Follow
Andrew M. White
Andrew M. White
Unknown affiliation
Verified email at cs.unc.edu - Homepage
Title
Cited by
Cited by
Year
Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks
AM White, AR Matthews, KZ Snow, F Monrose
Security and Privacy (SP), 2011 IEEE Symposium on, 3-18, 2011
1832011
iSpy: Automatic reconstruction of typed input from compromising reflections
R Raguram, AM White, D Goswami, F Monrose, JM Frahm
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1122011
Seeing double: reconstructing obscured typed input from repeated compromising reflections
Y Xu, J Heinly, AM White, F Monrose, JM Frahm
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
982013
Methods, systems, and computer readable media for rapid filtering of opaque data traffic
AM White, F Monrose, S Krishnan, PA Porras, MD Bailey
US Patent 9,973,473, 2018
742018
Identification and classification of web traffic inside encrypted network tunnels
M Christodorescu, X Hu, DL Schales, R Sailer, MP Stoecklin, T Wang, ...
US Patent 9,106,536, 2015
482015
Clear and Present Data: Opaque Traffic and its Security Implications for the Future
AM White, S Krishnan, M Bailey, F Monrose, P Porras
Proceedings of the Network and Distributed Systems Security Symposium (NDSS), 2013
342013
Understanding domain registration abuses
SE Coull, AM White, TF Yen, F Monrose, MK Reiter
Computers and Security, 2012
262012
Understanding Domain Registration Abuses
SE Coull, AM White, TF Yen, F Monrose, MK Reiter
Proceedings of the 25th IFIP International Information Security Conference 330, 2010
262010
Emergent faithfulness to morphological and semantic heads in lexical blends
KE Shaw, AM White, E Moreton, F Monrose
Proceedings of the Annual Meetings on Phonology 1 (1), 2014
222014
On the privacy risks of virtual keyboards: automatic reconstruction of typed input from compromising reflections
R Raguram, AM White, Y Xu, JM Frahm, P Georgel, F Monrose
IEEE Transactions on Dependable and Secure Computing 10 (3), 154-167, 2013
192013
Isn't that Fantabulous: Security, Linguistic and Usability Challenges of Pronounceable Tokens
AM White, K Shaw, F Monrose, E Moreton
Proceedings of the 2014 New Security Paradigms Workshop, 25-38, 2014
72014
Practical analysis of encrypted network traffic
AM White
THE UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–12