Fabian Monrose
University of North Carolina at Chapel Hill
H-index: 55
North America-United States
Top articles of Fabian Monrose
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned | arXiv preprint arXiv:2403.16304 | Omar Alrawi Miuyin Yong Wong Athanasios Avgetidis Kevin Valakuzhy Boladji Vinny Adjibi | 2024/3/24 |
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans | arXiv preprint arXiv:2403.10659 | Athanasios Moschos Fabian Monrose Angelos D Keromytis | 2024/3/15 |
Beyond The Gates: An Empirical Analysis of {HTTP-Managed} Password Stealers and Operators | Athanasios Avgetidis Omar Alrawi Kevin Valakuzhy Charles Lever Paul Burbage | 2023 | |
Stale TLS Certificates | Zane Ma Aaron Faulkenberry Thomas Papastergiou Zakir Durumeric Michael D Bailey | 2023/10/25 | |
Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys | Zane Ma Aaron Faulkenberry Thomas Papastergiou Zakir Durumeric Michael D Bailey | 2023/10/24 | |
Virtual Career Advisor System | Tracey John Dwaine Clarke Daniel Coore Fabian Monrose John McHugh | 2023/8/3 | |
More Carrot or Less Stick: Organically Improving Student Time Management With Practice Tasks and Gamified Assignments | Mac Malone Fabian Monrose | 2023/6/29 | |
Securely Autograding Cybersecurity Exercises Using Web Accessible Jupyter Notebooks | Mac Malone Yicheng Wang Fabian Monrose | 2023/3/2 | |
Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level | Yufei Du Omar Alrawi Kevin Snow Manos Antonakakis Fabian Monrose | 2023/11/15 | |
Automatic recovery of fine-grained compiler artifacts at the binary level | Yufei Du Kevin Snow Fabian Monrose | 2022 | |
Separating the Wheat from the Chaff: Using Indexing and Sub-Sequence Mining Techniques to Identify Related Crashes During Bug Triage | Kedrian James Yufei Du Sanjeev Das Fabian Monrose | 2022/12/5 | |
View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy | Aaron Faulkenberry Athanasios Avgetidis Zane Ma Omar Alrawi Charles Lever | 2022/12/5 | |
Leveraging Disentangled Representations to Improve Vision-Based Keystroke Inference Attacks Under Low Data Constraints | arXiv preprint arXiv:2204.02494 | John Lim Jan-Michael Frahm Fabian Monrose | 2022/4/5 |
YourThings: A Comprehensive Annotated Dataset of Network Traffic from Deployed Home-based IoT Devices | Omar Alrawi F Monrose A Faulkenberry Manos Antonakakis | 2022 | |
An online gamified learning platform for teaching cybersecurity and more | Mac Malone Yicheng Wang Fabian Monrose | 2021/10/6 | |
Dynpta: Combining static and dynamic analysis for practical selective data protection | Tapti Palit Jarin Firose Moon Fabian Monrose Michalis Polychronakis | 2021/5/24 | |
Applicable micropatches and where to find them: Finding and applying new security hot fixes to old software | Mac Malone Yicheng Wang Kevin Snow Fabian Monrose | 2021/4/12 | |
To gamify or not? on leaderboard effects, student engagement and learning outcomes in a cybersecurity intervention | Mac Malone Yicheng Wang Kedrian James Murray Anderegg Jan Werner | 2021/3/3 | |
The Circle of life: A {large-scale} study of the {IoT} malware lifecycle | Omar Alrawi Charles Lever Kevin Valakuzhy Kevin Snow Fabian Monrose | 2021 | |
Detecting web exploit kits by tree-based structural similarity search | 2020/2/11 |