Works (44)

Updated: March 8th, 2026 18:42

2025 article proceedings

AssetHarvester: A Static Analysis Tool for Detecting Secret-Asset Pairs in Software Artifacts

By: S. Basak n, K. English n, K. Ogura n, V. Kambara n, B. Reaves n & L. Williams n

topics (OpenAlex): Digital and Cyber Forensics; Advanced Malware Detection Techniques; Software Engineering Research
Source: Crossref
Added: March 8, 2026

2025 article proceedings

Characterizing Robocalls with Multiple Vantage Points

By: S. Prasad n, A. Nahapetyan n & B. Reaves n

topics (OpenAlex): Advanced Control Systems Optimization; Constraint Satisfaction and Optimization
Source: Crossref
Added: March 8, 2026

2025 article proceedings

It Should Be Easy but... New Users' Experiences and Challenges with Secret Management Tools

By: L. Neil n, D. Mungara*, L. Williams n, Y. Acar* & B. Reaves n

topics (OpenAlex): User Authentication and Security Systems; Information and Cyber Security; Personal Information Management and User Behavior; Digital and Cyber Forensics
Sources: NC State University Libraries, Crossref
Added: November 23, 2025

2024 article proceedings

Fixing Insecure Cellular System Information Broadcasts For Good

Ross, A. J., Reaves, B., Nasser, Y., Cukierman, G., & Jover, R. P. (2024, September 29).

By: A. Ross n, B. Reaves n, Y. Nasser*, G. Cukierman* & R. Jover*

author keywords: Cellular Networks; Cellular Network Defenses; Cellular Network Security; Connection Bootstrapping
topics (OpenAlex): Advanced Authentication Protocols Security; RFID technology advancements; User Authentication and Security Systems
Sources: Web Of Science, Crossref
Added: December 2, 2024

2024 article proceedings

Jäger: Automated Telephone Call Traceback

By: D. Adei n, V. Madathil n, S. Prasad n, B. Reaves n & A. Scafuro n

topics (OpenAlex): Internet Traffic Analysis and Secure E-voting; Spam and Phishing Detection; User Authentication and Security Systems
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Crossref
Added: March 8, 2026

2024 article

On SMS Phishing Tactics and Infrastructure

Nahapetyan, A., Prasad, S., Childs, K., Oest, A., Ladwig, Y., Kapravelos, A., & Reaves, B. (2024, May 19). 45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, pp. 1–16.

By: A. Nahapetyan n, S. Prasad n, K. Childs n, A. Oest*, Y. Ladwig*, A. Kapravelos n, B. Reaves n

topics (OpenAlex): Spam and Phishing Detection; User Authentication and Security Systems; Internet Traffic Analysis and Secure E-voting
Sources: Web Of Science, NC State University Libraries
Added: December 2, 2024

2024 article

Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs

Dunlap, T., Meyers, J. S., Reaves, B., & Enck, W. (2024, January 1). Lecture Notes in Computer Science, Vol. 14828, pp. 350–369.

By: T. Dunlap n, J. Meyers*, B. Reaves n & W. Enck n

author keywords: Vulnerable Function; Security Advisory; Security Database; Large Language Model
topics (OpenAlex): Software Testing and Debugging Techniques; Advanced Malware Detection Techniques; Web Application Security Vulnerabilities
Sources: Web Of Science, NC State University Libraries
Added: October 21, 2024

2024 article proceedings

VFCFinder: Pairing Security Advisories and Patches

Dunlap, T., Lin, E., Enck, W., & Reaves, B. (2024, June 28). PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, pp. 780–794.

By: T. Dunlap n, E. Lin n, W. Enck n & B. Reaves n

author keywords: Vulnerability Fixing Commit; Security Patches; Vulnerability Data
topics (OpenAlex): Advanced Malware Detection Techniques; Security and Verification in Computing; Network Security and Intrusion Detection
Sources: Web Of Science, Crossref, ORCID, NC State University Libraries
Added: July 1, 2024

2023 article proceedings

A Comparative Study of Software Secrets Reporting by Secret Detection Tools

By: S. Basak n, J. Cox n, B. Reaves n & L. Williams n

topics (OpenAlex): Data Quality and Management; Digital and Cyber Forensics; Information and Cyber Security
Source: Crossref
Added: March 8, 2026

2023 article proceedings

Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis

By: T. Dunlap n, S. Thorn n, W. Enck n & B. Reaves n

topics (OpenAlex): Software Engineering Research; Web Application Security Vulnerabilities; Software Reliability and Analysis Research
TL;DR: Differential Alert Analysis is introduced to discover vulnerability fixes in software projects and provides a powerful, accurate primitive for software projects, code analysis tools, vulnerability databases, and researchers to characterize and enhance the security of software supply chains. (via Semantic Scholar)
Sources: Web Of Science, Crossref, NC State University Libraries, ORCID
Added: September 11, 2023

2023 article proceedings

MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy

Anjum, I., Sokal, J., Rehman, H. R., Weintraub, B., Leba, E., Enck, W., … Reaves, B. (2023, May 24). Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, pp. 121–132.

topics (OpenAlex): Software-Defined Networks and 5G; Caching and Content Delivery; Internet Traffic Analysis and Secure E-voting
TL;DR: MSNetViews is presented, which extends a single, globally-defined and managed, enterprise network security policy to many geographically distributed sites and shows that for an enterprise with globally distributed sites, the average time for policy state to settle after a user roams to a new site is well below two seconds. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
Sources: Crossref, ORCID
Added: January 2, 2024

2023 article proceedings

SecretBench: A Dataset of Software Secrets

By: S. Basak n, L. Neil n, B. Reaves n & L. Williams n

topics (OpenAlex): Advanced Malware Detection Techniques; Digital and Cyber Forensics; Data Quality and Management
TL;DR: The goal of this paper is to aid researchers and tool developers in evaluating and improving secret detection tools by curating a benchmark dataset of secrets through a systematic collection of secrets from open-source repositories. (via Semantic Scholar)
Sources: Web Of Science, Crossref, NC State University Libraries
Added: September 5, 2023

2023 article proceedings

Towards Simultaneous Attacks on Multiple Cellular Networks

By: A. Ross n & B. Reaves n

author keywords: Cellular Networks; Cellular Network Attacks
topics (OpenAlex): Opportunistic and Delay-Tolerant Networks; Internet Traffic Analysis and Secure E-voting; Network Security and Intrusion Detection
TL;DR: A preliminary analysis of the feasibility of using a single software defined radio to surveil multiple networks simultaneously is presented, demonstrating that radio tuning time is quite low, radio clocks are sufficiently stable to skip synchronization when retuning, and that even when monitoring multiple cells a radio can quite accurately count the devices served by all cells under observation. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
Sources: Web Of Science, Crossref
Added: August 28, 2023

2023 article proceedings

What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?

Basak, S. K., Neil, L., Reaves, B., & Williams, L. (2023, May 1). 2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, pp. 1635–1647.

By: S. Basak n, L. Neil n, B. Reaves n & L. Williams n

topics (OpenAlex): Software Engineering Research; Mobile Crowdsensing and Crowdsourcing; Privacy-Preserving Technologies in Data
TL;DR: The findings indicate that the same solution has been mentioned to mitigate multiple challenges, and an increasing trend in questions lacking accepted solutions substantiating the need for future research and tool automation on managing secrets. (via Semantic Scholar)
Sources: Web Of Science, Crossref, NC State University Libraries
Added: September 5, 2023

2022 article proceedings

A Study of Application Sandbox Policies in Linux

By: T. Dunlap n, W. Enck n & B. Reaves n

topics (OpenAlex): Advanced Malware Detection Techniques; Security and Verification in Computing; Digital and Cyber Forensics
Source: Crossref
Added: March 8, 2026

2022 article proceedings

Removing the Reliance on Perimeters for Security using Network Views

By: I. Anjum n, D. Kostecki*, E. Leba*, J. Sokal*, R. Bharambe n, W. Enck n, C. Nita-Rotaru*, B. Reaves n

topics (OpenAlex): Software-Defined Networks and 5G; Network Security and Intrusion Detection; Internet Traffic Analysis and Secure E-voting
Source: Crossref
Added: March 8, 2026

2022 article proceedings

What are the Practices for Secret Management in Software Artifacts?

By: S. Basak n, L. Neil n, B. Reaves n & L. Williams n

author keywords: secret management; practices; empirical study; grey literature; secure development
topics (OpenAlex): Advanced Malware Detection Techniques; Digital and Cyber Forensics; Information and Cyber Security
TL;DR: The goal of this paper is to aid practitioners in avoiding the exposure of secrets by identifying secret management practices in software artifacts through a systematic derivation of practices disseminated in Internet artifacts. (via Semantic Scholar)
Sources: Web Of Science, Crossref, NC State University Libraries
Added: February 20, 2023

2021 article proceedings

A First Look at Scams on YouTube

Presented at the Workshop on Measurements, Attacks, and Defenses for the Web.

By: E. Bouma-Sims n & B. Reaves n

topics (OpenAlex): FinTech, Crowdfunding, Digital Finance; Media Influence and Politics; Spam and Phishing Detection; Misinformation and Its Impacts; Cybercrime and Law Enforcement Studies
Source: Crossref
Added: March 8, 2026

2021 article proceedings

Anonymous device authorization for cellular networks

By: A. Haque n, V. Madathil n, B. Reaves n & A. Scafuro n

topics (OpenAlex): Internet Traffic Analysis and Secure E-voting; User Authentication and Security Systems; Advanced Malware Detection Techniques
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Crossref
Added: March 8, 2026

2021 chapter book

Characterizing the Security of Endogenous and Exogenous Desktop Application Network Flows

By: M. McNiece n, R. Li* & B. Reaves n

topics (OpenAlex): Network Security and Intrusion Detection; Peer-to-Peer Network Technologies; Internet Traffic Analysis and Secure E-voting
Sources: Web Of Science, Crossref
Added: May 10, 2022

2019 article proceedings

Blinded and confused

By: T. OConnor n, W. Enck n & B. Reaves n

topics (OpenAlex): IoT and Edge/Fog Computing; Internet Traffic Analysis and Secure E-voting; Opportunistic and Delay-Tolerant Networks
TL;DR: This paper seeks to better understand smart home device security by studying the vendor design decisions surrounding IoT telemetry messaging protocols, specifically, the behaviors taken when an IoT device loses connectivity, and finds that 22 of 24 studied devices suffer from critical design flaws. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: Web Of Science, Crossref, NC State University Libraries, ORCID
Added: August 19, 2019

2019 article proceedings

Hestia

By: S. Goutam n, W. Enck n & B. Reaves n

author keywords: IoT & network security; smart home; least privilege policy
topics (OpenAlex): Advanced Malware Detection Techniques; Network Security and Intrusion Detection; Internet Traffic Analysis and Secure E-voting
TL;DR: Hestia drastically improves smart home security without complex, unwieldy policies or lengthy learning of device behaviors, and perhaps more importantly, smart home owners need only specify which devices are controllers. (via Semantic Scholar)
Sources: Web Of Science, Crossref, NC State University Libraries, ORCID
Added: August 19, 2019

2019 article proceedings

HomeSnitch

By: T. OConnor n, R. Mohamed*, M. Miettinen*, W. Enck n, B. Reaves n & A. Sadeghi*

topics (OpenAlex): Internet Traffic Analysis and Secure E-voting; Advanced Malware Detection Techniques; Network Security and Intrusion Detection
TL;DR: HomeSnitch is presented, a building block for enhancing smart home transparency and control by classifying IoT device communication by semantic behavior (e.g., heartbeat, firmware check, motion detection) and the utility of network-level services to classify behaviors of and enforce control on smart home devices. (via Semantic Scholar)
Sources: Web Of Science, Crossref, NC State University Libraries, ORCID
Added: August 19, 2019

2019 article proceedings

How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories

Presented at the Network and Distributed System Security Symposium.

By: M. Meli n, M. McNiece n & B. Reaves n

topics (OpenAlex): Advanced Malware Detection Techniques; Security and Verification in Computing; Web Application Security Vulnerabilities
Source: Crossref
Added: March 8, 2026

2019 article proceedings

Thou Shalt Discuss Security

By: J. Whitaker n, S. Prasad n, B. Reaves n & W. Enck n

author keywords: Requests for Comments; Internet Standards; Network Security; Text Analysis
topics (OpenAlex): Hate Speech and Cyberbullying Detection; Information and Cyber Security; Software Engineering Research
Sources: Web Of Science, Crossref, NC State University Libraries, ORCID
Added: September 14, 2020

2018 article proceedings

A Large Scale Investigation of Obfuscation Use in Google Play

author keywords: Obfuscation; Android; User Study
topics (OpenAlex): Advanced Malware Detection Techniques; Spam and Phishing Detection; Internet Traffic Analysis and Secure E-voting
TL;DR: This first comprehensive analysis of the use of and challenges to software obfuscation in Android applications finds that only 24.92% of apps are obfuscated by the developer, with broad implications both for improving the security of Android apps and for all tools that aim to help developers write more secure software. (via Semantic Scholar)
Sources: Web Of Science, Crossref
Added: January 28, 2019

2018 journal article

Characterizing the Security of the SMS Ecosystem with Public Gateways

Reaves, B., Vargas, L., Scaife, N., Tian, D., Blue, L., Traynor, P., & Butler, K. R. B. (2018, December 10). ACM Transactions on Privacy and Security.

By: B. Reaves n, L. Vargas*, N. Scaife*, D. Tian*, L. Blue*, P. Traynor*, K. Butler*

author keywords: Multifactor authentication; SMS; SMS abuse; SMS spam
topics (OpenAlex): Advanced Malware Detection Techniques; Spam and Phishing Detection; Network Security and Intrusion Detection
Sources: Web Of Science, Crossref
Added: February 18, 2019

2018 article proceedings

Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding

By: C. Peeters*, H. Abdullah*, N. Scaife*, J. Bowers*, P. Traynor*, B. Reaves n, K. Butler*

topics (OpenAlex): Network Security and Intrusion Detection; Internet Traffic Analysis and Secure E-voting; Advanced Malware Detection Techniques
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Crossref
Added: March 8, 2026

2017 conference paper

AuthentiCall: Efficient identity and content authentication for phone calls

Proceedings of the 26th Usenix Security Symposium (USENIX Security '17), 575–592.

By: B. Reaves, L. Blue, H. Abdullah, L. Vargas, P. Traynor & T. Shrimpton

Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

FinTechSec: Addressing the Security Challenges of Digital Financial Services

IEEE Security & Privacy, 15(5), 85–89.

By: P. Traynor*, K. Butler*, J. Bowers* & B. Reaves n

topics (OpenAlex): Advanced Malware Detection Techniques; Blockchain Technology Applications and Security; Spam and Phishing Detection
TL;DR: The challenges facing these truly transformative technologies and how this community can help are looked into. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
10. Reduced Inequalities (OpenAlex)
Sources: Web Of Science, Crossref
Added: August 6, 2018

2017 journal article

Mo(bile) Money, Mo(bile) Problems

ACM Transactions on Privacy and Security, 20(3), 1–31.

By: B. Reaves*, J. Bowers*, N. Scaife*, A. Bates*, A. Bhartiya*, P. Traynor*, K. Butler*

topics (OpenAlex): Advanced Malware Detection Techniques; Spam and Phishing Detection; Blockchain Technology Applications and Security
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
10. Reduced Inequalities (OpenAlex)
Source: Crossref
Added: March 8, 2026

2017 article proceedings

Transparent Web Service Auditing via Network Provenance Functions

By: A. Bates*, W. Hassan*, K. Butler*, A. Dobra*, B. Reaves*, P. Cable*, T. Moyer*, N. Schear*

topics (OpenAlex): Scientific Computing and Data Management; Data Quality and Management; Cloud Data Security Solutions
Source: Crossref
Added: March 8, 2026

2016 journal article

*droid

ACM Computing Surveys, 49(3), 1–30.

By: B. Reaves*, J. Bowers*, S. Gorski III n, O. Anise*, R. Bobhate*, R. Cho*, H. Das*, S. Hussain* ...

author keywords: Android; application security; program analysis
topics (OpenAlex): Advanced Malware Detection Techniques; Digital and Cyber Forensics; Software Testing and Debugging Techniques
TL;DR: The first systematization of Android security research that analyzes applications is performed, characterizing the work published in more than 17 top venues since 2010 and finding not only that significant work remains to be done in terms of research coverage but also that the tools suffer from significant issues. (via Semantic Scholar)
Sources: Crossref, Web Of Science, NC State University Libraries
Added: August 6, 2018

2016 article proceedings

Detecting SMS Spam in the Age of Legitimate Bulk Messaging

By: B. Reaves*, L. Blue*, D. Tian*, P. Traynor* & K. Butler*

topics (OpenAlex): Spam and Phishing Detection; Internet Traffic Analysis and Secure E-voting; Misinformation and Its Impacts
Source: Crossref
Added: March 8, 2026

2016 journal article

Phonion: Practical Protection of Metadata in Telephony Networks

Proceedings on Privacy Enhancing Technologies, 2017(1), 170–187.

topics (OpenAlex): Internet Traffic Analysis and Secure E-voting; Network Security and Intrusion Detection; Spam and Phishing Detection
Source: Crossref
Added: March 8, 2026

2016 article proceedings

Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways

By: B. Reaves*, N. Scaife*, D. Tian*, L. Blue*, P. Traynor* & K. Butler*

topics (OpenAlex): Advanced Malware Detection Techniques; Spam and Phishing Detection; Internet Traffic Analysis and Secure E-voting
Source: Crossref
Added: March 8, 2026

2015 article proceedings

Uncovering Use-After-Free Conditions in Compiled Code

By: D. Dewey*, B. Reaves* & P. Traynor*

topics (OpenAlex): Security and Verification in Computing; Advanced Malware Detection Techniques; Software Testing and Debugging Techniques
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Crossref
Added: March 8, 2026

2013 article proceedings

MAST

By: S. Chakradeo*, B. Reaves*, P. Traynor* & W. Enck*

topics (OpenAlex): Advanced Malware Detection Techniques; Network Security and Intrusion Detection; Software Testing and Debugging Techniques
Source: Crossref
Added: March 8, 2026

2012 journal article

An open virtual testbed for industrial control system security research

International Journal of Information Security, 11(4), 215–229.

By: B. Reaves* & T. Morris*

author keywords: Virtual testbed; Industrial control system; SCADA; Cybersecurity
topics (OpenAlex): Network Security and Intrusion Detection; Smart Grid Security and Resilience; Advanced Malware Detection Techniques
TL;DR: A virtual testbed framework using Python to create discrete testbed components including virtual devices and process simulators is described, designed such that the testbeds are inter-operable with real industrial control system devices and such that they can provide comparableindustrial control system network behavior to a laboratory testbed. (via Semantic Scholar)
Source: Crossref
Added: June 6, 2020

2012 journal article

Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems

International Journal of Critical Infrastructure Protection, 5(3-4), 154–174.

By: B. Reaves* & T. Morris*

author keywords: Industrial control systems; Wireless communications; Vulnerabilities; Mitigation
topics (OpenAlex): Bluetooth and Wireless Communication Technologies; Opportunistic and Delay-Tolerant Networks; Wireless Body Area Networks
TL;DR: Vulnerabilities and mitigations related to multiple industrial radio technologies deployed in control systems including IEEE 802.15.4, WirelessHART, ZigBee, Bluetooth, and IEEE802.11.4 are focused on. (via Semantic Scholar)
Source: Crossref
Added: June 6, 2020

2011 journal article

A control system testbed to validate critical infrastructure protection concepts

International Journal of Critical Infrastructure Protection, 4(2), 88–103.

By: T. Morris*, A. Srivastava*, B. Reaves*, W. Gao*, K. Pavurapu* & R. Reddi*

author keywords: Testbed; Industrial control system; SCADA; Smart grid; Cybersecurity
topics (OpenAlex): Smart Grid Security and Resilience; Information and Cyber Security; Digital and Cyber Forensics; Infrastructure Resilience and Vulnerability Analysis
TL;DR: The testbed enables a research process in which cybersecurity vulnerabilities are discovered, exploits are used to understand the implications of the vulnerability on controlled physical processes, identified problems are classified by criticality and similarities in type and effect, and finally cybersecurity mitigations are developed and validated against within the testbed. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Crossref
Added: June 6, 2020

2010 article proceedings

On SCADA control system command and response injection and intrusion detection

By: W. Gao*, T. Morris*, B. Reaves* & D. Richey*

topics (OpenAlex): Network Security and Intrusion Detection; Smart Grid Security and Resilience; Advanced Malware Detection Techniques
Source: Crossref
Added: March 8, 2026

2009 article proceedings

Discovery, infiltration, and denial of service in a process control system wireless network

By: B. Reaves* & T. Morris*

topics (OpenAlex): Smart Grid Security and Resilience; Information and Cyber Security; Network Security and Intrusion Detection
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
6. Clean Water and Sanitation (OpenAlex)
Source: Crossref
Added: March 8, 2026

2009 article proceedings

Engineering future cyber-physical energy systems: Challenges, research needs, and roadmap

By: T. Morris*, A. Srivastava*, B. Reaves*, K. Pavurapu*, S. Abdelwahed*, R. Vaughn*, W. McGrew*, Y. Dandass*

topics (OpenAlex): Smart Grid Security and Resilience; Distributed and Parallel Computing Systems; Simulation Techniques and Applications
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Crossref
Added: March 8, 2026

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2026) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.