Portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 2 
Published in Proceedings of the ACM Asia Conference on Computer and Communications Security 2022 (ASIA CCS 22), 2022
Proposes improved mechanisms to strengthen SMS-based two-factor authentication against known threats.
Recommended citation: Peeters, C., Patton, C., Sherman, I., Olszewski, D., Shrimpton, T., & Traynor, P. (2022). SMS OTP Security (SOS): Hardening SMS-Based Two Factor Authentication. In Proceedings of ASIA CCS 2022.
Download Paper
Published in Proceedings of the IEEE Conference on Communication and Network Security 2022 (CNS 22), 2022
Introduces HallMonitor, a system for identifying and analyzing network policy violations in software applications.
Recommended citation: Olszewski, D., Zhu, W., Sathyanarayana, S., Butler, K., & Traynor, P. (2022). HallMonitor: A Framework for Identifying Network Policy Violations in Software. In Proceedings of IEEE CNS 2022.
Download Paper
Published in Proceedings of the Conference on Applied Machine Learning for Information Security 2022 (CAMLIS 22), 2022
Proposes an efficient malware analysis framework using metric embeddings for scalable classification.
Recommended citation: Rudd, E., Krisiloff, D., Olszewski, D., Raff, E., & Holt, J. (2022). Efficient Malware Analysis Using Metric Embeddings. In Proceedings of CAMLIS 2022.
Download Paper
Published in Proceedings of the ACM Conference on Computer and Communications Security 2023 (ACM CCS '23), 2023
Evaluates reproducibility practices in machine learning papers across top-tier security conferences.
Recommended citation: Olszewski, D., et al. (2023). Get in Researchers; We're Measuring Reproducibility: A Reproducibility Study of ML Papers at Tier 1 Security Conferences. In Proceedings of the ACM CCS 2023.
Download Paper
Published in Proceedings of the USENIX Security Symposium 2024 (USENIX 24), 2024
Systematizes knowledge on deepfake media datasets and evaluates their structural limitations.
Recommended citation: Layton, S., Tucker, T., Olszewski, D., Warren, K., Butler, K., & Traynor, P. (2024). SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets. In Proceedings of the USENIX Security Symposium 2024 (USENIX 24).
Download Paper
Published in Proceedings of the ACM Conference on Computer and Communications Security 2024 (ACM CCS '24), 2024
Presents a large-scale human study assessing the ability of people to detect audio deepfakes.
Recommended citation: Warren, K., Tucker, T., Crowder, A., Olszewski, D., Lu, A., Federle, C., Pasternak, M., Layton, S., Butler, K., Gates, C., & Traynor, P. (2024). Better Be Computer or I'm Dumb: A Large-Scale Evaluation of Humans as Audio Deepfake Detectors. In Proceedings of the ACM CCS 2024. Distinguished Paper Award.
Download Paper
Published in Proceedings of the Annual Computer Security Applications Conference 2024 (ACSAC 24), 2024
Uses statistical techniques to analyze global censorship measurement data and reveal emerging trends.
Recommended citation: Crowder, A., Olszewski, D., Traynor, P., & Butler, K. (2024). I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques. In Proceedings of ACSAC 2024.
Download Paper
Published in Proceedings of the Network and Distributed System Security Symposium 2025 (NDSS 25), 2025
Studies how audio deepfakes affect individuals with cochlear implants, exploring perceptual and security challenges.
Recommended citation: Pasternak, M., Warren, K., Olszewski, D., Traynor, P., & Butler, K. (2025). Characterizing the Impact of Audio Deepfakes in the Presence of Cochlear Implants. In Proceedings of the Network and Distributed System Security Symposium 2025 (NDSS 25).
Download Paper
Published in Proceedings of the ACM Conference on Reproducibility 2025 (ACM REP 25), 2025
An 11-year analysis of reproducibility efforts, artifact practices, and evaluation committees across applied security conferences.
Recommended citation: Olszewski, D., Lu, A., Crowder, A., Bennett, N., Layton, S., Bhupathiraju, S.H.V., Tucker, T., Kalgutkar, S., Ver Helst, H., Stillman, C., Butler, K., Rampazzi, S., & Traynor, P. (2025). Reproducibility in Applied Security Conferences: An 11-Year Review on Artifacts and Evaluation Committees. In Proceedings of the ACM Conference on Reproducibility 2025 (ACM REP 25). Best Paper Award.
Download Paper
Published in Proceedings of the USENIX Security Conference 2025 (USENIX 25), 2025
Proposes a framework for unifying replicability practices in applied computer security research.
Recommended citation: Olszewski, D., Tucker, T., Butler, K., & Traynor, P. (2025). Towards a Unified Approach of Applied Replicability for Computer Security. In Proceedings of the USENIX Security Conference 2025 (USENIX 25).
Download Paper
Published in Proceedings of the USENIX Security Conference 2025 (USENIX '25), 2025
Analyzes the ecosystem of AI nudification applications, their privacy implications, and societal risks. Distinguished Paper Award. Internet Defense Runner-Up Award.
Recommended citation: Gibson, C., Olszewski, D., Brigham, N., Crowder, A., Butler, K., Traynor, P., Redmiles, E., & Kohno, T. (2025). Analyzing the AI Nudification Application Ecosystem. In Proceedings of the USENIX Security Conference 2025 (USENIX '25).
Download Paper
Published in Digital Threats: Research and Practice, 2025
This work proposes using breath detection as a high-level feature to distinguish real from deepfake speech, demonstrating its effectiveness on a custom, publicly available dataset of news audio.
Recommended citation: Layton, S., De Andrade, T., Olszewski, D., Warren, K., Gates, C., Butler, K., & Traynor, P. (2025). Every breath you don't take: Deepfake speech detection using breath. Digital Threats: Research and Practice, 6(3), 1-18.
Download Paper
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.