Clustered Binary Consensus in Sensor Motes

Noor Al-Nakhala , Tarek Elfouly , Ryan Riley
european wireless conference 1 -7

2
2014
Detecting Hidden Attacks through the Mobile App-Web Interfaces

Shihong Zou , Vaibhav Rastogi , Yan Chen , Xiang Pan
The Internet

2016
Hardening extended memory access control schemes with self-verified address spaces

Dmitry Evtyushkin , Dmitry Ponomarev , Nael Abu-Ghazaleh , Jesse Elwell
international conference on computer aided design 392 -399

2
2017
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring

Junghwan Rhee , Ryan Riley , Dongyan Xu , Xuxian Jiang
availability, reliability and security 74 -81

80
2009
Kernel malware analysis with un-tampered and temporal views of dynamic kernel memory

Junghwan Rhee , Ryan Riley , Dongyan Xu , Xuxian Jiang
recent advances in intrusion detection 178 -197

44
2010
5
2013
On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters

Baljit Singh , Dmitry Evtyushkin , Jesse Elwell , Ryan Riley
computer and communications security 483 -493

42
2017
Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications

Dmitry Evtyushkin , Jesse Elwell , Meltem Ozsoy , Dmitry Ponomarev
IEEE Transactions on Dependable and Secure Computing 15 ( 3) 437 -451

9
2016
Port or Shim? Stress Testing Application Performance on Intel SGX

Aisha Hasan , Ryan Riley , Dmitry Ponomarev
ieee international symposium on workload characterization 123 -133

2020
Understanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface

Rui Shao , Vaibhav Rastogi , Yan Chen , Xiang Pan
IEEE Transactions on Mobile Computing 17 ( 11) 2675 -2688

18
2018
Maintaining Database Anonymity in the Presence of Queries

Ryan Riley , Chris Clifton , Qutaibah Malluhi
international workshop on security 33 -48

1
2013
DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications

Zhengyang Qu , Shahid Alam , Yan Chen , Xiaoyong Zhou
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 415 -426

11
2017
Binary consensus in sensor motes

Noor Al-Nakhala , Ryan Riley , Tarek M. Elfouly
international conference on wireless communications and mobile computing 1337 -1342

7
2013
A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks

Jesse Elwell , Ryan Riley , Nael Abu-Ghazaleh , Dmitry Ponomarev
high-performance computer architecture 201 -212

9
2014
Rethinking Memory Permissions for Protection Against Cross-Layer Attacks

Jesse Elwell , Ryan Riley , Nael Abu-Ghazaleh , Dmitry Ponomarev
ACM Transactions on Architecture and Code Optimization 12 ( 4) 56

3
2015
An Architectural Approach to Preventing Code Injection Attacks

Ryan Riley , Xuxian Jiang , Dongyan Xu
dependable systems and networks 30 -40

15
2007
Your culture is in your password: An analysis of a demographically-diverse password dataset

Mashael AlSabah , Gabriele Oligeri , Ryan Riley
Computers & Security 77 427 -441

13
2018
Enclave-based oblivious RAM using Intel’s SGX

Maan Haj Rachid , Ryan Riley , Qutaibah Malluhi
Computers & Security 91 101711

1
2020
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing

Ryan Riley , Xuxian Jiang , Dongyan Xu
recent advances in intrusion detection 1 -20

479
2008