Seguir
Andrew M. White
Andrew M. White
Afiliação desconhecida
E-mail confirmado em cs.unc.edu - Página inicial
Título
Citado por
Citado por
Ano
Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks
AM White, AR Matthews, KZ Snow, F Monrose
Security and Privacy (SP), 2011 IEEE Symposium on, 3-18, 2011
1832011
iSpy: Automatic reconstruction of typed input from compromising reflections
R Raguram, AM White, D Goswami, F Monrose, JM Frahm
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1122011
Seeing double: reconstructing obscured typed input from repeated compromising reflections
Y Xu, J Heinly, AM White, F Monrose, JM Frahm
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
982013
Methods, systems, and computer readable media for rapid filtering of opaque data traffic
AM White, F Monrose, S Krishnan, PA Porras, MD Bailey
US Patent 9,973,473, 2018
752018
Identification and classification of web traffic inside encrypted network tunnels
M Christodorescu, X Hu, DL Schales, R Sailer, MP Stoecklin, T Wang, ...
US Patent 9,106,536, 2015
482015
Clear and Present Data: Opaque Traffic and its Security Implications for the Future
AM White, S Krishnan, M Bailey, F Monrose, P Porras
Proceedings of the Network and Distributed Systems Security Symposium (NDSS), 2013
342013
Understanding domain registration abuses
SE Coull, AM White, TF Yen, F Monrose, MK Reiter
Computers and Security, 2012
262012
Understanding Domain Registration Abuses
SE Coull, AM White, TF Yen, F Monrose, MK Reiter
Proceedings of the 25th IFIP International Information Security Conference 330, 2010
262010
Emergent faithfulness to morphological and semantic heads in lexical blends
KE Shaw, AM White, E Moreton, F Monrose
Proceedings of the Annual Meetings on Phonology 1 (1), 2014
222014
On the privacy risks of virtual keyboards: automatic reconstruction of typed input from compromising reflections
R Raguram, AM White, Y Xu, JM Frahm, P Georgel, F Monrose
IEEE Transactions on Dependable and Secure Computing 10 (3), 154-167, 2013
192013
Isn't that Fantabulous: Security, Linguistic and Usability Challenges of Pronounceable Tokens
AM White, K Shaw, F Monrose, E Moreton
Proceedings of the 2014 New Security Paradigms Workshop, 25-38, 2014
72014
Practical analysis of encrypted network traffic
AM White
THE UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL, 2015
22015
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–12