Zobrazeno 1 - 10
of 104
pro vyhledávání: '"R B, Butler"'
Autor:
Tuba Yavuz, Farhaan Fowze, Grant Hernandez, Ken Yihang Bai, Kevin R. B. Butler, Dave Jing Tian
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 20:1577-1595
Autor:
Weidong Zhu, Kevin R. B. Butler
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 41:3779-3790
Autor:
Kyungtae Kim, Taegyu Kim, Ertza Warraich, Byoungyoung Lee, Kevin R. B. Butler, Antonio Bianchi, Dave Jing Tian
Publikováno v:
2022 IEEE Symposium on Security and Privacy (SP).
Autor:
Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef
The Android operating system is currently the most popular mobile operating system in the world. Android is based on Linux and therefore inherits its features including its Inter-Process Communication (IPC) mechanisms. These mechanisms are used by pr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bced48eda48563e9b9360fe4425bcfcc
Autor:
Arslan Khan, Joseph I. Choi, Dave Jing Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, John M. Shea, Tan F. Wong
Publikováno v:
2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).
Autor:
Logan Blue, Luis Vargas, Dave (Jing) Tian, Nolen Scaife, Kevin R. B. Butler, Bradley Reaves, Patrick Traynor
Publikováno v:
ACM Transactions on Privacy and Security. 22:1-31
Recent years have seen the Short Message Service (SMS) become a critical component of the security infrastructure, assisting with tasks including identity verification and second-factor authentication. At the same time, this messaging infrastructure
Autor:
Washington Garcia, Animesh Chhotaray, Somesh Jha, Joseph I. Choi, Suman Kalyan Adari, Kevin R. B. Butler
Publikováno v:
CODASPY
Authenticating a networked device relies on identifying its unique characteristics. Recent device fingerprinting proposals demonstrate that device activity, such as network traffic, can be used to extract features which identify devices using machine
Publikováno v:
IEEE transactions on visualization and computer graphics. 27(5)
Eye-tracking technology is being increasingly integrated into mixed reality devices. Although critical applications are being enabled, there are significant possibilities for violating user privacy expectations. We show that there is an appreciable r
Publikováno v:
CCSW@CCS
Public clouds are inherently multi-tenant: applications deployed by different parties (including malicious ones) may reside on the same physical machines and share various hardware resources. With the introduction of newer hypervisors, containerizati
Autor:
Kevin R. B. Butler, Benjamin Mood
Publikováno v:
Journal of Information Security and Applications. 40:78-91
Secure function evaluation (SFE) on mobile devices, such as smartphones, allows for the creation of compelling new privacy-preserving applications. Generating garbled circuits on smartphones to allow for executing customized functions, however, is in