default search action
Kevin R. B. Butler
Person information
- affiliation: University of Florida, Gainesville, FL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Ethan Wilson, Azim Ibragimov, Michael J. Proulx, Sai Deep Tetali, Kevin R. B. Butler, Eakta Jain:
Privacy-Preserving Gaze Data Streaming in Immersive Interactive Virtual Reality: Robustness and User Experience. IEEE Trans. Vis. Comput. Graph. 30(5): 2257-2268 (2024) - [c96]K. Virgil English, Nathaniel Bennett, Seaver Thorn, Kevin R. B. Butler, William Enck, Patrick Traynor:
Examining Cryptography and Randomness Failures in Open-Source Cellular Cores. CODASPY 2024: 43-54 - [c95]Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi:
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management. SP 2024: 331-349 - [c94]Seth Layton, Tyler Tucker, Daniel Olszewski, Kevin Warren, Kevin R. B. Butler, Patrick Traynor:
SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets. USENIX Security Symposium 2024 - [c93]Seaver Thorn, K. Virgil English, Kevin R. B. Butler, William Enck:
5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions. WISEC 2024: 66-77 - [i17]Ethan Wilson, Azim Ibragimov, Michael J. Proulx, Sai Deep Tetali, Kevin R. B. Butler, Eakta Jain:
Privacy-Preserving Gaze Data Streaming in Immersive Interactive Virtual Reality: Robustness and User Experience. CoRR abs/2402.07687 (2024) - [i16]Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi:
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management. CoRR abs/2404.11815 (2024) - [i15]Seth Layton, Thiago De Andrade, Daniel Olszewski, Kevin Warren, Kevin R. B. Butler, Patrick Traynor:
Every Breath You Don't Take: Deepfake Speech Detection Using Breath. CoRR abs/2404.15143 (2024) - 2023
- [j25]Tuba Yavuz, Farhaan Fowze, Grant Hernandez, Ken Yihang Bai, Kevin R. B. Butler, Dave Jing Tian:
ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs. IEEE Trans. Dependable Secur. Comput. 20(2): 1577-1595 (2023) - [j24]Brendan David-John, Kevin R. B. Butler, Eakta Jain:
Privacy-preserving datasets of eye-tracking samples with applications in XR. IEEE Trans. Vis. Comput. Graph. 29(5): 2774-2784 (2023) - [c92]Daniel Olszewski, Allison Lu, Carson Stillman, Kevin Warren, Cole Kitroser, Alejandro Pascual, Divyajyoti Ukirde, Kevin R. B. Butler, Patrick Traynor:
"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences. CCS 2023: 3433-3459 - [c91]Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi:
Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers? HotStorage 2023: 51-57 - [c90]Christian Peeters, Tyler Tucker, Anushri Jain, Kevin R. B. Butler, Patrick Traynor:
LeopardSeal: Detecting Call Interception via Audio Rogue Base Stations. MobiSys 2023: 410-422 - [c89]Washington Garcia, Pin-Yu Chen, Hamilton Scott Clouse, Somesh Jha, Kevin R. B. Butler:
Less is More: Dimension Reduction Finds On-Manifold Adversarial Examples in Hard-Label Attacks. SaTML 2023: 254-270 - [c88]Yan Long, Pirouz Naghavi, Blas Kojusner, Kevin R. B. Butler, Sara Rampazzi, Kevin Fu:
Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses. SP 2023: 1857-1874 - [c87]Tyler Tucker, Hunter Searle, Kevin R. B. Butler, Patrick Traynor:
Blue's Clues: Practical Discovery of Non-Discoverable Bluetooth Devices. SP 2023: 3098-3112 - [c86]Yazhou Tu, Liqun Shan, Md. Imran Hossen, Sara Rampazzi, Kevin R. B. Butler, Xiali Hei:
Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs. USENIX Security Symposium 2023: 175-192 - [c85]Kyungtae Kim, Sungwoo Kim, Kevin R. B. Butler, Antonio Bianchi, Rick Kennell, Dave Tian:
Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery. USENIX Security Symposium 2023: 5845-5861 - [i14]Yan Long, Pirouz Naghavi, Blas Kojusner, Kevin R. B. Butler, Sara Rampazzi, Kevin Fu:
Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses. CoRR abs/2301.10056 (2023) - [i13]Efe Bozkir, Süleyman Özdel, Mengdi Wang, Brendan David-John, Hong Gao, Kevin R. B. Butler, Eakta Jain, Enkelejda Kasneci:
Eye-tracked Virtual Reality: A Comprehensive Survey on Methods and Privacy Challenges. CoRR abs/2305.14080 (2023) - 2022
- [j23]Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler:
Analyzing the Monetization Ecosystem of Stalkerware. Proc. Priv. Enhancing Technol. 2022(4): 105-119 (2022) - [j22]Weidong Zhu, Kevin R. B. Butler:
NASA: NVM-Assisted Secure Deletion for Flash Memory. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11): 3779-3790 (2022) - [c84]Daniel Olszewski, Weidong Zhu, Sandeep Sathyanarayana, Kevin R. B. Butler, Patrick Traynor:
HallMonitor: A Framework for Identifying Network Policy Violations in Software. CNS 2022: 245-253 - [c83]Brendan David-John, Kevin R. B. Butler, Eakta Jain:
For Your Eyes Only: Privacy-preserving eye-tracking datasets. ETRA 2022: 10:1-10:6 - [c82]Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr M. Youssef:
SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android. EuroS&P 2022: 572-586 - [c81]Washington Garcia, Hamilton Scott Clouse, Kevin R. B. Butler:
Disentangling Categorization in Multi-agent Emergent Communication. NAACL-HLT 2022: 4523-4540 - [c80]Grant Hernandez, Marius Muench, Dominik Christian Maier, Alyssa Milburn, Shinjo Park, Tobias Scharnowski, Tyler Tucker, Patrick Traynor, Kevin R. B. Butler:
FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware. NDSS 2022 - [c79]Kyungtae Kim, Taegyu Kim, Ertza Warraich, Byoungyoung Lee, Kevin R. B. Butler, Antonio Bianchi, Dave Jing Tian:
FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks. SP 2022: 2212-2229 - [c78]Logan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin R. B. Butler, Patrick Traynor:
Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction. USENIX Security Symposium 2022: 2691-2708 - [e5]Kevin R. B. Butler, Kurt Thomas:
31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022. USENIX Association 2022, ISBN 978-1-939133-31-1 [contents] - [i12]Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr M. Youssef:
SAUSAGE: Security Analysis of Unix domain Socket Usage in Android. CoRR abs/2204.01516 (2022) - [i11]César N. Arguello, Hunter Searle, Sara Rampazzi, Kevin R. B. Butler:
A Practical Methodology for ML-Based EM Side Channel Disassemblers. CoRR abs/2206.10746 (2022) - 2021
- [j21]Farhaan Fowze, Dave Tian, Grant Hernandez, Kevin R. B. Butler, Tuba Yavuz:
ProXray: Protocol Model Learning and Guided Firmware Analysis. IEEE Trans. Software Eng. 47(9): 1907-1928 (2021) - [j20]Brendan David-John, Diane Hosfelt, Kevin R. B. Butler, Eakta Jain:
A privacy-preserving approach to streaming eye-tracking data. IEEE Trans. Vis. Comput. Graph. 27(5): 2555-2565 (2021) - [c77]Washington Garcia, Animesh Chhotaray, Joseph I. Choi, Suman Kalyan Adari, Kevin R. B. Butler, Somesh Jha:
Brittle Features of Device Authentication. CODASPY 2021: 53-64 - [c76]Arslan Khan, Joseph I. Choi, Dave Jing Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, John M. Shea, Tan F. Wong:
Privacy-Preserving Localization using Enclaves. UEMCON 2021: 269-278 - [i10]Brendan David-John, Diane Hosfelt, Kevin R. B. Butler, Eakta Jain:
A privacy-preserving approach to streaming eye-tracking data. CoRR abs/2102.01770 (2021) - [i9]Washington Garcia, Pin-Yu Chen, Somesh Jha, Scott Clouse, Kevin R. B. Butler:
Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples. CoRR abs/2103.03325 (2021) - 2020
- [c75]Sushrut Shringarputale, Patrick D. McDaniel, Kevin R. B. Butler, Thomas La Porta:
