@article{Oakland-2024,title={{The Inventory is Dark and Full of Misinformation: Understanding
the Abuse of Ad Inventory Pooling in the Ad-Tech Supply Chain}},author={Vekaria, Yash and Nithyanand, Rishab and Shafiq, Zubair},journal={IEEE Symposium on Security \& Privacy},year={2024},}
Forms of Disclosure: The Path to Automated Data Privacy Audits
Mihailis Diamantis, Maaz Bin Musa, Lucas Ausberger, and Rishab Nithyanand
Harvard Journal of Law & Technology (Forthcoming), 2023
@article{JOLT-2023,title={{Forms of Disclosure: The Path to Automated Data Privacy Audits}},author={Diamantis, Mihailis and Musa, Maaz Bin and Ausberger, Lucas and Nithyanand, Rishab},journal={Harvard Journal of Law \& Technology (Forthcoming)},volume={37},number={3},year={2023},}
Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild
Hammas Bin Tanveer, Paul Pearce, Rachee Singh, and Rishab Nithyanand
@article{USENIX-2023,title={Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild},author={Tanveer, Hammas Bin and Pearce, Paul and Singh, Rachee and Nithyanand, Rishab},journal={USENIX Security Symposium},year={2023},}
The Morbid Realities of Social Media: An Investigation into the
Misinformation Shared by the Deceased Victims of COVID-19
Hussam Habib, and Rishab Nithyanand
International AAAI Conference on Web and Social Media (ICWSM), 2023
@article{icwsm-2023,title={The Morbid Realities of Social Media: An Investigation into the
Misinformation Shared by the Deceased Victims of COVID-19},author={Habib, Hussam and Nithyanand, Rishab},journal={International AAAI Conference on Web and Social Media (ICWSM)},year={2023},}
Paying Attention to the Algorithm Behind the Curtain: Bringing
Transparency to YouTube’s Demonetization Algorithms
@article{cscw-2022-1,author={Dunna, Arun and Keith, Katherine and Zuckerman, Ethan and Vallina-Rodriguez, Narseo and O'Connor, Brendan and Nithyanand, Rishab},title={Paying Attention to the Algorithm Behind the Curtain: Bringing
Transparency to YouTube's Demonetization Algorithms},journal={ACM Conference on Computer Supported Cooperative Work (CSCW)},year={2022},}
Pathways to Radical Misogyny: How Participation, Interaction, and
Perception in Online Communities Increase Radical Behavior
Hussam Habib, Padmini Srinivasan, and Rishab Nithyanand
ACM Conference on Computer Supported Cooperative Work (CSCW), 2022
@article{cscw-2022-2,title={Pathways to Radical Misogyny: How Participation, Interaction, and
Perception in Online Communities Increase Radical Behavior},author={Habib, Hussam and Srinivasan, Padmini and Nithyanand, Rishab},journal={ACM Conference on Computer Supported Cooperative Work (CSCW)},year={2022},}
Exploring the Magnitude and Effects of Media Influence on Reddit
Hussam Habib, and Rishab Nithyanand
International AAAI Conference on Web and Social Media (ICWSM), 2022
@article{icwsm-2022-2,title={Exploring the Magnitude and Effects of Media Influence on Reddit},author={Habib, Hussam and Nithyanand, Rishab},journal={International AAAI Conference on Web and Social Media (ICWSM)},year={2022},}
Are Proactive Interventions for Reddit Communities Feasible?
Hussam Habib, Maaz Bin Musa, Fareed Zaffar, and Rishab Nithyanand
International AAAI Conference on Web and Social Media (ICWSM), 2022
@article{icwsm-2022-1,author={Habib, Hussam and Musa, Maaz Bin and Zaffar, Fareed and Nithyanand, Rishab},title={Are Proactive Interventions for Reddit Communities Feasible?},journal={International AAAI Conference on Web and Social Media (ICWSM)},year={2022},}
Relationships Among Vaccination Attitudes, Social Media Use, and Activist vs. Radical Behavior
Ryan Stoldt, Andrew High, Ashley Peterson, Kathryn Biddle, Raven Maragh-Lloyd, Rishab Nithyanand, Brian Ekdale, Timothy Havens, Hussam Habib, and John Thiede
72nd Annual International Communication Association Conference (ICA), 2022
@article{ica-2022,title={Relationships Among Vaccination Attitudes, Social Media Use, and Activist vs. Radical Behavior},author={Stoldt, Ryan and High, Andrew and Peterson, Ashley and Biddle, Kathryn and Maragh-Lloyd, Raven and Nithyanand, Rishab and Ekdale, Brian and Havens, Timothy and Habib, Hussam and Thiede, John},journal={72nd Annual International Communication Association Conference (ICA)},year={2022},}
When Are Cache-Oblivious Algorithms Cache Adaptive? A Case Study of Matrix Multiplication and Sorting
Arghya Bhattacharya, Helen Xu, Abiyaz Chowdhury, Rezaul Chowdhury, Rathish Das, Rob Johnson, Rishab Nithyanand, and Michael Bender
@article{esa-2022,title={When Are Cache-Oblivious Algorithms Cache Adaptive? A Case Study of Matrix Multiplication and Sorting},author={Bhattacharya, Arghya and Xu, Helen and Chowdhury, Abiyaz and Chowdhury, Rezaul and Das, Rathish and Johnson, Rob and Nithyanand, Rishab and Bender, Michael},journal={European Symposium on Algorithms (ESA)},year={2022},}
ATOM: A Generalizable Technique for Inferring Tracker-Advertiser Data Sharing in the Online Behavioral Advertising Ecosystem
@article{pets-2022,title={ATOM: A Generalizable Technique for Inferring Tracker-Advertiser Data Sharing in the Online Behavioral Advertising Ecosystem},author={Musa, Maaz Bin and Nithyanand, Rishab},journal={Privacy Enhancing Technologies Symposium (PETS)},year={2022},award={Andreas Pfitzmann Award Runner-up},}
Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web
@article{Ahmad-WWW2020,author={Ahmad, Suleman and Dar, Daniyal and Vallina-Rodriguez, Narseo and Zaffar, Fareed and Nithyanand, Rishab},journal={The Web Conference (WWW)},title={Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web},year={2020},}
Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding
@article{Cook-PETS2020,author={Cook, John and Nithyanand, Rishab and Shafiq, Zubair},journal={Privacy Enhancing Technologies Symposium (PETS)},title={Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding},year={2020},volume={abs/1907.07275},}
Extortion or Expansion? An investigation into the costs and consequences of ICANN’s gTLD experiments
@article{Pouryousef-PAM2020,author={Pouryousef, Shahrooz and Dar, Daniyal and Ahmad, Suleman and Gill, Phillipa and Nithyanand, Rishab},journal={Passive and Active Measurement Conference (PAM)},title={Extortion or Expansion? An investigation into the costs and consequences of ICANN's gTLD experiments},year={2020},}
Characterizing the Nature and Dynamics of Tor Exit Blocking
Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, and Vern Paxson
@article{DBLP:conf/anrw/SinghNAPTGP18,author={Singh, Rachee and Nithyanand, Rishab and Afroz, Sadia and Pearce, Paul and Tschantz, Michael Carl and Gill, Phillipa and Paxson, Vern},title={Characterizing the Nature and Dynamics of Tor Exit Blocking},journal={Applied Networking Research Workshop (ANRW)},pages={23},year={2018},}
Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile
Tracking Ecosystem
Abbas Razaghpanah, Rishab Nithyanand, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Mark Allman, Christian Kreibich, and Phillipa Gill
Network and Distributed System Security Symposium (NDSS), 2018
@article{DBLP:conf/ndss/RazaghpanahNVSA18,author={Razaghpanah, Abbas and Nithyanand, Rishab and Vallina{-}Rodriguez, Narseo and Sundaresan, Srikanth and Allman, Mark and Kreibich, Christian and Gill, Phillipa},title={Apps, Trackers, Privacy, and Regulators: {A} Global Study of the Mobile
Tracking Ecosystem},journal={Network and Distributed System Security Symposium (NDSS)},year={2018},}
A Churn for the Better: Localizing Censorship using Network-level
Path Churn and Network Tomography
Shinyoung Cho, Rishab Nithyanand, Abbas Razaghpanah, and Phillipa Gill
International Conference on emerging Networking EXperiments and
Technologies (CoNEXT), 2017
@article{DBLP:conf/conext/ChoNRG17,author={Cho, Shinyoung and Nithyanand, Rishab and Razaghpanah, Abbas and Gill, Phillipa},title={A Churn for the Better: Localizing Censorship using Network-level
Path Churn and Network Tomography},journal={International Conference on emerging Networking EXperiments and
Technologies (CoNEXT)},pages={81--87},year={2017},}
Measuring Offensive Speech in Online Political Discourse
Rishab Nithyanand, Brian Schaffner, and Phillipa Gill
USENIX Workshop on Free and Open Communications on the Internet
(FOCI), 2017
@article{DBLP:conf/uss/NithyanandSG17,author={Nithyanand, Rishab and Schaffner, Brian and Gill, Phillipa},title={Measuring Offensive Speech in Online Political Discourse},journal={{USENIX} Workshop on Free and Open Communications on the Internet
(FOCI)},year={2017},}
Characterizing the Nature and Dynamics of Tor Exit Blocking
Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, and Vern Paxson
@article{DBLP:conf/uss/SinghNAPTGP17,author={Singh, Rachee and Nithyanand, Rishab and Afroz, Sadia and Pearce, Paul and Tschantz, Michael Carl and Gill, Phillipa and Paxson, Vern},title={Characterizing the Nature and Dynamics of Tor Exit Blocking},journal={{USENIX} Security Symposium},pages={325--341},year={2017},}
Games without Frontiers: Investigating Video Games as a Covert Channel
Bridger Hahn, Rishab Nithyanand, Phillipa Gill, and Rob Johnson
IEEE European Symposium on Security and Privacy (EuroS&P), 2016
@article{DBLP:conf/eurosp/HahnNGJ16,author={Hahn, Bridger and Nithyanand, Rishab and Gill, Phillipa and Johnson, Rob},title={Games without Frontiers: Investigating Video Games as a Covert Channel},journal={{IEEE} European Symposium on Security and Privacy (EuroS{\&}P)},pages={63--77},year={2016},crossref={DBLP:conf/eurosp/2016},}
Measuring and Mitigating AS-level Adversaries Against Tor
Rishab Nithyanand, Oleksii Starov, Phillipa Gill, Adva Zair, and Michael Schapira
23rd Annual Network and Distributed System Security Symposium
(NDSS), 2016
@article{DBLP:conf/ndss/NithyanandSGZS16,author={Nithyanand, Rishab and Starov, Oleksii and Gill, Phillipa and Zair, Adva and Schapira, Michael},title={Measuring and Mitigating AS-level Adversaries Against Tor},journal={23rd Annual Network and Distributed System Security Symposium
(NDSS)},year={2016},crossref={DBLP:conf/ndss/2016},}
Adblocking and Counter Blocking: A Slice of the Arms Race
Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, and Steven J. Murdoch
6th USENIX Workshop on Free and Open Communications on the
Internet (FOCI), 2016
@article{DBLP:conf/uss/NithyanandKJVFP16,author={Nithyanand, Rishab and Khattak, Sheharbano and Javed, Mobin and Vallina{-}Rodriguez, Narseo and Falahrastegar, Marjan and Powles, Julia E. and Cristofaro, Emiliano De and Haddadi, Hamed and Murdoch, Steven J.},title={Adblocking and Counter Blocking: {A} Slice of the Arms Race},journal={6th {USENIX} Workshop on Free and Open Communications on the
Internet (FOCI)},year={2016},crossref={DBLP:conf/uss/2016foci},}
A Systematic Approach to Developing and Evaluating Website Fingerprinting
Defenses
Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, and Ian Goldberg
ACM SIGSAC Conference on Computer and Communications Security
(CCS), 2014
@article{DBLP:conf/ccs/CaiNWJG14,author={Cai, Xiang and Nithyanand, Rishab and Wang, Tao and Johnson, Rob and Goldberg, Ian},title={A Systematic Approach to Developing and Evaluating Website Fingerprinting
Defenses},journal={ACM {SIGSAC} Conference on Computer and Communications Security
(CCS)},pages={227--238},year={2014},crossref={DBLP:conf/ccs/2014},}
Effective Attacks and Provable Defenses for Website Fingerprinting
Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg
@article{DBLP:conf/uss/WangCNJG14,author={Wang, Tao and Cai, Xiang and Nithyanand, Rishab and Johnson, Rob and Goldberg, Ian},title={Effective Attacks and Provable Defenses for Website Fingerprinting},journal={{USENIX} Security Symposium},pages={143--157},year={2014},crossref={DBLP:conf/uss/2014},}
CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense
Xiang Cai, Rishab Nithyanand, and Rob Johnson
Workshop on Privacy in the Electronic Society (WPES), 2014
@article{DBLP:conf/wpes/CaiNJ14,author={Cai, Xiang and Nithyanand, Rishab and Johnson, Rob},title={CS-BuFLO: {A} Congestion Sensitive Website Fingerprinting Defense},journal={Workshop on Privacy in the Electronic Society (WPES)},pages={121--130},year={2014},crossref={DBLP:conf/wpes/2014},}
Glove: A Bespoke Website Fingerprinting Defense
Rishab Nithyanand, Xiang Cai, and Rob Johnson
Workshop on Privacy in the Electronic Society (WPES), 2014
@article{DBLP:conf/wpes/NithyanandCJ14,author={Nithyanand, Rishab and Cai, Xiang and Johnson, Rob},title={Glove: {A} Bespoke Website Fingerprinting Defense},journal={Workshop on Privacy in the Electronic Society (WPES)},pages={131--134},year={2014},crossref={DBLP:conf/wpes/2014},}
The password allocation problem: strategies for reusing passwords
effectively
Rishab Nithyanand, and Rob Johnson
Workshop on Privacy in the Electronic Society (WPES), 2013
@article{DBLP:conf/wpes/NithyanandJ13,author={Nithyanand, Rishab and Johnson, Rob},title={The password allocation problem: strategies for reusing passwords
effectively},journal={Workshop on Privacy in the Electronic Society (WPES)},pages={255--260},year={2013},crossref={DBLP:conf/wpes/2013},}
A Theoretical Analysis: Physical Unclonable Functions and the Software
Protection Problem
Rishab Nithyanand, and John Solis
IEEE Symposium on Security and Privacy Workshops, 2012
@article{DBLP:conf/sp/NithyanandS12,author={Nithyanand, Rishab and Solis, John},title={A Theoretical Analysis: Physical Unclonable Functions and the Software
Protection Problem},journal={{IEEE} Symposium on Security and Privacy Workshops},pages={1--11},year={2012},crossref={DBLP:conf/sp/2012w},}
Usability of Display-Equipped RFID Tags for Security Purposes
Alfred Kobsa, Rishab Nithyanand, Gene Tsudik, and Ersin Uzun
European Symposium on Research in Computer Security (ESORICS), 2011
@article{DBLP:conf/esorics/KobsaNTU11,author={Kobsa, Alfred and Nithyanand, Rishab and Tsudik, Gene and Uzun, Ersin},title={Usability of Display-Equipped {RFID} Tags for Security Purposes},journal={European Symposium on Research in Computer Security (ESORICS)},pages={434--451},year={2011},}
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems
Rishab Nithyanand, Gene Tsudik, and Ersin Uzun
European Symposium on Research in Computer Security (ESORICS), 2010
@article{DBLP:conf/esorics/NithyanandTU10,author={Nithyanand, Rishab and Tsudik, Gene and Uzun, Ersin},title={Readers Behaving Badly - Reader Revocation in PKI-Based {RFID} Systems},journal={European Symposium on Research in Computer Security (ESORICS)},pages={19--36},year={2010},}
Groupthink: usability of secure group association for wireless devices
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, and Ersin Uzun
International Conference on Ubiquitous Computing (UbiComp), 2010
@article{DBLP:conf/huc/NithyanandSTU10,author={Nithyanand, Rishab and Saxena, Nitesh and Tsudik, Gene and Uzun, Ersin},title={Groupthink: usability of secure group association for wireless devices},journal={International Conference on Ubiquitous Computing (UbiComp)},pages={331--340},year={2010},}