[an error occurred while processing this directive]

Charles V. Wright

C.V. Wright, C. Connelly, T. Braje, J.C. Rabek, L.M. Rossey, R.K. Cunningham, Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security, RAID 2010, Ottawa, CA, 15-17 September 2010.
(Full Paper)

C.V. Wright, L. Ballard, S.E. Coull, F. Monrose, and G.M. Masson. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, May 2008.

S.E. Coull, C.V. Wright, A.D. Keromytis, F. Monrose, and M.K. Reiter. Taming the Devil: Techniques for Evaluating Anonymized Network Data. In Proceedings of the 15th Annual Network & Distributed System Security Symposium, February 2008.

C.V. Wright, L. Ballard, F. Monrose, and G.M. Masson. Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? In Proceedings of the 16th Annual USENIX Security Symposium, August 2007.

S.E. Coull, M.P. Collins, C.V. Wright, F. Monrose, and M.K. Reiter. On Web Browsing Privacy in Anonymized NetFlows. In Proceedings of the 16th Annual USENIX Security Symposium, August 2007.

S.E. Coull, C.V. Wright, F. Monrose, M.P. Collins, and M.K. Reiter. Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. In Proceedings of the 14th Annual Network and Distributed System Security Symposium, February 2007.

C.V. Wright, F. Monrose, and G.M. Masson. On Inferring Application Protocol Behaviors in Encrypted Network Traffic. Journal of Machine Learning Research Special Topic on Machine Learning for Computer Security. Volume 7, December 2006.

C.V. Wright, F. Monrose, and G.M. Masson. Using Visual Motifs to Classify Encrypted Traffic. In Proceedings of the 3rd International Workshop on Visualization for Computer Security (VizSEC'06) , November 2006.

C. Wright, F. Monrose, and G. Masson. HMM Profiles for Network Traffic Classification (Extended Abstract). In Proceedings of the Workshop on Visualization and Data Mining for Computer Security, October 2004.

top of page