V
Vitaly Shmatikov
Researcher at Cornell University
Publications - 153
Citations - 22828
Vitaly Shmatikov is an academic researcher from Cornell University. The author has contributed to research in topics: Anonymity & Information privacy. The author has an hindex of 64, co-authored 148 publications receiving 17801 citations. Previous affiliations of Vitaly Shmatikov include University of Texas at Austin & French Institute for Research in Computer Science and Automation.
Papers
More filters
Posted Content
Key confirmation and adaptive corruptions in the protocol security logic.
Prateek Gupta,Vitaly Shmatikov +1 more
TL;DR: A symbolic protocol logic for reasoning about authentication and key confirmation in key exchange protocols is presented and a symbolic proof of authentication and secrecy implies that the protocol is secure in the adaptive corruptions model.
Proceedings ArticleDOI
Efficient, context-sensitive detection of real-world semantic attacks
TL;DR: Pecan is presented, a new dynamic anomaly detector that efficiently tracks depth-limited context and history and reports few false positives with application-specific tuning, and which is low enough for practical deployment.
Proceedings Article
Negotiated privacy
TL;DR: This paper proposes conditional data escrow where the data generators, not the analysts, hold the keys to the data, but analysts can verify that the prenegotiated queries are enabled, enabling efficient mining of previously-negotiate properties, but preventing any other uses of the protected personal data.
Posted Content
Exploiting Unintended Feature Leakage in Collaborative Learning
TL;DR: This work shows that an adversarial participant can infer the presence of exact data points -- for example, specific locations -- in others' training data and develops passive and active inference attacks to exploit this leakage.
Posted Content
Gone in Six Characters: Short URLs Considered Harmful for Cloud Services
Martin Georgiev,Vitaly Shmatikov +1 more
TL;DR: This paper demonstrates that the space of 5- and 6-character tokens included in short URLs is so small that it can be scanned using brute-force search and shows how short-URL enumeration reveals the directions that users shared with each other.