Nikita Borisov
Curriculum Vitæ

Last updated: June 17, 2015. An up-to-date version of this C.V., with links to most of the papers, can be found at http://hatswitch.org/~nikita/cv.html.

Education

Employment

Students Advised

Post-doctoral, Former

  1. Kazuhiro Minami, 2007–2010, co-advised with Marianne Winslett
  2. Shishir Nagaraja, 2008–2010

Ph.D., Graduated

  1. Prateek Mittal, 2006–2012
  2. Amir Houmansadr, 2006–2012
  3. Robin Snader, 2007–2009
  4. Nabíl Schear, 2007–2011
  5. Xun Gong, 2009–2014, co-advised with Negar Kiyavash
  6. Qiyan Wang, 2010–2013
  7. Sonia Jahid, 2010–2013, co-advised with Carl Gunter

Ph.D., Current

  1. Joshua Juen, 2009–
  2. Giang Nguyen, 2010–
  3. Anupam Das, April 2011–

M.S., Graduated

  1. Parisa Tabriz, 2005–2007
  2. David R. Albrecht, 2007–2009

Publications

Books Edited

  1. Nikita Borisov and Philippe Golle, editors. Privacy Enhancing Technologies: 7th International Symposium, PET 2007 Ottawa, Canada, June 20–22, 2007 Revised Selected Papers. Volume 4776 of Lecture Notes in Computer Science. Springer, 2007. DOI10.1007/978-3-540-75551-7
  2. Nikita Borisov and Ian Goldberg, editors. Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 Leuven, Belgium, July 23–25, 2008 Proceedings. Volume 5134 of Lecture Notes in Computer Science. Springer, 2008. DOI10.1007/978-3-540-70630-4
  3. Ting Yu and Nikita Borisov, editors. Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society. Association for Computing Machinery, October 15, 2012. ISBN 978-1-4503-1663-71

Book Chapters

  1. Nikita Borisov. “Challenges in Wireless Security: A Case Study of 802.11.” Chapter 38 of Mohammad Ilyas and Imad Mahgoub, editors, Mobile Computing Handbook. CRC Press, December 2004, pp. 923–939. ISBN 978-0-8493-1971-6
  2. Nikita Borisov. “WEP (Wired Equivalent Privacy) Security.” In Hossein Bidgoli, editor, Handbook of Information Security. Wiley, January 2006. ISBN 978-0-471-64833-8
  3. Nikita Borisov, George Danezis, and Parisa Tabriz. “Byzantine Attacks on Anonymity Systems.” Chapter 4 of Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, and Sabrina De Capitani di Vimercati, editors, Digital Privacy: Theory, Technologies, and Practices. Auerbach Press, December 2007, pp. 73–95. ISBN 978-1-4200-5217-6

Journal Publications

  1. Steven D. Gribble, Matt Welsh, J. Robert von Behren, Eric A. Brewer, David Culler, Nikita Borisov, Steven Czerwinski, Ramakrishna Gummadi, Jason Hill, Anthony Joseph, Randy H. Katz, Z. Morley Mao, Steven Ross, and Ben Y. Zhao. “The Ninja Architecture for Robust Internet-Scale Systems and Services.” The International Journal of Computer and Telecommunications Networking vol. 35 no. 4, March 2001, pp. 473–497. DOI10.1016/S1389-1286(00)00179-1
    Awarded Best Paper for 2001
  2. Nikita Borisov, Marek Klonowski, Mirosław Kutyłowski, and Anna Lauks-Dutka. “Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach.” KSII Transactions on Internet and Information Systems vol. 4 no. 3, June 2010, pp. 380–399. DOI10.3837/tiis.2010.06.011
  3. Robin Snader and Nikita Borisov. “Improving Security and Performance in the Tor Network through Tunable Path Selection.” IEEE Transactions on Dependable and Secure Computing vol. 8 no. 5, September–October 2011, pp. 728–740. DOI10.1109/TDSC.2010.40
  4. Prateek Mittal and Nikita Borisov. “Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems.” (invited paper) ACM Transactions on Information and System Security vol. 15 no. 1, March 2012, pp. 5:1–5:28. DOI10.1145/2133375.2133380
  5. Amir Houmansadr and Nikita Borisov. “BotMosaic: Collaborative network watermark for the detection of IRC-based botnets.” Journal of Systems and Software vol. 86 no. 3, March 2013, pp. 707–715. DOI10.1016/j.jss.2012.11.005
  6. Amir Houmansadr, Negar Kiyavash, and Nikita Borisov. “Non-blind watermarking of network flows.” IEEE/ACM Transactions on Networking, July 31, 2013. DOI10.1109/TNET.2013.2272740
  7. Saman Zonouz, Amir Houmansadr, Robin Berthier, Nikita Borisov, and William H. Sanders. “Secloud: A cloud-based comprehensive and lightweight security solution for smartphones.” Computers & Security vol. 37, September 2013, pp. 215–227. DOI10.1016/j.cose.2013.02.002

