His main research concerns Computer security, Cloud computing, Computer network, Malware and Overhead. His Computer security research focuses on Android and how it connects with Data science. In the subject of general Cloud computing, his work in Hypervisor, Cloud computing security and Virtualization is often linked to Covert channel, thereby combining diverse domains of study.
His Computer network research incorporates themes from Data validation and The Internet. He interconnects False positive paradox, Intrusion detection system, Encryption and Extortion in the investigation of issues within Malware. As part of the same scientific family, Kevin R. B. Butler usually focuses on Overhead, concentrating on Data loss and intersecting with Software deployment, Metadata and Object.
Computer security, Operating system, Computer network, The Internet and Embedded system are his primary areas of study. His research in Computer security intersects with topics in Software, Cloud computing and Internet privacy. His Cloud computing study combines topics in areas such as Virtual machine and Mobile device.
His Computer network research focuses on subjects like Adversary, which are linked to Public-key cryptography. Many of his research projects under The Internet are closely connected to Border Gateway Protocol with Border Gateway Protocol, tying the diverse disciplines of science together. His Embedded system research incorporates elements of Android, USB, Security token and Compiler.
His scientific interests lie mostly in Identification, Firmware, Adversarial machine learning, Computer security and Application programming interface. His research integrates issues of Traffic analysis, Fuzz testing and Adaptation in his study of Identification. The various areas that Kevin R. B. Butler examines in his Firmware study include Wireless, Policy analysis and Android.
His Adversarial machine learning research includes themes of Tree traversal and Contextual image classification. The Authentication research Kevin R. B. Butler does as part of his general Computer security study is frequently linked to other disciplines of science, such as Containerization, therefore creating a link between diverse domains of science. The concepts of his Application programming interface study are interwoven with issues in Mixed reality, Human–computer interaction, Eye tracking and Gaze.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A Survey of BGP Security Issues and Solutions
K. Butler;T.R. Farley;P. McDaniel;J. Rexford.
Proceedings of the IEEE (2010)
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
Nolen Scaife;Henry Carter;Patrick Traynor;Kevin R. B. Butler.
international conference on distributed computing systems (2016)
Trustworthy whole-system provenance for the Linux kernel
Adam Bates;Dave Tian;Kevin R. B. Butler;Thomas Moyer.
usenix security symposium (2015)
Hi-Fi: collecting high-fidelity whole-system provenance
Devin J. Pohly;Stephen McLaughlin;Patrick McDaniel;Kevin Butler.
annual computer security applications conference (2012)
PCF: a portable circuit format for scalable two-party secure computation
Ben Kreuter;Benjamin Mood;Abhi Shelat;Kevin Butler.
usenix security symposium (2013)
Porscha: policy oriented secure content handling in Android
Machigar Ongtang;Kevin Butler;Patrick McDaniel.
annual computer security applications conference (2010)
Detecting co-residency with active traffic analysis techniques
Adam Bates;Benjamin Mood;Joe Pletcher;Hannah Pruse.
cloud computing security workshop (2012)
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications
Bradley Reaves;Jasmine Bowers;Nolen Scaife;Adam Bates.
ACM Transactions on Privacy and Security (TOPS) (2017)
Secure outsourced garbled circuit evaluation for mobile devices
Henry Carter;Benjamin Mood;Patrick Traynor;Kevin R. B. Butler.
Journal of Computer Security (2016)
Mo(bile) money, mo(bile) problems: analysis of branchless banking applications in the developing world
Bradley Reaves;Nolen Scaife;Adam Bates;Patrick Traynor.
usenix security symposium (2015)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: