Brad Reaves

Works (13)

Updated: April 11th, 2023 10:13

2022 article

What are the Practices for Secret Management in Software Artifacts?

2022 IEEE SECURE DEVELOPMENT CONFERENCE (SECDEV 2022), pp. 69–76.

By: S. Basak, L. Neil, B. Reaves & L. Williams

author keywords: secret management; practices; empirical study; grey literature; secure development
Source: Web Of Science
Added: February 20, 2023

2021 article

Characterizing the Security of Endogenous and Exogenous Desktop Application Network Flows

PASSIVE AND ACTIVE MEASUREMENT, PAM 2021, Vol. 12671, pp. 531–546.

By: M. McNiece, R. Li* & B. Reaves

Source: Web Of Science
Added: May 10, 2022

2019 article

Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 140–150.

By: T. OConnor n, W. Enck & B. Reaves

Source: Web Of Science
Added: August 19, 2019

2019 journal article

Characterizing the Security of the SMS Ecosystem with Public Gateways

ACM TRANSACTIONS ON PRIVACY AND SECURITY, 22(1).

By: B. Reaves, L. Vargas*, N. Scaife*, D. Tian*, L. Blue*, P. Traynor*, K. Butler*

author keywords: Multifactor authentication; SMS; SMS abuse; SMS spam
Source: Web Of Science
Added: February 18, 2019

2019 article

HOMESNITCH: Behavior Transparency and Control for Smart Home IoT Devices

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 128–139.

By: T. OConnor n, R. Mohamed*, M. Miettinen*, W. Enck, B. Reaves & A. Sadeghi*

Source: Web Of Science
Added: August 19, 2019

2019 article

Hestia: Simple Least Privilege Network Policies for Smart Homes

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 215–220.

By: S. Goutam n, W. Enck & B. Reaves

author keywords: IoT & network security; smart home; least privilege policy
Source: Web Of Science
Added: August 19, 2019

2019 article

Thou Shalt Discuss Security: Quantifying the Impacts of Instructions to RFC Authors

PROCEEDINGS OF THE 5TH ACM WORKSHOP ON SECURITY STANDARDISATION RESEARCH WORKSHOP (SSR '19), pp. 57–68.

By: J. Whitaker n, S. Prasad, B. Reaves & W. Enck

author keywords: Requests for Comments; Internet Standards; Network Security; Text Analysis
Source: Web Of Science
Added: September 14, 2020

2018 article

A Large Scale Investigation of Obfuscation Use in Google Play

34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), pp. 222–235.

By: D. Wermke*, N. Huaman*, Y. Acar*, B. Reaves, P. Traynor* & S. Fahl*

author keywords: Obfuscation; Android; User Study
Source: Web Of Science
Added: January 28, 2019

2017 conference paper

Authenticall: Efficient identity and content authentication for phone calls

Proceedings of the 26th Usenix Security Symposium (USENIX Security '17), 575–592.

By: B. Reaves, L. Blue, H. Abdullah, L. Vargas, P. Traynor & T. Shrimpton

Source: NC State University Libraries
Added: August 6, 2018

2017 article

FinTechSec: Addressing the Security Challenges of Digital Financial Services

IEEE SECURITY & PRIVACY, Vol. 15, pp. 85–89.

By: P. Traynor*, K. Butler*, J. Bowers* & B. Reaves

Source: Web Of Science
Added: August 6, 2018

2012 journal article

An open virtual testbed for industrial control system security research

International Journal of Information Security, 11(4), 215–229.

By: B. Reaves & T. Morris*

author keywords: Virtual testbed; Industrial control system; SCADA; Cybersecurity
Source: Crossref
Added: June 6, 2020

2012 journal article

Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems

International Journal of Critical Infrastructure Protection, 5(3-4), 154–174.

By: B. Reaves & T. Morris*

author keywords: Industrial control systems; Wireless communications; Vulnerabilities; Mitigation
Source: Crossref
Added: June 6, 2020

2011 journal article

A control system testbed to validate critical infrastructure protection concepts

International Journal of Critical Infrastructure Protection, 4(2), 88–103.

By: T. Morris*, A. Srivastava*, B. Reaves, W. Gao*, K. Pavurapu* & R. Reddi*

author keywords: Testbed; Industrial control system; SCADA; Smart grid; Cybersecurity
Source: Crossref
Added: June 6, 2020