Cryptolock (and drop it): stopping ransomware attacks on user data N Scaife, H Carter, P Traynor, KRB Butler 2016 IEEE 36th international conference on distributed computing systems …, 2016 | 596 | 2016 |
A survey of BGP security issues and solutions K Butler, TR Farley, P McDaniel, J Rexford Proceedings of the IEEE 98 (1), 100-122, 2010 | 557 | 2010 |
Trustworthy Whole-System Provenance for the Linux Kernel A Bates, DJ Tian, KRB Butler, T Moyer 24th USENIX Security Symposium (USENIX Security '15), 319-334, 2015 | 280 | 2015 |
Hi-fi: collecting high-fidelity whole-system provenance DJ Pohly, S McLaughlin, P McDaniel, K Butler Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 206 | 2012 |
Practical hidden voice attacks against speech and speaker recognition systems H Abdullah, W Garcia, C Peeters, P Traynor, KRB Butler, J Wilson 2019 Network and Distributed System Security (NDSS) Symposium, 2019 | 182 | 2019 |
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017 | 161 | 2017 |
Pcf: A portable circuit format for scalable two-party secure computation B Kreuter, B Mood, A Shelat, K Butler 2013 USENIX Security Symposium, 2013 | 147 | 2013 |
Porscha: Policy oriented secure content handling in Android M Ongtang, K Butler, P McDaniel Proceedings of the 26th annual computer security applications conference …, 2010 | 144 | 2010 |
Detecting co-residency with active traffic analysis techniques A Bates, B Mood, J Pletcher, H Pruse, M Valafar, K Butler CCSW'12: Proceedings of the 2012 ACM Workshop on Cloud computing security, 1-12, 2012 | 143 | 2012 |
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices H Carter, B Mood, P Traynor, K Butler 2013 USENIX Security Symposium, 2013 | 138 | 2013 |
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation B Mood, D Gupta, H Carter, KRB Butler, P Traynor Proceedings of the 1st IEEE European Symposium on Security and Privacy (Euro …, 2016 | 123 | 2016 |
FirmUSB: Vetting USB device firmware using domain informed symbolic execution G Hernandez, F Fowze, D Tian, T Yavuz, KRB Butler Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 108 | 2017 |
Defending against malicious USB firmware with GoodUSB DJ Tian, A Bates, K Butler Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 103 | 2015 |
Let SDN Be Your Eyes: Secure Forensics in Data Center Networks A Bates, K Butler, A Haeberlen, M Sherr, W Zhou NDSS Workshop on Security of Emerging Networking Technologies (SENT), 2014 | 102 | 2014 |
Optimizing BGP security by exploiting path stability K Butler, P McDaniel, W Aiello Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 97 | 2006 |
Towards secure provenance-based access control in cloud environments A Bates, B Mood, M Valafar, K Butler Proceedings of the third ACM conference on Data and application security and …, 2013 | 96 | 2013 |
On detecting co-resident cloud instances using network flow watermarking techniques A Bates, B Mood, J Pletcher, H Pruse, M Valafar, K Butler International Journal of Information Security 13, 171-189, 2014 | 75 | 2014 |
More guidelines than rules: CSRF vulnerabilities from noncompliant OAuth 2.0 implementations E Shernan, H Carter, D Tian, P Traynor, K Butler Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015 | 73 | 2015 |
* droid: Assessment and evaluation of android application analysis tools B Reaves, J Bowers, SA Gorski III, O Anise, R Bobhate, R Cho, H Das, ... ACM Computing Surveys (CSUR) 49 (3), 1-30, 2016 | 70 | 2016 |
Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways B Reaves, N Scaife, D Tian, L Blue, P Traynor, KRB Butler Proceedings of the 37th IEEE Symposium on Security and Privacy (Oakland'16), 2016 | 69 | 2016 |