Port or Shim? Stress Testing Application Performance on Intel SGX A Hasan, R Riley, D Ponomarev 2020 IEEE International Symposium on Workload Characterization (IISWC), 123-133, 2020 | 11 | 2020 |
Enclave-based oblivious RAM using Intel’s SGX MH Rachid, R Riley, Q Malluhi Computers & Security 91, 101711, 2020 | 12 | 2020 |
Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset M AlSabah, G Oligeri, R Riley Computers & Security, 2018 | 54 | 2018 |
BranchScope: A New Side-Channel Attack on Directional Branch Predictor D Evtyushkin, R Riley, NCSE Abu-Ghazaleh, D Ponomarev Proceedings of the Twenty-Third International Conference on Architectural …, 2018 | 340 | 2018 |
Implementing and Analyzing a Recursive Technique for Building Path Oblivious RAM MH Rachid, R Riley, Q Malluhi Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3 …, 2018 | | 2018 |
Understanding in-app ads and detecting hidden attacks through the mobile app-web interface R Shao, V Rastogi, Y Chen, X Pan, G Guo, S Zou, R Riley IEEE Transactions on Mobile Computing 17 (11), 2675-2688, 2018 | 21 | 2018 |
Dydroid: Measuring dynamic code loading and its security implications in android applications Z Qu, S Alam, Y Chen, X Zhou, W Hong, R Riley 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 37 | 2017 |
On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters B Singh, D Evtyushkin, J Elwell, R Riley, I Cervesato Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 148 | 2017 |
Hardening Extended Memory Access Control Schemes with Self-Verified Address Spaces J Elwell, D Evtyushkin, D Ponomarev, N Abu-Ghazaleh, R Riley | 1 | 2017 |
DroidNative: automating and optimizing detection of android native code malware variants S Alam, Z Qu, R Riley, Y Chen, V Rastogi Computers & Security, 2016 | 111 | 2016 |
Flexible hardware-managed isolated execution: Architecture, software support and applications D Evtyushkin, J Elwell, M Ozsoy, DV Ponomarev, NA Ghazaleh, R Riley IEEE Transactions on Dependable and Secure Computing, 2016 | 17 | 2016 |
Detecting Hidden Attacks through the Mobile App-Web Interfaces V Rastogi, R Shao, Y Chen, X Pan, S Zou, R Riley 2016 Network and Distributed System Security Symposium (NDSS), 2016 | 86* | 2016 |
Rethinking Memory Permissions for Protection Against Cross-Layer Attacks J Elwell, R Riley, N Abu-Ghazaleh, D Ponomarev, I Cervesato ACM Transactions on Architecture and Code Optimization (TACO) 12 (4), 56, 2015 | 7 | 2015 |
Distributed algorithms in wireless sensor networks: An approach for applying binary consensus in a real testbed N Al-Nakhala, R Riley, T Elfouly Computer Networks 79, 30-38, 2015 | 25 | 2015 |
Association Rule Mining on Fragmented Database A Hamzaoui, Q Malluhi, C Clifton, R Riley Data Privacy Management, Autonomous Spontaneous Security, and Security …, 2015 | 2 | 2015 |
Iso-x: A flexible architecture for hardware-managed isolated execution D Evtyushkin, J Elwell, M Ozsoy, D Ponomarev, NA Ghazaleh, R Riley Proceedings of the 47th Annual IEEE/ACM International Symposium on …, 2014 | 125 | 2014 |
Clustered Binary Consensus in Sensor Motes N Al-Nakhala, R Riley, T Elfouly European Wireless 2014; 20th European Wireless Conference; Proceedings of, 1-7, 2014 | 2 | 2014 |
A Non-Inclusive Memory Permissions Architecture for Protection Against Cross-Layer Attacks J Elwell, R Riley, N Abu-Ghazaleh, D Ponomarev IEEE 20th International Symposium on High Performance Computer Architecture …, 2014 | 20 | 2014 |
Data-Centric OS Kernel Malware Characterization J Rhee, R Riley, Z Lin, X Jiang, D Xu IEEE Transactions on Information Forensics and Security 9 (1), 72-87, 2014 | 36 | 2014 |
A framework for prototyping and testing data-only rootkit attacks R Riley Computers & Security 37, 62-71, 2013 | 11 | 2013 |