Co-residency Attacks on Containers are Real. CCSW 2020: 53-66 - [c74]Grant Hernandez, Dave (Jing) Tian, Anurag Swarnim Yadav, Byron J. Williams, Kevin R. B. Butler:
BigMAC: Fine-Grained Policy Analysis of Android Firmware. USENIX Security Symposium 2020: 271-287 - [e4]Noseong Park, Kun Sun, Sara Foresti, Kevin R. B. Butler, Nitesh Saxena:
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 335, Springer 2020, ISBN 978-3-030-63085-0 [contents] - [e3]Noseong Park, Kun Sun, Sara Foresti, Kevin R. B. Butler, Nitesh Saxena:
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 336, Springer 2020, ISBN 978-3-030-63094-2 [contents]
2010 – 2019
- 2019
- [j19]Grant Hernandez, Farhaan Fowze, Dave Jing Tian, Tuba Yavuz, Patrick Traynor, Kevin R. B. Butler:
Toward Automated Firmware Analysis in the IoT Era. IEEE Secur. Priv. 17(5): 38-46 (2019) - [j18]Joseph I. Choi, Kevin R. B. Butler:
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities. Secur. Commun. Networks 2019: 1368905:1-1368905:28 (2019) - [j17]Bradley Reaves, Luis Vargas, Nolen Scaife, Dave Tian, Logan Blue, Patrick Traynor, Kevin R. B. Butler:
Characterizing the Security of the SMS Ecosystem with Public Gateways. ACM Trans. Priv. Secur. 22(1): 2:1-2:31 (2019) - [c73]Joseph I. Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor:
A Hybrid Approach to Secure Function Evaluation using SGX. AsiaCCS 2019: 100-113 - [c72]Vanessa Frost, Dave (Jing) Tian, Christie Ruales, Vijay Prakash, Patrick Traynor, Kevin R. B. Butler:
Examining DES-based Cipher Suite Support within the TLS Ecosystem. AsiaCCS 2019: 539-546 - [c71]Dave (Jing) Tian, Joseph I. Choi, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler:
A Practical Intel SGX Setting for Linux Containers in the Cloud. CODASPY 2019: 255-266 - [c70]Suman Kalyan Adari, Washington Garcia, Kevin R. B. Butler:
Adversarial Video Captioning. DSN Workshops 2019: 24-27 - [c69]Lianying Zhao, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler, Mohammad Mannan, Erman Ayday, Jeremy Clark:
One-Time Programs Made Practical. Financial Cryptography 2019: 646-666 - [c68]Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson:
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. NDSS 2019 - [c67]Luis Vargas, Logan Blue, Vanessa Frost, Christopher Patton, Nolen Scaife, Kevin R. B. Butler, Patrick Traynor:
Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System. NDSS 2019 - [c66]Dave Jing Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Peter C. Johnson, Kevin R. B. Butler:
LBM: A Security Framework for Peripherals within the Linux Kernel. IEEE Symposium on Security and Privacy 2019: 967-984 - [c65]Jasmine D. Bowers, Imani N. Sherman, Kevin R. B. Butler, Patrick Traynor:
Characterizing security and privacy practices in emerging digital credit applications. WiSec 2019: 94-107 - [c64]Joseph I. Choi, Dave (Jing) Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, John M. Shea, Tan F. Wong:
Enclave-based privacy-preserving localization: poster. WiSec 2019: 312-313 - [c63]Grant Hernandez, Kevin R. B. Butler:
Basebads: Automated security analysis of baseband firmware: poster. WiSec 2019: 318-319 - [i8]Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson:
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. CoRR abs/1904.05734 (2019) - [i7]Joseph I. Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor:
A Hybrid Approach to Secure Function Evaluation Using SGX. CoRR abs/1905.01233 (2019) - [i6]Lianying Zhao, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler, Mohammad Mannan, Erman Ayday, Jeremy Clark:
One-Time Programs made Practical. CoRR abs/1907.00935 (2019) - 2018
- [j16]Benjamin Mood, Kevin R. B. Butler:
PAL: A pseudo assembly language for optimizing secure function evaluation in mobile devices. J. Inf. Secur. Appl. 40: 78-91 (2018) - [c62]Luis Vargas, Gyan Hazarika, Rachel Culpepper, Kevin R. B. Butler, Thomas Shrimpton, Doug Szajda, Patrick Traynor:
Mitigating Risk while Complying with Data Retention Laws. CCS 2018: 2011-2027 - [c61]Kevin R. B. Butler, Robert K. Cunningham, Paul C. van Oorschot, Reihaneh Safavi-Naini, Ashraf Matrawy, Jeremy Clark:
A Discussion on Security Education in Academia. CCS 2018: 2187-2188 - [c60]Christian Peeters, Hadi Abdullah, Nolen Scaife, Jasmine D. Bowers, Patrick Traynor, Bradley Reaves, Kevin R. B. Butler:
Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding. IEEE Symposium on Security and Privacy 2018: 567-582 - [c59]Jing (Dave) Tian, Nolen Scaife, Deepak Kumar, Michael D. Bailey, Adam Bates, Kevin R. B. Butler:
SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C. IEEE Symposium on Security and Privacy 2018: 1032-1047 - [c58]Dave (Jing) Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Christie Ruales, Patrick Traynor, Hayawardh Vijayakumar, Lee Harrison, Amir Rahmati, Michael Grace, Kevin R. B. Butler:
ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem. USENIX Security Symposium 2018: 273-290 - [c57]Grant Hernandez, Kevin R. B. Butler:
Android Escalation Paths: Building Attack-Graphs from SEAndroid Policies. WISEC 2018: 289-290 - [e2]Panos Papadimitratos, Kevin R. B. Butler, Christina Pöpper:
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018. ACM 2018 [contents] - [i5]Washington Garcia, Joseph I. Choi, Suman Kalyan Adari, Somesh Jha, Kevin R. B. Butler:
Explainable Black-Box Attacks Against Model-based Authentication. CoRR abs/1810.00024 (2018) - 2017
- [j15]Patrick Traynor, Kevin R. B. Butler, Jasmine D. Bowers, Bradley Reaves:
FinTechSec: Addressing the Security Challenges of Digital Financial Services. IEEE Secur. Priv. 15(5): 85-89 (2017) - [j14]Jing (Dave) Tian, Kevin R. B. Butler, Joseph I. Choi, Patrick D. McDaniel, Padma Krishnaswamy:
Securing ARP/NDP From the Ground Up. IEEE Trans. Inf. Forensics Secur. 12(9): 2131-2143 (2017) - [j13]Bradley Reaves, Jasmine D. Bowers, Nolen Scaife, Adam Bates, Arnav Bhartiya, Patrick Traynor, Kevin R. B. Butler:
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications. ACM Trans. Priv. Secur. 20(3): 11:1-11:31 (2017) - [j12]Adam Bates, Dave (Jing) Tian, Grant Hernandez, Thomas Moyer, Kevin R. B. Butler, Trent Jaeger:
Taming the Costs of Trustworthy Provenance through Policy Reduction. ACM Trans. Internet Techn. 17(4): 34:1-34:21 (2017) - [c56]Robert Karam, Tamzidul Hoque, Kevin R. B. Butler, Swarup Bhunia:
Mixed-granular architectural diversity for device security in the Internet of Things. AsianHOST 2017: 73-78 - [c55]Grant Hernandez, Farhaan Fowze, Dave (Jing) Tian, Tuba Yavuz, Kevin R. B. Butler:
FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution. CCS 2017: 2245-2262 - [c54]Tyler Ward, Joseph I. Choi, Kevin R. B. Butler, John M. Shea, Patrick Traynor, Tan F. Wong:
Privacy preserving localization using a distributed particle filtering protocol. MILCOM 2017: 835-840 - [c53]Jasmine D. Bowers, Bradley Reaves, Imani N. Sherman, Patrick Traynor, Kevin R. B. Butler:
Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. SOUPS 2017: 97-114 - [c52]Adam Bates, Wajih Ul Hassan, Kevin R. B. Butler, Alin Dobra, Bradley Reaves, Patrick T. Cable II, Thomas Moyer, Nabil Schear:
Transparent Web Service Auditing via Network Provenance Functions. WWW 2017: 887-895 - [i4]Grant Hernandez, Farhaan Fowze, Dave Tian, Tuba Yavuz, Kevin R. B. Butler:
FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution. CoRR abs/1708.09114 (2017) - 2016
