Kevin R. B. Butler

Orcid: 0000-0002-7498-4239

Affiliations:
  • University of Florida, Gainesville, FL, USA


According to our database1, Kevin R. B. Butler authored at least 118 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-Preserving Gaze Data Streaming in Immersive Interactive Virtual Reality: Robustness and User Experience.
CoRR, 2024

2023
Privacy-preserving datasets of eye-tracking samples with applications in XR.
IEEE Trans. Vis. Comput. Graph., 2023

ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs.
IEEE Trans. Dependable Secur. Comput., 2023

Eye-tracked Virtual Reality: A Comprehensive Survey on Methods and Privacy Challenges.
CoRR, 2023

Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs.
Proceedings of the 32nd USENIX Security Symposium, 2023

Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery.
Proceedings of the 32nd USENIX Security Symposium, 2023

Blue's Clues: Practical Discovery of Non-Discoverable Bluetooth Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

LeopardSeal: Detecting Call Interception via Audio Rogue Base Stations.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023

Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers?
Proceedings of the 15th ACM/USENIX Workshop on Hot Topics in Storage and File Systems, 2023

"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
NASA: NVM-Assisted Secure Deletion for Flash Memory.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

Analyzing the Monetization Ecosystem of Stalkerware.
Proc. Priv. Enhancing Technol., 2022

A Practical Methodology for ML-Based EM Side Channel Disassemblers.
CoRR, 2022

Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction.
Proceedings of the 31st USENIX Security Symposium, 2022

FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Disentangling Categorization in Multi-agent Emergent Communication.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

For Your Eyes Only: Privacy-preserving eye-tracking datasets.
Proceedings of the ETRA 2022: Symposium on Eye Tracking Research and Applications, Seattle, WA, USA, June 8, 2022

HallMonitor: A Framework for Identifying Network Policy Violations in Software.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
A privacy-preserving approach to streaming eye-tracking data.
IEEE Trans. Vis. Comput. Graph., 2021

ProXray: Protocol Model Learning and Guided Firmware Analysis.
IEEE Trans. Software Eng., 2021

Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples.
CoRR, 2021

Privacy-Preserving Localization using Enclaves.
Proceedings of the 12th IEEE Annual Ubiquitous Computing, 2021

Brittle Features of Device Authentication.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
BigMAC: Fine-Grained Policy Analysis of Android Firmware.
Proceedings of the 29th USENIX Security Symposium, 2020

Co-residency Attacks on Containers are Real.
Proceedings of the CCSW'20, 2020

2019
Characterizing the Security of the SMS Ecosystem with Public Gateways.
ACM Trans. Priv. Secur., 2019

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities.
Secur. Commun. Networks, 2019

Toward Automated Firmware Analysis in the IoT Era.
IEEE Secur. Priv., 2019

Basebads: Automated security analysis of baseband firmware: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Enclave-based privacy-preserving localization: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Characterizing security and privacy practices in emerging digital credit applications.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

LBM: A Security Framework for Peripherals within the Linux Kernel.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

One-Time Programs Made Practical.
Proceedings of the Financial Cryptography and Data Security, 2019

Adversarial Video Captioning.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2019

A Practical Intel SGX Setting for Linux Containers in the Cloud.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Examining DES-based Cipher Suite Support within the TLS Ecosystem.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

A Hybrid Approach to Secure Function Evaluation using SGX.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
PAL: A pseudo assembly language for optimizing secure function evaluation in mobile devices.
J. Inf. Secur. Appl., 2018

Explainable Black-Box Attacks Against Model-based Authentication.
CoRR, 2018

Android Escalation Paths: Building Attack-Graphs from SEAndroid Policies.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.
Proceedings of the 27th USENIX Security Symposium, 2018

SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Mitigating Risk while Complying with Data Retention Laws.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

A Discussion on Security Education in Academia.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Taming the Costs of Trustworthy Provenance through Policy Reduction.
ACM Trans. Internet Techn., 2017

Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications.
ACM Trans. Priv. Secur., 2017

Securing ARP/NDP From the Ground Up.
IEEE Trans. Inf. Forensics Secur., 2017

FinTechSec: Addressing the Security Challenges of Digital Financial Services.
IEEE Secur. Priv., 2017

Transparent Web Service Auditing via Network Provenance Functions.
Proceedings of the 26th International Conference on World Wide Web, 2017

Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Privacy preserving localization using a distributed particle filtering protocol.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Mixed-granular architectural diversity for device security in the Internet of Things.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017

2016
Outsourcing secure two-party computation as a black box.
Secur. Commun. Networks, 2016

Secure outsourced garbled circuit evaluation for mobile devices.
J. Comput. Secur., 2016

*droid: Assessment and Evaluation of Android Application Analysis Tools.
ACM Comput. Surv., 2016

Retrofitting Applications with Provenance-Based Security Monitoring.
CoRR, 2016

Detecting SMS Spam in the Age of Legitimate Bulk Messaging.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Making USB Great Again with USBFILTER.
Proceedings of the 25th USENIX Security Symposium, 2016

Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Leveraging Data Provenance to Enhance Cyber Resilience.
Proceedings of the IEEE Cybersecurity Development, 2016

CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation.
Proceedings of the Financial Cryptography and Data Security, 2016

Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Efficient and secure template blinding for biometric authentication.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

CPAC: securing critical infrastructure with cyber-physical access control.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

Secure and Trustworthy Provenance Collection for Digital Forensics.
Proceedings of the Digital Fingerprinting, 2016

2015
Accountable wiretapping - or - I know they can hear you now.
J. Comput. Secur., 2015

Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World.
Proceedings of the 24th USENIX Security Symposium, 2015

Trustworthy Whole-System Provenance for the Linux Kernel.
Proceedings of the 24th USENIX Security Symposium, 2015

Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs.
Proceedings of the 7th USENIX Workshop on the Theory and Practice of Provenance, 2015

More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

Securing ARP From the Ground Up.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Defending Against Malicious USB Firmware with GoodUSB.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
On detecting co-resident cloud instances using network flow watermarking techniques.
Int. J. Inf. Sec., 2014

Leveraging USB to Establish Host Identity Using Commodity Devices.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Forced Perspectives: Evaluating an SSL Trust Enhancement at Scale.
Proceedings of the 2014 Internet Measurement Conference, 2014

Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Securing SSL Certificate Verification through Dynamic Linking.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Forgive and forget: return to obscurity.
Proceedings of the New Security Paradigms Workshop, 2013

Towards secure provenance-based access control in cloud environments.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Scalable Web Content Attestation.
IEEE Trans. Computers, 2012

Memory-Efficient Garbled Circuit Generation for Mobile Devices.
Proceedings of the Financial Cryptography and Data Security, 2012

Detecting co-residency with active traffic analysis techniques.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

Abusing cloud-based browsers for fun and profit.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

Hi-Fi: collecting high-fidelity whole-system provenance.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Host Identification via USB Fingerprinting.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

2010
malnets: large-scale malicious networks <i>via</i> compromised wireless access points.
Secur. Commun. Networks, 2010

A Survey of BGP Security Issues and Solutions.
Proc. IEEE, 2010

New Security Architectures Based on Emerging Disk Functionality.
IEEE Secur. Priv., 2010

Towards a Secure and Efficient System for End-to-End Provenance.
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010

Disk-enabled authenticated encryption.
Proceedings of the IEEE 26th Symposium on Mass Storage Systems and Technologies, 2010

Protecting portable storage with host validation.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Porscha: policy oriented secure content handling in Android.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

Kells: a protection framework for portable data.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems.
IEEE Trans. Parallel Distributed Syst., 2009

2008
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Proceedings of the Network and Distributed System Security Symposium, 2008

Rootkit-resistant disks.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Defending Against Attacks on Main Memory Persistence.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Analysis of the IPv4 Address Space Delegation Structure.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Towards Automated Privilege Separation.
Proceedings of the Information Systems Security, Third International Conference, 2007

Email Communities of Interest.
Proceedings of the CEAS 2007, 2007

Non-volatile memory and disks: avenues for policy architectures.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

2006
Origin authentication in interdomain routing.
Comput. Networks, 2006

Design, implementation and evaluation of security in iSCSI-based network storage systems.
Proceedings of the 2006 ACM Workshop On Storage Security And Survivability, 2006

Leveraging IPsec for Mandatory Per-Packet Access Control.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Privacy Preserving Web-Based Email.
Proceedings of the Information Systems Security, Second International Conference, 2006

Optimizing BGP security by exploiting path stability.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior.
Proceedings of the Information Systems Security, First International Conference, 2005


  Loading...