Follow
Nolen Scaife
Nolen Scaife
Walmart
Verified email at fea.st - Homepage
Title
Cited by
Cited by
Year
Cryptolock (and drop it): stopping ransomware attacks on user data
N Scaife, H Carter, P Traynor, KRB Butler
2016 IEEE 36th international conference on distributed computing systems …, 2016
6112016
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
1632017
Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
B Reaves, N Scaife, D Tian, L Blue, P Traynor, KRB Butler
2016 IEEE Symposium on Security and Privacy (SP), 339-356, 2016
692016
* droid: Assessment and evaluation of android application analysis tools
B Reaves, J Bowers, SA Gorski III, O Anise, R Bobhate, R Cho, H Das, ...
ACM Computing Surveys (CSUR) 49 (3), 1-30, 2016
672016
SoK:" Plug & Pray" today–understanding USB insecurity in versions 1 through C
J Tian, N Scaife, D Kumar, M Bailey, A Bates, K Butler
2018 IEEE Symposium on Security and Privacy (SP), 1032-1047, 2018
552018
Making {USB} great again with {USBFILTER}
DJ Tian, N Scaife, A Bates, K Butler, P Traynor
25th USENIX Security Symposium (USENIX Security 16), 415-430, 2016
532016
Fear the reaper: Characterization and fast detection of card skimmers
N Scaife, C Peeters, P Traynor
27th USENIX Security Symposium (USENIX Security 18), 1-14, 2018
432018
Sonar: Detecting SS7 redirection attacks with audio-based distance bounding
C Peeters, H Abdullah, N Scaife, J Bowers, P Traynor, B Reaves, K Butler
2018 IEEE Symposium on Security and Privacy (SP), 567-582, 2018
282018
Making sense of the ransomware mess (and planning a sensible path forward)
N Scaife, P Traynor, K Butler
IEEE Potentials 36 (6), 28-31, 2017
242017
Malware detection via data transformation monitoring
WN Scaife, PG Traynor, H Carter, K Butler
US Patent 10,685,114, 2020
202020
OnionDNS: A seizure-resistant top-level domain
N Scaife, H Carter, L Lidsky, RL Jones, P Traynor
International Journal of Information Security 17, 645-660, 2018
172018
Arnav Bhartiya, Patrick Traynor, and Kevin RB Butler. 2017. Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
162017
Characterizing the security of the SMS ecosystem with public gateways
B Reaves, L Vargas, N Scaife, D Tian, L Blue, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 22 (1), 1-31, 2018
152018
The cards aren't alright: Detecting counterfeit gift cards using encoding jitter
N Scaife, C Peeters, C Velez, H Zhao, P Traynor, D Arnold
2018 IEEE Symposium on Security and Privacy (SP), 1063-1076, 2018
132018
Kiss from a rogue: Evaluating detectability of pay-at-the-pump card skimmers
N Scaife, J Bowers, C Peeters, G Hernandez, IN Sherman, P Traynor, ...
2019 IEEE Symposium on Security and Privacy (SP), 1000-1014, 2019
122019
Credit card fraud is a computer security problem
ST King, N Scaife, P Traynor, Z Abi Din, C Peeters, H Venugopala
IEEE Security & Privacy 19 (2), 65-69, 2021
82021
Payment card overlay skimmer detection
WN Scaife, PG Traynor, C Peeters
US Patent 10,496,914, 2019
82019
Detecting counterfeit magnetic stripe cards using encoding jitter
PG Traynor, DP Arnold, WN Scaife, C Peeters, CV Cuervo
US Patent 10,803,261, 2020
72020
Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System.
L Vargas, L Blue, V Frost, C Patton, N Scaife, KRB Butler, P Traynor
NDSS, 2019
72019
Detecting SS7 redirection attacks with audio-based distance bounding
PG Traynor, C Peeters, BG Reaves, H Abdullah, K Butler, J Bowers, ...
US Patent 11,265,717, 2022
52022
The system can't perform the operation now. Try again later.
Articles 1–20