Kevin Butler, William Enck, Patrick Traynor, Jennifer Plasterr,
and Patrick McDaniel.
Privacy Preserving Web-Based Email.Algorithms, Architectures and Information Systems Security,
Statistical Science and Interdisciplinary Research.
World Scientific Computing, November 2008.
Chris Moore, Catherine Gill, Nadya Bliss, Kevin Butler, Stephanie
Forrest, Dan Lopresti, Mary Lou Maher, Helena Mentis, Shashi
Shekhar, Amanda Stent, and Matthew Turk.
Concerning the
Responsible Use of AI in the US Criminal Justice System.Communications of the ACM,
68(9), pages 41–44, August 2025.
Cassidy Gibson, Patrick Traynor, and Kevin Butler.
Copycat Crimes: Characterizing Code Reuse in the Mobile Android
Stalkerware Ecosystem.
IEEE Security and Privacy,
23(4), pages 71–79, July/August 2025.
Kevin Butler, Kurt Hugenberg, Eakta Jain, Apu Kapadia, Tadayoshi
Kohno, Elissa M. Redmiles, Franziska Roesner, Mattea Sim, Patrick
Traynor, and Hanna Barakat.
Extending the Heilmeier Catechism to Evaluate Security &
Privacy Systems: Who is Left Out?
IEEE Security and Privacy,
23(3), pages 91–95, May/June 2025.
Ethan Wilson, Azim Ibragimov, Michael J. Proulx, Sai Deep Tetali,
Kevin Butler, and Eakta Jain.
Privacy-Preserving Gaze Data Streaming in Immersive Interactive
Virtual Reality: Robustness and User Experience.
IEEE Transactions on Visualization and Computer Graphics,
January 2024.
Selected for presentation at IEEE VR 2024 conference.
Weidong Zhu and Kevin Butler.
NASA: NVM-Assisted Secure Deletion for Flash Memory.
IEEE Transactions on Computer-Aided Design of Integrated
Circuits and Systems (TCAD),
July 2022 (early access).
Accepted for presentation at the International Conference on
Embedded Software (EMSOFT) 2022.
Brendan David-John, Diane Hosfelt, Kevin Butler, and Eakta Jain.
A Privacy-Preserving Approach
to Streaming Eye-Tracking Data.IEEE Transactions on Visualization and Computer Graphics,
27(5), pages 2555–2565, May 2021.
Best paper nominee at IEEE VR 2021.
Grant Hernandez, Dave (Jing) Tian, Farhaan Fowze, Tuba Yavuz,
Patrick Traynor, and Kevin Butler.
Toward
Automated Firmware Analysis in the IoT Era.IEEE Security and Privacy, 17(5), pages 38–46,
Sept/Oct 2019.
Dave (Jing) Tian, Kevin R. B. Butler, Joseph Choi, Patrick D.
McDaniel, and Padma Krishnaswamy.
Securing
ARP/NDP From the Ground Up.IEEE Transactions on Information Forensics and Security,
12(0), pp. 2131–2143, September 2017.
Bradley Reaves, Jasmine Bowers, Sigmund Albert Gorski III, Rahul
Bobate, Raymond Cho, Hiranava Sas, Sharique Hussain, Hamza
Karachiwala, Nolen Scaife, Byron Wright, Kevin Butler, William
Enck, and Patrick Traynor.
*droid: Assessment and Evaluation of
Android Application Analysis Tools.ACM Computing Surveys, 49(3), Article 55, November 2016.
Thomas Moyer, Kevin Butler, Joshua Schiffman, Patrick McDaniel,
and Trent Jaeger.
Scalable Web Content Attestation.IEEE Transactions on Computers,
61(5), pp. 686–699, May 2012.
Seaver Thorn, Nathaniel Bennett, Kevin Butler, Patrick Traynor, and
William Enck. ASN1spect: Uncovering ASN.1 Compiler-Generated
Vulnerabilities in Critical Infrastructure.
2026 ACM Secure Development Conference (SecDev’26),
Montreal, QC, Canada, July 2026.
Nathaniel Bennett, Tyler Tucker, Carson Stillman, William Enck,
Patrick Traynor, and Kevin Butler.
Fizzle: A Framework for Deterministic and Reproducible Network
Fuzzing.
47th IEEE Symposium on Security and Privacy (Oakland’26),
San Francisco, CA, USA, May 2026.
Seth Layton, Bernardo B. P. Medeiros, Kevin Butler, and Patrick
Traynor.
AI Wrote My Paper and All I Got Was This False Negative: Measuring
the Efficacy of Commercial AI Text Detectors.
47th IEEE Symposium on Security and Privacy (Oakland’26),
San Francisco, CA, USA, May 2026.
Weidong Zhu, Wenxuan Bao, Vincent Bindschaedler, Sara Rampazzi,
and Kevin Butler.
Enabling Plausible Deniability in Flash-based Storage through Data
Permutation.
Proceedings of the 2025 Annual Computer Security Applications
Conference (ACSAC 2025),
Honolulu, HI, USA, December 2025.
Carson Stillman, Jennifer Sheldon, Ian Garrett, Patrick Traynor,
Ryan Gerdes, Sara Rampazzi, and Kevin Butler.
EM-Flow: Advanced Electromagnetic Control Flow Verification for
Embedded Systems.
Proceedings of the 2025 Annual Computer Security Applications
Conference (ACSAC 2025),
Honolulu, HI, USA, December 2025.
Kevin Childs, Mollie Brewer, Spencer Thomas, Celeste Wilkins,
Jennifer A. Nichols, Kristy Elizabeth Boyer, and Kevin R. B.
Butler.
Mapping the Flow of Information from Continuous Wearables: Insights
from Elite Collegiate Athletes in the United States.
2025 ACM Conference on Human-Computer Interaction and Sports
(SportsHCI 2025),
Twente, The Netherlands, November 2025.
Weidong Zhu, Carson Stillman, Sara Rampazzi, and Kevin Butler.
Enabling Secure and Efficient Data Loss Prevention with a
Retention-aware Versioning SSD.
32nd ACM Conference on Computer and Communication Security
(CCS’25), Taipei, Taiwan, October 2025.
(Acceptance rate: 14.4%)
Cassidy Gibson, Daniel Olszewski, Natalie Grace Brigham, Anna
Crowder, Kevin R. B. Butler, Patrick Traynor, Elissa M. Redmiles,
and Tadayoshi Kohno.
Analyzing
the AI Nudification Application Ecosystem.34th USENIX Security Symposium (Security’25),
Seattle, WA, USA, August 2025.
(Acceptance rate: 17.1%)🏆 Internet Defense Prize Runner-Up🏆 Distinguished Paper Honorable Mention🏆 CSAW Social Impact Award
Daniel Olszewski, Allison Lu, Anna Crowder, Nathaniel Bennett, Seth
Layton, Sri Hrushikesh Varma Bhupathiraju, Tyler Tucker, Siddhant
Kalgutkar, Hunter Ver Helst, Carson Stillman, Kevin Butler, Sara
Rampazzi, and Patrick Traynor.
Reproducibility
in Applied Security Conferences: An 11-Year Review on Artifacts and
Evaluation Committees.2025 ACM Conference on Reproducibility and Replicability
(REP 2025),
Vancouver, BC, Canada, July 2025.
🏆 Best Paper Award
Anna Crowder, Allison Lu, Kevin Childs, Carson Stillman, Patrick
Traynor, and Kevin R. B. Butler.
Data to Infinity and Beyond: Examining Data Sharing and Usage
Practices in the Computer Security Community.
46th IEEE Symposium on Security and Privacy (Oakland’25),
San Francisco, CA, USA, May 2025.
