Follow
Kevin Butler
Title
Cited by
Cited by
Year
A survey of BGP security issues and solutions
K Butler, TR Farley, P McDaniel, J Rexford
Proceedings of the IEEE 98 (1), 100-122, 2010
5042010
Cryptolock (and drop it): stopping ransomware attacks on user data
N Scaife, H Carter, P Traynor, KRB Butler
2016 IEEE 36th international conference on distributed computing systems …, 2016
4582016
Trustworthy Whole-System Provenance for the Linux Kernel
A Bates, DJ Tian, KRB Butler, T Moyer
24th USENIX Security Symposium (USENIX Security '15), 319-334, 2015
2192015
Hi-fi: collecting high-fidelity whole-system provenance
DJ Pohly, S McLaughlin, P McDaniel, K Butler
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
1702012
Pcf: A portable circuit format for scalable two-party secure computation
B Kreuter, B Mood, A Shelat, K Butler
2013 USENIX Security Symposium, 2013
1432013
Porscha: Policy oriented secure content handling in Android
M Ongtang, K Butler, P McDaniel
Proceedings of the 26th annual computer security applications conference …, 2010
1432010
Detecting co-residency with active traffic analysis techniques
A Bates, B Mood, J Pletcher, H Pruse, M Valafar, K Butler
CCSW'12: Proceedings of the 2012 ACM Workshop on Cloud computing security, 1-12, 2012
1392012
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
1362017
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices
H Carter, B Mood, P Traynor, K Butler
2013 USENIX Security Symposium, 2013
1222013
Let SDN Be Your Eyes: Secure Forensics in Data Center Networks
A Bates, K Butler, A Haeberlen, M Sherr, W Zhou
NDSS Workshop on Security of Emerging Networking Technologies (SENT), 2014
1032014
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation
B Mood, D Gupta, H Carter, KRB Butler, P Traynor
Proceedings of the 1st IEEE European Symposium on Security and Privacy (Euro …, 2016
1012016
Practical hidden voice attacks against speech and speaker recognition systems
H Abdullah, W Garcia, C Peeters, P Traynor, KRB Butler, J Wilson
2019 Network and Distributed System Security (NDSS) Symposium, 2019
992019
Optimizing BGP security by exploiting path stability
K Butler, P McDaniel, W Aiello
Proceedings of the 13th ACM conference on Computer and communications …, 2006
932006
Towards secure provenance-based access control in cloud environments
A Bates, B Mood, M Valafar, K Butler
Proceedings of the third ACM conference on Data and application security and …, 2013
862013
Defending against malicious USB firmware with GoodUSB
DJ Tian, A Bates, K Butler
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
802015
On detecting co-resident cloud instances using network flow watermarking techniques
A Bates, B Mood, J Pletcher, H Pruse, M Valafar, K Butler
International Journal of Information Security 13 (2), 171-189, 2014
682014
* droid: Assessment and evaluation of android application analysis tools
B Reaves, J Bowers, SA Gorski III, O Anise, R Bobhate, R Cho, H Das, ...
ACM Computing Surveys (CSUR) 49 (3), 1-30, 2016
632016
FirmUSB: Vetting USB device firmware using domain informed symbolic execution
G Hernandez, F Fowze, D Tian, T Yavuz, KRB Butler
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
612017
Memory-efficient garbled circuit generation for mobile devices
B Mood, L Letaw, K Butler
International Conference on Financial Cryptography and Data Security, 254-268, 2012
612012
Reuse it or lose it: More efficient secure computation through reuse of encrypted values
B Mood, D Gupta, K Butler, J Feigenbaum
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
602014
The system can't perform the operation now. Try again later.
Articles 1–20