Princeton University

General Info

Rank: #23 Worldwide
#18 in US
Papers: 99
Number of Researchers: 107
APA
(average papers per authors):
0.9
Country: USA

Activity Map

Contributors

  • Prateek Mittal (28 papers)
  • Edward W. Felten (17 papers)
  • Nick Feamster (9 papers)
  • Arvind Narayanan (9 papers)
  • Joseph Bonneau (6 papers)
  • J. Alex Halderman (5 papers)
  • Anne Edmundson (5 papers)
  • Jennifer Rexford (5 papers)
  • Yixin Sun (4 papers)
  • Andrew W. Appel (4 papers)
  • Ruby B. Lee (4 papers)
  • Saeed Mahloujifar (4 papers)
  • Steven Goldfeder (4 papers)
  • Henry Birge-Lee (4 papers)
  • Brent Waters (3 papers)
  • Nadia Heninger (3 papers)
  • Changchang Liu (3 papers)
  • Philipp Winter (3 papers)
  • William Clarkson (3 papers)
  • Joseph A. Calandrino (3 papers)
  • Aaron Blankstein (3 papers)
  • Michael J. Freedman (3 papers)
  • Roya Ensafi (3 papers)
  • Harry Kalodner (3 papers)
  • Liwei Song (3 papers)
  • Liang Wang (3 papers)
  • Chong Xiang (3 papers)
  • Jonathan Mayer (3 papers)
  • Qiang Huang (2 papers)
  • Laura M. Roberts (2 papers)
  • Yushan Liu (2 papers)
  • Sudhakar Govindavajhala (2 papers)
  • Mung Chiang (2 papers)
  • Michael A. Schneider (2 papers)
  • Steven Englehardt (2 papers)
  • Peng Gao (2 papers)
  • Katherine Q. Ye (2 papers)
  • Lennart Beringer (2 papers)
  • H. Vincent Poor (2 papers)
  • Gunes Acar (2 papers)
  • Ben Burgess (2 papers)
  • Paul Schmitt (2 papers)
  • Ariel J. Feldman (2 papers)
  • Kevin Lee (2 papers)
  • Anunay Kulshrestha (2 papers)
  • Soumyadeep Ghosh (1 papers)
  • David I. August (1 papers)
  • Michael Kranch (1 papers)
  • Srikanth Sundaresan (1 papers)
  • Aylin Caliskan (1 papers)
  • Kyle Jamieson (1 papers)
  • Dirk Balfanz (1 papers)
  • Adam Finkelstein (1 papers)
  • Fangfei Liu (1 papers)
  • Joshua Kroll (1 papers)
  • Danny Yuxing Huang (1 papers)
  • Amit Sahai (1 papers)
  • Boaz Barak (1 papers)
  • Jay Ligatti (1 papers)
  • Jeffrey S. Dwoskin (1 papers)
  • Jakub Szefer (1 papers)
  • Eric Keller (1 papers)
  • Yu-Yuan Chen (1 papers)
  • Pramod A. Jamkhedkar (1 papers)
  • Christian Eubank (1 papers)
  • Paul Cuff (1 papers)
  • Lanqing Yu (1 papers)
  • Miles Carlsten (1 papers)
  • Matthew Weinberg (1 papers)
  • Naphat Sanguansin (1 papers)
  • Thee Chanyaswad (1 papers)
  • Alex Dytso (1 papers)
  • Hooman Mohajeri Moghaddam (1 papers)
  • Arunesh Mathur (1 papers)
  • Danny Y. Huang (1 papers)
  • Jordan Holland (1 papers)
  • Pramod Viswanath (1 papers)
  • Scott A. Craver (1 papers)
  • Min Wu (1 papers)
  • Bede Liu (1 papers)
  • Lujo Bauer (1 papers)
  • Xinming Ou (1 papers)
  • Jacob Appelbaum (1 papers)
  • Oscar Li (1 papers)
  • Marcela S. Melara (1 papers)
  • Ben Jones (1 papers)
  • Saleh Soltan (1 papers)
  • Marshini Chetty (1 papers)
  • Sanjeev R. Kulkarni (1 papers)
  • Xiaoqi Chen (1 papers)
  • S. Matthew Weinberg (1 papers)
  • Noah Apthorpe (1 papers)
  • Sarah Varghese (1 papers)
  • Jake Reichel (1 papers)
  • Fleming Peck (1 papers)
  • Mikako Inaba (1 papers)
  • Bisrat Moges (1 papers)
  • Brahmnoor Singh Chawla (1 papers)
  • Malte Moser (1 papers)
  • Ben Kaiser (1 papers)
  • Jerry Wei (1 papers)
  • Eli Lucherini (1 papers)
  • Vikash Sehwag (1 papers)
  • Xinyu Tang (1 papers)
  • Grace H. Cimaszewski (1 papers)
  • Austin Hounsel (1 papers)
  • Andre Xiong (1 papers)

Papers

"A Security Infrastructure for Distributed Java Applications"

Dirk Balfanz, ... -- Oakland 2000

"Timing Attacks on Web Privacy"

Edward W. Felten, Michael A. Schneider, ... -- CCS 2000

"Reading Between the Lines: Lessons from the SDMI Challenge"

Scott A. Craver, Min Wu, Bede Liu, Edward W. Felten, ... -- Usenix 2001

"A General and Flexible Access-Control System for the Web"

Lujo Bauer, Michael A. Schneider, Edward W. Felten, ... -- Usenix 2002

"Using Memory Errors to Attack a Virtual Machine"

Sudhakar Govindavajhala, Andrew W. Appel, ... -- Oakland 2003

"Receiver anonymity via incomparable public keys"

Brent Waters, Edward W. Felten, Amit Sahai, ... -- CCS 2003

"Building an Encrypted and Searchable Audit Log"

Brent Waters, ... -- NDSS 2004

"New Client Puzzle Outsourcing Techniques for DoS Resistancestems"

Brent Waters, J. Alex Halderman, Edward W. Felten, ... -- CCS 2004

"Privacy-Preserving Friends Troubleshooting Network"

Qiang Huang, ... -- NDSS 2005

"Applications of Secure Electronic Voting to Automated Privacy-Preserving Troubleshooting"

Qiang Huang, ... -- CCS 2005

"An architecture for robust pseudo-random generation and Applications to /dev/random"

Boaz Barak, ... -- CCS 2005

"Control-Flow Integrity: Principles, Implementations, and Applications"

Jay Ligatti, ... -- CCS 2005

"MulVAL: A Logic-based Network Security Analyzer"

Xinming Ou, Sudhakar Govindavajhala, Andrew W. Appel, ... -- Usenix 2005

"Lessons from the Sony CD DRM Episode"

J. Alex Halderman, Edward W. Felten, ... -- Usenix 2006

"Harvesting Verifiable Challenges from Oblivious Online Sources"

J. Alex Halderman, ... -- CCS 2007

"Hardware-rooted Trust for Secure Key Management and Transient Trust"

Jeffrey S. Dwoskin, Ruby B. Lee, ... -- CCS 2007

"Lest We Remember: Cold Boot Attacks on Encryption Keys"

J. Alex Halderman, William Clarkson, Nadia Heninger, Edward W. Felten, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, ... -- Usenix 2008

"Fingerprinting Blank Paper Using Commodity Scanners"

J. Alex Halderman, William Clarkson, Adam Finkelstein, Nadia Heninger, Edward W. Felten, ... -- Oakland 2009

"Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs"

Nadia Heninger, Edward W. Felten, ... -- NDSS 2010

"'You Might Also Like:' Privacy Risks of Collaborative Filtering"

Joseph A. Calandrino, Edward W. Felten, ... -- Oakland 2011

"Eliminating the Hypervisor Attack Surface for a More Secure Cloud"

Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer Rexford, ... -- CCS 2011

"Bubble Trouble: Off-Line De-Anonymization of Bubble Forms"

Joseph A. Calandrino, William Clarkson, Edward W. Felten, ... -- Usenix 2011

"A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware"

Soumyadeep Ghosh, David I. August, ... -- NDSS 2012

"A Software-Hardware Architecture for Self-Protecting Data"

Yu-Yuan Chen, Pramod A. Jamkhedkar, Ruby B. Lee, ... -- CCS 2012

"Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider"

Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten, ... -- Usenix 2012

"A Scanner Darkly: Protecting User Privacy From Perceptual Applications"

Arvind Narayanan, ... -- Oakland 2013

"The Tangled Web of Password Reuse"

Joseph Bonneau, ... -- NDSS 2014

"Automating Isolation and Least Privilege in Web Services"

Aaron Blankstein, Michael J. Freedman, ... -- Oakland 2014

"The Web never forgets: Persistent tracking mechanisms in the wild"

Christian Eubank, Steven Englehardt, Arvind Narayanan, ... -- CCS 2014

"Towards Reliable Storage of 56-bit Secrets in Human Memory"

Joseph Bonneau, ... -- Usenix 2014

"On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge"

Prateek Mittal, ... -- NDSS 2015

"Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning"

Joseph Bonneau, Michael Kranch, ... -- NDSS 2015

"Cracking-Resistant Password Vaults using Natural Language Encoders"

Joseph Bonneau, ... -- Oakland 2015

"Last-Level Cache Side-Channel Attacks are Practical"

Fangfei Liu, Ruby B. Lee, ... -- Oakland 2015

"SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies"

Joseph Bonneau, Arvind Narayanan, Joshua Kroll, Edward W. Felten, ... -- Oakland 2015

"SoK: Secure Messaging"

Joseph Bonneau, ... -- Oakland 2015

"Exploiting Temporal Dynamics in Sybil Defenses"

Peng Gao, Changchang Liu, Prateek Mittal, ... -- CCS 2015

"Verified Correctness and Security of OpenSSL HMAC"

Lennart Beringer, Katherine Q. Ye, Andrew W. Appel, ... -- Usenix 2015

"De-anonymizing Programmers via Code Stylometry"

Arvind Narayanan, ... -- Usenix 2015

"RAPTOR: Routing Attacks on Privacy in Tor"

Yixin Sun, Anne Edmundson, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal, ... -- Usenix 2015

"SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization"

Prateek Mittal, ... -- Usenix 2015

"Bringing Deployable Key Transparency to End Users"

Marcela S. Melara, Aaron Blankstein, Edward W. Felten, Michael J. Freedman, ... -- Usenix 2015

"Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples"

Changchang Liu, Prateek Mittal, ... -- NDSS 2016

"LinkMirage: Enabling Privacy-preserving Analytics on Social Relationships"

Changchang Liu, Prateek Mittal, ... -- NDSS 2016

"Differential Privacy as a Mutual Information Constraint"

Paul Cuff, Lanqing Yu, ... -- CCS 2016

"Online tracking: A 1-million-site measurement and analysis"

Steven Englehardt, Arvind Narayanan, ... -- CCS 2016

"PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration"

Nick Feamster, ... -- CCS 2016

"SmartWalk: Enhancing Social Network Security via Adaptive Random Walks"

Yushan Liu, Prateek Mittal, ... -- CCS 2016

"On the instability of Bitcoin without the block reward"

Miles Carlsten, Harry Kalodner, Matthew Weinberg, Arvind Narayanan, ... -- CCS 2016

"Identifying and characterizing Sybils in the Tor network"

Philipp Winter, Roya Ensafi, Nick Feamster, ... -- Usenix 2016

"The Effect of DNS on Tor's Anonymity"

Laura M. Roberts, Philipp Winter, Nick Feamster, ... -- NDSS 2017

"Augur: Internet-Wide Detection of Connectivity Disruptions"

Roya Ensafi, Nick Feamster, ... -- Oakland 2017

"Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks"

Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal, ... -- Oakland 2017

"Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives"

Steven Goldfeder, ... -- CCS 2017

"Verified Correctness and Security of mbedTLS HMAC-DRBG"

Katherine Q. Ye, Naphat Sanguansin, Lennart Beringer, Andrew W. Appel, ... -- CCS 2017

"Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services"

Steven Goldfeder, ... -- CCS 2017

"Global Measurement of DNS Censorship"

Ben Jones, Roya Ensafi, Nick Feamster, ... -- Usenix 2017

"Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem."

Srikanth Sundaresan, ... -- NDSS 2018

"When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries."

Aylin Caliskan, Arvind Narayanan, ... -- NDSS 2018

"Towards a Timely Causality Analysis for Enterprise Security."

Yushan Liu, Prateek Mittal, ... -- NDSS 2018

"Tracking Ransomware End-to-end"

Danny Yuxing Huang, ... -- Oakland 2018

"MVG Mechanism: Differential Privacy under Matrix-Valued Query"

Thee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal, ... -- CCS 2018

"Cross-App Poisoning in Software-Defined Networking"

Anne Edmundson, ... -- CCS 2018

"Fast Multiparty Threshold ECDSA with Fast Trustless Setup"

Steven Goldfeder, ... -- CCS 2018

"Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors"

Gunes Acar, ... -- CCS 2018

"BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid"

Saleh Soltan, Prateek Mittal, H. Vincent Poor, ... -- Usenix 2018

"How Do Tor Users Interact With Onion Services?"

Philipp Winter, Anne Edmundson, Laura M. Roberts, Marshini Chetty, Nick Feamster, ... -- Usenix 2018

"SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection"

Peng Gao, Sanjeev R. Kulkarni, Prateek Mittal, ... -- Usenix 2018

"Bamboozling Certificate Authorities with BGP"

Henry Birge-Lee, Yixin Sun, Anne Edmundson, Jennifer Rexford, Prateek Mittal, ... -- Usenix 2018

"Arbitrum: Scalable, private smart contracts"

Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg, Edward W. Felten, ... -- Usenix 2018

"Countering Malicious Processes with Process-DNS Association"

Yixin Sun, ... -- NDSS 2019

"Privacy Risks of Securing Machine Learning Models against Adversarial Examples"

Liwei Song, Prateek Mittal, ... -- CCS 2019

"SICO: Surgical Interception Attacks by Manipulating BGP Communities"

Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal, ... -- CCS 2019

"Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices"

Hooman Mohajeri Moghaddam, Gunes Acar, Arunesh Mathur, Danny Y. Huang, Ben Burgess, Nick Feamster, Edward W. Felten, Prateek Mittal, Arvind Narayanan, ... -- CCS 2019

"Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA"

Noah Apthorpe, Sarah Varghese, Nick Feamster, ... -- Usenix 2019

"Robust Website Fingerprinting Through the Cache Occupancy Channel"

Prateek Mittal, ... -- Usenix 2019

"Metamorph: Injecting Inaudible Commands into Over-the-air Voice Controlled Systems"

Kyle Jamieson, ... -- NDSS 2020

"CLAPS: Client-Location-Aware Path Selection in Tor"

Prateek Mittal, ... -- CCS 2020

"'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsApp"

Jake Reichel, Fleming Peck, Mikako Inaba, Bisrat Moges, Brahmnoor Singh Chawla, ... -- Usenix 2020

"BlockSci: Design and applications of a blockchain analysis platform"

Harry Kalodner, Malte Moser, Kevin Lee, Arvind Narayanan, ... -- Usenix 2020

"Is Private Learning Possible with Instance Encoding?"

Saeed Mahloujifar, ... -- Oakland 2021

"DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks"

Chong Xiang, Prateek Mittal, ... -- CCS 2021

"New Directions in Automated Traffic Analysis"

Jordan Holland, Paul Schmitt, Prateek Mittal, ... -- CCS 2021

"Identifying Harmful Media in End-to-End Encrypted Communication: Efficient Private Membership Computation"

Anunay Kulshrestha, Jonathan Mayer, ... -- Usenix 2021

"Adapting Security Warnings to Counter Online Disinformation"

Ben Kaiser, Jerry Wei, Eli Lucherini, Kevin Lee, Jonathan Mayer, ... -- Usenix 2021

"Pretty Good Phone Privacy"

Paul Schmitt, ... -- Usenix 2021

"PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking"

Chong Xiang, Vikash Sehwag, Prateek Mittal, ... -- Usenix 2021

"Systematic Evaluation of Privacy Risks of Machine Learning Models"

Liwei Song, Prateek Mittal, ... -- Usenix 2021

"Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt"

Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal, ... -- Usenix 2021

"F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure"

Prateek Mittal, ... -- NDSS 2022

"Property Inference from Poisoning"

Saeed Mahloujifar, ... -- Oakland 2022

"Minotaur: Multi-Resource Blockchain Consensus"

Pramod Viswanath, ... -- CCS 2022

"PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"

Chong Xiang, Saeed Mahloujifar, Prateek Mittal, ... -- Usenix 2022

"Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture"

Xinyu Tang, Saeed Mahloujifar, Liwei Song, Prateek Mittal, ... -- Usenix 2022

"Creating a Secure Underlay for the Internet"

Henry Birge-Lee, Grace H. Cimaszewski, Liang Wang, Prateek Mittal, ... -- Usenix 2022

"Estimating Incidental Collection in Foreign Intelligence Surveillance: Large-Scale Multiparty Private Set Intersection with Union and Sum"

Anunay Kulshrestha, Jonathan Mayer, ... -- Usenix 2022

"How and Why People Use Virtual Private Networks"

Austin Hounsel, Andre Xiong, ... -- Usenix 2022

"Watching the watchers: bias and vulnerability in remote proctoring software"

Ben Burgess, Edward W. Felten, ... -- Usenix 2022

"QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework"

Prateek Mittal, ... -- Usenix 2022