(Acceptance rate: 14.8%)
Mollie Brewer, Kevin Childs, Spencer Thomas, Celeste Wilkins,
Kristy Elizabeth Boyer, Jennifer A. Nichols, Kevin R. B. Butler,
Garrett F. Beatty, and Daniel P. Ferris.
Coach,
Data Analyst, and Protector: Exploring Data Practices of Collegiate
Coaching Staff.2025 ACM CHI Conference on Human Factors in Computing Systems
(CHI’25),
Yokohama, Japan, April 2025.
(Acceptance rate: 24.9%)
Nathaniel Bennett, Weidong Zhu, Benjamin Simon, Ryon Kennedy,
William Enck, Patrick Traynor, and Kevin R. B. Butler.
RANsacked: A
Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core
Interfaces.31st ACM Conference on Computer and Communications Security
(CCS’24),
Salt Lake City, UT, USA, October 2024.
(Acceptance rate: 16.9%)
Kevin Warren, Tyler Tucker, Anna Crowder, Daniel Olszewski, Allison
Lu, Caroline Fedele, Magdalena Pasternak, Seth Layton, Kevin
Butler, Carrie Gates, and Patrick Traynor.
"Better Be Computer Or
I’m Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake
Detectors.31st ACM Conference on Computer and Communications Security
(CCS’24),
Salt Lake City, UT, USA, October 2024.
(Acceptance rate: 16.9%)🏆 Distinguished Paper Award
K. Virgil English, Nathaniel Bennett, Seaver Thorn, Kevin Butler,
William Enck, and Patrick Traynor.
Examining Cryptography
and Randomness Failures in Open-Source Cellular Cores.ACM Conference on Data and Application Security and Privacy
(CODASPY’24),
Porto, Portugal, June 2024.
(Acceptance rate: 21.3%)🏆 Best Paper Award
Christian Peeters, Tyler Tucker, Anushri Jain, Kevin Butler, and
Patrick Traynor.
LeopardSeal: Detecting
Call Interception via Audio Rogue Base Stations.21st ACM International Conference on Mobile Systems,
Applications, and Services (MobiSys’23),
Helsinki, Finland, June 2023.
(Acceptance rate: 20.7%)
Logan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis
Vargas, Jessica O’Dell, Kevin Butler, and Patrick Traynor.
Who Are You (I Really Wanna
Know)?31st USENIX Security Symposium (Security’22),
Boston, MA, USA, August 2022.
Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia,
Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor,
and Kevin Butler.
Analyzing the Monetization
Ecosystem of Stalkerware.22nd Privacy Enhancing Technologies Symposium (PETS 2022),
Sydney, Australia, July 2022.
Mounir Elbharabawy, Blas Kojusner, Mohammad Mannan, Kevin Butler,
Byron Williams, and Amr Youssef.
SAUSAGE: Security Analysis of
Unix Domain Socket Usage in Android.7th IEEE European Symposium on Security and Privacy
(Euro S&P’22),
Genoa, Italy, June 2022.
🏆 Best Paper Finalist
Kyungtae Kim, Taegyu Kim, Ertza Warriach, Byoungyoung Lee, Kevin
Butler, Antonio Bianchi, and Dave (Jing) Tian.
FuzzUSB: Hybrid Stateful
Fuzzing of USB Gadget Stacks.43rd IEEE Symposium on Security and Privacy (Oakland’22),
San Francisco, CA, USA, May 2022.
Grant Hernandez, Marius Muench, Dominik Maier, Alyssa Milburn,
Shinjo Park, Tobias Scharnowski, Tyler Tucker, Patrick Traynor, and
Kevin Butler.
FirmWire: Transparent Dynamic
Analysis for Cellular Baseband Firmware.2022 ISOC Network and Distributed System Security Symposium
(NDSS’22),
San Diego, CA, USA, April 2022.
(Acceptance rate: 16.2%)
Washington Garcia, Animesh Chhotaray, Joseph Choi, Suman Kalyan
Adara, Kevin Butler, and Somesh Jha.
