Scott Coull
Scott Coull
Other namesScott Eric Coull, Scott E. Coull
Verified email at - Homepage
Cited by
Cited by
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
2012 IEEE symposium on security and privacy, 332-346, 2012
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.
CV Wright, SE Coull, F Monrose
NDSS 9, 2009
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
CV Wright, L Ballard, SE Coull, F Monrose, GM Masson
2008 IEEE Symposium on Security and Privacy (sp 2008), 35-49, 2008
Exploring adversarial examples in malware detection
O Suciu, SE Coull, J Johns
2019 IEEE Security and Privacy Workshops (SPW), 8-14, 2019
Intrusion detection: A bioinformatics approach
S Coull, J Branch, B Szymanski, E Breimer
Computer Security Applications Conference, 2003. Proceedings. 19th Annual, 24-33, 2003
Protocol misidentification made easy with format-transforming encryption
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
SE Coull, CV Wright, F Monrose, MP Collins, MK Reiter
Ndss 7, 35-47, 2007
{Explanation-Guided} backdoor poisoning attacks against malware classifiers
G Severi, J Meyer, S Coull, A Oprea
30th USENIX security symposium (USENIX security 21), 1487-1504, 2021
Traffic analysis of encrypted messaging services: Apple imessage and beyond
SE Coull, KP Dyer
ACM SIGCOMM Computer Communication Review 44 (5), 5-11, 2014
Adversarial exemples: A survey and experimental evaluation of practical attacks on machine learning for windows malware detection
L Demetrio, SE Coull, B Biggio, G Lagorio, A Armando, F Roli
ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-31, 2021
Sequence alignment for masquerade detection
SE Coull, BK Szymanski
Computational Statistics & Data Analysis 52 (8), 4116-4131, 2008
On Web Browsing Privacy in Anonymized NetFlows.
SE Coull, MP Collins, CV Wright, F Monrose, MK Reiter
USENIX Security Symposium, 339-352, 2007
Controlling access to an oblivious database using stateful anonymous credentials
S Coull, M Green, S Hohenberger
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
Marionette: A programmable network traffic obfuscation system
KP Dyer, SE Coull, T Shrimpton
24th USENIX Security Symposium (USENIX Security 15), 367-382, 2015
Uncovering spoken phrases in encrypted voice over IP conversations
CV Wright, L Ballard, SE Coull, F Monrose, GM Masson
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-30, 2010
Taming the devil: Techniques for evaluating anonymized network data
SE Coull, CV Wright, AD Keromytis, F Monrose, MK Reiter
NDSS, 125-135, 2008
The challenges of effectively anonymizing network data
SE Coull, F Monrose, MK Reiter, M Bailey
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
System and method for analyzing binary code for malware classification using artificial neural network techniques
JT Johns, BS Jones, SE Coull
US Patent 11,108,809, 2021
Activation analysis of a byte-based deep neural network for malware classification
SE Coull, C Gardner
2019 IEEE Security and Privacy Workshops (SPW), 21-27, 2019
On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses.
SE Coull, F Monrose, MD Bailey
NDSS, 2011
The system can't perform the operation now. Try again later.
Articles 1–20