- [j11]Bradley Reaves, Jasmine D. Bowers, Sigmund Albert Gorski III, Olabode Anise, Rahul Bobhate, Raymond Cho, Hiranava Das, Sharique Hussain, Hamza Karachiwala, Nolen Scaife, Byron Wright, Kevin R. B. Butler, William Enck, Patrick Traynor:
*droid: Assessment and Evaluation of Android Application Analysis Tools. ACM Comput. Surv. 49(3): 55:1-55:30 (2016) - [j10]Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Secure outsourced garbled circuit evaluation for mobile devices. J. Comput. Secur. 24(2): 137-180 (2016) - [j9]Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Outsourcing secure two-party computation as a black box. Secur. Commun. Networks 9(14): 2261-2275 (2016) - [c51]Sriharsha Etigowni, Dave (Jing) Tian, Grant Hernandez, Saman A. Zonouz, Kevin R. B. Butler:
CPAC: securing critical infrastructure with cyber-physical access control. ACSAC 2016: 139-152 - [c50]Dave (Jing) Tian, Adam Bates, Kevin R. B. Butler, Raju Rangaswami:
ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices. CCS 2016: 242-253 - [c49]Siddhant Deshmukh, Henry Carter, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler:
Efficient and secure template blinding for biometric authentication. CNS 2016: 480-488 - [c48]Benjamin Mood, Debayan Gupta, Henry Carter, Kevin R. B. Butler, Patrick Traynor:
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation. EuroS&P 2016: 112-127 - [c47]Debayan Gupta, Benjamin Mood, Joan Feigenbaum, Kevin R. B. Butler, Patrick Traynor:
Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation. Financial Cryptography Workshops 2016: 302-318 - [c46]Nolen Scaife, Henry Carter, Patrick Traynor, Kevin R. B. Butler:
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data. ICDCS 2016: 303-312 - [c45]Thomas Moyer, Karishma Chadha, Robert K. Cunningham, Nabil Schear, Warren Smith, Adam Bates, Kevin R. B. Butler, Frank Capobianco, Trent Jaeger, Patrick T. Cable II:
Leveraging Data Provenance to Enhance Cyber Resilience. SecDev 2016: 107-114 - [c44]Bradley Reaves, Nolen Scaife, Dave Tian, Logan Blue, Patrick Traynor, Kevin R. B. Butler:
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways. IEEE Symposium on Security and Privacy 2016: 339-356 - [c43]Dave (Jing) Tian, Nolen Scaife, Adam Bates, Kevin R. B. Butler, Patrick Traynor:
Making USB Great Again with USBFILTER. USENIX Security Symposium 2016: 415-430 - [c42]Bradley Reaves, Logan Blue, Dave Tian, Patrick Traynor, Kevin R. B. Butler:
Detecting SMS Spam in the Age of Legitimate Bulk Messaging. WISEC 2016: 165-170 - [p1]Adam Bates, Devin J. Pohly, Kevin R. B. Butler:
Secure and Trustworthy Provenance Collection for Digital Forensics. Digital Fingerprinting 2016: 141-176 - [i3]Adam Bates, Kevin R. B. Butler, Alin Dobra, Bradley Reaves, Patrick T. Cable II, Thomas Moyer, Nabil Schear:
Retrofitting Applications with Provenance-Based Security Monitoring. CoRR abs/1609.00266 (2016) - 2015
- [j8]Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable wiretapping - or - I know they can hear you now. J. Comput. Secur. 23(2): 167-195 (2015) - [c41]Jing (Dave) Tian, Adam Bates, Kevin R. B. Butler:
Defending Against Malicious USB Firmware with GoodUSB. ACSAC 2015: 261-270 - [c40]Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Outsourcing Secure Two-Party Computation as a Black Box. CANS 2015: 214-222 - [c39]Jing (Dave) Tian, Kevin R. B. Butler, Patrick D. McDaniel, Padma Krishnaswamy:
Securing ARP From the Ground Up. CODASPY 2015: 305-312 - [c38]Ethan Shernan, Henry Carter, Dave Tian, Patrick Traynor, Kevin R. B. Butler:
More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations. DIMVA 2015: 239-260 - [c37]Adam Bates, Kevin R. B. Butler, Thomas Moyer:
Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs. TaPP 2015 - [c36]Bradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor, Kevin R. B. Butler:
