Prateek Mittal

      Professor
      Department of Electrical and Computer Engineering
      Affiliate Faculty, Center for Information Technology Policy
      Princeton University

      Email: pmittal@princeton.edu

Links: [About Me] [Publications] [Open Positions]

Note for prospective applicants:
The current research thrusts of my group focus on:
Privacy and security of networked systems (e.g., https://secure-certificates.princeton.edu/, https://www.torproject.org/)
Privacy and security of machine learning (e.g., https://adversarial-learning.princeton.edu)

INSPIRE Group Github repository

Publications

How Effective is Multiple-Vantage-Point Domain Control Validation?
Grace Cimaszewski, Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal
USENIX Security, August 2023

Towards A Proactive ML Approach for Detecting Backdoor Poison Samples
Xiangyu Qi, Tinghao Xie, Tianhao Wang, Tong Wu, Saeed Mahloujifar, Prateek Mittal
USENIX Security, August 2023

MultiRobustBench: Benchmarking Robustness Against Multiple Attacks
Sihui Dai, Saeed Mahloujifar, Chong Xiang, Vikash Sehwag, Pin-Yu Chen, Prateek Mittal
ICML, July 2023

Uncovering Adversarial Risks of Test-Time Adaptation
Tong Wu, Feiran Jia, Xiangyu Qi, Jiachen T. Wang, Vikash Sehwag, Saeed Mahloujifar, Prateek Mittal
ICML, July 2023

Effectively Using Public Data in Privacy-Preserving Machine Learning
Milad Nasr, Saeed Mahloujifar, Xinyu Tang, Prateek Mittal, Amir Houmansadr
ICML, July 2023

RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks
Liang Wang, Hyojoon Kim, Prateek Mittal, Jennifer Rexford
PETS, July 2023

ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking
Chong Xiang, Alexander Valtchanov, Saeed Mahloujifar, Prateek Mittal
IEEE S&P, May 2023

Revisiting the Assumption of Latent Separability for Backdoor Defense
Xiangyu Qi, Tinghao Xie, Yiming Li, Saeed Mahloujifar, and Prateek Mittal.
ICLR, May 2023

A Light Recipe to Train Robust Vision Transformers
Edoardo Debenedetti, Vikash Sehwag, and Prateek Mittal.
IEEE SaTML, February 2023

Formulating Robustness Against Unforeseen Attacks
Sihui Dai, Saeed Mahloujifar, Prateek Mittal
NeurIPS, November 2022

Renyi Differential Privacy of Propose-Test-Release and Applications to Private and Robust Machine Learning
Tianhao Wang, Saeed Mahloujifar, Shouda Wang, Ruoxi Jia, Prateek Mittal
NeurIPS, November 2022

Understanding Robust Learning through the Lens of Representation Similarities
Christian Cianfarani, Arjun Nitin Bhagoji, Vikash Sehwag, Ben Zhao, Prateek Mittal, Haitao Zheng
NeurIPS, November 2022

Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation
Tong Wu, Tianhao Wang, Vikash Sehwag, Saeed Mahloujifar, Prateek Mittal
AISEC, November 2022

PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier
Chong Xiang, Saeed Mahloujifar, Prateek Mittal
USENIX Security, August 2022

Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture
Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal
USENIX Security, August 2022

Creating a Secure Underlay for the Internet
Henry Birge-Lee, Joel Wanner, Grace Cimaszewksi, Jonghoon Kwon, Liang Wang, Francois Wirz, Prateek Mittal, Adrian Perrig, Yixin Sun
USENIX Security, August 2022

QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework
Jean-Pierre Smith, Luca Dolfi, Prateek Mittal, Adrian Perrig
USENIX Security, August 2022

Leveraging Strategic Connection Migration-powered Traffic Splitting for Privacy
Mona Wang, Anunay Kulshrestha, Liang Wang, Prateek Mittal
PETS, July 2022
• 2022 Andreas Pfitzmann Best Student Paper Award, Runners-up

