Andrew M. White
Andrew M. White
Unknown affiliation
Verified email at cs.unc.edu - Homepage
Title
Cited by
Cited by
Year
Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks
AM White, AR Matthews, KZ Snow, F Monrose
Security and Privacy (SP), 2011 IEEE Symposium on, 3-18, 2011
1432011
iSpy: Automatic reconstruction of typed input from compromising reflections
R Raguram, AM White, D Goswami, F Monrose, JM Frahm
Proceedings of the 18th ACM conference on Computer and communications …, 2011
912011
Seeing double: reconstructing obscured typed input from repeated compromising reflections
Y Xu, J Heinly, AM White, F Monrose, JM Frahm
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
722013
Methods, systems, and computer readable media for rapid filtering of opaque data traffic
AM White, F Monrose, S Krishnan, PA Porras, MD Bailey
US Patent 9,973,473, 2018
402018
Clear and Present Data: Opaque Traffic and its Security Implications for the Future
AM White, S Krishnan, M Bailey, F Monrose, P Porras
Proceedings of the Network and Distributed Systems Security Symposium (NDSS), 2013
342013
Identification and classification of web traffic inside encrypted network tunnels
M Christodorescu, X Hu, DL Schales, R Sailer, MP Stoecklin, T Wang, ...
US Patent 9,106,536, 2015
282015
Understanding Domain Registration Abuses
SE Coull, AM White, TF Yen, F Monrose, MK Reiter
Proceedings of the 25th IFIP International Information Security Conference 330, 2010
222010
Emergent faithfulness to morphological and semantic heads in lexical blends
KE Shaw, AM White, E Moreton, F Monrose
Proceedings of the Annual Meetings on Phonology 1 (1), 2014
172014
On the privacy risks of virtual keyboards: automatic reconstruction of typed input from compromising reflections
R Raguram, AM White, Y Xu, JM Frahm, P Georgel, F Monrose
IEEE Transactions on Dependable and Secure Computing 10 (3), 154-167, 2013
92013
Understanding domain registration abuses
SE Coull, AM White, TF Yen, F Monrose, MK Reiter
Computers and Security, 2012
72012
Isn't that Fantabulous: Security, Linguistic and Usability Challenges of Pronounceable Tokens
AM White, K Shaw, F Monrose, E Moreton
Proceedings of the 2014 New Security Paradigms Workshop, 25-38, 2014
42014
Practical analysis of encrypted network traffic
AM White
THE UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL, 2015
12015
The system can't perform the operation now. Try again later.
Articles 1–12