If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2019

Characterizing the use of browser-based blocking extensions to prevent online tracking

Mathur, A., Narayanan, A., Vitak, J. & Chetty, M., Jan 1 2019, Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018. USENIX Association, p. 103-116 14 p. (Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Formal barriers to longest-chain Proof-of-Stake protocols?

Brown-Cohen, J., Narayanan, A., Psomas, A. & Matthew Weinberg, S., Jun 17 2019, ACM EC 2019 - Proceedings of the 2019 ACM Conference on Economics and Computation. Association for Computing Machinery, Inc, p. 459-473 15 p. (ACM EC 2019 - Proceedings of the 2019 ACM Conference on Economics and Computation).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watching you watch: The tracking ecosystem of over-the-top TV streaming devices

Moghaddam, H. M., Acar, G., Burgess, B., Mathur, A., Huang, D. Y., Feamster, N., Felten, E. W., Mittal, P. & Narayanan, A., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 131-147 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2018

Web-based attacks to discover and control local IoT devices

Acar, G., Huang, D. Y., Li, F., Narayanan, A. & Feamster, N., Aug 7 2018, IoT S and P 2018 - Proceedings of the 2018 Workshop on IoT Security and Privacy, Part of SIGCOMM 2018. Association for Computing Machinery, Inc, p. 29-35 7 p. (IoT S and P 2018 - Proceedings of the 2018 Workshop on IoT Security and Privacy, Part of SIGCOMM 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

De-anonymizing web browsing data with social networks

Su, J., Shukla, A., Goel, S. & Narayanan, A., Jan 1 2017, 26th International World Wide Web Conference, WWW 2017. International World Wide Web Conferences Steering Committee, p. 1261-1269 9 p. 3052714. (26th International World Wide Web Conference, WWW 2017).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Escrow protocols for cryptocurrencies: How to buy physical goods using bitcoin

Goldfeder, S., Bonneau, J., Gennaro, R. & Narayanan, A., Jan 1 2017, Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers. Kiayias, A. (ed.). Springer Verlag, p. 321-339 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10322 LNCS).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Online tracking: A 1-million-site measurement and analysis

Englehardt, S. & Narayanan, A., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1388-1401 14 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

On the instability of Bitcoin without the block reward

Carlsten, M., Kalodner, H., Narayanan, A. & Weinberg, S. M., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 154-167 14 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security

Gennaro, R., Goldfeder, S. & Narayanan, A., Jan 1 2016, Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings. Manulis, M., Schneider, S. & Sadeghi, A-R. (eds.). Springer Verlag, p. 156-174 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9696).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

Cookies that give you away: The surveillance implications of web tracking

Englehardt, S., Reisman, D., Eubank, C., Zimmerman, P., Mayer, J., Narayanan, A. & Felten, E. W., May 18 2015, WWW 2015 - Proceedings of the 24th International Conference on World Wide Web. Association for Computing Machinery, Inc, p. 289-299 11 p. (WWW 2015 - Proceedings of the 24th International Conference on World Wide Web).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

De-anonymizing programmers via code stylometry

Caliskan-Islam, A., Harang, R., Liu, A., Narayanan, A., Voss, C., Yamaguchi, F. & Greenstadt, R., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 255-270 16 p. (Proceedings of the 24th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SoK: Research perspectives and challenges for bitcoin and cryptocurrencies

Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A. & Felten, E. W., Jul 17 2015, Proceedings - 2015 IEEE Symposium on Security and Privacy, SP 2015. Institute of Electrical and Electronics Engineers Inc., p. 104-121 18 p. 7163021. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2015-July).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2014

Mixcoin: Anonymity for bitcoin with accountable mixes

Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J. A. & Felten, E. W., Jan 1 2014, Financial Cryptography and Data Security - 18th International Conference, FC 2014, Revised Selected Papers. Safavi-Naini, R. & Christin, N. (eds.). Springer Verlag, p. 486-504 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8437).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The web never forgets: Persistent tracking mechanisms in the wild

Acar, G., Eubank, C., Englehardt, S., Juarez, M., Narayanan, A. & Diaz, C., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 674-689 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013

A scanner darkly: Protecting user privacy from perceptual applications

Jana, S., Narayanan, A. & Shmatikov, V., Aug 13 2013, Proceedings - 2013 IEEE Symposium on Security and Privacy, SP 2013. p. 349-363 15 p. 6547120. (Proceedings - IEEE Symposium on Security and Privacy).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

On the feasibility of internet-scale author identification

Narayanan, A., Paskov, H., Gong, N. Z., Bethencourt, J., Stefanov, E., Shin, E. C. R. & Song, D., Jan 1 2012, Proceedings - 2012 IEEE Symposium on Security and Privacy, S and P 2012. Institute of Electrical and Electronics Engineers Inc., p. 300-314 15 p. 6234420. (Proceedings - IEEE Symposium on Security and Privacy).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2011

Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge

Narayanan, A., Shi, E. & Rubinstein, B. I. P., Oct 24 2011, 2011 International Joint Conference on Neural Networks, IJCNN 2011 - Final Program. p. 1825-1834 10 p. 6033446. (Proceedings of the International Joint Conference on Neural Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

"You might also like:" Privacy risks of collaborative filtering

Calandrino, J. A., Kilzer, A., Narayanan, A., Felten, E. W. & Shmatikov, V., Aug 29 2011, Proceedings - 2011 IEEE Symposium on Security and Privacy, SP 2011. p. 231-246 16 p. 5958032. (Proceedings - IEEE Symposium on Security and Privacy).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2009

De-anonymizing social networks

Narayanan, A. & Shmatikov, V., Nov 23 2009, 2009 30th IEEE Symposium on Security and Privacy. p. 173-187 15 p. 5207644. (Proceedings - IEEE Symposium on Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2008

Robust de-anonymization of large sparse datasets

Narayanan, A. & Shmatikov, V., Sep 1 2008, Proceedings - 2008 IEEE Symposium on Security and Privacy, SP. p. 111-125 15 p. 4531148. (Proceedings - IEEE Symposium on Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2005

Fast dictionary attacks on passwords using time-space tradeoff

Narayanan, A. & Shmatikov, V., Dec 1 2005, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security. p. 364-372 9 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Obfuscated databases and group privacy

Narayanan, A. & Shmatikov, V., Dec 1 2005, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security. p. 102-111 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution