If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2020

AIQL: Enabling efficient attack investigation from system monitoring data

Gao, P., Xiao, X., Li, Z., Jee, K., Xu, F., Kulkarni, S. R. & Mittal, P., Jan 1 2020, Proceedings of the 2018 USENIX Annual Technical Conference, USENIX ATC 2018. USENIX Association, p. 113-125 13 p. (Proceedings of the 2018 USENIX Annual Technical Conference, USENIX ATC 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

Analyzing federated learning through an adversarial lens

Bhagoji, A. N., Chakraborty, S., Mittal, P. & Calo, S., Jan 1 2019, 36th International Conference on Machine Learning, ICML 2019. International Machine Learning Society (IMLS), p. 1012-1021 10 p. (36th International Conference on Machine Learning, ICML 2019; vol. 2019-June).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Analyzing the robustness of open-world machine learning

Sehwag, V., Sitawarin, C., Bhagoji, A. N., Cullina, D., Mittal, P., Song, L. & Chiang, M., Nov 11 2019, AISec 2019 - Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security. Association for Computing Machinery, p. 105-116 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning Informative and Private Representations via Generative Adversarial Networks

Yang, T. Y., Brinton, C., Mittal, P., Chiang, M. & Lan, A., Jan 22 2019, Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018. Song, Y., Liu, B., Lee, K., Abe, N., Pu, C., Qiao, M., Ahmed, N., Kossmann, D., Saltz, J., Tang, J., He, J., Liu, H. & Hu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1534-1543 10 p. 8622089. (Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Membership inference attacks against adversarially robust deep learning models

Song, L., Shokri, R. & Mittal, P., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy Workshops, SPW 2019. Institute of Electrical and Electronics Engineers Inc., p. 50-56 7 p. 8844607. (Proceedings - 2019 IEEE Symposium on Security and Privacy Workshops, SPW 2019).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy risks of securing machine learning models against adversarial examples

Song, L., Shokri, R. & Mittal, P., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 241-257 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Robust website fingerprinting through the cache occupancy channel

Shusterman, A., Kang, L., Haskal, Y., Meltser, Y., Mittal, P., Oren, Y. & Yarom, Y., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 639-656 18 p. (Proceedings of the 28th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SICO: Surgical interception attacks by manipulating BGP communities

Birge-Lee, H., Wang, L., Rexford, J. & Mittal, P., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 431-448 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Vaccine: Using contextual integrity for data leakage detection

Shvartzshnaider, Y., Wies, T., Pavlinovic, Z., Lakshminarayanan, Mittal, P., Balashankar, A. & Nissenbaum, H., May 13 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, p. 1702-1712 11 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watching you watch: The tracking ecosystem of over-the-top TV streaming devices

Moghaddam, H. M., Acar, G., Burgess, B., Mathur, A., Huang, D. Y., Feamster, N., Felten, E. W., Mittal, P. & Narayanan, A., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 131-147 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2018

Acoustic denial of service attacks on hard disk drives

Shahrad, M., Mosenia, A., Song, L., Chiang, M., Wentzlaff, D. & Mittal, P., Oct 15 2018, ASHES 2018 - Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2018. Association for Computing Machinery, p. 34-39 6 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Adaptive fog-based output security for augmented reality

Ahn, S., Gorlatova, M., Naghizadeh, P., Chiang, M. & Mittal, P., Aug 7 2018, VR/AR Network 2018 - Proceedings of the 2018 Morning Workshop on Virtual Reality and Augmented Reality Network, Part of SIGCOMM 2018. Association for Computing Machinery, Inc, p. 1-6 6 p. (VR/AR Network 2018 - Proceedings of the 2018 Morning Workshop on Virtual Reality and Augmented Reality Network, Part of SIGCOMM 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bamboozling certificate authorities with BGP

Birge-Lee, H., Sun, Y., Edmundson, A., Rexford, J. & Mittal, P., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 833-849 17 p. (Proceedings of the 27th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bayesian Regression for Robust Power Grid State Estimation Following a Cyber-Physical Attack

Soltan, S., Mittal, P. & Poor, H. V., Dec 21 2018, 2018 IEEE Power and Energy Society General Meeting, PESGM 2018. IEEE Computer Society, 8586142. (IEEE Power and Energy Society General Meeting; vol. 2018-August).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

BlackIoT: IoT botnet of high wattage devices can disrupt the power grid

Soltan, S., Mittal, P. & Poor, H. V., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 15-32 18 p. (Proceedings of the 27th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Blind source separation in the physical layer

Tait, A. N., De Lima, T. F., Ma, P. Y., Chang, M. P., Nahmias, M. A., Shastri, B. J., Mittal, P. & Prucnal, P. R., May 21 2018, 2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. (2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Enhancing robustness of machine learning systems via data transformations

Bhagoji, A. N., Cullina, D., Sitawarin, C. & Mittal, P., May 21 2018, 2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-5 5 p. (2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fundamental Limits of Database Alignment

Cullina, D., Mittal, P. & Kiyavash, N., Aug 15 2018, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., p. 651-655 5 p. 8437908. (IEEE International Symposium on Information Theory - Proceedings; vol. 2018-June).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

How to quantify graph De-anonymization risks

Lee, W. H., Liu, C., Ji, S., Mittal, P. & Lee, R. B., Jan 1 2018, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Mori, P., Camp, O. & Furnell, S. (eds.). Springer Verlag, p. 84-104 21 p. (Communications in Computer and Information Science; vol. 867).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

MVG mechanism: Differential privacy under matrix-valued query

Chanyaswad, T., Dytso, A., Poor, H. V. & Mittal, P., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 230-246 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SAQL: A stream-based query system for real-time abnormal system behavior detection

Gao, P., Xiao, X., Li, D., Li, Z., Jee, K., Wu, Z., Kim, C. H., Kulkarni, S. R. & Mittal, P., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 639-656 18 p. (Proceedings of the 27th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SYBILFUSE: Combining local attributes with global structure to perform robust sybil detection

Gao, P., Wang, B., Gong, N. Z., Kulkarni, S. R., Thomas, K. & Mittal, P., Aug 10 2018, 2018 IEEE Conference on Communications and Network Security, CNS 2018. Institute of Electrical and Electronics Engineers Inc., 8433147. (2018 IEEE Conference on Communications and Network Security, CNS 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Blind De-anonymization Attacks using Social Networks

Lee, W. H., Ji, S., Liu, C., Mittal, P. & Lee, R. B., Oct 30 2017, WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 1-4 4 p. (WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017; vol. 2017-January).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks

Zhou, Y., Wagh, S., Mittal, P. & Wentzlaff, D., May 5 2017, Proceedings - 2017 IEEE 23rd Symposium on High Performance Computer Architecture, HPCA 2017. IEEE Computer Society, p. 337-348 12 p. 7920837. (Proceedings - International Symposium on High-Performance Computer Architecture).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks

Sun, Y., Edmundson, A., Feamster, N., Chiang, M. & Mittal, P., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 977-992 16 p. 7958620. (Proceedings - IEEE Symposium on Security and Privacy).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Poster: Inaudible voice commands

Song, L. & Mittal, P., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2583-2585 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantification of de-anonymization risks in social networks

Lee, W. H., Liu, C., Ji, S., Mittal, P. & Lee, R., Jan 1 2017, ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Mori, P., Furnell, S. & Camp, O. (eds.). SciTePress, p. 126-135 10 p. (ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy; vol. 2017-January).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network

Liu, Z., Liu, Y., Winter, P., Mittal, P. & Hu, Y. C., Nov 21 2017, 2017 IEEE 25th International Conference on Network Protocols, ICNP 2017. IEEE Computer Society, 8117564. (Proceedings - International Conference on Network Protocols, ICNP; vol. 2017-October).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Using EEG-based BCI devices to subliminally probe for private information

Frank, M., Hwu, T., Jain, S., Knight, R. T., Martinovic, I., Mittal, P., Perito, D., Sluganovic, I. & Song, D., Oct 30 2017, WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 133-136 4 p. (WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017; vol. 2017-January).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Discriminant-component eigenfaces for privacy-preserving face recognition

Chanyaswad, T., Chang, J. M., Mittal, P. & Kung, S. Y., Nov 8 2016, 2016 IEEE International Workshop on Machine Learning for Signal Processing, MLSP 2016 - Proceedings. Diamantaras, K., Uncini, A., Palmieri, F. A. N. & Larsen, J. (eds.). IEEE Computer Society, 7738871. (IEEE International Workshop on Machine Learning for Signal Processing, MLSP; vol. 2016-November).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

On the relative de-anonymizability of graph data: Quantification and evaluation

Ji, S., Li, W., Yang, S., Mittal, P. & Beyah, R., Jul 27 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-July. 7524585

