Fabian Monrose
University of North Carolina at Chapel Hill
H-index: 55
North America-United States
Top articles of Fabian Monrose
SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned
arXiv preprint arXiv:2403.16304
2024/3/24
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans
arXiv preprint arXiv:2403.10659
2024/3/15
Athanasios Moschos
H-Index: 2
Fabian Monrose
H-Index: 35
Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level
2023/11/15
Stale TLS Certificates
2023/10/25
Zane Ma
H-Index: 6
Thomas Papastergiou
H-Index: 2
Zakir Durumeric
H-Index: 24
Fabian Monrose
H-Index: 35
Manos Antonakakis
H-Index: 26
Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys
2023/10/24
Zane Ma
H-Index: 6
Thomas Papastergiou
H-Index: 2
Zakir Durumeric
H-Index: 24
Fabian Monrose
H-Index: 35
Manos Antonakakis
H-Index: 26
More Carrot or Less Stick: Organically Improving Student Time Management With Practice Tasks and Gamified Assignments
2023/6/29
Fabian Monrose
H-Index: 35
Securely Autograding Cybersecurity Exercises Using Web Accessible Jupyter Notebooks
2023/3/2
Yicheng Wang
H-Index: 16
Fabian Monrose
H-Index: 35
Beyond The Gates: An Empirical Analysis of {HTTP-Managed} Password Stealers and Operators
2023
Athanasios Avgetidis
H-Index: 0
Omar Alrawi
H-Index: 9
Fabian Monrose
H-Index: 35
Manos Antonakakis
H-Index: 26
Separating the Wheat from the Chaff: Using Indexing and Sub-Sequence Mining Techniques to Identify Related Crashes During Bug Triage
2022/12/5
Kedrian James
H-Index: 0
Fabian Monrose
H-Index: 35
View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy
2022/12/5
Leveraging Disentangled Representations to Improve Vision-Based Keystroke Inference Attacks Under Low Data Constraints
arXiv preprint arXiv:2204.02494
2022/4/5
YourThings: A Comprehensive Annotated Dataset of Network Traffic from Deployed Home-based IoT Devices
2022
Automatic recovery of fine-grained compiler artifacts at the binary level
2022
Fabian Monrose
H-Index: 35
An online gamified learning platform for teaching cybersecurity and more
2021/10/6
Yicheng Wang
H-Index: 16
Fabian Monrose
H-Index: 35
Dynpta: Combining static and dynamic analysis for practical selective data protection
2021/5/24
Applicable micropatches and where to find them: Finding and applying new security hot fixes to old software
2021/4/12
Yicheng Wang
H-Index: 16
Fabian Monrose
H-Index: 35
To gamify or not? on leaderboard effects, student engagement and learning outcomes in a cybersecurity intervention
2021/3/3
The Circle of life: A {large-scale} study of the {IoT} malware lifecycle
2021
Mitigating data-only attacks by protecting memory-resident sensitive data
Digital Threats: Research and Practice
2020/12/21