Inference attacks on property-preserving encrypted databases M Naveed, S Kamara, CV Wright Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 658 | 2015 |
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. CV Wright, SE Coull, F Monrose NDSS 9, 2009 | 443 | 2009 |
On inferring application protocol behaviors in encrypted network traffic CV Wright, F Monrose, GM Masson Journal of Machine Learning Research 7 (Dec), 2745-2769, 2006 | 325 | 2006 |
Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations CV Wright, L Ballard, SE Coull, F Monrose, GM Masson Security and Privacy, 2008. SP 2008. IEEE Symposium on, 35-49, 2008 | 319 | 2008 |
Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob? CV Wright, L Ballard, F Monrose, GM Masson USENIX Security Symposium 3, 43-54, 2007 | 269 | 2007 |
HMM profiles for network traffic classification C Wright, F Monrose, GM Masson Proceedings of the 2004 ACM workshop on Visualization and data mining for …, 2004 | 175 | 2004 |
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. SE Coull, CV Wright, F Monrose, MP Collins, MK Reiter NDSS 7, 35-47, 2007 | 163 | 2007 |
The shadow nemesis: Inference attacks on efficiently deployable, efficiently searchable encryption D Pouliot, CV Wright Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 129 | 2016 |
On Web Browsing Privacy in Anonymized NetFlows. SE Coull, MP Collins, CV Wright, F Monrose, MK Reiter USENIX Security Symposium, 339-352, 2007 | 111 | 2007 |
Thumbnail-preserving encryption for JPEG CV Wright, W Feng, F Liu Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia …, 2015 | 71 | 2015 |
Uncovering spoken phrases in encrypted voice over IP conversations CV Wright, L Ballard, SE Coull, F Monrose, GM Masson ACM Transactions on Information and System Security (TISSEC) 13 (4), 35, 2010 | 69 | 2010 |
Taming the Devil: Techniques for Evaluating Anonymized Network Data. SE Coull, CV Wright, AD Keromytis, F Monrose, MK Reiter NDSS, 2008 | 69 | 2008 |
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption K Tajik, A Gunasekaran, R Dutta, B Ellis, RB Bobba, M Rosulek, ... | 67* | |
Approximate Thumbnail Preserving Encryption B Marohn, CV Wright, W Feng, M Rosulek, RB Bobba Proceedings of the 2017 on Multimedia Privacy and Security, 33-43, 2017 | 55 | 2017 |
Using visual motifs to classify encrypted traffic CV Wright, F Monrose, GM Masson Proceedings of the 3rd international workshop on Visualization for computer …, 2006 | 46 | 2006 |
Generating client workloads and high-fidelity network traffic for controllable, repeatable experiments in computer security CV Wright, C Connelly, T Braje, JC Rabek, LM Rossey, RK Cunningham International Workshop on Recent Advances in Intrusion Detection, 218-237, 2010 | 44 | 2010 |
Crypto Crumple Zones: Enabling limited Access without Mass Surveillance C Wright, M Varia 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 288-306, 2018 | 29 | 2018 |
Towards better protocol identification using profile HMMs CV Wright, F Monrose, GM Masson JHU Tech. Rep. JHU-SPAR051201, 2005 | 14 | 2005 |
Early Detection and Analysis of Leakage Abuse Vulnerabilities CV Wright, D Pouliot | 12 | 2017 |
A Cryptographic Airbag for Metadata: Protecting Business Records Against Unlimited Search and Seizure CV Wright, M Varia 8th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2018 | 5 | 2018 |