Fabian Monrose

Affiliations: 
Johns Hopkins University, Baltimore, MD 
Area:
Computer Science
Google:
"Fabian Monrose"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Werner J, Otterness N, Baltas G, et al. (2016) No-execute-after-read: Preventing code disclosure in commodity software Asia Ccs 2016 - Proceedings of the 11th Acm Asia Conference On Computer and Communications Security. 35-46
Bos H, Monrose F, Blanc G. (2015) Research in attacks, intrusions, and defenses: 18th international symposium, RAID 2015 Kyoto, Japan, november 2-4, 2015 proceedings Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9404
Bos H, Monrose F. (2015) Foreword Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9404: V-VI
Xu Y, Frahm JM, Monrose F. (2014) Watching the watchers: Automatically inferring TV content from outdoor light effusions Proceedings of the Acm Conference On Computer and Communications Security. 418-428
Xu Y, Reynaga G, Chiasson S, et al. (2014) Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion Ieee Transactions On Dependable and Secure Computing. 11: 480-493
Xu Y, Heinly J, White AM, et al. (2013) Seeing double: Reconstructing obscured typed input from repeated compromising reflections Proceedings of the Acm Conference On Computer and Communications Security. 1063-1074
Raguram R, White AM, Xu Y, et al. (2013) On the privacy risks of virtual keyboards: Automatic reconstruction of typed input from compromising reflections Ieee Transactions On Dependable and Secure Computing. 10: 154-167
Snow KZ, Monrose F, Davi L, et al. (2013) Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization Proceedings - Ieee Symposium On Security and Privacy. 574-588
Krishnan S, Taylor T, Monrose F, et al. (2013) Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing Proceedings of the International Conference On Dependable Systems and Networks
Stancill B, Snow KZ, Otterness N, et al. (2013) Check my profile: Leveraging static analysis for fast and accurate detection of ROP gadgets Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8145: 62-81
See more...