A Methodology for Empirical Analysis of Permission-based Security Models and its Application to Android D Barrera, HG Kayacik, PC van Oorschot, A Somayaji ACM Conference on Computer and Communications Security (CCS), 73-84, 2010 | 725 | 2010 |
A First Look at the Usability of Bitcoin Key Management S Eskandari, D Barrera, E Stobert, J Clark NDSS Workshop on Usable Security (USEC), 2015 | 232 | 2015 |
HORNET: High-speed Onion Routing at the Network Layer C Chen, DE Asoni, D Barrera, G Danezis, A Perrig ACM Conference on Computer and Communications Security (CCS), 1441-1454, 2015 | 171 | 2015 |
Secure software installation on smartphones D Barrera, PC Van Oorschot Security & Privacy 9 (3), 42 - 48, 2011 | 117 | 2011 |
Understanding and Improving App Installation Security Mechanisms through Empirical Analysis of Android D Barrera, J Clark, D McCarney, PC van Oorschot ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices …, 2012 | 99 | 2012 |
The SCION Internet Architecture D Barrera, L Chuat, A Perrig, RM Reischuk, P Szalachowski Communications of the ACM 60 (6), 56-65, 2017 | 94* | 2017 |
Tapas: design, implementation, and usability evaluation of a password manager D McCarney, D Barrera, J Clark, S Chiasson, PC van Oorschot Annual Computer Security Applications Conference (ACSAC), 89-98, 2012 | 89 | 2012 |
Standardizing IoT Network Security Policy Enforcement D Barrera, I Molloy, H Huang NDSS Workshop on Decentralized IoT Security and Standards (DISS), 2018 | 80* | 2018 |
ThinAV: Truly Lightweight Mobile Cloud-based Anti-malware C Jarabek, D Barrera, J Aycock Annual Computer Security Applications Conference (ACSAC), 2012 | 80 | 2012 |
TARANET: Traffic-analysis resistant anonymity at the network layer C Chen, DE Asoni, A Perrig, D Barrera, G Danezis, C Troncoso 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 137-152, 2018 | 76 | 2018 |
What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks AR Abdou, D Barrera, PC van Oorschot International Conference on Passwords, 2015 | 37 | 2015 |
Deadbolt: Locking Down Android Disk Encryption A Skillen, D Barrera, PC van Oorschot ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices …, 2013 | 29 | 2013 |
Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems D Barrera, W Enck, PC van Oorschot IEEE Mobile Security Technologies (MoST), 2012 | 29* | 2012 |
Source accountability with domain-brokered privacy T Lee, C Pappas, D Barrera, P Szalachowski, A Perrig Proceedings of the 12th International on Conference on emerging Networking …, 2016 | 28 | 2016 |
bpfbox: Simple Precise Process Confinement with eBPF W Findlay, A Somayaji, D Barrera ACM Cloud Computing Security Workshop (CCSW), 2020 | 27 | 2020 |
Baton: certificate agility for android's decentralized signing infrastructure D Barrera, D McCarney, J Clark, PC van Oorschot Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014 | 22* | 2014 |
Mercury: Recovering Forgotten Passwords Using Personal Devices M Mannan, D Barrera, C Brown, D Lie, PC van Oorschot Financial Cryptography and Data Security (FC), 315-330, 2011 | 21 | 2011 |
Security visualization tools and IPv6 addresses D Barrera, PC van Oorschot International Workshop on Visualization for Cyber Security (VizSec), 21-26, 2009 | 21 | 2009 |
Modeling Data-Plane Power Consumption of Future Internet Architectures C Chen, D Barrera, A Perrig IEEE CIC, 2016 | 15 | 2016 |
Internet kill switches demystified B Rothenberger, DE Asoni, D Barrera, A Perrig Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017 | 13 | 2017 |