Nikita Borisov

Affiliations:
  • University of Illinois at Urbana-Champaign, IL, USA


According to our database1, Nikita Borisov authored at least 107 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DiProber: Estimating Relays Capacities in Underloaded Anonymous Communication Networks.
Proceedings of the American Control Conference, 2024

2023
ProbFlow : Using Probabilistic Programming in Anonymous Communication Networks.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
MLEFlow: Learning from History to Improve Load Balancing in Tor.
Proc. Priv. Enhancing Technol., 2022

DiProber: Using Dual Probing to Estimate Tor Relay Capacities in Underloaded Networks.
CoRR, 2022

2021
Detecting AI Trojans Using Meta Neural Analysis.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Running Refraction Networking for Real.
Proc. Priv. Enhancing Technol., 2020

Assessing the Privacy Benefits of Domain Name Encryption.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild.
Proceedings of the World Wide Web Conference, 2019

Conjure: Summoning Proxies from Unused Address Space.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

What can you learn from an IP?
Proceedings of the Applied Networking Research Workshop, 2019

2018
Every Move You Make: Exploring Practical Issues in Smartphone Motion Sensor Fingerprinting and Countermeasures.
Proc. Priv. Enhancing Technol., 2018

Differentially Private Data Generative Models.
CoRR, 2018

TightRope: Towards Optimal Load-balancing of Paths in Anonymous Networks.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
SWEET: Serving the Web by Exploiting Email Tunnels.
IEEE/ACM Trans. Netw., 2017

An ISP-Scale Deployment of TapDance.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017

Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Smartphone Fingerprinting Via Motion Sensors: Analyzing Feasiblity at Large-Scale and Studing Real Usage Patterns.
CoRR, 2016

Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing Systems.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

2015
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction.
Proc. Priv. Enhancing Technol., 2015

DP5: A Private Presence Service.
Proc. Priv. Enhancing Technol., 2015

Exploring Ways To Mitigate Sensor-Based Smartphone Fingerprinting.
CoRR, 2015

2014
Non-Blind Watermarking of Network Flows.
IEEE/ACM Trans. Netw., 2014

Fingerprinting Smart Devices Through Embedded Acoustic Components.
CoRR, 2014

The Tangled Web of Password Reuse.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Analyzing an adaptive reputation metric for anonymity systems.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Re<sup>3</sup>: relay reliability reputation for anonymity systems.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
BotMosaic: Collaborative network watermark for the detection of IRC-based botnets.
J. Syst. Softw., 2013

Secloud: A cloud-based comprehensive and lightweight security solution for smartphones.
Comput. Secur., 2013

The Need for Flow Fingerprints to Link Correlated Network Flows.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Pisces: Anonymous Communication Using Social Networks.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Securing Anonymous Communication Channels under the Selective DoS Attack.
Proceedings of the Financial Cryptography and Data Security, 2013

PnP: improving web browsing performance over tor using web resource prefetch-and-push.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems.
ACM Trans. Inf. Syst. Secur., 2012

PIRATTE: Proxy-based Immediate Revocation of ATTribute-based Encryption
CoRR, 2012

IP over Voice-over-IP for censorship circumvention
CoRR, 2012

CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing
CoRR, 2012

BotMosaic: Collaborative Network Watermark for Botnet Detection
CoRR, 2012

Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures
CoRR, 2012

SybilControl: Practical Sybil Defense with Computational Puzzles
CoRR, 2012

Website Detection Using Remote Traffic Analysis.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

DECENT: A decentralized architecture for enforcing privacy in online social networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Octopus: A Secure and Anonymous DHT Lookup.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Cachet: a decentralized architecture for privacy preserving social networking with caching.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012

CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

11th workshop on privacy in the electronic society.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Improving Security and Performance in the Tor Network through Tunable Path Selection.
IEEE Trans. Dependable Secur. Comput., 2011

A Decentralized Architecture for Enforcing Privacy in Online Social Networks
CoRR, 2011

X-Vine: Secure and Pseudonymous Routing Using Social Networks
CoRR, 2011

Securing Tor Tunnels under the Selective-DoS Attack
CoRR, 2011

Stegobot: construction of an unobservable communication network leveraging social behavior
CoRR, 2011

PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval.
Proceedings of the 20th USENIX Security Symposium, 2011

P3CA: Private Anomaly Detection Across ISP Networks.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

SWIRL: A Scalable Watermark to Detect Correlated Network Flows.
Proceedings of the Network and Distributed System Security Symposium, 2011

Stegobot: A Covert Social Network Botnet.
Proceedings of the Information Hiding - 13th International Conference, 2011

CoCo: Coding-Based Covert Timing Channels for Network Flows.
Proceedings of the Information Hiding - 13th International Conference, 2011

Towards improving network flow watermarks using the repeat-accumulate codes.
Proceedings of the IEEE International Conference on Acoustics, 2011

Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Confidentiality-preserving proof theories for distributed proof systems.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

EASiER: encryption-based access control in social networks with efficient revocation.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Cirripede: circumvention infrastructure using router redirection with plausible deniability.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach.
KSII Trans. Internet Inf. Syst., 2010

BotGrep: Finding P2P Bots with Structured Graph Analysis.
Proceedings of the 19th USENIX Security Symposium, 2010

Scalable Anonymous Communication with Provable Security.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks.
Proceedings of IEEE International Conference on Communications, 2010

In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Protecting location privacy against inference attacks.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Fingerprinting websites using remote traffic analysis.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
flyByNight: mitigating the privacy risks of social networking.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Safety in discretionary access control for logic-based publish-subscribe systems.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows.
Proceedings of the Network and Distributed System Security Symposium, 2009

EigenSpeed: secure peer-to-peer bandwidth evaluation.
Proceedings of the 8th international conference on Peer-to-peer systems, 2009

Attacking and Repairing the Improved ModOnions Protocol.
Proceedings of the Information, Security and Cryptology, 2009

Multi-flow attack resistant watermarks for network flows.
Proceedings of the IEEE International Conference on Acoustics, 2009

ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Confidentiality-preserving distributed proofs of conjunctive queries.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Secure aggregation in a publish-subscribe system.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Multi-flow Attacks Against Network Flow Watermarking Schemes.
Proceedings of the 17th USENIX Security Symposium, 2008

High-Speed Matching of Vulnerability Signatures.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

A Tune-up for Tor: Improving Security and Performance in the Tor Network.
Proceedings of the Network and Distributed System Security Symposium, 2008

Deleting index entries from compliance storage.
Proceedings of the EDBT 2008, 2008

Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Single-bit re-encryption with applications to distributed proof systems.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Generic Application-Level Protocol Analyzer and its Language.
Proceedings of the Network and Distributed System Security Symposium, 2007

Improving multi-tier security using redundant authentication.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

Denial of service or denial of security?
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
A privacy-preserving interdomain audit framework.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

Outsourcing Security Analysis with Anonymized Logs.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Breaking the Collusion Detection Mechanism of MorphMix.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Computational Puzzles as Sybil Defenses.
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2006

2005
Fixing Races for Fun and Profit: How to Abuse atime.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

An Analysis of Parallel Mixing with Attacker-Controlled Inputs.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Privacy-Preserving Friends Troubleshooting Network.
Proceedings of the Network and Distributed System Security Symposium, 2005

2004
Challenges in Wireless Security.
Proceedings of the Mobile Computing Handbook., 2004

Off-the-record communication, or, why not to use PGP.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

2002
Ninja: A Framework for Network Services.
Proceedings of the General Track: 2002 USENIX Annual Technical Conference, 2002

Active Certificates: A Framework for Delegation.
Proceedings of the Network and Distributed System Security Symposium, 2002

Multiplicative Differentials.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

2001
The Ninja architecture for robust Internet-scale systems and services.
Comput. Networks, 2001

Intercepting mobile communications: the insecurity of 802.11.
Proceedings of the MOBICOM 2001, 2001


  Loading...