What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Vitaly Shmatikov
Google Scholar
53
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents.
Avital Shafran
Roei Schuster
Vitaly Shmatikov
2025
conf/uss
Self-interpreting Adversarial Images.
Tingwei Zhang
Collin Zhang
John X. Morris
Eugene Bagdasarian
Vitaly Shmatikov
2024
journals/popets
Data Isotopes for Data Provenance in DNNs.
Emily Wenger
Xiuyu Li
Ben Y. Zhao
Vitaly Shmatikov
2024
conf/ccs
Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning Pipelines.
Eugene Bagdasarian
Vitaly Shmatikov
2024
conf/uss
Adversarial Illusions in Multi-Modal Embeddings.
Tingwei Zhang
Rishi D. Jha
Eugene Bagdasaryan
Vitaly Shmatikov
2023
conf/sp
Telepath: A Minecraft-based Covert Communication System.
Zhen Sun
Vitaly Shmatikov
2022
conf/sp
Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures.
Eugene Bagdasaryan
Vitaly Shmatikov
2021
conf/uss
Blind Backdoors in Deep Learning Models.
Eugene Bagdasaryan
Vitaly Shmatikov
2021
conf/uss
You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion.
Roei Schuster
Congzheng Song
Eran Tromer
Vitaly Shmatikov
2020
conf/sp
Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning.
Roei Schuster
Tal Schuster
Yoav Meri
Vitaly Shmatikov
2019
conf/sp
Exploiting Unintended Feature Leakage in Collaborative Learning.
Luca Melis
Congzheng Song
Emiliano De Cristofaro
Vitaly Shmatikov
2018
conf/ccs
Situational Access Control in the Internet of Things.
Roei Schuster
Vitaly Shmatikov
Eran Tromer
2017
conf/ccs
Using Program Analysis to Synthesize Sensor Spoofing Attacks.
Ivan Pustogarov
Thomas Ristenpart
Vitaly Shmatikov
2017
conf/ccs
Machine Learning Models that Remember Too Much.
Congzheng Song
Thomas Ristenpart
Vitaly Shmatikov
2017
conf/uss
Beauty and the Burst: Remote Identification of Encrypted Video Streams.
Roei Schuster
Vitaly Shmatikov
Eran Tromer
2017
conf/sp
Membership Inference Attacks Against Machine Learning Models.
Reza Shokri
Marco Stronati
Congzheng Song
Vitaly Shmatikov
2016
journals/popets
CovertCast: Using Live Streaming to Evade Internet Censorship.
Richard McPherson
Amir Houmansadr
Vitaly Shmatikov
2016
conf/ccs
Breaking Web Applications Built On Top of Encrypted Data.
Paul Grubbs
Richard McPherson
Muhammad Naveed
Thomas Ristenpart
Vitaly Shmatikov
2016
conf/ndss
What Mobile Ads Know About Mobile Users.
Sooel Son
Daehyeok Kim
Vitaly Shmatikov
2015
conf/ccs
Privacy-Preserving Deep Learning.
Reza Shokri
Vitaly Shmatikov
2014
conf/sp
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations.
Chad Brubaker
Suman Jana
Baishakhi Ray
Sarfraz Khurshid
Vitaly Shmatikov
2014
conf/ndss
No Direction Home: The True Cost of Routing Around Decoys.
Amir Houmansadr
Edmund L. Wong
Vitaly Shmatikov
2014
conf/ndss
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.
Martin Georgiev
Suman Jana
Vitaly Shmatikov
2013
conf/ccs
Diglossia: detecting code injection attacks with precision and efficiency.
Sooel Son
Kathryn S. McKinley
Vitaly Shmatikov
2013
conf/sp
A Scanner Darkly: Protecting User Privacy from Perceptual Applications.
Suman Jana
Arvind Narayanan
Vitaly Shmatikov
2013
conf/sp
The Parrot Is Dead: Observing Unobservable Network Communications.
Amir Houmansadr
Chad Brubaker
Vitaly Shmatikov
2013
conf/ndss
Fix Me Up: Repairing Access-Control Bugs in Web Applications.
Sooel Son
Kathryn S. McKinley
Vitaly Shmatikov
2013
conf/ndss
The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites.
Sooel Son
Vitaly Shmatikov
2012
conf/ccs
The most dangerous code in the world: validating SSL certificates in non-browser software.
Martin Georgiev
Subodh Iyengar
Suman Jana
Rishita Anubhai
Dan Boneh
Vitaly Shmatikov
2012
conf/sp
Abusing File Processing in Malware Detectors for Fun and Profit.
Suman Jana
Vitaly Shmatikov
2012
conf/sp
Memento: Learning Secrets from Process Footprints.
Suman Jana
Vitaly Shmatikov
2011
conf/sp
"You Might Also Like: " Privacy Risks of Collaborative Filtering.
Joseph A. Calandrino
Ann Kilzer
Arvind Narayanan
Edward W. Felten
Vitaly Shmatikov
2011
conf/sp
TxBox: Building Secure, Efficient Sandboxes with System Transactions.
Suman Jana
Donald E. Porter
Vitaly Shmatikov
2011
conf/dsn
Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing.
Edmund L. Wong
Vitaly Shmatikov
2009
conf/fc
Privacy-Preserving Classifier Learning.
Justin Brickell
Vitaly Shmatikov
2009
conf/sp
De-anonymizing Social Networks.
Arvind Narayanan
Vitaly Shmatikov
2008
conf/sp
Towards Practical Privacy for Genomic Computation.
Somesh Jha
Louis Kruger
Vitaly Shmatikov
2008
conf/sp
Robust De-anonymization of Large Sparse Datasets.
Arvind Narayanan
Vitaly Shmatikov
2007
conf/ccs
Privacy-preserving remote diagnostics.
Justin Brickell
Donald E. Porter
Vitaly Shmatikov
Emmett Witchel
2007
conf/eurocrypt
Efficient Two-Party Secure Computation on Committed Inputs.
Stanislaw Jarecki
Vitaly Shmatikov
2006
conf/nspw
Large-scale collection and sanitization of network security data: risks and challenges.
Phillip A. Porras
Vitaly Shmatikov
2006
conf/esorics
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses.
Vitaly Shmatikov
Ming-Hsiu Wang
2005
conf/ccs
Towards computationally sound symbolic analysis of key exchange protocols.
Prateek Gupta
Vitaly Shmatikov
2005
conf/ccs
Obfuscated databases and group privacy.
Arvind Narayanan
Vitaly Shmatikov
2005
conf/ccs
Fast dictionary attacks on passwords using time-space tradeoff.
Arvind Narayanan
Vitaly Shmatikov
2005
conf/fc
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure.
Stanislaw Jarecki
Vitaly Shmatikov
2005
conf/asiacrypt
Privacy-Preserving Graph Algorithms in the Semi-honest Model.
Justin Brickell
Vitaly Shmatikov
2004
conf/uss
Privacy-Preserving Sharing and Correlation of Security Alerts.
Patrick Lincoln
Phillip A. Porras
Vitaly Shmatikov
2004
conf/eurocrypt
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme.
Stanislaw Jarecki
Vitaly Shmatikov
2001
conf/ccs
Constraint solving for bounded-process cryptographic protocol analysis.
Jonathan K. Millen
Vitaly Shmatikov
2000
conf/fc
Analysis of Abuse-Free Contract Signing.
Vitaly Shmatikov
John C. Mitchell
2000
conf/ndss
Analysis of a Fair Exchange Protocol.
Vitaly Shmatikov
John C. Mitchell
1998
conf/uss
Finite-State Analysis of SSL 3.0.
John C. Mitchell
Vitaly Shmatikov
Ulrich Stern
Coauthors
Amir Houmansadr
(3)
Ann Kilzer
(1)
Arvind Narayanan
(6)
Avital Shafran
(1)
Baishakhi Ray
(1)
Ben Y. Zhao
(1)
Chad Brubaker
(2)
Collin Zhang
(1)
Congzheng Song
(4)
Daehyeok Kim
(1)
Dan Boneh
(1)
Donald E. Porter
(2)
Edmund L. Wong
(2)
Edward W. Felten
(1)
Emiliano De Cristofaro
(1)
Emily Wenger
(1)
Emmett Witchel
(1)
Eran Tromer
(3)
Eugene Bagdasarian
(2)
Eugene Bagdasaryan
(3)
Ivan Pustogarov
(1)
John C. Mitchell
(3)
John X. Morris
(1)
Jonathan K. Millen
(1)
Joseph A. Calandrino
(1)
Justin Brickell
(3)
Kathryn S. McKinley
(2)
Louis Kruger
(1)
Luca Melis
(1)
Marco Stronati
(1)
Martin Georgiev
(2)
Ming-Hsiu Wang
(1)
Muhammad Naveed
(1)
Patrick Lincoln
(1)
Paul Grubbs
(1)
Phillip A. Porras
(2)
Prateek Gupta
(1)
Reza Shokri
(2)
Richard McPherson
(2)
Rishi D. Jha
(1)
Rishita Anubhai
(1)
Roei Schuster
(5)
Sarfraz Khurshid
(1)
Somesh Jha
(1)
Sooel Son
(4)
Stanislaw Jarecki
(3)
Subodh Iyengar
(1)
Suman Jana
(7)
Tal Schuster
(1)
Thomas Ristenpart
(3)
Tingwei Zhang
(2)
Ulrich Stern
(1)
Vitaly Shmatikov
(53)
Xiuyu Li
(1)
Yoav Meri
(1)
Zhen Sun
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to