About Me

I am Dr. Jasmine Bowers, a graduate of the University of Florida where I earned a Ph.D. in computer science under the advisement of Patrick Traynor. I earned a B.S. in mathematics and B.S. in computer science from Fort Valley State University and an M.S. in computer science from North Carolina A & T State University.



Scaife, N., Bowers, J., Peeters, C., Hernandez, G., Sherman, I., Traynor, P., and Anthony, L.(2019) Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers, Proceedings of the 2019 IEEE Symposium on Security and Privacy (IEEE S&P 2019). [.pdf]

Bowers, J., Sherman, I., Butler, R., and Traynor, P.(2019) Characterizing Security and Privacy Practices in Emerging Digital Credit Applications, Proceedings of the 12th ACM Conference on Securty and Privacy in Wireless and Mobile Networks (ACM WiSec 2019). [.pdf]

Peeters, C., Abdullah, H., Scaife, N., Bowers, J., Traynor, P., Reaves, B. and Butler, K.(2018) Sonar: Detecting SS7 Redirection Attacks Via Call Audio-Based Distance Bounding, Proceedings of the IEEE Symposium on Security and Privacy (IEEE S&P 2018). [.pdf]

Traynor, P., Butler, K., Bowers, J., and Reaves, B.(2017) FinTechSec: Addressing the Security Challenges of Digital Financial Services IEEE Security & Privacy. [.pdf]

Reaves, B., Bowers, J., Scaife, N., Bates, A., Bhartiya, A., Traynor, P. and Butler, K. (2017) Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications. ACM Transactions on Privacy and Security (ACM TOPS 2017). [.pdf]

Bowers, J., Reaves, B., Sherman, I., Traynor, P. and Butler, K. (2017) Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). [.pdf]

Reaves, B., Bowers, J. D., Gorski III, S. A., Anise, O., Bobhate, R., Cho, R., Das, H.,...Traynor, P. (2016) *droid: Assessment and Evaluation of Android Application Analysis Tools. ACM Computing Surveys. [.pdf]

Nathan Mack, Jasmine Bowers, Henry Williams, Gerry Dozier, and Joseph Shelton, "The Best Way to a Strong Defense is a Strong Offense: Mitigating Deanonymization Attacks via Iterative Language Translation," International Journal of Machine Learning and Computing vol.5, no. 5, pp. 409-413, 2015. [.pdf]

Bowers, J. D. (2015) Mitigating Deanonymization Attacks via Iterative Language Translation for Social Networks (Master's Thesis). Retrieved from ProQuest Dissertations and Theses. (Accession Order No. 1591467) [.pdf]