Bradley Reaves

Orcid: 0000-0001-7902-1821

According to our database1, Bradley Reaves authored at least 57 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Jäger: Automated Telephone Call Traceback.
CoRR, 2024

AssetHarvester: A Static Analysis Tool for Detecting Assets Protected by Secrets in Software Artifacts.
CoRR, 2024

On SMS Phishing Tactics and Infrastructure.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Fixing Insecure Cellular System Information Broadcasts For Good.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024

VFCFinder: Pairing Security Advisories and Patches.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
VFCFinder: Seamlessly Pairing Security Advisories and Patches.
CoRR, 2023

Diving into Robocall Content with SnorCall.
Proceedings of the 32nd USENIX Security Symposium, 2023

ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions.
Proceedings of the 32nd USENIX Security Symposium, 2023

Towards Simultaneous Attacks on Multiple Cellular Networks.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

SecretBench: A Dataset of Software Secrets.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

A Comparative Study of Software Secrets Reporting by Secret Detection Tools.
Proceedings of the ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2023

2022
Characterizing the Security of Github CI Workflows.
Proceedings of the 31st USENIX Security Symposium, 2022

What are the Practices for Secret Management in Software Artifacts?
Proceedings of the IEEE Secure Development Conference, 2022

A Study of Application Sandbox Policies in Linux.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Removing the Reliance on Perimeters for Security using Network Views.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

2021
Anonymous Device Authorization for Cellular Networks.
IACR Cryptol. ePrint Arch., 2021

A First Look at Scams on YouTube.
CoRR, 2021

Investigating Web Service Account Remediation Advice.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Characterizing the Security of Endogenous and Exogenous Desktop Application Network Flows.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

2020
Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis.
Proceedings of the 29th USENIX Security Symposium, 2020

Cardpliance: PCI DSS Compliance of Android Applications.
Proceedings of the 29th USENIX Security Symposium, 2020

Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
Characterizing the Security of the SMS Ecosystem with Public Gateways.
ACM Trans. Priv. Secur., 2019

HomeSnitch: behavior transparency and control for smart home IoT devices.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Hestia: simple least privilege network policies for smart homes.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play.
Proceedings of the 28th USENIX Security Symposium, 2019

Thou Shalt Discuss Security: Quantifying the Impacts of Instructions to RFC Authors.
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, 2019

How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

A Large Scale Investigation of Obfuscation Use in Google Play.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications.
ACM Trans. Priv. Secur., 2017

Phonion: Practical Protection of Metadata in Telephony Networks.
Proc. Priv. Enhancing Technol., 2017

FinTechSec: Addressing the Security Challenges of Digital Financial Services.
IEEE Secur. Priv., 2017

Transparent Web Service Auditing via Network Provenance Functions.
Proceedings of the 26th International Conference on World Wide Web, 2017

AuthentiCall: Efficient Identity and Content Authentication for Phone Calls.
Proceedings of the 26th USENIX Security Symposium, 2017

Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2016
*droid: Assessment and Evaluation of Android Application Analysis Tools.
ACM Comput. Surv., 2016

Retrofitting Applications with Provenance-Based Security Monitoring.
CoRR, 2016

Detecting SMS Spam in the Age of Legitimate Bulk Messaging.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels.
Proceedings of the 25th USENIX Security Symposium, 2016

Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World.
Proceedings of the 24th USENIX Security Symposium, 2015

Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge.
Proceedings of the 24th USENIX Security Symposium, 2015

Uncovering Use-After-Free Conditions in Compiled Code.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2013
MAST: triage for market-scale mobile malware analysis.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
An open virtual testbed for industrial control system security research.
Int. J. Inf. Sec., 2012

Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems.
Int. J. Crit. Infrastructure Prot., 2012

2011
A control system testbed to validate critical infrastructure protection concepts.
Int. J. Crit. Infrastructure Prot., 2011

2010
On SCADA control system command and response injection and intrusion detection.
Proceedings of the 2010 eCrime Researchers Summit, 2010

2009
Discovery, infiltration, and denial of service in a process control system wireless network.
Proceedings of the 2009 eCrime Researchers Summit, 2009


  Loading...