Fabian Monrose [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Mitigating Data Leakage by Protecting Memory-resident Sensitive Data ACSAC2019-2019 - San Juan, Puerto Rico
SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security IEEESymposium-2019 - San Francisco, US
SoK: Security Evaluation of Home-Based IoT Deployment IEEESymposium-2019 - San Francisco, US
Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-oriented Attacks IEEEEuropeanSymposiumS&P-2018 - London, United Kingdom
Revisiting Browser Security in the Modern Era: New Data-only Attacks and Defenses EuroSP-2017 - paris,france
Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos USENIX-2016 - austin,usa
Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire NDSS-2016 - california,usa
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming NDSS-2015 - san diego,usa
Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions CCS-2014 - Scottsdale,USA
Isn't that Fantabulous: Security, Linguistic and Usability Challenges of Pronounceable Tokens (Chair: Abe Singer) NSPW-2014 - victoria,usa
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection usenix-2014 - san diego,usa
Opening Remarks and Preview of Stuck in the Ether: An Unconference-esque Session Hotsec-2014 - san diego,usa
Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion SOUPS-2012 - Washington,USA
iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections Confrence-on-computer-communications-security-2011 - Chicago, USA
Dns Prefetching And Its Privacy Implications: When Good Things Go Bad 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2010 - San Jose, USA Security DNS Privacy
Opening Remarks, Awards, And Keynote Address 18th USENIX Security Symposium-2009 - Montreal, Canada Security Keynote
All Your Iframes Point To Us 17th USENIX Security Symposium-2008 - San Jose, USA Security
To Catch A Predator: A Natural Language Approach For Eliciting Malicious Payloads 17th USENIX Security Symposium-2008 - San Jose, USA Security
Opening Remarks 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats-2008 - San Francisco, USA Security
Language Identification Of Encrypted Voip Traffic: Alejandra Y Roberto Or Alice And Bob? 16th USENIX Security Symposium-2007 - Boston, USA Security
Threats 16th USENIX Security Symposium-2007 - Boston, USA Security
On Web Browsing Privacy In Anonymized Netflows 16th USENIX Security Symposium-2007 - Boston, USA Security Web Privacy
Biometric Authentication Revisited: Understanding The Impact Of Wolves In Sheep'S Clothing 15th USENIX Security Symposium-2006 - Vancouver, Canada Security
On The Effectiveness Of Distributed Worm Monitoring 14th USENIX Security Symposium-2005 - Baltimore, USA Monitoring Security
On User Choice In Graphical Password Schemes 13th USENIX Security Symposium-2004 - San Diego, USA Security
Toward Speech-Generated Cryptographic Keys On Resource-Constrained Devices 11th USENIX Security Symposium-2002 - San Francisco, USA Security
The Design And Analysis Of Graphical Passwords 8th USENIX Security Symposium-1999 - Washington DC, USA Security Analysis