throbber
Fabian N. Monrose
`
`[A] UNIVERSITY OF NORTH CAROLINA, CHAPEL HILL
`Computer Science Department
`Sitterson Hall, Chapel Hill, NC, 27599
`
`Phone:
`Fax:
`E-mail:
`
`+919-962-1763
`+919-962-1799
`fabian@cs.unc.edu
`
`Last update: November 27, 2016
`
`[B] Education
`
`Ph. D., Computer Science,
`New York University, New York, USA
`Advisor: Prof. Zvi Kedem
`
`Courant Institute of Mathematical Sciences
`May, 1999
`
`M. Sc., Computer Science,
`New York University, New York, USA
`
`Courant Institute of Mathematical Sciences
`May, 1996
`
`B. Sc., Computer Science,
`Miami, Florida, USA
`
`Barry University
`May, 1993
`
`[C] Professional
`Experience
`
`DIRECTOR, Computer and Information Security, Renaissance Computing Institute
`(RENCI, joint appointment),
`January 2014 — present
`
`PROFESSOR,
`Computer Science Department,
`
`ASSOCIATE PROFESSOR,
`Computer Science Department,
`
`ASSOCIATE PROFESSOR,
`Computer Science Department,
`
`ASSISTANT PROFESSOR,
`Computer Science Department,
`
`RESEARCH SCIENTIST,
`Secure Systems Research,
`
`University of North Carolina, Chapel Hill
`January 2013 — present
`
`University of North Carolina, Chapel Hill
`July 2008 — December, 2012
`
`Johns Hopkins University
`July 2007 —June 2008
`
`Johns Hopkins University
`November 2002 — June 2007
`
`Bell Laboratories, Lucent Technologies
`July 1999 — October 2002
`
`RESEARCH INTERN,
`Secure Systems Research Department,
`
`AT&T Labs Research
`Summer 1998
`
`Bell Communications
`RESEARCH INTERN,
`High Availability and Distributed Computing Research Group,
`Summer 1997
`
`RESEARCH INTERN,
`Cryptography and Network Security Research Group,
`
`RESEARCH ASSISTANT,
`Computer Science Department,
`
`Bell Communications
`Summer 1996
`
`New York University
`August 1995 — 1998
`
`Page 1 of 18
`
`VirnetX Exhibit 2020
`Black Swamp IP, LLC v. VirnetX Inc.
`IPR2016-00957
`
`

`

`[D] Honors
`
`RESEARCH ASSISTANT,
`Distributed Systems Group,
`
`New York University
`Summer 1994
`
`• Undergraduate Students Teaching Award, Computer Science Dpt.
`• Best Student Paper Award, IEEE Symposium on Security & Privacy
`• Outstanding Research in Privacy Enhancing Technologies (PET),
`• AT&T Best Applied Security Paper Award, NYU-Poly CSAW,
`• Best Paper Award, IEEE Symposium on Security & Privacy,
`• Best Paper Award, Intl. Conf. on Internet Monitoring and Protection,
`• Faculty Research Award, Google
`• Faculty Research Award, Google
`• CAREER Award, National Science Foundation,
`• Best Student Paper Award, 8th USENIX Security Symposium
`• Best Overall Paper Award, 8th USENIX Security Symposium
`• USENIX Scholars Research Award
`• Bell Communications Research Scholarship
`
`May, 2015
`
`May, 2013
`
`July, 2012
`
`Nov, 2011
`
`May, 2011
`
`April, 2011
`
`May, 2011
`
`March, 2009
`
`February, 2006
`
`August, 1999
`
`August, 1999
`
`Fall 1998
`
`Fall 1997
`
`[E]: Funding
`
`Awarded Grants & Contracts
`
`[G1] Co-PI, DARPA, RHAMNOUSIA: ATTRIBUTING CYBER ACTORS THROUGH TENSOR DE-
`COMPOSITION AND NOVEL DATA ACQUISITION for $1.8M, Nov. 2016 — August
`2021.
`
`[G2] PI, Department of Defense University Research Instrumentation Program (DURIP),
`NEXT GENERATION DEFENSES AGAINST WEB-BASED EXPLOITS for $116, 500.00, April,
`2016 — May 2017.
`
`[G3] Co-PI (with Jan-Michel Frahm (lead)), Department of Defense University Research In-
`strumentation Program (DURIP), UNDERSTANDING PRIVACY RISKS OF UBIQUITOUS
`PERSONAL AUGMENTED REALITY HEAD-MOUNTED DISPLAYS for $95, 385.00, June,
`2014 — May 2015.
`
`[G4] PI (with A. Stavrou), NSF Secure and Trustworthy Computing, TWC: TTP OPTION:
`SMALL: SCALABLE TECHNIQUES FOR BETTER SITUATIONAL AWARENESS: ALGORITH-
`
`Fabian Monrose
`
`page 2
`
`Page 2 of 18
`
`

`

`MIC FRAMEWORKS AND LARGE SCALE EMPIRICAL ANALYSES for $667, 900.00, Sept.
`2014—August 2017.
`
`[G5] PI Department of Homeland Security Transition to Practice Program, SUPPLEMENT TO
`NSF SDCI SEC: NEW SOFTWARE PLATFORMS FOR SUPPORTING NETWORK-WIDE DE-
`TECTION OF CODE INJECTION ATTACKS for $350, 000.00, Sept. 2014—August 2015.
`
`[G6] PI, Department of Defense University Research Instrumentation Program (DURIP),
`NEXT-GENERATION DEFENSES FOR SECURING VOIP COMMUNICATIONS for $114, 345.00,
`June, 2013 — May 2014.
`
`[G7] PI, NSF Secure and Trustworthy Computing, SUPPORT FOR THE 2014 USENIX SECURITY
`SYMPOSIUM; SAN DEIGO for $20, 000.00, July 30, 2014— October 2015.
`
`[G8] PI (with Elliott Moreton and Jennifer Smith), NSF Secure and Trustworthy Computing,
`TOWARD PRONOUNCEABLE AUTHENTICATION STRINGS for $499, 997.00, Aug. 2013—
`July 2016.
`
`[G9] PI, NSF Secure and Trustworthy Computing, SUPPORT FOR THE 2013 USENIX SECURITY
`SYMPOSIUM; WASHINGTON D.C. for $10, 000.00, July 30, 2013— October 2013.
`
`[G10] PI, Department of Homeland Security, EFFICIENT TRACKING, LOGGING, AND BLOCK-
`ING OF ACCESSES TO DIGITAL OBJECTS (with C. Schmitt and M. Bailey) for $1, 035, 590.
`September 2012 — August 2014.
`
`[G11] Co-PI (with Jan-Michel Frahm (lead)), NSF Division of Information & Intelligent Sys-
`tems, EAGER: AUTOMATIC RECONSTRUCTION OF TYPED INPUT FROM COMPROMIS-
`ING REFLECTIONS for $151, 749.00, August 2011—July 2013.
`
`[G12] PI, Verisign Labs Research Awards Program, ON EXPLORING APPLICATIONS OF PHO-
`NETIC EDIT DISTANCE for $65, 000.00, June 2011.
`
`[G13] PI, Google Faculty Research Awards Program, SHELLOS: AN EFFICIENT RUNTIME PLAT-
`FORM FOR DETECTING CODE INJECTION ATTACKS for $61, 635.00, May 2011.
`
`[G14] PI (with Montek Singh), NSF Office of Cyberinfrastructure, SDCI SEC: NEW SOFTWARE
`PLATFORMS FOR SUPPORTING NETWORK-WIDE DETECTION OF CODE INJECTION AT-
`TACKS for $800, 000.00, Aug. 2011—July 2014.
`
`[G15] PI, NSF Trustworthy Computing, SUPPORT FOR THE 2011 USENIX SECURITY SYMPO-
`SIUM; SAN FRANCISCO for $20, 000.00, July 30, 2011— October 2011.
`
`[G16] PI (with Kevin Jeffay), NSF Trustworthy Computing, TC: SMALL: EXPLORING PRIVACY
`BREACHES IN ENCRYPTED VOIP COMMUNICATIONS for $496, 482.00, Aug. 2010—July
`2013.
`
`[G17] PI, NSF Trustworthy Computing, SUPPORT FOR THE 2010 USENIX SECURITY SYMPO-
`SIUM; WASHINGTON D.C. for $20, 000.00, July 30, 2010— October 2010.
`
`[G18] Co-PI (with Angelos Stavrou (lead)), NSF Trustworthy Computing, COLLABORATIVE
`RESEARCH: SCALABLE MALWARE ANALYSIS USING LIGHTWEIGHT VIRTUALIZATION
`for $259, 264.00, Sept. 2009—August 2011.
`
`Fabian Monrose
`
`page 3
`
`Page 3 of 18
`
`

`

`[G19] PI (with Angelos Stavrou), DETECTING AND MONITORING MALFEASANCE ON THE
`NET, Google Faculty Research Awards Program for $90, 000.00, March 2009–Feb 2010.
`
`[G20] Co-PI, NSF Cyber Trust: CLEANSE:CROSS-LAYER LARGE-SCALE EFFICIENT ANALY-
`SIS OF NETWORK ACTIVITIES TO SECURE THE INTERNET (with W. Lee (lead), N. Feam-
`ster, J. Giffin, M.K. Reiter, F. Jahanian, P. Porras, P. Vixie, D. Dagon) for $1, 839, 297.00,
`July 2008 — June 2012.
`
`[G21] PI, Department of Homeland Security, NEW FRAMEWORKS FOR DETECTING AND
`MINIMIZING INFORMATION LEAKAGE IN ANONYMIZED NETWORK DATA (with M.
`K. Reiter and F. Jahanian) for $962, 609.00. April 2008—April 2011.
`
`[G22] Co-PI (with G. Masson (lead)), SECURITY THROUGH VIRTUALIZATION. Information
`Assurance Scholarship Program for $142, 948.00. DoD, ANNEX II, Feb, 2008.
`
`[G23] Co-PI, NSF Cyber Trust: THINKING AHEAD: A PROACTIVE APPROACH FOR COUN-
`TERING FUTURE INTERNET MALWARE (with A. Terzis (lead)) for $350, 000.00. Septem-
`ber 2006 — August 2009.
`
`[G24] PI, NSF Cyber Trust: CAREER:TOWARDS EFFECTIVE IDENTIFICATION OF APPLICA-
`TION BEHAVIORS IN ENCRYPTED TRAFFIC for $400, 000.00. September 2006 — August
`2011.
`
`[G25] PI, NSF Cyber Trust: GENERATIVE MODELS FOR IMPROVING BIOMETRICALLY EN-
`HANCED SYSTEMS (with D. Lopresti and M. K. Reiter) for $696, 553.00. December 2004
`— October 2007.
`
`[G26] Co-PI, NSF STI: TOWARDS MORE SECURE INTER-DOMAIN ROUTING (with A. Rubin
`(lead)) for $616, 923.00. November 2003 — June 2006.
`
`[F] Bib.
`
`Refereed
`Conference
`Publications
`
`[P1] Revisiting Browser Security in the Modern Era: New Data-only Attacks and Defenses. Roman
`Rogowski, Micah Morton, Forrest Li, Kevin Z. Snow, Fabian Monrose and Michalis
`Polychronakis. In Proceedings of the IEEE European Symposium on Security and Pri-
`vacy, March 2017. (Acceptance rate=17.5%).
`
`[P2] Virtual U: Defeating Face Liveness Detection by Building Virtual Models From Your Public
`Photos. Yi Xu, True Price, Jan-Michael Frahm and Fabian Monrose. In Proceedings of
`the USENIX Security Symposium, August 2016. (Acceptance rate=15.5%).
`
`[P3] Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code-Inference At-
`tacks. Kevin Z. Snow, Roman Rogowski, Jan Werner, Hyungjoon Koo, Fabian Monrose
`and Michalis Polychronakis. In Proceedings of the IEEE Symposium on Security and
`Privacy, May, 2016. (Acceptance rate=14%).
`
`Fabian Monrose
`
`page 4
`
`Page 4 of 18
`
`

`

`[P4] No-Execute-Affter-Read: Preventing Code Disclosures in Commodity Software. Jan Werner,
`George Baltas, Rob Dallara, Nathan Otterness, Kevin Snow, Fabian Monrose and Michalis
`Polychronakis. In Proceedings of the ACM Asia Conference on Computer and Com-
`munication Security, May 2016. (Acceptance rate=21%).
`
`[P5] Detecting Malicious Exploit Kits using Tree-based Similarity Searches. Teryl Taylor, Xin
`Hu, Ting Wang, Jiyong Jang, Marc Stoeckin, Fabian Monrose and Reiner Sailer.
`In
`Proceedings of the ACM Conference on Data and Application Security and Privacy,
`pages 255-266, March, 2016.
`
`[P6] Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire.
`Teryl Taylor, Kevin Snow, Nathan Otterness and Fabian Monrose. In Proceedings of
`the 23nd ISOC Network and Distributed Systems Security Symposium (NDSS), Feb.,
`2016. (Acceptance rate=15.4%).
`
`[P7] Isomeron: Code Randomization Resilient to (Just-in-Time) Return-Oriented Programming.
`Luca Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Z. Snow, and Fabian
`Monrose. In Proceedings of the 22nd ISOC Network and Distributed Systems Security
`Symposium (NDSS), Feb., 2015. (Acceptance rate=21%).
`
`[P8] Watching the Watchers: Inferring TV Content from Outdoor Light Effusions. Yi Xu, Jan-
`Michael Frahm and Fabian Monrose.
`In Proceedings of the 21st ACM Conference
`on Computer and Communications Security (CCS), November, 2014.
`(Acceptance
`rate=19%).
`
`[P9] Emergent Faithfulness to Morphological and Semantic Heads in Lexical Blends. Katherine
`Shaw, Elliott Moreton, Andrew White and Fabian Monrose.
`In Proceedings of the
`Annual Meeting on Phonology, February, 2014.
`
`[P10] Seeing Double: Reconstructing Obscured Typed Input from Repeated Compromising Reflec-
`tions. Yi Xu, Jared Heinly, Andrew M. White, Fabian Monrose and Jan-Michael Frahm.
`In Proceedings of the 20th ACM Conference on Computer and Communications Secu-
`rity (CCS), November, 2013. (Acceptance rate=20%)
`
`[P11] Check my profile: Leverage static analysis for fast and accurate detection of ROP gadgets.
`Blaine Stancill, Kevin Snow, Nathan Otterness, Fabian Monrose, Lucas Davi, and Ahmad-
`Reza Sadeghi.
`In Proceedings of the 16th International Symposium on Research in
`Attacks, Intrusions, and Defenses, October, 2013.
`
`[P12] Crossing the Threshold: Detecting Network Malfeasance via Sequential Hypothesis Testing.
`Srinivas Krishnan, Teryl Taylor, Fabian Monrose and John McHugh. In Proceedings
`of the 42nd Annual IEEE/IFIP International Conferences on Dependable Systems and
`Networks; Performance and Dependability Symposium, June, 2013.
`
`[P13] Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Ran-
`domization. Kevin Snow, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen,
`Fabian Monrose and Ahmad-Reza Sadeghi. In Proceedings of 34th IEEE Symposium
`on Security and Privacy, May, 2013. (Best Student Paper Award). (Acceptance rate=12%)
`
`Fabian Monrose
`
`page 5
`
`Page 5 of 18
`
`

`

`[P14] Clear and Present Data: Opaque Traffic and its Security Implications for the Future. An-
`drew White, Srinivas Krishnan, Michael Bailey, Fabian Monrose and Phil Porras. In
`Proceedings of the 20th ISOC Network and Distributed Systems Security Symposium,
`Feb., 2013. (Acceptance rate=18.8%)
`
`[P15] Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in
`Motion. Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Mon-
`rose and Paul van Oorschot. In Proceedings of the 21th USENIX Security Symposium,
`August, 2012. (Acceptance rate=19%)
`
`[P16] Toward Efficient Querying of Compressed Network Payloads. Teryl Taylor, Scott E. Coull,
`Fabian Monrose and John McHugh. In USENIX Annual Technical Conference, June,
`2012. (Acceptance rate=18%)
`
`[P17] iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections. Rahul
`Raguram, Andrew White, Dibyendusekhar Goswami, Fabian Monrose and Jan-Michael
`Frahm. In Proceedings of the 18th ACM Conference on Computer and Communica-
`tions Security (CCS), November, 2011. (Acceptance rate=14%)
`
`[P18] ShellOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks. Kevin
`Snow, Srinivas Krishnan, Fabian Monrose and Niels Provos. In Proceedings of the 20th
`USENIX Security Symposium, August, 2011. (Acceptance rate=17%)
`
`[P19] An Empirical Study of the Performance, Security and Privacy Implications of Domain Name
`Prefetching. Srinivas Krishnan and Fabian Monrose. In Proceedings of the 41st Annual
`IEEE/IFIP International Conferences on Dependable Systems and Networks; Depend-
`able Computing and Communications Symposium, June, 2011. (Acceptance rate=17.6%)
`
`[P20] Amplifying Limited Expert Input to Sanitize Large Network Traces. Xin Huang, Fabian
`Monrose, and Michael K. Reiter. In Proceedings of the 41st Annual IEEE/IFIP Interna-
`tional Conferences on Dependable Systems and Networks; Performance and Depend-
`ability Symposium, June, 2011.
`
`[P21] Phonotactic Reconstruction of Encrypted VoIP Conversations. Andrew White, Kevin Snow,
`Austin Matthews and Fabian Monrose. In Proceedings of 32nd IEEE Symposium on
`Security and Privacy, May, 2011. (Best Paper Award). (Acceptance rate=11.1%)
`
`[P22] Towards Optimized Probe Scheduling for Active Measurement Studies. Daniel Kumar, Fabian
`Monrose and Michael K. Reiter. In Proceedings of the 6th International Conference on
`Internet Monitoring and Protection (ICIMP), March, 2011 (Best Paper Award).
`
`[P23] On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analy-
`ses. Scott Coull, Micheal Bailey and Fabian Monrose. In Proceedings of the 18th Annual
`Network and Distributed Systems Security Symposium, February, 2011. (Acceptance
`rate=20%)
`
`[P24] Trail of Bytes: Efficient Support for Forensic Analysis. Srinivas Krishnan, Kevin Snow,
`and Fabian Monrose. In Proceedings of the 17th ACM Conference on Computer and
`Communications Security (CCS), November, 2010. (Acceptance rate=17.2%)
`
`[P25] The Security of Modern Password Expiration: An Algorithmic Framework and Empirical
`Analysis. Yinqian Zhang, Fabian Monrose, and Michael K. Reiter. In Proceedings of the
`
`Fabian Monrose
`
`page 6
`
`Page 6 of 18
`
`

`

`17th ACM Conference on Computer and Communications Security (CCS), November,
`2010. (Acceptance rate=17.2%)
`
`[P26] Traffic Classification using Visual Motifs: An Empirical Evaluation. Wilson Lian, Fabian
`Monrose and John McHugh. In Proceedings of the 7th International Symposium on
`Visualization for Cyber Security (VizSec), September, 2010.
`
`[P27] Understanding Domain Registration Abuses. Scott Coull, Andrew White, Ting-Fang Yen,
`Fabian Monrose and Michael K. Reiter. In Proceedings of the International Information
`Security Conference, September, 2010.
`
`[P28] English Shellcode. Josh Mason, Sam Small, Greg McManus and Fabian Monrose. In
`Proceedings of the 16th ACM Conference on Computer and Communications Security
`(CCS), pages 524-533, November, 2009. (Acceptance rate=18.4%)
`
`[P29] Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications. Ting-
`Fang Yen, Xin Huang, Fabian Monrose and Michael K. Reiter. In Proceedings of 6th
`Conference on Detection of Intrusions and Malware and Vulnerability Assessment,
`pages 157-175, July, 2009.
`
`[P30] Toward Resisting Forgery Attacks via Pseudo-Signatures.
`Jin Chen, Dan Lopresti and
`Fabian Monrose. In Proceedings of 10th International Conference on Document Anaal-
`ysis and Recognition (ICDAR), July, 2009.
`
`[P31] The Challenges of Effectively Anonymizing Network Data. Scott Coull, Fabian Monrose,
`Michael K. Reiter and Michael Bailey. In Proceedings of the DHS Cybersecurity Appli-
`cations and Technology Conference for Homeland Security (CATCH), pages 230-236,
`2009.
`
`[P32] Efficient Defenses Against Statistical Traffic Analysis. Charles Wright, Scott Coull and
`Fabian Monrose. In Proceedings of Network and Distributed Systems Security, pages
`237-250 Feb, 2009. (Acceptance rate=11.7%).
`
`[P33] Towards Practical Biometric Key Generation with Randomized Biometric Templates. Lucas
`Ballard, Seny Kamara, Fabian Monrose, and Michael K. Reiter. In Proceedings of the
`15th ACM Conference on Computer and Communications Security, pages 235-244.
`Oct, 2008. (Acceptance rate=18.2%).
`
`[P34] All Your iFrames point to us: Characterizing the new malware frontier. Niels Provos,
`Panayiotis Mavrommatis, Moheeb Rajab, and Fabian Monrose. In Proceedings of the
`17th USENIX Security Symposium, pages 1-15, July, 2008. (Acceptance rate=15.9%).
`
`[P35] To Catch a Predator: A Natural Language Approach for Eliciting Protocol Interaction. Sam
`Small, Josh Mason, Fabian Monrose, Niels Provos and Adam Stubblefield. In Proceed-
`ings of the 17th USENIX Security Symposium, pages 171-183, July, 2008. (Acceptance
`rate=15.9%).
`
`[P36] Peeking Through the Cloud: DNS-based client estimation techniques and its applications.
`Moheeb Rajab, Niels Provos, Fabian Monrose and Andreas Terzis. In Proceedings of
`the 6th Applied Cryptography and Network Security conference (ACNS), pages 21-38,
`June, 2008.
`
`Fabian Monrose
`
`page 7
`
`Page 7 of 18
`
`

`

`[P37] Spot Me If You Can: recovering spoken phrases in encrypted VOIP conversations. Charles
`Wright, Lucas Ballard, Scout Coull and Fabian Monrose. In Proceedings of 29th IEEE
`Symposium on Security and Privacy, May, 2008 (17 pages).(Acceptance rate=11.2%).
`
`[P38] Taming the Devil: Techniques for Evaluating Anonymized Network Data. Scott Coull,
`Charles Wright, Angelos Keromytis, Fabian Monrose, and Michael Reiter. In Proceed-
`ings of the 15th Annual Network and Distributed Systems Security Symposium, pages
`125-146, Feb., 2008 (Acceptance rate=18%).
`
`[P39] On Web Browsing Privacy in Anonymized NetFlows. Scott Coull, Michael Collins, Charles
`Wright, Fabian Monrose, and Michael Reiter. In Proceedings of the 16th USENIX Secu-
`rity Symposium, pages 339-352, August, 2007. (Acceptance rate=12.29%).
`
`[P40] Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?
`Charles Wright, Lucas Ballard, Fabian Monrose and Gerald Masson. In Proceedings
`of the 16th USENIX Security Symposium, pages 43-54, August, 2007.
`(Acceptance
`rate=12.29%).
`
`[P41] Towards Valley-free Inter-domain Routing. Sophie Qiu, Patrick McDaniel and Fabian
`Monrose. In Proceedings of the IEEE International Conference on Communications,
`June, 2007. (8 pages)
`
`[P42] Playing Devil’s Advocate: Inferring Sensitive Information from Anonymized Traces. Scott
`Coull, Charles Wright, Fabian Monrose, Michael Collins and Michael Reiter. In Pro-
`ceedings of the 14th Annual Network and Distributed Systems Security Symposium
`(NDSS), pages 35-47, February 2007. (Acceptance rate=15%).
`
`[P43] A Multifaceted Approach to Understanding the Botnet Phenomenon. Jay Zarfoss, Moheeb
`Rajab, Fabian Monrose, and Andreas Terzis. In Proceedings of the ACM SIGCOMM/-
`USENIX Internet Measurement Conference (IMC), pages 41-52, October, 2006. (Accep-
`tance rate=15.25%).
`
`[P44] Fast and Evasive Attacks: Highlighting the Challenges Ahead. Moheeb Rajab, Fabian Mon-
`rose, and Andreas Terzis. In Proceedings of the 9th International Symposium on Recent
`Advances in Intrusion Detection (RAID), pages 206-225, September, 2006 (Acceptance
`rate=17.2%).
`
`[P45] Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep’s Clothing.
`Lucas Ballard, Fabian Monrose, and Daniel Lopresti. In Proceedings of the USENIX
`Security Symposium, pages 29-41, August 2006 (Acceptance rate=12.3%).
`
`[P46] On Origin Stability in Inter-Domain Routing. Sophie Qui, Patrick McDaniel, Fabian
`Monrose and Aviel D. Rubin.
`In Proceedings of IEEE International Symposium on
`Computers and Communications (ISCC), pages 489-496, July, 2006.
`
`[P47] Memory Bound Puzzles: A Heuristic Approach. Sujata Doshi, Fabian Monrose and Aviel
`D. Rubin. In Proceedings of the International Conference on Applied Cryptography
`and Network Security (ACNS), pages 98-113, June 2006 (Acceptance rate=15.13%).
`
`[P48] Achieving Efficient Conjunctive Searches on Encrypted Data. Lucas Ballard, Seny Kamara
`and Fabian Monrose. In Proceedings of 7th International Conference on Information
`and Communications Security (ICICS), pages 414-426, December, 2005. (Acceptance
`rate=18%)
`
`Fabian Monrose
`
`page 8
`
`Page 8 of 18
`
`

`

`[P49] On the Effectiveness of Distributed Worm Monitoring. Moheeb Rajab, Fabian Monrose
`and Andreas Terzis. In Proceedings of 14th USENIX Security Symposium, pages 225-
`237, August, 2005. (Acceptance rate=14.8%)
`
`[P50] Scalable VPNs for the Global Information Grid. Bharat Doshi, Antonio De Simone, Fabian
`Monrose, Samuel Small, and Andreas Terzis. In Proceedings of IEEE MILCOM, May,
`2005. (7 pages)
`
`[P51] An Extensible Platform for Evaluating Security Protocols. Seny Kamara, Darren Davis,
`Ryan Caudy and Fabian Monrose. In Proceedings of the 38th Annual IEEE Simulation
`Symposium (ANSS), pages 204-213, April, 2005.
`
`[P52] Efficient Time Scoped Searches on Encrypted Audit Logs. Darren Davis, Fabian Monrose,
`In Proceedings of the 5th International Conference on Informa-
`and Michael Reiter.
`tion and Communications Security (ICICS), pages 532-545, October, 2004. (Acceptance
`rate=17%)
`
`[P53] On User-Choice in Graphical Password Systems. Darren Davis, Fabian Monrose, and
`Michael Reiter. In Proceedings of the 13th USENIX Security Symposium, pages 151-
`164, August, 2004. (Acceptance rate=12%)
`
`[P54] Toward Speech-Generated Cryptographic Keys on Resource Constrained Devices. Fabian
`Monrose, Micheal Reiter, Daniel Lopresti, Chilin Shih, and Peter Li. In Proceedings
`of the 11th USENIX Security Symposium, pages 283–296, August, 2002. (Acceptance
`rate=16%)
`
`[P55] Using Voice to Generate Cryptographic Keys: A Position Paper. Fabian Monrose, Michael
`Reiter, Peter Li and Susanne Wetzel. In Proceedings of the 2001: A Speaker Odyssey
`workshop, pages 237-242, 2001.
`
`[P56] Cryptographic Key Generation from Voice. Fabian Monrose, Michael Reiter, Peter Li and
`Susanne Wetzel. In Proceedings of the 21st Annual IEEE Symposium on Security &
`Privacy, pages 202-212, May 2001. (Acceptance rate=17.75%)
`
`[P57] Privacy-Preserving Global Customization. Bob Arlein, Ben Jai, Markus Jakobsson, Fabian
`Monrose, and Michael Reiter. In Proceedings of the 2nd ACM Conference on Electronic
`Commerce, pages 176-184. April 2000. (Acceptance rate=18%)
`
`[P58] Password Hardening using Keystroke Dynamics. Fabian Monrose, Michael K. Reiter and
`Susanne Wetzel. In Proceedings of the 6th ACM Conference on Computer and Com-
`munications Security, pages 73-82, November 1999. (Acceptance rate=19.3%)
`
`[P59] The Design and Analysis of Graphical Passwords. Ian Jermyn, Alain Mayer, Fabian Mon-
`rose, Michael K. Reiter and Aviel D. Rubin. In Proceedings for the 8th USENIX Security
`Symposium, pages 1-14, August 1999. (Best Paper Award). (Acceptance rate=26%)
`
`[P60] Distributed Execution with Remote Audit. Fabian Monrose, Peter Wyckoff and Aviel D.
`Rubin. In Proceedings of the ISOC Network and Distributed Systems Security Sympo-
`sium (NDSS), pages 103-113, February 1999. (Acceptance rate=24%)
`
`[P61] Third Party Validation for Java Applications.
`Ian Jermyn, Fabian Monrose, and Peter
`Wyckoff. In Proceedings of the International Conference on Computers and their Ap-
`plications, March 1998.
`
`Fabian Monrose
`
`page 9
`
`Page 9 of 18
`
`

