Bradley Reaves
Orcid: 0000-0001-7902-1821
According to our database1,
Bradley Reaves
authored at least 57 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
AssetHarvester: A Static Analysis Tool for Detecting Assets Protected by Secrets in Software Artifacts.
CoRR, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023
MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the IEEE Secure Development Conference, 2022
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Characterizing the Security of Endogenous and Exogenous Desktop Application Network Flows.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021
2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck.
Proceedings of the 29th USENIX Security Symposium, 2020
2019
ACM Trans. Priv. Secur., 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
ACM Trans. Priv. Secur., 2017
Proc. Priv. Enhancing Technol., 2017
IEEE Secur. Priv., 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
2016
ACM Comput. Surv., 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
2015
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World.
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
2012
Int. J. Inf. Sec., 2012
Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems.
Int. J. Crit. Infrastructure Prot., 2012
2011
Int. J. Crit. Infrastructure Prot., 2011
2010
Proceedings of the 2010 eCrime Researchers Summit, 2010
2009
Discovery, infiltration, and denial of service in a process control system wireless network.
Proceedings of the 2009 eCrime Researchers Summit, 2009