Nikita Borisov
Curriculum Vitæ
Last updated: June 17, 2015. An up-to-date version of this C.V., with links to most of the papers, can be found at http://hatswitch.org/~nikita/cv.html.
Education
Employment
- Entrust, Inc.
- Software Developer, February–August 1998
- Microsoft Research
- Summer Intern Research, June–August 2004
- University of Illinois at Urbana-Champaign
- Assistant Professor, Electrical and Computer Engineering, August 2005–August 2012
- Research Assistant Professor, Coordinated Science Laboratory, August 2005–August 2012
- Research Assistant Professor, Information Trust Institute, January 2006–August 2012
- Department Affiliate, Computer Science, 2006–
- Associate Professor, Electrical and Computer Engineering, August 2012–
- Research Associate Professor, Coordinated Science Laboratory, August 2012–
- Research Associate Professor, Information Trust Institute, August 2012–
Students Advised
Post-doctoral, Former
- Kazuhiro Minami, 2007–2010, co-advised with Marianne Winslett
- Shishir Nagaraja, 2008–2010
Ph.D., Graduated
- Prateek Mittal, 2006–2012
- Amir Houmansadr, 2006–2012
- Robin Snader, 2007–2009
- Nabíl Schear, 2007–2011
- Xun Gong, 2009–2014, co-advised with Negar Kiyavash
- Qiyan Wang, 2010–2013
- Sonia Jahid, 2010–2013, co-advised with Carl Gunter
Ph.D., Current
- Joshua Juen, 2009–
- Giang Nguyen, 2010–
- Anupam Das, April 2011–
M.S., Graduated
- Parisa Tabriz, 2005–2007
-
M.S. Thesis: Byzantine Attacks on Anonymity Systems (January 2007)
- Placement: Google
- David R. Albrecht, 2007–2009
Publications
Books Edited
- Nikita Borisov and Philippe Golle, editors. Privacy Enhancing Technologies: 7th International Symposium, PET 2007 Ottawa, Canada, June 20–22, 2007 Revised Selected Papers. Volume 4776 of Lecture Notes in Computer Science. Springer, 2007. DOI: 10.1007/978-3-540-75551-7
- Nikita Borisov and Ian Goldberg, editors. Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 Leuven, Belgium, July 23–25, 2008 Proceedings. Volume 5134 of Lecture Notes in Computer Science. Springer, 2008. DOI: 10.1007/978-3-540-70630-4
- Ting Yu and Nikita Borisov, editors. Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society. Association for Computing Machinery, October 15, 2012. ISBN 978-1-4503-1663-71
Book Chapters
- Nikita Borisov.
“Challenges in Wireless Security: A Case Study of 802.11.”
Chapter 38 of Mohammad Ilyas and Imad Mahgoub, editors, Mobile Computing Handbook. CRC Press, December 2004, pp. 923–939. ISBN 978-0-8493-1971-6
- Nikita Borisov.
“WEP (Wired Equivalent Privacy) Security.”
In Hossein Bidgoli, editor, Handbook of Information Security. Wiley, January 2006. ISBN 978-0-471-64833-8
- Nikita Borisov, George Danezis, and Parisa Tabriz.
“Byzantine Attacks on Anonymity Systems.”
Chapter 4 of Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, and Sabrina De Capitani di Vimercati, editors, Digital Privacy: Theory, Technologies, and Practices. Auerbach Press, December 2007, pp. 73–95. ISBN 978-1-4200-5217-6
Journal Publications
- Steven D. Gribble, Matt Welsh, J. Robert von Behren, Eric A. Brewer, David Culler, Nikita Borisov, Steven Czerwinski, Ramakrishna Gummadi, Jason Hill, Anthony Joseph, Randy H. Katz, Z. Morley Mao, Steven Ross, and Ben Y. Zhao.
“The Ninja Architecture for Robust Internet-Scale Systems and Services.”
The International Journal of Computer and Telecommunications Networking vol. 35 no. 4, March 2001, pp. 473–497. DOI: 10.1016/S1389-1286(00)00179-1
Awarded Best Paper for 2001
- Nikita Borisov, Marek Klonowski, Mirosław Kutyłowski, and Anna Lauks-Dutka.
“Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach.”
KSII Transactions on Internet and Information Systems vol. 4 no. 3, June 2010, pp. 380–399. DOI: 10.3837/tiis.2010.06.011
- Robin Snader and Nikita Borisov.
“Improving Security and Performance in the Tor Network through Tunable Path Selection.”
IEEE Transactions on Dependable and Secure Computing vol. 8 no. 5, September–October 2011, pp. 728–740. DOI: 10.1109/TDSC.2010.40
- Prateek Mittal and Nikita Borisov.
“Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems.”
(invited paper) ACM Transactions on Information and System Security vol. 15 no. 1, March 2012, pp. 5:1–5:28. DOI: 10.1145/2133375.2133380
- Amir Houmansadr and Nikita Borisov.
“BotMosaic: Collaborative network watermark for the detection of IRC-based botnets.”
Journal of Systems and Software vol. 86 no. 3, March 2013, pp. 707–715. DOI: 10.1016/j.jss.2012.11.005
- Amir Houmansadr, Negar Kiyavash, and Nikita Borisov.
“Non-blind watermarking of network flows.”
IEEE/ACM Transactions on Networking, July 31, 2013. DOI: 10.1109/TNET.2013.2272740
- Saman Zonouz, Amir Houmansadr, Robin Berthier, Nikita Borisov, and William H. Sanders.
“Secloud: A cloud-based comprehensive and lightweight security solution for smartphones.”
Computers & Security vol. 37, September 2013, pp. 215–227. DOI: 10.1016/j.cose.2013.02.002
Conference and Workshop Publications
- Nikita Borisov, Ian Goldberg, and David A. Wagner.
“Intercepting Mobile Communications: The Insecurity of 802.11.”
In Mahmoud Naghshineh and Michele Zorzi, editors, Proceedings of the 7th ACM SIGMOBILE International Conference on Mobile Computing and Networking (MOBICOM), Rome, Italy, July 16–21, 2001, pp. 180–189. DOI: 10.1145/381677.381695 (10% acceptance rate, 30/281)
- Nikita Borisov, Monica Chew, Rob Johnson, and David A. Wagner.
“Multiplicative Differentials.”
In Joan Daemen and Vincent Rijmen, editors, Proceedings of the 9th Fast Software Encryption Workshop (FSE), Leuven, Belgium, February 4–6, 2002, pp. 17–33. Volume 2365 of Lecture Notes in Computer Science. DOI: 10.1007/3-540-45661-9_2 (30% acceptance rate, 21/70)
- Nikita Borisov and Eric A. Brewer.
“Active Certificates: A Framework for Delegation.”
In Paul C. van Oorschot and Virgil Gligor, editors, Proceedings of the 9th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 6–8, 2002, pp. 155–165. ISBN 1-891562-14-2, 1-891562-13-4 (20% acceptance rate, 16/79)
- J. Robert von Behren, Eric A. Brewer, Nikita Borisov, Mike Y. Chen, Matt Welsh, Josh MacDonald, Jeremy Lau, Steven D. Gribble, and David Culler.
“Ninja: A Framework for Network Services.”
In Carla Schlatter Ellis, editor, Proceedings of the USENIX Technical Conference (USENIX ATC), June 10–15, 2002, pp. 87–102. ISBN 1-880446-00-6 (23% acceptance rate, 25/105)
- Nikita Borisov, Ian Goldberg, and Eric A. Brewer.
“Off-the-Record Communications, or, Why Not To use PGP.”
In Paul Syverson and Sabrina De Capitani di Vimercati, editors, Proceedings of the 3rd ACM Workshop on Privacy in Electronic Society (WPES), Washington, DC, USA, October 28, 2004, pp. 77–84. DOI: 10.1145/1029179.1029200 (22% acceptance rate, 10/45)
- Qiang Huang, Helen J. Wang, and Nikita Borisov.
“Privacy-Preserving Friends Troubleshooting Network.”
In Dan Boneh and Dan Simon, editors, Proceedings of the 12th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 3–4, 2005. ISBN 1-891562-20-7, 1-891562-19-3 (12% acceptance rate, 16/124)
- Nikita Borisov.
“An Analysis of Parallel Mixing with Attacker-controlled Inputs.”
In George Danezis and David Martin, editors, Proceedings of the 5th Privacy Enhancing Technologies Workshop (PET), Dubrovnik (Cavtat), Croatia, May 30–June 1, 2005, pp. 12–25. Volume 3856 of Lecture Notes in Computer Science. DOI: 10.1007/11767831_2 (24% acceptance rate, 18/73)
- Nikita Borisov, Rob Johnson, Naveen Sastry, and David A. Wagner.
“Fixing Races for Fun and Profit: How to abuse atime.”
In Patrick McDaniel, editor, Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31–August 5, 2005. ISBN 1-9319-7134-X (14% acceptance rate, 22/148)
- Parisa Tabriz and Nikita Borisov.
“Breaking the Collusion Detection Mechanism of MorphMix.”
In George Danezis and Philippe Golle, editors, Proceedings of the 6th Privacy Enhancing Technologies Workshop (PET), Cambridge, UK, June 28–30, 2006, pp. 368–383. Volume 4258 of Lecture Notes in Computer Science. DOI: 10.1007/11957454_21 (26% acceptance rate, 24/91)
- Jianqing Zhang, Nikita Borisov, and William Yurcik.
“Outsourcing Security Analysis with Anonymized Logs.”
In Brajendra Panda, Richard Anthony, Stephen Marsh, and Jean-Marc Seigneur, editors, Proceedings of the Workshop on the Value of Security through Collaboration (SECOVAL), Baltimore, MD, USA, September 1, 2006. DOI: 10.1109/SECCOMW.2006.359577
- Nikita Borisov.
“Computational Puzzles as Sybil Defenses.”
In Alberto Montresor, Adam Wierzbicki, and Nahid Shahmehri, editors, Proceedings of the 6th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P), Cambridge, UK, October 2–4, 2006, pp. 171–176. DOI: 10.1109/P2P.2006.10 (21% acceptance rate, 29/134)
- Adam J. Lee, Parisa Tabriz, and Nikita Borisov.
“A Privacy-Preserving Interdomain Audit Framework.”
In Roger Dingledine and Ting Yu, editors, Proceedings of the 5th ACM Workshop on Privacy in Electronic Society (WPES), Alexandria, VA, USA, October 30, 2006, pp. 98–108. DOI: 10.1145/1179601.1179620 (23% acceptance rate, 9/39)
- Nikita Borisov, David Brumley, Helen J. Wang, John Dunagan, Pallavi Joshi, and Chuanxiong Guo.
“Generic Application-Level Protocol Analyzer and its Language.”
In William Arbaugh and Crispin Cowan, editors, Proceedings of the 14th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 28–March 2, 2007. (15% acceptance rate, 18/118)
- Shlomo Berkovsky, Nikita Borisov, Yaniv Eytani, Tsvi Kuflik, and Francesco Ricci.
“Examining Users' Attitude towards Privacy Preserving Collaborative Filtering.”
In Bettina Berendt, Alexander Kröner, Ernestina Menasalvas, and Stephan Weibelzahl, editors, Proceedings of the Workshop on Ubiquitous Knowledge Discovery for User Modeling (K-DUUM), Corfu, Greece, June 25, 2007, pp. 28–34.
- Nikita Borisov, George Danezis, Prateek Mittal, and Parisa Tabriz.
“Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity.”
In Sabrina De Capitani di Vimercati and Paul Syverson, editors, Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, USA, October 28–31, 2007, pp. 92–102. DOI: 10.1145/1315245.1315258 (18% acceptance rate, 55/303)
- Nikita Borisov and Kazuhiro Minami.
“Single-bit Re-encryption.”
In Ting Yu, editor, Proceedings of the 6th ACM Workshop on Privacy in Electronic Society (WPES), Alexandria, VA, USA, October 29, 2007, pp. 48–55. DOI: 10.1145/1314333.1314341 (18% acceptance rate, 9/48)
- Jodie Boyer, Lars E. Olson, Ragib Hasan, Nikita Borisov, Carl Gunter, and David Raila.
“Improving Multi-Tier Security Using Redundant Authentication.”
In Ravi Sandhu and Jon A. Solworth, editors, Proceedings of the 1st ACM Computer Security Architecture Workshop (CSAW), Fairfax, VA, USA, November 2, 2007, pp. 54–62. DOI: 10.1145/1314466.1314475 (30% acceptance rate, 9/30)
- Robin Snader and Nikita Borisov.
“A Tune-up for Tor: Improving Security and Performance in the Tor Network.”
In Crispin Cowan and Giovanni Vigna, editors, Proceedings of the 15th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 8–11, 2008. (18% acceptance rate, 21/115)
- Soumyadeb Mitra, Marianne Winslett, and Nikita Borisov.
“Deleting Index Entries from Compliance Storage.”
In Alfons Kemper, Patrick Valduriez, Noureddine Mouaddib, Jens Teubner, Mokrane Bouzeghoub, Volker Markl, Laurent Amsaleg, and Ioana Manolsecu, editors, Proceedings of the 11th Conference on Extending Database Technology (EDBT), Nantes, France, March 25–30, 2008, pp. 109–120. Volume 261 of ACM International Conference Proceedings Series. DOI: 10.1145/1353343.1353361
- Nikita Borisov and Soumyadeb Mitra.
“Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance.”
In Rosario Gennaro and Steven Bellovin, editors, Proceedings of the 6th International Conference on Applied Cryptography and Network Security (ACNS), New York, NY, USA, June 3–6, 2008, pp. 373–391. Volume 5037 of Lecture Notes in Computer Science. DOI: 10.1007/978-3-540-68914-0_23 (22% acceptance rate, 30/131)
- Negar Kiyavash, Amir Houmansadr, and Nikita Borisov.
“Multi-flow Attacks Against Network Flow Watermarking Schemes.”
In Paul C. van Oorschot, editor, Proceedings of the 17th USENIX Security Symposium, San Jose, CA, July 28–August 1, 2008, pp. 307–320. ISBN 978-1-931971-60-7 (15% acceptance rate, 27/170)
- Nabíl Schear, David R. Albrecht, and Nikita Borisov.
“High-speed Matching of Vulnerability Signatures.”
In Richard Lippmann, Engin Kirda, and Ari Trachtenberg, editors, Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID), Cambridge, MA, USA, September 15–17, 2008, pp. 155–174. Volume 5230 of Lecture Notes in Computer Science. DOI: 10.1007/978-3-540-87403-4_9 (25% acceptance rate, 20/80)
- Matthew M. Lucas and Nikita Borisov.
“flyByNight: Mitigating the Privacy Risks of Social Networking.”
In Marianne Winslett, editor, Proceedings of the 7th ACM Workshop on Privacy in Electronic Society (WPES), Alexandria, VA, USA, October 27, 2008, pp. 1–8. DOI: 10.1145/1456403.1456405 (21% acceptance rate, 9/42)
- Kazuhiro Minami, Adam J. Lee, Marianne Winslett, and Nikita Borisov.
“Secure Aggregation in a Publish-Subscribe System.”
In Marianne Winslett, editor, Proceedings of the 7th ACM Workshop on Privacy in Electronic Society (WPES), Alexandria, VA, USA, October 27, 2008, pp. 95–104. DOI: 10.1145/1456403.1456419 (21% acceptance rate, 9/42)
- Prateek Mittal and Nikita Borisov.
“Information Leaks in Structured Peer-to-peer Anonymous Communication Systems.”
In Paul Syverson and Somesh Jha, editors, Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, USA, October 27–31, 2008, pp. 267–278. DOI: 10.1145/1455770.1455805 (18% acceptance rate, 51/281)
Selected Outstanding Paper, invited to ACM TISSEC special issue
- Amir Houmansadr, Negar Kiyavash, and Nikita Borisov.
“RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows.”
In Giovanni Vigna, editor, Proceedings of the 16th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 8–11, 2009, pp. 223–235. (11% acceptance rate, 20/170)
- Adam J. Lee, Kazuhiro Minami, and Nikita Borisov.
“Confidentiality-Preserving Distributed Proofs of Conjunctive Queries.”
In Rei Safavi-Naini and Vijay Varadharajan, editors, Proceedings of the 4th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Sydney, NSW, Australia, March 10–12, 2009, pp. 287–297. DOI: 10.1145/1533057.1533096 (22% acceptance rate, 33/147)
- Amir Houmansadr, Negar Kiyavash, and Nikita Borisov.
“Multi-Flow Attack Resistant Watermarks for Network Flows.”
In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Taipei, Taiwan, April 19–24, 2009, pp. 1497–1500. DOI: 10.1109/ICASSP.2009.4959879 (44% acceptance rate, 1178/2633)
- Robin Snader and Nikita Borisov.
“EigenSpeed: Secure Peer-to-peer Bandwidth Evaluation.”
In Rodrigo Rodrigues and Keith Ross, editors, Proceedings of the 8th International Workshop on Peer-to-Peer Systems (IPTPS), Boston, MA, USA, April 21, 2009. (20% acceptance rate, 12/59)
- Kazuhiro Minami, Nikita Borisov, and Carl Gunter.
“Safety in Discretionary Access Control for Logic-based Publish-subscribe Systems.”
In James Joshi, editor, Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT), Stresa, Italy, June 3–5, 2009, pp. 3–12. DOI: 10.1145/1542207.1542211 (32% acceptance rate, 25/76)
- Prateek Mittal and Nikita Borisov.
“ShadowWalker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies.”
In Somesh Jha and Angelos D. Keromytis, editors, Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, November 9–13, 2009, pp. 161–172. DOI: 10.1145/1653662.1653683 (18% acceptance rate, 58/315)
- Nikita Borisov, Marek Klonowski, Mirosław Kutyłowski, and Anna Lauks-Dutka.
“Attacking and Repairing the Improved ModOnions Protocol.”
In Donghoon Lee and Seokhie Hong, editors, Proceedings of the 12th International Conference on Information Security and Cryptology (ICISC), Seoul, Korea, December 2–4, 2009, pp. 258–273. Volume 5984 of Lecture Notes in Computer Science. DOI: 10.1007/978-3-642-14423-3_18
- Sachin Kadloor, Xun Gong, Negar Kiyavash, Tolga Tezcan, and Nikita Borisov.
“A Low-Cost Side Channel Traffic Analysis Attack in Packet Networks.”
In Chengshan Xiao and Jan C. Olivier, editors, Proceedings of the IEEE International Conference on Communications (ICC), Cape Town, South Africa, May 23–27, 2010. DOI: 10.1109/ICC.2010.5501972
- Prateek Mittal, Nikita Borisov, Carmela Troncoso, and Alfredo Rial.
“Scalable Anonymous Communication with Provable Security.”
In Wietse Venema, editor, Proceedings of the 5th USENIX Workshop on Hot Topics in Security (HotSec), Washington, DC, USA, August 10, 2010. (19% acceptance rate, 11/57)
- Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, and Nikita Borisov.
“BotGrep: Finding P2P Bots with Structured Graph Analysis.”
In Ian Goldberg, editor, Proceedings of the 19th USENIX Security Symposium, Washington, DC, USA, August 11–13, 2010, pp. 95–110. ISBN 978-1-931971-77-5 (14% acceptance rate, 30/202)
- Qiyan Wang, Prateek Mittal, and Nikita Borisov.
“In Search of an Anonymous and Secure Lookup.”
In Ehab Al-Shaer, Angelos D. Keromytis, and Vitaly Shmatikov, editors, Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, October 4–8, 2010, pp. 308–318. DOI: 10.1145/1866307.1866343 (17% acceptance rate, 55/320)
- Kazuhiro Minami and Nikita Borisov.
“Protecting Location Privacy against Inference Attacks.”
(short paper) In Keith Frikken, editor, Proceedings of the 9th ACM Workshop on Privacy in Electronic Society (WPES), Chicago, IL, USA, October 4, 2010, pp. 123–126. DOI: 10.1145/1866919.1866938
- Amir Houmansadr and Nikita Borisov.
“SWIRL: A Scalable Watermark to Detect Correlated Network Flows.”
In Adrian Perrig, editor, Proceedings of the 18th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 6–9, 2011, pp. 389–403. (20% acceptance rate, 28/139)
- Sonia Jahid, Prateek Mittal, and Nikita Borisov.
“EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation.”
(short paper) In Bruce Cheung, Lucas Chi Kwong Hui, Ravi Sandhu, and Duncan S. Wong, editors, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Hong Kong, China, March 22–24, 2011, pp. 411–415. DOI: 10.1145/1966913.1966970
- Kazuhiro Minami, Nikita Borisov, Marianne Winslett, and Adam J. Lee.
“Confidentiality-preserving Proof Theories for Distributed Proof Systems.”
In Bruce Cheung, Lucas Chi Kwong Hui, Ravi Sandhu, and Duncan S. Wong, editors, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Hong Kong, China, March 22–24, 2011, pp. 145–154. DOI: 10.1145/1966913.1966933 (16% acceptance rate, 35/217)
- Shishir Nagaraja, Amir Houmansadr, Pragya Agarwal, Vijit Kumar, Pratch Piyawongwisal, and Nikita Borisov.
“Stegobot: A Covert Social Network Botnet.”
In Tomáš Filler, Tomáš Pevný, Scott Craver, and Andrew D. Ker, editors, Proceedings of the 13th Information Hiding Conference (IH), Prague, Czech Republic, May 18–20, 2011, pp. 299–313. Volume 6958 of Lecture Notes in Computer Science. DOI: 10.1007/978-3-642-24178-9_21 (32% acceptance rate, 22/68)
- Amir Houmansadr and Nikita Borisov.
“Coco: Coding-Based Covert Timing Channels for Network Flows.”
In Tomáš Filler, Tomáš Pevný, Scott Craver, and Andrew D. Ker, editors, Proceedings of the 13th Information Hiding Conference (IH), Prague, Czech Republic, May 18–20, 2011, pp. 314–328. Volume 6958 of Lecture Notes in Computer Science. DOI: 10.1007/978-3-642-24178-9_22 (32% acceptance rate, 22/68)
- Amir Houmansadr and Nikita Borisov.
“Towards Improving Network Flow Watermarks Using the Repeat-Accumulate Codes.”
In Alle-Jan van der Veen and Jonathon Chambers, editors, Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Prague, Czech Republic, May 22–27, 2011, pp. 1852–1855. DOI: 10.1109/ICASSP.2011.5946866
- Virajith Jalaparti, Shishir Nagaraja, Matthew Caesar, and Nikita Borisov.
“P3CA: Private Anomaly Detection Across ISP Networks.”
In Simone Fischer-Hübner and Nicholas Hopper, editors, Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS), Waterloo, ON, Canada, July 27–29, 2011, pp. 38–56. Volume 6794 of Lecture Notes in Computer Science. DOI: 10.1007/978-3-642-22263-4_3 (24% acceptance rate, 15/61)
- Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, and Ian Goldberg.
“PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval.”
In David A. Wagner, editor, Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, USA, August 10–12, 2011. (17% acceptance rate, 35/204)
- Amir Houmansadr, Giang Nguyen, Matthew Caesar, and Nikita Borisov.
“Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability.”
In George Danezis and Vitaly Shmatikov, editors, Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, October 17–21, 2011, pp. 187–200. DOI: 10.1145/2046707.2046730 (13% acceptance rate, 60/429)
- Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, and Nikita Borisov.
“Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting.”
In George Danezis and Vitaly Shmatikov, editors, Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, October 17–21, 2011, pp. 215–226. DOI: 10.1145/2046707.2046732 (13% acceptance rate, 60/429)
- Prateek Mittal, Matthew Caesar, and Nikita Borisov.
“X-Vine: Secure and Pseudonymous Routing Using Social Networks.”
In Radu Sion, editor, Proceedings of the 19th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 6–8, 2012. (18% acceptance rate, 48/258)
- Sonia Jahid, Shirin Nilizadeh, Prateek Mittal, Nikita Borisov, and Apu Kapadia.
“DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks.”
In Melek Önen and Thorsten Strufe, editors, Proceedings of the 4th IEEE International Workshop on Security and Social Networking (SESOC), Lugano, Switzerland, March 19, 2012, pp. 326–332. DOI: 10.1109/PerComW.2012.6197504 (29% acceptance rate, 9/31)
- Qiyan Wang and Nikita Borisov.
“Octopus: A Secure and Anonymous DHT Lookup.”
In Xavier Defago and Wang-Chien Lee, editors, Proceedings of the 32nd International Conference on Distributed Computing Systems (ICDCS), Macau, China, June 18–21, 2012, pp. 325–334. DOI: 10.1109/ICDCS.2012.78 (13% acceptance rate, 71/515)
- Xun Gong, Negar Kiyavash, Nabíl Schear, and Nikita Borisov.
“Website Detection Using Remote Traffic Analysis.”
In Simone Fischer-Hübner and Matthew Wright, editors, Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS), Vigo, Spain, July 11–13, 2012, pp. 58–78. Volume 7384 of Lecture Notes in Computer Science. DOI: http://dx.doi.org/10.1007/978-3-642-31680-7_4 (22% acceptance rate, 16/72)
- Frank Li, Prateek Mittal, Matthew Caesar, and Nikita Borisov.
“SybilControl: Practical Sybil Defense with Computational Puzzles.”
In Xinwen Zhang and Xuhua Ding, editors, Proceedings of the 7th ACM Workshop on Scalable Trusted Computing (STC), Raleign, NC, USA, October 15, 2012.
- Qiyan Wang, Xun Gong, Giang Nguyen, Amir Houmansadr, and Nikita Borisov.
“CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.”
In George Danezis and Virgil Gligor, editors, Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, USA, October 16–18, 2012, pp. 121–132. DOI: 10.1145/2382196.2382212 (18% acceptance rate, 80/423)
- Shirin Nilizadeh, Sonia Jahid, Prateek Mittal, Nikita Borisov, and Apu Kapadia.
“Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching.”
In K. K. Ramakrishnan and Patrick Thiran, editors, Proceedings of the 8th ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Nice, France, December 10–13, 2012, pp. 347–348. DOI: 10.1145/2413176.2413215 (17% acceptance rate, 31/177)
- Qiyan Wang, Zi Lin, Nikita Borisov, and Nicholas Hopper.
“rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation.”
In Peng Ning, editor, Proceedings of the 20th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 24–27, 2013. (18% acceptance rate, 47/250)
- Amir Houmansadr, Thomas Riedl, Nikita Borisov, and Andrew C. Singer.
“I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.”
In Peng Ning, editor, Proceedings of the 20th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 24–27, 2013. (18% acceptance rate, 47/250)
- Prateek Mittal, Matthew Wright, and Nikita Borisov.
“Pisces: Anonymous Communication Using Social Networks.”
In Peng Ning, editor, Proceedings of the 20th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 24–27, 2013. (18% acceptance rate, 47/250)
- Anupam Das and Nikita Borisov.
“Securing Anonymous Communication Channels under the Selective DoS Attack.”
(short paper) In Ahmad-Reza Sadeghi, editor, Proceedings of the 17th International Financial Cryptography and Data Security Conference (FC), April 1–5, 2013.
- Amir Houmansadr and Nikita Borisov.
“The Need for Flow Fingerprints to Link Correlated Network Flows.”
In Matthew Wright and Emiliano de Cristofaro, editors, Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS), Bloomington, IN, USA, July 10–12, 2013, pp. 205–224. Volume 7981 of Lecture Notes in Computer Science. DOI: 10.1007/978-3-642-39077-7_11 (18% acceptance rate, 13/69)
- Anupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov, and XiaoFeng Wang.
“The Tangled Web of Password Reuse.”
In Lujo Bauer, editor, Proceedings of the 21st ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 23–26, 2014. (18% acceptance rate, 55/295)
- Anupam Das, Nikita Borisov, and Matthew Caesar.
“Analyzing an Adaptive Reputation Metric for Anonymity Systems.”
In Laurie Williams, David Nicol, and Munindar P. Singh, editors, Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS), Raleigh, NC, USA, April 8–9, 2014. DOI: 10.1145/2600176.2600187
- Anupam Das, Nikita Borisov, Prateek Mittal, and Matthew Caesar.
“Re³: Relay Reliability Reputation for Anonymity Systems.”
In Trent Jaeger and Kouichi Sakurai, editors, Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, Japan, June 4–6, 2014. DOI: 10.1145/2590296.2590338 (20% acceptance rate, 52/260)
Best Paper
- Anupam Das, Nikita Borisov, and Matthew Caesar.
“Do You Hear What I Hear? Fingerprinting Speakers and Microphones of Smart Devices.”
In Moti Yung and Ninghui Li, editors, Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), Scottsdale, AZ, USA, November 3–7, 2014. DOI: 10.1145/2660267.2660325 (19% acceptance rate, 114/585)
- Nikita Borisov, George Danezis, and Ian Goldberg.
“DP5: A Private Presence Service.”
In Steven J. Murdoch and Apu Kapadia, editors, Proceedings of the 15th Privacy Enhancing Technologies Symposium (PETS), Philadelphia, PA, USA, July 2015. DOI: 10.1515/popets-2015-0008
- Joshua Juen, Aaron Johnson, Anupam Das, Nikita Borisov, and Matthew Caesar.
“Defending Tor from Network Adversaries: A Case Study of Network Path Prediction.”
In Steven J. Murdoch and Apu Kapadia, editors, Proceedings of the 15th Privacy Enhancing Technologies Symposium (PETS), Philadelphia, PA, USA, July 2015. DOI: 10.1515/popets-2015-0021
Non Peer-reviewed Publications
Posters
- Nikita Borisov, Mike Y. Chen, and J. Robert von Behren.
“vSpace: An Architecture for Scalable and Composable Internet Services.”
Poster at the 4th USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, USA, October 22–25, 2000.
- Matthew M. Lucas and Nikita Borisov.
“flyByNight: Mitigating the Privacy Risks of Social Networking.”
Poster at the 5th Symposium on Usable Privacy and Security (SOUPS), Mountain View, CA, USA, July 15–17, 2009.
DOI: 10.1145/1572532.1572577
- Amir Houmansadr, Todd P. Coleman, Negar Kiyavash, and Nikita Borisov.
“On the Channel Capacity of Network Flow Watermarking.”
Poster at the 16th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, November 9–13, 2009.
ISBN 978-1-60558-894-0
- Nabíl Schear and Nikita Borisov.
“Preventing SSL Traffic Analysis with Realistic Cover Traffic.”
Poster at the 16th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, November 9–13, 2009.
ISBN 978-1-60558-894-0
- Virajith Jalaparti, Shishir Nagaraja, Matthew Caesar, and Nikita Borisov.
“P3CA: Privacy Preserving Traffic Anomaly Detection for ISP Networks.”
Poster at the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, USA, April 28–30, 2010.
- Kazuhiro Minami and Nikita Borisov.
“Protecting Location Privacy against Inference Attacks.”
Poster at the 17th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, October 4–8, 2010, pp. 711–713.
DOI: 10.1145/1866307.1866406
- Xun Gong, Negar Kiyavash, and Nikita Borisov.
“Fingerprinting Websites Using Remote Traffic Analysis.”
Poster at the 17th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, October 4–8, 2010.
DOI: 10.1145/1866307.1866397
- Amir Houmansadr, Wenxuan Zhou, Matthew Caesar, and Nikita Borisov.
“Censorship Circumvention by Tunnelling Traffic Through Email.”
Poster at the 33rd IEEE Symposium on Security and Privacy (SSP), San Francisco, CA, USA, May 20–23, 2012.
- Giang Nguyen, Xun Gong, Anupam Das, and Nikita Borisov.
“PnP: Improving Web Browsing Performance over Tor Using Web Resource Prefetch-and-Push.”
Poster at the 20th ACM Conference on Computer and Communications Security (CCS), Berlin, Germany, November 4–8, 2013.
DOI: 10.1145/2508859.2512519
- Anupam Das and Nikita Borisov.
“Fingerprinting Smartphones Through Speaker.”
Poster at the 35th IEEE Symposium on Security and Privacy (SSP), San Jose, CA, USA, May 18–21, 2014.
Non-archival Conferences and Workshops
- Jianqing Zhang, Nikita Borisov, William Yurcik, Adam Slagell, and Matthew Smith.
“Future Internet Security Services Enabled by Sharing of Anonymized Logs.”
Workshop on Security and Privacy in Future Business Services, Freiburg, Germany, June 7, 2006.
- Amir Houmansadr, Negar Kiyavash, and Nikita Borisov.
“Towards Efficient Detection of Stepping Stone Attacks With Spread-Spectrum Watermarks.”
3rd Midwest Security Workshop (MSW), West Lafayette, IN, USA, April 7, 2007.
- Nikita Borisov, Marek Klonowski, Mirosław Kutyłowski, and Anna Lauks-Dutka.
“Attacking and Repairing the Improved ModOnions Protocol.”
7th International Conference on Applied Cryptography and Network Security (ACNS), Paris, France, June 2–5, 2009, Industrial track.
- Amir Houmansadr and Nikita Borisov.
“Networks: An Invisible and Blind Network Watermark.”
2nd Hot Topics in Privacy Enhancing Technologies (HotPETs), Seattle, WA, USA, August 7, 2009.
- Shishir Nagaraja, Nikita Borisov, and Matthew Caesar.
“GraphSlicer: Localizing bots using community detection algorithms.”
2nd Workshop on Simplifying Complex Network for Practitioners (SIMPLEX), Genoa, Italy, June 21, 2010. (invited paper)
- Kevin Bauer, Joshua Juen, Nikita Borisov, Dirk Grunwald, Douglas Sicker, and Damon McCoy.
“On the Optimal Path Length for Tor.”
3rd Hot Topics in Privacy Enhancing Technologies (HotPETs), Berlin, Germany, July 23, 2010.
- Prateek Mittal and Nikita Borisov.
“New Directions in Scalable Anonymous Communication.”
3rd Hot Topics in Privacy Enhancing Technologies (HotPETs), Berlin, Germany, July 23, 2010.
- Wenxuan Zhou, Amir Houmansadr, Matthew Caesar, and Nikita Borisov.
“SWEET: Serving the Web by Exploiting Email Tunnels.”
Hot Topics in Privacy Enhancing Technologies (HotPETs), Bloomington, IN, USA, July 12, 2013.
Technical Reports
- Matt Welsh, Nikita Borisov, Jason Hill, J. Robert von Behren, and Alec Woo.
“Querying Large Collections of Music for Similarity.”
EECS Department, University of California, Berkeley technical report UCB/CSD-00-1096, November 1999.
- Nikita Borisov, David Brumley, Helen J. Wang, and Chuanxiong Guo.
“Generic Application-Level Protocol Analyzer and its Language.”
Microsoft Research technical report MSR-TR-2005-133, February 2005.
- Nikita Borisov and Jason Waddle.
“Anonymity in Structured Peer-to-Peer Networks.”
EECS Department, University of California, Berkeley technical report UCB/CSD-05-1390, May 2005.
- Kazuhiro Minami, Adam J. Lee, Marianne Winslett, and Nikita Borisov.
“Secure Aggregation in a Publish-Subscribe System.”
University of Illinois at Urbana-Champaign technical report UIUCDCS-R-2008-2968, May 2008.
- Adam J. Lee, Kazuhiro Minami, and Nikita Borisov.
“Confidentiality-Preserving Distributed Proofs of Conjunctive Queries (extended version).”
University of Pittsburgh, Department of Computer Science technical report TR-08-161, December 2008.
- Walter S. Baer, Nikita Borisov, George Danezis, Seda F. Gürses, Marek Klonowski, Mirosław Kutyłowski, Ursula Maier-Rabler, Tal Moran, Andreas Pfitzmann, Bart Preneel, Ahmad-Reza Sadeghi, Thierry Vedel, Tracy Westen, Filip Zagórski, and William H. Dutton.
“Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society.”
Social Sciences Research Network technical report, October 12, 2009.
- Shishir Nagaraja, Amir Houmansadr, Pragya Agarwal, Vijit Kumar, and Nikita Borisov.
“Stegobot: A Covert Social Network Botnet.”
Indraprastha Institute of Information Technology, Delhi technical report IIITD-TR-2011-001, 2011.
- Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, and Ian Goldberg.
“PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval.”
Centre for Applied Cryptography Research technical report 2011-05, March 2011.
- Anupam Das and Nikita Borisov.
“Securing Tor Tunnels under the Selective-DoS Attack.”
Computing Research Repository (arXiv) technical report arXiv:1107.3863 [cs.CR], July 19, 2011.
- Xun Gong, Negar Kiyavash, Nabíl Schear, and Nikita Borisov.
“Website Detection Using Remote Traffic Analysis.”
Computing Research Repository (arXiv) technical report arXiv:1109.0097 [cs.CR], September 1, 2011.
- Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, and Nikita Borisov.
“Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting.”
Computing Research Repository (arXiv) technical report arXiv:1109.0597 [cs.CR], September 3, 2011.
- Prateek Mittal, Matthew Caesar, and Nikita Borisov.
“X-Vine: Secure and Pseudonymous Routing Using Social Networks.”
Computing Research Repository (arXiv) technical report arXiv:1109.0971 [cs.CR], September 5, 2011.
- Sonia Jahid, Shirin Nilizadeh, Prateek Mittal, Nikita Borisov, and Apu Kapadia.
“DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks.”
Computing Research Repository (arXiv) technical report arXiv:1111.5377 [cs.CR], November 23, 2011.
- Frank Li, Prateek Mittal, Matthew Caesar, and Nikita Borisov.
“SybilControl: Practical Sybil Defense with Computational Puzzles.”
Computing Research Repository (arXiv) technical report arXiv:1201.2657, January 13, 2012.
- Amir Houmansadr and Nikita Borisov.
“BotMosaic: Collaborative Network Watermark for Botnet Detection.”
Computing Research Repository (arXiv) technical report arXiv.1203.1568, March 9, 2012.
- Amir Houmansadr, Negar Kiyavash, and Nikita Borisov.
“Non-blind watermarking of network flows.”
Computing Research Repository (arXiv) technical report arXiv:1203.2273, March 10, 2012.
- Negar Kiyavash, Amir Houmansadr, and Nikita Borisov.
“Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures.”
Computing Research Repository (arXiv) technical report arXiv:1203.1390, March 10, 2012.
- Qiyan Wang and Nikita Borisov.
“Octopus: A Secure and Anonymous DHT Lookup.”
Computing Research Repository (arXiv) technical report arXiv:1203.2668, March 12, 2012.
- Amir Houmansadr, Thomas Riedl, Nikita Borisov, and Andrew C. Singer.
“IP over Voice-over-IP for censorship circumvention.”
Computing Research Repository (arXiv) technical report arXiv:1207.2683, July 11, 2012.
- Sonia Jahid and Nikita Borisov.
“PIRATTE: Proxy-based Immediate Revocation of ATTribute-based Encryption.”
Computing Research Repository (arXiv) technical report arXiv:1208.4877, August 23, 2012.
- Prateek Mittal, Matthew Wright, and Nikita Borisov.
“Pisces: Anonymous Communication Using Social Networks.”
Computing Research Repository (arXiv) technical report arXiv:1208.6326, August 30, 2012.
- Wenxuan Zhou, Amir Houmansadr, Matthew Caesar, and Nikita Borisov.
“SWEET: Serving the Web by Exploiting Email Tunnels.”
Computing Research Repository (arXiv) technical report arXiv:1211.3191 [cs.CR], December 18, 2012.
- Anupam Das, Nikita Borisov, and Matthew Caesar.
“Fingerprinting Smart Devices Through Embedded Acoustic Components.”
Computing Research Repository (arXiv) technical report arXiv:1403.3366 [cs.CR], March 13, 2014.
- Nikita Borisov, George Danezis, and Ian Goldberg.
“DP5: A Private Presence Service.”
Centre for Applied Cryptography Research technical report CACR 2014-10, May 2014.
Patents
Awarded
- Helen J. Wang, Nikita Borisov, Qiang Huang, and David Jao.
“Determining cardinality of a parameter using hash values.”
US Patent 7584182, Application date: December 19, 2005, issue date: September 1, 2009. Assignee: Microsoft.
- Helen J. Wang, Nikita Borisov, Qiang Huang, and David Jao.
“Aggregating information from a cluster of peers.”
US Patent 7743123, Application date: December 19, 2005, issue date: June 22, 2010. Assignee: Microsoft.
- Helen J. Wang, Nikita Borisov, and David Brumley.
“Generic application level protocol analyzer.”
US Patent 7975059, Application date: November 15, 2005, issue date: July 5, 2011. Assignee: Microsoft.
Applications
External Funding
- Detecting and Preventing Attacks with Vulnerability Signatures, $400,000, September 1, 2006–August 31, 2010
- CT-ISG: Security for Building Automation Systems, $500,000, September 1, 2007–August 31, 2011
- CT-ISG: Traffic Analysis: Attacks, Defenses, and Fundamental Limits, $400,000, September 1, 2008–August 31, 2011
- Post-doctoral Fellowship for Shishir Nagaraja, $150,000, November 1, 2008–May 31, 2010
- Institute for Information Infrastructure Protection
- CAREER: Scale and Performance in Anonymous Communication, $500,000, July 1, 2010–June 30, 2015
- National Science Foundation
- Towards a Secure and Privacy-preserving Decentralized Platform for Social Computing, $70,000, August 1, 2010–July 31, 2011
- HP Labs, Innovation Research Program
- Protecting Location Privacy of Mobile Users, $50,000, August 1, 2010–July 31, 2011
- Cyber Situational Awareness and Network Defense, $750,000, August 2010–August 2012
- ETRI-ITI Smart Grid Research Collaboration, $500,000, December 1, 2010–November 30, 2013
- The Attached Institute of Electronics and Telecommunications Research Institute of Korea
- David Nicol, PI, Nikita Borisov and Tim Yardley, co-PIs
Teaching
- CS498CAG: Computer Security, August–December 2005, UIUC (with Carl Gunter)
- ECE598NB: Privacy Enhancing Technologies, January–May 2006, UIUC
On Incomplete List of Teachers Ranked as Excellent
- CS438 / CSE425 / ECE438: Computer Networks, August–December 2006, UIUC
- CS498IA: Information Assurance, January–May 2007, UIUC
- CS438 / CSE425 / ECE438: Computer Networks, August–December 2007, UIUC
- ECE391: Computer Systems Engineering, January–May 2009, UIUC
- CS598MAN / ECE598MAN: Applied Cryptography, August–December 2009, UIUC (with Manoj Prabhakaran)
- ECE391: Computer Systems Engineering, January–May 2010, UIUC
- ECE391: Computer Systems Engineering, January–May 2011, UIUC
- CS425 / CSE424 / ECE428: Distributed Systems, August–December 2011, UIUC
- CS461 / ECE422: Computer Security I, January–May 2012, UIUC
- ECE391: Computer Systems Engineering, August–December 2012, UIUC
- CS425 / ECE428: Distributed Systems, January–May 2013, UIUC
- ECE391: Computer Systems Engineering, August–December 2014, UIUC (with Michael Bailey)
Professional Service
Conferences (Co-)chaired
- 7th Privacy Enhancing Technologies Symposium (PETS), Ottawa, ON, Canada, June 20–22, 2007: Program Co-chair
- 4th Midwest Security Workshop (MSW), Chicago, IL, USA, October 6, 2007: Program Chair
- 8th Privacy Enhancing Technologies Symposium (PETS), Leuven, Belgium, July 23–25, 2008: Program Co-chair
- 11th ACM Workshop on Privacy in Electronic Society (WPES), Raleigh, NC, USA, October 15, 2012: Program Chair
Program Committee Member
- 4th ACM Workshop on Privacy in Electronic Society (WPES), November 7, 2005: PC Member, Session Chair
- 6th Privacy Enhancing Technologies Workshop (PET), Cambridge, UK, June 28–30, 2006: PC Member, Session Chair
- Secure Knowledge Management Workshop (SKM), Brooklyn, NY, USA, September 28–April 2, 2006: PC Member
- 13th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, USA, October 30–November 3, 2006: PC Member
- 5th ACM Workshop on Privacy in Electronic Society (WPES), Alexandria, VA, USA, October 30, 2006: PC Member
- 37th IEEE/IFIP Dependable Systems and Networks - Dependable Computing and Communications Symposium (DSN-DCCS), Edinburgh, UK, June 25–28, 2007: PC Member
- Workshop on the Value of Security through Collaboration (SECOVAL), Nice, France, September 17, 2007: PC Member
- 6th ACM Workshop on Privacy in Electronic Society (WPES), Alexandria, VA, USA, October 29, 2007: PC Member, Session Chair
- 12th International Financial Cryptography and Data Security Conference (FC), January 2008: PC Member
- 27th IEEE Conference on Computer Communications (INFOCOM), Phoenix, AZ, USA, April 15–17, 2008: PC Member
- 5th International Workshop on Hot Topics in Peer-to-peer Systems (HotP2P), Miami, FL, USA, April 18, 2008: PC Member
- ACM Workshop on Network Data Anonymization (NDA), October 2008: PC Member
- 15th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, USA, October 27–31, 2008: PC Member
- 7th ACM Workshop on Privacy in Electronic Society (WPES), Alexandria, VA, USA, October 27, 2008: PC Member
- 13th International Financial Cryptography and Data Security Conference (FC), February 2009: PC Member
- 16th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 8–11, 2009: PC Member
- 18th International World Wide Web Conference (WWW), Madrid, Spain, April 20–24, 2009, Security and Privacy track: PC Member
- 6th International Workshop on Hot Topics in Peer-to-peer Systems (HotP2P), Rome, Italy, May 29, 2009: PC Member
- 29th International Conference on Distributed Computing Systems (ICDCS), Montreal, QC, Canada, June 22–26, 2009, Security and Privacy track: PC Member
- 9th Privacy Enhancing Technologies Symposium (PETS), Seattle, WA, USA, August 8–7, 2009: PC Member
- 5th Conference on Security and Privacy in Communication Networks (SecureComm), Athens, Greece, September 14–17, 2009: PC Member
- 14th European Symposium on Research in Computer Security (ESORICS), Saint Malo, France, September 21–25, 2009: PC Member
- 8th ACM Workshop on Privacy in Electronic Society (WPES), November 9, 2009: PC Member
- 17th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 28–March 3, 2010: PC Member
- 3rd ACM Conference on Wireless Network Security (WiSec), Hoboken, NJ, USA, March 22–24, 2010: PC Member
- 31st IEEE Symposium on Security and Privacy (SSP), Oakland, CA, USA, May 16–19, 2010: PC Member, Session Chair
- 10th Privacy Enhancing Technologies Symposium (PETS), Berlin, Germany, July 21–23, 2010: PC Member
- USENIX Workshop on Collaborative Methods for Security and Privacy (CollSec), August 10, 2010: PC Member
- 19th USENIX Security Symposium, Washington, DC, USA, August 11–13, 2010: PC Member
- 17th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, October 4–8, 2010: PC Member, Session Chair
- 9th ACM Workshop on Privacy in Electronic Society (WPES), Chicago, IL, USA, October 4, 2010: PC Member, Session Chair
- 29th IEEE International Symposium on Reliable Distributed Systems (SRDS), Delhi, India, November 1–3, 2010: PC Member
- 6th International Workshop on Networking Meets Databases (NetDB), Athens, Greece, June 12, 2011: PC Member
- 18th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, October 17–21, 2011: PC Member, Session Chair
- 10th ACM Workshop on Privacy in Electronic Society (WPES), Chicago, IL, USA, October 17, 2011: PC Member
- 19th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 6–8, 2012: PC Member, Session Chair
- 21st USENIX Security Symposium, Bellevue, WA, USA, August 6–10, 2012: PC Member, Session Chair
- 19th ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, USA, October 16–18, 2012: PC Member
- 33rd International Conference on Distributed Computing Systems (ICDCS), Philadelphia, PA, USA, July 8–11, 2013, Security and Privacy track: PC Member
- 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI), Washington, DC, USA, August 13, 2013: PC Member
- 22nd USENIX Security Symposium, Washington, DC, USA, August 14–16, 2013: PC Member, Rump Session Chair
- 23rd USENIX Security Symposium, San Diego, CA, USA, August 20–22, 2014: PC Member, Session Chair
- 15th Privacy Enhancing Technologies Symposium (PETS), Philadelphia, PA, USA, July 2015: PC Member
- 8th Workshop on Cyber Security Experimentation and Test (CSET), Washington, DC, USA, August 10, 2015: PC Member
- 24th USENIX Security Symposium, Washington, DC, USA, August 12–14, 2015: PC Member
- 22nd International Conference on Selected Areas in Cryptography (SAC), Sackville, NB, Canada, August 12–14, 2015: PC Member
- 22nd ACM Conference on Computer and Communications Security (CCS), Denver, CO, USA, October 12–16, 2015: PC Member
- 23rd ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 2016: PC Member
Conference Organization
- 16th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, November 9–13, 2009: Poster and Demo Co-chair, Regional Arrangements Committee Member
- 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Hong Kong, China, March 22–24, 2011: Session Chair
- 12th Privacy Enhancing Technologies Symposium (PETS), Vigo, Spain, July 11–13, 2012: PET Award Committee Co-Chair
- 13th Privacy Enhancing Technologies Symposium (PETS), Bloomington, IN, USA, July 10–12, 2013: PET Award Committee Co-Chair
- 35th International Conference on Distributed Computing Systems (ICDCS), Columbus, OH, USA, June 29–July 2, 2015: Vice Chair
Presentations
Invited Talks
- “Analysis of 802.11 Security, or Wired Equivalent Privacy Isn't.” MAC Crypto Workshop, Cupertino, CA, USA, February 2001
- “Wireless Privacy: Analysis of 802.11 Security.” 2nd CACR Privacy and Security Workshop, Toronto, ON, Canada, November 2001
- “Security Challenges for Ubiquitous Wireless Networking.” International Workshop on Future of Information Processing Technologies (IWFIPT), Miyazaki, Japan, November 2003
- “Encrypted Traffic Analysis.” MITACS Workshop on Network Security and Cryptography, Toronto, ON, Canada, June 21–25, 2010
Panels
Seminars
- “Anonymity in Peer-to-peer Systems.” COSIC Seminar, Katholieke Universiteit Leuven, 2005.
- “Anonymity in P2P Systems.” Cider Seminar, University of Toronto, July 18, 2005.
- “Anonymity in Peer-to-Peer Systems.” Computer Engineering Seminar, University of Illinois at Urbana-Champaign, September 13, 2005.
- “Client Puzzles and Sybil Attacks.” Stanford University, February 24, 2006.
- “Peer-to-peer Network Topologies and Anonymity.” Cambridge University, September 8, 2006.
- “Finding Strangers and Security of Peer-to-peer Networks.” University of California, Berkeley, December 4, 2006.
- “Network Flow Watermarking.” Carnegie Mellon University, 2007.
- “Finding Strangers and Security of Peer-to-peer Networks.” Computer Science Colloquium, University of Illinois at Urbana-Champaign, February 27, 2007.
- “Network Flow Watermarking.” Northwestern University, 2008.
- “Peer-to-peer Anonymous Communication: Approaches and Pitfalls.” CACR Cryptography Seminar, University of Waterloo, May 8, 2009.
- “Peer-to-peer Anonymous Communication: Approaches and Pitfalls.” COSIC Seminar, Katholieke Universiteit Leuven, May 29, 2009.
- “Botnets and Stepping Stones: Applications of Encrypted Traffic Analysis.” University of Michigan, November 2, 2009.
- “Botnets and Stepping Stones: Applications of Encrypted Traffic Analysis.” GTISC Information Security Seminar, Georgia Institute of Technology, April 23, 2010.
- “Detecting Coordinated Attacks with Traffic Analysis.” Purdue University, November 10, 2010.
- “X-vine: A Social Platform for Decentralized Distributed Systems.” Nanyang Technological University, Singapore, December 8, 2010.
- “Detecting Coordinated Attacks with Traffic Analysis.” CS Seminar, National University of Singapore, December 10, 2010.
- “Peer-to-peer Anonymous Communication, or, Relying upon the Kindness of Strangers.” Systems and Networking Lunch, University of California at San Diego, February 9, 2011.
- “Relying upon the Kindness of Strangers: Challenges in Scalable Anonymous Communication.” TRUST Seminar, University of California, Berkeley, February 16, 2012.
- “Exploiting Internet Insecurity to Circumvent Censorship.” Cornell Systems Lunch, Cornell University, March 16, 2012.
- “Exploiting Internet Insecurity to Circumvent Censorship.” École Polytechnique Fédérale de Lausanne, March 23, 2012.
- “Breaking the Internet for Fun and Censorship Resistance.” Saarland University, February 8, 2013.
- “Censorship Circumvention: Staying Ahead in a Cat-and-Mouse Game.” Summer Research Institute, École Polytechnique Fédérale de Lausanne, June 11, 2013.
- “Censorship Circumvention: Staying Ahead in a Cat-and-Mouse Game.” Microsoft Research Cambridge, August 29, 2013.
- “Fingerprinting Network Traffic.” Comete-Parsifal Seminar, INRIA Saclay, November 20, 2013.
- “Website Fingerprinting.” Computer Laboratory Security Seminar, Cambridge University, April 22, 2014.
- “No Fixed Abode: Avoiding IP Address Blocking to Circumvent Censorship.” Computer Laboratory Wednesday Seminars, Cambridge University, May 28, 2014.
Conference Presentations
- “Intercepting Mobile Communications: The Insecurity of 802.11.” 7th ACM SIGMOBILE International Conference on Mobile Computing and Networking (MOBICOM), Rome, Italy, July 16–21, 2001.
- “Active Certificates: A Framework for Delegation.” 9th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 6–8, 2002.
- “Off-the-Record Communications, or, Why Not To use PGP.” 3rd ACM Workshop on Privacy in Electronic Society (WPES), Washington, DC, USA, October 28, 2004.
- “An Analysis of Parallel Mixing with Attacker-controlled Inputs.” 5th Privacy Enhancing Technologies Workshop (PET), Dubrovnik (Cavtat), Croatia, May 30–June 1, 2005.
- “Computational Puzzles as Sybil Defenses.” 6th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P), Cambridge, UK, October 2–4, 2006.
- “Generic Application-Level Protocol Analyzer and its Language.” 14th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 28–March 2, 2007.
- “Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance.” 6th International Conference on Applied Cryptography and Network Security (ACNS), New York, NY, USA, June 3–6, 2008.
- “RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows.” 16th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 8–11, 2009.
- “EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation.” 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Hong Kong, China, March 22–24, 2011.
- “Octopus: A Secure and Anonymous DHT Lookup.” 32nd International Conference on Distributed Computing Systems (ICDCS), Macau, China, June 18–21, 2012.