


Остановите войну!
for scientists:


default search action
Kevin R. B. Butler
Person information

- affiliation: University of Florida, Gainesville, FL, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j25]Tuba Yavuz
, Farhaan Fowze
, Grant Hernandez, Ken Yihang Bai
, Kevin R. B. Butler
, Dave Jing Tian:
ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs. IEEE Trans. Dependable Secur. Comput. 20(2): 1577-1595 (2023) - [j24]Brendan David-John, Kevin R. B. Butler, Eakta Jain:
Privacy-preserving datasets of eye-tracking samples with applications in XR. IEEE Trans. Vis. Comput. Graph. 29(5): 2774-2784 (2023) - [c90]Jennifer Sheldon
, Weidong Zhu
, Adnan Abdullah
, Kevin R. B. Butler, Md Jahidul Islam
, Sara Rampazzi
:
Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers? HotStorage 2023: 51-57 - [c89]Christian Peeters
, Tyler Tucker
, Anushri Jain
, Kevin R. B. Butler, Patrick Traynor
:
LeopardSeal: Detecting Call Interception via Audio Rogue Base Stations. MobiSys 2023: 410-422 - [c88]Yan Long, Pirouz Naghavi, Blas Kojusner, Kevin R. B. Butler, Sara Rampazzi, Kevin Fu:
Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses. SP 2023: 1857-1874 - [c87]Tyler Tucker, Hunter Searle, Kevin R. B. Butler, Patrick Traynor:
Blue's Clues: Practical Discovery of Non-Discoverable Bluetooth Devices. SP 2023: 3098-3112 - [c86]Kyungtae Kim, Sungwoo Kim, Kevin R. B. Butler, Antonio Bianchi, Rick Kennell, Dave Tian:
Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery. USENIX Security Symposium 2023 - [c85]Yazhou Tu, Liqun Shan, Md. Imran Hossen, Sara Rampazzi, Kevin R. B. Butler, Xiali Hei:
Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs. USENIX Security Symposium 2023 - [i14]Yan Long, Pirouz Naghavi, Blas Kojusner, Kevin R. B. Butler, Sara Rampazzi, Kevin Fu:
Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses. CoRR abs/2301.10056 (2023) - [i13]Efe Bozkir, Süleyman Özdel, Mengdi Wang, Brendan David-John, Hong Gao, Kevin R. B. Butler, Eakta Jain, Enkelejda Kasneci:
Eye-tracked Virtual Reality: A Comprehensive Survey on Methods and Privacy Challenges. CoRR abs/2305.14080 (2023) - 2022
- [j23]Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler:
Analyzing the Monetization Ecosystem of Stalkerware. Proc. Priv. Enhancing Technol. 2022(4): 105-119 (2022) - [j22]Weidong Zhu
, Kevin R. B. Butler
:
NASA: NVM-Assisted Secure Deletion for Flash Memory. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11): 3779-3790 (2022) - [c84]Daniel Olszewski, Weidong Zhu
, Sandeep Sathyanarayana, Kevin R. B. Butler, Patrick Traynor:
HallMonitor: A Framework for Identifying Network Policy Violations in Software. CNS 2022: 245-253 - [c83]Brendan David-John, Kevin R. B. Butler, Eakta Jain:
For Your Eyes Only: Privacy-preserving eye-tracking datasets. ETRA 2022: 10:1-10:6 - [c82]Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr M. Youssef:
SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android. EuroS&P 2022: 572-586 - [c81]Washington Garcia, Hamilton Scott Clouse, Kevin R. B. Butler:
Disentangling Categorization in Multi-agent Emergent Communication. NAACL-HLT 2022: 4523-4540 - [c80]Grant Hernandez, Marius Muench, Dominik Christian Maier, Alyssa Milburn, Shinjo Park, Tobias Scharnowski, Tyler Tucker, Patrick Traynor, Kevin R. B. Butler:
FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware. NDSS 2022 - [c79]Kyungtae Kim, Taegyu Kim, Ertza Warraich, Byoungyoung Lee, Kevin R. B. Butler, Antonio Bianchi, Dave Jing Tian:
FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks. SP 2022: 2212-2229 - [c78]Logan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin R. B. Butler, Patrick Traynor:
Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction. USENIX Security Symposium 2022: 2691-2708 - [e5]Kevin R. B. Butler, Kurt Thomas:
31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022. USENIX Association 2022, ISBN 978-1-939133-31-1 [contents] - [i12]Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr M. Youssef:
SAUSAGE: Security Analysis of Unix domain Socket Usage in Android. CoRR abs/2204.01516 (2022) - [i11]César N. Arguello, Hunter Searle, Sara Rampazzi, Kevin R. B. Butler:
A Practical Methodology for ML-Based EM Side Channel Disassemblers. CoRR abs/2206.10746 (2022) - 2021
- [j21]Farhaan Fowze
, Dave Tian, Grant Hernandez, Kevin R. B. Butler, Tuba Yavuz
:
ProXray: Protocol Model Learning and Guided Firmware Analysis. IEEE Trans. Software Eng. 47(9): 1907-1928 (2021) - [j20]Brendan David-John, Diane Hosfelt, Kevin R. B. Butler
, Eakta Jain:
A privacy-preserving approach to streaming eye-tracking data. IEEE Trans. Vis. Comput. Graph. 27(5): 2555-2565 (2021) - [c77]Washington Garcia, Animesh Chhotaray, Joseph I. Choi, Suman Kalyan Adari, Kevin R. B. Butler
, Somesh Jha:
Brittle Features of Device Authentication. CODASPY 2021: 53-64 - [c76]Arslan Khan, Joseph I. Choi, Dave Jing Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, John M. Shea, Tan F. Wong:
Privacy-Preserving Localization using Enclaves. UEMCON 2021: 269-278 - [i10]Brendan David-John, Diane Hosfelt, Kevin R. B. Butler, Eakta Jain:
A privacy-preserving approach to streaming eye-tracking data. CoRR abs/2102.01770 (2021) - [i9]Washington Garcia, Pin-Yu Chen, Somesh Jha, Scott Clouse, Kevin R. B. Butler:
Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples. CoRR abs/2103.03325 (2021) - 2020
- [c75]Sushrut Shringarputale, Patrick D. McDaniel, Kevin R. B. Butler
, Thomas La Porta:
Co-residency Attacks on Containers are Real. CCSW@CCS 2020: 53-66 - [c74]Grant Hernandez, Dave (Jing) Tian, Anurag Swarnim Yadav, Byron J. Williams, Kevin R. B. Butler:
BigMAC: Fine-Grained Policy Analysis of Android Firmware. USENIX Security Symposium 2020: 271-287 - [e4]Noseong Park, Kun Sun, Sara Foresti, Kevin R. B. Butler, Nitesh Saxena:
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 335, Springer 2020, ISBN 978-3-030-63085-0 [contents] - [e3]Noseong Park, Kun Sun, Sara Foresti, Kevin R. B. Butler, Nitesh Saxena:
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 336, Springer 2020, ISBN 978-3-030-63094-2 [contents]
2010 – 2019
- 2019
- [j19]Grant Hernandez, Farhaan Fowze
, Dave Jing Tian, Tuba Yavuz, Patrick Traynor, Kevin R. B. Butler
:
Toward Automated Firmware Analysis in the IoT Era. IEEE Secur. Priv. 17(5): 38-46 (2019) - [j18]Joseph I. Choi
, Kevin R. B. Butler
:
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities. Secur. Commun. Networks 2019: 1368905:1-1368905:28 (2019) - [j17]Bradley Reaves, Luis Vargas, Nolen Scaife
, Dave Tian, Logan Blue, Patrick Traynor, Kevin R. B. Butler
:
Characterizing the Security of the SMS Ecosystem with Public Gateways. ACM Trans. Priv. Secur. 22(1): 2:1-2:31 (2019) - [c73]Joseph I. Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler
, Patrick Traynor:
A Hybrid Approach to Secure Function Evaluation using SGX. AsiaCCS 2019: 100-113 - [c72]Vanessa Frost, Dave (Jing) Tian, Christie Ruales, Vijay Prakash, Patrick Traynor, Kevin R. B. Butler
:
Examining DES-based Cipher Suite Support within the TLS Ecosystem. AsiaCCS 2019: 539-546 - [c71]Dave (Jing) Tian, Joseph I. Choi, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler
:
A Practical Intel SGX Setting for Linux Containers in the Cloud. CODASPY 2019: 255-266 - [c70]Suman Kalyan Adari, Washington Garcia, Kevin R. B. Butler
:
Adversarial Video Captioning. DSN Workshops 2019: 24-27 - [c69]Lianying Zhao
, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler
, Mohammad Mannan, Erman Ayday, Jeremy Clark:
One-Time Programs Made Practical. Financial Cryptography 2019: 646-666 - [c68]Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson:
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. NDSS 2019 - [c67]Luis Vargas, Logan Blue, Vanessa Frost, Christopher Patton, Nolen Scaife, Kevin R. B. Butler, Patrick Traynor:
Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System. NDSS 2019 - [c66]Dave Jing Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Peter C. Johnson, Kevin R. B. Butler
:
LBM: A Security Framework for Peripherals within the Linux Kernel. IEEE Symposium on Security and Privacy 2019: 967-984 - [c65]Jasmine D. Bowers, Imani N. Sherman, Kevin R. B. Butler
, Patrick Traynor:
Characterizing security and privacy practices in emerging digital credit applications. WiSec 2019: 94-107 - [c64]Joseph I. Choi, Dave (Jing) Tian, Tyler Ward, Kevin R. B. Butler
, Patrick Traynor, John M. Shea, Tan F. Wong:
Enclave-based privacy-preserving localization: poster. WiSec 2019: 312-313 - [c63]Grant Hernandez, Kevin R. B. Butler
:
Basebads: Automated security analysis of baseband firmware: poster. WiSec 2019: 318-319 - [i8]Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson:
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. CoRR abs/1904.05734 (2019) - [i7]Joseph I. Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor:
A Hybrid Approach to Secure Function Evaluation Using SGX. CoRR abs/1905.01233 (2019) - [i6]Lianying Zhao, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler, Mohammad Mannan, Erman Ayday, Jeremy Clark:
One-Time Programs made Practical. CoRR abs/1907.00935 (2019) - 2018
- [j16]Benjamin Mood, Kevin R. B. Butler
:
PAL: A pseudo assembly language for optimizing secure function evaluation in mobile devices. J. Inf. Secur. Appl. 40: 78-91 (2018) - [c62]Luis Vargas, Gyan Hazarika, Rachel Culpepper, Kevin R. B. Butler
, Thomas Shrimpton, Doug Szajda, Patrick Traynor:
Mitigating Risk while Complying with Data Retention Laws. CCS 2018: 2011-2027 - [c61]Kevin R. B. Butler, Robert K. Cunningham, Paul C. van Oorschot, Reihaneh Safavi-Naini, Ashraf Matrawy, Jeremy Clark:
A Discussion on Security Education in Academia. CCS 2018: 2187-2188 - [c60]Christian Peeters, Hadi Abdullah, Nolen Scaife
, Jasmine D. Bowers, Patrick Traynor, Bradley Reaves, Kevin R. B. Butler
:
Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding. IEEE Symposium on Security and Privacy 2018: 567-582 - [c59]Jing (Dave) Tian, Nolen Scaife
, Deepak Kumar, Michael Bailey, Adam Bates, Kevin R. B. Butler
:
SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C. IEEE Symposium on Security and Privacy 2018: 1032-1047 - [c58]Dave (Jing) Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Christie Ruales, Patrick Traynor, Hayawardh Vijayakumar, Lee Harrison, Amir Rahmati, Michael Grace, Kevin R. B. Butler:
ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem. USENIX Security Symposium 2018: 273-290 - [c57]Grant Hernandez, Kevin R. B. Butler
:
Android Escalation Paths: Building Attack-Graphs from SEAndroid Policies. WISEC 2018: 289-290 - [e2]Panos Papadimitratos, Kevin R. B. Butler, Christina Pöpper:
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018. ACM 2018 [contents] - [i5]Washington Garcia, Joseph I. Choi, Suman Kalyan Adari, Somesh Jha, Kevin R. B. Butler:
Explainable Black-Box Attacks Against Model-based Authentication. CoRR abs/1810.00024 (2018) - 2017
- [j15]Patrick Traynor, Kevin R. B. Butler
, Jasmine D. Bowers, Bradley Reaves:
FinTechSec: Addressing the Security Challenges of Digital Financial Services. IEEE Secur. Priv. 15(5): 85-89 (2017) - [j14]Jing (Dave) Tian, Kevin R. B. Butler
, Joseph I. Choi, Patrick D. McDaniel, Padma Krishnaswamy:
Securing ARP/NDP From the Ground Up. IEEE Trans. Inf. Forensics Secur. 12(9): 2131-2143 (2017) - [j13]Bradley Reaves, Jasmine D. Bowers, Nolen Scaife
, Adam Bates, Arnav Bhartiya, Patrick Traynor, Kevin R. B. Butler
:
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications. ACM Trans. Priv. Secur. 20(3): 11:1-11:31 (2017) - [j12]Adam Bates, Dave (Jing) Tian, Grant Hernandez, Thomas Moyer, Kevin R. B. Butler
, Trent Jaeger:
Taming the Costs of Trustworthy Provenance through Policy Reduction. ACM Trans. Internet Techn. 17(4): 34:1-34:21 (2017) - [c56]Robert Karam, Tamzidul Hoque, Kevin R. B. Butler
, Swarup Bhunia:
Mixed-granular architectural diversity for device security in the Internet of Things. AsianHOST 2017: 73-78 - [c55]Grant Hernandez, Farhaan Fowze, Dave (Jing) Tian, Tuba Yavuz, Kevin R. B. Butler
:
FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution. CCS 2017: 2245-2262 - [c54]Tyler Ward, Joseph I. Choi, Kevin R. B. Butler
, John M. Shea, Patrick Traynor, Tan F. Wong:
Privacy preserving localization using a distributed particle filtering protocol. MILCOM 2017: 835-840 - [c53]Jasmine D. Bowers, Bradley Reaves, Imani N. Sherman, Patrick Traynor, Kevin R. B. Butler:
Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. SOUPS 2017: 97-114 - [c52]Adam Bates, Wajih Ul Hassan, Kevin R. B. Butler
, Alin Dobra
, Bradley Reaves, Patrick T. Cable II, Thomas Moyer, Nabil Schear:
Transparent Web Service Auditing via Network Provenance Functions. WWW 2017: 887-895 - [i4]Grant Hernandez, Farhaan Fowze, Dave Tian, Tuba Yavuz, Kevin R. B. Butler:
FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution. CoRR abs/1708.09114 (2017) - 2016
- [j11]Bradley Reaves, Jasmine D. Bowers, Sigmund Albert Gorski III, Olabode Anise, Rahul Bobhate, Raymond Cho, Hiranava Das, Sharique Hussain, Hamza Karachiwala, Nolen Scaife
, Byron Wright, Kevin R. B. Butler
, William Enck, Patrick Traynor:
*droid: Assessment and Evaluation of Android Application Analysis Tools. ACM Comput. Surv. 49(3): 55:1-55:30 (2016) - [j10]Henry Carter
, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler
:
Secure outsourced garbled circuit evaluation for mobile devices. J. Comput. Secur. 24(2): 137-180 (2016) - [j9]Henry Carter
, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler
:
Outsourcing secure two-party computation as a black box. Secur. Commun. Networks 9(14): 2261-2275 (2016) - [c51]Sriharsha Etigowni, Dave (Jing) Tian, Grant Hernandez, Saman A. Zonouz, Kevin R. B. Butler:
CPAC: securing critical infrastructure with cyber-physical access control. ACSAC 2016: 139-152 - [c50]Dave (Jing) Tian, Adam Bates, Kevin R. B. Butler
, Raju Rangaswami:
ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices. CCS 2016: 242-253 - [c49]Siddhant Deshmukh, Henry Carter
, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler
:
Efficient and secure template blinding for biometric authentication. CNS 2016: 480-488 - [c48]Benjamin Mood, Debayan Gupta, Henry Carter
, Kevin R. B. Butler
, Patrick Traynor:
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation. EuroS&P 2016: 112-127 - [c47]Debayan Gupta, Benjamin Mood, Joan Feigenbaum, Kevin R. B. Butler
, Patrick Traynor:
Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation. Financial Cryptography Workshops 2016: 302-318 - [c46]Nolen Scaife
, Henry Carter
, Patrick Traynor, Kevin R. B. Butler
:
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data. ICDCS 2016: 303-312 - [c45]Thomas Moyer, Karishma Chadha, Robert K. Cunningham, Nabil Schear, Warren Smith, Adam Bates, Kevin R. B. Butler
, Frank Capobianco, Trent Jaeger, Patrick T. Cable II:
Leveraging Data Provenance to Enhance Cyber Resilience. SecDev 2016: 107-114 - [c44]Bradley Reaves, Nolen Scaife
, Dave Tian, Logan Blue, Patrick Traynor, Kevin R. B. Butler
:
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways. IEEE Symposium on Security and Privacy 2016: 339-356 - [c43]Dave (Jing) Tian, Nolen Scaife, Adam Bates, Kevin R. B. Butler, Patrick Traynor:
Making USB Great Again with USBFILTER. USENIX Security Symposium 2016: 415-430 - [c42]Bradley Reaves, Logan Blue, Dave Tian, Patrick Traynor, Kevin R. B. Butler
:
Detecting SMS Spam in the Age of Legitimate Bulk Messaging. WISEC 2016: 165-170 - [p1]Adam Bates, Devin J. Pohly, Kevin R. B. Butler:
Secure and Trustworthy Provenance Collection for Digital Forensics. Digital Fingerprinting 2016: 141-176 - [i3]Adam Bates, Kevin R. B. Butler, Alin Dobra, Bradley Reaves, Patrick T. Cable II, Thomas Moyer, Nabil Schear:
Retrofitting Applications with Provenance-Based Security Monitoring. CoRR abs/1609.00266 (2016) - 2015
- [j8]Adam Bates, Kevin R. B. Butler
, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable wiretapping - or - I know they can hear you now. J. Comput. Secur. 23(2): 167-195 (2015) - [c41]Jing (Dave) Tian, Adam Bates, Kevin R. B. Butler
:
Defending Against Malicious USB Firmware with GoodUSB. ACSAC 2015: 261-270 - [c40]Henry Carter
, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler
:
Outsourcing Secure Two-Party Computation as a Black Box. CANS 2015: 214-222 - [c39]Jing (Dave) Tian, Kevin R. B. Butler
, Patrick D. McDaniel, Padma Krishnaswamy:
Securing ARP From the Ground Up. CODASPY 2015: 305-312 - [c38]Ethan Shernan, Henry Carter
, Dave Tian, Patrick Traynor, Kevin R. B. Butler
:
More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations. DIMVA 2015: 239-260 - [c37]Adam Bates, Kevin R. B. Butler, Thomas Moyer:
Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs. TaPP 2015 - [c36]Bradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor, Kevin R. B. Butler:
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World. USENIX Security Symposium 2015: 17-32 - [c35]Adam Bates, Dave Tian, Kevin R. B. Butler, Thomas Moyer:
Trustworthy Whole-System Provenance for the Linux Kernel. USENIX Security Symposium 2015: 319-334 - [i2]Benjamin Mood, Debayan Gupta, Kevin R. B. Butler, Joan Feigenbaum:
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values. CoRR abs/1506.02954 (2015) - 2014
- [j7]Adam Bates, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, Kevin R. B. Butler
:
On detecting co-resident cloud instances using network flow watermarking techniques. Int. J. Inf. Sec. 13(2): 171-189 (2014) - [c34]Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Kevin R. B. Butler
, Abdulrahman Alkhelaifi:
Securing SSL Certificate Verification through Dynamic Linking. CCS 2014: 394-405 - [c33]Benjamin Mood, Debayan Gupta
, Kevin R. B. Butler
, Joan Feigenbaum:
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values. CCS 2014: 582-596 - [c32]Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Kevin R. B. Butler
:
Forced Perspectives: Evaluating an SSL Trust Enhancement at Scale. Internet Measurement Conference 2014: 503-510 - [c31]Adam Bates, Ryan Leonard, Hannah Pruse, Daniel Lowd, Kevin R. B. Butler:
Leveraging USB to Establish Host Identity Using Commodity Devices. NDSS 2014 - [e1]Charles N. Payne Jr., Adam Hahn, Kevin R. B. Butler, Micah Sherr:
Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014. ACM 2014, ISBN 978-1-4503-3005-3 [contents] - [i1]Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Outsourcing Secure Two-Party Computation as a Black Box. IACR Cryptol. ePrint Arch. 2014: 936 (2014) - 2013
- [c30]Adam Bates, Benjamin Mood, Masoud Valafar, Kevin R. B. Butler
:
Towards secure provenance-based access control in cloud environments. CODASPY 2013: 277-284 - [c29]Matt Bishop, Emily Rine Butler, Kevin R. B. Butler
, Carrie Gates, Steven Greenspan:
Forgive and forget: return to obscurity. NSPW 2013: 1-10 - [c28]Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. USENIX Security Symposium 2013: 289-304 - [c27]Ben Kreuter, Abhi Shelat, Benjamin Mood, Kevin R. B. Butler:
PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation. USENIX Security Symposium 2013: 321-336 - 2012
- [j6]Thomas Moyer, Kevin R. B. Butler
, Joshua Schiffman, Patrick D. McDaniel, Trent Jaeger:
Scalable Web Content Attestation. IEEE Trans. Computers 61(5): 686-699 (2012) - [c26]Vasant Tendulkar, Ryan Snyder, Joe Pletcher, Kevin R. B. Butler
, Ashwin Shashidharan, William Enck:
Abusing cloud-based browsers for fun and profit. ACSAC 2012: 219-228 - [c25]Devin J. Pohly, Stephen E. McLaughlin, Patrick D. McDaniel, Kevin R. B. Butler
:
Hi-Fi: collecting high-fidelity whole-system provenance. ACSAC 2012: 259-268 - [c24]Adam Bates, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, Kevin R. B. Butler
:
Detecting co-residency with active traffic analysis techniques. CCSW 2012: 1-12 - [c23]Benjamin Mood, Lara Letaw, Kevin R. B. Butler
:
Memory-Efficient Garbled Circuit Generation for Mobile Devices. Financial Cryptography 2012: 254-268 - [c22]Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable Wiretapping -or- I know they can hear you now. NDSS 2012 - 2011
- [c21]Lara Letaw, Joe Pletcher, Kevin R. B. Butler
:
Host Identification via USB Fingerprinting. SADFE 2011: 1-9 - 2010
- [j5]Kevin R. B. Butler
, Stephen E. McLaughlin, Thomas Moyer, Patrick D. McDaniel:
New Security Architectures Based on Emerging Disk Functionality. IEEE Secur. Priv. 8(5): 34-41 (2010) - [j4]Kevin R. B. Butler
, Toni R. Farley, Patrick D. McDaniel, Jennifer Rexford
:
A Survey of BGP Security Issues and Solutions. Proc. IEEE 98(1): 100-122 (2010) - [j3]