Follow
Scott Coull
Scott Coull
Other namesScott Eric Coull, Scott E. Coull
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
2012 IEEE symposium on security and privacy, 332-346, 2012
5952012
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.
CV Wright, SE Coull, F Monrose
NDSS 9, 2009
4342009
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
CV Wright, L Ballard, SE Coull, F Monrose, GM Masson
2008 IEEE Symposium on Security and Privacy (sp 2008), 35-49, 2008
3252008
Intrusion detection: A bioinformatics approach
S Coull, J Branch, B Szymanski, E Breimer
Computer Security Applications Conference, 2003. Proceedings. 19th Annual, 24-33, 2003
2122003
Exploring adversarial examples in malware detection
O Suciu, SE Coull, J Johns
2019 IEEE Security and Privacy Workshops (SPW), 8-14, 2019
2082019
Protocol misidentification made easy with format-transforming encryption
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1642013
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
SE Coull, CV Wright, F Monrose, MP Collins, MK Reiter
Ndss 7, 35-47, 2007
1612007
{Explanation-Guided} backdoor poisoning attacks against malware classifiers
G Severi, J Meyer, S Coull, A Oprea
30th USENIX security symposium (USENIX security 21), 1487-1504, 2021
1452021
Traffic analysis of encrypted messaging services: Apple imessage and beyond
SE Coull, KP Dyer
ACM SIGCOMM Computer Communication Review 44 (5), 5-11, 2014
1392014
Sequence alignment for masquerade detection
SE Coull, BK Szymanski
Computational Statistics & Data Analysis 52 (8), 4116-4131, 2008
1202008
Adversarial exemples: A survey and experimental evaluation of practical attacks on machine learning for windows malware detection
L Demetrio, SE Coull, B Biggio, G Lagorio, A Armando, F Roli
ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-31, 2021
1112021
On Web Browsing Privacy in Anonymized NetFlows.
SE Coull, MP Collins, CV Wright, F Monrose, MK Reiter
USENIX Security Symposium, 339-352, 2007
1112007
Controlling access to an oblivious database using stateful anonymous credentials
S Coull, M Green, S Hohenberger
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
972009
Marionette: A programmable network traffic obfuscation system
KP Dyer, SE Coull, T Shrimpton
24th USENIX Security Symposium (USENIX Security 15), 367-382, 2015
802015
Uncovering spoken phrases in encrypted voice over IP conversations
CV Wright, L Ballard, SE Coull, F Monrose, GM Masson
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-30, 2010
692010
Taming the devil: Techniques for evaluating anonymized network data
SE Coull, CV Wright, AD Keromytis, F Monrose, MK Reiter
NDSS, 125-135, 2008
692008
The challenges of effectively anonymizing network data
SE Coull, F Monrose, MK Reiter, M Bailey
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
592009
System and method for analyzing binary code for malware classification using artificial neural network techniques
JT Johns, BS Jones, SE Coull
US Patent 11,108,809, 2021
382021
Activation analysis of a byte-based deep neural network for malware classification
SE Coull, C Gardner
2019 IEEE Security and Privacy Workshops (SPW), 21-27, 2019
382019
On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses.
SE Coull, F Monrose, M Bailey
NDSS, 2011
352011
The system can't perform the operation now. Try again later.
Articles 1–20