Links: [About Me] [Publications] [Open Positions] Note for prospective applicants: The current research thrusts of my group focus on: Privacy and security of networked systems (e.g., https://secure-certificates.princeton.edu/, https://www.torproject.org/) Privacy and security of machine learning (e.g., https://adversarial-learning.princeton.edu) INSPIRE Group Github repository PublicationsHow Effective is Multiple-Vantage-Point Domain Control Validation?Grace Cimaszewski, Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal USENIX Security, August 2023 Towards A Proactive ML Approach for Detecting Backdoor Poison Samples Xiangyu Qi, Tinghao Xie, Tianhao Wang, Tong Wu, Saeed Mahloujifar, Prateek Mittal USENIX Security, August 2023 MultiRobustBench: Benchmarking Robustness Against Multiple Attacks Sihui Dai, Saeed Mahloujifar, Chong Xiang, Vikash Sehwag, Pin-Yu Chen, Prateek Mittal ICML, July 2023 Uncovering Adversarial Risks of Test-Time Adaptation Tong Wu, Feiran Jia, Xiangyu Qi, Jiachen T. Wang, Vikash Sehwag, Saeed Mahloujifar, Prateek Mittal ICML, July 2023 Effectively Using Public Data in Privacy-Preserving Machine Learning Milad Nasr, Saeed Mahloujifar, Xinyu Tang, Prateek Mittal, Amir Houmansadr ICML, July 2023 RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks Liang Wang, Hyojoon Kim, Prateek Mittal, Jennifer Rexford PETS, July 2023 ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking Chong Xiang, Alexander Valtchanov, Saeed Mahloujifar, Prateek Mittal IEEE S&P, May 2023 Revisiting the Assumption of Latent Separability for Backdoor Defense Xiangyu Qi, Tinghao Xie, Yiming Li, Saeed Mahloujifar, and Prateek Mittal. ICLR, May 2023 A Light Recipe to Train Robust Vision Transformers Edoardo Debenedetti, Vikash Sehwag, and Prateek Mittal. IEEE SaTML, February 2023 Formulating Robustness Against Unforeseen Attacks Sihui Dai, Saeed Mahloujifar, Prateek Mittal NeurIPS, November 2022 Renyi Differential Privacy of Propose-Test-Release and Applications to Private and Robust Machine Learning Tianhao Wang, Saeed Mahloujifar, Shouda Wang, Ruoxi Jia, Prateek Mittal NeurIPS, November 2022 Understanding Robust Learning through the Lens of Representation Similarities Christian Cianfarani, Arjun Nitin Bhagoji, Vikash Sehwag, Ben Zhao, Prateek Mittal, Haitao Zheng NeurIPS, November 2022 Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation Tong Wu, Tianhao Wang, Vikash Sehwag, Saeed Mahloujifar, Prateek Mittal AISEC, November 2022 PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier Chong Xiang, Saeed Mahloujifar, Prateek Mittal USENIX Security, August 2022 Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal USENIX Security, August 2022 Creating a Secure Underlay for the Internet Henry Birge-Lee, Joel Wanner, Grace Cimaszewksi, Jonghoon Kwon, Liang Wang, Francois Wirz, Prateek Mittal, Adrian Perrig, Yixin Sun USENIX Security, August 2022 QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework Jean-Pierre Smith, Luca Dolfi, Prateek Mittal, Adrian Perrig USENIX Security, August 2022 Leveraging Strategic Connection Migration-powered Traffic Splitting for Privacy Mona Wang, Anunay Kulshrestha, Liang Wang, Prateek Mittal PETS, July 2022 • 2022 Andreas Pfitzmann Best Student Paper Award, Runners-up Machine Learning with Differentially Private Labels: Mechanisms and Frameworks Xinyu Tang, Milad Nasr, Saeed Mahloujifar, Virat Shejwalkar, Liwei Song, Amir Houmansadr, Prateek Mittal PETS, July 2022 Athena: Probabilistic Verification of Machine Unlearning David Sommer, Liwei Song, Sameer Wagh, Prateek Mittal PETS, July 2022 Neurotoxin: Durable Backdoors in Federated Learning Zhengming Zhang, Ashwinee Panda, Linyue Song, Yaoqing Yang, Michael W. Mahoney, Prateek Mittal, Kannan Ramchandran, Joseph E. Gonzalez ICML, July 2022 Parameterizing Activation Functions for Adversarial Robustness Sihui