Machine Learning with Differentially Private Labels: Mechanisms and Frameworks
Xinyu Tang, Milad Nasr, Saeed Mahloujifar, Virat Shejwalkar, Liwei Song, Amir Houmansadr, Prateek Mittal
PETS, July 2022

Athena: Probabilistic Verification of Machine Unlearning
David Sommer, Liwei Song, Sameer Wagh, Prateek Mittal
PETS, July 2022

Neurotoxin: Durable Backdoors in Federated Learning
Zhengming Zhang, Ashwinee Panda, Linyue Song, Yaoqing Yang, Michael W. Mahoney, Prateek Mittal, Kannan Ramchandran, Joseph E. Gonzalez
ICML, July 2022

Parameterizing Activation Functions for Adversarial Robustness
Sihui Dai, Saeed Mahloujifar, Prateek Mittal
DLS, May 2022

Robust Learning Meets Generative Models: Can Proxy Distributions Improve Adversarial Robustness?
Vikash Sehwag, Saeed Mahloujifar, Tinashe Handina, Sihui Dai, Chong Xiang, Mung Chiang, Prateek Mittal
ICLR, May 2022

SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification
Ashwinee Panda, Saeed Mahloujifar, Arjun N. Bhagoji, Supriyo Chakraborty, Prateek Mittal
AISTATS, March 2022

F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure
Laurent Chuat, Cyrill Krahenbuhl, Prateek Mittal, Adrian Perrig
NDSS, February 2022

RobustBench: a Standardized Adversarial Robustness Benchmark
Francesco Croce, Maksym Andriushchenko, Vikash Sehwag, Edoardo Debenedetti, Nicolas Flammarion, Mung Chiang, Prateek Mittal, Matthias Hein
NeurIPS, December 2021

New Directions in Automated Traffic Analysis
Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal
ACM CCS, November 2021

DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks
Chong Xiang, Prateek Mittal
ACM CCS, November 2021

Experiences Deploying Multi-Vantage-Point Domain Validation at Let’s Encrypt
Henry Birge-Lee, Liang Wang, Daniel McCarney, Roland Shoemaker, Jennifer Rexford, Prateek Mittal
USENIX Security, August 2021
• Our deployment at Let's Encrypt has issued over 1 billion TLS certificates since Feb 2020
• 2022 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies, Runners-up
• CSAW Applied Research Competition Finalist, 2021

PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking
Chong Xiang, Arjun Bhagoji, Vikash Sehwag, Prateek Mittal
USENIX Security, August 2021

Systematic Evaluation of Privacy Risks of Machine Learning Models
Liwei Song, Prateek Mittal
USENIX Security, August 2021
Deployed in Google's TensorFlow Privacy
CSAW Applied Research Competition Finalist, 2021

Securing Internet Applications from Routing Attacks
Yixin Sun, Maria Apostolaki, Henry Birge-Lee, Laurent Vanbever, Jennifer Rexford, Mung Chiang, Prateek Mittal
Communications of the ACM (CACM), 2021

DP-Cryptography: Marrying Differential Privacy and Cryptography in Emerging Applications
Sameer Wagh, Xi He, Ashwin Machanavajjhala, Prateek Mittal
Communications of the ACM (CACM), 2021

Website Fingerprinting in the Age of QUIC
Jean-Pierre Smith, Prateek Mittal, Adrian Perrig
PETS, July 2021

Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning
Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, Tal Rabin
PETS, July 2021

Lower Bounds on Cross-Entropy Loss in the Presence of Test-time Adversaries
Arjun Bhagoji, Daniel Cullina, Vikash Sehwag, Prateek Mittal
ICML, July 2021

SSD: A Unified Framework For Self-Supervised Outlier Detection
Vikash Sehwag, Mung Chiang, Prateek Mittal
ICLR, May 2021

HYDRA: Pruning Adversarially Robust Neural Networks
Vikash Sehwag, Shiqi Wang, Prateek Mittal, Suman Jana
NeurIPS, December 2020

CLAPS: Client-Location-Aware Path Selection in Tor
Florentin Rochet, Ryan Wails, Aaron Johnson, Prateek Mittal, Olivier Pereira
ACM CCS, November 2020

Vision Paper: Grand Challenges in Resilience: Autonomous System Resilience through Design and Runtime Measures
Saurabh Bagchi, Vaneet Aggarwal, Somali Chaterji, Fred Douglis, Aly El Gamal, Jiawei Han, Brian J. Henz, Hank Hoffmann, Suman Jana, Milind Kulkarni, Felix Xiaozhu Lin, Karen Marais, Prateek Mittal, Shaoshuai Mou, Xiaokang Qiu, Gesualdo Scutari
IEEE Open Journal of the Computer Society, 2020

Detecting Malware Injection with Program-DNS Behavior
Yixin Sun, Kangkook Jee, Suphannee Sivakorn, Zhichun Li, Cristian Lumezanu,Lauri Korts-Pärn, Zhenyu Wu, Junghwan Rhee, Chung Hwan Kim, Mung Chiang, Prateek Mittal
IEEE Euro S&P, September 2020

A Critical Evaluation of Open-World Machine Learning
Liwei Song, Vikash Sehwag, Arjun Nitin Bhagoji, Prateek Mittal
ICML Workshop on Uncertainty and Robustness in Deep Learning, July 2020

On Separability of Self-Supervised Representations
Vikash Sehwag, Mung Chiang, Prateek Mittal
ICML Workshop on Uncertainty and Robustness in Deep Learning, July 2020

Time for a Background Check! Uncovering the Influence of Background Features on Deep Neural Networks
Vikash Sehwag, Rajvardhan Oak, Mung Chiang, Prateek Mittal
ICML Workshop on Object-Oriented Learning (OOL): Perception, Representation, and Reasoning, July 2020

Partial Recovery of Erdos-Renyi Graph Alignment via k-Core Alignment
Daniel Cullina, Negar Kiyavash, Prateek Mittal, H. Vincent Poor
SIGMETRICS, June 2020

Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality
Anatoly Shusterman, Zohar Avraham, Eliezer Croitoru, Yarden Haskal, Lachlan Kang, Dvir Levi, Yosef Meltser, Prateek Mittal, Yossef Oren, Yuval Yarom
IEEE Transactions on Dependable and Secure Computing, April 2020

On Pruning Adversarially Robust Neural Networks
Vikash Sehwag, Shiqi Wang, Prateek Mittal, Suman Jana
ICLR Workshop on Trustworthy ML, April 2020

Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection
Peng Gao, Xusheng Xiao, Ding Li, Kangkook Jee, Haifeng Chen, Sanjeev R. Kulkarni, Prateek Mittal
ICDE Demonstrations Track, April 2020

Lower Bounds on Adversarial Robustness from Optimal Transport
Arjun Bhagoji, Daniel Cullina, Prateek Mittal
NeurIPS, December 2019

SICO: Surgical Interception Attacks by Manipulating BGP Communities
Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal
ACM CCS, November 2019

Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices
Hooman Moghaddam, Gunes Acar, Ben Burgess, Arunesh Mathur, Danny Huang, Nick Feamster, Edward Felten, Prateek Mittal, Arvind Narayanan
ACM CCS, November 2019
• "Project Webpage", Link
• "On Roku and Amazon Fire TV, Channels Are Watching You", Wired
• 2021 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies, Runners-up

Privacy Risks of Securing Machine Learning Models against Adversarial Examples
Liwei Song, Reza Shokri, Prateek Mittal
ACM CCS, November 2019

Analyzing the Robustness of Open-World Machine Learning
Vikash Sehwag, Arjun Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, Prateek Mittal
ACM AISEC, November 2019

Robust Website Fingerprinting Through the Cache Side Channel
Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossef Oren, Yuval Yarom
USENIX Security, August 2019
CSAW Applied Research Finalist, 2019

Guard Placement Attacks on Location-Based Path Selection Algorithms in Tor
Gerry Wan, Aaron Johnson, Ryan Wails, Sameer Wagh, Prateek Mittal
PETS, July 2019

DPSelect: A Differential Privacy Based Guard Relay Selection Algorithm for Tor
Hans Hanley, Yixin Sun, Sameer Wagh, Prateek Mittal
PETS, July 2019

RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release
Thee Chanyaswad, Changchang Liu, Prateek Mittal
PETS, July 2019

Investigating Statistical Privacy Frameworks from the Perspective of Hypothesis Testing
Changchang Liu, Xi He, Thee Chanyaswad, Shiqiang Wang, Prateek Mittal
PETS, July 2019

Analyzing Federated Learning through an Adversarial Lens
Arjun Bhagoji, Supriyo Chakraborty, Prateek Mittal, Seraphin Calo
International Conference on Machine Learning (ICML), June 2019

Protecting the Grid against MAD Attacks
Saleh Soltan, Prateek Mittal, and Vince Poor
IEEE Transactions on Network Science and Engineering, June 2019
• "Algorithms could stop an ‘internet of things’ attack from bringing down the power grid", Princeton News

Membership Inference Attacks against Adversarially Robust Deep Learning Models
Liwei Song, Reza Shokri, Prateek Mittal
Deep Learning and Security Workshop (DLS), May 2019

Using Contextual Integrity to Improve Information Leakage Detection
Yan Shvartzshnaider, Zvonimir Pavlinovic, Ananth Balashankar, Thomas Wies, Lakshminarayanan Subramanian, Helen Nissenbaum, Prateek Mittal
The Web Conference (WWW), May 2019

Line Failure Detection after a Cyber-Physical Attack on the Grid Using Bayesian Regression
Saleh Soltan, Prateek Mittal, and Vince Poor
IEEE Transactions on Power Systems, April 2019

Robustness of Optical Steganographic Communication Under Coherent Detection Attack
Chaoran Huang, Philip Ma, Bhavin Shastri, Prateek Mittal, and Paul Prucnal
IEEE Photonics Technology Letters, Feb 2019

PAC-learning in the presence of evasion adversaries
Daniel Cullina, Arjun Bhagoji, Prateek Mittal
NeurIPS, December 2018
Bell Labs Prize Finalist

Steganographic Communication via Spread Optical Noise: A Link-Level Eavesdropping Resilient System
Philip Ma, Ben Wu, Bhavin Shastri, Alexander Tait, Prateek Mittal, Paul Prucnal
IEEE Journal of Lightweight Technology, Dec 2018

Learning Informative and Private Representations via Generative Adversarial Networks.
Tsung-Yen Yang, Christopher Brinton, Prateek Mittal, Mung Chiang, Andrew Lan.
IEEE BigData, Dec 2018

MVG Mechanism: Differential Privacy under Matrix-Valued Query
Thee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal
ACM CCS, October 2018

Acoustic Denial of Service Attacks on Hard Disk Drives
Mohammad Shahrad, Arsalan Mosenia, Liwei Song, Mung Chiang, David Wentzlaff, Prateek Mittal
ACM CCS ASHES, October 2018

Bamboozling Certificate Authorities with BGP
Henry Birge-Lee, Yixin Sun, Annie Edmundson, Jennifer Rexford, Prateek Mittal
USENIX Security, August 2018
Our work is influencing the real-world deployment of secure domain validation mechanisms
See Deployment at Let's Encrypt
• "Project webpage", link
• 2020 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies, Runners-up

BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid
Saleh Soltan, Prateek Mittal, H. Vincent Poor
USENIX Security, August 2018
• "How Hacked Water Heaters Could Trigger Mass Blackouts", Wired
• "Your smart air conditioner could help bring down the power grid", CNET

SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal
USENIX Security, August 2018
CSAW Applied Research Finalist, 2018

Automatically Generating a Large, Culture-Specific Blocklist for China
Austin Hounsel, Prateek Mittal, Nicholas Feamster
USENIX Security FOCI, August 2018

Adaptive Fog-based Output Security for Augmented Reality
Surin Anh, Maria Gorlatova, Parinaz Naghizadeh, Mung Chiang, Prateek Mittal
ACM SIGCOMM VR/AR Network Workshop, August 2018

Bayesian Regression for Robust Power Grid State Estimation Following a Cyber-Physical Attack
Saleh Soltan, Prateek Mittal, H. Vincent Poor
IEEE PES-GM, August 2018
Selected as one of the best conference papers

Tempest: Temporal Dynamics in Anonymity Systems
Ryan Wails*, Yixin Sun*, Aaron Johnson*, Mung Chiang, Prateek Mittal
PETS, July 2018

Differentially Private Oblivious RAM
Sameer Wagh, Paul Cuff, Prateek Mittal
PETS, July 2018

Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers
Michael Freyberger, Warren He, Devdatta Akhawe, Michelle Mazurek, Prateek Mittal
PETS, July 2018

AIQL: Enabling Efficient Attack Investigation from System Monitoring Data
Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal
USENIX ATC, July 2018

Fundamental Limits of Database Alignment
Daniel Cullina, Prateek Mittal, Negar Kiyavash
IEEE ISIT, June 2018

SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection
Peng Gao, Binghui Wang, Neil Gong, Sanjeev Kulkarni, Kurt Thomas, Prateek Mittal
IEEE CNS, May 2018

Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos
Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Prateek Mittal and Mung Chiang
Deep Learning and Security Workshop (DLS), May 2018

ProCMotive: Bringing Programability and Connectivity into Isolated Vehicles
Arsalan Mosenia, Jad Bechara, Tao Zhang, Prateek Mittal, Mung Chiang
PACM IMWUT/UbiComp, March 2018

Towards a Timely Causality Analysis for Enterprise Security
Yushan Liu, Mu Zhang, Ding Li, Kangkook Jee, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Prateek Mittal
NDSS, February 2018

SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection
Peng Gao, Binghui Wang, Neil Gong, Sanjeev Kulkarni, Prateek Mittal
MIS2, February 2018

Acoustic Denial of Service Attacks on HDDs
Mohammad Shahrad, Arsalan Mosenia, Liwei Song, Mung Chiang, David Wentzlaff, Prateek Mittal
CoRR arXiv , December 2017
• "Acoustical Attacks against Hard Drives", Schneier on Security
• "Acoustic Attacks on HDDs Can Sabotage PCs, CCTV Systems, ATMs, More", Slashdot
• "Acoustic Denial of Service Attacks on HDDs", Hacker News

Blind De-anonymization Attacks using Social Networks
Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby Lee
WPES, October 2017

Using EEG-Based BCI Devices to Subliminally Probe for Private Information
Mario Frank, Tiffanu Hwu, Sakshi Jain, Robert Knight, Ivan Martinovic, Prateek Mittal, Daniele Perito, Ivo Sluganovic, Dawn Song
WPES, October 2017

Inaudible Voice Commands
Liwei Song, Prateek Mittal
CoRR arXiv, August 2017
• "Is it possible to control Amazon Alexa, Google Now using inaudible commands? Absolutely", The Register
• "Dolphin attacks fool Amazon, Google voice assistants", BBC News
• "Hacking Alexa By Whispering in Her Ear", I Programmer

PinMe: Tracking a Smartphone User around the World
Arsalan Mosenia, Xiaoliang Dai, Prateek Mittal, Niraj Jha
IEEE TMSCS, August 2017
• "Phones vulnerable to location tracking even when GPS services off", Princeton News
• "Tracking People Without GPS", Schneier on Security
• "How you can be tracked even with your GPS turned off", Android Authority
• "GPS is off so you can’t be tracked, right? Wrong", Sophos Security

TorPolice: Towards Enforcing Service-Defined Access Policies for Anonymity Systems
Zhuotao Liu, Yushan Liu, Philipp Winter, Prateek Mittal, Yih-Chun Hu
IEEE ICNP 2017, October 2017
Our approach was independently integrated into Cloudflare's Challenge Bypass Specification

Using BGP to Acquire Bogus TLS Certificates
Henry Birge-Lee, Yixin Sun, Annie Edmundson, Jennifer Rexford, Prateek Mittal
HotPETS 2017, July 2017
Our work received the Best Presentation Award at HotPETS
Our work is influencing the real-world deployment of secure domain validation mechanisms
See Deployment at Let's Encrypt

A Wide-Area Testbed for Tor
Roger Dingledine, David Goulet, Prateek Mittal, Nicholas Feamster, Rob Jansen, Matthew Wright
HotPETS 2017, July 2017

Right of Access as a Tool for Privacy Governance
Hadi Asghari, Rene L.P. Mahieu, Prateek Mittal, Rachel Greenstadt
HotPETS 2017, July 2017

Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks
Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal
IEEE S&P, May 2017
• "Counter-RAPTOR project webpage and code", webpage, code
• "Research identifies methods to protect against online privacy attacks", Princeton News
Our Counter-RAPTOR analytics for BGP monitoring on the Tor network is being integrated into the Tor metrics portal

InFlo: A Novel Systems Biology Framework Identifies cAMP-CREB1 Axis as a Key Modulator of Platinum Resistance in Ovarian Cancer
N Dimitrova, A B Nagaraj, A Razi, S Singh, S Kamalakaran, N Banerjee, P Joseph, A Mankovich, P Mittal*, A DiFeo*, V Varadan*
Nature Oncogene, April 2017
• "Scientists develop computer models to predict cancer cell network activity", Science Daily
• "Inflo Project code", link

Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks
Yanqi Zhou, Sameer Wagh, Prateek Mittal, and David Wentzlaff
IEEE HPCA, Feb 2017

Graph Data Anonymization, Deanonymization Attacks, and Deanonymizability Quantification: A Survey
Shouling Ji, Prateek Mittal, Raheem Beyah
IEEE CST, To Appear

Quantifying Deanonymization Risks in Social Systems
Wei-han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby Lee
ICISSP, Feb 2017

SmartWalk: Enhancing Social Network Security via Adaptive Random Walks
Yushan Liu, Shouling Ji, and Prateek Mittal
ACM CCS, October 2016

Learning Privacy Expectations by Crowdsourcing Contextual Informational Norms
Yan Shvartzshnaider, Schrasing Tong, Thomas Wies, Paula Klift, Helen Nissenbaum, Lakshminarayanan Subramanian, Prateek Mittal
AAAI HCOMP, October 2016
• "Blog Post", link
• "PRIVACI project webpage and dataset", webpage link, dataset link

Discriminant-Component Eigenfaces For Privacy-Preserving Face Recognition
Thee Chanyaswad and J. Morris Chang and Prateek Mittal and S.Y. Kung
IEEE MLSP, September 2016

On the Relative De-anonymizability of Graph Data: Quantification and Evaluation
Shouling Ji, Weiqing Li, Shukun Yang, Prateek Mittal, and Raheem Beyah
IEEE INFOCOM, April 2016

Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples
Changchang Liu, Supriyo Chakraborty, and Prateek Mittal
NDSS, February 2016
• "Dependent Differential Privacy Blogpost", link

LinkMirage: Enabling Privacy-Preserving Analytics on Social Relationships
Changchang Liu and Prateek Mittal
NDSS, February 2016

Exploiting Temporal Dynamics in Sybil Defenses
Changchang Liu, Peng Gao, Matthew Wright, and Prateek Mittal
ACM CCS, October 2015

RAPTOR: Routing Attacks on Privacy in Tor
Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal
USENIX Security 2015, Aug 2015
• "RAPTOR project webpage", link
• "Tor Users at Risk of Unmasking, says Princeton", Computer Business Review
• "De-anonymizing Tor Users with Raptor Attacks", ACM TechNews
We found vulnerabilities in deployed anonymity systems such as Tor
RAPTOR attacks motivate Tor proposal 247 (mitigating guard discovery) and Tor proposal 271 (mitigating Guard DoS)

SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization
Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, Raheem Beyah
USENIX Security 2015, Aug 2015
• "SecGraph Project Webpage and Code", webpage, code

Aspire: Iterative Specification Synthesis for Security
Kevin Chen, Devdatta Akhawe, Vijay D'Silva, Warren He, Prateek Mittal, Dawn Song
HotOS, May 2015

Optical Signal Processing and Stealth Transmission for Privacy
Ben Wu, Bhavin Shastri, Prateek Mittal, Alexander Tait, Paul Prucnal
IEEE Journal of Selected Topics in Signal Processing, 2015 (to appear)

On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge
Shouling Ji, Weiqing Li, Neil Z. Gong, Prateek Mittal, Raheem Beyah
NDSS, February 2015

New Directions in Social Authentication
Sakshi Jain, Neil Gong, Sreya Basuroy, Juan Lang, Dawn Song, Prateek Mittal
NDSS USEC, February 2015

Anonymity on QuickSand: Using BGP to Compromise Tor
Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal
ACM HotNets, October 2014

Privacy Concerns of Implicit Secondary Factors for Web Authentication
Joseph Bonneau, Edward Felten, Prateek Mittal, Arvind Narayanan
WAY, July 2014

Re^3: Relay Reliability Reputation for Anonymity Systems
Anupam Das, Nikita Borisov, Prateek Mittal, Matthew Caesar
ACM ASIACCS, June 2014
Best Paper Award

SybilBelief: A Semi-supervised Learning Approach for Structure-based Sybil Detection
Neil Zhenqiang Gong, Mario Frank, Prateek Mittal
IEEE TIFS, June 2014
• "SybilBelief Project code", link

Pisces: Anonymous Communication Using Social Networks
Prateek Mittal, Matthew Wright, Nikita Borisov
NDSS, February 2013
• Hal Hodson. "How Facebook Can Help Hide Your Identity", New Scientist
• "Social Networks Make Anonymous Online Communication More Secure", MIT Technology Review
Our routing algorithms in X-Vine and Pisces (NDSS 12, NDSS 13) are influencing the design (link1,link2) of the Freenet project

Preserving Link Privacy in Social Network based Systems
Prateek Mittal, Charalampos Papamanthou, Dawn Song
NDSS, February 2013

Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching
Shirin Nilizadeh, Sonia Jahid, Prateek Mittal, Nikita Borisov, Apu Kapadia
ACM CoNEXT, December 2012

Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+
Neil Zhenqiang Gong, Wenchang Xu, Ling Huang, Prateek Mittal, Emil Stefanov, Vyas Sekar, Dawn Song
ACM/USENIX IMC, November 2012
• Our large-scale Google+ dataset is available here.

SybilControl: Practical Sybil Defense with Computational Puzzles
Frank Li, Prateek Mittal, Matthew Caesar, Nikita Borisov
ACM STC (Colocated with ACM CCS), October 2012

DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks
Sonia Jahid, Shirin Nilizadeh, Prateek Mittal, Nikita Borisov, Apu Kapadia
IEEE SESOC (Colocated with IEEE PerCom), March 2012
Full version available as arXiv Tech Report

X-Vine: Secure and Pseudonymous Routing Using Social Networks
Prateek Mittal, Matthew Caesar, Nikita Borisov
NDSS, February 2012
Full version available as arXiv Tech Report.

Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems
Prateek Mittal, Nikita Borisov
ACM TISSEC, Special Issue on Selected Papers from CCS, 2012
Our work (including our CCS 08 and CCS 10 papers) has influenced the threat model/design (link) of P2P systems such as I2P and GNUnet

Computational Frameworks for Integration of Biological Pathway Knowledge in Cancer Genomics
Vinay Varadan*, Prateek Mittal*, Charles Vaske, Stepehen Benz (* Joint first author)
IEEE Signal Processing Magazine, Special Issue on Genomic and Proteomic Signal Processing in Biomolecular Pathways, January 2012

Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting
Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov
ACM CCS, October 2011
Full version available as arXiv Tech report.
We found vulnerabilities in deployed anonymity systems such as Tor

PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval
Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg
USENIX Security, August 2011
Full version available as CACR Tech Report.
Our work on PIR-Tor impacted Tor's Walking Onion mechanism (Tor Proposal 300)

EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation
Sonia Jahid, Prateek Mittal, Nikita Borisov
ACM ASIACCS, March 2011

In Search of an Anonymous and Secure Lookup
Qiyan Wang, Prateek Mittal, Nikita Borisov
ACM CCS, October 2010

Scalable Anonymous Communication with Provable Security
Prateek Mittal, Nikita Borisov, Carmela Troncoso, Alfredo Rial
USENIX HotSec, August 2010

BotGrep: Detecting P2P Botnets Using Structured Graph Analysis
Shishir Nagaraja*, Prateek Mittal*, Chi-Yao Hong, Matthew Caesar, Nikita Borisov (* Joint first Author)
USENIX Security, August 2010
• George Lawton. "New Weapon in War on Botnets", Computing Now
• Michael Cooney. "Researchers Unsheathe New Tool to Battle Botnets", Network World

ShadowWalker: Peer-to-Peer Anonymous Communication Using Redundant Structured Topologies
Prateek Mittal, Nikita Borisov
ACM CCS, November 2009

Securing Mediated Trace Access Using Blackbox Permutation Analysis
Prateek Mittal, Vern Paxson, Robin Sommer, Mark Winterrowd
ACM HotNets, October 2009

SybilInfer: Detecting Sybil Nodes using Social Networks
George Danezis*, Prateek Mittal* (* Joint first author)
NDSS, February 2009

Information Leaks in Structured Peer-to-Peer Anonymous Communication
Prateek Mittal, Nikita Borisov
ACM CCS, October 2008
Selected outstanding paper, forwarded to ACM TISSEC special issue

Fair K Mutual Exclusion Algorithm for Peer to Peer systems
Vijay Anand Reddy*, Prateek Mittal*, Indranil Gupta (* Joint first author)
ICDCS, June 2008

Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity
Nikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz
ACM CCS, October 2007
Our work has influenced the design of anonymity systems like Tor
Tor proposal 209 implements countermeasures to our attack

Defeating Reflector Attacks: Signature Conflict Triggered Filtering
Prateek Mittal, Gautam Barua, Sameer Narang
ECIW, June 2006

Patents, Theses

Method for Estimation of Information Flow in Biological Networks
Prateek Mittal*, Vinay Varadan*, Angel Janevski, Sitharthan Kamalakaran, Nilanjana Banerjee, Nevenka Dimitrova
Patent pending

Trustworthy and Scalable Anonymous Communication
Prateek Mittal
Ph.D. Dissertation, University of Illinois at Urbana-Champaign, 2012
M. E. Van Valkenburg Award (link)
Ross J. Martin Award Nomination (link)

A Security Evaluation of the Salsa Anonymous Communication System
Prateek Mittal
M.S. Thesis, University of Illinois at Urbana-Champaign, 2010
Rambus Computer Engineering Award (link)