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World. USENIX Security Symposium 2015: 17-32 - [c35]Adam Bates, Dave Tian, Kevin R. B. Butler, Thomas Moyer:
Trustworthy Whole-System Provenance for the Linux Kernel. USENIX Security Symposium 2015: 319-334 - [i2]Benjamin Mood, Debayan Gupta, Kevin R. B. Butler, Joan Feigenbaum:
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values. CoRR abs/1506.02954 (2015) - 2014
- [j7]Adam Bates, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, Kevin R. B. Butler:
On detecting co-resident cloud instances using network flow watermarking techniques. Int. J. Inf. Sec. 13(2): 171-189 (2014) - [c34]Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Kevin R. B. Butler, Abdulrahman Alkhelaifi:
Securing SSL Certificate Verification through Dynamic Linking. CCS 2014: 394-405 - [c33]Benjamin Mood, Debayan Gupta, Kevin R. B. Butler, Joan Feigenbaum:
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values. CCS 2014: 582-596 - [c32]Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Kevin R. B. Butler:
Forced Perspectives: Evaluating an SSL Trust Enhancement at Scale. Internet Measurement Conference 2014: 503-510 - [c31]Adam Bates, Ryan Leonard, Hannah Pruse, Daniel Lowd, Kevin R. B. Butler:
Leveraging USB to Establish Host Identity Using Commodity Devices. NDSS 2014 - [e1]Charles N. Payne Jr., Adam Hahn, Kevin R. B. Butler, Micah Sherr:
Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014. ACM 2014, ISBN 978-1-4503-3005-3 [contents] - [i1]Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Outsourcing Secure Two-Party Computation as a Black Box. IACR Cryptol. ePrint Arch. 2014: 936 (2014) - 2013
- [c30]Adam Bates, Benjamin Mood, Masoud Valafar, Kevin R. B. Butler:
Towards secure provenance-based access control in cloud environments. CODASPY 2013: 277-284 - [c29]Matt Bishop, Emily Rine Butler, Kevin R. B. Butler, Carrie Gates, Steven Greenspan:
Forgive and forget: return to obscurity. NSPW 2013: 1-10 - [c28]Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. USENIX Security Symposium 2013: 289-304 - [c27]Ben Kreuter, Abhi Shelat, Benjamin Mood, Kevin R. B. Butler:
PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation. USENIX Security Symposium 2013: 321-336 - 2012
- [j6]Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman, Patrick D. McDaniel, Trent Jaeger:
Scalable Web Content Attestation. IEEE Trans. Computers 61(5): 686-699 (2012) - [c26]Vasant Tendulkar, Ryan Snyder, Joe Pletcher, Kevin R. B. Butler, Ashwin Shashidharan, William Enck:
Abusing cloud-based browsers for fun and profit. ACSAC 2012: 219-228 - [c25]Devin J. Pohly, Stephen E. McLaughlin, Patrick D. McDaniel, Kevin R. B. Butler:
Hi-Fi: collecting high-fidelity whole-system provenance. ACSAC 2012: 259-268 - [c24]Adam Bates, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, Kevin R. B. Butler:
Detecting co-residency with active traffic analysis techniques. CCSW 2012: 1-12 - [c23]Benjamin Mood, Lara Letaw, Kevin R. B. Butler:
Memory-Efficient Garbled Circuit Generation for Mobile Devices. Financial Cryptography 2012: 254-268 - [c22]Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable Wiretapping -or- I know they can hear you now. NDSS 2012 - 2011
- [c21]Lara Letaw, Joe Pletcher, Kevin R. B. Butler:
Host Identification via USB Fingerprinting. SADFE 2011: 1-9 - 2010
- [j5]Kevin R. B. Butler, Stephen E. McLaughlin, Thomas Moyer, Patrick D. McDaniel:
New Security Architectures Based on Emerging Disk Functionality. IEEE Secur. Priv. 8(5): 34-41 (2010) - [j4]Kevin R. B. Butler, Toni R. Farley, Patrick D. McDaniel, Jennifer Rexford:
A Survey of BGP Security Issues and Solutions. Proc. IEEE 98(1): 100-122 (2010) - [j3]Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick D. McDaniel, Kevin Borders:
malnets: large-scale malicious networks via compromised wireless access points. Secur. Commun. Networks 3(2-3): 102-113 (2010) - [c20]Machigar Ongtang, Kevin R. B. Butler, Patrick D. McDaniel:
Porscha: policy oriented secure content handling in Android. ACSAC 2010: 221-230 - [c19]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel:
Kells: a protection framework for portable data. ACSAC 2010: 231-240 - [c18]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel:
Protecting portable storage with host validation. CCS 2010: 651-653 - [c17]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel:
Disk-enabled authenticated encryption. MSST 2010: 1-6 - [c16]Patrick D. McDaniel, Kevin R. B. Butler, Stephen E. McLaughlin, Radu Sion, Erez Zadok, Marianne Winslett:
Towards a Secure and Efficient System for End-to-End Provenance. TaPP 2010
2000 – 2009
- 2009
- [j2]Kevin R. B. Butler, Sunam Ryu, Patrick Traynor, Patrick D. McDaniel:
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. IEEE Trans. Parallel Distributed Syst. 20(12): 1803-1815 (2009) - [c15]Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman, Patrick D. McDaniel, Trent Jaeger:
Scalable Web Content Attestation. ACSAC 2009: 95-104 - 2008
- [c14]William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick D. McDaniel, Adam D. Smith:
Defending Against Attacks on Main Memory Persistence. ACSAC 2008: 65-74 - [c13]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel:
Rootkit-resistant disks. CCS 2008: 403-416 - [c12]Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick D. McDaniel:
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. NDSS 2008 - [c11]Kevin R. B. Butler, William Enck, Harri Hursti, Stephen E. McLaughlin, Patrick Traynor, Patrick D. McDaniel:
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST. EVT 2008 - 2007
- [c10]Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Patrick D. McDaniel:
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. AINA Workshops (1) 2007: 519-524 - [c9]Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel:
Non-volatile memory and disks: avenues for policy architectures. CSAW 2007: 77-84 - [c8]Lisa Johansen, Michael Rowell, Kevin R. B. Butler, Patrick D. McDaniel:
Email Communities of Interest. CEAS 2007 - [c7]Dhananjay Bapat, Kevin R. B. Butler, Patrick D. McDaniel:
Towards Automated Privilege Separation. ICISS 2007: 272-276 - [c6]Anusha Sriraman, Kevin R. B. Butler, Patrick D. McDaniel, Padma Raghavan:
Analysis of the IPv4 Address Space Delegation Structure. ISCC 2007: 501-508 - 2006
- [j1]Patrick D. McDaniel, William Aiello, Kevin R. B. Butler, John Ioannidis:
Origin authentication in interdomain routing. Comput. Networks 50(16): 2953-2980 (2006) - [c5]Kevin R. B. Butler, Patrick D. McDaniel, William Aiello:
Optimizing BGP security by exploiting path stability. CCS 2006: 298-310 - [c4]Kevin R. B. Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick D. McDaniel:
Privacy Preserving Web-Based Email. ICISS 2006: 116-131 - [c3]Trent Jaeger, David H. King, Kevin R. B. Butler, Serge Hallyn, Joy Latten, Xiaolan Zhang:
Leveraging IPsec for Mandatory Per-Packet Access Control. SecureComm 2006: 1-9 - [c2]Shiva Chaitanya, Kevin R. B. Butler, Anand Sivasubramaniam, Patrick D. McDaniel, Murali Vilayannur:
Design, implementation and evaluation of security in iSCSI-based network storage systems. StorageSS 2006: 17-28 - 2005
- [c1]Kevin R. B. Butler, Patrick D. McDaniel:
Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. ICISS 2005: 36-48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-23 00:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint