H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 30 Citations 3,934 95 World Ranking 8587 National Ranking 3974

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer network

His main research concerns Computer security, Cloud computing, Computer network, Malware and Overhead. His Computer security research focuses on Android and how it connects with Data science. In the subject of general Cloud computing, his work in Hypervisor, Cloud computing security and Virtualization is often linked to Covert channel, thereby combining diverse domains of study.

His Computer network research incorporates themes from Data validation and The Internet. He interconnects False positive paradox, Intrusion detection system, Encryption and Extortion in the investigation of issues within Malware. As part of the same scientific family, Kevin R. B. Butler usually focuses on Overhead, concentrating on Data loss and intersecting with Software deployment, Metadata and Object.

His most cited work include:

  • A Survey of BGP Security Issues and Solutions (285 citations)
  • CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data (218 citations)
  • Trustworthy whole-system provenance for the Linux kernel (111 citations)

What are the main themes of his work throughout his whole career to date?

Computer security, Operating system, Computer network, The Internet and Embedded system are his primary areas of study. His research in Computer security intersects with topics in Software, Cloud computing and Internet privacy. His Cloud computing study combines topics in areas such as Virtual machine and Mobile device.

His Computer network research focuses on subjects like Adversary, which are linked to Public-key cryptography. Many of his research projects under The Internet are closely connected to Border Gateway Protocol with Border Gateway Protocol, tying the diverse disciplines of science together. His Embedded system research incorporates elements of Android, USB, Security token and Compiler.

He most often published in these fields:

  • Computer security (45.76%)
  • Operating system (16.10%)
  • Computer network (16.10%)

What were the highlights of his more recent work (between 2019-2021)?

  • Identification (4.24%)
  • Firmware (8.47%)
  • Adversarial machine learning (4.24%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in Identification, Firmware, Adversarial machine learning, Computer security and Application programming interface. His research integrates issues of Traffic analysis, Fuzz testing and Adaptation in his study of Identification. The various areas that Kevin R. B. Butler examines in his Firmware study include Wireless, Policy analysis and Android.

His Adversarial machine learning research includes themes of Tree traversal and Contextual image classification. The Authentication research Kevin R. B. Butler does as part of his general Computer security study is frequently linked to other disciplines of science, such as Containerization, therefore creating a link between diverse domains of science. The concepts of his Application programming interface study are interwoven with issues in Mixed reality, Human–computer interaction, Eye tracking and Gaze.

Between 2019 and 2021, his most popular works were:

  • BigMAC: Fine-Grained Policy Analysis of Android Firmware (4 citations)
  • A privacy-preserving approach to streaming eye-tracking data (1 citations)
  • Brittle Features of Device Authentication (0 citations)

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

A Survey of BGP Security Issues and Solutions

K. Butler;T.R. Farley;P. McDaniel;J. Rexford.
Proceedings of the IEEE (2010)

413 Citations

CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data

Nolen Scaife;Henry Carter;Patrick Traynor;Kevin R. B. Butler.
international conference on distributed computing systems (2016)

384 Citations

Trustworthy whole-system provenance for the Linux kernel

Adam Bates;Dave Tian;Kevin R. B. Butler;Thomas Moyer.
usenix security symposium (2015)

196 Citations

Hi-Fi: collecting high-fidelity whole-system provenance

Devin J. Pohly;Stephen McLaughlin;Patrick McDaniel;Kevin Butler.
annual computer security applications conference (2012)

148 Citations

PCF: a portable circuit format for scalable two-party secure computation

Ben Kreuter;Benjamin Mood;Abhi Shelat;Kevin Butler.
usenix security symposium (2013)

139 Citations

Porscha: policy oriented secure content handling in Android

Machigar Ongtang;Kevin Butler;Patrick McDaniel.
annual computer security applications conference (2010)

139 Citations

Detecting co-residency with active traffic analysis techniques

Adam Bates;Benjamin Mood;Joe Pletcher;Hannah Pruse.
cloud computing security workshop (2012)

137 Citations

Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications

Bradley Reaves;Jasmine Bowers;Nolen Scaife;Adam Bates.
ACM Transactions on Privacy and Security (TOPS) (2017)

125 Citations

Secure outsourced garbled circuit evaluation for mobile devices

Henry Carter;Benjamin Mood;Patrick Traynor;Kevin R. B. Butler.
Journal of Computer Security (2016)

117 Citations

Mo(bile) money, mo(bile) problems: analysis of branchless banking applications in the developing world

Bradley Reaves;Nolen Scaife;Adam Bates;Patrick Traynor.
usenix security symposium (2015)

100 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Kevin R. B. Butler

Patrick Traynor

Patrick Traynor

University of Florida

Publications: 21

Thomas Schneider

Thomas Schneider

TU Darmstadt

Publications: 21

Farinaz Koushanfar

Farinaz Koushanfar

University of California, San Diego

Publications: 18

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 18

Margo Seltzer

Margo Seltzer

University of British Columbia

Publications: 17

Trent Jaeger

Trent Jaeger

Pennsylvania State University

Publications: 17

Patrick McDaniel

Patrick McDaniel

Pennsylvania State University

Publications: 14

Gregory Levitin

Gregory Levitin

Southwest Jiaotong University

Publications: 14

Michael Schapira

Michael Schapira

Hebrew University of Jerusalem

Publications: 13

Liudong Xing

Liudong Xing

University of Massachusetts Dartmouth

Publications: 12

Mauro Conti

Mauro Conti

University of Padua

Publications: 11

Stefan Katzenbeisser

Stefan Katzenbeisser

University of Passau

Publications: 11

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 11

Kui Ren

Kui Ren

Zhejiang University

Publications: 10

William Enck

William Enck

North Carolina State University

Publications: 10

Something went wrong. Please try again later.