Kevin Borders

According to our database1, Kevin Borders authored at least 20 papers between 2004 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Analyzing Network Traffic with Chimera.
login Usenix Mag., 2013

2012
Chimera: A Declarative Language for Streaming Network Traffic Analysis.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

2010
malnets: large-scale malicious networks <i>via</i> compromised wireless access points.
Secur. Commun. Networks, 2010

2009
Protecting Confidential Information from Malicious Software.
PhD thesis, 2009

Protecting Confidential Data on Personal Computers with Storage Capsules.
Proceedings of the 18th USENIX Security Symposium, 2009

Quantifying Information Leaks in Outbound Web Traffic.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

2008
Towards Quantification of Network-Based Information Leaks via HTTP.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Analyzing websites for user-visible security design flaws.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

Prism: Providing Flexible and Fast Filesystem Cloning Service for Virtual Servers.
Proceedings of the Middleware 2008, 2008

Social networks and context-aware spam.
Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, 2008

2007
Using a virtual machine to protect sensitive Grid resources.
Concurr. Comput. Pract. Exp., 2007

Securing Network Input via a Trusted Input Proxy.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007

OpenFire: Using deception to reduce network attacks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Spector: Automatically Analyzing Shell Code.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Siren: Catching Evasive Malware (Short Paper).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Securing sensitive content in a view-only file system.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

2005
Towards Protecting Sensitive Files in a Compromised System.
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005

SVGrid: a secure virtual environment for untrusted grid applications.
Proceedings of the 3rd international workshop on Middleware for grid computing, 2005

CPOL: high-performance policy evaluation.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Web tap: detecting covert web traffic.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004


  Loading...