Vitaly Shmatikov

According to our database1, Vitaly Shmatikov authored at least 106 papers between 1998 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Salvaging Federated Learning by Local Adaptation.
CoRR, 2020

Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning.
CoRR, 2020

2019
Differential Privacy Has Disparate Impact on Model Accuracy.
CoRR, 2019

Overlearning Reveals Sensitive Attributes.
CoRR, 2019

Exploiting Unintended Feature Leakage in Collaborative Learning.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Differential Privacy Has Disparate Impact on Model Accuracy.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Auditing Data Provenance in Text-Generation Models.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

2018
The Tao of Inference in Privacy-Protected Databases.
PVLDB, 2018

The Natural Auditor: How To Tell If Someone Used Your Words To Train Their Model.
CoRR, 2018

How To Backdoor Federated Learning.
CoRR, 2018

Inference Attacks Against Collaborative Learning.
CoRR, 2018

Chiron: Privacy-preserving Machine Learning as a Service.
CoRR, 2018

Fooling OCR Systems with Adversarial Text Images.
CoRR, 2018

Situational Access Control in the Internet of Things.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Why Your Encrypted Database Is Not Secure.
IACR Cryptology ePrint Archive, 2017

Beauty and the Burst: Remote Identification of Encrypted Video Streams.
Proceedings of the 26th USENIX Security Symposium, 2017

Membership Inference Attacks Against Machine Learning Models.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Machine Learning Models that Remember Too Much.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Using Program Analysis to Synthesize Sensor Spoofing Attacks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
EARP: Principled Storage, Sharing, and Protection for Mobile Apps.
GetMobile, 2016

CovertCast: Using Live Streaming to Evade Internet Censorship.
PoPETs, 2016

Breaking Web Applications Built On Top of Encrypted Data.
IACR Cryptology ePrint Archive, 2016

Membership Inference Attacks against Machine Learning Models.
CoRR, 2016

Defeating Image Obfuscation with Deep Learning.
CoRR, 2016

Gone in Six Characters: Short URLs Considered Harmful for Cloud Services.
CoRR, 2016

Towards a Privacy Research Roadmap for the Computing Community.
CoRR, 2016

Can we still avoid automatic face detection?
Proceedings of the 2016 IEEE Winter Conference on Applications of Computer Vision, 2016

What Mobile Ads Know About Mobile Users.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
No Escape From Reality: Security and Privacy of Augmented Reality Browsers.
Proceedings of the 24th International Conference on World Wide Web, 2015

Rethinking Security of Web-Based System Applications.
Proceedings of the 24th International Conference on World Wide Web, 2015

Privacy-Preserving Deep Learning.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

CloudTransport: Using Cloud Storage for Censorship-Resistant Networking.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

No Direction Home: The True Cost of Routing Around Decoys.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
A Scanner Darkly: Protecting User Privacy from Perceptual Applications.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

The Parrot Is Dead: Observing Unobservable Network Communications.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

πBox: A Platform for Privacy-Preserving Apps.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Fix Me Up: Repairing Access-Control Bugs in Web Applications.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Privacy-preserving data exploration in genome-wide association studies.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Diglossia: detecting code injection attacks with precision and efficiency.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Memento: Learning Secrets from Process Footprints.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Abusing File Processing in Malware Detectors for Fun and Profit.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels.
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012

The most dangerous code in the world: validating SSL certificates in non-browser software.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Anonymity is not privacy: technical perspective.
Commun. ACM, 2011

TxBox: Building Secure, Efficient Sandboxes with System Transactions.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

"You Might Also Like: " Privacy Risks of Collaborative Filtering.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

A security policy oracle: detecting security holes using multiple API implementations.
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011

SAFERPHP: finding semantic vulnerabilities in PHP applications.
Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, 2011

RoleCast: finding missing security checks when you do not know what checks are.
Proceedings of the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2011

EVE: Verifying Correct Execution of Cloud-Hosted Web Applications.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Cloud Computing, 2011

Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Myths and fallacies of "personally identifiable information".
Commun. ACM, 2010

The Hitchhiker's Guide to DNS Cache Poisoning.
Proceedings of the Security and Privacy in Communication Networks, 2010

Efficient, context-sensitive detection of real-world semantic attacks.
Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, 2010

Airavat: Security and Privacy for MapReduce.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

2009
De-anonymizing Social Networks.
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009

Privacy-Preserving Classifier Learning.
Proceedings of the Financial Cryptography and Data Security, 2009

Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

2008
Robust De-anonymization of Large Sparse Datasets.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008), 2008

Towards Practical Privacy for Genomic Computation.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008), 2008

The cost of privacy: destruction of data-mining utility in anonymized data publishing.
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008

2007
Truth in advertising: lightweight verification of route integrity.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007

dFence: Transparent Network-based Denial of Service Mitigation.
Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI 2007), 2007

Efficient Two-Party Secure Computation on Committed Inputs.
Proceedings of the Advances in Cryptology, 2007

Privacy-preserving remote diagnostics.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Secure Verification of Location Claims with Simultaneous Distance Modification.
Proceedings of the Advances in Computer Science, 2007

2006
Analysis of probabilistic contract signing.
Journal of Computer Security, 2006

On the Limits of Point Function Obfuscation.
IACR Cryptology ePrint Archive, 2006

Security Analysis of Voice-over-IP Protocols.
IACR Cryptology ePrint Archive, 2006

Key confirmation and adaptive corruptions in the protocol security logic.
IACR Cryptology ePrint Archive, 2006

How To Break Anonymity of the Netflix Prize Dataset
CoRR, 2006

Measuring relationship anonymity in mix networks.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

Large-scale collection and sanitization of network security data: risks and challenges.
Proceedings of the New Security Paradigms Workshop 2006, 2006

Efficient anonymity-preserving data collection.
Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006

Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses.
Proceedings of the Computer Security, 2006

2005
Contract signing, optimism, and advantage.
J. Log. Algebr. Program., 2005

Reputation-based trust management.
Journal of Computer Security, 2005

Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation.
Journal of Computer Security, 2005

Towards computationally sound symbolic analysis of key exchange protocols.
IACR Cryptology ePrint Archive, 2005

Probabilistic Polynomial-Time Semantics for a Protocol Security Logic.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure.
Proceedings of the Financial Cryptography and Data Security, 2005

Game-Based Analysis of Denial-of-Service Prevention Protocols.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

Fast dictionary attacks on passwords using time-space tradeoff.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Obfuscated databases and group privacy.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Privacy-Preserving Graph Algorithms in the Semi-honest Model.
Proceedings of the Advances in Cryptology, 2005

2004
Probabilistic analysis of an anonymity system.
Journal of Computer Security, 2004

Information Hiding, Anonymity and Privacy: a Modular Approach.
Journal of Computer Security, 2004

Privacy-Preserving Sharing and Correlation of Security Alerts.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Synchronous Batching: From Cascades to Free Routes.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme.
Proceedings of the Advances in Cryptology, 2004

Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation.
Proceedings of the Programming Languages and Systems, 2004

2003
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or.
Proceedings of the 18th IEEE Symposium on Logic in Computer Science (LICS 2003), 2003

Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

2002
Finite-state analysis of two contract signing protocols.
Theor. Comput. Sci., 2002

Negotiated Privacy: (Extended Abstract).
Proceedings of the Software Security -- Theories and Systems, 2002

Probabilistic Analysis of Anonymity.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

2001
Constraint solving for bounded-process cryptographic protocol analysis.
Proceedings of the CCS 2001, 2001

2000
Analysis of a Fair Exchange Protocol.
Proceedings of the Network and Distributed System Security Symposium, 2000

Analysis of Abuse-Free Contract Signing.
Proceedings of the Financial Cryptography, 2000

1999
A Core Calculus of Classes and Objects.
Proceedings of the Fifteenth Conference on Mathematical Foundations of Progamming Semantics, 1999

A Core Calculus of Classes and Mixins.
Proceedings of the ECOOP'99, 1999

1998
Finite-State Analysis of SSL 3.0.
Proceedings of the 7th USENIX Security Symposium, 1998

Efficient Finite-State Analysis for Large Security Protocols.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998


  Loading...