Conference and Workshop Publications

  1. Nikita Borisov, Ian Goldberg, and David A. Wagner. “Intercepting Mobile Communications: The Insecurity of 802.11.” In Mahmoud Naghshineh and Michele Zorzi, editors, Proceedings of the 7th ACM SIGMOBILE International Conference on Mobile Computing and Networking (MOBICOM), Rome, Italy, July 16–21, 2001, pp. 180–189. DOI10.1145/381677.381695 (10% acceptance rate, 30/281)
  2. Nikita Borisov, Monica Chew, Rob Johnson, and David A. Wagner. “Multiplicative Differentials.” In Joan Daemen and Vincent Rijmen, editors, Proceedings of the 9th Fast Software Encryption Workshop (FSE), Leuven, Belgium, February 4–6, 2002, pp. 17–33. Volume 2365 of Lecture Notes in Computer Science. DOI10.1007/3-540-45661-9_2 (30% acceptance rate, 21/70)
  3. Nikita Borisov and Eric A. Brewer. “Active Certificates: A Framework for Delegation.” In Paul C. van Oorschot and Virgil Gligor, editors, Proceedings of the 9th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 6–8, 2002, pp. 155–165. ISBN 1-891562-14-2, 1-891562-13-4 (20% acceptance rate, 16/79)
  4. J. Robert von Behren, Eric A. Brewer, Nikita Borisov, Mike Y. Chen, Matt Welsh, Josh MacDonald, Jeremy Lau, Steven D. Gribble, and David Culler. “Ninja: A Framework for Network Services.” In Carla Schlatter Ellis, editor, Proceedings of the USENIX Technical Conference (USENIX ATC), June 10–15, 2002, pp. 87–102. ISBN 1-880446-00-6 (23% acceptance rate, 25/105)
  5. Nikita Borisov, Ian Goldberg, and Eric A. Brewer. “Off-the-Record Communications, or, Why Not To use PGP.” In Paul Syverson and Sabrina De Capitani di Vimercati, editors, Proceedings of the 3rd ACM Workshop on Privacy in Electronic Society (WPES), Washington, DC, USA, October 28, 2004, pp. 77–84. DOI10.1145/1029179.1029200 (22% acceptance rate, 10/45)
  6. Qiang Huang, Helen J. Wang, and Nikita Borisov. “Privacy-Preserving Friends Troubleshooting Network.” In Dan Boneh and Dan Simon, editors, Proceedings of the 12th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 3–4, 2005. ISBN 1-891562-20-7, 1-891562-19-3 (12% acceptance rate, 16/124)
  7. Nikita Borisov. “An Analysis of Parallel Mixing with Attacker-controlled Inputs.” In George Danezis and David Martin, editors, Proceedings of the 5th Privacy Enhancing Technologies Workshop (PET), Dubrovnik (Cavtat), Croatia, May 30–June 1, 2005, pp. 12–25. Volume 3856 of Lecture Notes in Computer Science. DOI10.1007/11767831_2 (24% acceptance rate, 18/73)
  8. Nikita Borisov, Rob Johnson, Naveen Sastry, and David A. Wagner. “Fixing Races for Fun and Profit: How to abuse atime.” In Patrick McDaniel, editor, Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31–August 5, 2005. ISBN 1-9319-7134-X (14% acceptance rate, 22/148)
  9. Parisa Tabriz and Nikita Borisov. “Breaking the Collusion Detection Mechanism of MorphMix.” In George Danezis and Philippe Golle, editors, Proceedings of the 6th Privacy Enhancing Technologies Workshop (PET), Cambridge, UK, June 28–30, 2006, pp. 368–383. Volume 4258 of Lecture Notes in Computer Science. DOI10.1007/11957454_21 (26% acceptance rate, 24/91)
  10. Jianqing Zhang, Nikita Borisov, and William Yurcik. “Outsourcing Security Analysis with Anonymized Logs.” In Brajendra Panda, Richard Anthony, Stephen Marsh, and Jean-Marc Seigneur, editors, Proceedings of the Workshop on the Value of Security through Collaboration (SECOVAL), Baltimore, MD, USA, September 1, 2006. DOI10.1109/SECCOMW.2006.359577
  11. Nikita Borisov. “Computational Puzzles as Sybil Defenses.” In Alberto Montresor, Adam Wierzbicki, and Nahid Shahmehri, editors, Proceedings of the 6th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P), Cambridge, UK, October 2–4, 2006, pp. 171–176. DOI10.1109/P2P.2006.10 (21% acceptance rate, 29/134)
  12. Adam J. Lee, Parisa Tabriz, and Nikita Borisov. “A Privacy-Preserving Interdomain Audit Framework.” In Roger Dingledine and Ting Yu, editors, Proceedings of the 5th ACM Workshop on Privacy in Electronic Society (WPES), Alexandria, VA, USA, October 30, 2006, pp. 98–108. DOI10.1145/1179601.1179620 (23% acceptance rate, 9/39)
  13. Nikita Borisov, David Brumley, Helen J. Wang, John Dunagan, Pallavi Joshi, and Chuanxiong Guo. “Generic Application-Level Protocol Analyzer and its Language.” In William Arbaugh and Crispin Cowan, editors, Proceedings of the 14th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 28–March 2, 2007. (15% acceptance rate, 18/118)
