Filter
Conference contribution

Search results

  • 2024

    DiProber: Estimating Relays Capacities in Underloaded Anonymous Communication Networks

    Darir, H., Borisov, N. & Dullerud, G., 2024, 2024 American Control Conference, ACC 2024. Institute of Electrical and Electronics Engineers Inc., p. 462-467 6 p. (Proceedings of the American Control Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2023

    ProbFlow: Using Probabilistic Programming in Anonymous Communication Networks

    Darir, H., Dullerud, G. & Borisov, N., 2023, 30th Annual Network and Distributed System Security Symposium, NDSS 2023. The Internet Society, (30th Annual Network and Distributed System Security Symposium, NDSS 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2021

    Detecting AI trojans using meta neural analysis

    Xu, X., Wang, Q., Li, H., Borisov, N., Gunter, C. A. & Li, B., May 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Institute of Electrical and Electronics Engineers Inc., p. 103-120 18 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2021-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2020

    Assessing the Privacy Benefits of Domain Name Encryption

    Hoang, N. P., Akhavan Niaki, A., Borisov, N., Gill, P. & Polychronakis, M., Oct 5 2020, Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020. Association for Computing Machinery, p. 290-304 15 p. (Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2019

    Conjure: Summoning proxies from unused address space

    Frolov, S., Wampler, J., Tan, S. C., Alex Halderman, J., Borisov, N. & Wustrow, E., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2215-2229 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Outguard: Detecting in-browser covert cryptocurrency mining in the wild

    Kharraz, A., Lever, C., Borisov, N., Ma, Z., Mason, J., Antonakakis, M., Murley, P., Miller, A. & Bailey, M., May 13 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, p. 840-852 13 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • What can you learn from an IP?

    Patil, S. & Borisov, N., Jul 22 2019, ANRW 2019 - Proceedings of the 2019 Applied Networking Research Workshop. Association for Computing Machinery, p. 45-51 7 p. (ANRW 2019 - Proceedings of the 2019 Applied Networking Research Workshop).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    Property inference attacks on fully connected neural networks using permutation invariant representations

    Ganju, K., Wang, Q., Yang, W., Gunter, C. A. & Borisov, N., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 619-633 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • The Web’s sixth sense: A study of scripts accessing smartphone sensors

    Das, A., Borisov, N., Acar, G. & Pradeep, A., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1515-1532 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • TightRope: Towards optimal load-balancing of paths in anonymous networks

    Darir, H., Sibai, H., Borisov, N., Dullerud, G. & Mitra, S., Oct 15 2018, WPES 2018 - Proceedings of the 2018 Workshop on Privacy in the Electronic Society, co-located with CCS 2018. Association for Computing Machinery, p. 76-85 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2017

    Mining on someone else’s dime: Mitigating covert mining operations in clouds and enterprises

    Tahir, R., Huzaifa, M., Das, A., Ahmad, M., Gunter, C., Zaffar, F., Caesar, M. & Borisov, N., 2017, Research in Attacks, Intrusions, and Defenses - 20th International Symposium, RAID 2017, Proceedings. Polychronakis, M., Antonakakis, M., Dacier, M. & Bailey, M. (eds.). Springer, p. 287-310 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10453 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SmartCast: An incentive compatible consensus protocol using smart contracts

    Kothapalli, A., Miller, A. & Borisov, N., 2017, Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Revised Selected Papers. Miller, A., Brenner, M., Rohloff, K., Bonneau, J., Teague, V., Bracciali, A., Sala, M., Pintore, F., Jakobsson, M. & Ryan, P. Y. A. (eds.). Springer, p. 536-552 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10323 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2016

    Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing Systems

    Jin, H., Su, L., Ding, B., Nahrstedt, K. & Borisov, N., Aug 8 2016, Proceedings - 2016 IEEE 36th International Conference on Distributed Computing Systems, ICDCS 2016. Institute of Electrical and Electronics Engineers Inc., p. 344-353 10 p. 7536533. (Proceedings - International Conference on Distributed Computing Systems; vol. 2016-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses

    Das, A., Borisov, N. & Caesar, M., 2016, 23rd Annual Network and Distributed System Security Symposium, NDSS 2016. The Internet Society, (23rd Annual Network and Distributed System Security Symposium, NDSS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2014

    Analyzing an adaptive reputation metric for anonymity systems

    Das, A., Borisov, N. & Caesar, M., 2014, Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014. Association for Computing Machinery, 11. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Do you hear what i hear? Fingerprinting smart devices through embedded acoustic components

    Das, A., Borisov, N. & Caesar, M., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 441-452 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Re3: Relay reliability reputation for anonymity systems

    Das, A., Borisov, N., Mittal, P. & Caesar, M., Jun 4 2014, ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, p. 63-74 12 p. (ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2013

    Poster - PnP: Improving web browsing performance over Tor using web resource prefetch-and-push

    Nguyen, G. T. K., Gong, X., Das, A. & Borisov, N., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 1433-1435 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Securing anonymous communication channels under the selective DoS attack

    Das, A. & Borisov, N., 2013, Financial Cryptography and Data Security - 17th International Conference, FC 2013, Revised Selected Papers. p. 362-370 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7859 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • The need for flow fingerprints to link correlated network flows

    Houmansadr, A. & Borisov, N., 2013, Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Proceedings. p. 205-224 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7981 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2012

    11th workshop on privacy in the electronic society

    Borisov, N., 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 1064-1065 2 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Cachet: A decentralized architecture for privacy preserving social networking with caching

    Nilizadeh, S., Jahid, S., Mittal, P., Borisov, N. & Kapadia, A., 2012, CoNEXT 2012 - Proceedings of the 2012 ACM Conference on Emerging Networking Experiments and Technologies. p. 337-348 12 p. (CoNEXT 2012 - Proceedings of the 2012 ACM Conference on Emerging Networking Experiments and Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • CensorSpoofer: Asymmetric communication using IP spoofing for censorship-resistant web browsing

    Wang, Q., Gong, X., Nguyen, G. T. K., Houmansadr, A. & Borisov, N., 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 121-132 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • DECENT: A decentralized architecture for enforcing privacy in online social networks

    Jahid, S., Nilizadeh, S., Mittal, P., Borisov, N. & Kapadia, A., 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012. p. 326-332 7 p. 6197504. (2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • SybilControl: Practical sybil defense with computational puzzles

    Li, F., Mittal, P., Caesar, M. & Borisov, N., 2012, STC'12 - Proceedings of the Workshop on Scalable Trusted Computing. p. 67-78 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Website detection using remote traffic analysis

    Gong, X., Borisov, N., Kiyavash, N. & Schear, N., 2012, Privacy Enhancing Technologies - 12th International Symposium, PETS 2012, Proceedings. p. 58-78 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7384 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    Cirripede: Circumvention infrastructure using router redirection with plausible deniability

    Houmansadr, A., Nguyen, G. T. K., Caesar, M. & Borisov, N., 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 187-199 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • CoCo: Coding-based covert timing channels for network flows

    Houmansadr, A. & Borisov, N., 2011, Information Hiding - 13th International Conference, IH 2011, Revised Selected Papers. p. 314-328 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6958 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Confidentiality-preserving proof theories for distributed proof systems

    Minami, K., Borisov, N., Winslett, M. & Lee, A. J., 2011, Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. Association for Computing Machinery, p. 145-154 10 p. (Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • EASiER: Encryption-based access control in social networks with efficient revocation

    Jahid, S., Mittal, P. & Borisov, N., 2011, Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. Association for Computing Machinery, p. 411-415 5 p. (Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • P3CA: Private anomaly detection across ISP networks

    Nagaraja, S., Jalaparti, V., Caesar, M. & Borisov, N., 2011, Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Proceedings. Springer, p. 38-56 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6794 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • PIR-Tor: Scalable anonymous communication using private information retrieval

    Mittal, P., Olumofin, F., Troncoso, C., Borisov, N. & Goldberg, I., 2011, Proceedings of the 20th USENIX Security Symposium. USENIX Association, p. 475-490 16 p. (Proceedings of the 20th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting

    Mittal, P., Khurshid, A., Juen, J., Caesar, M. & Borisov, N., 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 215-226 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Stegobot: A covert social network botnet

    Nagaraja, S., Houmansadr, A., Piyawongwisal, P., Singh, V., Agarwal, P. & Borisov, N., 2011, Information Hiding - 13th International Conference, IH 2011, Revised Selected Papers. p. 299-313 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6958 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Towards improving network flow watermarks using the repeat-accumulate codes

    Houmansadr, A. & Borisov, N., 2011, 2011 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2011 - Proceedings. p. 1852-1855 4 p. 5946866. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2010

    Attacking and repairing the improved modonions protocol

    Borisov, N., Klonowski, M., Kutyłowski, M. & Lauks-Dutka, A., 2010, Information Security and Cryptology - ICISC 2009 - 12th International Conference, Revised Selected Papers. p. 258-273 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5984 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • BotGrep: Finding P2P bots with structured graph analysis

    Nagaraja, S., Mittal, P., Hong, C. Y., Caesar, M. & Borisov, N., 2010, Proceedings of the 19th USENIX Security Symposium. USENIX Association, p. 95-110 16 p. (Proceedings of the 19th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Fingerprinting websites using remote traffic analysis

    Gong, X., Kiyavash, N. & Borisov, N., 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 684-686 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • In search of an anonymous and secure lookup attacks on structured peer-to-peer anonymous communication systems

    Wang, Q., Mittal, P. & Borisov, N., 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 308-318 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Low-cost side channel remote traffic analysis attack in packet networks

    Kadloor, S., Gong, X., Kiyavash, N., Tezcan, T. & Borisov, N., 2010, 2010 IEEE International Conference on Communications, ICC 2010. 5501972. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Protecting location privacy against inference attacks

    Minami, K. & Borisov, N., 2010, Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS'10. p. 123-126 4 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Protecting location privacy against inference attacks

    Minami, K. & Borisov, N., 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 711-713 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2009

    Confidentiality-preserving distributed proofs of conjunctive queries

    Lee, A. J., Minami, K. & Borisov, N., 2009, Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09. p. 287-297 11 p. (Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Multi-flowattack resistant watermarks for network flows

    Houmansadr, A., Kiyavash, N. & Borisov, N., 2009, 2009 IEEE International Conference on Acoustics, Speech, and Signal Processing - Proceedings, ICASSP 2009. p. 1497-1500 4 p. 4959879. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Safety in discretionary access control for logic-based publish-subscribe systems

    Minami, K., Borisov, N. & Gunter, C. A., 2009, SACMAT'09 - Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. p. 3-12 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • ShadowWalker: Peer-to-peer anonymous communication using redundant structured topologies

    Mittal, P. & Borisov, N., 2009, CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. p. 161-172 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2008

    Deleting index entries from compliance storage

    Mitra, S., Winslett, M. & Borisov, N., 2008, Advances in Database Technology - EDBT 2008 - 11th International Conference on Extending Database Technology, Proceedings. p. 109-120 12 p. (Advances in Database Technology - EDBT 2008 - 11th International Conference on Extending Database Technology, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • FlyByNight: Mitigating the privacy risks of social networking

    Lucas, M. M. & Borisov, N., 2008, Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, WPES'08,Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08. p. 1-8 8 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • High-speed matching of vulnerability signatures

    Schear, N., Albrecht, D. R. & Borisov, N., 2008, Recent Advances in Intrusion Detection - 11th International Symposium, RAID 2008, Proceedings. p. 155-174 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5230 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Information leaks in structured peer-to-peer anonymous communication systems

    Mittal, P. & Borisov, N., 2008, Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08. p. 267-278 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution