D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 31 Citations 4,069 113 World Ranking 9897 National Ranking 4460

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer network

His main research concerns Computer security, Cloud computing, Computer network, Malware and Overhead. His Computer security research focuses on Android and how it connects with Data science. In the subject of general Cloud computing, his work in Hypervisor, Cloud computing security and Virtualization is often linked to Covert channel, thereby combining diverse domains of study.

His Computer network research incorporates themes from Data validation and The Internet. He interconnects False positive paradox, Intrusion detection system, Encryption and Extortion in the investigation of issues within Malware. As part of the same scientific family, Kevin R. B. Butler usually focuses on Overhead, concentrating on Data loss and intersecting with Software deployment, Metadata and Object.

His most cited work include:

  • A Survey of BGP Security Issues and Solutions (285 citations)
  • CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data (218 citations)
  • Trustworthy whole-system provenance for the Linux kernel (111 citations)

What are the main themes of his work throughout his whole career to date?

Computer security, Operating system, Computer network, The Internet and Embedded system are his primary areas of study. His research in Computer security intersects with topics in Software, Cloud computing and Internet privacy. His Cloud computing study combines topics in areas such as Virtual machine and Mobile device.

His Computer network research focuses on subjects like Adversary, which are linked to Public-key cryptography. Many of his research projects under The Internet are closely connected to Border Gateway Protocol with Border Gateway Protocol, tying the diverse disciplines of science together. His Embedded system research incorporates elements of Android, USB, Security token and Compiler.

He most often published in these fields:

  • Computer security (45.76%)
  • Operating system (16.10%)
  • Computer network (16.10%)

What were the highlights of his more recent work (between 2019-2021)?

  • Identification (4.24%)
  • Firmware (8.47%)
  • Adversarial machine learning (4.24%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in Identification, Firmware, Adversarial machine learning, Computer security and Application programming interface. His research integrates issues of Traffic analysis, Fuzz testing and Adaptation in his study of Identification. The various areas that Kevin R. B. Butler examines in his Firmware study include Wireless, Policy analysis and Android.

His Adversarial machine learning research includes themes of Tree traversal and Contextual image classification. The Authentication research Kevin R. B. Butler does as part of his general Computer security study is frequently linked to other disciplines of science, such as Containerization, therefore creating a link between diverse domains of science. The concepts of his Application programming interface study are interwoven with issues in Mixed reality, Human–computer interaction, Eye tracking and Gaze.

Between 2019 and 2021, his most popular works were:

  • BigMAC: Fine-Grained Policy Analysis of Android Firmware (4 citations)
  • A privacy-preserving approach to streaming eye-tracking data (1 citations)
  • Brittle Features of Device Authentication (0 citations)

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A Survey of BGP Security Issues and Solutions

K. Butler;T.R. Farley;P. McDaniel;J. Rexford.
Proceedings of the IEEE (2010)

499 Citations

CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data

Nolen Scaife;Henry Carter;Patrick Traynor;Kevin R. B. Butler.
international conference on distributed computing systems (2016)

407 Citations

Trustworthy whole-system provenance for the Linux kernel

Adam Bates;Dave Tian;Kevin R. B. Butler;Thomas Moyer.
usenix security symposium (2015)

196 Citations

Hi-Fi: collecting high-fidelity whole-system provenance

Devin J. Pohly;Stephen McLaughlin;Patrick McDaniel;Kevin Butler.
annual computer security applications conference (2012)

152 Citations

Detecting co-residency with active traffic analysis techniques

Adam Bates;Benjamin Mood;Joe Pletcher;Hannah Pruse.
cloud computing security workshop (2012)

139 Citations

Porscha: policy oriented secure content handling in Android

Machigar Ongtang;Kevin Butler;Patrick McDaniel.
annual computer security applications conference (2010)

139 Citations

PCF: a portable circuit format for scalable two-party secure computation

Ben Kreuter;Benjamin Mood;Abhi Shelat;Kevin Butler.
usenix security symposium (2013)

139 Citations

Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications

Bradley Reaves;Jasmine Bowers;Nolen Scaife;Adam Bates.
ACM Transactions on Privacy and Security (TOPS) (2017)

129 Citations

Secure outsourced garbled circuit evaluation for mobile devices

Henry Carter;Benjamin Mood;Patrick Traynor;Kevin R. B. Butler.
Journal of Computer Security (2016)

119 Citations

Secure outsourced garbled circuit evaluation for mobile devices

Henry Carter;Benjamin Mood;Patrick Traynor;Kevin Butler.
usenix security symposium (2013)

117 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Kevin R. B. Butler

Thomas Schneider

Thomas Schneider

Technical University of Darmstadt

Publications: 21

Patrick Traynor

Patrick Traynor

University of Florida

Publications: 21

Farinaz Koushanfar

Farinaz Koushanfar

University of California, San Diego

Publications: 18

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 18

Trent Jaeger

Trent Jaeger

Pennsylvania State University

Publications: 17

Margo Seltzer

Margo Seltzer

University of British Columbia

Publications: 17

Gregory Levitin

Gregory Levitin

Southwest Jiaotong University

Publications: 14

Patrick McDaniel

Patrick McDaniel

Pennsylvania State University

Publications: 14

Michael Schapira

Michael Schapira

Hebrew University of Jerusalem

Publications: 13

Liudong Xing

Liudong Xing

University of Massachusetts Dartmouth

Publications: 12

Mauro Conti

Mauro Conti

University of Padua

Publications: 11

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 11

Stefan Katzenbeisser

Stefan Katzenbeisser

University of Passau

Publications: 11

Edgar R. Weippl

Edgar R. Weippl

University of Vienna

Publications: 10

Kui Ren

Kui Ren

Zhejiang University

Publications: 10

William Enck

William Enck

North Carolina State University

Publications: 10

Trending Scientists

Christos D. Tarantilis

Christos D. Tarantilis

Athens University of Economics and Business

Sylvia Serfaty

Sylvia Serfaty

Courant Institute of Mathematical Sciences

James D. Plummer

James D. Plummer

Stanford University

Kam Y. Lau

Kam Y. Lau

University of California, Berkeley

Jinhua Li

Jinhua Li

Shanghai Jiao Tong University

Kazu Okumura

Kazu Okumura

Kogakuin University

David Parker

David Parker

Durham University

Claudia Lukas

Claudia Lukas

University of Copenhagen

William Lehman

William Lehman

Boston University

David R. Garrod

David R. Garrod

University of Manchester

Fabrice Cotton

Fabrice Cotton

University of Potsdam

Louis-Eric Trudeau

Louis-Eric Trudeau

University of Montreal

Mary Kay Floeter

Mary Kay Floeter

National Institutes of Health

Leah H. Somerville

Leah H. Somerville

Harvard University

Oliver H. Turnbull

Oliver H. Turnbull

Bangor University

Gerhard Hindricks

Gerhard Hindricks

Leipzig University

Something went wrong. Please try again later.