default search action
David A. McGrew
Person information
- affiliation: Cisco Systems, Herndon, VA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c22]Andrew Chi, Brandon Enright, David A. McGrew:
Detecting Weak Keys in Manufacturing Certificates: A Case Study. ACSAC 2023: 759-771 - [c21]Blake Anderson, David A. McGrew:
Assessing and Exploiting Domain Name Misinformation. EuroS&P Workshops 2023: 475-486 - [i33]Blake Anderson, David A. McGrew:
Assessing and Exploiting Domain Name Misinformation. CoRR abs/2307.07610 (2023) - 2021
- [i32]Cullen Jennings, John Preuß Mattsson, David A. McGrew, Dan Wing, Flemming Andreasen:
Encrypted Key Transport for DTLS and Secure RTP. RFC 8870: 1-22 (2021) - 2020
- [i31]Blake Anderson, David A. McGrew:
Accurate TLS Fingerprinting using Destination Context and Knowledge Bases. CoRR abs/2009.01939 (2020) - [i30]Scott R. Fluhrer, Panos Kampanakis, David A. McGrew, Valery Smyslov:
Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security. RFC 8784: 1-16 (2020)
2010 – 2019
- 2019
- [c20]Blake Anderson, Andrew Chi, Scott Dunlop, David A. McGrew:
Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption. CODASPY 2019: 267-278 - [c19]Blake Anderson, David A. McGrew:
TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior. Internet Measurement Conference 2019: 379-392 - [i29]David A. McGrew, Michael Curcio, Scott R. Fluhrer:
Leighton-Micali Hash-Based Signatures. RFC 8554: 1-61 (2019) - 2018
- [j6]Blake Anderson, Subharthi Paul, David A. McGrew:
Deciphering malware's use of TLS (without decryption). J. Comput. Virol. Hacking Tech. 14(3): 195-211 (2018) - [c18]Julien Piet, Blake Anderson, David A. McGrew:
An In-Depth Study of Open-Source Command and Control Frameworks. MALWARE 2018: 23-30 - [i28]Blake Anderson, Andrew Chi, Scott Dunlop, David A. McGrew:
Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption. CoRR abs/1805.11544 (2018) - 2017
- [c17]Blake Anderson, David A. McGrew:
OS fingerprinting: New techniques and a study of information gain and obfuscation. CNS 2017: 1-9 - [c16]Blake Anderson, David A. McGrew:
Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity. KDD 2017: 1723-1732 - [i27]Blake Anderson, David A. McGrew:
OS Fingerprinting: New Techniques and a Study of Information Gain and Obfuscation. CoRR abs/1706.08003 (2017) - 2016
- [c15]Blake Anderson, David A. McGrew, Subharthi Paul:
Discovering Human and Machine Readable Descriptions of Malware Families. AAAI Workshop: Artificial Intelligence for Cyber Security 2016 - [c14]Blake Anderson, David A. McGrew:
Identifying Encrypted Malware Traffic with Contextual Flow Data. AISec@CCS 2016: 35-46 - [c13]David A. McGrew, Blake Anderson:
Enhanced telemetry for encrypted threat analytics. ICNP 2016: 1-6 - [c12]David A. McGrew, Panos Kampanakis, Scott R. Fluhrer, Stefan-Lukas Gazdag, Denis Butin, Johannes Buchmann:
State Management for Hash-Based Signatures. SSR 2016: 244-260 - [e1]Lidong Chen, David A. McGrew, Chris J. Mitchell:
Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings. Lecture Notes in Computer Science 10074, Springer 2016, ISBN 978-3-319-49099-1 [contents] - [i26]Blake Anderson, Subharthi Paul, David A. McGrew:
Deciphering Malware's use of TLS (without Decryption). CoRR abs/1607.01639 (2016) - [i25]David A. McGrew, Panos Kampanakis, Scott R. Fluhrer, Stefan-Lukas Gazdag, Denis Butin, Johannes Buchmann:
State Management for Hash Based Signatures. IACR Cryptol. ePrint Arch. 2016: 357 (2016) - 2015
- [c11]Syam Appala, Nancy Cam-Winget, David A. McGrew, Jyoti Verma:
An Actionable Threat Intelligence system using a Publish-Subscribe communications model. WISCS@CCS 2015: 61-70 - [i24]David A. McGrew, Kevin M. Igoe:
AES-GCM Authenticated Encryption in the Secure Real-time Transport Protocol (SRTP). RFC 7714: 1-48 (2015) - 2014
- [c10]David A. McGrew:
Privacy vs. Efficacy in Cloud-based Threat Detection. CCSW 2014: 3-4 - [c9]Farzaneh Abed, Scott R. Fluhrer, Christian Forler, Eik List, Stefan Lucks, David A. McGrew, Jakob Wenzel:
Pipelineable On-line Encryption. FSE 2014: 205-223 - [i23]Farzaneh Abed, Scott R. Fluhrer, Christian Forler, Eik List, Stefan Lucks, David A. McGrew, Jakob Wenzel:
Pipelineable On-Line Encryption. IACR Cryptol. ePrint Arch. 2014: 297 (2014) - [i22]Christian Forler, David A. McGrew, Stefan Lucks, Jakob Wenzel:
COFFE: Ciphertext Output Feedback Faithful Encryption. IACR Cryptol. ePrint Arch. 2014: 1003 (2014) - [i21]David A. McGrew, Daniel V. Bailey, Matthew J. Campagna, Robert Dugal:
AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS. RFC 7251: 1-10 (2014) - [i20]David A. McGrew, Paul E. Hoffman:
Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH). RFC 7321: 1-11 (2014) - 2012
- [i19]David A. McGrew:
Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes. IACR Cryptol. ePrint Arch. 2012: 623 (2012) - [i18]David A. McGrew, Daniel V. Bailey:
AES-CCM Cipher Suites for Transport Layer Security (TLS). RFC 6655: 1-8 (2012) - 2011
- [r1]David A. McGrew:
Galois Counter Mode. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 506-508 - [i17]David A. McGrew, Kevin M. Igoe, Margaret Salter:
Fundamental Elliptic Curve Cryptography Algorithms. RFC 6090: 1-34 (2011) - [i16]David A. McGrew:
The Use of AES-192 and AES-256 in Secure RTP. RFC 6188: 1-16 (2011) - 2010
- [i15]David A. McGrew, Eric Rescorla:
Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP). RFC 5764: 1-26 (2010) - [i14]David A. McGrew, Brian Weis:
Using Counter Modes with Encapsulating Security Payload (ESP) and Authentication Header (AH) to Protect Group Traffic. RFC 6054: 1-10 (2010)
2000 – 2009
- 2009
- [i13]Nancy Cam-Winget, David A. McGrew, Joseph Salowey, Hao Zhou:
Dynamic Provisioning Using Flexible Authentication via Secure Tunneling Extensible Authentication Protocol (EAP-FAST). RFC 5422: 1-39 (2009) - 2008
- [i12]David A. McGrew:
An Interface and Algorithms for Authenticated Encryption. RFC 5116: 1-22 (2008) - [i11]David L. Black, David A. McGrew:
Using Authenticated Encryption Algorithms with the Encrypted Payload of the Internet Key Exchange version 2 (IKEv2) Protocol. RFC 5282: 1-19 (2008) - [i10]Joseph Salowey, Abhijit Choudhury, David A. McGrew:
AES Galois Counter Mode (GCM) Cipher Suites for TLS. RFC 5288: 1-8 (2008) - 2007
- [c8]David A. McGrew, Scott R. Fluhrer:
The Security of the Extended Codebook (XCB) Mode of Operation. Selected Areas in Cryptography 2007: 311-327 - [i9]David A. McGrew, Scott R. Fluhrer:
The Security of the Extended Codebook (XCB) Mode of Operation. IACR Cryptol. ePrint Arch. 2007: 298 (2007) - [i8]Nancy Cam-Winget, David A. McGrew, Joseph Salowey, Hao Zhou:
The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST). RFC 4851: 1-64 (2007) - 2006
- [j5]Bo Yang, Ramesh Karri, David A. McGrew:
A High-Speed Hardware Architecture for Universal Message Authentication Code. IEEE J. Sel. Areas Commun. 24(10): 1831-1839 (2006) - [c7]Yih-Chun Hu, David A. McGrew, Adrian Perrig, Brian Weis, Dan Wendlandt:
(R)Evolutionary Bootstrapping of a Global PKI for Securing BGP. HotNets 2006 - [i7]David A. McGrew, John Viega:
The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH. RFC 4543: 1-14 (2006) - 2005
- [j4]Mingyan Li, Radha Poovendran, David A. McGrew:
Minimizing center key storage in hybrid one-way function based group key management with communication constraints. Inf. Process. Lett. 93(4): 191-198 (2005) - [j3]Bo Yang, Ramesh Karri, David A. McGrew:
Divide-and-concatenate: an architecture-level optimization technique for universal hash functions. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 24(11): 1740-1747 (2005) - [c6]David A. McGrew:
Efficient Authentication of Large, Dynamic Data Sets Using Galois/Counter Mode (GCM). IEEE Security in Storage Workshop 2005: 89-94 - [i6]David A. McGrew, Scott R. Fluhrer:
Multiple forgery attacks against Message Authentication Codes. IACR Cryptol. ePrint Arch. 2005: 161 (2005) - [i5]John Viega, David A. McGrew:
The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP). RFC 4106: 1-11 (2005) - 2004
- [j2]Darshan Sonecha, Bo Yang, Ramesh Karri, David A. McGrew:
High speed architectures for Leviathan: a binary tree based stream cipher. Microprocess. Microsystems 28(10): 573-584 (2004) - [c5]Bo Yang, Ramesh Karri, David A. McGrew:
Divide-and-concatenate: an architecture level optimization technique for universal hash functions. DAC 2004: 614-617 - [c4]Bo Yang, Ramesh Karri, David A. McGrew:
Divide and concatenate: a scalable hardware architecture for universal MAC. FPGA 2004: 258 - [c3]David A. McGrew, John Viega:
The Security and Performance of the Galois/Counter Mode (GCM) of Operation. INDOCRYPT 2004: 343-355 - [i4]David A. McGrew, John Viega:
The Security and Performance of the Galois/Counter Mode of Operation (Full Version). IACR Cryptol. ePrint Arch. 2004: 193 (2004) - [i3]David A. McGrew, Scott R. Fluhrer:
The Extended Codebook (XCB) Mode of Operation. IACR Cryptol. ePrint Arch. 2004: 278 (2004) - [i2]Mark Baugher, David A. McGrew, Mats Näslund, Elisabetta Carrara, Karl Norrman:
The Secure Real-time Transport Protocol (SRTP). RFC 3711: 1-56 (2004) - 2003
- [j1]Alan T. Sherman, David A. McGrew:
Key Establishment in Large Dynamic Groups Using One-Way Function Trees. IEEE Trans. Software Eng. 29(5): 444-458 (2003) - [i1]Bo Yang, Ramesh Karri, David A. McGrew:
Divide and Concatenate: A Scalable Hardware Architecture for Universal MAC. IACR Cryptol. ePrint Arch. 2003: 215 (2003) - 2000
- [c2]Scott R. Fluhrer, David A. McGrew:
Statistical Analysis of the Alleged RC4 Keystream Generator. FSE 2000: 19-30 - [c1]David A. McGrew, Scott R. Fluhrer:
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security. Selected Areas in Cryptography 2000: 14-28
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint