Aastha Mehta

Orcid: 0009-0005-3416-5254

According to our database1, Aastha Mehta authored at least 15 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Relocate-Vote: Using Sparsity Information to Exploit Ciphertext Side-Channels.
Proceedings of the 34th USENIX Security Symposium, 2025

Growlithe: A Developer-Centric Compliance Tool for Serverless Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Comparing Isolation Mechanisms with OSmosis.
Proceedings of the 13th Workshop on Programming Languages and Operating Systems, 2025

2024
LDPKiT: Recovering Utility in LDP Schemes by Training with Noise^2.
CoRR, 2024

NetShaper: A Differentially Private Network Side-Channel Mitigation System.
Proceedings of the 33rd USENIX Security Symposium, 2024

Stream Processing with Adaptive Edge-Enhanced Confidential Computing.
Proceedings of the 7th International Workshop on Edge Systems, Analytics and Networking, 2024

2023
ICS-Sniper: A Targeted Blackhole Attack on Encrypted ICS Traffic.
CoRR, 2023

2022
Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud.
Proceedings of the 31st USENIX Security Symposium, 2022

2020
Ensuring compliance with data privacy and usage policies in online services.
PhD thesis, 2020

PanCast: Listening to Bluetooth Beacons for Epidemic Risk Mitigation.
CoRR, 2020

2019
Pacer: Network Side-Channel Mitigation in the Cloud.
CoRR, 2019

2017
Qapla: Policy compliance for database-backed systems.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Oblivious Multi-Party Machine Learning on Trusted Processors.
Proceedings of the 25th USENIX Security Symposium, 2016

Thoth: Comprehensive Policy Compliance in Data Retrieval Systems.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
Guardat: enforcing data policies at the storage layer.
Proceedings of the Tenth European Conference on Computer Systems, 2015


  Loading...