Education
- Ph.D. Computer Science, The Johns Hopkins University, 2008
- M.S.E. Computer Science, The Johns Hopkins University, 2006
- M.S. Security Informatics, The Johns Hopkins University, 2004
- B.S. Computer Science, Mathematics, Brandeis University, 2003
Publications
-
The Nocebo Effect on the Web: An Analysis of Fake
Anti-Virus Distribution
M. Abu Rajab,
L. Ballard,
P. Mavrommatis,
N. Provos, and
X. Zhao.
To appear in the USENIX Workshop on Large Scale Exploits and Emerging
Threats, 2010.
-
Uncovering Spoken Phrases in Encrypted VoIP
Conversation
C. V. Wright,
L. Ballard,
S. Coull, and
F. Monrose.
To appear in ACM Transactions on Information and System Security.
-
Towards Practical Biometric Key Generation with
Randomized Biometric Templates
L. Ballard,
S. Kamara,
F. Monrose, and
M. K. Reiter.
In the proceedings of 15th ACM Conference on Computer and Communications Security,
pp. 235--244,
Alexandria, VA, October 2008.
[abstract][pdf]
-
Biometric Key Generation using Pseudo-Signatures
L. Ballard,
J. Chen,
D. Lopresti, and
F. Monrose.
In the proceedings of The 11th International Conference on Frontiers in Handwriting Recognition,
Montreal, Quebec, CA, August 2008.
-
The Practical Subtleties of Biometric Key Generation
L. Ballard,
S. Kamara, and
M. K. Reiter.
In the proceedings of The 17th Annual USENIX Security Symposium,
pp. 61-74,
San Jose, CA,
August 2008.
[abstract][pdf]
-
Spot me if you can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
C. V. Wright,
L. Ballard,
S. Coull,
F. Monrose, and
G. M. Masson.
To appear in the proceedings of The IEEE Symposium on Security and Privacy,
Oakland, CA,
May 2008.
[abstract][pdf]
-
Forgery Quality and its Implications for Behavioral Biometric Security
L. Ballard,
D. Lopresti, and
F. Monrose.
In IEEE Transactions on Systems, Man, and Cybernetics---Part B: Cybernetics (Special Edition).
Volume 37, Number 5, pp. 1107-1118, October 2007.
[abstract][pdf]
-
Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?
C. V. Wright,
L. Ballard,
F. Monrose, and
G. M. Masson.
In the proceedings of The 16th Annual USENIX Security Symposium, pp. 43-54,
Boston, MA,
August 2007.
[abstract][pdf]
-
Evaluating Biometric Security (Invited keynote paper)
D. Lopresti,
F. Monrose, and
L. Ballard.
In the proceedings of the First Korea-Japan Workshop on Pattern Recognition,
pp. 15-24,
Jeju Island, Korea,
November 2006.
[abstract][pdf.gz]
-
Evaluating the Security of Handwriting Biometrics
L. Ballard,
D. Lopresti, and
F. Monrose.
In the proceedings of The 10th International Workshop on Frontiers in Handwriting Recognition (IWFHR06), pp. 461-466, La Baule, France, October 2006.
[abstract][pdf]
-
Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing
L. Ballard,
F. Monrose, and
D. Lopresti.
In the proceedings of The 15th Annual USENIX Security Symposium, pp. 29-41, Vancouver, BC, Canada, August 2006.
[abstract][pdf]
-
Achieving Efficient Conjunctive Keyword Searches over Encrypted Data
L. Ballard,
S. Kamara, and
F. Monrose.
In the Proceedings of the Seventh International Conference on Information and Communications Security (ICICS '05), pp. 414-426, Beijing, China, December 2005.
[abstract]
-
An Extensible Platform for Evaluating Security Protocols
S. Kamara,
D. Davis,
L. Ballard,
R. Caudy and
F. Monrose.
In ANSS '05: Proceedings of the 38th Annual Symposium on Simulation,
pp. 204-213, San Diego, CA, USA, 2005. IEEE Computer Society.
[abstract][pdf][code]
Professional Service
Program Committee Member
- USENIX Security Symposium (2011, 2010, 2009)
- Financial Crypto (2011, 2010)
- International Conference on Applied Cryptography and Network Security (2010)
- USENIX HotSec (2010)
- Biometrics Symposium at the Biometrics Consortium Conference (2007, 2008)
- International Conference on Distributed Computing Systems (2008)
Last Updated: August 27, 2010
|