University of North Carolina, Chapel Hill

General Info

Rank: #51 Worldwide
#36 in US
Papers: 55
Number of Researchers: 33
APA
(average papers per authors):
1.7
Country: USA

Activity Map

Contributors

  • Michael K. Reiter (25 papers)
  • Fabian Monrose (25 papers)
  • Kevin Z. Snow (7 papers)
  • Yinqian Zhang (5 papers)
  • Jan-Michael Frahm (5 papers)
  • Andrew M. White (4 papers)
  • Yi Xu (4 papers)
  • Srinivas Krishnan (3 papers)
  • Ke Coby Wang (3 papers)
  • Robert A. Cochran (2 papers)
  • Jan Werner (2 papers)
  • Ziqiao Zhou (2 papers)
  • Darrell Bethea (1 papers)
  • Alana Libonati (1 papers)
  • Teryl Taylor (1 papers)
  • Nathan Otterness (1 papers)
  • Adam Humphries (1 papers)
  • Saba Eskandarian (1 papers)
  • Austin Matthews (1 papers)
  • Roman Rogowski (1 papers)
  • Sanjeev Das (1 papers)
  • Rui Zhang (1 papers)
  • Cynthia Sturton (1 papers)
  • Rahul Raguram (1 papers)
  • Dibyendusekhar Goswami (1 papers)
  • Jared Heinly (1 papers)
  • Victor Heorhiadi (1 papers)
  • Qiuyu Xiao (1 papers)
  • Mike Reiter (1 papers)
  • True Price (1 papers)
  • Bhushan Jain (1 papers)
  • Donald E. Porter (1 papers)
  • Yufei Du (1 papers)

Papers

"Taming the Devil: Techniques for Evaluating Anonymized Network Data"

Michael K. Reiter, ... -- NDSS 2008

"Towards Practical Biometric Key Generation with Randomized Biometric Templates"

Fabian Monrose, Michael K. Reiter, ... -- CCS 2008

"The Practical Subtleties of Biometric Key Generation"

Michael K. Reiter, ... -- Usenix 2008

"Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis"

Fabian Monrose, ... -- NDSS 2009

"Safe Passage for Passwords and Other Sensitive Data"

Michael K. Reiter, ... -- NDSS 2009

"False data injection attacks against state estimation in electric power grids"

Michael K. Reiter, ... -- CCS 2009

"Privacy-preserving genomic computation through program specialization"

Michael K. Reiter, ... -- CCS 2009

"English shellcode"

Fabian Monrose, ... -- CCS 2009

"Server-side Verification of Client Behavior in Online Games"

Darrell Bethea, Robert A. Cochran, Michael K. Reiter, ... -- NDSS 2010

"Trail of bytes: efficient support for forensic analysis"

Srinivas Krishnan, Kevin Z. Snow, Fabian Monrose, ... -- CCS 2010

"The security of modern password expiration: an algorithmic framework and empirical analysis"

Yinqian Zhang, Fabian Monrose, Michael K. Reiter, ... -- CCS 2010

"On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses"

Fabian Monrose, ... -- NDSS 2011

"Usability Testing a Malware-Resistant Input Mechanism"

Alana Libonati, Michael K. Reiter, ... -- NDSS 2011

"Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iks:"

Andrew M. White, Kevin Z. Snow, Austin Matthews, Fabian Monrose, ... -- Oakland 2011

"HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis"

Yinqian Zhang, Michael K. Reiter, ... -- Oakland 2011

"iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections"

Rahul Raguram, Andrew M. White, Dibyendusekhar Goswami, Fabian Monrose, Jan-Michael Frahm, ... -- CCS 2011

"SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks"

Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, ... -- Usenix 2011

"Cross-VM Side Channels and Their Use to Extract Private Keys"

Yinqian Zhang, Michael K. Reiter, ... -- CCS 2012

"Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion"

Yi Xu, Jan-Michael Frahm, Fabian Monrose, ... -- Usenix 2012

"Toward Online Verification of Client Behavior in Distributed Applications"

Robert A. Cochran, Michael K. Reiter, ... -- NDSS 2013

"Clear and Present Data: Opaque Traffic and its Security Implications for the Future"

Andrew M. White, Srinivas Krishnan, Fabian Monrose, ... -- NDSS 2013

"Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization"

