default search action
Fabian Monrose
Person information
- affiliation: Georgia Institute of Technology, USA
- affiliation (former): University of North Carolina at Chapel Hill, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c98]Kedrian James, Kevin Valakuzhy, Kevin Z. Snow, Fabian Monrose:
CrashTalk: Automated Generation of Precise, Human Readable, Descriptions of Software Security Bugs. CODASPY 2024: 337-347 - [c97]Athanasios Moschos, Fabian Monrose, Angelos D. Keromytis:
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans. HOST 2024: 254-259 - [c96]Miuyin Yong Wong, Kevin Valakuzhy, Mustaque Ahamad, Douglas M. Blough, Fabian Monrose:
Understanding LLMs Ability to Aid Malware Analysts in Bypassing Evasion Techniques. ICMI Companion 2024: 36-40 - [c95]Miuyin Yong Wong, Matthew Landen, Frank Li, Fabian Monrose, Mustaque Ahamad:
Comparing Malware Evasion Theory with Practice: Results from Interviews with Expert Analysts. SOUPS @ USENIX Security Symposium 2024: 61-80 - [i7]Athanassios Moschos, Fabian Monrose, Angelos D. Keromytis:
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans. CoRR abs/2403.10659 (2024) - [i6]Omar Alrawi, Miuyin Yong Wong, Athanasios Avgetidis, Kevin Valakuzhy, Boladji Vinny Adjibi, Konstantinos Karakatsanis, Mustaque Ahamad, Douglas M. Blough, Fabian Monrose, Manos Antonakakis:
SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned. CoRR abs/2403.16304 (2024) - 2023
- [c94]Yufei Du, Omar Alrawi, Kevin Z. Snow, Manos Antonakakis, Fabian Monrose:
Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level. CCS 2023: 2695-2709 - [c93]Zane Ma, Aaron Faulkenberry, Thomas Papastergiou, Zakir Durumeric, Michael D. Bailey, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis:
Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys. IMC 2023: 222-235 - [c92]Mac Malone, Fabian Monrose:
More Carrot or Less Stick: Organically Improving Student Time Management With Practice Tasks and Gamified Assignments. ITiCSE (1) 2023: 278-284 - [c91]Tracey John, Dwaine Clarke, Daniel Coore, Fabian Monrose, John McHugh:
Virtual Career Advisor System. MobiWIS 2023: 264-277 - [c90]Mac Malone, Yicheng Wang, Fabian Monrose:
Securely Autograding Cybersecurity Exercises Using Web Accessible Jupyter Notebooks. SIGCSE (1) 2023: 165-171 - [c89]Athanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, Charles Lever, Paul Burbage, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis:
Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators. USENIX Security Symposium 2023: 5307-5324 - 2022
- [c88]Aaron Faulkenberry, Athanasios Avgetidis, Zane Ma, Omar Alrawi, Charles Lever, Panagiotis Kintis, Fabian Monrose, Angelos D. Keromytis, Manos Antonakakis:
View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy. ACSAC 2022: 240-250 - [c87]John Lim, Jan-Michael Frahm, Fabian Monrose:
Leveraging Disentangled Representations to Improve Vision-Based Keystroke Inference Attacks Under Low Data Constraints. CODASPY 2022: 242-251 - [c86]Kedrian James, Yufei Du, Sanjeev Das, Fabian Monrose:
Separating the Wheat from the Chaff: Using Indexing and Sub-Sequence Mining Techniques to Identify Related Crashes During Bug Triage. QRS 2022: 31-42 - [c85]Yufei Du, Ryan Court, Kevin Z. Snow, Fabian Monrose:
Automatic Recovery of Fine-grained Compiler Artifacts at the Binary Level. USENIX ATC 2022: 853-868 - [i5]John Lim, Jan-Michael Frahm, Fabian Monrose:
Leveraging Disentangled Representations to Improve Vision-Based Keystroke Inference Attacks Under Low Data. CoRR abs/2204.02494 (2022) - 2021
- [c84]Mac Malone, Yicheng Wang, Kevin Z. Snow, Fabian Monrose:
Applicable Micropatches and Where to Find Them: Finding and Applying New Security Hot Fixes to Old Software. ICST 2021: 394-405 - [c83]Mac Malone, Yicheng Wang, Kedrian James, Murray Anderegg, Jan Werner, Fabian Monrose:
To Gamify or Not?: On Leaderboard Effects, Student Engagement and Learning Outcomes in a Cybersecurity Intervention. SIGCSE 2021: 1135-1141 - [c82]Mac Malone, Yicheng Wang, Fabian Monrose:
An Online Gamified Learning Platform for Teaching Cybersecurity and More. SIGITE 2021: 29-34 - [c81]Tapti Palit, Jarin Firose Moon, Fabian Monrose, Michalis Polychronakis:
DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection. SP 2021: 1919-1937 - [c80]Omar Alrawi, Charles Lever, Kevin Valakuzhy, Ryan Court, Kevin Z. Snow, Fabian Monrose, Manos Antonakakis:
The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle. USENIX Security Symposium 2021: 3505-3522 - 2020
- [j12]Tapti Palit, Fabian Monrose, Michalis Polychronakis:
Mitigating Data-only Attacks by Protecting Memory-resident Sensitive Data. DTRAP 1(4): 20:1-20:26 (2020) - [c79]Sanjeev Das, Kedrian James, Jan Werner, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:
A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs. ACSAC 2020: 345-359 - [c78]Salman Ahmed, Ya Xiao, Kevin Z. Snow, Gang Tan, Fabian Monrose, Danfeng (Daphne) Yao:
Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP. CCS 2020: 1803-1820 - [c77]John Lim, True Price, Fabian Monrose, Jan-Michael Frahm:
Revisiting the Threat Space for Vision-Based Keystroke Inference Attacks. ECCV Workshops (5) 2020: 449-461 - [i4]John Lim, True Price, Fabian Monrose, Jan-Michael Frahm:
Revisiting the Threat Space for Vision-based Keystroke Inference Attacks. CoRR abs/2009.05796 (2020)
2010 – 2019
- 2019
- [c76]Tapti Palit, Fabian Monrose, Michalis Polychronakis:
Mitigating data leakage by protecting memory-resident sensitive data. ACSAC 2019: 598-611 - [c75]Jan Werner, Joshua Mason, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:
The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves. AsiaCCS 2019: 73-85 - [c74]Sanjeev Das, Jan Werner, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:
SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security. IEEE Symposium on Security and Privacy 2019: 20-38 - [c73]Omar Alrawi, Chaz Lever, Manos Antonakakis, Fabian Monrose:
SoK: Security Evaluation of Home-Based IoT Deployments. IEEE Symposium on Security and Privacy 2019: 1362-1380 - [i3]Salman Ahmed, Ya Xiao, Gang Tan, Kevin Z. Snow, Fabian Monrose, Danfeng Yao:
Measuring Attack Surface Reduction in the Presence of Code (Re-)Randomization. CoRR abs/1910.03034 (2019) - 2018
- [c72]Micah Morton, Jan Werner, Panagiotis Kintis, Kevin Z. Snow, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:
Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks. EuroS&P 2018: 167-182 - [c71]Fabian Monrose, Jan Werner:
Tutorial: Parry and RIPOSTE: Honing Cybersecurity Skills with Challenge-Based Exercises. SecDev 2018: 132-133 - 2017
- [c70]Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou:
Practical Attacks Against Graph-based Clustering. CCS 2017: 1125-1142 - [c69]Yi Xu, True Price, Fabian Monrose, Jan-Michael Frahm:
Caught Red-Handed: Toward Practical Video-Based Subsequences Matching in the Presence of Real-World Transformations. CVPR Workshops 2017: 1397-1406 - [c68]Micah Morton, Hyungjoon Koo, Forrest Li, Kevin Z. Snow, Michalis Polychronakis, Fabian Monrose:
Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure. ESSoS 2017: 143-160 - [c67]Roman Rogowski, Micah Morton, Forrest Li, Fabian Monrose, Kevin Z. Snow, Michalis Polychronakis:
Revisiting Browser Security in the Modern Era: New Data-Only Attacks and Defenses. EuroS&P 2017: 366-381 - [i2]Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou:
Practical Attacks Against Graph-based Clustering. CoRR abs/1708.09056 (2017) - 2016
- [c66]Jan Werner, George Baltas, Rob Dallara, Nathan Otterness, Kevin Z. Snow, Fabian Monrose, Michalis Polychronakis:
No-Execute-After-Read: Preventing Code Disclosure in Commodity Software. AsiaCCS 2016: 35-46 - [c65]Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, Reiner Sailer:
Detecting Malicious Exploit Kits using Tree-based Similarity Searches. CODASPY 2016: 255-266 - [c64]Teryl Taylor, Kevin Z. Snow, Nathan Otterness, Fabian Monrose:
Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire. NDSS 2016 - [c63]Kevin Z. Snow, Roman Rogowski, Jan Werner, Hyungjoon Koo, Fabian Monrose, Michalis Polychronakis:
Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks. IEEE Symposium on Security and Privacy 2016: 954-968 - [c62]Yi Xu, True Price, Jan-Michael Frahm, Fabian Monrose:
Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos. USENIX Security Symposium 2016: 497-512 - [e4]Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquín García-Alfaro:
Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings. Lecture Notes in Computer Science 9854, Springer 2016, ISBN 978-3-319-45718-5 [contents] - 2015
- [c61]Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Z. Snow, Fabian Monrose:
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming. NDSS 2015 - [e3]Herbert Bos, Fabian Monrose, Gregory Blanc:
Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings. Lecture Notes in Computer Science 9404, Springer 2015, ISBN 978-3-319-26361-8 [contents] - 2014
- [j11]Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot:
Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion. IEEE Trans. Dependable Secur. Comput. 11(5): 480-493 (2014) - [c60]Yi Xu, Jan-Michael Frahm, Fabian Monrose:
Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions. CCS 2014: 418-428 - [c59]Andrew M. White, Katherine Shaw, Fabian Monrose, Elliott Moreton:
Isn't that Fantabulous: Security, Linguistic and Usability Challenges of Pronounceable Tokens. NSPW 2014: 25-38 - [c58]Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose:
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. USENIX Security Symposium 2014: 401-416 - 2013
- [j10]Rahul Raguram, Andrew M. White, Yi Xu, Jan-Michael Frahm, Pierre Georgel, Fabian Monrose:
On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections. IEEE Trans. Dependable Secur. Comput. 10(3): 154-167 (2013) - [c57]Yi Xu, Jared Heinly, Andrew M. White, Fabian Monrose, Jan-Michael Frahm:
Seeing double: reconstructing obscured typed input from repeated compromising reflections. CCS 2013: 1063-1074 - [c56]Srinivas Krishnan, Teryl Taylor, Fabian Monrose, John McHugh:
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing. DSN 2013: 1-12 - [c55]Andrew M. White, Srinivas Krishnan, Michael D. Bailey, Fabian Monrose, Phillip A. Porras:
Clear and Present Data: Opaque Traffic and its Security Implications for the Future. NDSS 2013 - [c54]Blaine Stancill, Kevin Z. Snow, Nathan Otterness, Fabian Monrose, Lucas Davi, Ahmad-Reza Sadeghi:
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets. RAID 2013: 62-81 - [c53]Kevin Z. Snow, Fabian Monrose, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Ahmad-Reza Sadeghi:
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization. IEEE Symposium on Security and Privacy 2013: 574-588 - 2012
- [j9]Scott E. Coull, Andrew M. White, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter:
Understanding domain registration abuses. Comput. Secur. 31(7): 806-815 (2012) - [j8]Srinivas Krishnan, Kevin Z. Snow, Fabian Monrose:
Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches. IEEE Trans. Inf. Forensics Secur. 7(6): 1876-1889 (2012) - [c52]Teryl Taylor, Scott E. Coull, Fabian Monrose, John McHugh:
Toward Efficient Querying of Compressed Network Payloads. USENIX ATC 2012: 113-124 - [c51]Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot:
Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion. USENIX Security Symposium 2012: 49-64 - 2011
- [c50]Rahul Raguram, Andrew M. White, Dibyendusekhar Goswami, Fabian Monrose, Jan-Michael Frahm:
iSpy: automatic reconstruction of typed input from compromising reflections. CCS 2011: 527-536 - [c49]Srinivas Krishnan, Fabian Monrose:
An empirical study of the performance, security and privacy implications of domain name prefetching. DSN 2011: 61-72 - [c48]Xin Huang, Fabian Monrose, Michael K. Reiter:
Amplifying limited expert input to sanitize large network traces. DSN 2011: 494-505 - [c47]Scott E. Coull, Fabian Monrose, Michael D. Bailey:
On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses. NDSS 2011 - [c46]Andrew M. White, Austin R. Matthews, Kevin Z. Snow, Fabian Monrose:
Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks. IEEE Symposium on Security and Privacy 2011: 3-18 - [c45]Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos:
SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks. USENIX Security Symposium 2011 - 2010
- [j7]Charles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson:
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations. ACM Trans. Inf. Syst. Secur. 13(4): 35:1-35:30 (2010) - [j6]Moheeb Abu Rajab, Fabian Monrose, Niels Provos:
Peeking Through the Cloud: Client Density Estimation via DNS Cache Probing. ACM Trans. Internet Techn. 10(3): 9:1-9:21 (2010) - [c44]Srinivas Krishnan, Kevin Z. Snow, Fabian Monrose:
Trail of bytes: efficient support for forensic analysis. CCS 2010: 50-60 - [c43]Yinqian Zhang, Fabian Monrose, Michael K. Reiter:
The security of modern password expiration: an algorithmic framework and empirical analysis. CCS 2010: 176-186 - [c42]Fabian Monrose, Srinivas Krishnan:
DNS Prefetching and Its Privacy Implications: When Good Things Go Bad. LEET 2010 - [c41]Scott E. Coull, Andrew M. White, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter:
Understanding Domain Registration Abuses. SEC 2010: 68-79 - [c40]Wilson Lian, Fabian Monrose, John McHugh:
Traffic classification using visual motifs: an empirical evaluation. VizSEC 2010: 70-78
2000 – 2009
- 2009
- [c39]Srinivas Krishnan, Fabian Monrose:
TimeCapsule: secure recording of accesses to a protected datastore. VMSec@CCS 2009: 23-32 - [c38]Joshua Mason, Sam Small, Fabian Monrose, Greg MacManus:
English shellcode. CCS 2009: 524-533 - [c37]Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael K. Reiter:
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications. DIMVA 2009: 157-175 - [c36]Jin Chen, Daniel P. Lopresti, Fabian Monrose:
Toward Resisting Forgery Attacks via Pseudo-Signatures. ICDAR 2009: 51-55 - [c35]Charles V. Wright, Scott E. Coull, Fabian Monrose:
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. NDSS 2009 - [e2]Fabian Monrose:
18th USENIX Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings. USENIX Association 2009, ISBN 978-1-931971-69-0 [contents] - 2008
- [j5]Sam Small, Joshua Mason, Ryan MacArthur, Fabian Monrose:
Masquerade: Simulating a Thousand Victims. login Usenix Mag. 33(6) (2008) - [c34]Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, Niels Provos:
Peeking Through the Cloud: DNS-Based Estimation and Its Applications. ACNS 2008: 21-38 - [c33]Lucas Ballard, Seny Kamara, Fabian Monrose, Michael K. Reiter:
Towards practical biometric key generation with randomized biometric templates. CCS 2008: 235-244 - [c32]Scott E. Coull, Charles V. Wright, Angelos D. Keromytis, Fabian Monrose, Michael K. Reiter:
Taming the Devil: Techniques for Evaluating Anonymized Network Data. NDSS 2008 - [c31]Charles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson:
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations. SP 2008: 35-49 - [c30]Niels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab, Fabian Monrose:
All Your iFRAMEs Point to Us. USENIX Security Symposium 2008: 1-16 - [c29]Sam Small, Joshua Mason, Fabian Monrose, Niels Provos, Adam Stubblefield:
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads. USENIX Security Symposium 2008: 171-184 - [e1]Fabian Monrose:
First USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '08, San Francisco, CA, USA, April 15, 2008, Proceedings. USENIX Association 2008 [contents] - 2007
- [j4]Lucas Ballard, Daniel P. Lopresti, Fabian Monrose:
Forgery Quality and Its Implications for Behavioral Biometric Security. IEEE Trans. Syst. Man Cybern. Part B 37(5): 1107-1118 (2007) - [c28]Sophie Y. Qiu, Patrick D. McDaniel, Fabian Monrose:
Toward Valley-Free Inter-domain Routing. ICC 2007: 2009-2016 - [c27]Scott E. Coull, Charles V. Wright, Fabian Monrose, Michael P. Collins, Michael K. Reiter:
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. NDSS 2007 - [c26]Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis:
My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging. HotBots 2007 - [c25]Scott E. Coull, Michael P. Collins, Charles V. Wright, Fabian Monrose, Michael K. Reiter:
On Web Browsing Privacy in Anonymized NetFlows. USENIX Security Symposium 2007 - [c24]Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson:
Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? USENIX Security Symposium 2007 - 2006
- [j3]Charles V. Wright, Fabian Monrose, Gerald M. Masson:
On Inferring Application Protocol Behaviors in Encrypted Network Traffic. J. Mach. Learn. Res. 7: 2745-2769 (2006) - [c23]Sujata Doshi, Fabian Monrose, Aviel D. Rubin:
Efficient Memory Bound Puzzles Using Pattern Databases. ACNS 2006: 98-113 - [c22]Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis:
A multifaceted approach to understanding the botnet phenomenon. Internet Measurement Conference 2006: 41-52 - [c21]Sophie Y. Qiu, Patrick D. McDaniel, Fabian Monrose, Aviel D. Rubin:
Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing. ISCC 2006: 489-496 - [c20]Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis:
Fast and Evasive Attacks: Highlighting the Challenges Ahead. RAID 2006: 206-225 - [c19]Lucas Ballard, Fabian Monrose, Daniel P. Lopresti:
Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing. USENIX Security Symposium 2006 - [c18]Charles V. Wright, Fabian Monrose, Gerald M. Masson:
Using visual motifs to classify encrypted traffic. VizSEC 2006: 41-50 - [c17]Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis:
On the impact of dynamic addressing on malware propagation. WORM 2006: 51-56 - 2005
- [c16]Seny Kamara, Darren Davis, Lucas Ballard, Ryan Caudy, Fabian Monrose:
An Extensible Platform for Evaluating Security Protocols. Annual Simulation Symposium 2005: 204-213 - [c15]Lucas Ballard, Seny Kamara, Fabian Monrose:
Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. ICICS 2005: 414-426 - [c14]Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis:
On the Effectiveness of Distributed Worm Monitoring. USENIX Security Symposium 2005 - [c13]Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis:
Worm evolution tracking via timing analysis. WORM 2005: 52-59 - [i1]Lucas Ballard, Matthew Green, Breno de Medeiros, Fabian Monrose:
Correlation-Resistant Storage via Keyword-Searchable Encryption. IACR Cryptol. ePrint Arch. 2005: 417 (2005) - 2004
- [c12]Darren Davis, Fabian Monrose, Michael K. Reiter:
Time-Scoped Searching of Encrypted Audit Logs. ICICS 2004: 532-545 - [c11]Darren Davis, Fabian Monrose, Michael K. Reiter:
On User Choice in Graphical Password Schemes. USENIX Security Symposium 2004: 151-164 - [c10]Charles V. Wright, Fabian Monrose, Gerald M. Masson:
HMM profiles for network traffic classification. VizSEC 2004: 9-15 - 2002
- [j2]Fabian Monrose, Michael K. Reiter, Susanne Wetzel:
Password hardening based on keystroke dynamics. Int. J. Inf. Sec. 1(2): 69-83 (2002) - [c9]Fabian Monrose, Michael K. Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih:
Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices. USENIX Security Symposium 2002: 283-296 - 2001
- [c8]Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel:
Using voice to generate cryptographic keys. Odyssey 2001: 237-242 - [c7]Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel:
Cryptographic Key Generation from Voice. S&P 2001: 202-213 - 2000
- [j1]Fabian Monrose, Aviel D. Rubin:
Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4): 351-359 (2000) - [c6]Robert M. Arlein, Ben Jai, Markus Jakobsson, Fabian Monrose, Michael K. Reiter:
Privacy-preserving global customization. EC 2000: 176-184
1990 – 1999
- 1999
- [b1]Fabian Monrose:
Toward Stronger User Authentication. New York University, USA, 1999 - [c5]Fabian Monrose, Michael K. Reiter, Susanne Wetzel:
Password Hardening Based on Keystroke Dynamics. CCS 1999: 73-82 - [c4]Fabian Monrose, Peter Wyckoff, Aviel D. Rubin:
Distributed Execution with Remote Audit. NDSS 1999 - [c3]Ian Jermyn, Alain J. Mayer, Fabian Monrose, Michael K. Reiter, Aviel D. Rubin:
The Design and Analysis of Graphical Passwords. USENIX Security Symposium 1999 - 1998
- [c2]Ian H. Jermyn, Fabian Monrose, Peter Wyckoff:
Leaving the sandbox: Third party validation for Java applications. CATA 1998: 436-439 - 1997
- [c1]Fabian Monrose, Aviel D. Rubin:
Authentication via Keystroke Dynamics. CCS 1997: 48-56
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint