiHoc 2015). Hangzhou, China, June 2015
Juhee Kwon and Eric Johnson. The Market Effect of Healthcare Security: Do Patients Care about Data Breaches?Workshop of the Economics of Information Security, Delft University of Technology, Netherlands. June 2015 [pdf]
Ting-yu Wang, Haiming Jin, and Klara Nahrstedt, mAuditor: Mobile Auditing Framework for mHealth Applications. The 5th ACM MobiHoc Workshop on Pervasive Wireless Healthcare (MobileHealth 2015), Hangzhou, China, June 2015
Tom Haigh and Carl Landwehr. Building Code for Medical Device Software Security.IEEE Cybersecurity Initiative. May 2015 [IEEE Cyber Security]
Kwon, Juhee and M. Eric Johnson. Meaningful Information Security.Production and Operations Managment Society 26th Annual Conference. Washington, DC. May 2015 [Presentation only. [abstract -search for Kwon]]
You Chen, Joydeep Ghosh, Cosmin Adrian Bejan, Carl A. Gunter, Siddharth Gupta, Abel Kho, David Liebovitz, Jimeng Sun, Joshua Denny, and Bradley Malin. Building Bridges Across Electronic Health Record Systems Through Inferred Phenotypic Topics. Journal of Biomedical Informatics,. March 2015 Appendix. [pdf]
J.B. Jones, J.P. Weiner, N.R. Shah, W. F. Stewart. The Wired Patient: Patterns of Electronic Patient Portal Use Among Patients With Cardiac Disease or Diabetes. Journal of Medical Internet Research. February 2015 [JMIR]
Soteris Demetriou, Xiaoyong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, and Carl A Gunter. What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. Network and Distributed System Security Symposium, February 2015 [NDSS]
Carl Landwehr. We Need a Building Code for Building Code. Communications of the ACM. February 2015 [ACM]
A.J. Burns and M. Eric Johnson. Securing Health Information. IEEE IT Professional. Jan/Feb 2015 [IEEE IT Professional]
Carl Landwehr. Workshop to Develop a Building Code and Research Agenda For Medical Device Software Security (Final Report). January 2015 [pdf]
Muhammad Naveed. Hurdles for Genomic Data Usage Management.IEEE Workshop on Data Usage Management, November 2014. [pdf]
J.A. Young, T.S. Ellis, J.F. Courtney, T.L. Roberts, and A.J. Burns. Ethical Evaluation of Electronic Medical Records System Workarounds: Implications for Patient Privacy and Information Security. 2014 Annual Meeting of the Decision Sciences Institute, Tampa, FL. November 2014
Dongjing He, Muhammad Naveed, Carl A. Gunter, and Klara Nahrstedt. Security Concerns in Android mHealth Apps. Symposium of the American Informatics Association. Washington, DC. November 2014 [pdf]
Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, Xiaofeng Wang, Erman Ayday, Jean-Pierre Hubaux, and Carl A. Gunter. Controlled Functional Encryption.ACM Computer and Communication Security), Scottsdale, AZ. November 2014. [pdf]
Wen Zhang, You Chen, Thaddeus R. Cybulski, Daniel Fabbri, Carl A. Gunter, Patrick Lawlor, David Liebovitz, and Bradley Malin. Decide Now or Decide Later? Quantifying the Tradeoff between Prospective and Retrospective Access Decisions.ACM Computer and Communication Security, Scottsdale, AZ. November 2014. [pdf]
Juhee Kwon and M. Eric Johnson. Meaningful Healthcare Security: Does “Meaningful-Use” Attestation Improve Information Security Performance? INFORMS Conference on Information Systems and Technology, San Francisco, CA. November, 2014 [[Paper] [video]]
A. Sleptchenko and M. Eric Johnson. The Impact of Security in Maintaining Reliable Distributed Control Systems.INFORMS Annual Conference, San Francisco, CA. November, 2014 [Presentation only]
A. Sleptchenko and M. Eric Johnson. Maintaining Secure and Reliable Distributed Control Systems.INFORMS Journal of Computing. October 2014 [INFORMS Journal of Computing]
Charles Friedman. Joshua Rubin, Jeffrey Brown, Melinda Buntin, Milton Corn, Lynn Etheredge, Carl Gunter, Mark Musen, Richard Platt, William Stead, Kevin Sullivan, Douglas Van Houweling. Toward a Science of Learning Systems: a Research Agenda for the High-Functioning Learning Health System. Journal of the American Medical Informatics Association (JAMIA). October 2014. [pdf]
Carl A. Gunter, Mike Berry, and Martin French. Decision Support for Data Segmentation (DS2): Application to Pull Architectures for HIE. USENIX Safety, Security, Privacy, and Interoperability of Health Information Technologies (HealthTech ’14, San Diego, CA). August 2014 [pdf]
Shrirang Mare, Andrés Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz. ZEBRA: Zero-Effort Bilateral Recurring Authentication. IEEE Symposium on Security & Privacy. (Note: this project has since been renamed BRACE.) May 2014 [pdf]
A.J. Burns, J.A. Young, T.L. Roberts, T.S. Ellis, and J.F. Courtney. Exploring the Role of Contextual Integrity in Electronic Medical Record (EMR) System Workaround Decisions. Human-Computer Interaction in Health and Wellness Research Workshop at the Americas Conference on Information Systems (AMCIS 2014, Savannah, Georgia). August 2014
Dongjing He. Security Threats to Android Apps. MS Thesis, University of Illinois at Urbana-Champaign. June 2014 [pdf]
Juhee Kwon and M. Eric Johnson. Meaningful Healthcare Security: Does “Meaningful-Use” Attestation Improve Information Security Performance?Workshop on the Economics of Information Security (WEIS). June 2014 [paper]
Anthony Louie. Information Leakage in Mobile Health Sensors and Applications. Senior thesis. University of Illinois at Urbana-Champaign. June 2014 [pdf]
Muhammad Naveed, Manoj Prabhakaran, and Carl A. Gunter. Dynamic Searchable Encryption via Blind Storage. IEEE Symposium on Security & Privacy. May 2014 [pdf]
Michael Rushanan, Aviel D. Rubin, Denis Foo Kune, Colleen M. Swanson. SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks. IEEE Symposium on Security & Privacy. May 2014 [pdf]
Jonathan P. Weiner, Susan Yeh, and David Blumenthal. The Impact Of Health Information Technology And e-Health On The Future Demand For Physician Services. Health Affairs. November 2013 [url][pdf]