USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 17 results:
Filters: Author is Fabian Monrose [Clear All Filters]
Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators. 32nd USENIX Security Symposium (USENIX Security 23). :5307--5324.
.
2023. Automatic Recovery of Fine-grained Compiler Artifacts at the Binary Level. 2022 USENIX Annual Technical Conference (USENIX ATC 22). :853--868.
.
2022. The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle. 30th USENIX Security Symposium (USENIX Security 21). :3505--3522.
.
2021. Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos. 25th USENIX Security Symposium (USENIX Security 16). :497--512.
.
2016. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. 23rd USENIX Security Symposium (USENIX Security 14). :401--416.
.
2014. Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion. 21st USENIX Security Symposium (USENIX Security 12). :49--64.
.
2012. Toward Efficient Querying of Compressed Network Payloads. 2012 USENIX Annual Technical Conference (USENIX ATC 12). :113--124.
.
2012. SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. DNS Prefetching and Its Privacy Implications: When Good Things Go Bad. 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 10).
.
2010. All Your iFRAMEs Point to Us. 17th USENIX Security Symposium (USENIX Security 08).
.
2008. Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? 16th USENIX Security Symposium (USENIX Security 07).
.
2007. My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging. First Workshop on Hot Topics in Understanding Botnets (HotBots 07).
.
2007. Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing. 15th USENIX Security Symposium (USENIX Security 06).
.
2006. On the Effectiveness of Distributed Worm Monitoring. 14th USENIX Security Symposium (USENIX Security 05).
.
2005. On User Choice in Graphical Password Schemes. 13th USENIX Security Symposium (USENIX Security 04).
.
2004. Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices. 11th USENIX Security Symposium (USENIX Security 02).
.
2002. The Design and Analysis of Graphical Passwords. 8th USENIX Security Symposium (USENIX Security 99).
.
1999.