Is this your profile?
Claim your Citation Index profile in order to display more information about you and gain access to Libraries services. Just create or connect your ORCID iD.
Create or connect your ORCID iD
Works (44)
2025 article proceedings
AssetHarvester: A Static Analysis Tool for Detecting Secret-Asset Pairs in Software Artifacts
2025 article proceedings
Characterizing Robocalls with Multiple Vantage Points
2025 article proceedings
It Should Be Easy but... New Users' Experiences and Challenges with Secret Management Tools
2024 article proceedings
Fixing Insecure Cellular System Information Broadcasts For Good
Ross, A. J., Reaves, B., Nasser, Y., Cukierman, G., & Jover, R. P. (2024, September 29).
2024 article proceedings
Jäger: Automated Telephone Call Traceback
2024 article
On SMS Phishing Tactics and Infrastructure
Nahapetyan, A., Prasad, S., Childs, K., Oest, A., Ladwig, Y., Kapravelos, A., & Reaves, B. (2024, May 19). 45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, pp. 1–16.
2024 article
Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs
Dunlap, T., Meyers, J. S., Reaves, B., & Enck, W. (2024, January 1). Lecture Notes in Computer Science, Vol. 14828, pp. 350–369.
2024 article proceedings
VFCFinder: Pairing Security Advisories and Patches
Dunlap, T., Lin, E., Enck, W., & Reaves, B. (2024, June 28). PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, pp. 780–794.
2023 article proceedings
A Comparative Study of Software Secrets Reporting by Secret Detection Tools
2023 article proceedings
Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis
2023 article proceedings
MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy
Anjum, I., Sokal, J., Rehman, H. R., Weintraub, B., Leba, E., Enck, W., … Reaves, B. (2023, May 24). Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, pp. 121–132.
2023 article proceedings
SecretBench: A Dataset of Software Secrets
2023 article proceedings
Towards Simultaneous Attacks on Multiple Cellular Networks
2023 article proceedings
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?
Basak, S. K., Neil, L., Reaves, B., & Williams, L. (2023, May 1). 2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, pp. 1635–1647.
2022 article proceedings
A Study of Application Sandbox Policies in Linux
2022 article proceedings
Removing the Reliance on Perimeters for Security using Network Views
2022 article proceedings
What are the Practices for Secret Management in Software Artifacts?
2021 article proceedings
A First Look at Scams on YouTube
Presented at the Workshop on Measurements, Attacks, and Defenses for the Web.
2021 article proceedings
Anonymous device authorization for cellular networks
2021 chapter book
Characterizing the Security of Endogenous and Exogenous Desktop Application Network Flows
2019 article proceedings
Blinded and confused
2019 article proceedings
Hestia
2019 article proceedings
HomeSnitch
2019 article proceedings
How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories
Presented at the Network and Distributed System Security Symposium.
2019 article proceedings
Thou Shalt Discuss Security
2018 article proceedings
A Large Scale Investigation of Obfuscation Use in Google Play
2018 journal article
Characterizing the Security of the SMS Ecosystem with Public Gateways
Reaves, B., Vargas, L., Scaife, N., Tian, D., Blue, L., Traynor, P., & Butler, K. R. B. (2018, December 10). ACM Transactions on Privacy and Security.
2018 article proceedings
Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding
2017 conference paper
AuthentiCall: Efficient identity and content authentication for phone calls
Proceedings of the 26th Usenix Security Symposium (USENIX Security '17), 575–592.
2017 journal article
FinTechSec: Addressing the Security Challenges of Digital Financial Services
IEEE Security & Privacy, 15(5), 85–89.
2017 journal article
Mo(bile) Money, Mo(bile) Problems
ACM Transactions on Privacy and Security, 20(3), 1–31.
2017 article proceedings
Transparent Web Service Auditing via Network Provenance Functions
2016 journal article
*droid
ACM Computing Surveys, 49(3), 1–30.
2016 article proceedings
Detecting SMS Spam in the Age of Legitimate Bulk Messaging
2016 journal article
Phonion: Practical Protection of Metadata in Telephony Networks
Proceedings on Privacy Enhancing Technologies, 2017(1), 170–187.
2016 article proceedings
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
2015 article proceedings
Uncovering Use-After-Free Conditions in Compiled Code
2013 article proceedings
MAST
2012 journal article
An open virtual testbed for industrial control system security research
International Journal of Information Security, 11(4), 215–229.
2012 journal article
Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems
International Journal of Critical Infrastructure Protection, 5(3-4), 154–174.
2011 journal article
A control system testbed to validate critical infrastructure protection concepts
International Journal of Critical Infrastructure Protection, 4(2), 88–103.
2010 article proceedings
On SCADA control system command and response injection and intrusion detection
2009 article proceedings
Discovery, infiltration, and denial of service in a process control system wireless network
2009 article proceedings
Engineering future cyber-physical energy systems: Challenges, research needs, and roadmap