Publications

  1. Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Abdulrahman Alkhelaifi, and Kevin Butler. Securing SSL Certificate Verification through Dynamic Linking. 21st ACM Conference on Computer and Communications Security (CCS’14), Scottsdale, AZ, USA, November 2014.
    (acceptance rate=19.5%)
  2. Jing (Dave) Tian, Kevin Butler, Patrick McDaniel, and Padma Krishnaswamy. Securing ARP from the Ground Up. 5th ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA, March 2015.
    (acceptance rate=33.3%)
  3. Ethan Shernan, Henry Carter, Dave Tian, Patrick Traynor, and Kevin Butler. More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations. Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), Milan, Italy, July 2015.
    (acceptance rate=22.7%)
  4. Adam Bates, Dave Tian, Kevin Butler, and Thomas Moyer. Trustworthy Whole-System Provenance for the Linux Kernel. 24th USENIX Security Symposium (Security’15), Washington, DC, USA, August 2015.
    (acceptance rate=15.7%)
  5. Dave (Jing) Tian, Adam Bates, and Kevin Butler. Defending Against Malicious USB Firmware with GoodUSB. 31st Annual Computer Security Applications Conference (ACSAC 2015), Los Angeles, CA, USA, December 2015.
    (acceptance rate=24.3%)
  6. Bradley Reaves, Nolen Scaife, Dave Tian, Logan Blue, Patrick Traynor, and Kevin Butler. Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways. 2016 IEEE Symposium on Security and Privacy (Oakland’16), San Jose, CA, USA, May 2016.
    (acceptance rate=13.3%)
  7. Bradley Reaves, Logan Blue, Dave Tian, Patrick Traynor, and Kevin Butler. Detecting SMS Spam in the Age of Legitimate Bulk Messaging. 9th ACM Security Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’16), Darmstadt, Germany, July 2016.
    (acceptance rate=35.0%)
  8. Dave (Jing) Tian, Nolen Scaife, Adam Bates, Kevin Butler, and Patrick Traynor. Making USB Great Again with USBFILTER25th USENIX Security Symposium (Security’16), Austin, TX, USA, August 2016.
    (acceptance rate=15.5%)
  9. Dave (Jing) Tian, Adam Bates, Kevin Butler, and Raju Rangaswami. ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices23rd ACM Conference on Computer and Communications Security (CCS’16), Hofburg Palace, Vienna, Austria, October 2016.
    (acceptance rate=16.5%)
  10. Sriharsha Etigowni, Dave Tian, Grant Hernandez, Kevin Butler, and Saman Zonouz. CPAC: Securing Critical Infrastructure with Cyber-Physical Access Control32nd Annual Computer Security Applications Conference (ACSAC 2016), Los Angeles, CA, USA, December 2016.
    (acceptance rate=22.8%)
  11. Adam Bates, Dave (Jing) Tian, Grant Hernandez, Thomas Moyer, Kevin R. B. Butler, and Trent Jaeger. Taming the Costs of Trustworthy Provenance through Policy ReductionACM Transactions on Internet Technology, March 2017.
    (acceptance rate=journal)
  12. Dave (Jing) Tian, Kevin R. B. Butler, Joseph I. Choi, Patrick D. McDaniel, and Padma Krishnaswamy. Securing ARP/NDP From the Ground Up. IEEE Transactions on Information Forensics and Security, April 2017.
    (acceptance rate=journal)
  13. Grant Hernandez, Farhaan Fowze, Dave (Jing) Tian, Tuba Yavuz, and Kevin Butler. FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution. 24th ACM Conference on Computer and Communications Security (CCS’17), Dallas, TX, USA October 2017. 
    (acceptance rate=18.1%)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s