Biblio

Export 15 results:
Filters: Author is Prateek Mittal  [Clear All Filters]
2021
Birge-Lee H, Wang L, McCarney D, Shoemaker R, Rexford J, Mittal P.  2021.  Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt. 30th {USENIX} Security Symposium ({USENIX} Security 21). :4311--4327.
Xiang C, Bhagoji ANitin, Sehwag V, Mittal P.  2021.  PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking. 30th {USENIX} Security Symposium ({USENIX} Security 21). :2237--2254.
Song L, Mittal P.  2021.  Systematic Evaluation of Privacy Risks of Machine Learning Models. 30th {USENIX} Security Symposium ({USENIX} Security 21). :2615--2632.
2019
Shusterman A, Kang L, Haskal Y, Meltser Y, Mittal P, Oren Y, Yarom Y.  2019.  Robust Website Fingerprinting Through the Cache Occupancy Channel. 28th {USENIX} Security Symposium ({USENIX} Security 19). :639--656.
2018
Gao P, Xiao X, Li Z, Xu F, Kulkarni SR, Mittal P.  2018.  AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. 2018 {USENIX} Annual Technical Conference ({USENIX} {ATC} 18). :113--126.
Hounsel A, Mittal P, Feamster N.  2018.  Automatically Generating a Large, Culture-Specific Blocklist for China. 8th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 18).
Birge-Lee H, Sun Y, Edmundson A, Rexford J, Mittal P.  2018.  Bamboozling Certificate Authorities with BGP. 27th {USENIX} Security Symposium ({USENIX} Security 18). :833--849.
Soltan S, Mittal P, H. Poor V.  2018.  BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid. 27th {USENIX} Security Symposium ({USENIX} Security 18). :15--32.
Gao P, Xiao X, Li D, Li Z, Jee K, Wu Z, Kim CHwan, Kulkarni SR, Mittal P.  2018.  SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection. 27th {USENIX} Security Symposium ({USENIX} Security 18). :639--656.
2015
Chen K, He W, Akhawe D, D'Silva V, Mittal P, Song D.  2015.  ASPIRE: Iterative Specification Synthesis for Security. 15th Workshop on Hot Topics in Operating Systems (HotOS {XV}).
Sun Y, Edmundson A, Vanbever L, Li O, Rexford J, Chiang M, Mittal P.  2015.  RAPTOR: Routing Attacks on Privacy in Tor. 24th {USENIX} Security Symposium ({USENIX} Security 15). :271--286.
Ji S, Li W, Mittal P, Hu X, Beyah R.  2015.  SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization. 24th {USENIX} Security Symposium ({USENIX} Security 15). :303--318.
2010
Nagaraja S, Mittal P, Hong C-Y, Caesar M, Borisov N.  2010.  BotGrep: Finding P2P Bots with Structured Graph Analysis. 19th {USENIX} Security Symposium ({USENIX} Security 10).
Mittal P, Borisov N, Troncoso C, Rial A.  2010.  Scalable Anonymous Communication with Provable Security. 5th {USENIX} Workshop on Hot Topics in Security (HotSec 10).