publications

  1. supplychain.jpg
    The Inventory is Dark and Full of Misinformation: Understanding the Abuse of Ad Inventory Pooling in the Ad-Tech Supply Chain
    Yash Vekaria, Rishab Nithyanand, and Zubair Shafiq
    IEEE Symposium on Security & Privacy, 2024
  2. apophanies-yt.png.jpg
    Apophanies or Epiphanies? How Auditing Methodologies Can Impact Our Understanding of YouTube’s Recommendation Systems
    Sarmad Chandio, Daniyal Dar, and Rishab Nithyanand
    International AAAI Conference on Web and Social Media (ICWSM), 2024
  1. maximize_clips.png.jpg
    AI and the Law: Can the Legal System Help Us Maximize Paperclips and Minimize Deaths?
    Mihailis E. Diamantis, Rebekah Cochran, and Miranda Dam
    In Technology Ethics, 2023
  2. employed_algorithms.png.jpg
    Employed Algorithms: A labor model for corporate liability for AI
    Mihailis E Diamantis
    Duke Law Journal, 2023
  3. starlink_0.png.jpg
    Making Sense of Constellations: Methodologies for Understanding Starlink’s Scheduling Algorithms
    Hammas Bin Tanveer, Mike Puchol, Rachee Singh, Antonio Bianchi, and Rishab Nithyanand
    ACM International Conference on Emerging Networking Experiments and Technologies (CoNEXT), 2023
  4. disclosures.png.jpg
    Forms of Disclosure: The Path to Automated Data Privacy Audits
    Mihailis Diamantis, Maaz Bin Musa, Lucas Ausberger, and Rishab Nithyanand
    Harvard Journal of Law & Technology (Forthcoming), 2023
  5. glowing.png.jpg
    Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild
    Hammas Bin Tanveer, Paul Pearce, Rachee Singh, and Rishab Nithyanand
    USENIX Security Symposium, 2023
  6. morbid.png.jpg
    The Morbid Realities of Social Media: An Investigation into the Misinformation Shared by the Deceased Victims of COVID-19
    Hussam Habib, and Rishab Nithyanand
    International AAAI Conference on Web and Social Media (ICWSM), 2023
  1. youtube.png.jpg
    Paying Attention to the Algorithm Behind the Curtain: Bringing Transparency to YouTube’s Demonetization Algorithms
    Arun Dunna, Katherine Keith, Ethan Zuckerman, Narseo Vallina-Rodriguez, Brendan O’Connor, and Rishab Nithyanand
    ACM Conference on Computer Supported Cooperative Work (CSCW), 2022
  2. misogyny.png.jpg
    Pathways to Radical Misogyny: How Participation, Interaction, and Perception in Online Communities Increase Radical Behavior
    Hussam Habib, Padmini Srinivasan, and Rishab Nithyanand
    ACM Conference on Computer Supported Cooperative Work (CSCW), 2022
  3. media_reddit.png.jpg
    Exploring the Magnitude and Effects of Media Influence on Reddit
    Hussam Habib, and Rishab Nithyanand
    International AAAI Conference on Web and Social Media (ICWSM), 2022
  4. reddit_interventions.png.jpg
    Are Proactive Interventions for Reddit Communities Feasible?
    Hussam Habib, Maaz Bin Musa, Fareed Zaffar, and Rishab Nithyanand
    International AAAI Conference on Web and Social Media (ICWSM), 2022
  5. vaccines.png.jpg
    Relationships Among Vaccination Attitudes, Social Media Use, and Activist vs. Radical Behavior
    Ryan Stoldt, Andrew High, Ashley Peterson, Kathryn Biddle, Raven Maragh-Lloyd, Rishab Nithyanand, Brian Ekdale, Timothy Havens, Hussam Habib, and John Thiede
    72nd Annual International Communication Association Conference (ICA), 2022
  6. mxmult.png.jpg
    When Are Cache-Oblivious Algorithms Cache Adaptive? A Case Study of Matrix Multiplication and Sorting
    Arghya Bhattacharya, Helen Xu, Abiyaz Chowdhury, Rezaul Chowdhury, Rathish Das, Rob Johnson, Rishab Nithyanand, and Michael Bender
    European Symposium on Algorithms (ESA), 2022
  7. atom.png.jpg
    ATOM: A Generalizable Technique for Inferring Tracker-Advertiser Data Sharing in the Online Behavioral Advertising Ecosystem
    [Andreas Pfitzmann Award Runner-up]
    Maaz Bin Musa, and Rishab Nithyanand
    Privacy Enhancing Technologies Symposium (PETS), 2022
  1. corporate_mind.png.jpg
    The Extended Corporate Mind: When Corporations Use AI to Break the Law
    Mihailis E Diamantis
    North Carolina Law Review, 2020
  2. apophanies.png.jpg
    Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web
    Suleman Ahmad, Daniyal Dar, Narseo Vallina-Rodriguez, Fareed Zaffar, and Rishab Nithyanand
    The Web Conference (WWW), 2020
  3. sharing.png.jpg
    Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding
    John Cook, Rishab Nithyanand, and Zubair Shafiq
    Privacy Enhancing Technologies Symposium (PETS), 2020
  4. extortion.png.jpg
    Extortion or Expansion? An investigation into the costs and consequences of ICANN’s gTLD experiments
    Shahrooz Pouryousef, Daniyal Dar, Suleman Ahmad, Phillipa Gill, and Rishab Nithyanand
    Passive and Active Measurement Conference (PAM), 2020
  1. privileging_privacy.png.jpg
    Privileging Privacy: Confidentiality as a source of fourth amendment protection
    Mihailis E Diamantis
    University of Pennsylvania Journal of Constitutional Law, 2018
  2. tor.png.jpg
    Characterizing the Nature and Dynamics of Tor Exit Blocking
    Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, and Vern Paxson
    Applied Networking Research Workshop (ANRW), 2018
  3. haystack.png.jpg
    Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem
    Abbas Razaghpanah, Rishab Nithyanand, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Mark Allman, Christian Kreibich, and Phillipa Gill
    Network and Distributed System Security Symposium (NDSS), 2018
  1. synthetic_persons.png.jpg
    Of, for, and by the people: the legal lacuna of synthetic persons
    Joanna J Bryson, Mihailis E Diamantis, and Thomas D Grant
    Artificial Intelligence and Law, 2017
  2. censorship.png.jpg
    A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography
    Shinyoung Cho, Rishab Nithyanand, Abbas Razaghpanah, and Phillipa Gill
    International Conference on emerging Networking EXperiments and Technologies (CoNEXT), 2017
  3. political.png.jpg
    Measuring Offensive Speech in Online Political Discourse
    Rishab Nithyanand, Brian Schaffner, and Phillipa Gill
    USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2017
  4. tor.png.jpg
    Characterizing the Nature and Dynamics of Tor Exit Blocking
    Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, and Vern Paxson
    USENIX Security Symposium, 2017
  1. games.png.jpg
    Games without Frontiers: Investigating Video Games as a Covert Channel
    Bridger Hahn, Rishab Nithyanand, Phillipa Gill, and Rob Johnson
    IEEE European Symposium on Security and Privacy (EuroS&P), 2016
  2. tor-hacker.png.jpg
    Measuring and Mitigating AS-level Adversaries Against Tor
    Rishab Nithyanand, Oleksii Starov, Phillipa Gill, Adva Zair, and Michael Schapira
    23rd Annual Network and Distributed System Security Symposium (NDSS), 2016
  3. adblocking.png.jpg
    Adblocking and Counter Blocking: A Slice of the Arms Race
    Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, and Steven J. Murdoch
    6th USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2016
    1. wf.png.jpg
      A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses
      Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, and Ian Goldberg
      ACM SIGSAC Conference on Computer and Communications Security (CCS), 2014
    2. wf.png.jpg
      Effective Attacks and Provable Defenses for Website Fingerprinting
      Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg
      USENIX Security Symposium, 2014
    3. wf.png.jpg
      CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense
      Xiang Cai, Rishab Nithyanand, and Rob Johnson
      Workshop on Privacy in the Electronic Society (WPES), 2014
    4. wf.png.jpg
      Glove: A Bespoke Website Fingerprinting Defense
      Rishab Nithyanand, Xiang Cai, and Rob Johnson
      Workshop on Privacy in the Electronic Society (WPES), 2014
    1. passwords.png.jpg
      The password allocation problem: strategies for reusing passwords effectively
      Rishab Nithyanand, and Rob Johnson
      Workshop on Privacy in the Electronic Society (WPES), 2013
    1. pufs.png.jpg
      A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem
      Rishab Nithyanand, and John Solis
      IEEE Symposium on Security and Privacy Workshops, 2012
    1. dert.png.jpg
      Usability of Display-Equipped RFID Tags for Security Purposes
      Alfred Kobsa, Rishab Nithyanand, Gene Tsudik, and Ersin Uzun
      European Symposium on Research in Computer Security (ESORICS), 2011
    1. rfid.png.jpg
      Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems
      Rishab Nithyanand, Gene Tsudik, and Ersin Uzun
      European Symposium on Research in Computer Security (ESORICS), 2010
    2. groupthink.png.jpg
      Groupthink: usability of secure group association for wireless devices
      Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, and Ersin Uzun
      International Conference on Ubiquitous Computing (UbiComp), 2010