Rahul Chatterjee

Orcid: 0000-0002-0308-8787

Affiliations:
  • University of Wisconsin - Madison, WI, USA
  • Cornell University, NY, USA (former)


According to our database1, Rahul Chatterjee authored at least 37 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Compact: Approximating Complex Activation Functions for Secure Computation.
CoRR, 2023

Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse.
Proceedings of the 32nd USENIX Security Symposium, 2023

"It's the Equivalent of Feeling Like You're in Jail": Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse.
Proceedings of the 32nd USENIX Security Symposium, 2023

Araña: Discovering and Characterizing Password Guessing Attacks in Practice.
Proceedings of the 32nd USENIX Security Symposium, 2023

Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices.
Proceedings of the 32nd USENIX Security Symposium, 2023

Towards Finding the Missing Pieces to Teach Secure Programming Skills to Students.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 1, 2023

MASCARA : Systematically Generating Memorable And Secure Passphrases.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance.
Proc. Priv. Enhancing Technol., 2022

Analyzing the Security of the Business Collaboration Platform App Model.
CoRR, 2022

Might I Get Pwned: A Second Generation Compromised Credential Checking Service.
Proceedings of the 31st USENIX Security Symposium, 2022

Practical Data Access Minimization in Trigger-Action Platforms.
Proceedings of the 31st USENIX Security Symposium, 2022

Experimental Security Analysis of the App Model in Business Collaboration Platforms.
Proceedings of the 31st USENIX Security Symposium, 2022

Gossamer: Securely Measuring Password-based Logins.
Proceedings of the 31st USENIX Security Symposium, 2022

SoK: Authentication in Augmented and Virtual Reality.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Identifying Gaps in the Secure Programming Knowledge and Skills of Students.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

2021
Might I Get Pwned: A Second Generation Password Breach Alerting Service.
CoRR, 2021

Data Privacy in Trigger-Action Systems.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Textbook Underflow: Insufficient Security Discussions in Textbooks Used for Computer Systems Courses.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

BlindTLS: Circumventing TLS-based HTTPS censorship.
Proceedings of the FOCI '21: Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet, 2021

Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Data Privacy in Trigger-Action IoT Systems.
CoRR, 2020

tPAKE: Typo-Tolerant Password-Authenticated Key Exchange.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020

How Secure are our Computer Systems Courses?
Proceedings of the ICER 2020: International Computing Education Research Conference, 2020

2019
Next Generation Password-Based Authentication Systems.
PhD thesis, 2019

"Is my phone hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence.
Proc. ACM Hum. Comput. Interact., 2019

Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms.
IACR Cryptol. ePrint Arch., 2019

Clinical Computer Security for Victims of Intimate Partner Violence.
Proceedings of the 28th USENIX Security Symposium, 2019

Beyond Credential Stuffing: Password Similarity Models Using Neural Networks.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Protocols for Checking Compromised Credentials.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
The Spyware Used in Intimate Partner Violence.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication.
IACR Cryptol. ePrint Arch., 2017

The TypTop System: Personalized Typo-Tolerant Password Checking.
IACR Cryptol. ePrint Arch., 2017

A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
pASSWORD tYPOS and How to Correct Them Securely.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
The Pythia PRF Service.
IACR Cryptol. ePrint Arch., 2015

Cracking-Resistant Password Vaults using Natural Language Encoders.
IACR Cryptol. ePrint Arch., 2015

2011
MAESTRO: Making Art-Enabled Sketches through Randomized Operations.
Proceedings of the Computer Analysis of Images and Patterns, 2011


  Loading...