Dai, Saeed Mahloujifar, Prateek Mittal DLS, May 2022 Robust Learning Meets Generative Models: Can Proxy Distributions Improve Adversarial Robustness? Vikash Sehwag, Saeed Mahloujifar, Tinashe Handina, Sihui Dai, Chong Xiang, Mung Chiang, Prateek Mittal ICLR, May 2022 SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification Ashwinee Panda, Saeed Mahloujifar, Arjun N. Bhagoji, Supriyo Chakraborty, Prateek Mittal AISTATS, March 2022 F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure Laurent Chuat, Cyrill Krahenbuhl, Prateek Mittal, Adrian Perrig NDSS, February 2022 RobustBench: a Standardized Adversarial Robustness Benchmark Francesco Croce, Maksym Andriushchenko, Vikash Sehwag, Edoardo Debenedetti, Nicolas Flammarion, Mung Chiang, Prateek Mittal, Matthias Hein NeurIPS, December 2021 New Directions in Automated Traffic Analysis Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal ACM CCS, November 2021 DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks Chong Xiang, Prateek Mittal ACM CCS, November 2021 Experiences Deploying Multi-Vantage-Point Domain Validation at Let’s Encrypt Henry Birge-Lee, Liang Wang, Daniel McCarney, Roland Shoemaker, Jennifer Rexford, Prateek Mittal USENIX Security, August 2021 • Our deployment at Let's Encrypt has issued over 1 billion TLS certificates since Feb 2020 • 2022 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies, Runners-up • CSAW Applied Research Competition Finalist, 2021 PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking Chong Xiang, Arjun Bhagoji, Vikash Sehwag, Prateek Mittal USENIX Security, August 2021 Systematic Evaluation of Privacy Risks of Machine Learning Models Liwei Song, Prateek Mittal USENIX Security, August 2021 Deployed in Google's TensorFlow Privacy CSAW Applied Research Competition Finalist, 2021 Securing Internet Applications from Routing Attacks Yixin Sun, Maria Apostolaki, Henry Birge-Lee, Laurent Vanbever, Jennifer Rexford, Mung Chiang, Prateek Mittal Communications of the ACM (CACM), 2021 DP-Cryptography: Marrying Differential Privacy and Cryptography in Emerging Applications Sameer Wagh, Xi He, Ashwin Machanavajjhala, Prateek Mittal Communications of the ACM (CACM), 2021 Website Fingerprinting in the Age of QUIC Jean-Pierre Smith, Prateek Mittal, Adrian Perrig PETS, July 2021 Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, Tal Rabin PETS, July 2021 Lower Bounds on Cross-Entropy Loss in the Presence of Test-time Adversaries Arjun Bhagoji, Daniel Cullina, Vikash Sehwag, Prateek Mittal ICML, July 2021 SSD: A Unified Framework For Self-Supervised Outlier Detection Vikash Sehwag, Mung Chiang, Prateek Mittal ICLR, May 2021 HYDRA: Pruning Adversarially Robust Neural Networks Vikash Sehwag, Shiqi Wang, Prateek Mittal, Suman Jana NeurIPS, December 2020 CLAPS: Client-Location-Aware Path Selection in Tor Florentin Rochet, Ryan Wails, Aaron Johnson, Prateek Mittal, Olivier Pereira ACM CCS, November 2020 Vision Paper: Grand Challenges in Resilience: Autonomous System Resilience through Design and Runtime Measures Saurabh Bagchi, Vaneet Aggarwal, Somali Chaterji, Fred Douglis, Aly El Gamal, Jiawei Han, Brian J. Henz, Hank Hoffmann, Suman Jana, Milind Kulkarni, Felix Xiaozhu Lin, Karen Marais, Prateek Mittal, Shaoshuai Mou, Xiaokang Qiu, Gesualdo Scutari IEEE Open Journal of the Computer Society, 2020 Detecting Malware Injection with Program-DNS Behavior Yixin Sun, Kangkook Jee, Suphannee Sivakorn, Zhichun Li, Cristian Lumezanu,Lauri Korts-Pärn, Zhenyu Wu, Junghwan Rhee, Chung Hwan Kim, Mung Chiang, Prateek Mittal IEEE Euro S&P, September 2020 A Critical Evaluation of Open-World Machine Learning Liwei Song, Vikash Sehwag, Arjun Nitin Bhagoji, Prateek Mittal ICML Workshop on Uncertainty and Robustness in Deep Learning, July 2020 On Separability of Self-Supervised Representations Vikash Sehwag, Mung Chiang, Prateek Mittal ICML Workshop on Uncertainty and Robustness in Deep Learning, July 2020 Time for a Background Check! Uncovering the Influence of Background Features on Deep Neural Networks Vikash Sehwag, Rajvardhan Oak, Mung Chiang, Prateek Mittal ICML Workshop on Object-Oriented Learning (OOL): Perception, Representation, and Reasoning, July 2020 Partial Recovery of Erdos-Renyi Graph Alignment via k-Core Alignment Daniel Cullina, Negar Kiyavash, Prateek Mittal, H. Vincent Poor SIGMETRICS, June 2020 Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality Anatoly Shusterman, Zohar Avraham, Eliezer Croitoru, Yarden Haskal, Lachlan Kang, Dvir Levi, Yosef Meltser, Prateek Mittal, Yossef Oren, Yuval Yarom IEEE Transactions on Dependable and Secure Computing, April 2020 On Pruning Adversarially Robust Neural Networks Vikash Sehwag, Shiqi Wang, Prateek Mittal, Suman Jana ICLR Workshop on Trustworthy ML, April 2020 Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection Peng Gao, Xusheng Xiao, Ding Li, Kangkook Jee, Haifeng Chen, Sanjeev R. Kulkarni, Prateek Mittal ICDE Demonstrations Track, April 2020 Lower Bounds on Adversarial Robustness from Optimal Transport Arjun Bhagoji, Daniel Cullina, Prateek Mittal NeurIPS, December 2019 SICO: Surgical Interception Attacks by Manipulating BGP Communities Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal ACM CCS, November 2019 Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices Hooman Moghaddam, Gunes Acar, Ben Burgess, Arunesh Mathur, Danny Huang, Nick Feamster, Edward Felten, Prateek Mittal, Arvind Narayanan ACM CCS, November 2019 • "Project Webpage", Link • "On Roku and Amazon Fire TV, Channels Are Watching You", Wired • 2021 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies, Runners-up Privacy Risks of Securing Machine Learning Models against Adversarial Examples Liwei Song, Reza Shokri, Prateek Mittal ACM CCS, November 2019 Analyzing the Robustness of Open-World Machine Learning Vikash Sehwag, Arjun Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, Prateek Mittal ACM AISEC, November 2019 Robust Website Fingerprinting Through the Cache Side Channel Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossef Oren, Yuval Yarom USENIX Security, August 2019 CSAW Applied Research Finalist, 2019 Guard Placement Attacks on Location-Based Path Selection Algorithms in Tor Gerry Wan, Aaron Johnson, Ryan Wails, Sameer Wagh, Prateek Mittal PETS, July 2019 DPSelect: A Differential Privacy Based Guard Relay Selection Algorithm for Tor Hans Hanley, Yixin Sun, Sameer Wagh, Prateek Mittal PETS, July 2019 RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release Thee Chanyaswad, Changchang Liu, Prateek Mittal PETS, July 2019 Investigating Statistical Privacy Frameworks from the Perspective of Hypothesis Testing Changchang Liu, Xi He, Thee Chanyaswad, Shiqiang Wang, Prateek Mittal PETS, July 2019 Analyzing Federated Learning through an Adversarial Lens Arjun Bhagoji, Supriyo Chakraborty, Prateek Mittal, Seraphin Calo International Conference on Machine Learning (ICML), June 2019 Protecting the Grid against MAD Attacks Saleh Soltan, Prateek Mittal, and Vince Poor IEEE Transactions on Network Science and Engineering, June 2019 • "Algorithms could stop an ‘internet of things’ attack from bringing down the power grid", Princeton News Membership Inference Attacks against Adversarially Robust Deep Learning Models Liwei Song, Reza Shokri, Prateek Mittal Deep Learning and Security Workshop (DLS), May 2019 Using Contextual Integrity to Improve Information Leakage Detection Yan Shvartzshnaider, Zvonimir Pavlinovic, Ananth Balashankar, Thomas Wies, Lakshminarayanan Subramanian, Helen Nissenbaum, Prateek Mittal The Web Conference (WWW), May 2019 Line Failure Detection after a Cyber-Physical Attack on the Grid Using Bayesian Regression Saleh Soltan, Prateek Mittal, and Vince Poor IEEE Transactions on Power Systems, April 2019 Robustness of Optical Steganographic Communication Under Coherent Detection Attack Chaoran Huang, Philip Ma, Bhavin Shastri, Prateek Mittal, and Paul Prucnal IEEE Photonics Technology Letters, Feb 2019 PAC-learning in the presence of evasion adversaries Daniel Cullina, Arjun Bhagoji, Prateek Mittal NeurIPS, December 2018 Bell Labs Prize Finalist Steganographic Communication via Spread Optical Noise: A Link-Level Eavesdropping Resilient System Philip Ma, Ben Wu, Bhavin Shastri, Alexander Tait, Prateek Mittal, Paul Prucnal IEEE Journal of Lightweight Technology, Dec 2018 Learning Informative and Private Representations via Generative Adversarial Networks. Tsung-Yen Yang, Christopher Brinton, Prateek Mittal, Mung Chiang, Andrew Lan. IEEE BigData, Dec 2018 MVG Mechanism: Differential Privacy under Matrix-Valued Query Thee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal ACM CCS, October 2018 Acoustic Denial of Service Attacks on Hard Disk Drives Mohammad Shahrad, Arsalan Mosenia, Liwei Song, Mung Chiang, David Wentzlaff, Prateek Mittal ACM CCS ASHES, October 2018 Bamboozling Certificate Authorities with BGP Henry Birge-Lee, Yixin Sun, Annie Edmundson, Jennifer Rexford, Prateek Mittal USENIX Security, August 2018 Our work is influencing the real-world deployment of secure domain validation mechanisms See Deployment at Let's Encrypt • "Project webpage", link • 2020 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies, Runners-up BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid Saleh Soltan, Prateek Mittal, H. Vincent Poor USENIX Security, August 2018 • "How Hacked Water Heaters Could Trigger Mass Blackouts", Wired • "Your smart air conditioner could help bring down the power grid", CNET SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal USENIX Security, August 2018 CSAW Applied Research Finalist, 2018 Automatically Generating a Large, Culture-Specific Blocklist for China Austin Hounsel, Prateek Mittal, Nicholas Feamster USENIX Security FOCI, August 2018 Adaptive Fog-based Output Security for Augmented Reality Surin Anh, Maria Gorlatova, Parinaz Naghizadeh, Mung Chiang, Prateek Mittal ACM SIGCOMM VR/AR Network Workshop, August 2018 Bayesian Regression for Robust Power Grid State Estimation Following a Cyber-Physical Attack Saleh Soltan, Prateek Mittal, H. Vincent Poor IEEE PES-GM, August 2018 Selected as one of the best conference papers Tempest: Temporal Dynamics in Anonymity Systems Ryan Wails*, Yixin Sun*, Aaron Johnson*, Mung Chiang, Prateek Mittal PETS, July 2018 Differentially Private Oblivious RAM Sameer Wagh, Paul Cuff, Prateek Mittal PETS, July 2018 Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers Michael Freyberger, Warren He, Devdatta Akhawe, Michelle Mazurek, Prateek Mittal PETS, July 2018 AIQL: Enabling Efficient Attack Investigation from System Monitoring Data Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal USENIX ATC, July 2018 Fundamental Limits of Database Alignment Daniel Cullina, Prateek Mittal, Negar Kiyavash IEEE ISIT, June 2018 SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection Peng Gao, Binghui Wang, Neil Gong, Sanjeev Kulkarni, Kurt Thomas, Prateek Mittal IEEE CNS, May 2018 Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Prateek Mittal and Mung Chiang Deep Learning and Security Workshop (DLS), May 2018 ProCMotive: Bringing Programability and Connectivity into Isolated Vehicles Arsalan Mosenia, Jad Bechara, Tao Zhang, Prateek Mittal, Mung Chiang PACM IMWUT/UbiComp, March 2018 Towards a Timely Causality Analysis for Enterprise Security Yushan Liu, Mu Zhang, Ding Li, Kangkook Jee, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Prateek Mittal NDSS, February 2018 SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection Peng Gao, Binghui Wang, Neil Gong, Sanjeev Kulkarni, Prateek Mittal MIS2, February 2018 Acoustic Denial of Service Attacks on HDDs Mohammad Shahrad, Arsalan Mosenia, Liwei Song, Mung Chiang, David Wentzlaff, Prateek Mittal CoRR arXiv , December 2017 • "Acoustical Attacks against Hard Drives", Schneier on Security • "Acoustic Attacks on HDDs Can Sabotage PCs, CCTV Systems, ATMs, More", Slashdot • "Acoustic Denial of Service Attacks on HDDs", Hacker News Blind De-anonymization Attacks using Social Networks Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby Lee WPES, October 2017 Using EEG-Based BCI Devices to Subliminally Probe for Private Information Mario Frank, Tiffanu Hwu, Sakshi Jain, Robert Knight, Ivan Martinovic, Prateek Mittal, Daniele Perito, Ivo Sluganovic, Dawn Song WPES, October 2017 Inaudible Voice Commands Liwei Song, Prateek Mittal CoRR arXiv, August 2017 • "Is it possible to control Amazon Alexa, Google Now using inaudible commands? Absolutely", The Register • "Dolphin attacks fool Amazon, Google voice assistants", BBC News • "Hacking Alexa By Whispering in Her Ear", I Programmer PinMe: Tracking a Smartphone User around the World Arsalan Mosenia, Xiaoliang Dai, Prateek Mittal, Niraj Jha IEEE TMSCS, August 2017 • "Phones vulnerable to location tracking even when GPS services off", Princeton News • "Tracking People Without GPS", Schneier on Security • "How you can be tracked even with your GPS turned off", Android Authority • "GPS is off so you can’t be tracked, right? Wrong", Sophos Security TorPolice: Towards Enforcing Service-Defined Access Policies for Anonymity Systems Zhuotao Liu, Yushan Liu, Philipp Winter, Prateek Mittal, Yih-Chun Hu IEEE ICNP 2017, October 2017 Our approach was independently integrated into Cloudflare's Challenge Bypass Specification Using BGP to Acquire Bogus TLS Certificates Henry Birge-Lee, Yixin Sun, Annie Edmundson, Jennifer Rexford, Prateek Mittal HotPETS 2017, July 2017 Our work received the Best Presentation Award at HotPETS Our work is influencing the real-world deployment of secure domain validation mechanisms See Deployment at Let's Encrypt A Wide-Area Testbed for Tor Roger Dingledine, David Goulet, Prateek Mittal, Nicholas Feamster, Rob Jansen, Matthew Wright HotPETS 2017, July 2017 Right of Access as a Tool for Privacy Governance Hadi Asghari, Rene L.P. Mahieu, Prateek Mittal, Rachel Greenstadt HotPETS 2017, July 2017 Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal IEEE S&P, May 2017 • "Counter-RAPTOR project webpage and code", webpage, code • "Research identifies methods to protect against online privacy attacks", Princeton News Our Counter-RAPTOR analytics for BGP monitoring on the Tor network is being integrated into the Tor metrics portal InFlo: A Novel Systems Biology Framework Identifies cAMP-CREB1 Axis as a Key Modulator of Platinum Resistance in Ovarian Cancer N Dimitrova, A B Nagaraj, A Razi, S Singh, S Kamalakaran, N Banerjee, P Joseph, A Mankovich, P Mittal*, A DiFeo*, V Varadan* Nature Oncogene, April 2017 • "Scientists develop computer models to predict cancer cell network activity", Science Daily • "Inflo Project code", link Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks Yanqi Zhou, Sameer Wagh, Prateek Mittal, and David Wentzlaff IEEE HPCA, Feb 2017 Graph Data Anonymization, Deanonymization Attacks, and Deanonymizability Quantification: A Survey Shouling Ji, Prateek Mittal, Raheem Beyah IEEE CST, To Appear Quantifying Deanonymization Risks in Social Systems Wei-han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby Lee ICISSP, Feb 2017 SmartWalk: Enhancing Social Network Security via Adaptive Random Walks Yushan Liu, Shouling Ji, and Prateek Mittal ACM CCS, October 2016 Learning Privacy Expectations by Crowdsourcing Contextual Informational Norms Yan Shvartzshnaider, Schrasing Tong, Thomas Wies, Paula Klift, Helen Nissenbaum, Lakshminarayanan Subramanian, Prateek Mittal AAAI HCOMP, October 2016 • "Blog Post", link • "PRIVACI project webpage and dataset", webpage link, dataset link Discriminant-Component Eigenfaces For Privacy-Preserving Face Recognition Thee Chanyaswad and J. Morris Chang and Prateek Mittal and S.Y. Kung IEEE MLSP, September 2016 On the Relative De-anonymizability of Graph Data: Quantification and Evaluation Shouling Ji, Weiqing Li, Shukun Yang, Prateek Mittal, and Raheem Beyah IEEE INFOCOM, April 2016 Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples Changchang Liu, Supriyo Chakraborty, and Prateek Mittal NDSS, February 2016 • "Dependent Differential Privacy Blogpost", link LinkMirage: Enabling Privacy-Preserving Analytics on Social Relationships Changchang Liu and Prateek Mittal NDSS, February 2016 Exploiting Temporal Dynamics in Sybil Defenses Changchang Liu, Peng Gao, Matthew Wright, and Prateek Mittal ACM CCS, October 2015 RAPTOR: Routing Attacks on Privacy in Tor Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal USENIX Security 2015, Aug 2015 • "RAPTOR project webpage", link • "Tor Users at Risk of Unmasking, says Princeton", Computer Business Review • "De-anonymizing Tor Users with Raptor Attacks", ACM TechNews We found vulnerabilities in deployed anonymity systems such as Tor RAPTOR attacks motivate Tor proposal 247 (mitigating guard discovery) and Tor proposal 271 (mitigating Guard DoS) SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, Raheem Beyah USENIX Security 2015, Aug 2015 • "SecGraph Project Webpage and Code", webpage, code Aspire: Iterative Specification Synthesis for Security Kevin Chen, Devdatta Akhawe, Vijay D'Silva, Warren He, Prateek Mittal, Dawn Song HotOS, May 2015 Optical Signal Processing and Stealth Transmission for Privacy Ben Wu, Bhavin Shastri, Prateek Mittal, Alexander Tait, Paul Prucnal IEEE Journal of Selected Topics in Signal Processing, 2015 (to appear) On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge Shouling Ji, Weiqing Li, Neil Z. Gong, Prateek Mittal, Raheem Beyah NDSS, February 2015 New Directions in Social Authentication Sakshi Jain, Neil Gong, Sreya Basuroy, Juan Lang, Dawn Song, Prateek Mittal NDSS USEC, February 2015 Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal ACM HotNets, October 2014 Privacy Concerns of Implicit Secondary Factors for Web Authentication Joseph Bonneau, Edward Felten, Prateek Mittal, Arvind Narayanan WAY, July 2014 Re^3: Relay Reliability Reputation for Anonymity Systems Anupam Das, Nikita Borisov, Prateek Mittal, Matthew Caesar ACM ASIACCS, June 2014 Best Paper Award SybilBelief: A Semi-supervised Learning Approach for Structure-based Sybil Detection Neil Zhenqiang Gong, Mario Frank, Prateek Mittal IEEE TIFS, June 2014 • "SybilBelief Project code", link Pisces: Anonymous Communication Using Social Networks Prateek Mittal, Matthew Wright, Nikita Borisov NDSS, February 2013 • Hal Hodson. "How Facebook Can Help Hide Your Identity", New Scientist • "Social Networks Make Anonymous Online Communication More Secure", MIT Technology Review Our routing algorithms in X-Vine and Pisces (NDSS 12, NDSS 13) are influencing the design (link1,link2) of the Freenet project Preserving Link Privacy in Social Network based Systems Prateek Mittal, Charalampos Papamanthou, Dawn Song NDSS, February 2013 Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching Shirin Nilizadeh, Sonia Jahid, Prateek Mittal, Nikita Borisov, Apu Kapadia ACM CoNEXT, December 2012 Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+ Neil Zhenqiang Gong, Wenchang Xu, Ling Huang, Prateek Mittal, Emil Stefanov, Vyas Sekar, Dawn Song ACM/USENIX IMC, November 2012 • Our large-scale Google+ dataset is available here. SybilControl: Practical Sybil Defense with Computational Puzzles Frank Li, Prateek Mittal, Matthew Caesar, Nikita Borisov ACM STC (Colocated with ACM CCS), October 2012 DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks Sonia Jahid, Shirin Nilizadeh, Prateek Mittal, Nikita Borisov, Apu Kapadia IEEE SESOC (Colocated with IEEE PerCom), March 2012 Full version available as arXiv Tech Report X-Vine: Secure and Pseudonymous Routing Using Social Networks Prateek Mittal, Matthew Caesar, Nikita Borisov NDSS, February 2012 Full version available as arXiv Tech Report. Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems Prateek Mittal, Nikita Borisov ACM TISSEC, Special Issue on Selected Papers from CCS, 2012 Our work (including our CCS 08 and CCS 10 papers) has influenced the threat model/design (link) of P2P systems such as I2P and GNUnet Computational Frameworks for Integration of Biological Pathway Knowledge in Cancer Genomics Vinay Varadan*, Prateek Mittal*, Charles Vaske, Stepehen Benz (* Joint first author) IEEE Signal Processing Magazine, Special Issue on Genomic and Proteomic Signal Processing in Biomolecular Pathways, January 2012 Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov ACM CCS, October 2011 Full version available as arXiv Tech report. We found vulnerabilities in deployed anonymity systems such as Tor PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg USENIX Security, August 2011 Full version available as CACR Tech Report. Our work on PIR-Tor impacted Tor's Walking Onion mechanism (Tor Proposal 300) EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation Sonia Jahid, Prateek Mittal, Nikita Borisov ACM ASIACCS, March 2011 In Search of an Anonymous and Secure Lookup Qiyan Wang, Prateek Mittal, Nikita Borisov ACM CCS, October 2010 Scalable Anonymous Communication with Provable Security Prateek Mittal, Nikita Borisov, Carmela Troncoso, Alfredo Rial USENIX HotSec, August 2010 BotGrep: Detecting P2P Botnets Using Structured Graph Analysis Shishir Nagaraja*, Prateek Mittal*, Chi-Yao Hong, Matthew Caesar, Nikita Borisov (* Joint first Author) USENIX Security, August 2010 • George Lawton. "New Weapon in War on Botnets", Computing Now • Michael Cooney. "Researchers Unsheathe New Tool to Battle Botnets", Network World ShadowWalker: Peer-to-Peer Anonymous Communication Using Redundant Structured Topologies Prateek Mittal, Nikita Borisov ACM CCS, November 2009 Securing Mediated Trace Access Using Blackbox Permutation Analysis Prateek Mittal, Vern Paxson, Robin Sommer, Mark Winterrowd ACM HotNets, October 2009 SybilInfer: Detecting Sybil Nodes using Social Networks George Danezis*, Prateek Mittal* (* Joint first author) NDSS, February 2009 Information Leaks in Structured Peer-to-Peer Anonymous Communication Prateek Mittal, Nikita Borisov ACM CCS, October 2008 Selected outstanding paper, forwarded to ACM TISSEC special issue Fair K Mutual Exclusion Algorithm for Peer to Peer systems Vijay Anand Reddy*, Prateek Mittal*, Indranil Gupta (* Joint first author) ICDCS, June 2008 Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity Nikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz ACM CCS, October 2007 Our work has influenced the design of anonymity systems like Tor Tor proposal 209 implements countermeasures to our attack Defeating Reflector Attacks: Signature Conflict Triggered Filtering Prateek Mittal, Gautam Barua, Sameer Narang ECIW, June 2006 Patents, ThesesMethod for Estimation of Information Flow in Biological NetworksPrateek Mittal*, Vinay Varadan*, Angel Janevski, Sitharthan Kamalakaran, Nilanjana Banerjee, Nevenka Dimitrova Patent pending Trustworthy and Scalable Anonymous Communication Prateek Mittal Ph.D. Dissertation, University of Illinois at Urbana-Champaign, 2012 M. E. Van Valkenburg Award (link) Ross J. Martin Award Nomination (link) A Security Evaluation of the Salsa Anonymous Communication System Prateek Mittal M.S. Thesis, University of Illinois at Urbana-Champaign, 2010 Rambus Computer Engineering Award (link) |