Seguir
Brad Reaves
Brad Reaves
Associate Professor, NC State University
Dirección de correo verificada de ncsu.edu - Página principal
Título
Citado por
Citado por
Año
On SCADA control system command and response injection and intrusion detection
W Gao, T Morris, B Reaves, D Richey
eCrime Researchers Summit (eCrime), 2010, 1-9, 2010
2712010
Mast: triage for market-scale mobile malware analysis
S Chakradeo, B Reaves, P Traynor, W Enck
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
2552013
A control system testbed to validate critical infrastructure protection concepts
T Morris, A Srivastava, B Reaves, W Gao, K Pavurapu, R Reddi
International Journal of Critical Infrastructure Protection 4 (2), 88-103, 2011
2172011
Identity and content authentication for phone calls
PG Traynor, BG Reaves, LE Blue, L Vargas, H Abdullah, T Shrimpton
US Patent 10,764,043, 2020
1942020
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
1902017
PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play
B Andow, SY Mahmud, W Wang, J Whitaker, W Enck, B Reaves, K Singh, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 585-602, 2019
1822019
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
1752017
Mo (bile) Money, Mo (bile) Problems: Analysis of Branchless Banking Applications in the Developing World
B Reaves, N Scaife, A Bates, P Traynor, KRB Butler
24th USENIX Security Symposium, 2015
175*2015
HomeSnitch: behavior transparency and control for smart home IoT devices
TJ OConnor, R Mohamed, M Miettinen, W Enck, B Reaves, AR Sadeghi
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
1462019
Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck
B Andow, SY Mahmud, J Whitaker, W Enck, B Reaves, K Singh, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 985-1002, 2020
1412020
A large scale investigation of obfuscation use in google play
D Wermke, N Huaman, Y Acar, B Reaves, P Traynor, S Fahl
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
1192018
How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories.
M Meli, MR McNiece, B Reaves
NDSS, 2019
1112019
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
C Lever, M Antonakakis, B Reaves, P Traynor, W Lee
NDSS, 2013
982013
An open virtual testbed for industrial control system security research
B Reaves, T Morris
International Journal of Information Security 11 (4), 215-229, 2012
952012
Engineering future cyber-physical energy systems: Challenges, research needs, and roadmap
TH Morris, AK Srivastava, B Reaves, K Pavurapu, S Abdelwahed, ...
North American Power Symposium (NAPS), 2009, 1-6, 2009
742009
*droid: Assessment and Evaluation of Android Application Analysis Tools
B Reaves, J Bowers, SAIII Gorski, O Anise, R Bobhate, R Cho, H Das, ...
ACM Computing Surveys, 2016
732016
Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
B Reaves, N Scaife, D Tian, L Blue, P Traynor, KRB Butler
2016 IEEE Symposium on Security and Privacy (SP), 339-356, 2016
722016
Cybersecurity testing of substation phasor measurement units and phasor data concentrators
T Morris, S Pan, J Lewis, J Moorhead, B Reaves, N Younan, R King, ...
The 7th Annual ACM Cyber Security and Information Intelligence Research …, 2011
68*2011
Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services
J Bowers, B Reaves, IN Sherman, P Traynor, K Butler
Symposium on Usable Privacy and Security (SOUPS), 2017
572017
AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels
B Reaves, L Blue, P Traynor
Proceedings of 25th USENIX Security Symposium, 2016
562016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20