Theo dõi
Kevin Butler
Kevin Butler
Email được xác minh tại ufl.edu - Trang chủ
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Cryptolock (and drop it): stopping ransomware attacks on user data
N Scaife, H Carter, P Traynor, KRB Butler
2016 IEEE 36th international conference on distributed computing systems …, 2016
6582016
A survey of BGP security issues and solutions
K Butler, TR Farley, P McDaniel, J Rexford
Proceedings of the IEEE 98 (1), 100-122, 2010
5842010
Trustworthy Whole-System Provenance for the Linux Kernel
A Bates, DJ Tian, KRB Butler, T Moyer
24th USENIX Security Symposium (USENIX Security '15), 319-334, 2015
3162015
Hi-fi: collecting high-fidelity whole-system provenance
DJ Pohly, S McLaughlin, P McDaniel, K Butler
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
2192012
Practical hidden voice attacks against speech and speaker recognition systems
H Abdullah, W Garcia, C Peeters, P Traynor, KRB Butler, J Wilson
2019 Network and Distributed System Security (NDSS) Symposium, 2019
1982019
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
1792017
Pcf: A portable circuit format for scalable two-party secure computation
B Kreuter, B Mood, A Shelat, K Butler
2013 USENIX Security Symposium, 2013
1492013
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices
H Carter, B Mood, P Traynor, K Butler
2013 USENIX Security Symposium, 2013
1472013
Detecting co-residency with active traffic analysis techniques
A Bates, B Mood, J Pletcher, H Pruse, M Valafar, K Butler
CCSW'12: Proceedings of the 2012 ACM Workshop on Cloud computing security, 1-12, 2012
1452012
Porscha: Policy oriented secure content handling in Android
M Ongtang, K Butler, P McDaniel
Proceedings of the 26th annual computer security applications conference …, 2010
1442010
FirmUSB: Vetting USB device firmware using domain informed symbolic execution
G Hernandez, F Fowze, D Tian, T Yavuz, KRB Butler
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1352017
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation
B Mood, D Gupta, H Carter, KRB Butler, P Traynor
Proceedings of the 1st IEEE European Symposium on Security and Privacy (Euro …, 2016
1332016
Defending against malicious USB firmware with GoodUSB
DJ Tian, A Bates, K Butler
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
1252015
Let SDN Be Your Eyes: Secure Forensics in Data Center Networks
A Bates, K Butler, A Haeberlen, M Sherr, W Zhou
NDSS Workshop on Security of Emerging Networking Technologies (SENT), 2014
1032014
Towards secure provenance-based access control in cloud environments
A Bates, B Mood, M Valafar, K Butler
Proceedings of the third ACM conference on Data and application security and …, 2013
1022013
Optimizing BGP security by exploiting path stability
K Butler, P McDaniel, W Aiello
Proceedings of the 13th ACM conference on Computer and communications …, 2006
1002006
On detecting co-resident cloud instances using network flow watermarking techniques
A Bates, B Mood, J Pletcher, H Pruse, M Valafar, K Butler
International Journal of Information Security 13, 171-189, 2014
812014
More guidelines than rules: CSRF vulnerabilities from noncompliant OAuth 2.0 implementations
E Shernan, H Carter, D Tian, P Traynor, K Butler
Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015
792015
A privacy-preserving approach to streaming eye-tracking data
B David-John, D Hosfelt, K Butler, E Jain
IEEE Transactions on Visualization and Computer Graphics 27 (5), 2555-2565, 2021
732021
Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
B Reaves, N Scaife, D Tian, L Blue, P Traynor, KRB Butler
Proceedings of the 37th IEEE Symposium on Security and Privacy (Oakland'16), 2016
732016
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20