default search action
Bradley Reaves
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c44]Trevor Dunlap, Elizabeth Lin, William Enck, Bradley Reaves:
VFCFinder: Pairing Security Advisories and Patches. AsiaCCS 2024 - [c43]Trevor Dunlap, John Speed Meyers, Bradley Reaves, William Enck:
Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs. DIMVA 2024: 350-369 - [c42]Alexander J. Ross, Bradley Reaves, Yomna Nasser, Gil Cukierman, Roger Piqueras Jover:
Fixing Insecure Cellular System Information Broadcasts For Good. RAID 2024: 693-708 - [c41]Aleksandr Nahapetyan, Sathvik Prasad, Kevin Childs, Adam Oest, Yeganeh Ladwig, Alexandros Kapravelos, Bradley Reaves:
On SMS Phishing Tactics and Infrastructure. SP 2024: 1-16 - [i11]Setu Kumar Basak, K. Virgil English, Ken Ogura, Vitesh Kambara, Bradley Reaves, Laurie A. Williams:
AssetHarvester: A Static Analysis Tool for Detecting Assets Protected by Secrets in Software Artifacts. CoRR abs/2403.19072 (2024) - [i10]David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro:
Jäger: Automated Telephone Call Traceback. CoRR abs/2409.02839 (2024) - 2023
- [c40]Setu Kumar Basak, Jamison Cox, Bradley Reaves, Laurie A. Williams:
A Comparative Study of Software Secrets Reporting by Secret Detection Tools. ESEM 2023: 1-12 - [c39]Trevor Dunlap, Seaver Thorn, William Enck, Bradley Reaves:
Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis. EuroS&P 2023: 489-505 - [c38]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts? ICSE 2023: 1635-1647 - [c37]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
SecretBench: A Dataset of Software Secrets. MSR 2023: 347-351 - [c36]Iffat Anjum, Jessica Sokal, Hafiza Ramzah Rehman, Ben Weintraub, Ethan Leba, William Enck, Cristina Nita-Rotaru, Bradley Reaves:
MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy. SACMAT 2023: 121-132 - [c35]Lorenzo Neil, Harshini Sri Ramulu, Yasemin Acar, Bradley Reaves:
Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice. SOUPS 2023: 283-299 - [c34]Alexander J. Ross, Bradley Reaves:
Towards Simultaneous Attacks on Multiple Cellular Networks. SP (Workshops) 2023: 394-405 - [c33]Sathvik Prasad, Trevor Dunlap, Alexander J. Ross, Bradley Reaves:
Diving into Robocall Content with SnorCall. USENIX Security Symposium 2023: 427-444 - [c32]Siddharth Muralee, Igibek Koishybayev, Aleksandr Nahapetyan, Greg Tystahl, Bradley Reaves, Antonio Bianchi, William Enck, Alexandros Kapravelos, Aravind Machiry:
ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions. USENIX Security Symposium 2023: 6983-7000 - [e1]Ioana Boureanu, Steve Schneider, Bradley Reaves, Nils Ole Tippenhauer:
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023. ACM 2023, ISBN 978-1-4503-9859-6 [contents] - [i9]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts? CoRR abs/2301.12377 (2023) - [i8]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
SecretBench: A Dataset of Software Secrets. CoRR abs/2303.06729 (2023) - [i7]Setu Kumar Basak, Jamison Cox, Bradley Reaves, Laurie A. Williams:
A Comparative Study of Software Secrets Reporting by Secret Detection Tools. CoRR abs/2307.00714 (2023) - [i6]Trevor Dunlap, Elizabeth Lin, William Enck, Bradley Reaves:
VFCFinder: Seamlessly Pairing Security Advisories and Patches. CoRR abs/2311.01532 (2023) - 2022
- [c31]Trevor Dunlap, William Enck, Bradley Reaves:
A Study of Application Sandbox Policies in Linux. SACMAT 2022: 19-30 - [c30]Iffat Anjum, Daniel Kostecki, Ethan Leba, Jessica Sokal, Rajit Bharambe, William Enck, Cristina Nita-Rotaru, Bradley Reaves:
Removing the Reliance on Perimeters for Security using Network Views. SACMAT 2022: 151-162 - [c29]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
What are the Practices for Secret Management in Software Artifacts? SecDev 2022: 69-76 - [c28]Igibek Koishybayev, Aleksandr Nahapetyan, Raima Zachariah, Siddharth Muralee, Bradley Reaves, Alexandros Kapravelos, Aravind Machiry:
