37 results on '"Butler, Kevin"'
Search Results
2. "Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
3. Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers?
4. For Your Eyes Only: Privacy-preserving eye-tracking datasets
5. Brittle Features of Device Authentication
6. Co-residency Attacks on Containers are Real
7. Examining DES-based Cipher Suite Support within the TLS Ecosystem
8. A Hybrid Approach to Secure Function Evaluation using SGX
9. Characterizing security and privacy practices in emerging digital credit applications
10. Enclave-based privacy-preserving localization
11. Basebads: Automated security analysis of baseband firmware
12. A Practical Intel SGX Setting for Linux Containers in the Cloud
13. A Discussion on Security Education in Academia
14. Mitigating Risk while Complying with Data Retention Laws
15. Android Escalation Paths
16. FirmUSB
17. CPAC
18. Detecting SMS Spam in the Age of Legitimate Bulk Messaging
19. Defending Against Malicious USB Firmware with GoodUSB
20. Securing ARP From the Ground Up
21. Forced Perspectives
22. Securing SSL Certificate Verification through Dynamic Linking
23. Session details: Session 1C -- Operating Systems
24. Reuse It Or Lose It
25. Forgive and forget
26. Towards secure provenance-based access control in cloud environments
27. Hi-Fi
28. Abusing cloud-based browsers for fun and profit
29. Detecting co-residency with active traffic analysis techniques
30. Kells
31. Porscha
32. Non-volatile memory and disks
33. Design, implementation and evaluation of security in iSCSI-based network storage systems
34. Optimizing BGP security by exploiting path stability
35. ICE
36. NodeSentry
37. Network dialog minimization and network dialog diffing
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.