Ryan D. Riley, Ph.D.
Affiliations: | 2009 | Computer Sciences | Purdue University, West Lafayette, IN, United States |
Area:
Computer ScienceGoogle:
"Ryan Riley"Parents
Sign in to add mentorDongyan Xu | grad student | 2009 | Purdue | |
(Architectural approaches for code injection defense at the user and kernel levels.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Rachid MH, Riley R, Malluhi QM. (2020) Enclave-Based Oblivious RAM Using Intel’s SGX Computers & Security. 91: 101711 |
AlSabah M, Oligeri G, Riley R. (2018) Your culture is in your password: An analysis of a demographically-diverse password dataset Computers & Security. 77: 427-441 |
Alam S, Qu Z, Riley R, et al. (2017) DroidNative: Automating and optimizing detection of Android native code malware variants Computers & Security. 65: 230-246 |
Evtyushkin D, Elwell J, Ozsoy M, et al. (2016) Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications Ieee Transactions On Dependable and Secure Computing. 15: 437-451 |
Elwell J, Riley R, Abu-Ghazaleh N, et al. (2015) Rethinking memory permissions for protection against cross-layer attacks Acm Transactions On Architecture and Code Optimization. 12 |
Rhee J, Riley R, Lin Z, et al. (2014) Data-Centric OS Kernel Malware Characterization Ieee Transactions On Information Forensics and Security. 9: 72-87 |
Riley R. (2013) A framework for prototyping and testing data-only rootkit attacks Computers & Security. 37: 62-71 |
Riley R, Jiang X, Xu D. (2010) An Architectural Approach to Preventing Code Injection Attacks Ieee Transactions On Dependable and Secure Computing. 7: 351-365 |