Anupam Das
Cited by
Cited by
The Tangled Web of Password Reuse.
A Das, J Bonneau, M Caesar, N Borisov, X Wang
Network and Distributed SystemSecurity Symposium (NDSS), 2014
SecuredTrust: a dynamic trust computation model for secured communication in multiagent systems
A Das, MM Islam
IEEE Transactions on Dependable and Secure Computing 9 (2), 261-274, 2011
Personalized privacy assistant
N Sadeh, B Liu, A Das, M Degeling, F Schaub
US Patent 10,956,586, 2021
Do you hear what i hear?: Fingerprinting smart devices through embedded acoustic components
A Das, N Borisov, M Caesar
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Some recipes can do more than spoil your appetite: Analyzing the security and privacy risks of ifttt recipes
M Surbatovich, J Aljuraidan, L Bauer, A Das, L Jia
Proceedings of the 26th International Conference on World Wide Web, 1501-1510, 2017
Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.
A Das, N Borisov, M Caesar
NDSS, 2016
A scalable and privacy-aware IoT service for live video analytics
J Wang, B Amos, A Das, P Pillai, N Sadeh, M Satyanarayanan
Proceedings of the 8th ACM on Multimedia Systems Conference, 38-49, 2017
Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice
A Das, M Degeling, D Smullen, N Sadeh
IEEE Pervasive Computing 17 (3), 35-46, 2018
The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors
A Das, G Acar, N Borisov, A Pradeep
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Transparent and Flexible Network Management for Big Data Processing in the Cloud
A Das, C Lumezanu, Y Zhang, V Singh, G Jiang, C Yu
USENIX HotCloud 2013, 2013
Assisting users in a world full of cameras: A privacy-aware infrastructure for computer vision applications
A Das, M Degeling, X Wang, J Wang, N Sadeh, M Satyanarayanan
2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops …, 2017
Riding out domsday: Towards detecting and preventing dom cross-site scripting
W Melicher, A Das, M Sharif, L Bauer, L Jia
2018 Network and Distributed System Security Symposium (NDSS), 2018
Mining on someone else’s dime: Mitigating covert mining operations in clouds and enterprises
R Tahir, M Huzaifa, A Das, M Ahmad, C Gunter, F Zaffar, M Caesar, ...
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
Towards privacy-aware smart buildings: Capturing, communicating, and enforcing privacy policies and preferences
P Pappachan, M Degeling, R Yus, A Das, S Bhagavatula, W Melicher, ...
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
Hey Alexa, is this skill safe?: Taking a closer look at the Alexa skill ecosystem
C Lentzsch, SJ Shah, B Andow, M Degeling, A Das, W Enck
Network and Distributed Systems Security (NDSS) Symposium2021, 2021
Defending tor from network adversaries: A case study of network path prediction
J Juen, A Johnson, A Das, N Borisov, M Caesar
Proceedings on Privacy Enhancing Technologies 2015 (2), 171-187, 2015
Enabling live video analytics with a scalable and privacy-aware framework
J Wang, B Amos, A Das, P Pillai, N Sadeh, M Satyanarayanan
ACM Transactions on Multimedia Computing, Communications, and Applications …, 2018
How risky are real users' IFTTT applets?
C Cobb, M Surbatovich, A Kawakami, M Sharif, L Bauer, A Das, L Jia
Proceedings of the Sixteenth USENIX Conference on Usable Privacy and …, 2020
Every move you make: Exploring practical issues in smartphone motion sensor fingerprinting and countermeasures
A Das, N Borisov, E Chou
Proceedings on Privacy Enhancing Technologies 2018 (1), 88-108, 2018
Exploring ways to mitigate sensor-based smartphone fingerprinting
A Das, N Borisov, M Caesar
arXiv preprint arXiv:1503.01874, 2015
The system can't perform the operation now. Try again later.
Articles 1–20