Seguir
Kevin Butler
Kevin Butler
Dirección de correo verificada de ufl.edu - Página principal
Título
Citado por
Citado por
Año
Cryptolock (and drop it): stopping ransomware attacks on user data
N Scaife, H Carter, P Traynor, KRB Butler
2016 IEEE 36th international conference on distributed computing systems …, 2016
5892016
A survey of BGP security issues and solutions
K Butler, TR Farley, P McDaniel, J Rexford
Proceedings of the IEEE 98 (1), 100-122, 2010
5562010
Trustworthy Whole-System Provenance for the Linux Kernel
A Bates, DJ Tian, KRB Butler, T Moyer
24th USENIX Security Symposium (USENIX Security '15), 319-334, 2015
2702015
Hi-fi: collecting high-fidelity whole-system provenance
DJ Pohly, S McLaughlin, P McDaniel, K Butler
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
1992012
Practical hidden voice attacks against speech and speaker recognition systems
H Abdullah, W Garcia, C Peeters, P Traynor, KRB Butler, J Wilson
2019 Network and Distributed System Security (NDSS) Symposium, 2019
1672019
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
1612017
Pcf: A portable circuit format for scalable two-party secure computation
B Kreuter, B Mood, A Shelat, K Butler
2013 USENIX Security Symposium, 2013
1462013
Porscha: Policy oriented secure content handling in Android
M Ongtang, K Butler, P McDaniel
Proceedings of the 26th annual computer security applications conference …, 2010
1432010
Detecting co-residency with active traffic analysis techniques
A Bates, B Mood, J Pletcher, H Pruse, M Valafar, K Butler
CCSW'12: Proceedings of the 2012 ACM Workshop on Cloud computing security, 1-12, 2012
1422012
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices
H Carter, B Mood, P Traynor, K Butler
2013 USENIX Security Symposium, 2013
1332013
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation
B Mood, D Gupta, H Carter, KRB Butler, P Traynor
Proceedings of the 1st IEEE European Symposium on Security and Privacy (Euro …, 2016
1192016
Defending against malicious USB firmware with GoodUSB
DJ Tian, A Bates, K Butler
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
1032015
FirmUSB: Vetting USB device firmware using domain informed symbolic execution
G Hernandez, F Fowze, D Tian, T Yavuz, KRB Butler
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1012017
Let SDN Be Your Eyes: Secure Forensics in Data Center Networks
A Bates, K Butler, A Haeberlen, M Sherr, W Zhou
NDSS Workshop on Security of Emerging Networking Technologies (SENT), 2014
992014
Optimizing BGP security by exploiting path stability
K Butler, P McDaniel, W Aiello
Proceedings of the 13th ACM conference on Computer and communications …, 2006
972006
Towards secure provenance-based access control in cloud environments
A Bates, B Mood, M Valafar, K Butler
Proceedings of the third ACM conference on Data and application security and …, 2013
962013
On detecting co-resident cloud instances using network flow watermarking techniques
A Bates, B Mood, J Pletcher, H Pruse, M Valafar, K Butler
International Journal of Information Security 13, 171-189, 2014
752014
More guidelines than rules: CSRF vulnerabilities from noncompliant OAuth 2.0 implementations
E Shernan, H Carter, D Tian, P Traynor, K Butler
Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015
722015
* droid: Assessment and evaluation of android application analysis tools
B Reaves, J Bowers, SA Gorski III, O Anise, R Bobhate, R Cho, H Das, ...
ACM Computing Surveys (CSUR) 49 (3), 1-30, 2016
672016
Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
B Reaves, N Scaife, D Tian, L Blue, P Traynor, KRB Butler
Proceedings of the 37th IEEE Symposium on Security and Privacy (Oakland'16), 2016
672016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20