Trustworthy {Whole-System} provenance for the linux kernel A Bates, DJ Tian, KRB Butler, T Moyer 24th USENIX Security Symposium (USENIX Security 15), 319-334, 2015 | 279 | 2015 |
Firmusb: Vetting usb device firmware using domain informed symbolic execution G Hernandez, F Fowze, D Tian, T Yavuz, KRB Butler Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 107 | 2017 |
Defending against malicious USB firmware with GoodUSB DJ Tian, A Bates, K Butler Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 103 | 2015 |
More guidelines than rules: CSRF vulnerabilities from noncompliant OAuth 2.0 implementations E Shernan, H Carter, D Tian, P Traynor, K Butler Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015 | 73 | 2015 |
Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways B Reaves, N Scaife, D Tian, L Blue, P Traynor, KRB Butler 2016 IEEE Symposium on Security and Privacy (SP), 339-356, 2016 | 69 | 2016 |
Custos: Practical tamper-evident auditing of operating systems using trusted execution R Paccagnella, P Datta, WU Hassan, A Bates, C Fletcher, A Miller, D Tian Network and distributed system security symposium, 2020 | 68 | 2020 |
Securing SSL certificate verification through dynamic linking A Bates, J Pletcher, T Nichols, B Hollembaek, D Tian, KRB Butler, ... Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 62 | 2014 |
CPAC: securing critical infrastructure with cyber-physical access control S Etigowni, D Tian, G Hernandez, S Zonouz, K Butler Proceedings of the 32nd annual conference on computer security applications …, 2016 | 61 | 2016 |
SoK: "Plug & Pray" Today — Understanding USB Insecurity in Versions 1 through C DJ Tian, N Scaife, D Kumar, M Bailey, A Bates, K Butler 39th IEEE Symposium on Security and Privacy (Oakland’18), San Francisco, CA, 2018 | 57 | 2018 |
{BLESA}: Spoofing attacks against reconnections in bluetooth low energy J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi, M Payer, D Xu 14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020 | 56 | 2020 |
Making {USB} great again with {USBFILTER} DJ Tian, N Scaife, A Bates, K Butler, P Traynor 25th USENIX Security Symposium (USENIX Security 16), 415-430, 2016 | 53 | 2016 |
{ATtention} Spanned: Comprehensive Vulnerability Analysis of {AT} Commands Within the Android Ecosystem DJ Tian, G Hernandez, JI Choi, V Frost, C Raules, P Traynor, ... 27th USENIX security symposium (USENIX security 18), 273-290, 2018 | 42 | 2018 |
Logging to the danger zone: Race condition attacks and defenses on system audit frameworks R Paccagnella, K Liao, D Tian, A Bates Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 35 | 2020 |
Lbm: A security framework for peripherals within the linux kernel DJ Tian, G Hernandez, JI Choi, V Frost, PC Johnson, KRB Butler 2019 IEEE Symposium on Security and Privacy (SP), 967-984, 2019 | 34 | 2019 |
Detecting SMS spam in the age of legitimate bulk messaging B Reaves, L Blue, D Tian, P Traynor, KRB Butler Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 33 | 2016 |
{LIGHTBLUE}: Automatic {Profile-Aware} Debloating of Bluetooth Stacks J Wu, R Wu, D Antonioli, M Payer, NO Tippenhauer, D Xu, DJ Tian, ... 30th USENIX Security Symposium (USENIX Security 21), 339-356, 2021 | 32 | 2021 |
Provusb: Block-level provenance-based data protection for usb storage devices D Tian, A Bates, KRB Butler, R Rangaswami Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 32 | 2016 |
Formal model-driven discovery of bluetooth protocol design vulnerabilities J Wu, R Wu, D Xu, DJ Tian, A Bianchi 2022 IEEE Symposium on Security and Privacy (SP), 2285-2303, 2022 | 27 | 2022 |
{M2MON}: Building an {MMIO-based} security reference monitor for unmanned vehicles A Khan, H Kim, B Lee, D Xu, A Bianchi, DJ Tian 30th USENIX Security Symposium (USENIX Security 21), 285-302, 2021 | 26 | 2021 |
{BigMAC}:{Fine-Grained} policy analysis of android firmware G Hernandez, DJ Tian, AS Yadav, BJ Williams, KRB Butler 29th USENIX Security Symposium (USENIX Security 20), 271-287, 2020 | 25 | 2020 |