Privacy & other topics

     Yi Xu, Jan-Michael Frahm and Fabian Monrose. Watching the Watchers: Inferring TV Content From Outdoor Light Effusions. In Proceedings of the ACM Conference on Computer and Communications Security, 2014. (PDF)


     Yi Xu, Jared Heinly, Andrew M. White, Fabian Monrose and Jan-Michael Frahm. Seeing Double: Reconstructing Obscured Typed Input from Repeated Compromising Reflections. In Proceedings of the ACM Conference on Computer and Communications Security, 2013. (PDF)

Rahul Raguram, Andrew White,, Yi Xu, Jan-Michael Frahm, Pierre Georgel and Fabian Monrose. On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections. In Proceedings IEEE Transactions on Dependable and Secure Computing, Volume 10, Issue 3, 2013. (PDF)

◦Darren Davis, Fabian Monrose and Mike ReiterTime Scoped Searching of Encrypted Audit Logs. In Proceedings of the 6th International Conference on Information and Communications Security (ICICS), pages 532-545, October, 2004. (PDF).


         The ICICS paper is very dense (given page limitations), so interested readers are referred to Darren's Master's thesis for more information: SEALED: Searching Encrypted Audit Logs Expeditiously, May, 2004.

Lucas Ballard, Seny Kamara and Fabian Monrose.  Achieving Efficient Conjunctive Searches of Encrypted Data. In Proceedings of the 7th International Conference on Information and Communications Security (ICICS), pages 414-426, Dec., 2005.

◦Lucas Ballard, Matthew Green, Breno de Medeiros and Fabian Monrose.  Correlation Resistant Storage and its Applications. Security and Privacy Applied Research (SPAR) Technical Report TR-BGMM050507, May, 2005.

  ◦Bob Arlein, Ben Jai, Markus Jakobsson, Fabian Monrose, and Michael K. Reiter. Privacy Preserving Global Customization. In Proceedings of the ACM Conference on Electronic Commerce, pages 176-184, 2000. (PDF)

    Miscellaneous topics

◦Daniel Kumar, Fabian Monrose and Michael K. Retier. Towards Optimized Probe Scheduling for Active Measurement Studies. In Proceedings International Conference on Internet Monitoring and Protection,  March, 2011. (PDF) (Best Paper Award)

◦Sujata Doshi, Fabian Monrose, and Aviel Rubin. Efficient Memory Bound Puzzles using Pattern Databases . In Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS), pages 98-113, June, Singapore, 2006. (PDF)

◦Sophie Qiu, Patrick McDaniel, and Fabian Monrose. Toward Valley-Free Inter-domain Routing. In Proceedings of the IEEE Conference on Communications, June, Scottland, 2007.

◦Sophie Qui, Fabian Monrose, Andreas Terzis, and Patrick McDaniel. Efficient Techniques for Detecting False Origin Advertisements in Inter-domain Routing. In Proceedings of the Second Workshop on Secure Network Protocols (NPSec), November 2006. (PDF)

◦Sophie Qiu, Patrick McDaniel, Fabian Monrose, and Aviel D. Rubin, Characterizing Address Use Structure and Stabillity of Origin Advertizement in Interdomain Routing. In Proceedings of IEEE Symposium on Computers and Communications (ISCC), pages 489-496, June, Italy, 2006. (Supercedes the earlier techreport PDF)

◦Bharat Doshi, Antonio De Simone, Sam Small, Fabian Monrose and Andreas Terzis. Large-scale Dynamic Virtual Private Networks for the Global Information Grid. In Proceedings of IEEE Milcom, Atlantic City, October, 2005.

◦S. Kamara, D. Davis, L. Ballard, R. Caudy and F. Monrose. An Extensible Platform for Evaluating Security Protocols. In Proceedings of the 38th IEEE Annual Simulation Symposium (ANSS), pages 204-213, San Deigo, 2005. (PDF). SIMNET is maintained here.

    Fabian Monrose, Peter Wyckoff and Aviel D. RubinDistributed Execution with Remote Audit. In Proceedings of the ISOC Network and Distributed System Security (NDSS) Symposium, San Diego, February, 1999. (PDF).