Fabian Monrose
Orcid: 0000-0002-9805-2217Affiliations:
- Georgia Institute of Technology, USA
- University of North Carolina at Chapel Hill, USA (former)
According to our database1,
Fabian Monrose
authored at least 114 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cs.unc.edu
-
on orcid.org
On csauthors.net:
Bibliography
2024
SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned.
CoRR, 2024
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans.
CoRR, 2024
Comparing Malware Evasion Theory with Practice: Results from Interviews with Expert Analysts.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
Proceedings of the Companion Proceedings of the 26th International Conference on Multimodal Interaction, 2024
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024
CrashTalk: Automated Generation of Precise, Human Readable, Descriptions of Software Security Bugs.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
2023
Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 1, 2023
Proceedings of the Mobile Web and Intelligent Information Systems, 2023
More Carrot or Less Stick: Organically Improving Student Time Management With Practice Tasks and Gamified Assignments.
Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 1, 2023
Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Leveraging Disentangled Representations to Improve Vision-Based Keystroke Inference Attacks Under Low Data.
CoRR, 2022
Proceedings of the 2022 USENIX Annual Technical Conference, 2022
Separating the Wheat from the Chaff: Using Indexing and Sub-Sequence Mining Techniques to Identify Related Crashes During Bug Triage.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Leveraging Disentangled Representations to Improve Vision-Based Keystroke Inference Attacks Under Low Data Constraints.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the SIGITE '21: The 22nd Annual Conference on Information Technology Education, SnowBird, UT, USA, October 6, 2021
To Gamify or Not?: On Leaderboard Effects, Student Engagement and Learning Outcomes in a Cybersecurity Intervention.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021
Applicable Micropatches and Where to Find Them: Finding and Applying New Security Hot Fixes to Old Software.
Proceedings of the 14th IEEE Conference on Software Testing, Verification and Validation, 2021
2020
DTRAP, 2020
Proceedings of the Computer Vision - ECCV 2020 Workshops, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
CoRR, 2019
SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Tutorial: Parry and RIPOSTE: Honing Cybersecurity Skills with Challenge-Based Exercises.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018
Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017
Caught Red-Handed: Toward Practical Video-Based Subsequences Matching in the Presence of Real-World Transformations.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos.
Proceedings of the 25th USENIX Security Symposium, 2016
Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
2014
Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion.
IEEE Trans. Dependable Secur. Comput., 2014
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Isn't that Fantabulous: Security, Linguistic and Usability Challenges of Pronounceable Tokens.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014
Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections.
IEEE Trans. Dependable Secur. Comput., 2013
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Seeing double: reconstructing obscured typed input from repeated compromising reflections.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches.
IEEE Trans. Inf. Forensics Secur., 2012
Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the 2012 USENIX Annual Technical Conference, 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses.
Proceedings of the Network and Distributed System Security Symposium, 2011
An empirical study of the performance, security and privacy implications of domain name prefetching.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
ACM Trans. Internet Techn., 2010
ACM Trans. Inf. Syst. Secur., 2010
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010
The security of modern password expiration: an algorithmic framework and empirical analysis.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009
Proceedings of the Detection of Intrusions and Malware, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009
2008
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads.
Proceedings of the 17th USENIX Security Symposium, 2008
Proceedings of the 17th USENIX Security Symposium, 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
IEEE Trans. Syst. Man Cybern. Part B, 2007
Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging.
Proceedings of the First Workshop on Hot Topics in Understanding Botnets, 2007
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of IEEE International Conference on Communications, 2007
2006
J. Mach. Learn. Res., 2006
Proceedings of the 2006 ACM Workshop on Rapid Malcode, 2006
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006
Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 2005 ACM Workshop on Rapid Malcode, 2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Proceedings 38th Annual Simulation Symposium (ANSS-38 2005), 2005
2004
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
2002
Proceedings of the 11th USENIX Security Symposium, 2002
2001
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001
Proceedings of the 2001: A Speaker Odyssey, 2001
2000
Future Gener. Comput. Syst., 2000
Proceedings of the 2nd ACM Conference on Electronic Commerce (EC-00), 2000
1999
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999
Proceedings of the Network and Distributed System Security Symposium, 1999
1998
Leaving the sandbox: Third party validation for Java applications.
Proceedings of the Computers and Their Applications (CATA-98), 1998
1997