ÆÈ·Î¿ì
Ryan Riley
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
R Riley, X Jiang, D Xu
Recent Advances in Intrusion Detection, 1-20, 2008
4812008
BranchScope: A New Side-Channel Attack on Directional Branch Predictor
D Evtyushkin, R Riley, NCSE Abu-Ghazaleh, D Ponomarev
Proceedings of the Twenty-Third International Conference on Architectural ¡¦, 2018
2712018
Multi-aspect profiling of kernel rootkit behavior
R Riley, X Jiang, D Xu
Proceedings of the 4th ACM European conference on Computer systems, 47-60, 2009
1412009
Defeating dynamic data kernel rootkit attacks via vmm-based guest-transparent monitoring
J Rhee, R Riley, D Xu, X Jiang
Availability, Reliability and Security, 2009. ARES'09. International ¡¦, 2009
1222009
Iso-x: A flexible architecture for hardware-managed isolated execution
D Evtyushkin, J Elwell, M Ozsoy, D Ponomarev, NA Ghazaleh, R Riley
Proceedings of the 47th Annual IEEE/ACM International Symposium on ¡¦, 2014
1142014
On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters
B Singh, D Evtyushkin, J Elwell, R Riley, I Cervesato
Proceedings of the 2017 ACM on Asia Conference on Computer and ¡¦, 2017
1092017
DroidNative: automating and optimizing detection of android native code malware variants
S Alam, Z Qu, R Riley, Y Chen, V Rastogi
Computers & Security, 2016
1002016
An architectural approach to preventing code injection attacks
R Riley, X Jiang, D Xu
IEEE Transactions on Dependable and Secure Computing 7 (4), 351-365, 2010
832010
An architectural approach to preventing code injection attacks
R Riley, X Jiang, D Xu
IEEE/IFIP International Conference on Dependable Systems and Networks, 30-40, 2007
832007
Detecting Hidden Attacks through the Mobile App-Web Interfaces
V Rastogi, R Shao, Y Chen, X Pan, S Zou, R Riley
2016 Network and Distributed System Security Symposium (NDSS), 2016
79*2016
Polymorphing software by randomizing data structure layout
Z Lin, RD Riley, D Xu
International Conference on Detection of Intrusions and Malware, and ¡¦, 2009
772009
Kernel malware analysis with un-tampered and temporal views of dynamic kernel memory
J Rhee, R Riley, D Xu, X Jiang
International Workshop on Recent Advances in Intrusion Detection, 178-197, 2010
722010
Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset
M AlSabah, G Oligeri, R Riley
Computers & Security, 2018
412018
Data-Centric OS Kernel Malware Characterization
J Rhee, R Riley, Z Lin, X Jiang, D Xu
IEEE Transactions on Information Forensics and Security 9 (1), 72-87, 2014
342014
Dydroid: Measuring dynamic code loading and its security implications in android applications
Z Qu, S Alam, Y Chen, X Zhou, W Hong, R Riley
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems ¡¦, 2017
282017
Distributed algorithms in wireless sensor networks: An approach for applying binary consensus in a real testbed
N Al-Nakhala, R Riley, T Elfouly
Computer Networks 79, 30-38, 2015
242015
A Non-Inclusive Memory Permissions Architecture for Protection Against Cross-Layer Attacks
J Elwell, R Riley, N Abu-Ghazaleh, D Ponomarev
IEEE 20th International Symposium on High Performance Computer Architecture ¡¦, 2014
192014
Understanding in-app ads and detecting hidden attacks through the mobile app-web interface
R Shao, V Rastogi, Y Chen, X Pan, G Guo, S Zou, R Riley
IEEE Transactions on Mobile Computing 17 (11), 2675-2688, 2018
182018
Flexible hardware-managed isolated execution: Architecture, software support and applications
D Evtyushkin, J Elwell, M Ozsoy, DV Ponomarev, NA Ghazaleh, R Riley
IEEE Transactions on Dependable and Secure Computing, 2016
182016
Empowering users against sidejacking attacks
RD Riley, NM Ali, KS Al-Senaidi, AL Al-Kuwari
ACM SIGCOMM Computer Communication Review 40 (4), 435-436, 2010
132010
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20