Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017 | 177 | 2017 |
* droid: Assessment and evaluation of android application analysis tools B Reaves, J Bowers, SA Gorski III, O Anise, R Bobhate, R Cho, H Das, ... ACM Computing Surveys (CSUR) 49 (3), 1-30, 2016 | 70 | 2016 |
Regulators, mount up! analysis of privacy policies for mobile money services J Bowers, B Reaves, IN Sherman, P Traynor, K Butler Thirteenth symposium on usable privacy and security (SOUPS 2017), 97-114, 2017 | 49 | 2017 |
Sonar: Detecting SS7 redirection attacks with audio-based distance bounding C Peeters, H Abdullah, N Scaife, J Bowers, P Traynor, B Reaves, K Butler 2018 IEEE Symposium on Security and Privacy (SP), 567-582, 2018 | 28 | 2018 |
The best way to a strong defense is a strong offense: Mitigating deanonymization attacks via iterative language translation N Mack, J Bowers, H Williams, G Dozier, J Shelton International Journal of Machine Learning and Computing 5 (5), 409, 2015 | 20 | 2015 |
Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators. IN Sherman, JD Bowers, K McNamara Jr, JE Gilbert, J Ruiz, P Traynor NDSS, 2020 | 14 | 2020 |
Kiss from a rogue: Evaluating detectability of pay-at-the-pump card skimmers N Scaife, J Bowers, C Peeters, G Hernandez, IN Sherman, P Traynor, ... 2019 IEEE Symposium on Security and Privacy (SP), 1000-1014, 2019 | 12 | 2019 |
Olabode Anise, Rahul Bobhate, Raymond Cho, Hiranava Das, Sharique Hussain, Hamza Karachiwala, Nolen Scaife et al. 2016.* droid: Assessment and evaluation of Android application … B Reaves, J Bowers, SA Gorski III ACM Computing Surveys (CSUR) 49 (3), 55, 2016 | 12 | 2016 |
Characterizing security and privacy practices in emerging digital credit applications J Bowers, IN Sherman, KRB Butler, P Traynor Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019 | 11 | 2019 |
FinTechSec: Addressing the security challenges of digital financial services P Traynor, K Butler, J Bowers, B Reaves IEEE Security & Privacy 15 (5), 85-89, 2017 | 8 | 2017 |
Truly Visual Caller ID? An Analysis of Anti-Robocall Applications and their Accessibility to Visually Impaired Users IN Sherman, JD Bowers, LL Laborde, JE Gilbert, J Ruiz, PG Traynor 2020 IEEE International Symposium on Technology and Society (ISTAS), 266-279, 2020 | 3 | 2020 |
Detecting SS7 redirection attacks with audio-based distance bounding PG Traynor, C Peeters, BG Reaves, H Abdullah, K Butler, J Bowers, ... US Patent 11,265,717, 2022 | | 2022 |
On the Privacy and Security of Digital Finance Applications J Bowers University of Florida, 2020 | | 2020 |
Mitigating Deanonymization Attacks via Iterative Language Translation for Social Networks JD Bowers North Carolina Agricultural and Technical State University, 2015 | | 2015 |
in Fraud Detection J Uduehi, J Bowers, P Chand, K Butler | | |