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SmartWalk: Enhancing social network security via adaptive random walks

Liu, Y., Ji, S. & Mittal, P., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 492-503 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

Exploiting temporal dynamics in Sybil defenses

Liu, C., Gao, P., Wright, M. & Mittal, P., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 805-816 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Raptor: Routing attacks on privacy in tor

Sun, Y., Edmundson, A., Vanbever, L., Li, O., Rexford, J., Chiang, M. & Mittal, P., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 271-286 16 p. (Proceedings of the 24th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization

Ji, S., Li, W., Mittal, P., Hu, X. & Beyah, R., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 303-318 16 p. (Proceedings of the 24th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2014

Anonymity on QuickSand: Using BGP to compromise tor

Vanbever, L., Li, O., Rexford, J. L. & Mittal, P., Oct 27 2014, Proceedings of the 13th ACM Workshop on Hot Topics in Networks, HotNets 2014. Association for Computing Machinery, Inc, 2673869. (Proceedings of the 13th ACM Workshop on Hot Topics in Networks, HotNets 2014).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Re3: Relay reliability reputation for anonymity systems

Das, A., Borisov, N., Mittal, P. & Caesar, M., Jun 4 2014, ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, Inc, p. 63-74 12 p. (ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

Cachet: A decentralized architecture for privacy preserving social networking with caching

Nilizadeh, S., Jahid, S., Mittal, P., Borisov, N. & Kapadia, A., Dec 1 2012, CoNEXT 2012 - Proceedings of the 2012 ACM Conference on Emerging Networking Experiments and Technologies. p. 337-348 12 p. (CoNEXT 2012 - Proceedings of the 2012 ACM Conference on Emerging Networking Experiments and Technologies).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DECENT: A decentralized architecture for enforcing privacy in online social networks

Jahid, S., Nilizadeh, S., Mittal, P., Borisov, N. & Kapadia, A., Jun 1 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012. p. 326-332 7 p. 6197504. (2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Evolution of social-attribute networks: Measurements, modeling, and implications using Google+

Gong, N. Z., Xu, W., Huang, L., Mittal, P., Stefanov, E., Sekar, V. & Song, D., Dec 17 2012, IMC 2012 - Proceedings of the ACM Internet Measurement Conference. p. 131-144 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SybilControl: Practical sybil defense with computational puzzles

Li, F., Mittal, P., Caesar, M. & Borisov, N., Nov 26 2012, STC'12 - Proceedings of the Workshop on Scalable Trusted Computing. p. 67-78 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2011

EASiER: Encryption-based access control in social networks with efficient revocation

Jahid, S., Mittal, P. & Borisov, N., May 20 2011, Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. p. 411-415 5 p. (Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

PIR-Tor: Scalable anonymous communication using private information retrieval

Mittal, P., Olumofin, F., Troncoso, C., Borisov, N. & Goldberg, I., Jan 1 2011, Proceedings of the 20th USENIX Security Symposium. USENIX Association, p. 475-490 16 p. (Proceedings of the 20th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting

Mittal, P., Khurshid, A., Juen, J., Caesar, M. & Borisov, N., Nov 14 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 215-226 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2010

BotGrep: Finding P2P bots with structured graph analysis

Nagaraja, S., Mittal, P., Hong, C. Y., Caesar, M. & Borisov, N., Jan 1 2010, Proceedings of the 19th USENIX Security Symposium. USENIX Association, p. 95-110 16 p. (Proceedings of the 19th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

In search of an anonymous and secure lookup attacks on structured peer-to-peer anonymous communication systems

Wang, Q., Mittal, P. & Borisov, N., Dec 16 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 308-318 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2009

ShadowWalker: Peer-to-peer anonymous communication using redundant structured topologies

Mittal, P. & Borisov, N., Dec 1 2009, CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. p. 161-172 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2008

Fair k mutual exclusion algorithm for peer to peer systems

Reddy, V. A., Mittal, P. & Gupta, I., Sep 22 2008, Proceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008. p. 655-662 8 p. 4595939. (Proceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information leaks in structured peer-to-peer anonymous communication systems

Mittal, P. & Borisov, N., Dec 1 2008, Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08. p. 267-278 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2007

Denial of service or denial of security?

Borisov, N., Danezis, G., Mittal, P. & Tabriz, P., Dec 1 2007, CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. p. 92-102 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution