Towards measuring quality of service in untrusted multi-vendor service function chains: Balancing security and resource consumption PK Vairam, G Mitra, V Manoharan, C Rebeiro, B Ramamurthy IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 163-171, 2019 | 9 | 2019 |
White mirror: Leaking sensitive information from interactive Netflix movies using encrypted traffic analysis G Mitra, PK Vairam, P Slpsk, N Chandrachoodan, K V Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 122-124, 2019 | 8 | 2019 |
ApproxBC: Blockchain design alternatives for approximation-tolerant resource-constrained applications PK Vairam, G Mitra, C Rebeiro, B Ramamurthy, K Veezhinathan IEEE Communications Standards Magazine 2 (3), 45-51, 2018 | 5 | 2018 |
Depending on HTTP/2 for privacy? Good luck! G Mitra, PK Vairam, P Slpsk, N Chandrachoodan, V Kamakoti 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020 | 3 | 2020 |
Snoopy: A Webpage Fingerprinting Framework With Finite Query Model for Mass-Surveillance G Mitra, PK Vairam, S Saha, N Chandrachoodan, V Kamakoti IEEE Transactions on Dependable and Secure Computing, 2022 | 1 | 2022 |
Systematically Assessing the Security Risks of AI/ML-enabled Connected Healthcare Systems M Elnawawy, M Hallajiyan, G Mitra, S Iqbal, K Pattabiraman arXiv preprint arXiv:2401.17136, 2024 | | 2024 |
ICS-Sniper: A Targeted Blackhole Attack on Encrypted ICS Traffic G Mitra, P Dash, YE Yao, A Mehta, K Pattabiraman arXiv preprint arXiv:2312.06140, 2023 | | 2023 |