Trishita Tiwari

According to our database1, Trishita Tiwari authored at least 11 papers between 2017 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Information Flow Control in Machine Learning through Modular Model Architecture.
Proceedings of the 33rd USENIX Security Symposium, 2024

2022
Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

2021
Guessing Outputs of Dynamically Pruned CNNs Using Memory Access Patterns.
IEEE Comput. Archit. Lett., 2021

2019
Alternative (ab)uses for HTTP Alternative Services.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019

Location Leakage from Network Access Patterns.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Page Cache Attacks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Nothing But Net: Invading Android User Privacy Using Only Network Access Patterns.
CoRR, 2018

Distributed Web Mining of Ethereum.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

Cashing in on the File-System Cache.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
User-profile-based analytics for detecting cloud security breaches.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017


  Loading...