Vitaly Shmatikov, Ph.D.

Affiliations: 
2000 Stanford University, Palo Alto, CA 
Google:
"Vitaly Shmatikov"

Parents

Sign in to add mentor
John Mitchell grad student 2000 Stanford
 (Finite -state analysis of security protocols.)

Children

Sign in to add trainee
Suman Jana grad student UT Austin
Arvind Narayanan grad student 2009
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Shokri R, Shmatikov V. (2015) Privacy-preserving deep learning Proceedings of the Acm Conference On Computer and Communications Security. 2015: 1310-1321
Shmatikov V. (2015) All your SSL are belong to us Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9092
Georgiev M, Jana S, Shmatikov V. (2014) Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks. Ndss Symposium. 2014: 1-15
Brubaker C, Jana S, Ray B, et al. (2014) Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations. Ieee Security & Privacy. 2014: 114-129
Brubaker C, Houmansadr A, Shmatikov V. (2014) CloudTransport: Using cloud storage for censorship-resistant networking Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8555: 1-20
Son S, McKinley KS, Shmatikov V. (2013) Diglossia: Detecting code injection attacks with precision and efficiency Proceedings of the Acm Conference On Computer and Communications Security. 1181-1191
Jana S, Narayanan A, Shmatikov V. (2013) A scanner darkly: Protecting user privacy from perceptual applications Proceedings - Ieee Symposium On Security and Privacy. 349-363
Houmansadr A, Brubaker C, Shmatikov V. (2013) The parrot is dead: Observing unobservable network communications Proceedings - Ieee Symposium On Security and Privacy. 65-79
Dunn AM, Lee MZ, Jana S, et al. (2012) Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels. Proceedings of the -- Usenix Symposium On Operating Systems Design and Implementation (Osdi) / Usenix Association. Usenix Symposium On Operating Systems Design and Implementation. 61-75
Georgiev M, Iyengar S, Jana S, et al. (2012) The most dangerous code in the world: Validating SSL certificates in non-browser software Proceedings of the Acm Conference On Computer and Communications Security. 38-49
See more...