Ryan D. Riley, Ph.D. - Publications

Affiliations: 
2009 Computer Sciences Purdue University, West Lafayette, IN, United States 
Area:
Computer Science

8 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Rachid MH, Riley R, Malluhi QM. Enclave-Based Oblivious RAM Using Intel’s SGX Computers & Security. 91: 101711. DOI: 10.1016/J.Cose.2019.101711  0.415
2018 AlSabah M, Oligeri G, Riley R. Your culture is in your password: An analysis of a demographically-diverse password dataset Computers & Security. 77: 427-441. DOI: 10.1016/J.Cose.2018.03.014  0.305
2017 Alam S, Qu Z, Riley R, Chen Y, Rastogi V. DroidNative: Automating and optimizing detection of Android native code malware variants Computers & Security. 65: 230-246. DOI: 10.1016/J.Cose.2016.11.011  0.489
2016 Evtyushkin D, Elwell J, Ozsoy M, Ponomarev DV, Ghazaleh NA, Riley R. Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications Ieee Transactions On Dependable and Secure Computing. 15: 437-451. DOI: 10.1109/Tdsc.2016.2596287  0.378
2015 Elwell J, Riley R, Abu-Ghazaleh N, Ponomarev D, Cervesato I. Rethinking memory permissions for protection against cross-layer attacks Acm Transactions On Architecture and Code Optimization. 12. DOI: 10.1145/2842621  0.39
2014 Rhee J, Riley R, Lin Z, Jiang X, Xu D. Data-Centric OS Kernel Malware Characterization Ieee Transactions On Information Forensics and Security. 9: 72-87. DOI: 10.1109/Tifs.2013.2291964  0.531
2013 Riley R. A framework for prototyping and testing data-only rootkit attacks Computers & Security. 37: 62-71. DOI: 10.1016/J.Cose.2013.04.006  0.444
2010 Riley R, Jiang X, Xu D. An Architectural Approach to Preventing Code Injection Attacks Ieee Transactions On Dependable and Secure Computing. 7: 351-365. DOI: 10.1109/Tdsc.2010.1  0.554
Show low-probability matches.