Author image not provided
 Ryan D Riley

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article9.41
Citation Count160
Publication count17
Publication years2007-2017
Available for download5
Average downloads per article357.80
Downloads (cumulative)1,789
Downloads (12 Months)297
Downloads (6 Weeks)23
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


17 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 17 of 17
Sort by:

1 published by ACM
April 2017 ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 10,   Downloads (12 Months): 123,   Downloads (Overall): 123

Full text available: PDFPDF
Recent work has investigated the use of hardware performance counters (HPCs) for the detection of malware running on a system. These works gather traces of HPCs for a variety of applications (both malicious and non-malicious) and then apply machine learning to train a detector to distinguish between benign applications and ...
Keywords: rootkits, intrusion detection, machine learning, hardware performance counters

2
March 2017 Computers and Security: Volume 65 Issue C, March 2017
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 0

According to the Symantec and F-Secure threat reports, mobile malware development in 2013 and 2014 has continued to focus almost exclusively (~99%) on the Android platform. Malware writers are applying stealthy mutations (obfuscations) to create malware variants, thwarting detection by signature-based detectors. In addition, the plethora of more sophisticated detectors ...
Keywords: Android native code, Malware variant detection, Data mining, Control flow analysis, Malware analysis

3 published by ACM
December 2015 ACM Transactions on Architecture and Code Optimization (TACO): Volume 12 Issue 4, January 2016
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 5,   Downloads (12 Months): 70,   Downloads (Overall): 192

Full text available: PDFPDF
The inclusive permissions structure (e.g., the Intel ring model) of modern commodity CPUs provides privileged system software layers with arbitrary permissions to access and modify client processes, allowing them to manage these clients and the system resources efficiently. Unfortunately, these inclusive permissions allow a compromised high-privileged software layer to perform ...
Keywords: security, system software, Architecture

4
March 2015 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 79 Issue C, March 2015
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 0

In this work, we realize the binary consensus algorithm for use in wireless sensor networks. Binary consensus is used to allow a collection of distributed entities to reach consensus regarding the answer to a binary question and the final decision is based on the majority opinion. Binary consensus can play ...
Keywords: Binary consensus, Wireless sensor networks, TinyOS

5
December 2014 MICRO-47: Proceedings of the 47th Annual IEEE/ACM International Symposium on Microarchitecture
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 14
Downloads (6 Weeks): 6,   Downloads (12 Months): 43,   Downloads (Overall): 135

Full text available: PDFPDF
We consider the problem of how to provide an execution environment where the application's secrets are safe even in the presence of malicious system software layers. We propose Iso-X --- a flexible, fine-grained hardware-supported framework that provides isolation for security-critical pieces of an application such that they can execute securely ...
Keywords: isolated execution, hardware security

6
January 2014 IEEE Transactions on Information Forensics and Security: Volume 9 Issue 1, January 2014
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

Traditional malware detection and analysis approaches have been focusing on code-centric aspects of malicious programs, such as detection of the injection of malicious code or matching malicious code sequences. However, modern malware has been employing advanced strategies, such as reusing legitimate code or obfuscating malware code to circumvent the detection. ...

7
September 2013 Computers and Security: Volume 37, September, 2013
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 1

Kernel rootkits-attacks which modify a running operating system kernel in order to hide an attacker's presence-are significant threats. Recent advances in rootkit defense technology will force rootkit threats to rely on only modifying kernel data structures without injecting and executing any new code; however these data-only kernel rootkit attacks are ...
Keywords: Data attacks, Rootkits, Security, Malware, Operating systems

8
April 2011 CERIAS '11: Proceedings of the 12th Annual Information Security Symposium
Publisher: CERIAS - Purdue University
Bibliometrics:
Citation Count: 0

Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approaches use kernel memory mapping to identify dynamic kernel objects and check kernel integrity. The snapshot-based memory maps generated by these approaches are ...

9
October 2010 IEEE Transactions on Dependable and Secure Computing: Volume 7 Issue 4, October 2010
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 2

Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the execute-disable bit and PaX have been useful in limiting the attacks; however, they enforce program layout restrictions and can oftentimes still be circumvented by a determined attacker. We propose a change ...
Keywords: Code injection, secure memory architecture., Code injection, secure memory architecture.

10
September 2010 RAID'10: Proceedings of the 13th international conference on Recent advances in intrusion detection
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 10

Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approaches use kernel memory mapping to identify dynamic kernel objects and check kernel integrity. The snapshot-based memory maps generated by these approaches are ...
Keywords: kernel memory mapping, virtualization, kernel malware analysis

11 published by ACM
August 2010 SIGCOMM '10: Proceedings of the ACM SIGCOMM 2010 conference
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 1,   Downloads (12 Months): 26,   Downloads (Overall): 243

Full text available: PDFPDF
SideJacking occurs when an attacker intercepts a session cookie and uses it to impersonate a user and gain unauthorized access to a web-based service. To prevent SideJacking, a server should enable HTTPS and configure all session cookies to only be transmitted over a secure link. Many websites do not do ...
Keywords: web browsers, https, sidejacking
Also published in:
August 2010  ACM SIGCOMM Computer Communication Review - SIGCOMM '10: Volume 40 Issue 4, October 2010

12
June 2009 DIMVA '09: Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 17

This paper introduces a new software polymorphism technique that randomizes program data structure layout. This technique will generate different data structure layouts for a program and thus diversify the binary code compiled from the same program source code. This technique can mitigate attacks (e.g., kernel rootkit attacks) that require knowledge ...

13 published by ACM
April 2009 EuroSys '09: Proceedings of the 4th ACM European conference on Computer systems
Publisher: ACM
Bibliometrics:
Citation Count: 28
Downloads (6 Weeks): 1,   Downloads (12 Months): 35,   Downloads (Overall): 1,096

Full text available: PDFPDF
Kernel rootkits, malicious software designed to compromise a running operating system kernel, are difficult to analyze and profile due to their elusive nature, the variety and complexity of their behavior, and the privilege level at which they run. However, a comprehensive kernel rootkit profile that reveals key aspects of the ...
Keywords: kernel rootkit, malware, profiling

14
March 2009 CERIAS '09: Proceedings of the 10th Annual Information Security Symposium
Publisher: CERIAS - Purdue University
Bibliometrics:
Citation Count: 0

We will discuss a new software polymorphism technique that randomizes the program data structure layout. This technique will generate different layouts for program data structure definition and diversify the software that is compiled from the same suite of program source code. It can thwart the data structure-based program signature generation ...

15
January 2009
Bibliometrics:
Citation Count: 0

Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the execute-disable bit have been useful in limiting the attacks, however they enforce program layout restrictions and can often still be circumvented by a determined attacker. In this dissertation, we ...

16
September 2008 RAID '08: Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 79

Kernel rootkits pose a significant threat to computer systems as they run at the highest privilege level and have unrestricted access to the resources of their victims. Many current efforts in kernel rootkit defense focus on the <em>detection</em>of kernel rootkits --- after a rootkit attack has taken place, while the ...

17
June 2007 DSN '07: Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the attacks, however they enforce program layout restrictions and can often times still be circumvented by a determined attacker. We propose a change ...
Keywords: Code Injection, Secure Memory Architecture



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us