What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Nikita Borisov
Google Scholar
ORCID:
0009-0002-8851-0138
55
publications in security and cryptology related venues
Year
Venue
Title
2023
conf/ndss
ProbFlow : Using Probabilistic Programming in Anonymous Communication Networks.
Hussein Darir
Geir E. Dullerud
Nikita Borisov
2022
journals/popets
MLEFlow: Learning from History to Improve Load Balancing in Tor.
Hussein Darir
Hussein Sibai
Chin-Yu Cheng
Nikita Borisov
Geir E. Dullerud
Sayan Mitra
2021
conf/sp
Detecting AI Trojans Using Meta Neural Analysis.
Xiaojun Xu
Qi Wang
Huichen Li
Nikita Borisov
Carl A. Gunter
Bo Li
2020
journals/popets
Running Refraction Networking for Real.
Benjamin VanderSloot
Sergey Frolov
Jack Wampler
Sze Chuen Tan
Irv Simpson
Michalis Kallitsis
J. Alex Halderman
Nikita Borisov
Eric Wustrow
2020
conf/ccs
Assessing the Privacy Benefits of Domain Name Encryption.
Nguyen Phong Hoang
Arian Akhavan Niaki
Nikita Borisov
Phillipa Gill
Michalis Polychronakis
2019
conf/ccs
Conjure: Summoning Proxies from Unused Address Space.
Sergey Frolov
Jack Wampler
Sze Chuen Tan
J. Alex Halderman
Nikita Borisov
Eric Wustrow
2018
journals/popets
Every Move You Make: Exploring Practical Issues in Smartphone Motion Sensor Fingerprinting and Countermeasures.
Anupam Das
Nikita Borisov
Edward Chou
2018
conf/ccs
The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors.
Anupam Das
Gunes Acar
Nikita Borisov
Amogh Pradeep
2018
conf/ccs
Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations.
Karan Ganju
Qi Wang
Wei Yang
Carl A. Gunter
Nikita Borisov
2017
conf/uss
An ISP-Scale Deployment of TapDance.
Sergey Frolov
Frederick Douglas
Will Scott
Allison McDonald
Benjamin VanderSloot
Rod Hynes
Adam Kruger
Michalis Kallitsis
David G. Robinson
Steve Schultze
Nikita Borisov
J. Alex Halderman
Eric Wustrow
2017
conf/fc
SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts.
Abhiram Kothapalli
Andrew Miller
Nikita Borisov
2016
conf/ndss
Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.
Anupam Das
Nikita Borisov
Matthew Caesar
2015
journals/popets
DP5: A Private Presence Service.
Nikita Borisov
George Danezis
Ian Goldberg
2015
journals/popets
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction.
Joshua Juen
Aaron Johnson
Anupam Das
Nikita Borisov
Matthew Caesar
2014
conf/ccs
Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components.
Anupam Das
Nikita Borisov
Matthew Caesar
2014
conf/ccs
Re<sup>3</sup>: relay reliability reputation for anonymity systems.
Anupam Das
Nikita Borisov
Prateek Mittal
Matthew Caesar
2014
conf/ndss
The Tangled Web of Password Reuse.
Anupam Das
Joseph Bonneau
Matthew Caesar
Nikita Borisov
XiaoFeng Wang
2013
journals/compsec
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones.
Saman A. Zonouz
Amir Houmansadr
Robin Berthier
Nikita Borisov
William H. Sanders
2013
conf/ccs
PnP: improving web browsing performance over tor using web resource prefetch-and-push.
Giang T. K. Nguyen
Xun Gong
Anupam Das
Nikita Borisov
2013
conf/fc
Securing Anonymous Communication Channels under the Selective DoS Attack.
Anupam Das
Nikita Borisov
2013
conf/ndss
Pisces: Anonymous Communication Using Social Networks.
Prateek Mittal
Matthew K. Wright
Nikita Borisov
2013
conf/ndss
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.
Amir Houmansadr
Thomas J. Riedl
Nikita Borisov
Andrew C. Singer
2013
conf/ndss
rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation.
Qiyan Wang
Zi Lin
Nikita Borisov
Nicholas Hopper
2012
conf/ccs
11th workshop on privacy in the electronic society.
Nikita Borisov
2012
conf/ccs
CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing.
Qiyan Wang
Xun Gong
Giang T. K. Nguyen
Amir Houmansadr
Nikita Borisov
2012
conf/ndss
X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks.
Prateek Mittal
Matthew Caesar
Nikita Borisov
2011
conf/ccs
Confidentiality-preserving proof theories for distributed proof systems.
Kazuhiro Minami
Nikita Borisov
Marianne Winslett
Adam J. Lee
2011
conf/ccs
Cirripede: circumvention infrastructure using router redirection with plausible deniability.
Amir Houmansadr
Giang T. K. Nguyen
Matthew Caesar
Nikita Borisov
2011
conf/ccs
EASiER: encryption-based access control in social networks with efficient revocation.
Sonia Jahid
Prateek Mittal
Nikita Borisov
2011
conf/ccs
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting.
Prateek Mittal
Ahmed Khurshid
Joshua Juen
Matthew Caesar
Nikita Borisov
2011
conf/uss
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval.
Prateek Mittal
Femi G. Olumofin
Carmela Troncoso
Nikita Borisov
Ian Goldberg
2011
conf/ih
CoCo: Coding-Based Covert Timing Channels for Network Flows.
Amir Houmansadr
Nikita Borisov
2011
conf/ih
Stegobot: A Covert Social Network Botnet.
Shishir Nagaraja
Amir Houmansadr
Pratch Piyawongwisal
Vijit Singh
Pragya Agarwal
Nikita Borisov
2011
conf/ndss
SWIRL: A Scalable Watermark to Detect Correlated Network Flows.
Amir Houmansadr
Nikita Borisov
2010
conf/ccs
Protecting location privacy against inference attacks.
Kazuhiro Minami
Nikita Borisov
2010
conf/ccs
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems.
Qiyan Wang
Prateek Mittal
Nikita Borisov
2010
conf/ccs
Fingerprinting websites using remote traffic analysis.
Xun Gong
Negar Kiyavash
Nikita Borisov
2010
conf/uss
BotGrep: Finding P2P Bots with Structured Graph Analysis.
Shishir Nagaraja
Prateek Mittal
Chi-Yao Hong
Matthew Caesar
Nikita Borisov
2010
conf/uss
Scalable Anonymous Communication with Provable Security.
Prateek Mittal
Nikita Borisov
Carmela Troncoso
Alfredo Rial
2009
conf/ccs
Confidentiality-preserving distributed proofs of conjunctive queries.
Adam J. Lee
Kazuhiro Minami
Nikita Borisov
2009
conf/ccs
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies.
Prateek Mittal
Nikita Borisov
2009
conf/icisc
Attacking and Repairing the Improved ModOnions Protocol.
Nikita Borisov
Marek Klonowski
Miroslaw Kutylowski
Anna Lauks-Dutka
2009
conf/soups
flyByNight: mitigating the privacy risks of social networking.
Matthew M. Lucas
Nikita Borisov
2009
conf/ndss
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows.
Amir Houmansadr
Negar Kiyavash
Nikita Borisov
2008
conf/ccs
Information leaks in structured peer-to-peer anonymous communication systems.
Prateek Mittal
Nikita Borisov
2008
conf/uss
Multi-flow Attacks Against Network Flow Watermarking Schemes.
Negar Kiyavash
Amir Houmansadr
Nikita Borisov
2008
conf/acns
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance.
Nikita Borisov
Soumyadeb Mitra
2008
conf/ndss
A Tune-up for Tor: Improving Security and Performance in the Tor Network.
Robin Snader
Nikita Borisov
2007
conf/ccs
Denial of service or denial of security?
Nikita Borisov
George Danezis
Prateek Mittal
Parisa Tabriz
2007
conf/ccs
Improving multi-tier security using redundant authentication.
Jodie P. Boyer
Ragib Hasan
Lars E. Olson
Nikita Borisov
Carl A. Gunter
David Raila
2007
conf/ndss
Generic Application-Level Protocol Analyzer and its Language.
Nikita Borisov
David Brumley
Helen J. Wang
John Dunagan
Pallavi Joshi
Chuanxiong Guo
2005
conf/uss
Fixing Races for Fun and Profit: How to Abuse atime.
Nikita Borisov
Robert Johnson
2005
conf/ndss
Privacy-Preserving Friends Troubleshooting Network.
Qiang Huang
Helen J. Wang
Nikita Borisov
2002
conf/fse
Multiplicative Differentials.
Nikita Borisov
Monica Chew
Robert Johnson
David A. Wagner
2002
conf/ndss
Active Certificates: A Framework for Delegation.
Nikita Borisov
Eric A. Brewer
Coauthors
Aaron Johnson
(1)
Abhiram Kothapalli
(1)
Adam J. Lee
(2)
Adam Kruger
(1)
Ahmed Khurshid
(1)
Alfredo Rial
(1)
Allison McDonald
(1)
Amir Houmansadr
(9)
Amogh Pradeep
(1)
Andrew C. Singer
(1)
Andrew Miller
(1)
Anna Lauks-Dutka
(1)
Anupam Das
(9)
Arian Akhavan Niaki
(1)
Benjamin VanderSloot
(2)
Bo Li
(1)
Carl A. Gunter
(3)
Carmela Troncoso
(2)
Chi-Yao Hong
(1)
Chin-Yu Cheng
(1)
Chuanxiong Guo
(1)
David A. Wagner
(1)
David Brumley
(1)
David G. Robinson
(1)
David Raila
(1)
Edward Chou
(1)
Eric A. Brewer
(1)
Eric Wustrow
(3)
Femi G. Olumofin
(1)
Frederick Douglas
(1)
Geir E. Dullerud
(2)
George Danezis
(2)
Giang T. K. Nguyen
(3)
Gunes Acar
(1)
Helen J. Wang
(2)
Huichen Li
(1)
Hussein Darir
(2)
Hussein Sibai
(1)
Ian Goldberg
(2)
Irv Simpson
(1)
J. Alex Halderman
(3)
Jack Wampler
(2)
Jodie P. Boyer
(1)
John Dunagan
(1)
Joseph Bonneau
(1)
Joshua Juen
(2)
Karan Ganju
(1)
Kazuhiro Minami
(3)
Lars E. Olson
(1)
Marek Klonowski
(1)
Marianne Winslett
(1)
Matthew Caesar
(9)
Matthew K. Wright
(1)
Matthew M. Lucas
(1)
Michalis Kallitsis
(2)
Michalis Polychronakis
(1)
Miroslaw Kutylowski
(1)
Monica Chew
(1)
Negar Kiyavash
(3)
Nguyen Phong Hoang
(1)
Nicholas Hopper
(1)
Nikita Borisov
(55)
Pallavi Joshi
(1)
Parisa Tabriz
(1)
Phillipa Gill
(1)
Pragya Agarwal
(1)
Pratch Piyawongwisal
(1)
Prateek Mittal
(12)
Qi Wang
(2)
Qiang Huang
(1)
Qiyan Wang
(3)
Ragib Hasan
(1)
Robert Johnson
(2)
Robin Berthier
(1)
Robin Snader
(1)
Rod Hynes
(1)
Saman A. Zonouz
(1)
Sayan Mitra
(1)
Sergey Frolov
(3)
Shishir Nagaraja
(2)
Sonia Jahid
(1)
Soumyadeb Mitra
(1)
Steve Schultze
(1)
Sze Chuen Tan
(2)
Thomas J. Riedl
(1)
Vijit Singh
(1)
Wei Yang
(1)
Will Scott
(1)
William H. Sanders
(1)
XiaoFeng Wang
(1)
Xiaojun Xu
(1)
Xun Gong
(3)
Zi Lin
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to