Prateek Mittal

      Assistant Professor
      Department of Electrical Engineering
      Affiliate Faculty, Center for Information Technology Policy
      Princeton University


Links: [About Me] [Publications] [Open Positions]


Blind De-anonymization Attacks using Social Networks
Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby Lee
WPES, October 2017

Using EEG-Based BCI Devices to Subliminally Probe for Private Information
Mario Frank, Tiffanu Hwu, Sakshi Jain, Robert Knight, Ivan Martinovic, Prateek Mittal, Daniele Perito, Ivo Sluganovic, Dawn Song
WPES, October 2017

Inaudible Voice Commands
Liwei Song, Prateek Mittal
CoRR arXiv, August 2017
• "Is it possible to control Amazon Alexa, Google Now using inaudible commands? Absolutely", The Register
• "Dolphin attacks fool Amazon, Google voice assistants", BBC News
• "Hacking Alexa By Whispering in Her Ear", I Programmer

PinMe: Tracking a Smartphone User around the World
Arsalan Mosenia, Xiaoliang Dai, Prateek Mittal, Niraj Jha
IEEE TMSCS, August 2017

TorPolice: Towards Enforcing Service-Defined Access Policies for Anonymity Systems
Zhuotao Liu, Yushan Liu, Philipp Winter, Prateek Mittal, Yih-Chun Hu
IEEE ICNP 2017, October 2017
Our approach was independently integrated into Cloudflare's Challenge Bypass Specification

Using BGP to Acquire Bogus TLS Certificates
Henry Birge-Lee, Yixin Sun, Annie Edmundson, Jennifer Rexford, Prateek Mittal
HotPETS 2017, July 2017
Our work received the Best Presentation Award at HotPETS
Our work is influencing the real-world deployment of secure domain validation mechanisms
See Deployment at Let's Encrypt

A Wide-Area Testbed for Tor
Roger Dingledine, David Goulet, Prateek Mittal, Nicholas Feamster, Rob Jansen, Matthew Wright
HotPETS 2017, July 2017

Right of Access as a Tool for Privacy Governance
Hadi Asghari, Rene L.P. Mahieu, Prateek Mittal, Rachel Greenstadt
HotPETS 2017, July 2017

Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks
Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal
IEEE S&P, May 2017
• "Counter-RAPTOR project webpage and code", webpage, code
• "Research identifies methods to protect against online privacy attacks", Princeton News
Our Counter-RAPTOR analytics for BGP monitoring on the Tor network is being integrated into the Tor metrics portal

InFlo: A Novel Systems Biology Framework Identifies cAMP-CREB1 Axis as a Key Modulator of Platinum Resistance in Ovarian Cancer
N Dimitrova, A B Nagaraj, A Razi, S Singh, S Kamalakaran, N Banerjee, P Joseph, A Mankovich, P Mittal*, A DiFeo*, V Varadan*
Nature Oncogene, April 2017
• "Scientists develop computer models to predict cancer cell network activity", Science Daily
• "Inflo Project code", link

Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks
Yanqi Zhou, Sameer Wagh, Prateek Mittal, and David Wentzlaff
IEEE HPCA, Feb 2017

Graph Data Anonymization, Deanonymization Attacks, and Deanonymizability Quantification: A Survey
Shouling Ji, Prateek Mittal, Raheem Beyah
IEEE CST, To Appear

Quantifying Deanonymization Risks in Social Systems
Wei-han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby Lee
ICISSP, Feb 2017

SmartWalk: Enhancing Social Network Security via Adaptive Random Walks
Yushan Liu, Shouling Ji, and Prateek Mittal
ACM CCS, October 2016

Learning Privacy Expectations by Crowdsourcing Contextual Informational Norms
Yan Shvartzshnaider, Schrasing Tong, Thomas Wies, Paula Klift, Helen Nissenbaum, Lakshminarayanan Subramanian, Prateek Mittal
AAAI HCOMP, October 2016
• "Blog Post", link
• "PRIVACI project webpage and dataset", webpage link, dataset link

Discriminant-Component Eigenfaces For Privacy-Preserving Face Recognition
Thee Chanyaswad and J. Morris Chang and Prateek Mittal and S.Y. Kung
IEEE MLSP, September 2016

On the Relative De-anonymizability of Graph Data: Quantification and Evaluation
Shouling Ji, Weiqing Li, Shukun Yang, Prateek Mittal, and Raheem Beyah
IEEE INFOCOM, April 2016

Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples
Changchang Liu, Supriyo Chakraborty, and Prateek Mittal
NDSS, February 2016
• "Dependent Differential Privacy Blogpost", link

LinkMirage: Enabling Privacy-Preserving Analytics on Social Relationships
Changchang Liu and Prateek Mittal
NDSS, February 2016

Exploiting Temporal Dynamics in Sybil Defenses
Changchang Liu, Peng Gao, Matthew Wright, and Prateek Mittal
ACM CCS, October 2015

RAPTOR: Routing Attacks on Privacy in Tor
Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal
USENIX Security 2015, Aug 2015
• "RAPTOR project webpage", link
• "Tor Users at Risk of Unmasking, says Princeton", Computer Business Review
• "De-anonymizing Tor Users with Raptor Attacks", ACM TechNews
We found vulnerabilities in deployed anonymity systems such as Tor
RAPTOR attacks motivate Tor proposal 247 (mitigating guard discovery) and Tor proposal 271 (mitigating Guard DoS)

SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization
Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, Raheem Beyah
USENIX Security 2015, Aug 2015
• "SecGraph Project Webpage and Code", webpage, code

Aspire: Iterative Specification Synthesis for Security
Kevin Chen, Devdatta Akhawe, Vijay D'Silva, Warren He, Prateek Mittal, Dawn Song
HotOS, May 2015

Optical Signal Processing and Stealth Transmission for Privacy
Ben Wu, Bhavin Shastri, Prateek Mittal, Alexander Tait, Paul Prucnal
IEEE Journal of Selected Topics in Signal Processing, 2015 (to appear)

On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge
Shouling Ji, Weiqing Li, Neil Z. Gong, Prateek Mittal, Raheem Beyah
NDSS, February 2015

New Directions in Social Authentication
Sakshi Jain, Neil Gong, Sreya Basuroy, Juan Lang, Dawn Song, Prateek Mittal
NDSS USEC, February 2015

Anonymity on QuickSand: Using BGP to Compromise Tor
Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal
ACM HotNets, October 2014

Privacy Concerns of Implicit Secondary Factors for Web Authentication
Joseph Bonneau, Edward Felten, Prateek Mittal, Arvind Narayanan
WAY, July 2014

Re^3: Relay Reliability Reputation for Anonymity Systems
Anupam Das, Nikita Borisov, Prateek Mittal, Matthew Caesar
ACM ASIACCS, June 2014
Best Paper Award

SybilBelief: A Semi-supervised Learning Approach for Structure-based Sybil Detection
Neil Zhenqiang Gong, Mario Frank, Prateek Mittal
IEEE TIFS, June 2014
• "SybilBelief Project code", link

Pisces: Anonymous Communication Using Social Networks
Prateek Mittal, Matthew Wright, Nikita Borisov
NDSS, February 2013
• Hal Hodson. "How Facebook Can Help Hide Your Identity", New Scientist
• "Social Networks Make Anonymous Online Communication More Secure", MIT Technology Review
Our routing algorithms in X-Vine and Pisces (NDSS 12, NDSS 13) are influencing the design (link1,link2) of the Freenet project

Preserving Link Privacy in Social Network based Systems
Prateek Mittal, Charalampos Papamanthou, Dawn Song
NDSS, February 2013

Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching
Shirin Nilizadeh, Sonia Jahid, Prateek Mittal, Nikita Borisov, Apu Kapadia
ACM CoNEXT, December 2012

Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+
Neil Zhenqiang Gong, Wenchang Xu, Ling Huang, Prateek Mittal, Emil Stefanov, Vyas Sekar, Dawn Song
ACM/USENIX IMC, November 2012
• Our Google+ dataset is available here.

SybilControl: Practical Sybil Defense with Computational Puzzles
Frank Li, Prateek Mittal, Matthew Caesar, Nikita Borisov
ACM STC (Colocated with ACM CCS), October 2012

DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks
Sonia Jahid, Shirin Nilizadeh, Prateek Mittal, Nikita Borisov, Apu Kapadia
IEEE SESOC (Colocated with IEEE PerCom), March 2012
Full version available as arXiv Tech Report

X-Vine: Secure and Pseudonymous Routing Using Social Networks
Prateek Mittal, Matthew Caesar, Nikita Borisov
NDSS, February 2012
Full version available as arXiv Tech Report.

Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems
Prateek Mittal, Nikita Borisov
ACM TISSEC, Special Issue on Selected Papers from CCS, 2012
Our work (including our CCS 08 and CCS 10 papers) has influenced the threat model/design (link) of P2P systems such as I2P and GNUnet

Computational Frameworks for Integration of Biological Pathway Knowledge in Cancer Genomics
Vinay Varadan*, Prateek Mittal*, Charles Vaske, Stepehen Benz (* Joint first author)
IEEE Signal Processing Magazine, Special Issue on Genomic and Proteomic Signal Processing in Biomolecular Pathways, January 2012

Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting
Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov
ACM CCS, October 2011
Full version available as arXiv Tech report.
We found vulnerabilities in deployed anonymity systems such as Tor

PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval
Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg
USENIX Security, August 2011
Full version available as CACR Tech Report.

EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation
Sonia Jahid, Prateek Mittal, Nikita Borisov
ACM ASIACCS, March 2011

In Search of an Anonymous and Secure Lookup
Qiyan Wang, Prateek Mittal, Nikita Borisov
ACM CCS, October 2010

Scalable Anonymous Communication with Provable Security
Prateek Mittal, Nikita Borisov, Carmela Troncoso, Alfredo Rial
USENIX HotSec, August 2010

BotGrep: Detecting P2P Botnets Using Structured Graph Analysis
Shishir Nagaraja*, Prateek Mittal*, Chi-Yao Hong, Matthew Caesar, Nikita Borisov (* Joint first Author)
USENIX Security, August 2010
• George Lawton. "New Weapon in War on Botnets", Computing Now
• Michael Cooney. "Researchers Unsheathe New Tool to Battle Botnets", Network World

ShadowWalker: Peer-to-Peer Anonymous Communication Using Redundant Structured Topologies
Prateek Mittal, Nikita Borisov
ACM CCS, November 2009

Securing Mediated Trace Access Using Blackbox Permutation Analysis
Prateek Mittal, Vern Paxson, Robin Sommer, Mark Winterrowd
ACM HotNets, October 2009

SybilInfer: Detecting Sybil Nodes using Social Networks
George Danezis*, Prateek Mittal* (* Joint first author)

Information Leaks in Structured Peer-to-Peer Anonymous Communication
Prateek Mittal, Nikita Borisov
ACM CCS, October 2008
Selected outstanding paper, forwarded to ACM TISSEC special issue

Fair K Mutual Exclusion Algorithm for Peer to Peer systems
Vijay Anand Reddy*, Prateek Mittal*, Indranil Gupta (* Joint first author)
ICDCS, June 2008

Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity
Nikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz
ACM CCS, October 2007
Our work has influenced the design of anonymity systems like Tor
Tor proposal 209 implements countermeasures to our attack

Defeating Reflector Attacks: Signature Conflict Triggered Filtering
Prateek Mittal, Gautam Barua, Sameer Narang
ECIW, June 2006

Patents, Theses

Method for Estimation of Information Flow in Biological Networks
Prateek Mittal*, Vinay Varadan*, Angel Janevski, Sitharthan Kamalakaran, Nilanjana Banerjee, Nevenka Dimitrova
Patent pending

Trustworthy and Scalable Anonymous Communication
Prateek Mittal
Ph.D. Dissertation, University of Illinois at Urbana-Champaign, 2012
M. E. Van Valkenburg Award (link)
Ross J. Martin Award Nomination (link)

A Security Evaluation of the Salsa Anonymous Communication System
Prateek Mittal
M.S. Thesis, University of Illinois at Urbana-Champaign, 2010
Rambus Computer Engineering Award (link)