`

`[P62] Authentication via Keystroke Dynamics. Fabian Monrose and Aviel D. Rubin. In Proceed-
`ings of the 4th ACM Conference on Computer and Communications Security, pages
`48-56, April 1997. (Acceptance rate=26.6%)
`
`Refereed
`Journal
`Publications
`
`[P63] Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in
`Motion. Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm and Fabian Mon-
`rose. IEEE Transactions on Dependable and Secure Computing, February, 2014.
`
`[P64] On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from
`Compromising Reflections. Rahul Raguram, Andrew White, Yi Xu, Jan-Michel Frahm,
`Pierre Georgel, and Fabian Monrose. IEEE Transactions on Dependable and Secure
`Computing, Volume 10, Issue 3, pages 154-167, May-June, 2013.
`
`[P65] Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches.
`Srinivas Krishnan, Kevin Snow, and Fabian Monrose. IEEE Transactions on Informa-
`tion Forensics and Security, pages 1876-1889, Issue 6, Volume 7, 2012.
`
`[P66] Understanding Domain Registration Abuses (Invited Paper). Scott Coull, Andrew White,
`Ting-Fang Yen, Fabian Monrose and Michael K. Reiter. Special Issue of Computers &
`Security (COSE), pages 806-815, Volume 31, Number 7, October, 2012.
`
`[P67] Uncovering Spoken Phrases in Encrypted Conversations. Charles Wright, Lucas Ballard,
`Scott Coull, Fabian Monrose, and Gerald Masson. ACM Transactions on Information
`and Systems Security (TISSEC), Volume 13, Number 4, pages 1 - 30, December, 2010.
`
`[P68] Peeking Through the Cloud: Client Density Estimation via DNS Cache Probing. Moheeb
`Abu Rajab, Fabian Monrose and Niels Provos. ACM Transactions on Internet Tech-
`nologies (TOIT), Volume 10, Number 3, October, 2010.
`
`[P69] Forgery Quality for Behavioral Biometric Security. Lucas Ballard, Daniel Lopresti and
`Fabian Monrose. IEEE Transactions on System, Man and Cybernetics, (Special Issue
`on Biometric Security), pages 1107-1118, December, 2006. (Acceptance rate=18.75%).
`
`[P70] On Inferring Application Protocol Behaviors in Encrypted Network Traffic. Charles Wright,
`Fabian Monrose, and Gerald Masson. Journal of Machine Learning Research (Special
`Issue on Machine Learning for Computer Security), Volume 7, pages 2745-2769, De-
`cember, 2006. (Acceptance rate=20%)
`
`[P71] Password Hardening using Keystroke Dynamics. Fabian Monrose, Micheal Reiter, and
`Susanne Wetzel. In Journal of Information Security (IJCS), Volume 1, Number 2, pages
`69-83, February 2002.
`
`[P72] Keystroke Dynamics as a Biometric for Authentication. Fabian Monrose and Aviel D. Ru-
`bin. Future Generation Computing Systems Journal: Security on the Web (Special Is-
`sue), pages 351-359, volume 16, March 2000.
`
`Fabian Monrose
`
`page 10
`
`Page 10 of 18
`
`

`

`Refereed
`Workshop
`Publications
`
`[P73] Isn’t that Fantabulous: Security, Linguistic and Usability Challenges of Pronounceable To-
`kens. Andrew White, Katherine Shaw, Fabian Monrose and Elliott Moreton. In Pro-
`ceedings of the New Security Paradigms Workshop (NSPW), September, 2014. (Ac-
`ceptance rate=32%).
`
`[P74] Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks: Tech-
`niques and Empirical Analyses. Kevin Snow and Fabian Monrose. In Proceedings of the
`European Workshop on System Security (EuroSec), April, 2012. (6 pages).
`
`[P75] DNS Prefetching and Its Privacy Implications. Srinivas Krishnan and Fabian Monrose.
`In Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent
`Threats, April, 2010. (9 pages)
`
`[P76] Secure Recording of Accesses to a Protected Datastore. Srinivas Krishnan and Fabian Mon-
`rose. In Proceedings of the 2nd ACM Workshop on Virtual Machine Security (VMSec),
`pages 23-32, November, 2009.
`
`[P77] My Botnet is Bigger than Yours (Maybe, Better than Yours): Why size estimates remain chal-
`lenging. Moheeb Rajab, Jay Zarfoss, Fabian Monrose and Andreas Terzis. In Proceed-
`ings of USENIX Workshop on Hot Topics in Understanding Botnets, April, 2007 (Ac-
`ceptance rate=32.4%) (8 pages).
`
`[P78] Using Visual Motifs to Classify Encrypted Traffic. Charles Wright, Fabian Monrose and
`Gerald Masson. In Proceedings of the ACM Workshop of Visualization for Computer
`Security (VizSEC), November, 2006 (Acceptance rate=34%) (8 pages).
`
`[P79] On the Impact of Dynamic Addressing on Malware Propagation. Moheeb Rajab, Fabian
`Monrose, and Andreas Terzis. In Proceedings of the 4th ACM Workshop of Recurring
`Malcode (WORM), November, 2006 (Acceptance rate=29%) (8 pages)
`
`[P80] Efficient Techniques for Detecting False Origin Advertisements in Inter-domain Routing. So-
`phie Qui, Patrick McDaniel, Fabian Monrose, and Andreas Terzis. In Proceedings of
`the 2nd Workshop on Secure Network Protocols, pages 12-19, November 2006. (Accep-
`tance rate=40%).
`
`[P81] Evaluating the Security of Handwriting Biometrics. Lucas Ballard, Daniel Lopresti and
`Fabian Monrose. In Proceedings of the 10th International Workshop on Frontiers in
`Handwriting Recognition, pages 461-466, October, 2006 (Acceptance rate=28.5%).
`
`[P82] Worm Evolution Tracking via Timing Analysis. Moheeb Rajab, Fabian Monrose and
`In Proceedings of the 3rd ACM Workshop on Recurring Malware
`Andreas Terzis.
`(WORM), pages 52-59, November, 2005 (Acceptance rate=25%).
`
`[P83] HMM Profiles for Network Traffic Classification (extended Abstract). Charles Wright, Fabian
`Monrose and Gerald Masson. In Proceedings of ACM Workshop on Visualization and
`Data Mining for Computer Security (VizSEC/DMSEC), pages 9-15, October, 2004.
`
`Fabian Monrose
`
`page 11
`
`Page 11 of 18
`
`

`

`Book Chapters
`
`[B1] Graphical Passwords (revisited). Fabian Monrose and Micheal Reiter. Security and Usabil-
`ity: Designing Security Systems That People Can Use. Editors: Lorrie Cranor and Simson
`Garfinkel. OReilly & Associates, 2005.
`
`Manuscripts
`in Progress
`
`[U84] Caught Red Handed: Video-based subsequence matching under real-world transfor-
`mations. Y. Xu, J-M. Frahm, and Fabian Monrose. Submitted for peer review, 2016.
`
`[U85] Winter is Coming: Keeping Zombie Gadget at Bay by Rerandomizing after Disclo-
`sure. Micah Morton, Forrest Li, Kevin Snow. Submitted for peer review, 2016.
`
`[U86] The Rise of Rampant Misconfigurations, Vulnerabilities and Privacy Leakages in the
`Internet of Things Era. C. Lever, A. Hall, O Alrawi, Y. Nadji, K. Flansburg, J. Werner,
`M. Antonakakis and F. Monrose. Submitted for peer review, 2016.
`
`[U87] Tackling the Fear of the Unknown in Network Security: New methods and large-scale
`empirical analyses. C. Lever, Y. Nadji, F. Monrose, D. Dagon and M. Antonakakis.
`Submitted for peer review, 2016.
`
`Other
`Manuscripts
`
`[M88] Towards Stronger User Authentication, Ph.D. Thesis. Fabian Monrose. Courant Institute
`of Mathematical Sciences, New York University, May 1999.
`
`[M89] Correlation Resistant Storage. Lucas Ballard, Mathew Green, Breno de Medeiros and
`Fabian Monrose. Cryptology ePrint Archive Report 2005/417.
`
`[M90] Evaluating Biometric Security (Invited Paper). Daniel Lopresti, Lucas Ballard and Fabian
`In Proceedings of the 1st Korea-Japan Workshop on Pattern Recognition,
`Monrose.
`November 2006. (6 pages)
`
`[M91] Biometric Key Generation using Pseudo-Signatures (Poster Presentation). Lucas Ballard,
`Jin Chen, Daniel Lopresti and Fabian Monrose. In International Conference on Fron-
`tiers of Handwriting Recognition, Feb. 2008 (8 pages).
`
`[M92] Masquerade: Simulating a Thousand Victims Sam Small, Josh Mason, Ryan MacArthur.
`In ;login: The USENIX Magazine, December 2008.
`
`[G]: Teaching
`Activities
`• Introduction to Computer Security, Spring 2016, 43 students.
`• Introduction to Computer Security, Spring 2015, 30 students.
`
`Fabian Monrose
`
`page 12
`
`Page 12 of 18
`
`

`

`• Introduction to Computer Security, Spring 2012, 26 students.
`• Network Security, Fall 2008, 21 students.
`• Special Topics in Computer Science, Spring 2009, 7 students.
`• Network Security, Fall 2009, 16 students.
`• Introduction to Computer Security, Spring 2010, 17 students.
`• Network Security, Fall 2010, 11 students.
`• Introduction to Computer Security, Spring 2012, 25 students.
`
`Past & Current
`Students
`• Sophie Qui (co-advised with G. Mason), Ph.D., Spring 2007, (Cisco Systems)
`• Charles Wright, Spring 2008, Ph.D., (Portland State University)
`• Seny Kamara, Spring 2008, Ph.D., (Microsoft Research)
`• Moheeb Abu Rajab (co-advised with A. Terzis), Ph.D., Spring 2008, (Google Inc.)
`• Lucas Ballard, Spring 2008, Ph.D., (Google Inc.)
`• Scott Coull, Fall 2009, Ph.D., (RedJack)
`• Josh Mason, Fall 2009, Ph.D., (Independent Consultant)
`• Kevin Snow, Spring 2014, Ph.D., UNC Chapel Hill
`• Andrew White, Fall 2015, Ph.D., Netflix
`• Teryl Taylor (current), Ph.D. candidate, UNC Chapel Hill
`• Srinivas Krishnan (co-advised with K. Jeffay; deferred), Ph.D. candidate, Google
`• Yi Xu (co-advised with Jan-Michael Frahm), Snapchat
`• Micah Moreton (current), Ph.D. candidate, UNC Chapel Hill
`
`Doctoral
`Committees
`• (Reader) Breno de Medeiros, New Cryptographic Primitives and Applications, Ph.D., Johns
`Hopkins University, May 2004
`• (Reader) Kendall

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket