Follow
Rahul Chatterjee
Rahul Chatterjee
Assistant Professor at University of Wisconsin--Madison
Verified email at cs.wisc.edu - Homepage
Title
Cited by
Cited by
Year
The spyware used in intimate partner violence
R Chatterjee, P Doerfler, H Orgad, S Havron, J Palmer, D Freed, K Levy, ...
2018 IEEE Symposium on Security and Privacy (SP), 441-458, 2018
1242018
The Pythia {PRF} Service
A Everspaugh, R Chaterjee, S Scott, A Juels, T Ristenpart
24th {USENIX} Security Symposium ({USENIX} Security 15), 547-562, 2015
832015
Cracking-resistant password vaults using natural language encoders
R Chatterjee, J Bonneau, A Juels, T Ristenpart
2015 IEEE Symposium on Security and Privacy, 481-498, 2015
812015
Measurement of the inclusive jet cross section in pp collisions at sqrt (s)= 2.76 TeV
CMS collaboration
arXiv preprint arXiv:1512.06212, 2015
772015
Clinical Computer Security for Victims of Intimate Partner Violence.
S Havron, D Freed, R Chatterjee, D McCoy, N Dell, T Ristenpart
USENIX Security Symposium, 105-122, 2019
702019
Beyond credential stuffing: Password similarity models using neural networks
B Pal, T Daniel, R Chatterjee, T Ristenpart
2019 IEEE Symposium on Security and Privacy (SP), 417-434, 2019
692019
pASSWORD tYPOS and How to Correct Them Securely
R Chatterjee, A Athalye, D Akhawe, A Juels, T Ristenpart
https://www.cs.cornell.edu/~rahul/papers/pwtypos.pdf, 2016
552016
" Is My Phone Hacked?" Analyzing Clinical Computer Security Interventions With Survivors of Intimate Partner Violence
D Freed, S Havron, E Tseng, A Gallardo, R Chatterjee, T Ristenpart, ...
Proceedings of the ACM on Human-Computer Interaction 3 (CSCW), 1-24, 2019
522019
Protocols for checking compromised credentials
L Li, B Pal, J Ali, N Sullivan, R Chatterjee, T Ristenpart
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
472019
Invisible perturbations: Physical adversarial examples exploiting the rolling shutter effect
A Sayles, A Hooda, M Gupta, R Chatterjee, E Fernandes
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
282021
A new distribution-sensitive secure sketch and popularity-proportional hashing
J Woodage, R Chatterjee, Y Dodis, A Juels, T Ristenpart
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
272017
The typtop system: Personalized typo-tolerant password checking
R Chatterjee, J Woodage, Y Pnueli, A Chowdhury, T Ristenpart
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
222017
Unsupervised and supervised classification of hyperspectral imaging data using projection pursuit and Markov random field segmentation
A Sarkar, A Vulimiri, S Paul, MJ Iqbal, A Banerjee, R Chatterjee, SS Ray
International Journal of Remote Sensing 33 (18), 5799-5818, 2012
172012
Multisketches: Practical secure sketches using off-the-shelf biometric matching algorithms
R Chatterjee, MS Riazi, T Chowdhury, E Marasco, F Koushanfar, A Juels
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
132019
How secure are our computer systems courses?
M Almansoori, J Lam, E Fang, K Mulligan, AG Soosai Raj, R Chatterjee
Proceedings of the 2020 ACM conference on international computing education …, 2020
112020
Data privacy in trigger-action systems
Y Chen, AR Chowdhury, R Wang, A Sabelfeld, R Chatterjee, E Fernandes
2021 IEEE Symposium on Security and Privacy (SP), 501-518, 2021
102021
Might i get pwned: A second generation compromised credential checking service
B Pal, M Islam, MS Bohuk, N Sullivan, L Valenta, T Whalen, C Wood, ...
31st USENIX Security Symposium (USENIX Security 22), 1831-1848, 2022
8*2022
Sok: Authentication in augmented and virtual reality
S Stephenson, B Pal, S Fan, E Fernandes, Y Zhao, R Chatterjee
2022 IEEE Symposium on Security and Privacy (SP), 267-284, 2022
62022
Identifying gaps in the secure programming knowledge and skills of students
J Lam, E Fang, M Almansoori, R Chatterjee, AG Soosai Raj
Proceedings of the 53rd ACM Technical Symposium on Computer Science …, 2022
62022
Textbook underflow: Insufficient security discussions in textbooks used for computer systems courses
M Almansoori, J Lam, E Fang, AG Soosai Raj, R Chatterjee
Proceedings of the 52nd ACM Technical Symposium on Computer Science …, 2021
52021
The system can't perform the operation now. Try again later.
Articles 1–20