Brittle Features of Device
Authentication.11th ACM Conference on Data and Application Security and Privacy
(CODASPY’21),
Virtual, April 2021.
Grant Hernandez, Dave (Jing) Tian, Anurag Vadav, Byron Williams,
and Kevin Butler.
BigMAC:
Fine-Grained Policy Analysis of Android Firmware.29th USENIX Security Symposium (USENIX Security’20),
Boston, MA, USA, August 2020.
(Acceptance rate: 16.1%)
Joseph Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton,
Benjamin Mood, Thomas Shrimpton, Patrick Traynor, and Kevin Butler.
A Hybrid Approach to Secure
Function Evaluation Using SGX.14th ACM ASIA Conference on Computer and Communications Security
(ASIACCS’19),
Auckland, New Zealand, July 2019.
(Acceptance rate: 17.0% for full papers)
Vanessa Frost, Dave (Jing) Tian, Christie Ruales, Patrick Traynor,
and Kevin Butler.
Examining DES-based Cipher Suite
Support within the TLS Ecosystem.14th ACM ASIA Conference on Computer and Communications Security
(ASIACCS’19),
Auckland, New Zealand, July 2019.
(Acceptance rate: 22.0%)
Dave (Jing) Tian, Grant Hernandez, Joseph Choi, Vanessa Frost,
Peter Johnson, and Kevin Butler.
LBM: A Security Framework for
Peripherals within the Linux Kernel.40th IEEE Symposium on Security and Privacy (Oakland’19),
San Francisco, CA, USA, May 2019.
(Acceptance rate: 12.0%)
Dave (Jing) Tian, Joseph Choi, Grant Hernandez, Patrick Traynor,
and Kevin Butler.
A Practical Intel SGX Setting for
Linux Containers in the Cloud.9th ACM Conference on Data and Application Security and Privacy
(CODASPY’19),
Dallas, TX, USA, March 2019.
(Acceptance rate: 23.5%)🏆 Distinguished Poster Award
Luis Vargas, Gyan Hazarika, Rachel Culpepper, Kevin Butler, Thomas
Shrimpton, Doug Szajda, and Patrick Traynor.
Mitigating Risk while Complying
with Data Retention Laws.25th ACM Conference on Computer and Communications Security
(CCS’18),
Toronto, ON, Canada, October 2018.
(Acceptance rate: 16.6%)
Adam Bates, Wajih Ul Hassan, Kevin Butler, Alin Dobra, Brad Reaves,
Patrick Cable, Thomas Moyer, and Nabil Schear.
Transparent Web Service Auditing via
Network Provenance Functions.26th World Wide Web Conference (WWW 2017),
Perth, Australia, April 2017.
(Acceptance rate: 17.0%)
Thomas Moyer, Patrick Cable, Karishma Chadha, Robert Cunningham,
Nabil Schear, Warren Smith, Adam Bates, Kevin Butler, Frank
Capobianco, and Trent Jaeger.
Leveraging Data Provenance to Enhance
Cyber Resilience.1st IEEE Cybersecurity Development Conference (SecDev 2016),
Boston, MA, USA, November 2016.
(Acceptance rate: 52.2%)
Dave (Jing) Tian, Nolen Scaife, Adam Bates, Kevin Butler, and
Patrick Traynor.
Making USB Great Again with
USBFILTER.25th USENIX Security Symposium (USENIX Security’16),
Austin, TX, USA, August 2016.
(Acceptance rate: 15.5%)
Bradley Reaves, Logan Blue, Dave Tian, Patrick Traynor, and Kevin
Butler.
Detecting SMS Spam in the Age of
Legitimate Bulk Messaging.9th ACM Conference on Security and Privacy in Wireless and
Mobile Networks (WiSec’16),
Darmstadt, Germany, July 2016.
(Acceptance rate: 35.0%)
Henry Carter, Benjamin Mood, Patrick Traynor, and Kevin Butler.
Outsourcing Secure Two-Party Computation
as a Black Box.14th International Conference on Cryptology and Network
Security (CANS 2015),
Marrakesh, Morocco, December 2015.
(Acceptance rate: 52.9%)
Jing (Dave) Tian, Adam Bates, and Kevin Butler.
Defending Against Malicious USB Firmware
with GoodUSB.31st Annual Computer Security Applications Conference
(ACSAC 2015),
Los Angeles, CA, USA, December 2015.
(Acceptance rate: 24.4%)
Jing (Dave) Tian, Kevin Butler, Patrick McDaniel, and Padma
Krishnaswamy.
Securing ARP from the Ground Up.5th ACM Conference on Data and Application Security and Privacy
(CODASPY 2015),
San Antonio, TX, USA, March 2015.
(Acceptance rate: 33.3%)
Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave
Tian, Abdulrahman Alkhelaifi, and Kevin Butler.
Securing SSL Certificate Verification
through Dynamic Linking.21st ACM Conference on Computer and Communications Security
(CCS’14),
Scottsdale, AZ, USA, November 2014.
(Acceptance rate: 19.5%)
Adam Bates, Ryan Leonard, Hannah Pruse, Daniel Lowd, and Kevin
Butler.
Leveraging USB to Establish Host Identity
Using Commodity Devices.21st ISOC Network and Distributed System Security Symposium
(NDSS’14),
San Diego, CA, USA, February 2014.
(Acceptance rate: 18.6%)
Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder,
Kevin Butler, and William Enck.
Abusing Cloud-based Browsers for Fun
and Profit.28th Annual Computer Security Applications Conference
(ACSAC 2012),
Orlando, FL, USA, December 2012.
(Acceptance rate: 19.0%)
Devin J. Pohly, Stephen McLaughlin, Patrick McDaniel, and Kevin
Butler.
Hi-Fi: Collecting High-Fidelity
Whole-System Provenance.28th Annual Computer Security Applications Conference
(ACSAC 2012),
Orlando, FL, USA, December 2012.
(Acceptance rate: 19.0%)
Adam Bates, Kevin Butler, Micah Sherr, Clay Shields, Patrick
Traynor, and Dan Wallach.
Accountable Wiretapping — or
— I Know That They Can Hear You Now.19th ISOC Network and Distributed System Security Symposium
(NDSS 2012),
San Diego, CA, USA, February 2012.
(Acceptance rate: 17.8%)
Kevin Butler, Stephen McLaughlin, and Patrick McDaniel.
Kells: A Protection Framework for
Portable Data.26th Annual Computer Security Applications Conference
(ACSAC 2010),
Austin, TX, USA, December 2010.
(Acceptance rate: 16.3%)
Thomas Moyer, Kevin Butler, Joshua Schiffman, Patrick McDaniel, and
Trent Jaeger.
Scalable Asynchronous Web Content
Attestation.25th Annual Computer Security Applications Conference
(ACSAC 2009),
Honolulu, HI, USA, December 2009.
(Acceptance rate: 19.0%)
William Enck, Kevin Butler, Thomas Richardson, Patrick McDaniel,
and Adam Smith.
Defending Against Attacks on Main Memory
Persistence.24th Annual Computer Security Applications Conference
(ACSAC 2008),
Anaheim, CA, USA, December 2008.
(Acceptance rate: 24.3%)
Kevin Butler, Stephen McLaughlin, and Patrick McDaniel.
Rootkit-Resistant Disks.15th ACM Conference on Computer and Communications Security
(CCS’08),
Alexandria, VA, USA, November 2008.
(Acceptance rate: 18.1%)
Dhananjay Bapat, Kevin Butler, and Patrick McDaniel.
Towards Automatic Privilege
Separation.Third International Conference on Information Systems Security
(ICISS 2007),
Delhi, India, December 2007.
(Acceptance rate: 25.0%)
Lisa Johansen, Kevin Butler, Michael Rowell, and Patrick McDaniel.
Email Communities of Interest.Fourth Conference on Email and Anti-Spam (CEAS 2007),
Mountain View, CA, USA, August 2007.
(Acceptance rate: 19.0%)
Anusha Sriraman, Kevin Butler, Patrick McDaniel, and Padma
Raghavan.
Analysis of the IPv4 Address Delegation
Structure.IEEE Symposium on Computers and Communications (ISCC’07),
Aveiro, Portugal, July 2007.
(Acceptance rate: 40%)
Kevin Butler, Patrick Traynor, William Enck, Jennifer Plasterr, and
Patrick McDaniel.
Privacy Preserving Web-Based Email.2nd International Conference on Information Systems Security
(ICISS 2006),
Kolkata, India, December 2006.
(Acceptance rate: 30.4%)
Kevin Butler, Patrick McDaniel, and William Aiello.
Optimizing BGP Security by Exploiting Path
Stability.13th ACM Conference on Computer and Communications Security
(CCS’06),
Alexandria, VA, USA, November 2006.
(Acceptance rate: 14.8%)
Trent Jaeger, Kevin Butler, David King, Serge Hallyn, Joy Latten,
and Xiolan Zhang.
Leveraging IPsec for Distributed
Authorization.2nd IEEE Communications Society/CreateNet International
Conference on Security and Privacy in Communication Networks
(SecureComm’06),
Baltimore, MD, USA, August 2006.
(Acceptance rate: 25.4%)
Jennifer Sheldon, Weidong Zhu, Adnan Abdulla, Kevin Butler, Md
Jahidul Islam, and Sara Rampazzi.
Position: Deep Note: Can Acoustic Interference Damage the
Availability of Hard Disk Storage in Underwater Data Centers?
15th ACM Workshop on Hot Topics in Storage and File Systems
(HotStorage 2023),
Boston, MA, USA, July 2023.
🏆 Best Paper Award
Brendan David-John, Diane Hosfelt, Kevin Butler, and Eakta Jain.
Let’s SOUP Up XR: Collected thoughts from an IEEE VR workshop on
privacy in mixed reality.
1st International Workshop on Security for XR and XR for
Security (VR4Sec),
in conjunction with SOUPS 2021, virtual event, August 2021.
Sushrut Shringarputale, Patrick McDaniel, Kevin Butler, and Thomas
La Porta.
Co-residency Attacks on Containers are Real.
2020 ACM Cloud Computing Security Workshop (CCSW’20),
Orlando, FL, USA, November 2020.
Suman Adari, Washington Garcia, and Kevin Butler.
Adversarial Video Captioning.
2019 Dependable and Secure Machine Learning Workshop
(DSML’19),
Portland, OR, USA, June 2019.
Siddhant Deshmukh, Henry Carter, Grant Hernandez, Patrick Traynor,
and Kevin Butler.
Efficient and Secure Template Blinding for Biometric
Authentication.
2nd IEEE Workshop on Security and Privacy in the Cloud
(SPC 2016),
Philadelphia, PA, USA, October 2016.
Matt Bishop, Carrie Gates, Steven Greenspan, Kevin Butler, and
Emily Rine Butler.
Forgive and Forget: Return to
Obscurity.2013 New Security Paradigms Workshop (NSPW),
Banff, AB, Canada, September 2013.
Adam Bates, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud
Valafar, and Kevin Butler.
Detecting Co-Residency with Active
Traffic Analysis Techniques.4th ACM Cloud Computing Security Workshop (CCSW 2012),
Raleigh, NC, USA, October 2012.
(Acceptance rate: 12.0% full papers,
22.0% overall)
Lara Letaw, Joe Pletcher, and Kevin Butler.
Host Identification via USB
Fingerprinting.6th IEEE International Workshop on Systematic Approaches to
Digital Forensic Engineering (SADFE 2011),
Oakland, CA, USA, May 2011.
(Acceptance rate: 34.8%)
Patrick McDaniel, Kevin Butler, Stephen McLaughlin, Radu Sion,
Erez Zadok, and Marianne Winslett.
Towards a Secure and Efficient System for
End-to-End Provenance.2nd USENIX Workshop on the Theory and Practice of Provenance
(TaPP’10),
San Jose, CA, USA, February 2010.
Kevin Butler, Leon Perlman, Paul Makin, Henry Gerwitz, Patrick
Traynor, Yury Grin, Evgeniy Bondarenko, and Richard Miller.
Security
Aspects of Digital Financial Services (DFS).ITU-T FG-DFS: Telecommunication Standardization Sector of the
International Telecommunication Union, Focus Group on Digital
Financial Services.
Focus Group Technical Report, January 2017.
Patrick McDaniel, Kevin Butler, William Enck, Harri Hursti, Stephen
McLaughlin, Patrick Traynor, Matt Blaze, Adam Aviv, Pavol Cerny,
Sandy Clark, Eric Cronin, Gaurav Shah, Micah Sherr, Giovanni Vigna,
Richard Kemmerer, David Balzarotti, Greg Banks, Marco Cova,
Viktoria Felmetsger, William Robertson, Fredrik Valeur, Joseph
Lorenzo Hall, and Laura Quilter.
EVEREST: Evaluation and Validation of
Election-Related Equipment, Standards and Testing.
Public Report, Ohio Secretary of State, 2007.
Kevin Butler. 18th USENIX Security Symposium Conference Summaries.
USENIX ;login Magazine, December 2009.
Kevin Butler. 16th USENIX Security Symposium Conference Summaries.
USENIX ;login Magazine, December 2007.
Kevin Butler. 15th USENIX Security Symposium Conference Summaries.
USENIX ;login Magazine, December 2006.
Kevin Butler. 14th USENIX Security Symposium Conference Summaries.
USENIX ;login Magazine, December 2005.
Technical Reports
Kevin Butler and Petros Efstathopoulos.
U Can’t Touch This: Block-Level Protection for Portable Storage.
Technical Report Symantec-SRL/MV2009-11, Symantec Research Labs,
Mountain View, CA, June 2009.
Kevin Butler, Stephen McLaughlin, Thomas Moyer, Joshua Schiffman,
Patrick McDaniel, and Trent Jaeger.
Firma: Disk-Based Foundations for Trusted
Operating Systems.
Technical Report NAS-TR-0114-2009, Networking and Security Research
Center, Department of Computer Science and Engineering,
Pennsylvania State University, University Park, PA, USA, May 2009.
Kevin Butler, Stephen McLaughlin, Thomas Moyer, Patrick McDaniel,
and Trent Jaeger.
SwitchBlade: Policy-Driven Disk
Segmentation.
Technical Report NAS-TR-0098-2008, Networking and Security Research
Center, Department of Computer Science and Engineering,
Pennsylvania State University, University Park, PA, USA,
November 2008.
Lisa Johansen, Kevin Butler, William Enck, Patrick Traynor, and
Patrick McDaniel.
Grains of SANs: Building Storage Area
Networks from Memory Spots.
Technical Report NAS-TR-0060-2006, Network and Security Research
Center, Department of Computer Science and Engineering,
Pennsylvania State University, University Park, PA, USA,
January 2007.
Kevin Butler, Stephen McLaughlin, Patrick McDaniel, and Youngjae
Kim.
Autonomously Secure Disks.
Technical Report NAS-TR-0072-2007, Network and Security Research
Center, Department of Computer Science and Engineering,
Pennsylvania State University, University Park, PA, USA, May 2007.
(Updated September 2007.)
Luke St. Clair, Lisa Johansen, Kevin Butler, William Enck, Matthew
Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger.
Password Exhaustion: Predicting the End
of Password Usefulness.
Technical Report NAS-TR-0030-2006, Network and Security Research
Center, Department of Computer Science and Engineering,
Pennsylvania State University, University Park, PA, USA, May 2006.
(Updated January 2007.)