Monrose

Results: 68



#Item
41Code Red / Computer virus / Witty / Morris worm / Malware / SQL Slammer / Parasitic worm / Ice / Failure / Computer worms / Cyberwarfare / Computer security

Worm Evolution Tracking via Timing Analysis Moheeb Abu Rajab Fabian Monrose Andreas Terzis Computer Science Department Johns Hopkins University {moheeb,fabian,terzis}@cs.jhu.edu

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:37
42Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing

Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2012-08-20 18:04:07
43Man-in-the-middle attack / Key / Public-key cryptography / Passphrase / Password strength / OTPW / Cryptography / Key management / Password

Using Voice to Generate Cryptographic Keys Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel Bell Labs, Lucent Technologies Murray Hill, NJ, USA Abstract In this position paper, we motivate and summarize our

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:35
44CAPTCHA / Artificial intelligence / Image processing / Segmentation / Optical flow / Object recognition / Scale-invariant feature transform / Spamming / Computer vision / Vision / Imaging

Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion Y. Xu† , G. Reynaga‡ , S. Chiasson‡ , J-M. Frahm† , F. Monrose† and P. van Oorschot‡ † Department of Computer Scien

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2012-08-05 16:11:33
45Computational linguistics / Orthography / Natural language processing / Speech recognition / Voice / N-gram / Phoneme / Allophone / Alphabet / Linguistics / Phonetics / Phonology

Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iks Andrew M. White∗ Austin R. Matthews∗† Kevin Z. Snow∗ Fabian Monrose∗ ∗ Department of Computer Science † Department of Linguistics

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2011-05-17 10:42:53
46Data / Automatic identification and data capture / Computer accessibility / Speech recognition / Phonetics / Voice over IP / Speex / Hidden Markov model / Communications protocol / Linguistics / Computational linguistics / Information

Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations Charles V. Wright Lucas Ballard Scott E. Coull Fabian Monrose Gerald M. Masson Johns Hopkins University Department of Computer Science Baltimo

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:52
47Surveillance / Password / Computer keyboard / Authentication / Security / Biometrics / Keystroke dynamics

Keystroke Dynamics as a Biometric for Authentication Fabian Monrose Courant Institute of Mathematical Sciences, New York University, New York, NY., [removed]

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:34
48Virtual memory / University of Cambridge Computer Laboratory / Xen / Hyper-V / Rootkit / Hypervisor / Virtualization / Hardware virtualization / Device file / System software / Software / Virtual machines

1 Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches Srinivas Krishnan, Member, IEEE, Kevin Z. Snow, and Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2012-08-20 14:10:31
49Network architecture / Domain Name System Security Extensions / DNS spoofing / Name server / DNS zone / Cache / Load balancing / Web search query / Domain name / Domain name system / Internet / Computing

An Empirical Study of the Performance, Security and Privacy Implications of Domain Name Prefetching Srinivas Krishnan and Fabian Monrose Department of Computer Science, University of North Carolina at Chapel Hill, Chapel

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2011-08-25 20:22:22
50Access control / Password / Keystroke dynamics / Salt / Transaction authentication number / Cryptographic software / Passwd / OTPW / Password strength / Security / Computer security / Cryptography

Password Hardening Based on Keystroke Dynamics Fabian Monrose Michael K. Reiter Susanne Wetzel

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:33
UPDATE