What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Bradley Reaves
Google Scholar
32
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Characterizing Robocalls with Multiple Vantage Points.
Sathvik Prasad
Aleksandr Nahapetyan
Bradley Reaves
2024
conf/ccs
Jäger: Automated Telephone Call Traceback.
David Adei
Varun Madathil
Sathvik Prasad
Bradley Reaves
Alessandra Scafuro
2024
conf/sp
On SMS Phishing Tactics and Infrastructure.
Aleksandr Nahapetyan
Sathvik Prasad
Kevin Childs
Adam Oest
Yeganeh Ladwig
Alexandros Kapravelos
Bradley Reaves
2024
conf/asiaccs
VFCFinder: Pairing Security Advisories and Patches.
Trevor Dunlap
Elizabeth Lin
William Enck
Bradley Reaves
2023
conf/uss
Diving into Robocall Content with SnorCall.
Sathvik Prasad
Trevor Dunlap
Alexander J. Ross
Bradley Reaves
2023
conf/uss
ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions.
Siddharth Muralee
Igibek Koishybayev
Aleksandr Nahapetyan
Greg Tystahl
Bradley Reaves
Antonio Bianchi
William Enck
Alexandros Kapravelos
Aravind Machiry
2023
conf/sp
Towards Simultaneous Attacks on Multiple Cellular Networks.
Alexander J. Ross
Bradley Reaves
2023
conf/soups
Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice.
Lorenzo Neil
Harshini Sri Ramulu
Yasemin Acar
Bradley Reaves
2023
conf/eurosp
Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis.
Trevor Dunlap
Seaver Thorn
William Enck
Bradley Reaves
2022
conf/uss
Characterizing the Security of Github CI Workflows.
Igibek Koishybayev
Aleksandr Nahapetyan
Raima Zachariah
Siddharth Muralee
Bradley Reaves
Alexandros Kapravelos
Aravind Machiry
2021
conf/soups
Investigating Web Service Account Remediation Advice.
Lorenzo Neil
Elijah Robert Bouma-Sims
Evan Lafontaine
Yasemin Acar
Bradley Reaves
2021
conf/wisec
Anonymous device authorization for cellular networks.
Abida Haque
Varun Madathil
Bradley Reaves
Alessandra Scafuro
2020
conf/uss
Cardpliance: PCI DSS Compliance of Android Applications.
Samin Yaseer Mahmud
Akhil Acharya
Benjamin Andow
William Enck
Bradley Reaves
2020
conf/uss
Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis.
Sathvik Prasad
Elijah Robert Bouma-Sims
Athishay Kiran Mylappan
Bradley Reaves
2020
conf/uss
Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck.
Benjamin Andow
Samin Yaseer Mahmud
Justin Whitaker
William Enck
Bradley Reaves
Kapil Singh
Serge Egelman
2019
conf/uss
PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play.
Benjamin Andow
Samin Yaseer Mahmud
Wenyu Wang
Justin Whitaker
William Enck
Bradley Reaves
Kapil Singh
Tao Xie
2019
conf/ndss
How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories.
Michael Meli
Matthew R. McNiece
Bradley Reaves
2019
conf/wisec
HomeSnitch: behavior transparency and control for smart home IoT devices.
T. J. OConnor
Reham Mohamed
Markus Miettinen
William Enck
Bradley Reaves
Ahmad-Reza Sadeghi
2019
conf/wisec
Hestia: simple least privilege network policies for smart homes.
Sanket Goutam
William Enck
Bradley Reaves
2019
conf/wisec
Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things.
T. J. OConnor
William Enck
Bradley Reaves
2018
conf/sp
Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding.
Christian Peeters
Hadi Abdullah
Nolen Scaife
Jasmine D. Bowers
Patrick Traynor
Bradley Reaves
Kevin R. B. Butler
2018
conf/acsac
A Large Scale Investigation of Obfuscation Use in Google Play.
Dominik Wermke
Nicolas Huaman
Yasemin Acar
Bradley Reaves
Patrick Traynor
Sascha Fahl
2017
journals/popets
Phonion: Practical Protection of Metadata in Telephony Networks.
Stephan Heuser
Bradley Reaves
Praveen Kumar Pendyala
Henry Carter
Alexandra Dmitrienko
William Enck
Negar Kiyavash
Ahmad-Reza Sadeghi
Patrick Traynor
2017
conf/uss
AuthentiCall: Efficient Identity and Content Authentication for Phone Calls.
Bradley Reaves
Logan Blue
Hadi Abdullah
Luis Vargas
Patrick Traynor
Thomas Shrimpton
2017
conf/soups
Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services.
Jasmine D. Bowers
Bradley Reaves
Imani N. Sherman
Patrick Traynor
Kevin R. B. Butler
2016
conf/uss
AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels.
Bradley Reaves
Logan Blue
Patrick Traynor
2016
conf/sp
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways.
Bradley Reaves
Nolen Scaife
Dave Tian
Logan Blue
Patrick Traynor
Kevin R. B. Butler
2016
conf/wisec
Detecting SMS Spam in the Age of Legitimate Bulk Messaging.
Bradley Reaves
Logan Blue
Dave Tian
Patrick Traynor
Kevin R. B. Butler
2015
conf/uss
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge.
Bradley Reaves
Ethan Shernan
Adam Bates
Henry Carter
Patrick Traynor
2015
conf/uss
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World.
Bradley Reaves
Nolen Scaife
Adam Bates
Patrick Traynor
Kevin R. B. Butler
2013
conf/ndss
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
Charles Lever
Manos Antonakakis
Bradley Reaves
Patrick Traynor
Wenke Lee
2013
conf/wisec
MAST: triage for market-scale mobile malware analysis.
Saurabh Chakradeo
Bradley Reaves
Patrick Traynor
William Enck
Coauthors
Abida Haque
(1)
Adam Bates
(2)
Adam Oest
(1)
Ahmad-Reza Sadeghi
(2)
Akhil Acharya
(1)
Aleksandr Nahapetyan
(4)
Alessandra Scafuro
(2)
Alexander J. Ross
(2)
Alexandra Dmitrienko
(1)
Alexandros Kapravelos
(3)
Antonio Bianchi
(1)
Aravind Machiry
(2)
Athishay Kiran Mylappan
(1)
Benjamin Andow
(3)
Bradley Reaves
(32)
Charles Lever
(1)
Christian Peeters
(1)
Dave Tian
(2)
David Adei
(1)
Dominik Wermke
(1)
Elijah Robert Bouma-Sims
(2)
Elizabeth Lin
(1)
Ethan Shernan
(1)
Evan Lafontaine
(1)
Greg Tystahl
(1)
Hadi Abdullah
(2)
Harshini Sri Ramulu
(1)
Henry Carter
(2)
Igibek Koishybayev
(2)
Imani N. Sherman
(1)
Jasmine D. Bowers
(2)
Justin Whitaker
(2)
Kapil Singh
(2)
Kevin Childs
(1)
Kevin R. B. Butler
(5)
Logan Blue
(4)
Lorenzo Neil
(2)
Luis Vargas
(1)
Manos Antonakakis
(1)
Markus Miettinen
(1)
Matthew R. McNiece
(1)
Michael Meli
(1)
Negar Kiyavash
(1)
Nicolas Huaman
(1)
Nolen Scaife
(3)
Patrick Traynor
(12)
Praveen Kumar Pendyala
(1)
Raima Zachariah
(1)
Reham Mohamed
(1)
Samin Yaseer Mahmud
(3)
Sanket Goutam
(1)
Sascha Fahl
(1)
Sathvik Prasad
(5)
Saurabh Chakradeo
(1)
Seaver Thorn
(1)
Serge Egelman
(1)
Siddharth Muralee
(2)
Stephan Heuser
(1)
T. J. OConnor
(2)
Tao Xie
(1)
Thomas Shrimpton
(1)
Trevor Dunlap
(3)
Varun Madathil
(2)
Wenke Lee
(1)
Wenyu Wang
(1)
William Enck
(11)
Yasemin Acar
(3)
Yeganeh Ladwig
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to