If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2019

Conjure: Summoning proxies from unused address space

Frolov, S., Wampler, J., Tan, S. C., Alex Halderman, J., Borisov, N. & Wustrow, E., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2215-2229 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Outguard: Detecting in-browser covert cryptocurrency mining in the wild

Kharraz, A., Lever, C., Borisov, N., Ma, Z., Mason, J., Antonakakis, M., Murley, P., Miller, A. & Bailey, M., May 13 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, p. 840-852 13 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

What can you learn from an IP?

Patil, S. & Borisov, N., Jul 22 2019, ANRW 2019 - Proceedings of the 2019 Applied Networking Research Workshop. Association for Computing Machinery, Inc, p. 45-51 7 p. (ANRW 2019 - Proceedings of the 2019 Applied Networking Research Workshop).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

Property inference attacks on fully connected neural networks using permutation invariant representations

Ganju, K., Wang, Q., Yang, W., Gunter, C. A. & Borisov, N., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 619-633 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The Web’s sixth sense: A study of scripts accessing smartphone sensors

Das, A., Borisov, N., Acar, G. & Pradeep, A., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1515-1532 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TightRope: Towards optimal load-balancing of paths in anonymous networks

Darir, H., Sibai, H., Borisov, N., Dullerud, G. & Mitra, S., Oct 15 2018, WPES 2018 - Proceedings of the 2018 Workshop on Privacy in the Electronic Society, co-located with CCS 2018. Association for Computing Machinery, p. 76-85 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Mining on someone else’s dime: Mitigating covert mining operations in clouds and enterprises

Tahir, R., Huzaifa, M., Das, A., Ahmad, M., Gunter, C., Zaffar, F., Caesar, M. & Borisov, N., Jan 1 2017, Research in Attacks, Intrusions, and Defenses - 20th International Symposium, RAID 2017, Proceedings. Polychronakis, M., Antonakakis, M., Dacier, M. & Bailey, M. (eds.). Springer-Verlag, p. 287-310 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10453 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SmartCast: An incentive compatible consensus protocol using smart contracts

Kothapalli, A., Miller, A. & Borisov, N., Jan 1 2017, Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Revised Selected Papers. Miller, A., Brenner, M., Rohloff, K., Bonneau, J., Teague, V., Bracciali, A., Sala, M., Pintore, F., Jakobsson, M. & Ryan, P. Y. A. (eds.). Springer-Verlag Berlin Heidelberg, p. 536-552 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10323 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing Systems

Jin, H., Su, L., Ding, B., Nahrstedt, K. & Borisov, N., Aug 8 2016, Proceedings - 2016 IEEE 36th International Conference on Distributed Computing Systems, ICDCS 2016. Institute of Electrical and Electronics Engineers Inc., p. 344-353 10 p. 7536533. (Proceedings - International Conference on Distributed Computing Systems; vol. 2016-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2014

Analyzing an adaptive reputation metric for anonymity systems

Das, A., Borisov, N. & Caesar, M., Jan 1 2014, Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014. Association for Computing Machinery, 11. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Do you hear what i hear? Fingerprinting smart devices through embedded acoustic components

Das, A., Borisov, N. & Caesar, M., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 441-452 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Re3: Relay reliability reputation for anonymity systems

Das, A., Borisov, N., Mittal, P. & Caesar, M., Jun 4 2014, ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, Inc, p. 63-74 12 p. (ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013

Poster - PnP: Improving web browsing performance over Tor using web resource prefetch-and-push

Nguyen, G. T. K., Gong, X., Das, A. & Borisov, N., Dec 9 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 1433-1435 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Securing anonymous communication channels under the selective DoS attack

Das, A. & Borisov, N., Sep 5 2013, Financial Cryptography and Data Security - 17th International Conference, FC 2013, Revised Selected Papers. p. 362-370 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7859 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The need for flow fingerprints to link correlated network flows

Houmansadr, A. & Borisov, N., Oct 8 2013, Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Proceedings. p. 205-224 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7981 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

11th workshop on privacy in the electronic society

Borisov, N., Nov 26 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 1064-1065 2 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cachet: A decentralized architecture for privacy preserving social networking with caching

Nilizadeh, S., Jahid, S., Mittal, P., Borisov, N. & Kapadia, A., Dec 1 2012, CoNEXT 2012 - Proceedings of the 2012 ACM Conference on Emerging Networking Experiments and Technologies. p. 337-348 12 p. (CoNEXT 2012 - Proceedings of the 2012 ACM Conference on Emerging Networking Experiments and Technologies).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

CensorSpoofer: Asymmetric communication using IP spoofing for censorship-resistant web browsing

Wang, Q., Gong, X., Nguyen, G. T. K., Houmansadr, A. & Borisov, N., Nov 26 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 121-132 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DECENT: A decentralized architecture for enforcing privacy in online social networks

Jahid, S., Nilizadeh, S., Mittal, P., Borisov, N. & Kapadia, A., 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012. p. 326-332 7 p. 6197504. (2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SybilControl: Practical sybil defense with computational puzzles

Li, F., Mittal, P., Caesar, M. & Borisov, N., Nov 26 2012, STC'12 - Proceedings of the Workshop on Scalable Trusted Computing. p. 67-78 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Website detection using remote traffic analysis

Gong, X., Borisov, N., Kiyavash, N. & Schear, N., Jul 30 2012, Privacy Enhancing Technologies - 12th International Symposium, PETS 2012, Proceedings. p. 58-78 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7384 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2011

Cirripede: Circumvention infrastructure using router redirection with plausible deniability

Houmansadr, A., Nguyen, G. T. K., Caesar, M. & Borisov, N., Nov 14 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 187-199 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

CoCo: Coding-based covert timing channels for network flows

Houmansadr, A. & Borisov, N., Sep 26 2011, Information Hiding - 13th International Conference, IH 2011, Revised Selected Papers. p. 314-328 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6958 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Confidentiality-preserving proof theories for distributed proof systems

Minami, K., Borisov, N., Winslett, M. & Lee, A. J., 2011, Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. p. 145-154 10 p. (Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

EASiER: Encryption-based access control in social networks with efficient revocation

Jahid, S., Mittal, P. & Borisov, N., May 20 2011, Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. p. 411-415 5 p. (Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

P3CA: Private anomaly detection across ISP networks

Nagaraja, S., Jalaparti, V., Caesar, M. & Borisov, N., Aug 11 2011, Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Proceedings. p. 38-56 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6794 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

PIR-Tor: Scalable anonymous communication using private information retrieval

Mittal, P., Olumofin, F., Troncoso, C., Borisov, N. & Goldberg, I., Jan 1 2011, Proceedings of the 20th USENIX Security Symposium. USENIX Association, p. 475-490 16 p. (Proceedings of the 20th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting

Mittal, P., Khurshid, A., Juen, J., Caesar, M. & Borisov, N., Nov 14 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 215-226 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stegobot: A covert social network botnet

Nagaraja, S., Houmansadr, A., Piyawongwisal, P., Singh, V., Agarwal, P. & Borisov, N., Sep 26 2011, Information Hiding - 13th International Conference, IH 2011, Revised Selected Papers. p. 299-313 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6958 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Towards improving network flow watermarks using the repeat-accumulate codes

Houmansadr, A. & Borisov, N., Aug 18 2011, 2011 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2011 - Proceedings. p. 1852-1855 4 p. 5946866. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2010

Attacking and repairing the improved modonions protocol

Borisov, N., Klonowski, M., Kutyłowski, M. & Lauks-Dutka, A., Jul 20 2010, Information Security and Cryptology - ICISC 2009 - 12th International Conference, Revised Selected Papers. p. 258-273 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5984 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

BotGrep: Finding P2P bots with structured graph analysis

Nagaraja, S., Mittal, P., Hong, C. Y., Caesar, M. & Borisov, N., 2010, Proceedings of the 19th USENIX Security Symposium. USENIX Association, p. 95-110 16 p. (Proceedings of the 19th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fingerprinting websites using remote traffic analysis

Gong, X., Kiyavash, N. & Borisov, N., Dec 16 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 684-686 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

In search of an anonymous and secure lookup attacks on structured peer-to-peer anonymous communication systems

Wang, Q., Mittal, P. & Borisov, N., Dec 16 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 308-318 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Low-cost side channel remote traffic analysis attack in packet networks

Kadloor, S., Gong, X., Kiyavash, N., Tezcan, T. & Borisov, N., Aug 13 2010, 2010 IEEE International Conference on Communications, ICC 2010. 5501972. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Protecting location privacy against inference attacks

Minami, K. & Borisov, N., Dec 16 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 711-713 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Protecting location privacy against inference attacks

Minami, K. & Borisov, N., Dec 21 2010, Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS'10. p. 123-126 4 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2009

Confidentiality-preserving distributed proofs of conjunctive queries

Lee, A. J., Minami, K. & Borisov, N., Dec 1 2009, Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09. p. 287-297 11 p. (Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multi-flowattack resistant watermarks for network flows

Houmansadr, A., Kiyavash, N. & Borisov, N., Sep 23 2009, 2009 IEEE International Conference on Acoustics, Speech, and Signal Processing - Proceedings, ICASSP 2009. p. 1497-1500 4 p. 4959879. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Safety in discretionary access control for logic-based publish-subscribe systems

Minami, K., Borisov, N. & Gunter, C., Nov 30 2009, SACMAT'09 - Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. p. 3-12 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

ShadowWalker: Peer-to-peer anonymous communication using redundant structured topologies

Mittal, P. & Borisov, N., Dec 1 2009, CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. p. 161-172 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2008

Deleting index entries from compliance storage

Mitra, S., Winslett, M. & Borisov, N., May 16 2008, Advances in Database Technology - EDBT 2008 - 11th International Conference on Extending Database Technology, Proceedings. p. 109-120 12 p. (Advances in Database Technology - EDBT 2008 - 11th International Conference on Extending Database Technology, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

FlyByNight: Mitigating the privacy risks of social networking

Lucas, M. M. & Borisov, N., Dec 1 2008, Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, WPES'08,Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08. p. 1-8 8 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

High-speed matching of vulnerability signatures

Schear, N., Albrecht, D. R. & Borisov, N., Nov 27 2008, Recent Advances in Intrusion Detection - 11th International Symposium, RAID 2008, Proceedings. p. 155-174 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5230 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information leaks in structured peer-to-peer anonymous communication systems

Mittal, P. & Borisov, N., 2008, Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08. p. 267-278 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Restricted queries over an encrypted index with applications to regulatory compliance

Borisov, N. & Mitra, S., Jun 30 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. p. 373-391 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure aggregation in a publish-subscribe system

Minami, K., Lee, A. J., Winslett, M. & Borisov, N., Dec 1 2008, Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, WPES'08,Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08. p. 95-103 9 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2007

Denial of service or denial of security?

Borisov, N., Danezis, G., Mittal, P. & Tabriz, P., Dec 1 2007, CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. p. 92-102 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Improving multi-tier security using redundant authentication

Boyer, J. P., Hasan, R., Olson, L. E., Borisov, N., Gunter, C. A. & Raila, D., Dec 1 2007, CSAW'07 - Proceedings of the 2007 ACM Computer Security Architecture Workshop. p. 54-62 9 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Single-bit re-encryption with applications to distributed proof systems

Borisov, N. & Minami, K., Dec 1 2007, WPES'07 - Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society. p. 48-55 8 p. (WPES'07 - Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society).

Research output: Chapter in Book/Report/Conference proceedingConference contribution