Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing R Riley, X Jiang, D Xu Recent Advances in Intrusion Detection, 1-20, 2008 | 489 | 2008 |
BranchScope: A New Side-Channel Attack on Directional Branch Predictor D Evtyushkin, R Riley, NCSE Abu-Ghazaleh, D Ponomarev Proceedings of the Twenty-Third International Conference on Architectural …, 2018 | 356 | 2018 |
On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters B Singh, D Evtyushkin, J Elwell, R Riley, I Cervesato Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 150 | 2017 |
Multi-aspect profiling of kernel rootkit behavior R Riley, X Jiang, D Xu Proceedings of the 4th ACM European conference on Computer systems, 47-60, 2009 | 146 | 2009 |
Iso-x: A flexible architecture for hardware-managed isolated execution D Evtyushkin, J Elwell, M Ozsoy, D Ponomarev, NA Ghazaleh, R Riley Proceedings of the 47th Annual IEEE/ACM International Symposium on …, 2014 | 127 | 2014 |
Defeating dynamic data kernel rootkit attacks via vmm-based guest-transparent monitoring J Rhee, R Riley, D Xu, X Jiang Availability, Reliability and Security, 2009. ARES'09. International …, 2009 | 121 | 2009 |
DroidNative: automating and optimizing detection of android native code malware variants S Alam, Z Qu, R Riley, Y Chen, V Rastogi Computers & Security, 2016 | 116 | 2016 |
Detecting Hidden Attacks through the Mobile App-Web Interfaces V Rastogi, R Shao, Y Chen, X Pan, S Zou, R Riley 2016 Network and Distributed System Security Symposium (NDSS), 2016 | 91* | 2016 |
An architectural approach to preventing code injection attacks R Riley, X Jiang, D Xu IEEE Transactions on Dependable and Secure Computing 7 (4), 351-365, 2010 | 89 | 2010 |
An architectural approach to preventing code injection attacks R Riley, X Jiang, D Xu IEEE/IFIP International Conference on Dependable Systems and Networks, 30-40, 2007 | 89 | 2007 |
Polymorphing software by randomizing data structure layout Z Lin, RD Riley, D Xu International Conference on Detection of Intrusions and Malware, and …, 2009 | 83 | 2009 |
Kernel malware analysis with un-tampered and temporal views of dynamic kernel memory J Rhee, R Riley, D Xu, X Jiang International Workshop on Recent Advances in Intrusion Detection, 178-197, 2010 | 76 | 2010 |
Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset M AlSabah, G Oligeri, R Riley Computers & Security, 2018 | 54 | 2018 |
Dydroid: Measuring dynamic code loading and its security implications in android applications Z Qu, S Alam, Y Chen, X Zhou, W Hong, R Riley 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 38 | 2017 |
Data-Centric OS Kernel Malware Characterization J Rhee, R Riley, Z Lin, X Jiang, D Xu IEEE Transactions on Information Forensics and Security 9 (1), 72-87, 2014 | 36 | 2014 |
Distributed algorithms in wireless sensor networks: An approach for applying binary consensus in a real testbed N Al-Nakhala, R Riley, T Elfouly Computer Networks 79, 30-38, 2015 | 26 | 2015 |
Understanding in-app ads and detecting hidden attacks through the mobile app-web interface R Shao, V Rastogi, Y Chen, X Pan, G Guo, S Zou, R Riley IEEE Transactions on Mobile Computing 17 (11), 2675-2688, 2018 | 22 | 2018 |
A Non-Inclusive Memory Permissions Architecture for Protection Against Cross-Layer Attacks J Elwell, R Riley, N Abu-Ghazaleh, D Ponomarev IEEE 20th International Symposium on High Performance Computer Architecture …, 2014 | 21 | 2014 |
Flexible hardware-managed isolated execution: Architecture, software support and applications D Evtyushkin, J Elwell, M Ozsoy, DV Ponomarev, NA Ghazaleh, R Riley IEEE Transactions on Dependable and Secure Computing, 2016 | 17 | 2016 |
Port or Shim? Stress Testing Application Performance on Intel SGX A Hasan, R Riley, D Ponomarev 2020 IEEE International Symposium on Workload Characterization (IISWC), 123-133, 2020 | 13 | 2020 |