Follow
Scott Coull
Scott Coull
Other namesScott Eric Coull, Scott E. Coull
Mandiant
Verified email at mandiant.com - Homepage
Title
Cited by
Cited by
Year
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
2012 IEEE symposium on security and privacy, 332-346, 2012
4832012
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.
CV Wright, SE Coull, F Monrose
NDSS 9, 2009
3892009
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
CV Wright, L Ballard, SE Coull, F Monrose, GM Masson
2008 IEEE Symposium on Security and Privacy (sp 2008), 35-49, 2008
3072008
Intrusion detection: A bioinformatics approach
S Coull, J Branch, B Szymanski, E Breimer
Computer Security Applications Conference, 2003. Proceedings. 19th Annual, 24-33, 2003
2082003
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
SE Coull, CV Wright, F Monrose, MP Collins, MK Reiter
Ndss 7, 35-47, 2007
1572007
Protocol misidentification made easy with format-transforming encryption
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1422013
Exploring adversarial examples in malware detection
O Suciu, SE Coull, J Johns
2019 IEEE Security and Privacy Workshops (SPW), 8-14, 2019
1282019
Sequence alignment for masquerade detection
SE Coull, BK Szymanski
Computational Statistics & Data Analysis 52 (8), 4116-4131, 2008
1202008
On Web Browsing Privacy in Anonymized NetFlows.
SE Coull, MP Collins, CV Wright, F Monrose, MK Reiter
USENIX Security Symposium, 339-352, 2007
1082007
Traffic analysis of encrypted messaging services: Apple imessage and beyond
SE Coull, KP Dyer
ACM SIGCOMM Computer Communication Review 44 (5), 5-11, 2014
1002014
Controlling access to an oblivious database using stateful anonymous credentials
S Coull, M Green, S Hohenberger
International Workshop on Public Key Cryptography, 501-520, 2009
972009
Taming the devil: Techniques for evaluating anonymized network data
SE Coull, CV Wright, AD Keromytis, F Monrose, MK Reiter
NDSS, 125-135, 2008
662008
Marionette: A programmable network traffic obfuscation system
KP Dyer, SE Coull, T Shrimpton
24th USENIX Security Symposium (USENIX Security 15), 367-382, 2015
642015
Uncovering spoken phrases in encrypted voice over IP conversations
CV Wright, L Ballard, SE Coull, F Monrose, GM Masson
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-30, 2010
622010
The challenges of effectively anonymizing network data
SE Coull, F Monrose, MK Reiter, M Bailey
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
572009
{Explanation-Guided} Backdoor Poisoning Attacks Against Malware Classifiers
G Severi, J Meyer, S Coull, A Oprea
30th USENIX Security Symposium (USENIX Security 21), 1487-1504, 2021
45*2021
Adversarial exemples: A survey and experimental evaluation of practical attacks on machine learning for windows malware detection
L Demetrio, SE Coull, B Biggio, G Lagorio, A Armando, F Roli
ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-31, 2021
362021
On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses.
SE Coull, F Monrose, M Bailey
NDSS, 2011
322011
Activation analysis of a byte-based deep neural network for malware classification
SE Coull, C Gardner
2019 IEEE Security and Privacy Workshops (SPW), 21-27, 2019
202019
Access controls for oblivious and anonymous systems
SE Coull, M Green, S Hohenberger
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-28, 2011
192011
The system can't perform the operation now. Try again later.
Articles 1–20