USENIX reaffirms its commitment to diversity, equity, and inclusion.
Biblio
Export 15 results:
Filters: Author is Prateek Mittal [Clear All Filters]
Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt. 30th USENIX Security Symposium (USENIX Security 21). :4311--4327.
.
2021. PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking. 30th USENIX Security Symposium (USENIX Security 21). :2237--2254.
.
2021. Systematic Evaluation of Privacy Risks of Machine Learning Models. 30th USENIX Security Symposium (USENIX Security 21). :2615--2632.
.
2021. Robust Website Fingerprinting Through the Cache Occupancy Channel. 28th USENIX Security Symposium (USENIX Security 19). :639--656.
.
2019. AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. 2018 USENIX Annual Technical Conference (USENIX ATC 18). :113--126.
.
2018. Automatically Generating a Large, Culture-Specific Blocklist for China. 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18).
.
2018. Bamboozling Certificate Authorities with BGP. 27th USENIX Security Symposium (USENIX Security 18). :833--849.
.
2018. BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid. 27th USENIX Security Symposium (USENIX Security 18). :15--32.
.
2018. SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection. 27th USENIX Security Symposium (USENIX Security 18). :639--656.
.
2018. ASPIRE: Iterative Specification Synthesis for Security. 15th Workshop on Hot Topics in Operating Systems (HotOS XV).
.
2015. RAPTOR: Routing Attacks on Privacy in Tor. 24th USENIX Security Symposium (USENIX Security 15). :271--286.
.
2015. SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization. 24th USENIX Security Symposium (USENIX Security 15). :303--318.
.
2015. PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. BotGrep: Finding P2P Bots with Structured Graph Analysis. 19th USENIX Security Symposium (USENIX Security 10).
.
2010. Scalable Anonymous Communication with Provable Security. 5th USENIX Workshop on Hot Topics in Security (HotSec 10).
.
2010.