Ryan D. Riley, Ph.D. - Publications
Affiliations: | 2009 | Computer Sciences | Purdue University, West Lafayette, IN, United States |
Area:
Computer ScienceYear | Citation | Score | |||
---|---|---|---|---|---|
2020 | Rachid MH, Riley R, Malluhi QM. Enclave-Based Oblivious RAM Using Intel’s SGX Computers & Security. 91: 101711. DOI: 10.1016/J.Cose.2019.101711 | 0.415 | |||
2018 | AlSabah M, Oligeri G, Riley R. Your culture is in your password: An analysis of a demographically-diverse password dataset Computers & Security. 77: 427-441. DOI: 10.1016/J.Cose.2018.03.014 | 0.305 | |||
2017 | Alam S, Qu Z, Riley R, Chen Y, Rastogi V. DroidNative: Automating and optimizing detection of Android native code malware variants Computers & Security. 65: 230-246. DOI: 10.1016/J.Cose.2016.11.011 | 0.489 | |||
2016 | Evtyushkin D, Elwell J, Ozsoy M, Ponomarev DV, Ghazaleh NA, Riley R. Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications Ieee Transactions On Dependable and Secure Computing. 15: 437-451. DOI: 10.1109/Tdsc.2016.2596287 | 0.378 | |||
2015 | Elwell J, Riley R, Abu-Ghazaleh N, Ponomarev D, Cervesato I. Rethinking memory permissions for protection against cross-layer attacks Acm Transactions On Architecture and Code Optimization. 12. DOI: 10.1145/2842621 | 0.39 | |||
2014 | Rhee J, Riley R, Lin Z, Jiang X, Xu D. Data-Centric OS Kernel Malware Characterization Ieee Transactions On Information Forensics and Security. 9: 72-87. DOI: 10.1109/Tifs.2013.2291964 | 0.531 | |||
2013 | Riley R. A framework for prototyping and testing data-only rootkit attacks Computers & Security. 37: 62-71. DOI: 10.1016/J.Cose.2013.04.006 | 0.444 | |||
2010 | Riley R, Jiang X, Xu D. An Architectural Approach to Preventing Code Injection Attacks Ieee Transactions On Dependable and Secure Computing. 7: 351-365. DOI: 10.1109/Tdsc.2010.1 | 0.554 | |||
Show low-probability matches. |