Follow
Brad Reaves
Brad Reaves
Assistant Professor, NC State University
Verified email at ncsu.edu - Homepage
Title
Cited by
Cited by
Year
Mast: triage for market-scale mobile malware analysis
S Chakradeo, B Reaves, P Traynor, W Enck
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
2422013
On SCADA control system command and response injection and intrusion detection
W Gao, T Morris, B Reaves, D Richey
eCrime Researchers Summit (eCrime), 2010, 1-9, 2010
2422010
A control system testbed to validate critical infrastructure protection concepts
T Morris, A Srivastava, B Reaves, W Gao, K Pavurapu, R Reddi
International Journal of Critical Infrastructure Protection 4 (2), 88-103, 2011
1682011
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
1362017
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
1312017
Mo (bile) Money, Mo (bile) Problems: Analysis of Branchless Banking Applications in the Developing World
B Reaves, N Scaife, A Bates, P Traynor, KRB Butler
24th USENIX Security Symposium, 2015
131*2015
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
C Lever, M Antonakakis, B Reaves, P Traynor, W Lee
NDSS, 2013
932013
An open virtual testbed for industrial control system security research
B Reaves, T Morris
International Journal of Information Security 11 (4), 215-229, 2012
882012
HomeSnitch: behavior transparency and control for smart home IoT devices
TJ OConnor, R Mohamed, M Miettinen, W Enck, B Reaves, AR Sadeghi
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
772019
A large scale investigation of obfuscation use in google play
D Wermke, N Huaman, Y Acar, B Reaves, P Traynor, S Fahl
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
722018
Engineering future cyber-physical energy systems: Challenges, research needs, and roadmap
TH Morris, AK Srivastava, B Reaves, K Pavurapu, S Abdelwahed, ...
North American Power Symposium (NAPS), 2009, 1-6, 2009
702009
*droid: Assessment and Evaluation of Android Application Analysis Tools
B Reaves, J Bowers, SAIII Gorski, O Anise, R Bobhate, R Cho, H Das, ...
ACM Computing Surveys, 2016
622016
Cybersecurity testing of substation phasor measurement units and phasor data concentrators
T Morris, S Pan, J Lewis, J Moorhead, B Reaves, N Younan, R King, ...
The 7th Annual ACM Cyber Security and Information Intelligence Research …, 2011
56*2011
PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play
B Andow, SY Mahmud, W Wang, J Whitaker, W Enck, B Reaves, K Singh, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 585-602, 2019
552019
Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
B Reaves, N Scaife, D Tian, L Blue, P Traynor, KRB Butler
2016 IEEE Symposium on Security and Privacy (SP), 339-356, 2016
472016
Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems
B Reaves, T Morris
International Journal of Critical Infrastructure Protection 5 (3), 154-174, 2012
432012
How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories.
M Meli, MR McNiece, B Reaves
NDSS, 2019
382019
Transparent Web Service Auditing via Network Provenance Functions
A Bates, WU Hassan, K Butler, A Dobra, B Reaves, P Cable, T Moyer, ...
Proceedings of the 26th International Conference on World Wide Web, 887-895, 2017
362017
AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels
B Reaves, L Blue, P Traynor
Proceedings of 25th USENIX Security Symposium, 2016
362016
Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck
B Andow, SY Mahmud, J Whitaker, W Enck, B Reaves, K Singh, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 985-1002, 2020
342020
The system can't perform the operation now. Try again later.
Articles 1–20