If you made any changes in Pure these will be visible here soon.

Research Output

2020

AIQL: Enabling efficient attack investigation from system monitoring data

Kulkarni, S. R. & Mittal, P., Jan 1 2020, Proceedings of the 2018 USENIX Annual Technical Conference, USENIX ATC 2018. USENIX Association, p. 113-125 13 p. (Proceedings of the 2018 USENIX Annual Technical Conference, USENIX ATC 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

Accelerated secure key distribution based on localized and asymmetric fiber interferometers

Mittal, P. & Prucnal, P. R., Jan 1 2019, In : Optics Express. 27, 22, p. 32096-32110 15 p.

Princeton University

Research output: Contribution to journalArticle

Analyzing federated learning through an adversarial lens

Mittal, P., Jan 1 2019, 36th International Conference on Machine Learning, ICML 2019. International Machine Learning Society (IMLS), p. 1012-1021 10 p. (36th International Conference on Machine Learning, ICML 2019; vol. 2019-June).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Analyzing the robustness of open-world machine learning

Mittal, P., Nov 11 2019, AISec 2019 - Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security. Association for Computing Machinery, p. 105-116 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

De-SAG: On the De-Anonymization of Structure-Attribute Graph Data

Mittal, P., Jul 1 2019, In : IEEE Transactions on Dependable and Secure Computing. 16, 4, p. 594-607 14 p., 7938634.

Princeton University

Research output: Contribution to journalArticle

3 Scopus citations

Learning Informative and Private Representations via Generative Adversarial Networks

Brinton, C. & Mittal, P., Jan 22 2019, Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018. Song, Y., Liu, B., Lee, K., Abe, N., Pu, C., Qiao, M., Ahmed, N., Kossmann, D., Saltz, J., Tang, J., He, J., Liu, H. & Hu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1534-1543 10 p. 8622089. (Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Membership inference attacks against adversarially robust deep learning models

Mittal, P., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy Workshops, SPW 2019. Institute of Electrical and Electronics Engineers Inc., p. 50-56 7 p. 8844607. (Proceedings - 2019 IEEE Symposium on Security and Privacy Workshops, SPW 2019).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Privacy risks of securing machine learning models against adversarial examples

Mittal, P., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 241-257 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
1 Scopus citations

Robustness of Optical Steganographic Communication Under Coherent Detection Attack

Mittal, P. & Prucnal, P. R., Feb 15 2019, In : IEEE Photonics Technology Letters. 31, 4, p. 327-330 4 p., 8607988.

Princeton University

Research output: Contribution to journalArticle

3 Scopus citations

Robust website fingerprinting through the cache occupancy channel

Mittal, P., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 639-656 18 p. (Proceedings of the 28th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

SICO: Surgical interception attacks by manipulating BGP communities

Rexford, J. & Mittal, P., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 431-448 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
1 Scopus citations

Vaccine: Using contextual integrity for data leakage detection

Mittal, P., May 13 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, p. 1702-1712 11 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watching you watch: The tracking ecosystem of over-the-top TV streaming devices

Felten, E. W., Mittal, P. & Narayanan, A., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 131-147 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2018

Acoustic denial of service attacks on hard disk drives

Wentzlaff, D. & Mittal, P., Oct 15 2018, ASHES 2018 - Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2018. Association for Computing Machinery, p. 34-39 6 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Adaptive fog-based output security for augmented reality

Mittal, P., Aug 7 2018, VR/AR Network 2018 - Proceedings of the 2018 Morning Workshop on Virtual Reality and Augmented Reality Network, Part of SIGCOMM 2018. Association for Computing Machinery, Inc, p. 1-6 6 p. (VR/AR Network 2018 - Proceedings of the 2018 Morning Workshop on Virtual Reality and Augmented Reality Network, Part of SIGCOMM 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Automatically generating a large, culture-specific blocklist for China

Mittal, P., Hounsel, A. & Feamster, N., Jan 1 2018.

Princeton University

Research output: Contribution to conferencePaper

Bamboozling certificate authorities with BGP

Rexford, J. & Mittal, P., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 833-849 17 p. (Proceedings of the 27th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Bayesian Regression for Robust Power Grid State Estimation Following a Cyber-Physical Attack

Mittal, P. & Poor, H. V., Dec 21 2018, 2018 IEEE Power and Energy Society General Meeting, PESGM 2018. IEEE Computer Society, 8586142. (IEEE Power and Energy Society General Meeting; vol. 2018-August).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

BlackIoT: IoT botnet of high wattage devices can disrupt the power grid

Mittal, P. & Poor, H. V., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 15-32 18 p. (Proceedings of the 27th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Blind source separation in the physical layer

Mittal, P. & Prucnal, P. R., May 21 2018, 2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. (2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Enhancing robustness of machine learning systems via data transformations

Mittal, P., May 21 2018, 2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-5 5 p. (2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Fundamental Limits of Database Alignment

Mittal, P., Aug 15 2018, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., p. 651-655 5 p. 8437908. (IEEE International Symposium on Information Theory - Proceedings; vol. 2018-June).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

How to quantify graph De-anonymization risks

Mittal, P. & Lee, R. B., Jan 1 2018, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Mori, P., Camp, O. & Furnell, S. (eds.). Springer Verlag, p. 84-104 21 p. (Communications in Computer and Information Science; vol. 867).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

MVG mechanism: Differential privacy under matrix-valued query

Poor, H. V. & Mittal, P., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 230-246 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

PAC-learning in the presence of evasion adversaries

Mittal, P., Jan 1 2018, In : Advances in Neural Information Processing Systems. 2018-December, p. 230-241 12 p.

Princeton University

Research output: Contribution to journalConference article

1 Scopus citations

PinMe: Tracking a smartphone user around the world

Mittal, P. & Jha, N. K., Jul 1 2018, In : IEEE Transactions on Multi-Scale Computing Systems. 4, 3, p. 420-435 16 p., 8038870.

Princeton University

Research output: Contribution to journalArticle

7 Scopus citations

SAQL: A stream-based query system for real-time abnormal system behavior detection

Kulkarni, S. R. & Mittal, P., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 639-656 18 p. (Proceedings of the 27th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

SYBILFUSE: Combining local attributes with global structure to perform robust sybil detection

Kulkarni, S. R. & Mittal, P., Aug 10 2018, 2018 IEEE Conference on Communications and Network Security, CNS 2018. Institute of Electrical and Electronics Engineers Inc., 8433147. (2018 IEEE Conference on Communications and Network Security, CNS 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations
2017

Blind De-anonymization Attacks using Social Networks

Mittal, P. & Lee, R. B., Oct 30 2017, WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 1-4 4 p. (WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017; vol. 2017-January).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks

Mittal, P. & Wentzlaff, D., May 5 2017, Proceedings - 2017 IEEE 23rd Symposium on High Performance Computer Architecture, HPCA 2017. IEEE Computer Society, p. 337-348 12 p. 7920837. (Proceedings - International Symposium on High-Performance Computer Architecture).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks

Feamster, N., Chiang, M. & Mittal, P., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 977-992 16 p. 7958620. (Proceedings - IEEE Symposium on Security and Privacy).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey

Mittal, P., Apr 1 2017, In : IEEE Communications Surveys and Tutorials. 19, 2, p. 1305-1326 22 p., 7762777.

Princeton University

Research output: Contribution to journalReview article

24 Scopus citations
9 Scopus citations

Poster: Inaudible voice commands

Mittal, P., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2583-2585 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Quantification of de-anonymization risks in social networks

Mittal, P. & Lee, R., Jan 1 2017, ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Mori, P., Furnell, S. & Camp, O. (eds.). SciTePress, p. 126-135 10 p. (ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy; vol. 2017-January).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network

Mittal, P., Nov 21 2017, 2017 IEEE 25th International Conference on Network Protocols, ICNP 2017. IEEE Computer Society, 8117564. (Proceedings - International Conference on Network Protocols, ICNP; vol. 2017-October).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Using EEG-based BCI devices to subliminally probe for private information

Mittal, P., Oct 30 2017, WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 133-136 4 p. (WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017; vol. 2017-January).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations
2016

Discriminant-component eigenfaces for privacy-preserving face recognition

Mittal, P. & Kung, S. Y., Nov 8 2016, 2016 IEEE International Workshop on Machine Learning for Signal Processing, MLSP 2016 - Proceedings. Diamantaras, K., Uncini, A., Palmieri, F. A. N. & Larsen, J. (eds.). IEEE Computer Society, 7738871. (IEEE International Workshop on Machine Learning for Signal Processing, MLSP; vol. 2016-November).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

On the relative de-anonymizability of graph data: Quantification and evaluation

Mittal, P., Jul 27 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-July. 7524585

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Seed-Based De-Anonymizability Quantification of Social Networks

Mittal, P., Jul 1 2016, In : IEEE Transactions on Information Forensics and Security. 11, 7, p. 1398-1411 14 p., 7405301.

Princeton University

Research output: Contribution to journalArticle

16 Scopus citations

SmartWalk: Enhancing social network security via adaptive random walks

Mittal, P., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 492-503 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations
2015

Exploiting temporal dynamics in Sybil defenses

Mittal, P., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 805-816 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations
22 Scopus citations

Raptor: Routing attacks on privacy in tor

Rexford, J. & Mittal, P., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 271-286 16 p. (Proceedings of the 24th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization

Mittal, P., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 303-318 16 p. (Proceedings of the 24th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution