Fabian Monrose

According to our database1, Fabian Monrose authored at least 82 papers between 1997 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Tutorial: Parry and RIPOSTE: Honing Cybersecurity Skills with Challenge-Based Exercises.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
Revisiting Browser Security in the Modern Era: New Data-Only Attacks and Defenses.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

Caught Red-Handed: Toward Practical Video-Based Subsequences Matching in the Presence of Real-World Transformations.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

Practical Attacks Against Graph-based Clustering.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos.
Proceedings of the 25th USENIX Security Symposium, 2016

Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Detecting Malicious Exploit Kits using Tree-based Similarity Searches.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

No-Execute-After-Read: Preventing Code Disclosure in Commodity Software.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion.
IEEE Trans. Dependable Sec. Comput., 2014

Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Isn't that Fantabulous: Security, Linguistic and Usability Challenges of Pronounceable Tokens.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections.
IEEE Trans. Dependable Sec. Comput., 2013

Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Clear and Present Data: Opaque Traffic and its Security Implications for the Future.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Seeing double: reconstructing obscured typed input from repeated compromising reflections.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches.
IEEE Trans. Information Forensics and Security, 2012

Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Toward Efficient Querying of Compressed Network Payloads.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

2011
SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks.
Proceedings of the 20th USENIX Security Symposium, 2011

Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses.
Proceedings of the Network and Distributed System Security Symposium, 2011

An empirical study of the performance, security and privacy implications of domain name prefetching.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Amplifying limited expert input to sanitize large network traces.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

iSpy: automatic reconstruction of typed input from compromising reflections.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Peeking Through the Cloud: Client Density Estimation via DNS Cache Probing.
ACM Trans. Internet Techn., 2010

Uncovering Spoken Phrases in Encrypted Voice over IP Conversations.
ACM Trans. Inf. Syst. Secur., 2010

Traffic classification using visual motifs: an empirical evaluation.
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010

Understanding Domain Registration Abuses.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

DNS Prefetching and Its Privacy Implications: When Good Things Go Bad.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010

The security of modern password expiration: an algorithmic framework and empirical analysis.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Trail of bytes: efficient support for forensic analysis.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.
Proceedings of the Network and Distributed System Security Symposium, 2009

Toward Resisting Forgery Attacks via Pseudo-Signatures.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications.
Proceedings of the Detection of Intrusions and Malware, 2009

English shellcode.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Masquerade: Simulating a Thousand Victims.
;login:, 2008

To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads.
Proceedings of the 17th USENIX Security Symposium, 2008

All Your iFRAMEs Point to Us.
Proceedings of the 17th USENIX Security Symposium, 2008

Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008), 2008

Taming the Devil: Techniques for Evaluating Anonymized Network Data.
Proceedings of the Network and Distributed System Security Symposium, 2008

Towards practical biometric key generation with randomized biometric templates.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Peeking Through the Cloud: DNS-Based Estimation and Its Applications.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Forgery Quality and Its Implications for Behavioral Biometric Security.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2007

Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

On Web Browsing Privacy in Anonymized NetFlows.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging.
Proceedings of the First Workshop on Hot Topics in Understanding Botnets, 2007

Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
Proceedings of the Network and Distributed System Security Symposium, 2007

Toward Valley-Free Inter-domain Routing.
Proceedings of IEEE International Conference on Communications, 2007

2006
On Inferring Application Protocol Behaviors in Encrypted Network Traffic.
J. Mach. Learn. Res., 2006

On the impact of dynamic addressing on malware propagation.
Proceedings of the 2006 ACM Workshop on Rapid Malcode, 2006

Using visual motifs to classify encrypted traffic.
Proceedings of the 3rd Workshop on Visualization for Computer Security (VizSEC 2006), 2006

Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

Fast and Evasive Attacks: Highlighting the Challenges Ahead.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

A multifaceted approach to understanding the botnet phenomenon.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

Efficient Memory Bound Puzzles Using Pattern Databases.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Correlation-Resistant Storage via Keyword-Searchable Encryption.
IACR Cryptology ePrint Archive, 2005

Worm evolution tracking via timing analysis.
Proceedings of the 2005 ACM Workshop on Rapid Malcode, 2005

On the Effectiveness of Distributed Worm Monitoring.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Achieving Efficient Conjunctive Keyword Searches over Encrypted Data.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

An Extensible Platform for Evaluating Security Protocols.
Proceedings of the Proceedings 38th Annual Simulation Symposium (ANSS-38 2005), 2005

2004
HMM profiles for network traffic classification.
Proceedings of the Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC 2004), 2004

On User Choice in Graphical Password Schemes.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Time-Scoped Searching of Encrypted Audit Logs.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

2002
Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices.
Proceedings of the 11th USENIX Security Symposium, 2002

2001
Cryptographic Key Generation from Voice.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Using voice to generate cryptographic keys.
Proceedings of the 2001: A Speaker Odyssey, 2001

2000
Keystroke dynamics as a biometric for authentication.
Future Generation Comp. Syst., 2000

Privacy-preserving global customization.
Proceedings of the 2nd ACM Conference on Electronic Commerce (EC-00), 2000

1999
The Design and Analysis of Graphical Passwords.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

Distributed Execution with Remote Audit.
Proceedings of the Network and Distributed System Security Symposium, 1999

Password Hardening Based on Keystroke Dynamics.
Proceedings of the CCS '99, 1999

1998
Leaving the sandbox: Third party validation for Java applications.
Proceedings of the Computers and Their Applications (CATA-98), 1998

1997
Authentication via Keystroke Dynamics.
Proceedings of the CCS '97, 1997


  Loading...