Cryptolock (and drop it): stopping ransomware attacks on user data N Scaife, H Carter, P Traynor, KRB Butler 2016 IEEE 36th international conference on distributed computing systems …, 2016 | 672 | 2016 |
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017 | 179 | 2017 |
* droid: Assessment and evaluation of android application analysis tools B Reaves, J Bowers, SA Gorski III, O Anise, R Bobhate, R Cho, H Das, ... ACM Computing Surveys (CSUR) 49 (3), 1-30, 2016 | 74 | 2016 |
Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways B Reaves, N Scaife, D Tian, L Blue, P Traynor, KRB Butler 2016 IEEE Symposium on Security and Privacy (SP), 339-356, 2016 | 74 | 2016 |
SoK:" Plug & Pray" today–understanding USB insecurity in versions 1 through C J Tian, N Scaife, D Kumar, M Bailey, A Bates, K Butler 2018 IEEE Symposium on Security and Privacy (SP), 1032-1047, 2018 | 63 | 2018 |
Making {USB} great again with {USBFILTER} DJ Tian, N Scaife, A Bates, K Butler, P Traynor 25th USENIX Security Symposium (USENIX Security 16), 415-430, 2016 | 62 | 2016 |
Fear the reaper: Characterization and fast detection of card skimmers N Scaife, C Peeters, P Traynor 27th USENIX Security Symposium (USENIX Security 18), 1-14, 2018 | 47 | 2018 |
Sonar: Detecting SS7 redirection attacks with audio-based distance bounding C Peeters, H Abdullah, N Scaife, J Bowers, P Traynor, B Reaves, K Butler 2018 IEEE Symposium on Security and Privacy (SP), 567-582, 2018 | 31 | 2018 |
Making sense of the ransomware mess (and planning a sensible path forward) N Scaife, P Traynor, K Butler IEEE Potentials 36 (6), 28-31, 2017 | 25 | 2017 |
Arnav Bhartiya, Patrick Traynor, and Kevin RB Butler. 2017. Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications B Reaves, J Bowers, N Scaife, A Bates ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017 | 25 | 2017 |
Malware detection via data transformation monitoring WN Scaife, PG Traynor, H Carter, K Butler US Patent 10,685,114, 2020 | 22 | 2020 |
OnionDNS: A seizure-resistant top-level domain N Scaife, H Carter, L Lidsky, RL Jones, P Traynor International Journal of Information Security 17, 645-660, 2018 | 19 | 2018 |
Characterizing the security of the SMS ecosystem with public gateways B Reaves, L Vargas, N Scaife, D Tian, L Blue, P Traynor, KRB Butler ACM Transactions on Privacy and Security (TOPS) 22 (1), 1-31, 2018 | 17 | 2018 |
The cards aren't alright: Detecting counterfeit gift cards using encoding jitter N Scaife, C Peeters, C Velez, H Zhao, P Traynor, D Arnold 2018 IEEE Symposium on Security and Privacy (SP), 1063-1076, 2018 | 15 | 2018 |
Kiss from a rogue: Evaluating detectability of pay-at-the-pump card skimmers N Scaife, J Bowers, C Peeters, G Hernandez, IN Sherman, P Traynor, ... 2019 IEEE Symposium on Security and Privacy (SP), 1000-1014, 2019 | 14 | 2019 |
Payment card overlay skimmer detection WN Scaife, PG Traynor, C Peeters US Patent 10,496,914, 2019 | 10 | 2019 |
Credit card fraud is a computer security problem ST King, N Scaife, P Traynor, Z Abi Din, C Peeters, H Venugopala IEEE Security & Privacy 19 (2), 65-69, 2021 | 8 | 2021 |
Detecting counterfeit magnetic stripe cards using encoding jitter PG Traynor, DP Arnold, WN Scaife, C Peeters, CV Cuervo US Patent 10,803,261, 2020 | 8 | 2020 |
Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System. L Vargas, L Blue, V Frost, C Patton, N Scaife, KRB Butler, P Traynor NDSS, 2019 | 8 | 2019 |
Prognosis negative: Evaluating real-time behavioral ransomware detectors A Gupta, A Prakash, N Scaife 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 353-368, 2021 | 5 | 2021 |