Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks AM White, AR Matthews, KZ Snow, F Monrose Security and Privacy (SP), 2011 IEEE Symposium on, 3-18, 2011 | 188 | 2011 |
iSpy: Automatic reconstruction of typed input from compromising reflections R Raguram, AM White, D Goswami, F Monrose, JM Frahm Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 116 | 2011 |
Seeing double: reconstructing obscured typed input from repeated compromising reflections Y Xu, J Heinly, AM White, F Monrose, JM Frahm Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 106 | 2013 |
Methods, systems, and computer readable media for rapid filtering of opaque data traffic AM White, F Monrose, S Krishnan, PA Porras, MD Bailey US Patent 9,973,473, 2018 | 79 | 2018 |
Identification and classification of web traffic inside encrypted network tunnels M Christodorescu, X Hu, DL Schales, R Sailer, MP Stoecklin, T Wang, ... US Patent 9,106,536, 2015 | 51 | 2015 |
Clear and Present Data: Opaque Traffic and its Security Implications for the Future AM White, S Krishnan, M Bailey, F Monrose, P Porras Proceedings of the Network and Distributed Systems Security Symposium (NDSS), 2013 | 34 | 2013 |
Understanding domain registration abuses SE Coull, AM White, TF Yen, F Monrose, MK Reiter Computers and Security, 2012 | 29 | 2012 |
Understanding Domain Registration Abuses SE Coull, AM White, TF Yen, F Monrose, MK Reiter Proceedings of the 25th IFIP International Information Security Conference 330, 2010 | 29 | 2010 |
Emergent faithfulness to morphological and semantic heads in lexical blends KE Shaw, AM White, E Moreton, F Monrose Proceedings of the Annual Meetings on Phonology 1 (1), 2014 | 24 | 2014 |
On the privacy risks of virtual keyboards: automatic reconstruction of typed input from compromising reflections R Raguram, AM White, Y Xu, JM Frahm, P Georgel, F Monrose IEEE Transactions on Dependable and Secure Computing 10 (3), 154-167, 2013 | 19 | 2013 |
Isn't that Fantabulous: Security, Linguistic and Usability Challenges of Pronounceable Tokens AM White, K Shaw, F Monrose, E Moreton Proceedings of the 2014 New Security Paradigms Workshop, 25-38, 2014 | 7 | 2014 |
Practical analysis of encrypted network traffic AM White THE UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL, 2015 | 2 | 2015 |