All Publications
2017
- Leakage-Abuse Attacks against Order-Revealing Encryption [PDF]In IEEE Symposium on Security and Privacy (2017)
- Side-Channel Attacks on Shared Search Indexes [PDF]In IEEE Symposium on Security and Privacy (2017)
- Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks [PDF]In Conference on Data and Application Security and Privacy (2017)
- Plausible Deniability for Privacy-Preserving Data Synthesis [PDF]In Proceedings of the Very Large Data Bases Endowment (2017)
2016
- Synthesizing Plausible Privacy-Preserving Location Traces [PDF]In IEEE Symposium on Security and Privacy (2016)
2015
- Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting [PDF]In Research in Attacks, Intrusions, and Defenses (2015)
- Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward [PDF]In ACM SIGSAC Conference on Computer and Communications Security (2015)
- Privacy through Fake yet Semantically Real Traces [PDF]In arXiv preprint (2015)
2014
- A Location-Privacy Threat Stemming from the Use of Shared Public IP Addresses [PDF]In IEEE Transactions on Mobile Computing (2014)
2013
- How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots. [PDF]In Privacy Enhancing Technologies Symposium (2013)