scispace - formally typeset
V

Vitaly Shmatikov

Researcher at Cornell University

Publications -  153
Citations -  22828

Vitaly Shmatikov is an academic researcher from Cornell University. The author has contributed to research in topics: Anonymity & Information privacy. The author has an hindex of 64, co-authored 148 publications receiving 17801 citations. Previous affiliations of Vitaly Shmatikov include University of Texas at Austin & French Institute for Research in Computer Science and Automation.

Papers
More filters
Posted Content

Key confirmation and adaptive corruptions in the protocol security logic.

TL;DR: A symbolic protocol logic for reasoning about authentication and key confirmation in key exchange protocols is presented and a symbolic proof of authentication and secrecy implies that the protocol is secure in the adaptive corruptions model.
Proceedings ArticleDOI

Efficient, context-sensitive detection of real-world semantic attacks

TL;DR: Pecan is presented, a new dynamic anomaly detector that efficiently tracks depth-limited context and history and reports few false positives with application-specific tuning, and which is low enough for practical deployment.
Proceedings Article

Negotiated privacy

TL;DR: This paper proposes conditional data escrow where the data generators, not the analysts, hold the keys to the data, but analysts can verify that the prenegotiated queries are enabled, enabling efficient mining of previously-negotiate properties, but preventing any other uses of the protected personal data.
Posted Content

Exploiting Unintended Feature Leakage in Collaborative Learning

TL;DR: This work shows that an adversarial participant can infer the presence of exact data points -- for example, specific locations -- in others' training data and develops passive and active inference attacks to exploit this leakage.
Posted Content

Gone in Six Characters: Short URLs Considered Harmful for Cloud Services

TL;DR: This paper demonstrates that the space of 5- and 6-character tokens included in short URLs is so small that it can be scanned using brute-force search and shows how short-URL enumeration reveals the directions that users shared with each other.