@article{Oakland-2024,title={{The Inventory is Dark and Full of Misinformation: Understanding
the Abuse of Ad Inventory Pooling in the Ad-Tech Supply Chain}},author={Vekaria, Yash and Nithyanand, Rishab and Shafiq, Zubair},journal={IEEE Symposium on Security \& Privacy},year={2024},}
Apophanies or Epiphanies? How Auditing Methodologies Can Impact
Our Understanding of YouTube’s Recommendation Systems
Sarmad Chandio, Daniyal Dar, and Rishab Nithyanand
International AAAI Conference on Web and Social Media (ICWSM), 2024
@article{ICWSM-2024,title={{Apophanies or Epiphanies? How Auditing Methodologies Can Impact
Our Understanding of YouTube's Recommendation Systems}},author={Chandio, Sarmad and Dar, Daniyal and Nithyanand, Rishab},journal={International AAAI Conference on Web and Social Media (ICWSM)},year={2024},}
AI and the Law: Can the Legal System Help Us Maximize Paperclips and Minimize Deaths?
Mihailis E. Diamantis, Rebekah Cochran, and Miranda Dam
@incollection{DiamantisMihailisE20232Aat,title={AI and the Law: Can the Legal System Help Us Maximize Paperclips and Minimize Deaths?},address={},author={Diamantis, Mihailis E. and Cochran, Rebekah and Dam, Miranda},booktitle={Technology Ethics},edition={1},editor={Robson, Gregory J. and Tsou, Jonathan Y.},doi={10.4324/9781003189466-32},isbn={9781032038704},language={eng},pages={242 - 249},publisher={Routledge},year={2023},}
Employed Algorithms: A labor model for corporate liability for AI
@article{diamantis2023employed,title={Employed Algorithms: A labor model for corporate liability for AI},author={Diamantis, Mihailis E},journal={Duke Law Journal},volume={72},number={4},year={2023},}
Making Sense of Constellations: Methodologies for Understanding
Starlink’s Scheduling Algorithms
Hammas Bin Tanveer, Mike Puchol, Rachee Singh, Antonio Bianchi, and Rishab Nithyanand
ACM International Conference on Emerging Networking Experiments
and Technologies (CoNEXT), 2023
@article{CoNEXT-2023,title={{Making Sense of Constellations: Methodologies for Understanding
Starlink's Scheduling Algorithms}},author={Tanveer, Hammas Bin and Puchol, Mike and Singh, Rachee and Bianchi, Antonio and Nithyanand, Rishab},year={2023},journal={ACM International Conference on Emerging Networking Experiments
and Technologies (CoNEXT)},}
Forms of Disclosure: The Path to Automated Data Privacy Audits
Mihailis Diamantis, Maaz Bin Musa, Lucas Ausberger, and Rishab Nithyanand
Harvard Journal of Law & Technology (Forthcoming), 2023
@article{JOLT-2023,title={{Forms of Disclosure: The Path to Automated Data Privacy Audits}},author={Diamantis, Mihailis and Musa, Maaz Bin and Ausberger, Lucas and Nithyanand, Rishab},journal={Harvard Journal of Law \& Technology (Forthcoming)},volume={37},number={3},year={2023},}
Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild
Hammas Bin Tanveer, Paul Pearce, Rachee Singh, and Rishab Nithyanand
@article{USENIX-2023,title={Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild},author={Tanveer, Hammas Bin and Pearce, Paul and Singh, Rachee and Nithyanand, Rishab},journal={USENIX Security Symposium},year={2023},}
The Morbid Realities of Social Media: An Investigation into the
Misinformation Shared by the Deceased Victims of COVID-19
Hussam Habib, and Rishab Nithyanand
International AAAI Conference on Web and Social Media (ICWSM), 2023
@article{icwsm-2023,title={The Morbid Realities of Social Media: An Investigation into the
Misinformation Shared by the Deceased Victims of COVID-19},author={Habib, Hussam and Nithyanand, Rishab},journal={International AAAI Conference on Web and Social Media (ICWSM)},year={2023},}
Paying Attention to the Algorithm Behind the Curtain: Bringing
Transparency to YouTube’s Demonetization Algorithms
@article{cscw-2022-1,author={Dunna, Arun and Keith, Katherine and Zuckerman, Ethan and Vallina-Rodriguez, Narseo and O'Connor, Brendan and Nithyanand, Rishab},title={Paying Attention to the Algorithm Behind the Curtain: Bringing
Transparency to YouTube's Demonetization Algorithms},journal={ACM Conference on Computer Supported Cooperative Work (CSCW)},year={2022},}
Pathways to Radical Misogyny: How Participation, Interaction, and
Perception in Online Communities Increase Radical Behavior
Hussam Habib, Padmini Srinivasan, and Rishab Nithyanand
ACM Conference on Computer Supported Cooperative Work (CSCW), 2022
@article{cscw-2022-2,title={Pathways to Radical Misogyny: How Participation, Interaction, and
Perception in Online Communities Increase Radical Behavior},author={Habib, Hussam and Srinivasan, Padmini and Nithyanand, Rishab},journal={ACM Conference on Computer Supported Cooperative Work (CSCW)},year={2022},}
Exploring the Magnitude and Effects of Media Influence on Reddit
Hussam Habib, and Rishab Nithyanand
International AAAI Conference on Web and Social Media (ICWSM), 2022
@article{icwsm-2022-2,title={Exploring the Magnitude and Effects of Media Influence on Reddit},author={Habib, Hussam and Nithyanand, Rishab},journal={International AAAI Conference on Web and Social Media (ICWSM)},year={2022},}
Are Proactive Interventions for Reddit Communities Feasible?
Hussam Habib, Maaz Bin Musa, Fareed Zaffar, and Rishab Nithyanand
International AAAI Conference on Web and Social Media (ICWSM), 2022
@article{icwsm-2022-1,author={Habib, Hussam and Musa, Maaz Bin and Zaffar, Fareed and Nithyanand, Rishab},title={Are Proactive Interventions for Reddit Communities Feasible?},journal={International AAAI Conference on Web and Social Media (ICWSM)},year={2022},}
Relationships Among Vaccination Attitudes, Social Media Use, and Activist vs. Radical Behavior
Ryan Stoldt, Andrew High, Ashley Peterson, Kathryn Biddle, Raven Maragh-Lloyd, Rishab Nithyanand, Brian Ekdale, Timothy Havens, Hussam Habib, and John Thiede
72nd Annual International Communication Association Conference (ICA), 2022
@article{ica-2022,title={Relationships Among Vaccination Attitudes, Social Media Use, and Activist vs. Radical Behavior},author={Stoldt, Ryan and High, Andrew and Peterson, Ashley and Biddle, Kathryn and Maragh-Lloyd, Raven and Nithyanand, Rishab and Ekdale, Brian and Havens, Timothy and Habib, Hussam and Thiede, John},journal={72nd Annual International Communication Association Conference (ICA)},year={2022},}
When Are Cache-Oblivious Algorithms Cache Adaptive? A Case Study of Matrix Multiplication and Sorting
Arghya Bhattacharya, Helen Xu, Abiyaz Chowdhury, Rezaul Chowdhury, Rathish Das, Rob Johnson, Rishab Nithyanand, and Michael Bender
@article{esa-2022,title={When Are Cache-Oblivious Algorithms Cache Adaptive? A Case Study of Matrix Multiplication and Sorting},author={Bhattacharya, Arghya and Xu, Helen and Chowdhury, Abiyaz and Chowdhury, Rezaul and Das, Rathish and Johnson, Rob and Nithyanand, Rishab and Bender, Michael},journal={European Symposium on Algorithms (ESA)},year={2022},}
ATOM: A Generalizable Technique for Inferring Tracker-Advertiser Data Sharing in the Online Behavioral Advertising Ecosystem
@article{pets-2022,title={ATOM: A Generalizable Technique for Inferring Tracker-Advertiser Data Sharing in the Online Behavioral Advertising Ecosystem},author={Musa, Maaz Bin and Nithyanand, Rishab},journal={Privacy Enhancing Technologies Symposium (PETS)},year={2022},award={Andreas Pfitzmann Award Runner-up},}
The Extended Corporate Mind: When Corporations Use AI to Break the Law
@article{diamantis2020extended,title={The Extended Corporate Mind: When Corporations Use AI to Break the Law},author={Diamantis, Mihailis E},journal={North Carolina Law Review},volume={98},number={4},pages={893},year={2020},}
Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web
@article{Ahmad-WWW2020,author={Ahmad, Suleman and Dar, Daniyal and Vallina-Rodriguez, Narseo and Zaffar, Fareed and Nithyanand, Rishab},journal={The Web Conference (WWW)},title={Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web},year={2020},}
Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding
@article{Cook-PETS2020,author={Cook, John and Nithyanand, Rishab and Shafiq, Zubair},journal={Privacy Enhancing Technologies Symposium (PETS)},title={Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding},year={2020},volume={abs/1907.07275},}
Extortion or Expansion? An investigation into the costs and consequences of ICANN’s gTLD experiments
@article{Pouryousef-PAM2020,author={Pouryousef, Shahrooz and Dar, Daniyal and Ahmad, Suleman and Gill, Phillipa and Nithyanand, Rishab},journal={Passive and Active Measurement Conference (PAM)},title={Extortion or Expansion? An investigation into the costs and consequences of ICANN's gTLD experiments},year={2020},}
Privileging Privacy: Confidentiality as a source of fourth amendment protection
Mihailis E Diamantis
University of Pennsylvania Journal of Constitutional Law, 2018
@article{diamantis2018privileging,title={Privileging Privacy: Confidentiality as a source of fourth amendment protection},author={Diamantis, Mihailis E},journal={University of Pennsylvania Journal of Constitutional Law},volume={21},number={2},year={2018},}
Characterizing the Nature and Dynamics of Tor Exit Blocking
Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, and Vern Paxson
@article{DBLP:conf/anrw/SinghNAPTGP18,author={Singh, Rachee and Nithyanand, Rishab and Afroz, Sadia and Pearce, Paul and Tschantz, Michael Carl and Gill, Phillipa and Paxson, Vern},title={Characterizing the Nature and Dynamics of Tor Exit Blocking},journal={Applied Networking Research Workshop (ANRW)},pages={23},year={2018},}
Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile
Tracking Ecosystem
Abbas Razaghpanah, Rishab Nithyanand, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Mark Allman, Christian Kreibich, and Phillipa Gill
Network and Distributed System Security Symposium (NDSS), 2018
@article{DBLP:conf/ndss/RazaghpanahNVSA18,author={Razaghpanah, Abbas and Nithyanand, Rishab and Vallina{-}Rodriguez, Narseo and Sundaresan, Srikanth and Allman, Mark and Kreibich, Christian and Gill, Phillipa},title={Apps, Trackers, Privacy, and Regulators: {A} Global Study of the Mobile
Tracking Ecosystem},journal={Network and Distributed System Security Symposium (NDSS)},year={2018},}
Of, for, and by the people: the legal lacuna of synthetic persons
Joanna J Bryson, Mihailis E Diamantis, and Thomas D Grant
@article{bryson2017and,title={Of, for, and by the people: the legal lacuna of synthetic persons},author={Bryson, Joanna J and Diamantis, Mihailis E and Grant, Thomas D},journal={Artificial Intelligence and Law},volume={25},pages={273--291},year={2017},publisher={Springer},}
A Churn for the Better: Localizing Censorship using Network-level
Path Churn and Network Tomography
Shinyoung Cho, Rishab Nithyanand, Abbas Razaghpanah, and Phillipa Gill
International Conference on emerging Networking EXperiments and
Technologies (CoNEXT), 2017
@article{DBLP:conf/conext/ChoNRG17,author={Cho, Shinyoung and Nithyanand, Rishab and Razaghpanah, Abbas and Gill, Phillipa},title={A Churn for the Better: Localizing Censorship using Network-level
Path Churn and Network Tomography},journal={International Conference on emerging Networking EXperiments and
Technologies (CoNEXT)},pages={81--87},year={2017},}
Measuring Offensive Speech in Online Political Discourse
Rishab Nithyanand, Brian Schaffner, and Phillipa Gill
USENIX Workshop on Free and Open Communications on the Internet
(FOCI), 2017
@article{DBLP:conf/uss/NithyanandSG17,author={Nithyanand, Rishab and Schaffner, Brian and Gill, Phillipa},title={Measuring Offensive Speech in Online Political Discourse},journal={{USENIX} Workshop on Free and Open Communications on the Internet
(FOCI)},year={2017},}
Characterizing the Nature and Dynamics of Tor Exit Blocking
Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, and Vern Paxson
@article{DBLP:conf/uss/SinghNAPTGP17,author={Singh, Rachee and Nithyanand, Rishab and Afroz, Sadia and Pearce, Paul and Tschantz, Michael Carl and Gill, Phillipa and Paxson, Vern},title={Characterizing the Nature and Dynamics of Tor Exit Blocking},journal={{USENIX} Security Symposium},pages={325--341},year={2017},}
Games without Frontiers: Investigating Video Games as a Covert Channel
Bridger Hahn, Rishab Nithyanand, Phillipa Gill, and Rob Johnson
IEEE European Symposium on Security and Privacy (EuroS&P), 2016
@article{DBLP:conf/eurosp/HahnNGJ16,author={Hahn, Bridger and Nithyanand, Rishab and Gill, Phillipa and Johnson, Rob},title={Games without Frontiers: Investigating Video Games as a Covert Channel},journal={{IEEE} European Symposium on Security and Privacy (EuroS{\&}P)},pages={63--77},year={2016},crossref={DBLP:conf/eurosp/2016},}
Measuring and Mitigating AS-level Adversaries Against Tor
Rishab Nithyanand, Oleksii Starov, Phillipa Gill, Adva Zair, and Michael Schapira
23rd Annual Network and Distributed System Security Symposium
(NDSS), 2016
@article{DBLP:conf/ndss/NithyanandSGZS16,author={Nithyanand, Rishab and Starov, Oleksii and Gill, Phillipa and Zair, Adva and Schapira, Michael},title={Measuring and Mitigating AS-level Adversaries Against Tor},journal={23rd Annual Network and Distributed System Security Symposium
(NDSS)},year={2016},crossref={DBLP:conf/ndss/2016},}
Adblocking and Counter Blocking: A Slice of the Arms Race
Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, and Steven J. Murdoch
6th USENIX Workshop on Free and Open Communications on the
Internet (FOCI), 2016
@article{DBLP:conf/uss/NithyanandKJVFP16,author={Nithyanand, Rishab and Khattak, Sheharbano and Javed, Mobin and Vallina{-}Rodriguez, Narseo and Falahrastegar, Marjan and Powles, Julia E. and Cristofaro, Emiliano De and Haddadi, Hamed and Murdoch, Steven J.},title={Adblocking and Counter Blocking: {A} Slice of the Arms Race},journal={6th {USENIX} Workshop on Free and Open Communications on the
Internet (FOCI)},year={2016},crossref={DBLP:conf/uss/2016foci},}
A Systematic Approach to Developing and Evaluating Website Fingerprinting
Defenses
Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, and Ian Goldberg
ACM SIGSAC Conference on Computer and Communications Security
(CCS), 2014
@article{DBLP:conf/ccs/CaiNWJG14,author={Cai, Xiang and Nithyanand, Rishab and Wang, Tao and Johnson, Rob and Goldberg, Ian},title={A Systematic Approach to Developing and Evaluating Website Fingerprinting
Defenses},journal={ACM {SIGSAC} Conference on Computer and Communications Security
(CCS)},pages={227--238},year={2014},crossref={DBLP:conf/ccs/2014},}
Effective Attacks and Provable Defenses for Website Fingerprinting
Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg
@article{DBLP:conf/uss/WangCNJG14,author={Wang, Tao and Cai, Xiang and Nithyanand, Rishab and Johnson, Rob and Goldberg, Ian},title={Effective Attacks and Provable Defenses for Website Fingerprinting},journal={{USENIX} Security Symposium},pages={143--157},year={2014},crossref={DBLP:conf/uss/2014},}
CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense
Xiang Cai, Rishab Nithyanand, and Rob Johnson
Workshop on Privacy in the Electronic Society (WPES), 2014
@article{DBLP:conf/wpes/CaiNJ14,author={Cai, Xiang and Nithyanand, Rishab and Johnson, Rob},title={CS-BuFLO: {A} Congestion Sensitive Website Fingerprinting Defense},journal={Workshop on Privacy in the Electronic Society (WPES)},pages={121--130},year={2014},crossref={DBLP:conf/wpes/2014},}
Glove: A Bespoke Website Fingerprinting Defense
Rishab Nithyanand, Xiang Cai, and Rob Johnson
Workshop on Privacy in the Electronic Society (WPES), 2014
@article{DBLP:conf/wpes/NithyanandCJ14,author={Nithyanand, Rishab and Cai, Xiang and Johnson, Rob},title={Glove: {A} Bespoke Website Fingerprinting Defense},journal={Workshop on Privacy in the Electronic Society (WPES)},pages={131--134},year={2014},crossref={DBLP:conf/wpes/2014},}
The password allocation problem: strategies for reusing passwords
effectively
Rishab Nithyanand, and Rob Johnson
Workshop on Privacy in the Electronic Society (WPES), 2013
@article{DBLP:conf/wpes/NithyanandJ13,author={Nithyanand, Rishab and Johnson, Rob},title={The password allocation problem: strategies for reusing passwords
effectively},journal={Workshop on Privacy in the Electronic Society (WPES)},pages={255--260},year={2013},crossref={DBLP:conf/wpes/2013},}
A Theoretical Analysis: Physical Unclonable Functions and the Software
Protection Problem
Rishab Nithyanand, and John Solis
IEEE Symposium on Security and Privacy Workshops, 2012
@article{DBLP:conf/sp/NithyanandS12,author={Nithyanand, Rishab and Solis, John},title={A Theoretical Analysis: Physical Unclonable Functions and the Software
Protection Problem},journal={{IEEE} Symposium on Security and Privacy Workshops},pages={1--11},year={2012},crossref={DBLP:conf/sp/2012w},}
Usability of Display-Equipped RFID Tags for Security Purposes
Alfred Kobsa, Rishab Nithyanand, Gene Tsudik, and Ersin Uzun
European Symposium on Research in Computer Security (ESORICS), 2011
@article{DBLP:conf/esorics/KobsaNTU11,author={Kobsa, Alfred and Nithyanand, Rishab and Tsudik, Gene and Uzun, Ersin},title={Usability of Display-Equipped {RFID} Tags for Security Purposes},journal={European Symposium on Research in Computer Security (ESORICS)},pages={434--451},year={2011},}
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems
Rishab Nithyanand, Gene Tsudik, and Ersin Uzun
European Symposium on Research in Computer Security (ESORICS), 2010
@article{DBLP:conf/esorics/NithyanandTU10,author={Nithyanand, Rishab and Tsudik, Gene and Uzun, Ersin},title={Readers Behaving Badly - Reader Revocation in PKI-Based {RFID} Systems},journal={European Symposium on Research in Computer Security (ESORICS)},pages={19--36},year={2010},}
Groupthink: usability of secure group association for wireless devices
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, and Ersin Uzun
International Conference on Ubiquitous Computing (UbiComp), 2010
@article{DBLP:conf/huc/NithyanandSTU10,author={Nithyanand, Rishab and Saxena, Nitesh and Tsudik, Gene and Uzun, Ersin},title={Groupthink: usability of secure group association for wireless devices},journal={International Conference on Ubiquitous Computing (UbiComp)},pages={331--340},year={2010},}