Vitaly Shmatikov
PhD (Stanford)
Research interests:
computer security and privacy, formal methods for analysis of secure
systems and protocols
Teaching -
Students -
Papers -
Fly! -
3,669 snapshots -
Contact
Teaching
PhD graduates
-
Arvind Narayanan
(PhD, May 2009)
Thesis: Database Privacy: the Non-Interactive Setting
-
Justin Brickell
(PhD, May 2009)
Thesis: Privacy-Preserving Computation for Data Mining
Postdocs
Research papers
-
S. Jana, A. Narayanan, V. Shmatikov.
A Scanner Darkly: Protecting User Privacy from Perceptual Applications.
S&P (Oakland) 2013.
[abstract]
-
A. Houmansadr, C. Brubaker, V. Shmatikov.
The Parrot Is Dead: Observing Unobservable Network Communications.
S&P (Oakland) 2013.
[abstract]
-
S&P 2013 Best Practical Paper Award
-
S. Lee, E. Wong, D. Goel, M. Dahlin, V. Shmatikov.
πBox: A Platform for Privacy-Preserving Apps.
NSDI 2013.
[abstract]
-
S. Son, V. Shmatikov.
The Postman Always Rings Twice:
Attacking and Defending postMessage in HTML5 Websites.
NDSS 2013.
[abstract]
-
NDSS 2013 Best Student Paper Award
-
S. Son, K. McKinley, V. Shmatikov.
Fix Me Up: Repairing Access-Control Bugs in Web Applications.
NDSS 2013.
[abstract]
- A. Dunn, M. Lee, S. Jana, S. Kim, M. Silberstein, Y. Xu,
V. Shmatikov, E. Witchel.
Eternal Sunshine of the Spotless Machine:
Protecting Privacy with Ephemeral Channels.
OSDI 2012.
[abstract]
- M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, V. Shmatikov.
The Most Dangerous Code in the World:
Validating SSL Certificates in Non-Browser Software.
CCS 2012.
[abstract]
-
FAQ about this paper.
-
2012 NYU-Poly AT&T Best Applied Security Paper Award
-
Publicity:
Ars Technica,
Threatpost,
Hacker News,
Slashdot,
Schneier,
Reddit,
LWN.net,
The H,
SC Magazine,
Softpedia.
-
Foreign:
Heise,
it republik,
Webwereld,
Security.nl,
Punto Informatico,
root.cz,
xakep.ru,
SecurityLab.ru.
- S. Jana, V. Shmatikov.
Memento: Learning Secrets from Process Footprints.
S&P (Oakland) 2012.
[abstract]
-
S&P 2012 Best Student Paper Award
- S. Jana, V. Shmatikov.
Abusing File Processing in Malware Detectors for Fun and Profit.
S&P (Oakland) 2012.
[abstract]
- S. Son, K. McKinley, V. Shmatikov.
RoleCast: Finding Missing Security Checks When You Do Not Know What
Checks Are.
OOPSLA 2011.
[abstract]
- V. Srivastava, M. Bond, K. McKinley, V. Shmatikov.
A Security Policy Oracle:
Detecting Security Holes Using Multiple API Implementations.
PLDI 2011.
[abstract]
- J. Calandrino, A. Kilzer, A. Narayanan, E. Felten, V. Shmatikov.
"You Might Also Like:" Privacy Risks of Collaborative Filtering.
S&P (Oakland) 2011.
[abstract]
- S. Jana, D. Porter, V. Shmatikov.
TxBox: Building Secure, Efficient Sandboxes with System Transactions.
S&P (Oakland) 2011.
[abstract]
- E. Wong, V. Shmatikov.
Get Off My Prefix! The Need for Dynamic, Gerontocratic Policies in
Inter-domain Routing.
DSN 2011.
[abstract]
- S. Jana, V. Shmatikov.
EVE: Verifying Correct Execution of Cloud-Hosted Web Applications.
HotCloud 2011.
[abstract]
- S. Son, V. Shmatikov.
SAFERPHP:
Finding Semantic Vulnerabilities in PHP Applications.
PLAS 2011.
[abstract]
- I. Roy, S. Setty, A. Kilzer, V. Shmatikov, E. Witchel.
Airavat: Security and Privacy for MapReduce.
NSDI 2010.
[abstract]
- S. Son, V. Shmatikov.
The Hitchhiker's Guide to DNS Cache Poisoning.
SecureComm 2010.
[abstract]
- A. Narayanan, V. Shmatikov.
Myths and Fallacies of "Personally Identifiable Information".
CACM, June 2010.
- M. Bond, V. Srivastava, K. McKinley, V. Shmatikov.
Efficient, Context-Sensitive Detection of Real-World Semantic Attacks.
PLAS 2010.
[abstract]
- R. Chang, G. Jiang, F. Ivančić, S. Sankaranarayanan,
V. Shmatikov.
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities.
CSF 2009.
[abstract]
- A. Narayanan, V. Shmatikov.
De-anonymizing Social Networks - full version.
S&P (Oakland) 2009.
[abstract,
PDF,
PS]
-
FAQ about this paper.
-
Media:
BBC,
Technology Review,
New Scientist,
InformationWeek,
PC World (via
IDG News),
Austin Business Journal.
-
Publicity:
Slashdot,
Ars Technica,
Schneier,
Online Media Daily,
Behavioral Insider,
BizReport.
-
Foreign:
20 Minuten,
Die Presse,
ma.hu,
OSnews.pl,
RBC Daily.
- J. Brickell, V. Shmatikov.
Privacy-Preserving Classifier Learning.
Financial Crypto 2009.
[abstract]
- J. Brickell, V. Shmatikov.
The Cost of Privacy: Destruction of Data-Mining Utility in
Anonymized Data Publishing.
KDD 2008.
[abstract]
- A. Narayanan, V. Shmatikov.
Robust De-anonymization of Large Sparse Datasets, or
How to Break Anonymity of the Netflix Prize Dataset.
S&P (Oakland) 2008.
[abstract]
- S. Jha, L. Kruger, V. Shmatikov.
Towards Practical Privacy for Genomic Computation.
S&P (Oakland) 2008.
[abstract]
- J. Brickell, D. Porter, V. Shmatikov, E. Witchel.
Privacy-Preserving Remote Diagnostics.
CCS 2007.
[abstract]
- P. Gupta, V. Shmatikov.
Security Analysis of Voice-over-IP Protocols.
CSF 2007.
[abstract]
- E. Wong, P. Balasubramanian, L. Alvisi, M. Gouda, V. Shmatikov.
Truth in Advertising: Lightweight Verification of Route Integrity.
PODC 2007.
[abstract]
- S. Jarecki, V. Shmatikov.
Efficient Two-Party Secure Computation on Committed Inputs.
EUROCRYPT 2007.
[abstract]
- A. Mahimkar, J. Dange, V. Shmatikov, H. Vin, Y. Zhang.
dFence: Transparent Network-based Denial of Service Mitigation.
NSDI 2007.
[abstract]
- V. Shmatikov, M-H. Wang.
Secure Verification of Location Claims with
Simultaneous Distance Modification.
ASIAN 2007.
[abstract]
- V. Shmatikov, M-H. Wang.
Security Against Probe-Response Attacks in Collaborative
Intrusion Detection.
LSAD 2007.
[abstract]
- R. Chang, V. Shmatikov.
Formal Analysis of Authentication in
Bluetooth Device Pairing. FCS-ARSPA 2007.
[abstract]
- J. Brickell, V. Shmatikov.
Efficient Anonymity-Preserving Data Collection.
KDD 2006.
[abstract]
- V. Shmatikov, M-H. Wang.
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses.
ESORICS 2006.
[abstract]
- V. Shmatikov, M-H. Wang.
Measuring Relationship Anonymity in Mix Networks.
WPES 2006.
[abstract]
- P. Porras, V. Shmatikov.
Large-Scale Collection and Sanitization of Network Security Data: Risks
and Challenges.
NSPW 2006.
[abstract]
- P. Gupta, V. Shmatikov.
Key Confirmation and Adaptive Corruptions in
the Protocol Security Logic. FCS-ARSPA 2006.
[abstract,
full version]
- G. Norman, V. Shmatikov.
Analysis of Probabilistic Contract Signing.
J. Computer Security, 2006.
[abstract]
This paper supercedes:
- G. Norman, V. Shmatikov.
Analysis of Probabilistic Contract Signing.
FASec 2002.
- A. Narayanan, V. Shmatikov.
Fast Dictionary Attacks on Passwords Using
Time-Space Tradeoff.
CCS 2005.
[abstract]
- A. Narayanan, V. Shmatikov.
Obfuscated Databases and Group Privacy.
CCS 2005.
[abstract]
-
J. Brickell, V. Shmatikov.
Privacy-Preserving Graph Algorithms in the Semi-Honest Model.
ASIACRYPT 2005.
[abstract]
- A. Datta, A. Derek, J.C. Mitchell, V. Shmatikov, M. Turuani.
Probabilistic Polynomial-Time Semantics for a Protocol Security
Logic.
ICALP 2005.
[abstract]
- A. Mahimkar, V. Shmatikov.
Game-Based Analysis of Denial-of-Service Prevention Protocols.
CSFW 2005.
[abstract]
The paper in the CSFW proceedings contains a bug in the
verification conditions. This is the corrected version.
- S. Jarecki, V. Shmatikov.
Probabilistic Escrow of Financial Transactions with Cumulative
Threshold Disclosure.
Financial Crypto 2005.
[abstract]
- P. Gupta, V. Shmatikov.
Towards Computationally Sound Symbolic Analysis of Key Exchange
Protocols. FMSE 2005.
[abstract,
full version with proofs]
- J. Millen, V. Shmatikov.
Symbolic Protocol Analysis with an Abelian Group Operator or
Diffie-Hellman Exponentiation.
J. Computer Security, 2005.
[abstract]
Warning:
Contains serious bugs in the proofs; corrections coming eventually.
This paper supercedes:
- J. Millen, V. Shmatikov.
Symbolic Protocol Analysis with Products and
Diffie-Hellman Exponentiation. CSFW 2003.
- V. Shmatikov, C. Talcott.
Reputation-Based Trust Management.
J. Computer Security, 2005.
[abstract]
This paper supercedes:
- V. Shmatikov, C. Talcott.
Reputation-Based Trust Management.
WITS 2003.
- P. Lincoln, P. Porras, V. Shmatikov.
Privacy-Preserving Sharing and Correlation of Security Alerts.
USENIX Security 2004.
[abstract]
- S. Jarecki, V. Shmatikov.
Handcuffing Big Brother:
an Abuse-Resilient Transaction Escrow Scheme.
EUROCRYPT 2004.
[abstract]
- V. Shmatikov.
Decidable Analysis of Cryptographic Protocols with
Products and Modular Exponentiation.
ESOP 2004.
[abstract]
- R. Dingledine, V. Shmatikov, P. Syverson.
Synchronous Batching: From Cascades to Free Routes.
PET 2004.
[abstract]
- A. Datta, R. Küsters, J.C. Mitchell, A. Ramanathan, V. Shmatikov.
Unifying Equivalence-Based Definitions of Protocol Security.
WITS 2004.
[abstract]
- D. Hughes, V. Shmatikov.
Information Hiding, Anonymity and Privacy: A Modular Approach.
J. Computer Security, 2004.
[abstract]
This paper was also presented at MFPS 2003
and supercedes:
- V. Shmatikov, D. Hughes.
Defining Anonymity and Privacy.
WITS 2002.
- V. Shmatikov.
Probabilistic Model Checking of an Anonymity System.
J. Computer Security, 2004.
[abstract]
This paper supercedes:
- V. Shmatikov.
Probabilistic Analysis of Anonymity.
CSFW 2002.
- R. Chadha, J.C. Mitchell, A. Scedrov, V. Shmatikov.
Contract Signing, Optimism, and Advantage.
CONCUR 2003.
[abstract]
Revised journal version containing all proofs:
- H. Comon-Lundh, V. Shmatikov.
Intruder Deductions, Constraint Solving and Insecurity Decision
in Presence of Exclusive or.
LICS 2003.
[abstract]
- S. Jarecki, P. Lincoln, V. Shmatikov.
Negotiated Privacy.
ISSS 2002.
[abstract]
- H. Comon, V. Shmatikov.
Is It Possible to Decide Whether a Cryptographic Protocol
Is Secure Or Not?.
J. Telecommunications and Information Technology, 2002.
[abstract]
- V. Shmatikov, J.C. Mitchell.
Finite-State Analysis of Two Contract Signing Protocols.
Theoretical Computer Science, 2002.
[abstract]
This paper supercedes the following three papers:
- V. Shmatikov, J.C. Mitchell.
Analysis of Abuse-Free Contract Signing.
Financial Crypto 2000.
- V. Shmatikov, J.C. Mitchell.
Analysis of a Fair Exchange Protocol.
NDSS 2000.
- V. Shmatikov, J.C. Mitchell.
Analysis of a Fair Exchange Protocol.
FLOC Workshop on Formal Methods and Security Protocols, 1999.
- J. Millen, V. Shmatikov.
Constraint Solving for Bounded-Process Cryptographic
Protocol Analysis.
CCS 2001.
[abstract]
-
"Test of Time" Award by CCS 2011
- V. Bono, A. Patel, V. Shmatikov.
A Core Calculus of Classes and Mixins.
ECOOP 1999.
[abstract]
- V. Bono, A. Patel, V. Shmatikov, J.C. Mitchell.
A Core Calculus of Classes and Objects.
MFPS 1999.
[abstract]
- V. Shmatikov, U. Stern.
Efficient Finite-State Analysis for Large Security Protocols.
CSFW 1998.
[abstract]
- J.C. Mitchell, V. Shmatikov, U. Stern.
Finite-State Analysis of SSL 3.0.
USENIX Security 1998.
[abstract]
This paper supercedes:
- J.C. Mitchell, V. Shmatikov, U. Stern.
Finite-State Analysis of SSL 3.0 and Related Protocols.
DIMACS Workshop on Design and Formal Verification of
Security Protocols, 1997.
Contact information
-
- Department of Computer Science
The University of Texas at Austin
1 University Station D9500
Austin, TX 78712 U.S.A.
- email: first five letters of last name AT cs.utexas.edu
phone: +1-512-471-9530 (voicemail not checked)
office: GDC 6.812
-
The face was drawn, the eyes haggard, the general appearance that of
one who has searched for the leak in life's gaspipe with a lighted
candle.
-- P.G.Wodehouse, "The Old Reliable"