Kevin R. B. Butler
Orcid: 0000-0002-7498-4239Affiliations:
- University of Florida, Gainesville, FL, USA
According to our database1,
Kevin R. B. Butler
authored at least 127 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cise.ufl.edu
-
on orcid.org
On csauthors.net:
Bibliography
2024
Privacy-Preserving Gaze Data Streaming in Immersive Interactive Virtual Reality: Robustness and User Experience.
IEEE Trans. Vis. Comput. Graph., May, 2024
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets.
Proceedings of the 33rd USENIX Security Symposium, 2024
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
"Better Be Computer or I'm Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake Detectors.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
"I Had Sort of a Sense that I Was Always Being Watched...Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing Applications.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Vis. Comput. Graph., 2023
ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs.
IEEE Trans. Dependable Secur. Comput., 2023
Eye-tracked Virtual Reality: A Comprehensive Survey on Methods and Privacy Challenges.
CoRR, 2023
Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Less is More: Dimension Reduction Finds On-Manifold Adversarial Examples in Hard-Label Attacks.
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023
Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers?
Proceedings of the 15th ACM/USENIX Workshop on Hot Topics in Storage and File Systems, 2023
"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022
Proc. Priv. Enhancing Technol., 2022
Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the ETRA 2022: Symposium on Eye Tracking Research and Applications, Seattle, WA, USA, June 8, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
2021
IEEE Trans. Vis. Comput. Graph., 2021
IEEE Trans. Software Eng., 2021
Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples.
CoRR, 2021
Proceedings of the 12th IEEE Annual Ubiquitous Computing, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
Proceedings of the 29th USENIX Security Symposium, 2020
2019
ACM Trans. Priv. Secur., 2019
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities.
Secur. Commun. Networks, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Characterizing security and privacy practices in emerging digital credit applications.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
PAL: A pseudo assembly language for optimizing secure function evaluation in mobile devices.
J. Inf. Secur. Appl., 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
ACM Trans. Internet Techn., 2017
ACM Trans. Priv. Secur., 2017
IEEE Secur. Priv., 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Mixed-granular architectural diversity for device security in the Internet of Things.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017
2016
Secur. Commun. Networks, 2016
J. Comput. Secur., 2016
ACM Comput. Surv., 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the IEEE Cybersecurity Development, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation.
Proceedings of the Financial Cryptography and Data Security, 2016
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
Proceedings of the Digital Fingerprinting, 2016
2015
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World.
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs.
Proceedings of the 7th USENIX Workshop on the Theory and Practice of Provenance, 2015
More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Int. J. Inf. Sec., 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the New Security Paradigms Workshop, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
2012
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011
2010
malnets: large-scale malicious networks <i>via</i> compromised wireless access points.
Secur. Commun. Networks, 2010
IEEE Secur. Priv., 2010
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010
Proceedings of the IEEE 26th Symposium on Mass Storage Systems and Technologies, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems.
IEEE Trans. Parallel Distributed Syst., 2009
2008
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007
Proceedings of the Information Systems Security, Third International Conference, 2007
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
2006
Design, implementation and evaluation of security in iSCSI-based network storage systems.
Proceedings of the 2006 ACM Workshop On Storage Security And Survivability, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior.
Proceedings of the Information Systems Security, First International Conference, 2005