Ryan D. Riley

Orcid: 0000-0002-8321-1211

According to our database1, Ryan D. Riley authored at least 20 papers between 2008 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Enclave-based oblivious RAM using Intel's SGX.
Comput. Secur., 2020

2018
Understanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface.
IEEE Trans. Mob. Comput., 2018

2017
DroidNative: Automating and optimizing detection of Android native code malware variants.
Comput. Secur., 2017

DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
DroidNative: Semantic-Based Detection of Android Native Code Malware.
CoRR, 2016

Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

DroidClone: Detecting android malware variants by exposing code clones.
Proceedings of the Sixth International Conference on Digital Information and Communication Technology and its Applications, 2016

2015
Distributed algorithms in wireless sensor networks: An approach for applying binary consensus in a real testbed.
Comput. Networks, 2015

2014
Data-Centric OS Kernel Malware Characterization.
IEEE Trans. Inf. Forensics Secur., 2014

Association Rule Mining on Fragmented Database.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

2013
A framework for prototyping and testing data-only rootkit attacks.
Comput. Secur., 2013

Maintaining Database Anonymity in the Presence of Queries.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

Binary consensus in sensor motes.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

2010
An Architectural Approach to Preventing Code Injection Attacks.
IEEE Trans. Dependable Secur. Comput., 2010

Empowering users against sidejacking attacks.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2009
Multi-aspect profiling of kernel rootkit behavior.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009

Polymorphing Software by Randomizing Data Structure Layout.
Proceedings of the Detection of Intrusions and Malware, 2009

Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008


  Loading...