If you made any changes in Pure these will be visible here soon.

Research Output

2019

Conjure: Summoning proxies from unused address space

Frolov, S., Wampler, J., Tan, S. C., Alex Halderman, J., Borisov, N. & Wustrow, E., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2215-2229 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Outguard: Detecting in-browser covert cryptocurrency mining in the wild

Kharraz, A., Lever, C., Borisov, N., Ma, Z., Mason, J., Antonakakis, M., Murley, P., Miller, A. & Bailey, M., May 13 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, p. 840-852 13 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

What can you learn from an IP?

Patil, S. & Borisov, N., Jul 22 2019, ANRW 2019 - Proceedings of the 2019 Applied Networking Research Workshop. Association for Computing Machinery, Inc, p. 45-51 7 p. (ANRW 2019 - Proceedings of the 2019 Applied Networking Research Workshop).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

Property inference attacks on fully connected neural networks using permutation invariant representations

Ganju, K., Wang, Q., Yang, W., Gunter, C. A. & Borisov, N., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 619-633 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The Web’s sixth sense: A study of scripts accessing smartphone sensors

Das, A., Borisov, N., Acar, G. & Pradeep, A., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1515-1532 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TightRope: Towards optimal load-balancing of paths in anonymous networks

Darir, H., Sibai, H., Borisov, N., Dullerud, G. & Mitra, S., Oct 15 2018, WPES 2018 - Proceedings of the 2018 Workshop on Privacy in the Electronic Society, co-located with CCS 2018. Association for Computing Machinery, p. 76-85 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

An ISP-scale deployment of tapdance

Frolov, S., Douglas, F., Scott, W., McDonald, A., Vandersloot, B., Hynes, R., Kruger, A., Kallitsis, M., Robinson, D. G., Schultze, S., Borisov, N., Halderman, J. A. & Wustrow, E., 2017.

Research output: Contribution to conferencePaper

Mining on someone else’s dime: Mitigating covert mining operations in clouds and enterprises

Tahir, R., Huzaifa, M., Das, A., Ahmad, M., Gunter, C., Zaffar, F., Caesar, M. & Borisov, N., Jan 1 2017, Research in Attacks, Intrusions, and Defenses - 20th International Symposium, RAID 2017, Proceedings. Polychronakis, M., Antonakakis, M., Dacier, M. & Bailey, M. (eds.). Springer-Verlag, p. 287-310 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10453 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SmartCast: An incentive compatible consensus protocol using smart contracts

Kothapalli, A., Miller, A. & Borisov, N., Jan 1 2017, Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Revised Selected Papers. Miller, A., Brenner, M., Rohloff, K., Bonneau, J., Teague, V., Bracciali, A., Sala, M., Pintore, F., Jakobsson, M. & Ryan, P. Y. A. (eds.). Springer-Verlag Berlin Heidelberg, p. 536-552 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10323 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SWEET: Serving the web by exploiting email tunnels

Houmansadr, A., Zhou, W., Caesar, M. & Borisov, N., Jun 2017, In : IEEE/ACM Transactions on Networking. 25, 3, p. 1517-1527 11 p., 7819465.

Research output: Contribution to journalArticle

2016

Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing Systems

Jin, H., Su, L., Ding, B., Nahrstedt, K. & Borisov, N., Aug 8 2016, Proceedings - 2016 IEEE 36th International Conference on Distributed Computing Systems, ICDCS 2016. Institute of Electrical and Electronics Engineers Inc., p. 344-353 10 p. 7536533. (Proceedings - International Conference on Distributed Computing Systems; vol. 2016-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2014

Analyzing an adaptive reputation metric for anonymity systems

Das, A., Borisov, N. & Caesar, M., Jan 1 2014, Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014. Association for Computing Machinery, 11. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Do you hear what i hear? Fingerprinting smart devices through embedded acoustic components

Das, A., Borisov, N. & Caesar, M., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 441-452 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Non-blind watermarking of network flows

Houmansadr, A., Kiyavash, N. & Borisov, N., Aug 2014, In : IEEE/ACM Transactions on Networking. 22, 4, p. 1232-1244 13 p., 6572894.

Research output: Contribution to journalArticle

Re3: Relay reliability reputation for anonymity systems

Das, A., Borisov, N., Mittal, P. & Caesar, M., Jun 4 2014, ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, Inc, p. 63-74 12 p. (ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013

BotMosaic: Collaborative network watermark for the detection of IRC-based botnets

Houmansadr, A. & Borisov, N., Mar 1 2013, In : Journal of Systems and Software. 86, 3, p. 707-715 9 p.

Research output: Contribution to journalArticle

Poster - PnP: Improving web browsing performance over Tor using web resource prefetch-and-push

Nguyen, G. T. K., Gong, X., Das, A. & Borisov, N., Dec 9 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 1433-1435 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secloud: A cloud-based comprehensive and lightweight security solution for smartphones

Zonouz, S., Houmansadra, A., Berthiera, R., Borisova, N. & Sanders, W., Jan 1 2013, In : Computers and Security. 37, p. 215-227 13 p.

Research output: Contribution to journalArticle

Securing anonymous communication channels under the selective DoS attack

Das, A. & Borisov, N., Sep 5 2013, Financial Cryptography and Data Security - 17th International Conference, FC 2013, Revised Selected Papers. p. 362-370 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7859 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The need for flow fingerprints to link correlated network flows

Houmansadr, A. & Borisov, N., Oct 8 2013, Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Proceedings. p. 205-224 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7981 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

11th workshop on privacy in the electronic society

Borisov, N., Nov 26 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 1064-1065 2 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cachet: A decentralized architecture for privacy preserving social networking with caching

Nilizadeh, S., Jahid, S., Mittal, P., Borisov, N. & Kapadia, A., Dec 1 2012, CoNEXT 2012 - Proceedings of the 2012 ACM Conference on Emerging Networking Experiments and Technologies. p. 337-348 12 p. (CoNEXT 2012 - Proceedings of the 2012 ACM Conference on Emerging Networking Experiments and Technologies).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

CensorSpoofer: Asymmetric communication using IP spoofing for censorship-resistant web browsing

Wang, Q., Gong, X., Nguyen, G. T. K., Houmansadr, A. & Borisov, N., Nov 26 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 121-132 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DECENT: A decentralized architecture for enforcing privacy in online social networks

Jahid, S., Nilizadeh, S., Mittal, P., Borisov, N. & Kapadia, A., 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012. p. 326-332 7 p. 6197504. (2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Octopus: A secure and anonymous DHT lookup

Wang, Q. & Borisov, N., Oct 5 2012, p. 325-334. 10 p.

Research output: Contribution to conferencePaper

Preface

Borisov, N., Nov 22 2012, In : Proceedings of the ACM Conference on Computer and Communications Security. p. iii

Research output: Contribution to journalEditorial

SybilControl: Practical sybil defense with computational puzzles

Li, F., Mittal, P., Caesar, M. & Borisov, N., Nov 26 2012, STC'12 - Proceedings of the Workshop on Scalable Trusted Computing. p. 67-78 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Website detection using remote traffic analysis

Gong, X., Borisov, N., Kiyavash, N. & Schear, N., Jul 30 2012, Privacy Enhancing Technologies - 12th International Symposium, PETS 2012, Proceedings. p. 58-78 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7384 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2011

Cirripede: Circumvention infrastructure using router redirection with plausible deniability

Houmansadr, A., Nguyen, G. T. K., Caesar, M. & Borisov, N., Nov 14 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 187-199 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

CoCo: Coding-based covert timing channels for network flows

Houmansadr, A. & Borisov, N., Sep 26 2011, Information Hiding - 13th International Conference, IH 2011, Revised Selected Papers. p. 314-328 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6958 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Confidentiality-preserving proof theories for distributed proof systems

Minami, K., Borisov, N., Winslett, M. & Lee, A. J., 2011, Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. p. 145-154 10 p. (Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

EASiER: Encryption-based access control in social networks with efficient revocation

Jahid, S., Mittal, P. & Borisov, N., May 20 2011, Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. p. 411-415 5 p. (Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Improving security and performance in the tor network through tunable path selection

Snader, R. & Borisov, N., Jan 1 2011, In : IEEE Transactions on Dependable and Secure Computing. 8, 5, p. 728-741 14 p., 5560675.

Research output: Contribution to journalArticle

P3CA: Private anomaly detection across ISP networks

Nagaraja, S., Jalaparti, V., Caesar, M. & Borisov, N., Aug 11 2011, Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Proceedings. p. 38-56 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6794 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

PIR-Tor: Scalable anonymous communication using private information retrieval

Mittal, P., Olumofin, F., Troncoso, C., Borisov, N. & Goldberg, I., Jan 1 2011, Proceedings of the 20th USENIX Security Symposium. USENIX Association, p. 475-490 16 p. (Proceedings of the 20th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting

Mittal, P., Khurshid, A., Juen, J., Caesar, M. & Borisov, N., Nov 14 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 215-226 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stegobot: A covert social network botnet

Nagaraja, S., Houmansadr, A., Piyawongwisal, P., Singh, V., Agarwal, P. & Borisov, N., Sep 26 2011, Information Hiding - 13th International Conference, IH 2011, Revised Selected Papers. p. 299-313 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6958 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Towards improving network flow watermarks using the repeat-accumulate codes

Houmansadr, A. & Borisov, N., Aug 18 2011, 2011 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2011 - Proceedings. p. 1852-1855 4 p. 5946866. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2010

Attacking and repairing the improved modonions protocol

Borisov, N., Klonowski, M., Kutyłowski, M. & Lauks-Dutka, A., Jul 20 2010, Information Security and Cryptology - ICISC 2009 - 12th International Conference, Revised Selected Papers. p. 258-273 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5984 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Attacking and repairing the improved modonions protocol-tagging approach

Borisov, N., Klonowski, M., Kutyłowski, M. & Lauks-Dutka, A., Jun 30 2010, In : KSII Transactions on Internet and Information Systems. 4, 3, p. 380-399 20 p.

Research output: Contribution to journalArticle

BotGrep: Finding P2P bots with structured graph analysis

Nagaraja, S., Mittal, P., Hong, C. Y., Caesar, M. & Borisov, N., 2010, Proceedings of the 19th USENIX Security Symposium. USENIX Association, p. 95-110 16 p. (Proceedings of the 19th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fingerprinting websites using remote traffic analysis

Gong, X., Kiyavash, N. & Borisov, N., Dec 16 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 684-686 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

In search of an anonymous and secure lookup attacks on structured peer-to-peer anonymous communication systems

Wang, Q., Mittal, P. & Borisov, N., Dec 16 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 308-318 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Low-cost side channel remote traffic analysis attack in packet networks

Kadloor, S., Gong, X., Kiyavash, N., Tezcan, T. & Borisov, N., Aug 13 2010, 2010 IEEE International Conference on Communications, ICC 2010. 5501972. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Protecting location privacy against inference attacks

Minami, K. & Borisov, N., Dec 16 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 711-713 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Protecting location privacy against inference attacks

Minami, K. & Borisov, N., Dec 21 2010, Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS'10. p. 123-126 4 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2009

Confidentiality-preserving distributed proofs of conjunctive queries

Lee, A. J., Minami, K. & Borisov, N., Dec 1 2009, Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09. p. 287-297 11 p. (Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multi-flowattack resistant watermarks for network flows

Houmansadr, A., Kiyavash, N. & Borisov, N., Sep 23 2009, 2009 IEEE International Conference on Acoustics, Speech, and Signal Processing - Proceedings, ICASSP 2009. p. 1497-1500 4 p. 4959879. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Safety in discretionary access control for logic-based publish-subscribe systems

Minami, K., Borisov, N. & Gunter, C., Nov 30 2009, SACMAT'09 - Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. p. 3-12 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution