Folgen
Kevin Butler
Kevin Butler
Bestätigte E-Mail-Adresse bei ufl.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Cryptolock (and drop it): stopping ransomware attacks on user data
N Scaife, H Carter, P Traynor, KRB Butler
2016 IEEE 36th international conference on distributed computing systems …, 2016
5882016
A survey of BGP security issues and solutions
K Butler, TR Farley, P McDaniel, J Rexford
Proceedings of the IEEE 98 (1), 100-122, 2010
5552010
Trustworthy Whole-System Provenance for the Linux Kernel
A Bates, DJ Tian, KRB Butler, T Moyer
24th USENIX Security Symposium (USENIX Security '15), 319-334, 2015
2702015
Hi-fi: collecting high-fidelity whole-system provenance
DJ Pohly, S McLaughlin, P McDaniel, K Butler
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
1992012
Practical hidden voice attacks against speech and speaker recognition systems
H Abdullah, W Garcia, C Peeters, P Traynor, KRB Butler, J Wilson
2019 Network and Distributed System Security (NDSS) Symposium, 2019
1672019
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
1602017
Pcf: A portable circuit format for scalable two-party secure computation
B Kreuter, B Mood, A Shelat, K Butler
2013 USENIX Security Symposium, 2013
1442013
Porscha: Policy oriented secure content handling in Android
M Ongtang, K Butler, P McDaniel
Proceedings of the 26th annual computer security applications conference …, 2010
1432010
Detecting co-residency with active traffic analysis techniques
A Bates, B Mood, J Pletcher, H Pruse, M Valafar, K Butler
CCSW'12: Proceedings of the 2012 ACM Workshop on Cloud computing security, 1-12, 2012
1412012
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices
H Carter, B Mood, P Traynor, K Butler
2013 USENIX Security Symposium, 2013
1322013
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation
B Mood, D Gupta, H Carter, KRB Butler, P Traynor
Proceedings of the 1st IEEE European Symposium on Security and Privacy (Euro …, 2016
1192016
Defending against malicious USB firmware with GoodUSB
DJ Tian, A Bates, K Butler
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
1022015
FirmUSB: Vetting USB device firmware using domain informed symbolic execution
G Hernandez, F Fowze, D Tian, T Yavuz, KRB Butler
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1002017
Let SDN Be Your Eyes: Secure Forensics in Data Center Networks
A Bates, K Butler, A Haeberlen, M Sherr, W Zhou
NDSS Workshop on Security of Emerging Networking Technologies (SENT), 2014
992014
Optimizing BGP security by exploiting path stability
K Butler, P McDaniel, W Aiello
Proceedings of the 13th ACM conference on Computer and communications …, 2006
972006
Towards secure provenance-based access control in cloud environments
A Bates, B Mood, M Valafar, K Butler
Proceedings of the third ACM conference on Data and application security and …, 2013
962013
On detecting co-resident cloud instances using network flow watermarking techniques
A Bates, B Mood, J Pletcher, H Pruse, M Valafar, K Butler
International Journal of Information Security 13, 171-189, 2014
752014
More guidelines than rules: CSRF vulnerabilities from noncompliant OAuth 2.0 implementations
E Shernan, H Carter, D Tian, P Traynor, K Butler
Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015
712015
* droid: Assessment and evaluation of android application analysis tools
B Reaves, J Bowers, SA Gorski III, O Anise, R Bobhate, R Cho, H Das, ...
ACM Computing Surveys (CSUR) 49 (3), 1-30, 2016
672016
Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
B Reaves, N Scaife, D Tian, L Blue, P Traynor, KRB Butler
Proceedings of the 37th IEEE Symposium on Security and Privacy (Oakland'16), 2016
662016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20