Characterizing the Security of Github CI Workflows. USENIX Security Symposium 2022: 2747-2763 - [i5]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
What are the Practices for Secret Management in Software Artifacts? CoRR abs/2208.11280 (2022) - 2021
- [c27]Matthew R. McNiece, Ruidan Li, Bradley Reaves:
Characterizing the Security of Endogenous and Exogenous Desktop Application Network Flows. PAM 2021: 531-546 - [c26]Lorenzo Neil, Elijah Robert Bouma-Sims, Evan Lafontaine, Yasemin Acar, Bradley Reaves:
Investigating Web Service Account Remediation Advice. SOUPS @ USENIX Security Symposium 2021: 359-376 - [c25]Abida Haque, Varun Madathil, Bradley Reaves, Alessandra Scafuro:
Anonymous device authorization for cellular networks. WISEC 2021: 25-36 - [i4]Elijah Robert Bouma-Sims, Bradley Reaves:
A First Look at Scams on YouTube. CoRR abs/2104.06515 (2021) - [i3]Abida Haque, Varun Madathil, Bradley Reaves, Alessandra Scafuro:
Anonymous Device Authorization for Cellular Networks. IACR Cryptol. ePrint Arch. 2021: 753 (2021) - 2020
- [c24]Sathvik Prasad, Elijah Robert Bouma-Sims, Athishay Kiran Mylappan, Bradley Reaves:
Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis. USENIX Security Symposium 2020: 397-414 - [c23]Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Serge Egelman:
Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck. USENIX Security Symposium 2020: 985-1002 - [c22]Samin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, Bradley Reaves:
Cardpliance: PCI DSS Compliance of Android Applications. USENIX Security Symposium 2020: 1517-1533
2010 – 2019
- 2019
- [j8]Bradley Reaves, Luis Vargas, Nolen Scaife, Dave Tian, Logan Blue, Patrick Traynor, Kevin R. B. Butler:
Characterizing the Security of the SMS Ecosystem with Public Gateways. ACM Trans. Priv. Secur. 22(1): 2:1-2:31 (2019) - [c21]Michael Meli, Matthew R. McNiece, Bradley Reaves:
How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories. NDSS 2019 - [c20]Justin Whitaker, Sathvik Prasad, Bradley Reaves, William Enck:
Thou Shalt Discuss Security: Quantifying the Impacts of Instructions to RFC Authors. SSR 2019: 57-68 - [c19]Benjamin Andow, Samin Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Tao Xie:
PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. USENIX Security Symposium 2019: 585-602 - [c18]T. J. OConnor, Reham Mohamed, Markus Miettinen, William Enck, Bradley Reaves, Ahmad-Reza Sadeghi:
HomeSnitch: behavior transparency and control for smart home IoT devices. WiSec 2019: 128-138 - [c17]T. J. OConnor, William Enck, Bradley Reaves:
Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things. WiSec 2019: 140-150 - [c16]Sanket Goutam, William Enck, Bradley Reaves:
Hestia: simple least privilege network policies for smart homes. WiSec 2019: 215-220 - 2018
- [c15]Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl:
A Large Scale Investigation of Obfuscation Use in Google Play. ACSAC 2018: 222-235 - [c14]Christian Peeters, Hadi Abdullah, Nolen Scaife, Jasmine D. Bowers, Patrick Traynor, Bradley Reaves, Kevin R. B. Butler:
Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding. IEEE Symposium on Security and Privacy 2018: 567-582 - [i2]Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl:
A Large Scale Investigation of Obfuscation Use in Google Play. CoRR abs/1801.02742 (2018) - 2017
- [j7]Patrick Traynor, Kevin R. B. Butler, Jasmine D. Bowers, Bradley Reaves:
FinTechSec: Addressing the Security Challenges of Digital Financial Services. IEEE Secur. Priv. 15(5): 85-89 (2017) - [j6]Stephan Heuser, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra Dmitrienko, William Enck, Negar Kiyavash, Ahmad-Reza Sadeghi, Patrick Traynor:
Phonion: Practical Protection of Metadata in Telephony Networks. Proc. Priv. Enhancing Technol. 2017(1): 170-187 (2017) - [j5]Bradley Reaves, Jasmine D. Bowers, Nolen Scaife, Adam Bates, Arnav Bhartiya, Patrick Traynor, Kevin R. B. Butler:
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications. ACM Trans. Priv. Secur. 20(3): 11:1-11:31 (2017) - [c13]Jasmine D. Bowers, Bradley Reaves, Imani N. Sherman, Patrick Traynor, Kevin R. B. Butler:
Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. SOUPS 2017: 97-114 - [c12]Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor, Thomas Shrimpton:
AuthentiCall: Efficient Identity and Content Authentication for Phone Calls. USENIX Security Symposium 2017: 575-592 - [c11]Adam Bates, Wajih Ul Hassan, Kevin R. B. Butler, Alin Dobra, Bradley Reaves, Patrick T. Cable II, Thomas Moyer, Nabil Schear:
Transparent Web Service Auditing via Network Provenance Functions. WWW 2017: 887-895 - 2016
- [j4]Bradley Reaves, Jasmine D. Bowers, Sigmund Albert Gorski III, Olabode Anise, Rahul Bobhate, Raymond Cho, Hiranava Das, Sharique Hussain, Hamza Karachiwala, Nolen Scaife, Byron Wright, Kevin R. B. Butler, William Enck, Patrick Traynor:
*droid: Assessment and Evaluation of Android Application Analysis Tools. ACM Comput. Surv. 49(3): 55:1-55:30 (2016) - [c10]Bradley Reaves, Nolen Scaife, Dave Tian, Logan Blue, Patrick Traynor, Kevin R. B. Butler:
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways. IEEE Symposium on Security and Privacy 2016: 339-356 - [c9]Bradley Reaves, Logan Blue, Patrick Traynor:
AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels. USENIX Security Symposium 2016: 963-978 - [c8]Bradley Reaves, Logan Blue, Dave Tian, Patrick Traynor, Kevin R. B. Butler:
Detecting SMS Spam in the Age of Legitimate Bulk Messaging. WISEC 2016: 165-170 - [i1]Adam Bates, Kevin R. B. Butler, Alin Dobra, Bradley Reaves, Patrick T. Cable II, Thomas Moyer, Nabil Schear:
Retrofitting Applications with Provenance-Based Security Monitoring. CoRR abs/1609.00266 (2016) - 2015
- [c7]David Dewey, Bradley Reaves, Patrick Traynor:
Uncovering Use-After-Free Conditions in Compiled Code. ARES 2015: 90-99 - [c6]Bradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor, Kevin R. B. Butler:
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World. USENIX Security Symposium 2015: 17-32 - [c5]Bradley Reaves, Ethan Shernan, Adam Bates, Henry Carter, Patrick Traynor:
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge. USENIX Security Symposium 2015: 833-848 - 2013
- [c4]Charles Lever, Manos Antonakakis, Bradley Reaves, Patrick Traynor, Wenke Lee:
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers. NDSS 2013 - [c3]Saurabh Chakradeo, Bradley Reaves, Patrick Traynor, William Enck:
MAST: triage for market-scale mobile malware analysis. WISEC 2013: 13-24 - 2012
- [j3]Bradley Reaves, Thomas H. Morris:
Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems. Int. J. Crit. Infrastructure Prot. 5(3-4): 154-174 (2012) - [j2]Bradley Reaves, Thomas H. Morris:
An open virtual testbed for industrial control system security research. Int. J. Inf. Sec. 11(4): 215-229 (2012) - 2011
- [j1]Thomas H. Morris, Anurag Srivastava, Bradley Reaves, Wei Gao, Kalyan Pavurapu, Ram Reddi:
A control system testbed to validate critical infrastructure protection concepts. Int. J. Crit. Infrastructure Prot. 4(2): 88-103 (2011) - 2010
- [c2]Wei Gao, Thomas H. Morris, Bradley Reaves, Drew Richey:
On SCADA control system command and response injection and intrusion detection. eCrime 2010: 1-9
2000 – 2009
- 2009
- [c1]Bradley Reaves, Thomas H. Morris:
Discovery, infiltration, and denial of service in a process control system wireless network. eCrime 2009: 1-9
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 02:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint