Scott E. Coull

According to our database1, Scott E. Coull authored at least 29 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient Malware Analysis Using Metric Embeddings.
DTRAP, 2024

2022
On the Limitations of Continual Learning for Malware Classification.
Proceedings of the Conference on Lifelong Learning Agents, 2022

2021
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection.
ACM Trans. Priv. Secur., 2021

Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Exploring Backdoor Poisoning Attacks Against Malware Classifiers.
CoRR, 2020

2019
Exploring Adversarial Examples in Malware Detection.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

2015
Marionette: A Programmable Network Traffic Obfuscation System.
Proceedings of the 24th USENIX Security Symposium, 2015

2014
Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond.
IACR Cryptol. ePrint Arch., 2014

Traffic Analysis of Encrypted Messaging Services: Apple iMessage and Beyond.
Comput. Commun. Rev., 2014

2013
Protocol misidentification made easy with format-transforming encryption.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Format-Transforming Encryption: More than Meets the DPI.
IACR Cryptol. ePrint Arch., 2012

Understanding domain registration abuses.
Comput. Secur., 2012

Toward Efficient Querying of Compressed Network Payloads.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

2011
Traffic Analysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Access controls for oblivious and anonymous systems.
ACM Trans. Inf. Syst. Secur., 2011

Bounded Vector Signatures and their Applications.
IACR Cryptol. ePrint Arch., 2011

On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses.
Proceedings of the Network and Distributed System Security Symposium, 2011

2010
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations.
ACM Trans. Inf. Syst. Secur., 2010

2009
On the development of an internetwork-centric defense for scanning worms.
Comput. Secur., 2009

Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials.
Proceedings of the Public Key Cryptography, 2009

Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.
Proceedings of the Network and Distributed System Security Symposium, 2009

2008
Sequence alignment for masquerade detection.
Comput. Stat. Data Anal., 2008

Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Taming the Devil: Techniques for Evaluating Anonymized Network Data.
Proceedings of the Network and Distributed System Security Symposium, 2008

2007
On Web Browsing Privacy in Anonymized NetFlows.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
Proceedings of the Network and Distributed System Security Symposium, 2007

2003
Intrusion Detection: A Bioinformatics Approach.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003


  Loading...