Students


Chronological list of publications


[arXiv]
The Unintended Consequences of Overfitting: Training Data Inference Attacks.
S. Yeom, M. Fredrikson, S. Jha
Preprint, Sept. 2017.
[arXiv]
Proxy Non-Discrimination in Data-Driven Systems.
A. Datta, M. Fredrikson, G. Ko, P. Mardziel, S. Sen
Preprint, Aug. 2017.
[arXiv]
Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs.
A. Datta, M. Fredrikson, G. Ko, P. Mardziel, S. Sen
To appear in 2017 ACM Conference on Computer and Communications Security (CCS).
[arXiv]
PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage.
G. Srivastava, S. Chitkara, K. Ku, S, K. Sahoo, M. Fredrikson, J. Hong, Y. Agarwal
Preprint, Jul. 2017.
[pdf]
PrivacyStreams: Enabling Transparency in Personal Data Processing for Mobile Apps.
Y. Li, F. Chen, T. Li, Y. Guo, G. Huang, M. Fredrikson, Y. Agarwal, J. Hong
2017 ACM Transactions on Interactive, Mobile, Wearable Ubiquitous Technology (IMWUT/Ubicomp).
[pdf]
Verifying and Synthesizing Constant-Resource Implementations with Types
V. C. Ngo, M. Dehesa-Azuara, M. Fredrikson, J. Hoffmann
2017 IEEE Symposium on Security & Privacy (Oakland).
[pdf]
A Methodology for Formalizing Model-Inversion Attacks.
X. Wu, M. Fredrikson, S. Jha, and J. Naughton.
2016 IEEE Computer Security Foundations Symposium (CSF).
[arXiv]
The Limitations of Deep Learning in Adversarial Settings.
N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. Berkay Celik, A. Swami.
2016 IEEE European Symposium on Security & Privacy (EuroSP).
[arXiv]
Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences.
X. Wu, M. Fredrikson, W. Wu, S. Jha, and J. Naughton.
Preprint, Dec. 2015.
[pdf]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures.
M. Fredrikson, S. Jha, T. Ristenpart
2015 ACM Conference on Computer and Communications Security (CCS).
[pdf]
Surreptitiously Weakening Cryptographic Systems
B. Schneier, M. Fredrikson, T. Kohno, T. Ristenpart.
Cryptology ePrint Archive, Report 2015/097, February 2015.
[pdf]
Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing.
M. Fredrikson, E. Lantz, S. Jha, S. Lin, D. Page, T. Ristenpart
2014 Usenix Security Symposium (Best Paper Award).
[pdf]
Z0: An Optimizing Distributing Zero-Knowledge Compiler.
M. Fredrikson, B. Livshits
2014 Usenix Security Symposium.
[pdf]
On the Practical Exploitability of Dual EC in TLS Implementations.
S. Checkoway, M. Fredrikson, R. Niederhagen, M. Green, T. Lange, T. Ristenpart, D. J. Bernstein, J. Maskiewicz, H. Shacham
2014 Usenix Security Symposium.
[pdf]
MoRePriv: Mobile OS Support for Application Personalization and Privacy.
D. Davidson, M. Fredrikson, B. Livshits
2014 Annual Computer Security Applications Conference (ACSAC).
[pdf]
Satisfiability Modulo Counting: A New Approach for Analyzing Privacy Properties.
M. Fredrikson, S. Jha
2014 Joint Meeting of Computer Science Logic and Logic in Computer Science (CSL-LICS).
[pdf]
Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement.
M. Fredrikson, R. Joiner, S. Jha, T. Reps, P. Porras, H. Saidi and V. Yegneswaran
Computer Aided Verification 2012 (CAV).
[pdf]
Towards Enforceable Data-Driven Privacy Policies.
M. Fredrikson, D. Davidson, S. Jha, B. Livshits
2011 Workshop on Web 2.0 Security and Privacy (W2SP).
[pdf]
Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms.
M. Fredrikson, M. Christodorescu, S. Jha.
2011 Conference on Automated Deduction (CADE).
[pdf]
RePriv: Re-Envisioning In-Browser Privacy.
M. Fredrikson, B. Livshits.
2011 IEEE Symposium on Security & Privacy (Oakland).
[pdf]
Verified Security for Browser Extensions.
A. Guha, M. Fredrikson, N. Swamy, B. Livshits.
2011 IEEE Symposium on Security & Privacy (Oakland).
[pdf]
Automatic Generation of Remediation Procedures for Malware Infections.
R. Paleari, L. Martignoni, E. Passerini, D. Davidson, M. Fredrikson, J. Giffin, S. Jha.
2010 Usenix Security Symposium.
[pdf]
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors.
M. Fredrikson, M. Christodorescu, S. Jha, R. Sailer, X. Yan.
2010 IEEE Symposium on Security & Privacy. (Oakland).
[pdf]
Mining Graph Patterns Efficiently via Randomized Summaries.
C. Chen, C. X. Lin, M. Fredrikson, M. Christodorescu, X. Yan, J. Han.
2009 Conference on Very Large Data Bases (VLDB).
[pdf]
A Layered Architecture for Detecting Malicious Behaviors.
L. Martignoni, E. Stinson, M. Fredrikson, S. Jha, J. C. Mitchell.
2008 Symposium on Recent Advances in Intrusion Detection (RAID).
[doi]
End-to-End Software Diversification of Internet Services.
M. Christodorescu, M. Fredrikson, S. Jha, J. Giffin
In Moving Target Defense, Editors: Sushil Jajodia, Anup Ghosh, Vipin Swarup, Cliff Wang, X. Sean Wang. 2011, Springer New York.
[doi]
A Declarative Framework for Intrusion Analysis.
M. Fredrikson, M. Christodorescu, J. Giffin, S. Jha.
In Cyber-Situational Awareness, Editors: Sushil Jajodia, Peng Liu, Vipin Swarup, Clifford Wang. 2010, Springer New York.

Last updated Sept. 7 2017