Kevin Z. Snow, Fabian Monrose, ... -- Oakland 2013

"Seeing Double: Reconstructing Obscured Typed Input from Repeated Compromising Reflections"

Yi Xu, Jared Heinly, Andrew M. White, Jan-Michael Frahm, Fabian Monrose, ... -- CCS 2013

"Duppel: Retrofitting Commodity Operating Systems to Mitigate Cache Side Channels in the Cloud"

Yinqian Zhang, Michael K. Reiter, ... -- CCS 2013

"Cross-Tenant Side-Channel Attacks in PaaS Clouds"

Yinqian Zhang, Michael K. Reiter, ... -- CCS 2014

"An Epidemiological Study of Malware Encounters in a Large Enterprise"

Victor Heorhiadi, Michael K. Reiter, ... -- CCS 2014

"Watching the Watchers: Inferring TV Content From Outdoor Light Effusions"

Yi Xu, Fabian Monrose, Jan-Michael Frahm, ... -- CCS 2014

"Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection"

Fabian Monrose, ... -- Usenix 2014

"Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming"

Kevin Z. Snow, Fabian Monrose, ... -- NDSS 2015

"Mitigating Storage Side Channels Using Statistical Privacy Mechanisms"

Qiuyu Xiao, Michael K. Reiter, ... -- CCS 2015

"Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration"

Michael K. Reiter, ... -- CCS 2015

"Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire"

Teryl Taylor, Kevin Z. Snow, Nathan Otterness, Fabian Monrose, ... -- NDSS 2016

"Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks"

Kevin Z. Snow, Roman Rogowski, Jan Werner, Fabian Monrose, ... -- Oakland 2016

"A Software Approach to Defeating Side Channels in Last-Level Caches"

Ziqiao Zhou, Michael K. Reiter, ... -- CCS 2016

"Accessorize to a Crime: Real and Stealthy Attacks on State-Of-The-Art Face Recognition"

Michael K. Reiter, ... -- CCS 2016

"Stealing Machine Learning Models via Prediction APIs"

Michael K. Reiter, ... -- Usenix 2016

"Virtual U: Defeating Face Liveness Detection by Building Virtual Models From Your Public Photos"

Yi Xu, True Price, Jan-Michael Frahm, Fabian Monrose, ... -- Usenix 2016

"Practical Attacks Against Graph-based Clustering"

Fabian Monrose, ... -- CCS 2017

"Static Evaluation of Noninterference using Approximate Model Counting"

Ziqiao Zhou, Michael K. Reiter, ... -- Oakland 2018

"BEAT: Asynchronous BFT Made Practical"

Michael K. Reiter, ... -- CCS 2018

"Statistical Privacy for Streaming Traffic"

Michael K. Reiter, ... -- NDSS 2019

"How to end password reuse on the web"

Ke Coby Wang, Michael K. Reiter, ... -- NDSS 2019

"SoK: Security Evaluation of Home-Based IoT Deployment"

Fabian Monrose, ... -- Oakland 2019

"SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security"

Sanjeev Das, Jan Werner, Fabian Monrose, ... -- Oakland 2019

"Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols"

Mike Reiter, ... -- CCS 2019

"Transys: Leveraging Common Security Properties Across Hardware Designs"

Rui Zhang, Cynthia Sturton, ... -- Oakland 2020

"Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP"

Fabian Monrose, ... -- CCS 2020

"Civet: An Efficient Java Partitioning Framework for Hardware Enclaves"

Bhushan Jain, Donald E. Porter, ... -- Usenix 2020

"Detecting Stuffing of a User's Credentials at Her Own Accounts"

Ke Coby Wang, Michael K. Reiter, ... -- Usenix 2020

"TASE: Reducing Latency of Symbolic Execution with Transactional Memory"

Adam Humphries, ... -- NDSS 2021

"DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection"

Fabian Monrose, ... -- Oakland 2021

"Using Amnesia to Detect Credential Database Breaches"

Ke Coby Wang, ... -- Usenix 2021

"The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle"

Fabian Monrose, ... -- Usenix 2021

"Clarion: Anonymous Communication from Multiparty Shuffling Protocols"

Saba Eskandarian, ... -- NDSS 2022

"Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage"

Yufei Du, ... -- Usenix 2022