Publications

Research papers from the Georgetown Security Lab.

Papers are included to ensure timely dissemination of scholarly work on a non-commercial basis. Please respect the rights of the copyright holder(s).

Paper information is pulled from dblp. Please report errors or omissions to seclab@cs.georgetown.edu.

2026

  1. Bayesian Perspective on Memorization and Reconstruction
    Haim Kaplan, Yishay Mansour, Kobbi Nissim, Uri Stemmer
    17th Innovations in Theoretical Computer Science Conference, ITCS 2026, Bocconi University, Milan, Italy, January 27-30, 2026  — 2026
    Details
  2. Differentially Private Quasi-Concave Optimization: Bypassing the Lower Bound and Application to Geometric Problems
    Kobbi Nissim, Eliad Tsfadia, Chao Yan
    Proceedings of the 2026 Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2026, Vancouver, BC, Canada, January 11-14, 2026  — 2026
    Details

2025

  1. SCIF: Privacy-Preserving Statistics Collection with Input Validation and Full Security
    Jianan Su, Laasya Bangalore, Harel Berger, Jason Yi, Sophia Castor, Micah Sherr, Muthuramakrishnan Venkitasubramaniam
    Proc. Priv. Enhancing Technol.  — 2025
    Details
  2. Censorship Evasion with Unidentified Protocol Generation
    Ryan Wails, Rob Jansen, Aaron Johnson, Micah Sherr
    34th USENIX Security Symposium, USENIX Security 2025, Seattle, WA, USA, August 13-15, 2025  — 2025
    Details
  3. A Systems Security Approach for Emerging Programmable Network Architectures
    Benjamin E. Ujcich
    IEEE Secur. Priv.  — 2025
    Details
  4. Chimera: Fuzzing P4 Network Infrastructure for Multi-Plane Bug Detection and Vulnerability Discovery
    Jiwon Kim, Dave Jing Tian, Benjamin E. Ujcich
    IEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025  — 2025
    Details
  5. On the Rival Nature of Data: Tech and Policy Implications
    Ayelet Gordon-Tapiero, Katrina Ligett, Kobbi Nissim
    Proceedings of the 2025 Symposium on Computer Science and Law, CSLAW 2025, Munich, Germany, March 25-27, 2025  — 2025
    Details
  6. Data Reconstruction: When You See It and When You Don’t
    Edith Cohen, Haim Kaplan, Yishay Mansour, Shay Moran, Kobbi Nissim, Uri Stemmer, Eliad Tsfadia
    16th Innovations in Theoretical Computer Science Conference, ITCS 2025, Columbia University, New York, NY, USA, January 7-10, 2025  — 2025
    Details
  7. Extending the Heilmeier Catechism to Evaluate Security and Privacy Systems: Who is Left Out?
    Kevin R. B. Butler, Kurt Hugenberg, Eakta Jain, Apu Kapadia, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner, Mattea Sim, Patrick Traynor, Hanna Barakat
    IEEE Secur. Priv.  — 2025
    Details
  8. Online Safety Through the Lens of Gender and Sexuality
    Kovila P. L. Coopamootoo, Elissa M. Redmiles, Miranda Wei
    IEEE Secur. Priv.  — 2025
    Details
  9. Models Matter: Setting Accurate Privacy Expectations for Local and Central Differential Privacy
    Mary Anne Smart, Priyanka Nanayakkara, Rachel Cummings, Gabriel Kaptchuk, Elissa M. Redmiles
    Proc. Priv. Enhancing Technol.  — 2025
    Details
  10. Public Opinions About Copyright for AI-Generated Art: The Role of Egocentricity, Competition, and Experience
    Gabriel Lima, Nina Grgic-Hlaca, Elissa M. Redmiles
    Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems, CHI 2025, YokohamaJapan, 26 April 2025- 1 May 2025  — 2025
    Details
  11. Reflexivity & Reflection (R&R) for Sociotechnical Safety: Creating a Space for Collective Learning
    Jessica McClearn, Lucy Qin, Emily Tseng, Miranda Wei, Rikke Bjerg Jensen, Nora McDonald, Elissa M. Redmiles, Morgan Klaus Scheuerman, Reem Talhouk
    Companion Publication of the 2025 Conference on Computer-Supported Cooperative Work and Social Computing, CSCW Companion 2025, Bergen, Norway, October 18-22, 2025  — 2025
    Details
  12. Co-Constructing the Future of Digital Intimacy
    Chris Geeng, Lucy Qin, Allison McDonald, Amna Batool, Diana Freed, Oliver L. Haimson, Jevan A. Hutson, Elissa M. Redmiles, Zahra Stardust, Miranda Wei, Douglas Zytko
    Companion Publication of the 2025 Conference on Computer-Supported Cooperative Work and Social Computing, CSCW Companion 2025, Bergen, Norway, October 18-22, 2025  — 2025
    Details
  13. Analyzing the AI Nudification Application Ecosystem
    Cassidy Gibson, Daniel Olszewski, Natalie Grace Brigham, Anna Crowder, Kevin R. B. Butler, Patrick Traynor, Elissa M. Redmiles, Tadayoshi Kohno
    34th USENIX Security Symposium, USENIX Security 2025, Seattle, WA, USA, August 13-15, 2025  — 2025
    Details

2024

  1. Spotlight: CCS Artifact (Version 1)
    Ben Weintraub, Jiwon Kim, Ran Tao, Cristina Nita-Rotaru, Hamed Okhravi, Dave (Jing) Tian, Benjamin E. Ujcich
     — 2024
    Details
  2. "Modern problems require modern solutions": Community-Developed Techniques for Online Exam Proctoring Evasion
    Lucy Simko, Adryana Hutchinson, Alvin Isaac, Evan Fries, Micah Sherr, Adam J. Aviv
    Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024  — 2024
    Details
  3. On Precisely Detecting Censorship Circumvention in Real-World Networks
    Ryan Wails, George Arnold Sullivan, Micah Sherr, Rob Jansen
    31st Annual Network and Distributed System Security Symposium, NDSS 2024, San Diego, California, USA, February 26 - March 1, 2024  — 2024
    Details
  4. You Can Find Me Here: A Study of the Early Adoption of Geofeeds
    Rahel A. Fainchtein, Micah Sherr
    Passive and Active Measurement - 25th International Conference, PAM 2024, Virtual Event, March 11-13, 2024, Proceedings, Part II  — 2024
    Details
  5. "I can say I’m John Travolta...but I’m not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified Accounts
    Carson Powers, Nickolas Gravel, Christopher Pellegrini, Micah Sherr, Michelle L. Mazurek, Daniel Votipka
    Twentieth Symposium on Usable Privacy and Security, SOUPS 2024, Philadelphia, PA, USA, August 11-13, 2024  — 2024
    Details
  6. NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge
    Patrick Tser Jern Kon, Aniket Gattani, Dhiraj Saharia, Tianyu Cao, Diogo Barradas, Ang Chen, Micah Sherr, Benjamin E. Ujcich
    IEEE Symposium on Security and Privacy, SP 2024, San Francisco, CA, USA, May 19-23, 2024  — 2024
    Details
  7. SpotProxy: Rediscovering the Cloud for Censorship Circumvention
    Patrick Tser Jern Kon, Sina Kamali, Jinyu Pei, Diogo Barradas, Ang Chen, Micah Sherr, Moti Yung
    33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024  — 2024
    Details
  8. SCIF: Privacy-Preserving Statistics Collection with Input Validation and Full Security
    Jianan Su, Laasya Bangalore, Harel Berger, Jason Yi, Alivia Castor, Micah Sherr, Muthuramakrishnan Venkitasubramaniam
    IACR Cryptol. ePrint Arch.  — 2024
    Details
  9. Security Challenges of Intent-Based Networking
    Jiwon Kim, Hamed Okhravi, Dave (Jing) Tian, Benjamin E. Ujcich
    Commun. ACM  — 2024
    Details
  10. Provenance-Enabled Explainable AI
    Jiachi Zhang, Wenchao Zhou, Benjamin E. Ujcich
    Proc. ACM Manag. Data  — 2024
    Details
  11. Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based Networking
    Ben Weintraub, Jiwon Kim, Ran Tao, Cristina Nita-Rotaru, Hamed Okhravi, Dave (Jing) Tian, Benjamin E. Ujcich
    Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024  — 2024
    Details
  12. Launching the Society for Privacy and Confidentiality Research to Own the Journal of Privacy and Confidentiality
    John M. Abowd, Cynthia Dwork, Alan F. Karr, Kobbi Nissim, Jerome P. Reiter, Aleksandra B. Slavkovic, Lars Vilhuber
    J. Priv. Confidentiality  — 2024
    Details
  13. Credit Attribution and Stable Compression
    Roi Livni, Shay Moran, Kobbi Nissim, Chirag Pabbaraju
    Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, NeurIPS 2024, Vancouver, BC, Canada, December 10 - 15, 2024  — 2024
    Details
  14. From Isolation to Identification
    Giuseppe D’Acquisto, Aloni Cohen, Maurizio Naldi, Kobbi Nissim
    Privacy in Statistical Databases - International Conference, PSD 2024, Antibes Juan-les-Pins, France, September 25-27, 2024, Proceedings  — 2024
    Details
  15. Friction Matters: Balancing the Pursuit of Perfect Protection With Target Hardening
    Elissa M. Redmiles
    IEEE Secur. Priv.  — 2024
    Details
  16. Safer Digital Intimacy for Sex Workers and Beyond: A Technical Research Agenda
    Vaughn Hamilton, Gabriel Kaptchuk, Allison McDonald, Elissa M. Redmiles
    IEEE Secur. Priv.  — 2024
    Details
  17. Safer Algorithmically-Mediated Offline Introductions: Harms and Protective Behaviors
    Veronica A. Rivera, Daricia Wilkinson, Aurelia Augusta, Sophie Li, Elissa M. Redmiles, Angelika Strohmayer
    Proc. ACM Hum. Comput. Interact.  — 2024
    Details
  18. "I Had Sort of a Sense that I Was Always Being Watched...Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing Applications
    Kevin Childs, Cassidy Gibson, Anna Crowder, Kevin Warren, Carson Stillman, Elissa M. Redmiles, Eakta Jain, Patrick Traynor, Kevin R. B. Butler
    Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024  — 2024
    Details
  19. Analyzing User Engagement with TikTok’s Short Format Video Recommendations using Data Donations
    Savvas Zannettou, Olivia Nemes Nemeth, Oshrat Ayalon, Angelica Goetzen, Krishna P. Gummadi, Elissa M. Redmiles, Franziska Roesner
    Proceedings of the CHI Conference on Human Factors in Computing Systems, CHI 2024, Honolulu, HI, USA, May 11-16, 2024  — 2024
    Details
  20. It’s Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based Bias
    Jaron Mink, Miranda Wei, Collins W. Munyendo, Kurt Hugenberg, Tadayoshi Kohno, Elissa M. Redmiles, Gang Wang
    Proceedings of the CHI Conference on Human Factors in Computing Systems, CHI 2024, Honolulu, HI, USA, May 11-16, 2024  — 2024
    Details
  21. How We Browse: Measurement and Analysis of Browsing Behavior
    Yuliia Lut, Michael Wang, Elissa M. Redmiles, Rachel Cummings
    6th IEEE International Conference on Cognitive Machine Intelligence, CogMI 2024, Washington, DC, USA, October 28-31, 2024  — 2024
    Details
  22. "Violation of my body: " Perceptions of AI-generated non-consensual (intimate) imagery
    Natalie Grace Brigham, Miranda Wei, Tadayoshi Kohno, Elissa M. Redmiles
    Twentieth Symposium on Usable Privacy and Security, SOUPS 2024, Philadelphia, PA, USA, August 11-13, 2024  — 2024
    Details
  23. "I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators
    Lea Gröber, Waleed Arshad, Shanza, Angelica Goetzen, Elissa M. Redmiles, Maryam Mustafa, Katharina Krombholz
    33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024  — 2024
    Details
  24. "Did They F***ing Consent to That?": Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse
    Lucy Qin, Vaughn Hamilton, Sharon Wang, Yigit Aydinalp, Marin Scarlett, Elissa M. Redmiles
    33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024  — 2024
    Details
  25. "I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans Creators
    Ananta Soneji, Vaughn Hamilton, Adam Doupé, Allison McDonald, Elissa M. Redmiles
    33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024  — 2024
    Details
  26. SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors
    Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner
    33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024  — 2024
    Details
  27. Repositioning Real-World Website Fingerprinting on Tor
    Rob Jansen, Ryan Wails, Aaron Johnson
    Proceedings of the 23rd Workshop on Privacy in the Electronic Society, WPES 2024, Salt Lake City, UT, USA, October 14-18, 2024  — 2024
    Details
  28. Bugs in our pockets: the risks of client-side scanning
    Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso
    J. Cybersecur.  — 2024
    Details

2023

  1. Cadence: A Simulator for Human Movement-based Communication Protocols
    Harel Berger, Micah Sherr, Adam J. Aviv
    2023 Cyber Security Experimentation and Test Workshop, CSET 2023, Marina del Rey, CA, USA, August 7-8, 2023  — 2023
    Details
  2. Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring
    David G. Balash, Elena Korkes, Miles Grant, Adam J. Aviv, Rahel A. Fainchtein, Micah Sherr
    32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023  — 2023
    Details
  3. Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance
    Jiwon Kim, Benjamin E. Ujcich, Dave Tian
    32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023  — 2023
    Details
  4. We Need to Focus on How Our Data Is Used, Not Just How It Is Shared
    Katrina Ligett, Kobbi Nissim
    Commun. ACM  — 2023
    Details
  5. Doquet: Differentially Oblivious Range and Join Queries with Private Data Structures
    Lina Qiu, Georgios Kellaris, Nikos Mamoulis, Kobbi Nissim, George Kollios
    Proc. VLDB Endow.  — 2023
    Details
  6. Black-Box Differential Privacy for Interactive ML
    Haim Kaplan, Yishay Mansour, Shay Moran, Kobbi Nissim, Uri Stemmer
    Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023  — 2023
    Details
  7. Private Everlasting Prediction
    Moni Naor, Kobbi Nissim, Uri Stemmer, Chao Yan
    Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023  — 2023
    Details
  8. Adaptive Data Analysis in a Balanced Adversarial Model
    Kobbi Nissim, Uri Stemmer, Eliad Tsfadia
    Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023  — 2023
    Details
  9. Power in Computer Security and Privacy: A Critical Lens
    Elissa M. Redmiles, Mia M. Bennett, Tadayoshi Kohno
    IEEE Secur. Priv.  — 2023
    Details
  10. "I need a better description": An Investigation Into User Expectations For Differential Privacy
    Rachel Cummings, Gabriel Kaptchuk, Elissa M. Redmiles
    J. Priv. Confidentiality  — 2023
    Details
  11. "Nudes? Shouldn’t I charge for these?": Motivations of New Sexual Content Creators on OnlyFans
    Vaughn Hamilton, Ananta Soneji, Allison McDonald, Elissa M. Redmiles
    Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023  — 2023
    Details
  12. Exploring Privacy and Incentives Considerations in Adoption of COVID-19 Contact Tracing Apps
    Oshrat Ayalon, Dana Turjeman, Elissa M. Redmiles
    32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023  — 2023
    Details
  13. What Are the Chances? Explaining the Epsilon Parameter in Differential Privacy
    Priyanka Nanayakkara, Mary Anne Smart, Rachel Cummings, Gabriel Kaptchuk, Elissa M. Redmiles
    32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023  — 2023
    Details
  14. Problematic Advertising and its Disparate Exposure on Facebook
    Muhammad Ali, Angelica Goetzen, Alan Mislove, Elissa M. Redmiles, Piotr Sapiezynski
    32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023  — 2023
    Details
  15. Data-Explainable Website Fingerprinting with Network Simulation
    Rob Jansen, Ryan Wails
    Proc. Priv. Enhancing Technol.  — 2023
    Details

2022

  1. Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs
    Ryan Wails, Andrew Stange, Eliana Troper, Aylin Caliskan, Roger Dingledine, Rob Jansen, Micah Sherr
    Proc. Priv. Enhancing Technol.  — 2022
    Details
  2. Accountable Private Set Cardinality for Distributed Measurement
    Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr
    ACM Trans. Priv. Secur.  — 2022
    Details
  3. User Perceptions of the Privacy and Usability of Smart DNS
    Rahel A. Fainchtein, Adam J. Aviv, Micah Sherr
    Annual Computer Security Applications Conference, ACSAC 2022, Austin, TX, USA, December 5-9, 2022  — 2022
    Details
  4. The Sample Complexity of Distribution-Free Parity Learning in the Robust Shuffle Model
    Kobbi Nissim, Chao Yan
    J. Priv. Confidentiality  — 2022
    Details
  5. Dynamic algorithms against an adaptive adversary: generic constructions and lower bounds
    Amos Beimel, Haim Kaplan, Yishay Mansour, Kobbi Nissim, Thatchaphol Saranurak, Uri Stemmer
    STOC ’22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20 - 24, 2022  — 2022
    Details
  6. Introduction to the Special Issue on Security and Privacy for COVID-19
    Gabriel Kaptchuk, Fabio Massacci, Sara Nieves Matheu-Garcı́a, Elissa M. Redmiles
    DTRAP  — 2022
    Details
  7. How Good is Good Enough? Quantifying the Impact of Benefits, Accuracy, and Privacy on Willingness to Adopt COVID-19 Decision Aids
    Gabriel Kaptchuk, Daniel G. Goldstein, Eszter Hargittai, Jake M. Hofman, Elissa M. Redmiles
    DTRAP  — 2022
    Details
  8. Not Only for Contact Tracing: Use of Belgium’s Contact Tracing App among Young Adults
    Oshrat Ayalon, Sophie Li, Bart Preneel, Elissa M. Redmiles
    Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.  — 2022
    Details
  9. Ethics and Efficacy of Unsolicited Anti-Trafficking SMS Outreach
    Rasika Bhalerao, Nora McDonald, Hanna Barakat, Vaughn Hamilton, Damon McCoy, Elissa M. Redmiles
    Proc. ACM Hum. Comput. Interact.  — 2022
    Details
  10. Risk, Resilience and Reward: Impacts of Shifting to Digital Sex Work
    Vaughn Hamilton, Hanna Barakat, Elissa M. Redmiles
    Proc. ACM Hum. Comput. Interact.  — 2022
    Details
  11. Ctrl-Shift: How Privacy Sentiment Changed from 2019 to 2021
    Angelica Goetzen, Samuel Dooley, Elissa M. Redmiles
    Proc. Priv. Enhancing Technol.  — 2022
    Details
  12. Analyzing Biases in Perception of Truth in News Stories and Their Implications for Fact Checking
    Mahmoudreza Babaei, Juhi Kulshrestha, Abhijnan Chakraborty, Elissa M. Redmiles, Meeyoung Cha, Krishna P. Gummadi
    IEEE Trans. Comput. Soc. Syst.  — 2022
    Details
  13. A Large-Scale Measurement of Cybercrime Against Individuals
    Casey F. Breen, Cormac Herley, Elissa M. Redmiles
    CHI ’22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022  — 2022
    Details
  14. Field Evidence of the Effects of Privacy, Data Transparency, and Pro-social Appeals on COVID-19 App Attractiveness
    Samuel Dooley, Dana Turjeman, John P. Dickerson, Elissa M. Redmiles
    CHI ’22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022  — 2022
    Details
  15. COVID-19 Information-Tracking Solutions: A Qualitative Investigation of the Factors Influencing People’s Adoption Intention
    Yue Huang, Borke Obada-Obieh, Elissa M. Redmiles, Satya Lokam, Konstantin Beznosov
    CHIIR ’22: ACM SIGIR Conference on Human Information Interaction and Retrieval, Regensburg, Germany, March 14 - 18, 2022  — 2022
    Details
  16. Dimensions of Diversity in Human Perceptions of Algorithmic Fairness
    Nina Grgic-Hlaca, Gabriel Lima, Adrian Weller, Elissa M. Redmiles
    Equity and Access in Algorithms, Mechanisms, and Optimization, EAAMO 2022, Arlington, VA, USA, October 6-9, 2022  — 2022
    Details
  17. Ethical Practices for Security Research with At-Risk Populations
    Rasika Bhalerao, Vaughn Hamilton, Allison McDonald, Elissa M. Redmiles, Angelika Strohmayer
    IEEE European Symposium on Security and Privacy, EuroS&P 2022 - Workshops, Genoa, Italy, June 6-10, 2022  — 2022
    Details
  18. Community Under Surveillance: Impacts of Marginalization on an Online Labor Forum
    Hanna Barakat, Elissa M. Redmiles
    Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, ICWSM 2022, Atlanta, Georgia, USA, June 6-9, 2022  — 2022
    Details
  19. "Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice
    Christine Geeng, Mike Harris, Elissa M. Redmiles, Franziska Roesner
    31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022  — 2022
    Details
  20. The Need for Respectful Technologies: Going Beyond Privacy
    Elissa M. Redmiles
    Perspectives on Digital Humanism  — 2022
    Details
  21. Co-opting Linux Processes for High-Performance Network Simulation
    Rob Jansen, James Newsome, Ryan Wails
    Proceedings of the 2022 USENIX Annual Technical Conference, USENIX ATC 2022, Carlsbad, CA, USA, July 11-13, 2022  — 2022
    Details

2021

  1. Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services
    Rahel A. Fainchtein, Adam J. Aviv, Micah Sherr, Stephen Ribaudo, Armaan Khullar
    Proc. Priv. Enhancing Technol.  — 2021
    Details
  2. Residue-Free Computing
    Logan Arkema, Micah Sherr
    Proc. Priv. Enhancing Technol.  — 2021
    Details
  3. Examining the Examiners: Students’ Privacy and Security Perceptions of Online Proctoring Services
    David G. Balash, Dongkun Kim, Darikia Shaibekova, Rahel A. Fainchtein, Micah Sherr, Adam J. Aviv
    Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021  — 2021
    Details
  4. Causal Analysis for Software-Defined Networking Attacks
    Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Adam Bates, William H. Sanders, Hamed Okhravi
    30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021  — 2021
    Details
  5. Learning Privately with Labeled and Unlabeled Examples
    Amos Beimel, Kobbi Nissim, Uri Stemmer
    Algorithmica  — 2021
    Details
  6. Algorithmic Stability for Adaptive Data Analysis
    Raef Bassily, Kobbi Nissim, Adam D. Smith, Thomas Steinke, Uri Stemmer, Jonathan R. Ullman
    SIAM J. Comput.  — 2021
    Details
  7. \(ε\)psolute: Efficiently Querying Databases While Providing Differential Privacy
    Dmytro Bogatov, Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O’Neill
    CCS ’21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021  — 2021
    Details
  8. Separating Adaptive Streaming from Oblivious Streaming Using the Bounded Storage Model
    Haim Kaplan, Yishay Mansour, Kobbi Nissim, Uri Stemmer
    Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part III  — 2021
    Details
  9. Privacy: From Database Reconstruction to Legal Theorems
    Kobbi Nissim
    PODS’21: Proceedings of the 40th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, Virtual Event, China, June 20-25, 2021  — 2021
    Details
  10. Foundations for Robust Data Protection: Co-designing Law and Computer Science
    Kobbi Nissim, Alexandra Wood
    3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2021, Atlanta, GA, USA, December 13-15, 2021  — 2021
    Details
  11. Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part I
     — 2021
    Details
  12. Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part II
     — 2021
    Details
  13. Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part III
     — 2021
    Details
  14. User Concerns 8 Tradeoffs in Technology-facilitated COVID-19 Response
    Elissa M. Redmiles
    Digit. Gov. Res. Pract.  — 2021
    Details
  15. Characterizing the Online Learning Landscape: What and How People Learn Online
    Sean Kross, Eszter Hargittai, Elissa M. Redmiles
    Proc. ACM Hum. Comput. Interact.  — 2021
    Details
  16. "I need a better description": An Investigation Into User Expectations For Differential Privacy
    Rachel Cummings, Gabriel Kaptchuk, Elissa M. Redmiles
    CCS ’21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021  — 2021
    Details
  17. An Inside Look into the Practice of Malware Analysis
    Miuyin Yong Wong, Matthew Landen, Manos Antonakakis, Douglas M. Blough, Elissa M. Redmiles, Mustaque Ahamad
    CCS ’21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021  — 2021
    Details
  18. "Disadvantaged in the American-dominated Internet": Sex, Work, and Technology
    Catherine Barwulor, Allison McDonald, Eszter Hargittai, Elissa M. Redmiles
    CHI ’21: CHI Conference on Human Factors in Computing Systems, Virtual Event / Yokohama, Japan, May 8-13, 2021  — 2021
    Details
  19. AMP: authentication of media via provenance
    Paul England, Henrique S. Malvar, Eric Horvitz, Jack W. Stokes, Cédric Fournet, Rebecca Burke-Aguero, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, John Deutscher, Shabnam Erfani, Matt Gaylor, Andrew Jenks, Kevin Kane, Elissa M. Redmiles, Alex Shamis, Isha Sharma, John C. Simmons, Sam Wenker, Anika Zaman
    MMSys ’21: 12th ACM Multimedia Systems Conference, Istanbul, Turkey, 28 September 2021 - 1 October 2021  — 2021
    Details
  20. Designing Media Provenance Indicators to Combat Fake Media
    Imani N. Sherman, Jack W. Stokes, Elissa M. Redmiles
    RAID ’21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021  — 2021
    Details
  21. Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns
    Maximilian Golla, Grant Ho, Marika Lohmus, Monica Pulluri, Elissa M. Redmiles
    30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021  — 2021
    Details
  22. "It’s stressful having all these phones": Investigating Sex Workers’ Safety Goals, Risks, and Practices Online
    Allison McDonald, Catherine Barwulor, Michelle L. Mazurek, Florian Schaub, Elissa M. Redmiles
    30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021  — 2021
    Details
  23. From Secure to Military-Grade: Exploring the Effect of App Descriptions on User Perceptions of Secure Messaging
    Omer Akgul, Ruba Abu-Salma, Wei Bai, Elissa M. Redmiles, Michelle L. Mazurek, Blase Ur
    WPES ’21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, Virtual Event, Korea, 15 November 2021  — 2021
    Details

2020

  1. Bypassing Tor Exit Blocking with Exit Bridge Onion Services
    Zhao Zhang, Wenchao Zhou, Micah Sherr
    CCS ’20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020  — 2020
    Details
  2. Ephemeral Exit Bridges for Tor
    Zhao Zhang, Tavish Vaidya, Kartik Subramanian, Wenchao Zhou, Micah Sherr
    50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2020, Valencia, Spain, June 29 - July 2, 2020  — 2020
    Details
  3. Securing the software-defined networking control plane by using control and data dependency techniques
    Benjamin E. Ujcich
     — 2020
    Details
  4. Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking
    Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Steven R. Gomez, Adam Bates, William H. Sanders, Hamed Okhravi
    27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020  — 2020
    Details
  5. Provenance for Intent-Based Networking
    Benjamin E. Ujcich, Adam Bates, William H. Sanders
    6th IEEE Conference on Network Softwarization, NetSoft 2020, Ghent, Belgium, June 29 - July 3, 2020  — 2020
    Details
  6. Practical Locally Private Heavy Hitters
    Raef Bassily, Kobbi Nissim, Uri Stemmer, Abhradeep Thakurta
    J. Mach. Learn. Res.  — 2020
    Details
  7. Linear Program Reconstruction in Practice
    Aloni Cohen, Kobbi Nissim
    J. Priv. Confidentiality  — 2020
    Details
  8. On Privacy in the Age of COVID-19
    Cynthia Dwork, Alan F. Karr, Kobbi Nissim, Lars Vilhuber
    J. Priv. Confidentiality  — 2020
    Details
  9. Towards formalizing the GDPR’s notion of singling out
    Aloni Cohen, Kobbi Nissim
    Proc. Natl. Acad. Sci. USA  — 2020
    Details
  10. Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols
    Iftach Haitner, Kobbi Nissim, Eran Omri, Ronen Shaltiel, Jad Silbak
    SIAM J. Comput.  — 2020
    Details
  11. Private Summation in the Multi-Message Shuffle Model
    Borja Balle, James Bell, Adrià Gascón, Kobbi Nissim
    CCS ’20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020  — 2020
    Details
  12. The Complexity of Verifying Loop-Free Programs as Differentially Private
    Marco Gaboardi, Kobbi Nissim, David Purser
    47th International Colloquium on Automata, Languages, and Programming, ICALP 2020, Saarbrücken, Germany (Virtual Conference), July 8-11, 2020  — 2020
    Details
  13. The Power of Synergy in Differential Privacy: Combining a Small Curator with Local Randomizers
    Amos Beimel, Aleksandra Korolova, Kobbi Nissim, Or Sheffet, Uri Stemmer
    1st Conference on Information-Theoretic Cryptography, ITC 2020, Boston, MA, USA, June 17-19, 2020  — 2020
    Details
  14. On the Round Complexity of the Shuffle Model
    Amos Beimel, Iftach Haitner, Kobbi Nissim, Uri Stemmer
    Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part II  — 2020
    Details
  15. On the Round Complexity of the Shuffle Model
    Amos Beimel, Iftach Haitner, Kobbi Nissim, Uri Stemmer
    IACR Cryptol. ePrint Arch.  — 2020
    Details
  16. Americans’ willingness to adopt a COVID-19 tracking app The role of app distributor
    Eszter Hargittai, Elissa M. Redmiles, Jessica Vitak, Michael Zimmer
    First Monday  — 2020
    Details
  17. Get Paid to Program: Evaluating an Employment-Aware After-School Program for High School Women of Color
    Dana McFarlane, Elissa M. Redmiles
    Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education, ITiCSE 2020, Trondheim, Norway, June 15-19, 2020  — 2020
    Details
  18. A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web
    Elissa M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, Michelle L. Mazurek
    29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020  — 2020
    Details
  19. CLAPS: Client-Location-Aware Path Selection in Tor
    Florentin Rochet, Ryan Wails, Aaron Johnson, Prateek Mittal, Olivier Pereira
    CCS ’20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020  — 2020
    Details

2019

  1. KIST: Kernel-Informed Socket Transport for Tor
    Rob Jansen, Matthew Traudt, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson
    ACM Trans. Priv. Secur.  — 2019
    Details
  2. Whisper: a unilateral defense against VoIP traffic re-identification attacks
    Tavish Vaidya, Timothy Walsh, Micah Sherr
    Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, PR, USA, December 09-13, 2019  — 2019
    Details
  3. Does Being Verified Make You More Credible?: Account Verification’s Effect on Tweet Credibility
    Tavish Vaidya, Daniel Votipka, Michelle L. Mazurek, Micah Sherr
    Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI 2019, Glasgow, Scotland, UK, May 04-09, 2019  — 2019
    Details
  4. You Talk Too Much: Limiting Privacy Exposure Via Voice Input
    Tavish Vaidya, Micah Sherr
    2019 IEEE Security and Privacy Workshops, SP Workshops 2019, San Francisco, CA, USA, May 19-23, 2019  — 2019
    Details
  5. Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor
    Rob Jansen, Tavish Vaidya, Micah Sherr
    28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019  — 2019
    Details
  6. Data Protection Intents for Software-Defined Networking
    Benjamin E. Ujcich, William H. Sanders
    5th IEEE Conference on Network Softwarization, NetSoft 2019, Paris, France, June 24-28, 2019  — 2019
    Details
  7. Simultaneous Private Learning of Multiple Concepts
    Mark Bun, Kobbi Nissim, Uri Stemmer
    J. Mach. Learn. Res.  — 2019
    Details
  8. Characterizing the Sample Complexity of Pure Private Learners
    Amos Beimel, Kobbi Nissim, Uri Stemmer
    J. Mach. Learn. Res.  — 2019
    Details
  9. Concentration Bounds for High Sensitivity Functions Through Differential Privacy
    Uri Stemmer, Kobbi Nissim
    J. Priv. Confidentiality  — 2019
    Details
  10. Exploring Differential Obliviousness
    Amos Beimel, Kobbi Nissim, Mohammad Zaheri
    Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2019, Massachusetts Institute of Technology, Cambridge, MA, USA, September 20-22, 2019  — 2019
    Details
  11. Private Center Points and Learning of Halfspaces
    Amos Beimel, Shay Moran, Kobbi Nissim, Uri Stemmer
    Conference on Learning Theory, COLT 2019, 25-28 June 2019, Phoenix, AZ, USA  — 2019
    Details
  12. The Privacy Blanket of the Shuffle Model
    Borja Balle, James Bell, Adrià Gascón, Kobbi Nissim
    Advances in Cryptology - CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part II  — 2019
    Details
  13. Surveillance and privacy in the public and private sectors: panel
    Stefan Savage, Ian Levy, Kobbi Nissim, Paul Ohm, Carmela Troncoso, Nicole Wong
    Symposium on Computer Science and Law, CSLAW 2019, New York, NY, USA, October 28-29, 2019  — 2019
    Details
  14. Quality and Inequity in Digital Security Education
    Elissa M. Redmiles
     — 2019
    Details
  15. Applied Digital Threat Modeling: It Works
    Rock Stevens, Daniel Votipka, Elissa M. Redmiles, Colin Ahern, Michelle L. Mazurek
    IEEE Secur. Priv.  — 2019
    Details
  16. New Phone, Who Dis? Modeling Millennials’ Backup Behavior
    Elissa M. Redmiles, Eszter Hargittai
    ACM Trans. Web  — 2019
    Details
  17. Comparing and Developing Tools to Measure the Readability of Domain-Specific Texts
    Elissa M. Redmiles, Lisa N. Maszkiewicz, Emily Hwang, Dhruv Kuchhal, Everest Liu, Miraida Morales, Denis Peskov, Sudha Rao, Rock Stevens, Kristina Gligoric, Sean Kross, Michelle L. Mazurek, Hal Daumé III
    Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, EMNLP-IJCNLP 2019, Hong Kong, China, November 3-7, 2019  — 2019
    Details
  18. Analyzing Biases in Perception of Truth in News Stories and Their Implications for Fact Checking
    Mahmoudreza Babaei, Abhijnan Chakraborty, Juhi Kulshrestha, Elissa M. Redmiles, Meeyoung Cha, Krishna P. Gummadi
    Proceedings of the Conference on Fairness, Accountability, and Transparency, FAT* 2019, Atlanta, GA, USA, January 29-31, 2019  — 2019
    Details
  19. On Microtargeting Socially Divisive Ads: A Case Study of Russia-Linked Ad Campaigns on Facebook
    Filipe Nunes Ribeiro, Koustuv Saha, Mahmoudreza Babaei, Lucas Henrique C. Lima, Johnnatan Messias, Fabrı́cio Benevenuto, Oana Goga, Krishna P. Gummadi, Elissa M. Redmiles
    Proceedings of the Conference on Fairness, Accountability, and Transparency, FAT* 2019, Atlanta, GA, USA, January 29-31, 2019  — 2019
    Details
  20. "I Just Want to Feel Safe": A Diary Study of Safety Perceptions on Social Media
    Elissa M. Redmiles, Jessica E. Bodford, Lindsay Blackwell
    Proceedings of the Thirteenth International Conference on Web and Social Media, ICWSM 2019, Munich, Germany, June 11-14, 2019  — 2019
    Details
  21. "Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response
    Elissa M. Redmiles
    2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019  — 2019
    Details
  22. How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples
    Elissa M. Redmiles, Sean Kross, Michelle L. Mazurek
    2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019  — 2019
    Details
  23. Auditing Offline Data Brokers via Facebook’s Advertising Platform
    Giridhari Venkatadri, Piotr Sapiezynski, Elissa M. Redmiles, Alan Mislove, Oana Goga, Michelle L. Mazurek, Krishna P. Gummadi
    The World Wide Web Conference, WWW 2019, San Francisco, CA, USA, May 13-17, 2019  — 2019
    Details
  24. Guard Placement Attacks on Path Selection Algorithms for Tor
    Gerry Wan, Aaron Johnson, Ryan Wails, Sameer Wagh, Prateek Mittal
    Proc. Priv. Enhancing Technol.  — 2019
    Details
  25. Stormy: Statistics in Tor by Measuring Securely
    Ryan Wails, Aaron Johnson, Daniel Starin, Arkady Yerukhimovich, S. Dov Gordon
    Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019  — 2019
    Details