  14. Shlomo Berkovsky, Nikita Borisov, Yaniv Eytani, Tsvi Kuflik, and Francesco Ricci. “Examining Users' Attitude towards Privacy Preserving Collaborative Filtering.” In Bettina Berendt, Alexander Kröner, Ernestina Menasalvas, and Stephan Weibelzahl, editors, Proceedings of the Workshop on Ubiquitous Knowledge Discovery for User Modeling (K-DUUM), Corfu, Greece, June 25, 2007, pp. 28–34.
  15. Nikita Borisov, George Danezis, Prateek Mittal, and Parisa Tabriz. “Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity.” In Sabrina De Capitani di Vimercati and Paul Syverson, editors, Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, USA, October 28–31, 2007, pp. 92–102. DOI10.1145/1315245.1315258 (18% acceptance rate, 55/303)
  16. Nikita Borisov and Kazuhiro Minami. “Single-bit Re-encryption.” In Ting Yu, editor, Proceedings of the 6th ACM Workshop on Privacy in Electronic Society (WPES), Alexandria, VA, USA, October 29, 2007, pp. 48–55. DOI10.1145/1314333.1314341 (18% acceptance rate, 9/48)
  17. Jodie Boyer, Lars E. Olson, Ragib Hasan, Nikita Borisov, Carl Gunter, and David Raila. “Improving Multi-Tier Security Using Redundant Authentication.” In Ravi Sandhu and Jon A. Solworth, editors, Proceedings of the 1st ACM Computer Security Architecture Workshop (CSAW), Fairfax, VA, USA, November 2, 2007, pp. 54–62. DOI10.1145/1314466.1314475 (30% acceptance rate, 9/30)
  18. Robin Snader and Nikita Borisov. “A Tune-up for Tor: Improving Security and Performance in the Tor Network.” In Crispin Cowan and Giovanni Vigna, editors, Proceedings of the 15th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 8–11, 2008. (18% acceptance rate, 21/115)
  19. Soumyadeb Mitra, Marianne Winslett, and Nikita Borisov. “Deleting Index Entries from Compliance Storage.” In Alfons Kemper, Patrick Valduriez, Noureddine Mouaddib, Jens Teubner, Mokrane Bouzeghoub, Volker Markl, Laurent Amsaleg, and Ioana Manolsecu, editors, Proceedings of the 11th Conference on Extending Database Technology (EDBT), Nantes, France, March 25–30, 2008, pp. 109–120. Volume 261 of ACM International Conference Proceedings Series. DOI10.1145/1353343.1353361
  20. Nikita Borisov and Soumyadeb Mitra. “Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance.” In Rosario Gennaro and Steven Bellovin, editors, Proceedings of the 6th International Conference on Applied Cryptography and Network Security (ACNS), New York, NY, USA, June 3–6, 2008, pp. 373–391. Volume 5037 of Lecture Notes in Computer Science. DOI10.1007/978-3-540-68914-0_23 (22% acceptance rate, 30/131)
  21. Negar Kiyavash, Amir Houmansadr, and Nikita Borisov. “Multi-flow Attacks Against Network Flow Watermarking Schemes.” In Paul C. van Oorschot, editor, Proceedings of the 17th USENIX Security Symposium, San Jose, CA, July 28–August 1, 2008, pp. 307–320. ISBN 978-1-931971-60-7 (15% acceptance rate, 27/170)
  22. Nabíl Schear, David R. Albrecht, and Nikita Borisov. “High-speed Matching of Vulnerability Signatures.” In Richard Lippmann, Engin Kirda, and Ari Trachtenberg, editors, Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID), Cambridge, MA, USA, September 15–17, 2008, pp. 155–174. Volume 5230 of Lecture Notes in Computer Science. DOI10.1007/978-3-540-87403-4_9 (25% acceptance rate, 20/80)
  23. Matthew M. Lucas and Nikita Borisov. “flyByNight: Mitigating the Privacy Risks of Social Networking.” In Marianne Winslett, editor, Proceedings of the 7th ACM Workshop on Privacy in Electronic Society (WPES), Alexandria, VA, USA, October 27, 2008, pp. 1–8. DOI10.1145/1456403.1456405 (21% acceptance rate, 9/42)
  24. Kazuhiro Minami, Adam J. Lee, Marianne Winslett, and Nikita Borisov. “Secure Aggregation in a Publish-Subscribe System.” In Marianne Winslett, editor, Proceedings of the 7th ACM Workshop on Privacy in Electronic Society (WPES), Alexandria, VA, USA, October 27, 2008, pp. 95–104. DOI10.1145/1456403.1456419 (21% acceptance rate, 9/42)
  25. Prateek Mittal and Nikita Borisov. “Information Leaks in Structured Peer-to-peer Anonymous Communication Systems.” In Paul Syverson and Somesh Jha, editors, Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, USA, October 27–31, 2008, pp. 267–278. DOI10.1145/1455770.1455805 (18% acceptance rate, 51/281)
    Selected Outstanding Paper, invited to ACM TISSEC special issue
  26. Amir Houmansadr, Negar Kiyavash, and Nikita Borisov. “RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows.” In Giovanni Vigna, editor, Proceedings of the 16th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 8–11, 2009, pp. 223–235. (11% acceptance rate, 20/170)
  27. Adam J. Lee, Kazuhiro Minami, and Nikita Borisov. “Confidentiality-Preserving Distributed Proofs of Conjunctive Queries.” In Rei Safavi-Naini and Vijay Varadharajan, editors, Proceedings of the 4th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Sydney, NSW, Australia, March 10–12, 2009, pp. 287–297. DOI10.1145/1533057.1533096 (22% acceptance rate, 33/147)
  28. Amir Houmansadr, Negar Kiyavash, and Nikita Borisov. “Multi-Flow Attack Resistant Watermarks for Network Flows.” In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Taipei, Taiwan, April 19–24, 2009, pp. 1497–1500. DOI10.1109/ICASSP.2009.4959879 (44% acceptance rate, 1178/2633)
  29. Robin Snader and Nikita Borisov. “EigenSpeed: Secure Peer-to-peer Bandwidth Evaluation.” In Rodrigo Rodrigues and Keith Ross, editors, Proceedings of the 8th International Workshop on Peer-to-Peer Systems (IPTPS), Boston, MA, USA, April 21, 2009. (20% acceptance rate, 12/59)
  30. Kazuhiro Minami, Nikita Borisov, and Carl Gunter. “Safety in Discretionary Access Control for Logic-based Publish-subscribe Systems.” In James Joshi, editor, Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT), Stresa, Italy, June 3–5, 2009, pp. 3–12. DOI10.1145/1542207.1542211 (32% acceptance rate, 25/76)
  31. Prateek Mittal and Nikita Borisov. “ShadowWalker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies.” In Somesh Jha and Angelos D. Keromytis, editors, Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, November 9–13, 2009, pp. 161–172. DOI10.1145/1653662.1653683 (18% acceptance rate, 58/315)
  32. Nikita Borisov, Marek Klonowski, Mirosław Kutyłowski, and Anna Lauks-Dutka. “Attacking and Repairing the Improved ModOnions Protocol.” In Donghoon Lee and Seokhie Hong, editors, Proceedings of the 12th International Conference on Information Security and Cryptology (ICISC), Seoul, Korea, December 2–4, 2009, pp. 258–273. Volume 5984 of Lecture Notes in Computer Science. DOI10.1007/978-3-642-14423-3_18
  33. Sachin Kadloor, Xun Gong, Negar Kiyavash, Tolga Tezcan, and Nikita Borisov. “A Low-Cost Side Channel Traffic Analysis Attack in Packet Networks.” In Chengshan Xiao and Jan C. Olivier, editors, Proceedings of the IEEE International Conference on Communications (ICC), Cape Town, South Africa, May 23–27, 2010. DOI10.1109/ICC.2010.5501972
  34. Prateek Mittal, Nikita Borisov, Carmela Troncoso, and Alfredo Rial. “Scalable Anonymous Communication with Provable Security.” In Wietse Venema, editor, Proceedings of the 5th USENIX Workshop on Hot Topics in Security (HotSec), Washington, DC, USA, August 10, 2010. (19% acceptance rate, 11/57)
  35. Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, and Nikita Borisov. “BotGrep: Finding P2P Bots with Structured Graph Analysis.” In Ian Goldberg, editor, Proceedings of the 19th USENIX Security Symposium, Washington, DC, USA, August 11–13, 2010, pp. 95–110. ISBN 978-1-931971-77-5 (14% acceptance rate, 30/202)
  36. Qiyan Wang, Prateek Mittal, and Nikita Borisov. “In Search of an Anonymous and Secure Lookup.” In Ehab Al-Shaer, Angelos D. Keromytis, and Vitaly Shmatikov, editors, Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, October 4–8, 2010, pp. 308–318. DOI10.1145/1866307.1866343 (17% acceptance rate, 55/320)
  37. Kazuhiro Minami and Nikita Borisov. “Protecting Location Privacy against Inference Attacks.” (short paper) In Keith Frikken, editor, Proceedings of the 9th ACM Workshop on Privacy in Electronic Society (WPES), Chicago, IL, USA, October 4, 2010, pp. 123–126. DOI10.1145/1866919.1866938
  38. Amir Houmansadr and Nikita Borisov. “SWIRL: A Scalable Watermark to Detect Correlated Network Flows.” In Adrian Perrig, editor, Proceedings of the 18th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 6–9, 2011, pp. 389–403. (20% acceptance rate, 28/139)
  39. Sonia Jahid, Prateek Mittal, and Nikita Borisov. “EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation.” (short paper) In Bruce Cheung, Lucas Chi Kwong Hui, Ravi Sandhu, and Duncan S. Wong, editors, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Hong Kong, China, March 22–24, 2011, pp. 411–415. DOI10.1145/1966913.1966970
  40. Kazuhiro Minami, Nikita Borisov, Marianne Winslett, and Adam J. Lee. “Confidentiality-preserving Proof Theories for Distributed Proof Systems.” In Bruce Cheung, Lucas Chi Kwong Hui, Ravi Sandhu, and Duncan S. Wong, editors, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Hong Kong, China, March 22–24, 2011, pp. 145–154. DOI10.1145/1966913.1966933 (16% acceptance rate, 35/217)
  41. Shishir Nagaraja, Amir Houmansadr, Pragya Agarwal, Vijit Kumar, Pratch Piyawongwisal, and Nikita Borisov. “Stegobot: A Covert Social Network Botnet.” In Tomáš Filler, Tomáš Pevný, Scott Craver, and Andrew D. Ker, editors, Proceedings of the 13th Information Hiding Conference (IH), Prague, Czech Republic, May 18–20, 2011, pp. 299–313. Volume 6958 of Lecture Notes in Computer Science. DOI10.1007/978-3-642-24178-9_21 (32% acceptance rate, 22/68)
  42. Amir Houmansadr and Nikita Borisov. “Coco: Coding-Based Covert Timing Channels for Network Flows.” In Tomáš Filler, Tomáš Pevný, Scott Craver, and Andrew D. Ker, editors, Proceedings of the 13th Information Hiding Conference (IH), Prague, Czech Republic, May 18–20, 2011, pp. 314–328. Volume 6958 of Lecture Notes in Computer Science. DOI10.1007/978-3-642-24178-9_22 (32% acceptance rate, 22/68)
  43. Amir Houmansadr and Nikita Borisov. “Towards Improving Network Flow Watermarks Using the Repeat-Accumulate Codes.” In Alle-Jan van der Veen and Jonathon Chambers, editors, Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Prague, Czech Republic, May 22–27, 2011, pp. 1852–1855. DOI10.1109/ICASSP.2011.5946866
  44. Virajith Jalaparti, Shishir Nagaraja, Matthew Caesar, and Nikita Borisov. “P3CA: Private Anomaly Detection Across ISP Networks.” In Simone Fischer-Hübner and Nicholas Hopper, editors, Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS), Waterloo, ON, Canada, July 27–29, 2011, pp. 38–56. Volume 6794 of Lecture Notes in Computer Science. DOI10.1007/978-3-642-22263-4_3 (24% acceptance rate, 15/61)
  45. Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, and Ian Goldberg. “PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval.” In David A. Wagner, editor, Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, USA, August 10–12, 2011. (17% acceptance rate, 35/204)
  46. Amir Houmansadr, Giang Nguyen, Matthew Caesar, and Nikita Borisov. “Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability.” In George Danezis and Vitaly Shmatikov, editors, Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, October 17–21, 2011, pp. 187–200. DOI10.1145/2046707.2046730 (13% acceptance rate, 60/429)
  47. Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, and Nikita Borisov. “Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting.” In George Danezis and Vitaly Shmatikov, editors, Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, October 17–21, 2011, pp. 215–226. DOI10.1145/2046707.2046732 (13% acceptance rate, 60/429)
  48. Prateek Mittal, Matthew Caesar, and Nikita Borisov. “X-Vine: Secure and Pseudonymous Routing Using Social Networks.” In Radu Sion, editor, Proceedings of the 19th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 6–8, 2012. (18% acceptance rate, 48/258)
  49. Sonia Jahid, Shirin Nilizadeh, Prateek Mittal, Nikita Borisov, and Apu Kapadia. “DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks.” In Melek Önen and Thorsten Strufe, editors, Proceedings of the 4th IEEE International Workshop on Security and Social Networking (SESOC), Lugano, Switzerland, March 19, 2012, pp. 326–332. DOI10.1109/PerComW.2012.6197504 (29% acceptance rate, 9/31)
  50. Qiyan Wang and Nikita Borisov. “Octopus: A Secure and Anonymous DHT Lookup.” In Xavier Defago and Wang-Chien Lee, editors, Proceedings of the 32nd International Conference on Distributed Computing Systems (ICDCS), Macau, China, June 18–21, 2012, pp. 325–334. DOI10.1109/ICDCS.2012.78 (13% acceptance rate, 71/515)
  51. Xun Gong, Negar Kiyavash, Nabíl Schear, and Nikita Borisov. “Website Detection Using Remote Traffic Analysis.” In Simone Fischer-Hübner and Matthew Wright, editors, Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS), Vigo, Spain, July 11–13, 2012, pp. 58–78. Volume 7384 of Lecture Notes in Computer Science. DOIhttp://dx.doi.org/10.1007/978-3-642-31680-7_4 (22% acceptance rate, 16/72)
  52. Frank Li, Prateek Mittal, Matthew Caesar, and Nikita Borisov. “SybilControl: Practical Sybil Defense with Computational Puzzles.” In Xinwen Zhang and Xuhua Ding, editors, Proceedings of the 7th ACM Workshop on Scalable Trusted Computing (STC), Raleign, NC, USA, October 15, 2012.
  53. Qiyan Wang, Xun Gong, Giang Nguyen, Amir Houmansadr, and Nikita Borisov. “CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.” In George Danezis and Virgil Gligor, editors, Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, USA, October 16–18, 2012, pp. 121–132. DOI10.1145/2382196.2382212 (18% acceptance rate, 80/423)
  54. Shirin Nilizadeh, Sonia Jahid, Prateek Mittal, Nikita Borisov, and Apu Kapadia. “Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching.” In K. K. Ramakrishnan and Patrick Thiran, editors, Proceedings of the 8th ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Nice, France, December 10–13, 2012, pp. 347–348. DOI10.1145/2413176.2413215 (17% acceptance rate, 31/177)
  55. Qiyan Wang, Zi Lin, Nikita Borisov, and Nicholas Hopper. “rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation.” In Peng Ning, editor, Proceedings of the 20th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 24–27, 2013. (18% acceptance rate, 47/250)
  56. Amir Houmansadr, Thomas Riedl, Nikita Borisov, and Andrew C. Singer. “I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.” In Peng Ning, editor, Proceedings of the 20th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 24–27, 2013. (18% acceptance rate, 47/250)
  57. Prateek Mittal, Matthew Wright, and Nikita Borisov. “Pisces: Anonymous Communication Using Social Networks.” In Peng Ning, editor, Proceedings of the 20th ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 24–27, 2013. (18% acceptance rate, 47/250)
  58. Anupam Das and Nikita Borisov. “Securing Anonymous Communication Channels under the Selective DoS Attack.” (short paper) In Ahmad-Reza Sadeghi, editor, Proceedings of the 17th International Financial Cryptography and Data Security Conference (FC), April 1–5, 2013.
  59. Amir Houmansadr and Nikita Borisov. “The Need for Flow Fingerprints to Link Correlated Network Flows.” In Matthew Wright and Emiliano de Cristofaro, editors, Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS), Bloomington, IN, USA, July 10–12, 2013, pp. 205–224. Volume 7981 of Lecture Notes in Computer Science. DOI10.1007/978-3-642-39077-7_11 (18% acceptance rate, 13/69)
  60. Anupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov, and XiaoFeng Wang. “The Tangled Web of Password Reuse.” In Lujo Bauer, editor, Proceedings of the 21st ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 23–26, 2014. (18% acceptance rate, 55/295)
  61. Anupam Das, Nikita Borisov, and Matthew Caesar. “Analyzing an Adaptive Reputation Metric for Anonymity Systems.” In Laurie Williams, David Nicol, and Munindar P. Singh, editors, Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS), Raleigh, NC, USA, April 8–9, 2014. DOI10.1145/2600176.2600187
  62. Anupam Das, Nikita Borisov, Prateek Mittal, and Matthew Caesar. “Re³: Relay Reliability Reputation for Anonymity Systems.” In Trent Jaeger and Kouichi Sakurai, editors, Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, Japan, June 4–6, 2014. DOI10.1145/2590296.2590338 (20% acceptance rate, 52/260)
    Best Paper
  63. Anupam Das, Nikita Borisov, and Matthew Caesar. “Do You Hear What I Hear? Fingerprinting Speakers and Microphones of Smart Devices.” In Moti Yung and Ninghui Li, editors, Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), Scottsdale, AZ, USA, November 3–7, 2014. DOI10.1145/2660267.2660325 (19% acceptance rate, 114/585)
  64. Nikita Borisov, George Danezis, and Ian Goldberg. “DP5: A Private Presence Service.” In Steven J. Murdoch and Apu Kapadia, editors, Proceedings of the 15th Privacy Enhancing Technologies Symposium (PETS), Philadelphia, PA, USA, July 2015. DOI10.1515/popets-2015-0008
  65. Joshua Juen, Aaron Johnson, Anupam Das, Nikita Borisov, and Matthew Caesar. “Defending Tor from Network Adversaries: A Case Study of Network Path Prediction.” In Steven J. Murdoch and Apu Kapadia, editors, Proceedings of the 15th Privacy Enhancing Technologies Symposium (PETS), Philadelphia, PA, USA, July 2015. DOI10.1515/popets-2015-0021

Non Peer-reviewed Publications

Posters

Non-archival Conferences and Workshops

Technical Reports

Patents

Awarded
Applications

External Funding

  1. Detecting and Preventing Attacks with Vulnerability Signatures, $400,000, September 1, 2006–August 31, 2010
  2. CT-ISG: Security for Building Automation Systems, $500,000, September 1, 2007–August 31, 2011
  3. CT-ISG: Traffic Analysis: Attacks, Defenses, and Fundamental Limits, $400,000, September 1, 2008–August 31, 2011
  4. Post-doctoral Fellowship for Shishir Nagaraja, $150,000, November 1, 2008–May 31, 2010
  5. CAREER: Scale and Performance in Anonymous Communication, $500,000, July 1, 2010–June 30, 2015
  6. Towards a Secure and Privacy-preserving Decentralized Platform for Social Computing, $70,000, August 1, 2010–July 31, 2011
  7. Protecting Location Privacy of Mobile Users, $50,000, August 1, 2010–July 31, 2011
  8. Cyber Situational Awareness and Network Defense, $750,000, August 2010–August 2012
  9. ETRI-ITI Smart Grid Research Collaboration, $500,000, December 1, 2010–November 30, 2013

Teaching

Professional Service

Conferences (Co-)chaired

Program Committee Member

Conference Organization

Presentations

Invited Talks

Panels

Seminars

Conference Presentations