Brad Reaves
Brad Reaves
Associate Professor, NC State University
Verified email at - Homepage
Cited by
Cited by
On SCADA control system command and response injection and intrusion detection
W Gao, T Morris, B Reaves, D Richey
eCrime Researchers Summit (eCrime), 2010, 1-9, 2010
Mast: triage for market-scale mobile malware analysis
S Chakradeo, B Reaves, P Traynor, W Enck
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
A control system testbed to validate critical infrastructure protection concepts
T Morris, A Srivastava, B Reaves, W Gao, K Pavurapu, R Reddi
International Journal of Critical Infrastructure Protection 4 (2), 88-103, 2011
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
Identity and content authentication for phone calls
PG Traynor, BG Reaves, LE Blue, L Vargas, H Abdullah, T Shrimpton
US Patent 10,764,043, 2020
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
Mo (bile) Money, Mo (bile) Problems: Analysis of Branchless Banking Applications in the Developing World
B Reaves, N Scaife, A Bates, P Traynor, KRB Butler
24th USENIX Security Symposium, 2015
PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play
B Andow, SY Mahmud, W Wang, J Whitaker, W Enck, B Reaves, K Singh, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 585-602, 2019
HomeSnitch: behavior transparency and control for smart home IoT devices
TJ OConnor, R Mohamed, M Miettinen, W Enck, B Reaves, AR Sadeghi
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck
B Andow, SY Mahmud, J Whitaker, W Enck, B Reaves, K Singh, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 985-1002, 2020
A large scale investigation of obfuscation use in google play
D Wermke, N Huaman, Y Acar, B Reaves, P Traynor, S Fahl
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
C Lever, M Antonakakis, B Reaves, P Traynor, W Lee
NDSS, 2013
An open virtual testbed for industrial control system security research
B Reaves, T Morris
International Journal of Information Security 11 (4), 215-229, 2012
How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories.
M Meli, MR McNiece, B Reaves
NDSS, 2019
Engineering future cyber-physical energy systems: Challenges, research needs, and roadmap
TH Morris, AK Srivastava, B Reaves, K Pavurapu, S Abdelwahed, ...
North American Power Symposium (NAPS), 2009, 1-6, 2009
Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
B Reaves, N Scaife, D Tian, L Blue, P Traynor, KRB Butler
2016 IEEE Symposium on Security and Privacy (SP), 339-356, 2016
*droid: Assessment and Evaluation of Android Application Analysis Tools
B Reaves, J Bowers, SAIII Gorski, O Anise, R Bobhate, R Cho, H Das, ...
ACM Computing Surveys, 2016
Cybersecurity testing of substation phasor measurement units and phasor data concentrators
T Morris, S Pan, J Lewis, J Moorhead, B Reaves, N Younan, R King, ...
The 7th Annual ACM Cyber Security and Information Intelligence Research …, 2011
AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels
B Reaves, L Blue, P Traynor
Proceedings of 25th USENIX Security Symposium, 2016
Transparent Web Service Auditing via Network Provenance Functions
A Bates, WU Hassan, K Butler, A Dobra, B Reaves, P Cable, T Moyer, ...
Proceedings of the 26th International Conference on World Wide Web, 887-895, 2017
The system can't perform the operation now. Try again later.
Articles 1–20