Kevin Butler
Title
Cited by
Cited by
Year
A survey of BGP security issues and solutions
K Butler, TR Farley, P McDaniel, J Rexford
Proceedings of the IEEE 98 (1), 100-122, 2010
449*2010
Cryptolock (and drop it): stopping ransomware attacks on user data
N Scaife, H Carter, P Traynor, KRB Butler
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
2892016
Trustworthy whole-system provenance for the linux kernel
A Bates, DJ Tian, KRB Butler, T Moyer
24th {USENIX} Security Symposium ({USENIX} Security 15), 319-334, 2015
1482015
Pcf: A portable circuit format for scalable two-party secure computation
B Kreuter, B Mood, A Shelat, K Butler
2013 USENIX Security Symposium, 2013
1292013
Porscha: Policy oriented secure content handling in Android
M Ongtang, K Butler, P McDaniel
Proceedings of the 26th annual computer security applications conference …, 2010
1262010
Hi-Fi: collecting high-fidelity whole-system provenance
DJ Pohly, S McLaughlin, P McDaniel, K Butler
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
1182012
Detecting co-residency with active traffic analysis techniques
A Bates, B Mood, J Pletcher, H Pruse, M Valafar, K Butler
CCSW'12: Proceedings of the 2012 ACM Workshop on Cloud computing security, 1-12, 2012
1162012
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices
H Carter, B Mood, P Traynor, K Butler
2013 USENIX Security Symposium, 2013
1042013
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
962017
Optimizing BGP security by exploiting path stability
K Butler, P McDaniel, W Aiello
Proceedings of the 13th ACM conference on Computer and communications …, 2006
842006
Let SDN Be Your Eyes: Secure Forensics in Data Center Networks
A Bates, K Butler, A Haeberlen, M Sherr, W Zhou
NDSS Workshop on Security of Emerging Networking Technologies (SENT), 2014
742014
Towards secure provenance-based access control in cloud environments
A Bates, B Mood, M Valafar, K Butler
Proceedings of the third ACM conference on Data and application security and …, 2013
702013
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation
B Mood, D Gupta, H Carter, KRB Butler, P Traynor
Proceedings of the 1st IEEE European Symposium on Security and Privacy (Euro …, 2016
692016
Defending against malicious USB firmware with GoodUSB
DJ Tian, A Bates, K Butler
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
602015
On detecting co-resident cloud instances using network flow watermarking techniques
A Bates, B Mood, J Pletcher, H Pruse, M Valafar, K Butler
International Journal of Information Security 13 (2), 171-189, 2014
572014
Reuse it or lose it: More efficient secure computation through reuse of encrypted values
B Mood, D Gupta, K Butler, J Feigenbaum
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
562014
Memory-efficient garbled circuit generation for mobile devices
B Mood, L Letaw, K Butler
International Conference on Financial Cryptography and Data Security, 254-268, 2012
562012
Leveraging identity-based cryptography for node ID assignment in structured P2P systems
KRB Butler, S Ryu, P Traynor, PD McDaniel
Parallel and Distributed Systems, IEEE Transactions on 20 (12), 1803-1815, 2009
532009
* droid: Assessment and evaluation of Android application analysis tools
B Reaves, J Bowers, SA Gorski III, O Anise, R Bobhate, R Cho, H Das, ...
ACM Computing Surveys (CSUR) 49 (3), 1-30, 2016
492016
Towards a Secure and Efficient System for End-to-End Provenance.
PD McDaniel, KRB Butler, SE McLaughlin, R Sion, E Zadok, M Winslett
TaPP, 2010
482010
The system can't perform the operation now. Try again later.
Articles 1–20