Follow
Brad Reaves
Brad Reaves
Assistant Professor, NC State University
Verified email at ncsu.edu - Homepage
Title
Cited by
Cited by
Year
On SCADA control system command and response injection and intrusion detection
W Gao, T Morris, B Reaves, D Richey
eCrime Researchers Summit (eCrime), 2010, 1-9, 2010
2692010
Mast: triage for market-scale mobile malware analysis
S Chakradeo, B Reaves, P Traynor, W Enck
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
2502013
A control system testbed to validate critical infrastructure protection concepts
T Morris, A Srivastava, B Reaves, W Gao, K Pavurapu, R Reddi
International Journal of Critical Infrastructure Protection 4 (2), 88-103, 2011
2052011
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
1702017
Identity and content authentication for phone calls
PG Traynor, BG Reaves, LE Blue, L Vargas, H Abdullah, T Shrimpton
US Patent 10,764,043, 2020
1642020
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
1602017
Mo (bile) Money, Mo (bile) Problems: Analysis of Branchless Banking Applications in the Developing World
B Reaves, N Scaife, A Bates, P Traynor, KRB Butler
24th USENIX Security Symposium, 2015
160*2015
PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play
B Andow, SY Mahmud, W Wang, J Whitaker, W Enck, B Reaves, K Singh, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 585-602, 2019
1322019
HomeSnitch: behavior transparency and control for smart home IoT devices
TJ OConnor, R Mohamed, M Miettinen, W Enck, B Reaves, AR Sadeghi
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
1262019
A large scale investigation of obfuscation use in google play
D Wermke, N Huaman, Y Acar, B Reaves, P Traynor, S Fahl
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
1092018
Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck
B Andow, SY Mahmud, J Whitaker, W Enck, B Reaves, K Singh, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 985-1002, 2020
1032020
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
C Lever, M Antonakakis, B Reaves, P Traynor, W Lee
NDSS, 2013
982013
An open virtual testbed for industrial control system security research
B Reaves, T Morris
International Journal of Information Security 11 (4), 215-229, 2012
922012
How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories.
M Meli, MR McNiece, B Reaves
NDSS, 2019
822019
Engineering future cyber-physical energy systems: Challenges, research needs, and roadmap
TH Morris, AK Srivastava, B Reaves, K Pavurapu, S Abdelwahed, ...
North American Power Symposium (NAPS), 2009, 1-6, 2009
762009
*droid: Assessment and Evaluation of Android Application Analysis Tools
B Reaves, J Bowers, SAIII Gorski, O Anise, R Bobhate, R Cho, H Das, ...
ACM Computing Surveys, 2016
672016
Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
B Reaves, N Scaife, D Tian, L Blue, P Traynor, KRB Butler
2016 IEEE Symposium on Security and Privacy (SP), 339-356, 2016
662016
Cybersecurity testing of substation phasor measurement units and phasor data concentrators
T Morris, S Pan, J Lewis, J Moorhead, B Reaves, N Younan, R King, ...
The 7th Annual ACM Cyber Security and Information Intelligence Research …, 2011
66*2011
Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services
J Bowers, B Reaves, IN Sherman, P Traynor, K Butler
Symposium on Usable Privacy and Security (SOUPS), 2017
492017
Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems
B Reaves, T Morris
International Journal of Critical Infrastructure Protection 5 (3), 154-174, 2012
482012
The system can't perform the operation now. Try again later.
Articles 1–20