Select Publications

Privacy & Security

2020

An Empirical Study of Wireless Carrier Authentication for SIM Swaps, PDF
Kevin Lee, Ben Kaiser, Jonathan Mayer, Arvind Narayanan
January 2020,

2019

IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale, PDF
Danny Yuxing Huang, Noah Apthorpe, Gunes Acar, Frank Li, Nick Feamster
September 2019,
Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices, PDF
Hooman Mohajeri Moghaddam, Gunes Acar, Ben Burgess, Arunesh Mathur, Danny Yuxing Huang, Nick Feamster, Edward W. Felten, Prateek Mittal, Arvind Narayanan
September 2019, Proceedings of the 2019 ACM Conference on Computer and Communications security
Keepers of the Machines: Examining How System Administrators Manage Software Updates, PDF
USENIX Association, August 2019, Proceedings of the Fifteenth USENIX Conference on Usable Privacy and Security
How DNS over HTTPS is Reshaping Privacy, Performance, and Policy in the Internet Ecosystem, PDF
Kevin Borgolte, Tithi Chattopadhyay, Nick Feamster, Mihir Kshirsagar, Jordan Holland, Austin Hounsel, Paul Schmit
July 2019, 47th Research Conference on Communications, Information and Internet Policy (TPRC)
Disaster Privacy/Privacy Disaster, PDF
Madelyn Sanfilippo, Yan Shvartzshnaider, Irwin Reyes, Helen Nissenbaum, Serge Egelman
July 2019,
Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites, PDF
Arunesh Mathur, Gunes Acar, Michael Friedman, Elena Lucherini, Jonathan Mayer, Marshini Chetty, Arvind Narayanan
July 2019,
Formal Barriers to Longest-Chain Proof-of-Stake Protocols, PDF
Jonah Brown-Cohen, Arvind Narayanan, Alexandros Psomas, S Matthew Weinberg
ACM, June 2019, Page 459, Proceedings of the 2019 ACM Conference on Economics and Computation
Robust de-anonymization of large sparse datasets: a decade later, PDF
Arvind Narayanan, Vitaly Shmatikov
May 2019,
A Cryptographic Escrow for Treaty Declarations and Step-by-Step Verification, PDF
Sébastien Philippe, Alexander Glaser, Edward W Felten
Science & Global Security, Routledge, April 2019,
The Impact of User Location on Cookie Notices (Inside and Outside of the European Union), PDF
Rob van Eijk, Hadi Asghari, Philipp Winter, Arvind Narayanan
Workshop on Technology and Consumer Protection (ConPro'19), March 2019,
Privacy Law’s False Promise, PDF
Ari Ezra Waldman
Washington University Law Review, February 2019,
Privacy and Security Considerations For Digital Technology Use in Elementary Schools, PDF
Priya C Kumar, Marshini Chetty, Tamara L Clegg, Jessica Vitak
January 2019,
Identification of anonymous DNA using genealogical triangulation, PDF
Paul M Ellenbogen, Arvind Narayanan
bioRxiv, Cold Spring Harbor Laboratory, January 2019,

2018

User Perceptions of Smart Home IoT Privacy, PDF
Serena Zheng, Noah Apthorpe, Marshini Chetty, Nick Feamster
Proceedings of the ACM on Human-Computer Interaction, ACM, October 2018, Page 200,
When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies, PDF
Steven Goldfeder, Harry Kalodner, Dillon Reisman, Arvind Narayanan
Proceedings on Privacy Enhancing Technologies, Sciendo, October 2018,
Analyzing Privacy Policies Using Contextual Integrity Annotations, PDF
Yan Shvartzshnaider, Noah Apthorpe, Nick Feamster, Helen Nissenbaum
September 2018,
A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation, PDF
Trisha Datta, Noah Apthorpe, Nick Feamster
ACM, August 2018,
Security and Privacy Analyses of Internet of Things Children’s Toys, PDF
Gordon Chu, Noah Apthorpe, Nick Feamster
IEEE Internet of Things Journal, IEEE, August 2018,
Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking, PDF
Arunesh Mathur, Jessica Vitak, Arvind Narayanan, Marshini Chetty
August 2018, Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018)
Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic, PDF
Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, and Nick Feamster
August 2018,
Preserving Privacy at IXPs, PDF
Xiaohe Hu, Arpit Gupta, Nick Feamster, Aurojit Panda, Scott Shenker
ACM, August 2018,
Co-designing online privacy-related games and stories with children, PDF
Priya Kumar, Jessica Vitak, Marshini Chetty, Tamara L Clegg, Jonathan Yang, Brenna McNally, Elizabeth Bonsignore
ACM, June 2018, Proceedings of the 17th ACM Conference on Interaction Design and Children
Oblivious DNS: Practical Privacy for DNS Queries, PDF
Paul Schmitt, Anne Edmundson, Nick Feamster
June 2018,
Tracking Ransomware End-to-end, PDF
Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, Alex C Snoeren, Damon McCoy
IEEE, May 2018, 2018 IEEE Symposium on Security and Privacy (SP)
Discovering smart home internet of things privacy norms using contextual integrity, PDF
Noah Apthorpe, Yan Shvartzshnaider, Arunesh Mathur, Dillon Reisman, Nick Feamster
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, ACM, May 2018, Page 59,
An Empirical Analysis of Traceability in the Monero Blockchain, PDF
Malte Möser, Kyle Soska, Ethan Heilman, Kevin Lee, Henry Heffan, Shashvat Srivastava, Kyle Hogan, Jason Hennessey, Andrew Miller, Arvind Narayanan, and Nicolas Christin
April 2018,
Understanding the Use and Impact of the Zero-Rated Free Basics Platform in South Africa, PDF
Julianne Romanosky, Marshini Chetty
ACM, April 2018, Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems
Government Hacking, PDF
Jonathan Mayer
Yale Law Journal, January 2018,

2017

When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries, PDF
Aylin Caliskan-Islam, Fabian Yamaguchi, Edwin Dauber, Richard Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan
December 2017,
Rangzen: Anonymously Getting the Word Out in a Blackout, PDF
Adam Lerner, Giulia Fanti, Yahel Ben-David, Jesus Garcia, Paul Schmitt, Barath Raghavan
December 2017,
‘No Telling Passcodes Out Because They’re Private’: Understanding Children’s Mental Models of Privacy and Security Online, PDF
Priya Kumar, Shalmali Milind Naik, Utkarsha Ramesh Devkar, Marshini Chetty, Tamara L Clegg, Jessica Vitak
Proceedings of the ACM on Human-Computer Interaction, ACM, December 2017,
I never signed up for this! Privacy implications of email tracking, PDF
Steven Englehardt, Jeffrey Han, Arvind Narayanan
September 2017, Proceedings of the Privacy Enhancing Technologies Symposium
Global Measurement of DNS Manipulation, PDF
Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, Vern Paxson
August 2017, 26th USENIX Security Symposium (USENIX Security 17), USENIX Association
Backpage and Bitcoin: Uncovering Human Traffickers, PDF
Rebecca S Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz, Damon McCoy
ACM, August 2017, Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
Impact of user characteristics on attitudes towards automatic mobile application updates, PDF
Arunesh Mathur, Marshini Chetty
July 2017, Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017
The Future of Ad Blocking: An Analytical Framework and New Techniques, PDF
Grant Storey, Dillon Reisman, Jonathan Mayer, Arvind Narayanan
May 2017,
Poster: A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic, PDF
Noah Apthorpe, Dillon Reisman, Nick Feamster
May 2017,
Closing the Blinds: Four Strategies for Protecting Smart Home Privacy from Network Observers, PDF
Noah Apthorpe, Dillon Reisman, Nick Feamster
May 2017,
“Spiders in the Sky”: User Perceptions of Drones, Privacy, and Security, PDF
Victoria Chang, Pramod Chundury, Marshini Chetty
ACM, May 2017, Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems
The Princeton Web Transparency and Accountability Project, PDF
Arvind Narayanan, Dillon Reisman
Springer, May 2017,
Online Privacy and Web Transparency, PDF
Nataliia Bielova, Nikolaos Laoutaris, Arvind Narayanan, Nick Nikiforakis
April 2017, Dagstuhl Reports
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks, PDF
Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal
IEEE, April 2017, 2017 IEEE Symposium on Security and Privacy (SP)
Pinning Down Abuse on Google Maps, PDF
Danny Yuxing Huang, Doug Grundman, Kurt Thomas, Abhishek Kumar, Elie Bursztein, Kirill Levchenko, Alex C Snoeren
International World Wide Web Conferences Steering Committee, April 2017, Proceedings of the 26th International Conference on World Wide Web
De-anonymizing Web Browsing Data with Social Networks, PDF
Jessica Su, Ansh Shukla, Sharad Goel, Arvind Narayanan
World Wide Web Conference, April 2017,
SDX-Based Flexibility or Internet Correctness?: Pick Two!, PDF
Rüdiger Birkner, Arpit Gupta, Nick Feamster, Laurent Vanbever
ACM, April 2017, Proceedings of the Symposium on SDN Research
Battery Status Not Included: Assessing Privacy in Web Standards, PDF
Lukasz Olejnik, Steven Englehardt, Arvind Narayanan
March 2017,
Mitigating the Increasing Risks of an Insecure Internet of Things, PDF
Nick Feamster
Colo. Tech. LJ, January 2017,

2016

The Narrow Interpretation of the Computer Fraud and Abuse Act: A User Guide for Applying United States v. Nosal, PDF
Jonathan Mayer
George Washington Law Review, November 2016,
Online tracking: A 1-million-site measurement and analysis, PDF
Steven Englehardt, Arvind Narayanan
October 2016, ACM Conference on Computer and Communications Security
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration, PDF
Shuang Hao, Alex Kantchelian, Brad Miller, Vern Paxson, Nick Feamster
October 2016,
The Effect of DNS on Tor’s Anonymity, PDF
Benjamin Greschbach, Tobias Pulls, Laura M Roberts, Philipp Winter, Nick Feamster
September 2016,
Privacy, ethics, and data access: A case study of the Fragile Families Challenge, PDF
Ian Lundberg, Arvind Narayanan, Karen Levy, Matthew J Salganik
Socius, September 2016,
Identifying and Characterizing Sybils in the Tor Network, PDF
Philipp Winter, Roya Ensafi, Karsten Loesing, Nick Feamster
August 2016, 25th {USENIX} Security Symposium ({USENIX} Security 16)
Modular Verification for Computer Security, PDF
Andrew W. Appel
IEEE, June 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF)
“They Keep Coming Back Like Zombies”: Improving Software Updating Interfaces, PDF
Arunesh Mathur, Josefine Engel, Sonam Sobti, Victoria Chang, Marshini Chetty
June 2016, Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security, PDF
Rosario Gennaro, Steven Goldfeder, Arvind Narayanan
June 2016,
Half-Baked Cookies: Client Authentication on the Modern Web, PDF
Yogesh Mundada, Nick Feamster, Balachander Krishnamurthy, Saikat Guha, Dave Levin
May 2016,
Evaluating the privacy properties of telephone metadata, PDF
Proceedings of the National Academy of Sciences, National Academy of Sciences, May 2016,
Cybercrime Litigation, PDF
Jonathan Mayer
University of Pennsylvania Law Review, March 2016,
Report of the NSF Workshop on Software Defined Infrastructures and Software Defined Exchanges, PDF
Robert Ricci, Nick Feamster, Chip Elliott, Lawrence Landweber, David Farber
February 2016,