Fabian Monrose - Publications

Affiliations: 
Johns Hopkins University, Baltimore, MD 
Area:
Computer Science

24/53 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2014 Xu Y, Reynaga G, Chiasson S, Frahm JM, Monrose F, Van Oorschot PC. Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion Ieee Transactions On Dependable and Secure Computing. 11: 480-493. DOI: 10.1109/Tdsc.2013.52  0.37
2013 Raguram R, White AM, Xu Y, Frahm JM, Georgel P, Monrose F. On the privacy risks of virtual keyboards: Automatic reconstruction of typed input from compromising reflections Ieee Transactions On Dependable and Secure Computing. 10: 154-167. DOI: 10.1109/Tdsc.2013.16  0.322
2012 Krishnan S, Snow KZ, Monrose F. Trail of bytes: New techniques for supporting data provenance and limiting privacy breaches Ieee Transactions On Information Forensics and Security. 7: 1876-1889. DOI: 10.1109/Tifs.2012.2210217  0.394
2012 Coull SE, White AM, Yen TF, Monrose F, Reiter MK. Understanding domain registration abuses Computers and Security. 31: 806-815. DOI: 10.1016/J.Cose.2012.05.005  0.676
2011 White AM, Matthews AR, Snow KZ, Monrose F. Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks Proceedings - Ieee Symposium On Security and Privacy. 3-18. DOI: 10.1109/SP.2011.34  0.341
2011 Huang X, Monrose F, Reiter MK. Amplifying limited expert input to sanitize large network traces Proceedings of the International Conference On Dependable Systems and Networks. 494-505. DOI: 10.1109/DSN.2011.5958262  0.327
2011 Krishnan S, Monrose F. An empirical study of the performance, security and privacy implications of domain name prefetching Proceedings of the International Conference On Dependable Systems and Networks. 61-72. DOI: 10.1109/DSN.2011.5958207  0.376
2010 Wright CV, Ballard L, Coull SE, Monrose F, Masson GM. Uncovering spoken phrases in encrypted Voice over IP conversations Acm Transactions On Information and System Security. 13. DOI: 10.1145/1880022.1880029  0.648
2010 Rajab MA, Monrose F, Provos N. Peeking Through the Cloud Acm Transactions On Internet Technology. 10: 1-21. DOI: 10.1145/1852096.1852097  0.405
2009 Coull SE, Monrose F, Reiter MK, Bailey M. The challenges of effectively anonymizing network data Proceedings - Cybersecurity Applications and Technology Conference For Homeland Security, Catch 2009. 230-236. DOI: 10.1109/CATCH.2009.27  0.683
2008 Ballard L, Kamara S, Reiter MK, Monrose F. Towards practical biometric key generation with randomized biometric templates Proceedings of the Acm Conference On Computer and Communications Security. 235-244. DOI: 10.1145/1455770.1455801  0.606
2008 Wright CV, Ballard L, Coull SE, Monrose F, Masson GM. Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations Proceedings - Ieee Symposium On Security and Privacy. 35-49. DOI: 10.1109/SP.2008.21  0.738
2008 Rajab MA, Monrose F, Terzis A, Provos N. Peeking through the cloud: DNS-based estimation and its applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5037: 21-38. DOI: 10.1007/978-3-540-68914-0_2  0.301
2007 Ballard L, Lopresti D, Monrose F. Forgery quality and its implications for behavioral biometric security. Ieee Transactions On Systems, Man, and Cybernetics. Part B, Cybernetics : a Publication of the Ieee Systems, Man, and Cybernetics Society. 37: 1107-18. PMID 17926695 DOI: 10.1109/TSMCB.2007.903539  0.329
2007 Qiu SY, McDaniel PD, Monrose F. Toward valley-free inter-domain routing Ieee International Conference On Communications. 2009-2016. DOI: 10.1109/ICC.2007.334  0.575
2006 Abu Rajab M, Monrose F, Terzis A. On the impact of dynamic addressing on malware propagation Proceedings of the 4th Acm Workshop On Recurring Malcode, Worm'06. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 51-56. DOI: 10.1145/1179542.1179554  0.303
2006 Qiu SY, Monrose F, Terzis A, McDaniel PD. Efficient techniques for detecting false origin advertisements in inter-domain routing 2nd Workshop On Secure Network Protocols, Npsec. 12-19. DOI: 10.1109/NPSEC.2006.320341  0.555
2006 Qiu SY, McDaniel PD, Monrose F, Rubin AD. Characterizing address use structure and stability of origin advertisement in inter-domain routing Proceedings - International Symposium On Computers and Communications. 489-496. DOI: 10.1109/ISCC.2006.48  0.54
2006 Wright CV, Monrose F, Masson GM. On inferring application protocol behaviors in encrypted network traffic Journal of Machine Learning Research. 7: 2745-2769.  0.43
2005 Small S, Terzis A, Monrose F, Doshi B, De Simone A. Scalable VPNs for the global information grid Proceedings - Ieee Military Communications Conference Milcom. 2005. DOI: 10.1109/MILCOM.2005.1605702  0.371
2005 Kamara S, Davis D, Ballard L, Caudy R, Monrose F. An extensible platform for evaluating security protocols Proceedings - Simulation Symposium. 204-213. DOI: 10.1109/ANSS.2005.11  0.673
2005 Ballard L, Kamara S, Monrose F. Achieving efficient conjunctive keyword searches over encrypted data Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3783: 414-426. DOI: 10.1007/11602897_35  0.635
2004 Wright C, Monrose F, Massen GM. HMM profiles for network traffic classification (extended abstract) Vizsec/Dmsec '04: Proceedings of the 2004 Acm Workshop On Visualization and Data Mining For Computer Security. 9-15.  0.363
2000 Monrose F, Rubin AD. Keystroke dynamics as a biometric for authentication Future Generation Computer Systems. 16: 351-359. DOI: 10.1016/S0167-739X(99)00059-X  0.451
Low-probability matches (unlikely to be authored by this person)
2014 White AM, Shaw K, Monrose F, Moreton E. Isn't that fantabulous: Security, linguistic and usability challenges of pronounceable tokens Acm International Conference Proceeding Series. 15: 25-37. DOI: 10.1145/2683467.2683470  0.298
2009 Yen TF, Huang X, Monrose F, Reiter MK. Browser fingerprinting from coarse traffic summaries: Techniques and implications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5587: 157-175. DOI: 10.1007/978-3-642-02918-9_10  0.298
2009 Mason J, Small S, Monrose F, MacManus G. English shellcode Proceedings of the Acm Conference On Computer and Communications Security. 524-533. DOI: 10.1145/1653662.1653725  0.279
2008 Chen J, Lopresti D, Ballard L, Monrose F. Pseudo-signatures as a biometric Btas 2008 - Ieee 2nd International Conference On Biometrics: Theory, Applications and Systems. DOI: 10.1109/BTAS.2008.4699326  0.275
2009 Krishnan S, Monrose F. TimeCapsule: Secure recording of accesses to a protected datastore Proceedings of the Acm Conference On Computer and Communications Security. 23-31. DOI: 10.1145/1655148.1655152  0.274
2009 Chen J, Lopresti D, Monrose F. Toward resisting forgery attacks via pseudo-signatures Proceedings of the International Conference On Document Analysis and Recognition, Icdar. 51-55. DOI: 10.1109/ICDAR.2009.241  0.271
2010 Zhang Y, Monrose F, Reiter MK. The security of modern password expiration: An algorithmic framework and empirical analysis Proceedings of the Acm Conference On Computer and Communications Security. 176-186. DOI: 10.1145/1866307.1866328  0.257
2004 Davis D, Monrose F, Reiter MK. Time-scoped searching of encrypted audit logs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3269: 532-545.  0.247
2001 Monrose F, Reiter MK, Li Q, Wetzel S. Cryptographic key generation from voice Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 202-213.  0.242
2013 Stancill B, Snow KZ, Otterness N, Monrose F, Davi L, Sadeghi AR. Check my profile: Leveraging static analysis for fast and accurate detection of ROP gadgets Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8145: 62-81. DOI: 10.1007/978-3-642-41284-4_4  0.238
2010 Krishnan S, Snow K, Monrose F. Trail of bytes: Efficient support for forensic analysis Proceedings of the Acm Conference On Computer and Communications Security. 50-60. DOI: 10.1145/1866307.1866314  0.231
2005 Rajab MA, Monrose F, Terzis A. Worm evolution tracking via timing analysis Worm'05 - Proceedings of the 2005 Acm Workshop On Rapid Malcode. 52-59.  0.229
2006 Abu Rajab M, Zarfoss J, Monrose F, Terzis A. A multifaceted approach to understanding the botnet phenomenon Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 41-52. DOI: 10.1145/1177080.1177086  0.227
2002 Monrose F, Reiter MK, Wetzel S. Password hardening based on keystroke dynamics International Journal of Information Security. 1: 69-83. DOI: 10.1007/S102070100006  0.225
2006 Rajab MA, Monrose F, Terzis A. Fast and evasive attacks: Highlighting the challenges ahead Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4219: 206-225.  0.22
2016 Werner J, Otterness N, Baltas G, Snow KZ, Polychronakis M, Dallara R, Monrose F. No-execute-after-read: Preventing code disclosure in commodity software Asia Ccs 2016 - Proceedings of the 11th Acm Asia Conference On Computer and Communications Security. 35-46. DOI: 10.1145/2897845:2897891  0.202
2013 Snow KZ, Monrose F, Davi L, Dmitrienko A, Liebchen C, Sadeghi AR. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization Proceedings - Ieee Symposium On Security and Privacy. 574-588. DOI: 10.1109/SP.2013.45  0.186
2013 Krishnan S, Taylor T, Monrose F, McHugh J. Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing Proceedings of the International Conference On Dependable Systems and Networks. DOI: 10.1109/DSN.2013.6575364  0.171
2016 Snow KZ, Rogowski R, Werner J, Koo H, Monrose F, Polychronakis M. Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks Proceedings - 2016 Ieee Symposium On Security and Privacy, Sp 2016. 954-968. DOI: 10.1109/SP.2016.61  0.167
2006 Doshi S, Monrose F, Rubin AD. Efficient memory bound puzzles using pattern databases Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3989: 98-113. DOI: 10.1007/11767480_7  0.165
2006 Wright CV, Monrose F, Masson GM. Using visual motifs to classify encrypted traffic Proceedings of the 3rd International Workshop On Visualization For Computer Security, Vizsec'06. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 41-50. DOI: 10.1145/1179576.1179584  0.146
2014 Shaw KE, White AM, Moreton E, Monrose F. Emergent faithfulness to morphological and semantic heads in lexical blends Proceedings of the Annual Meetings On Phonology. 1. DOI: 10.3765/AMP.V1I1.45  0.144
2015 Bos H, Monrose F, Blanc G. Research in attacks, intrusions, and defenses: 18th international symposium, RAID 2015 Kyoto, Japan, november 2-4, 2015 proceedings Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9404. DOI: 10.1007/978-3-319-26362-5  0.133
2010 Lian W, Monrose F, McHugh J. Traffic classification using visual motifs: An empirical evaluation Acm International Conference Proceeding Series. 70-78. DOI: 10.1145/1850795.1850804  0.122
2015 Bos H, Monrose F. Foreword Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9404: V-VI.  0.12
2014 Xu Y, Frahm JM, Monrose F. Watching the watchers: Automatically inferring TV content from outdoor light effusions Proceedings of the Acm Conference On Computer and Communications Security. 418-428. DOI: 10.1145/2660267.2660358  0.088
2006 Abe M, Aoki K, Ateniese G, Avanzi R, Beerliová Z, Billet O, Biryukov A, Blake I, Boyd C, Brier E, Castiglione A, Cha J, Chan A, Chen L, Cho K, ... ... Monrose F, et al. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3960: V-VI.  0.061
2011 Raguram R, White AM, Goswami D, Monrose F, Frahm JM. iSpy: Automatic reconstruction of typed input from compromising reflections Proceedings of the Acm Conference On Computer and Communications Security. 527-536. DOI: 10.1145/2046707.2046769  0.055
2013 Xu Y, Heinly J, White AM, Monrose F, Frahm JM. Seeing double: Reconstructing obscured typed input from repeated compromising reflections Proceedings of the Acm Conference On Computer and Communications Security. 1063-1074. DOI: 10.1145/2508859.2516709  0.046
Hide low-probability matches.