Timothy Vidas

According to our database1, Timothy Vidas authored at least 23 papers between 2007 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Changing the Game of Software Security.
IEEE Secur. Priv., 2018

Cyber Grand Challenge (CGC) monitor: A vetting system for the DARPA cyber grand challenge.
Digit. Investig., 2018

BP: DECREE: A Platform for Repeatable and Reproducible Security Experiments.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

2014
OpenLV: Empowering investigators and first-responders in the digital forensics process.
Digit. Investig., 2014

A5: Automated Analysis of Adversarial Android Applications.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

Evading android runtime analysis via sandbox detection.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Passe-Partout: A General Collection Methodology for Android Devices.
IEEE Trans. Inf. Forensics Secur., 2013

QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks.
Proceedings of the Financial Cryptography and Data Security, 2013

The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs.
Proceedings of the Financial Cryptography and Data Security, 2013

Sweetening android lemon markets: measuring and combating malware in application marketplaces.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Measuring password guessability for an entire university.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Helping Users Create Better Passwords.
login Usenix Mag., 2012

How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Correct horse battery staple: exploring the usability of system-assigned passphrases.
Proceedings of the Symposium On Usable Privacy and Security, 2012

2011
Toward a general collection methodology for Android devices.
Digit. Investig., 2011

Empirical analysis of solid state disk data retention when used with contemporary operating systems.
Digit. Investig., 2011

All Your Droid Are Belong to Us: A Survey of Current Android Attacks.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

Usability of Forensics Tools: A User Study.
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011

MemCorp: An Open Data Corpus for Memory Analysis.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Volatile Memory Acquisition via Warm Boot Memory Survivability.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2007
Providing a Foundation for Analysis of Volatile Data Stores.
J. Digit. Forensics Secur. Law, 2007


  Loading...