Publications

TagsPaperAuthorsConference
2019, epfl, pre-print, privacy, traffic-analysis Encrypted DNS –> Privacy? A Traffic Analysis PerspectiveSandra Siby, Marc Juarez, Claudia Diaz, Narseo Vallina-Rodriguez, Carmela Troncoso
2019, epfl, pre-printEvading classifiers in discrete domains with provable optimality guarantees (long version)Bogdan Kulynych, Jamie Hayes, Nikita Samarin, Carmela Troncoso
2019, epfl, pre-printPOTs: Protective Optimization TechnologiesRebekah Overdorf, Bogdan Kulynych, Ero Balsa, Carmela Troncoso, Seda Gurses
2019, epfl, metadata, leakage, padding, traffic analysisReducing Metadata Leakage from Encrypted Files and Communication with PURBsKirill Nikitin, Ludovic Barman, Wouter Lueks, Matthew Underwood, Jean-Pierre Hubaux, Bryan FordPoPETs 2019
2019, code, epfl, zero-knowledge proof, zkskzksk: A Library for Composable Zero-Knowledge Proofs [code]Wouter Lueks, Bogdan Kulynych, Jules Fasquelle, Simon Le Bail-Collet, Carmela TroncosoWPES 2019
2019, epfl, localization, privacy, usenixOn (The Lack Of) Location Privacy in Crowdsourcing ApplicationsSpyros Boukoros, Mathias Humbert, Stefan Katzenbeisser, Carmela TroncosoUsenix Security 2019
2019, epfl, localization, privacy, s&pRethinking Location Privacy for Unknown Mobility BehaviorsSimon Oya, Carmela Troncoso, Fernando Pérez-GonzálezEuroS&P 2019
2019, fbleau, ieee, s&pF-BLEAU: Fast Black-box Leakage EstimationCherubin, Giovanni, Chatzikokolakis, Konstantinos, and Palamidessi, CatusciaIEEE Symposium on Security and Privacy (S&P) 2019
2019, epfl, ieee, s&pOn the Security of Two-Round Multi-SignaturesManu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, and Igors StepanovsIEEE Symposium on Security and Privacy (S&P) 2019
2018, epfl, machine learning, neuripsQuestioning the assumptions behind fairness solutions. Critiquing and Correcting Trends in Machine LearningRebekah Overdorf, Bogdan Kulynych, Ero Balsa, Carmela Troncoso, Seda GürsesNeurIPS 2018 Workshop, December 7, 2018, Montreal, Canada
2018, epfl, neuripsEvading classifiers in discrete domains with provable optimality guaranteesBogdan Kulynych, Jamie Hayes, Nikita Samarin, Carmela TroncosoNeurIPS 2018 Workshop, December 7, 2018, Montreal, Canada
2018, anonymity, epfl, ieee, networks, s&p, traffic analysisTARANET: Traffic-Analysis Resistant Anonymity at the NETwork layerChen Chen , Daniele E. Asoni, Adrian Perrig, David Barrera, George Danezis, and Carmela TroncosoIEEE EuroS&P 2018
2018, epfl, localization, ndssKnock Knock, Who’s There? Membership Inference on Aggregate Location DataApostolos Pyrgelis, Carmela Troncoso, and Emiliano De CristofaroNDSS 2018
2017, 34c3, claimchain, codeModern key distribution with ClaimChain [code]Bogdan Kulynych, Marios Isaakidis, Carmela Troncoso, and George Danezis34c3: 34th Chaos Communication Congress 2017
2017, ccs, code, privacyBack to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms [code] Simon Oya, Carmela Troncoso, and Fernando Pérez-GonzálezCCS 2017
2017, localization, wpesIs Geo-Indistinguishability What You Are Looking for?Simon Oya, Carmela Troncoso, and Fernando Pérez-GonzálezWPES 2017
2017, localization, popets, privacyWhat Does The Crowd Say About You? Evaluating Aggregation-based Location PrivacyApostolos Pyrgelis, Carmela Troncoso, and Emiliano De CristofaroPoPETS 2017
2017, popets, privacySystematizing Decentralization and Privacy: Lessons from 15 years of research and deploymentsCarmela Troncoso, Marios Isaakidis, George Danezis, and Harry HalpinPoPETS 2017
2017, icdeSmall DataOliver Kennedy, D. Richard Hipp, Stratos Idreos, Amelie Marian, Arnab Nandi, Carmela Troncoso, and Eugene WuICDE 2017
2017, anonymity, ndss, privacy, torDissecting Tor Bridges: a Security Evaluation of their Private and Public InfrastructuresSrdjan Matic, Carmela Troncoso, and Juan CaballeroNDSS 2017
2017, anonymity, icassp, networksFilter design for delay-based anonymous communicationsSimon Oya, Fernando Pérez-González, and Carmela TroncosoICASSP 2017
2016, anonymity, wpesTASP: Towards Anonymity Sets that PersistJamie Hayes, Carmela Troncosom and George DanezisWPES 2016
2016, localization, privacy, topsPrivacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location PrivacyReza Shokri, George Theodorakopoulos, and Carmela TroncosoACM Transactions on Privacy and Security (TOPS) 2016
2016, attack, ieee, privacyDesign of Pool Mixes Against Profiling Attacks in Real ConditionsSimon Oya, Fernando Pérez-González, and Carmela TroncosoIEEE/ACM Transactions on Networking. 2016
2015, amsterdam privacy conference, award, cnil, inri, privacyEngineering Privacy by Design Reloaded CNIL/INRIA Privacy AwardSeda Gurses, Carmela Troncoso, and Claudia DiazAmsterdam Privacy Conference 2015
2014, anonymity, ieee, traffic analysisA Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication SystemsFernando Pérez-González, Carmela Troncoso, and Simon OyaIEEE Transactions on Information Forensics and Security 9(9). 2014
2014, anonymity, networks, traffic analysisDo Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous CommunicationsSimon Oya, Carmela Troncoso, and Fernando Pérez-GonzálezPrivacy Enhancing Technologies 2014
2014, attack, statistics, wifsUnderstanding the effects of real-world behavior in statistical disclosure attacksSimon Oya, Carmela Troncoso, and Fernando Pérez-GonzálezWIFS 2014
2014, localization, privacy, wpesProlonging the Hide-and-Seek Game. Optimal Trajectory Privacy for Location-Based ServicesGeorge Theodorakopoulos, Reza Shokri, Carmela Troncoso, Jean-Pierre Hubaux, and Jean-Yves Le BoudecWPES 2014
2013, attack, globalsip, statisticsMeet the family of statistical disclosure attacksSimon Oya, Carmela Troncoso, and Fernando Pérez-GonzálezGlobalSIP 2013
2013, ih&mmsec, keynote, statisticsBayesian inference to evaluate information leakage in complex scenarios (Keynote talk)Carmela TroncosoIH&MMSec 2013
2013, forensics, wifsThe watchful forensic analyst. Multi-clue information fusion with background knowledgeMarco Fontani, Enrique Argones-Rua, Carmela Troncoso, and Mauro BarniWIFS 2013
2013, anonymity, privacy, wpesYou cannot hide for long. de-anonymization of real-world dynamic behaviourGeorge Danezis and Carmela TroncosoWPES 2013
2013, networks, privacy, wpesOptimal sporadic location privacy preserving systems in presence of bandwidth constraintsMichael Herrmann, Carmela Troncoso, Claudia Diaz, and Bart PreneelWPES 2013
2012, networks, obfuscationA Metric to Evaluate Interaction Obfuscation in Online Social NetworksEro Balsa, Carmela Troncoso, and Claudia DiazInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 20(6). 2012
2012, ccs, localization, privacyProtecting location privacy. optimal strategy against localization attacksReza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux, and Jean-Yves Le BoudecCCS 2012
2012, pet, statisticsUnderstanding Statistical Disclosure. A Least Squares ApproachFernando Pérez-González and Carmela TroncosoPrivacy Enhancing Technologies 2012
2012, ieee, obfuscation, privacyOB-PWS. Obfuscation-Based Private Web SearchEro Balsa, Carmela Troncoso, and Claudia DiazIEEE Symposium on Security and Privacy 2012
2012, anonymity, networks, wifsA Least Squares approach to user profiling in pool mix-based anonymous communication systemsFernando Pérez-González, Carmela TroncosoWIFS 2012
2011, cpdp, privacyEngineering Privacy by DesignSeda Gurses, Carmela Troncoso, and Claudia DiazComputers, Privacy & Data Protection (CPDP). 2011
2011, anonymity, computer networks 55, networksOn the difficulty of achieving anonymity for Vehicle-2-X communicationCarmela Troncoso, Enrique Costa-Montenegro, Claudia D&iacuteaz, and Stefan SchiffnerComputer Networks 55(14). 2011
2011, ieee, pripayd, privacyPriPAYD. Privacy-Friendly Pay-As-You-Drive InsuranceCarmela Troncoso, George Danezis, Eleni Kosta, Josep Balasch, and Bart PreneelIEEE Trans. Dependable Sec. Comput. 8(5). 2011
2011, anonymity, network, tor, usenixPIR-Tor. Scalable Anonymous Communication Using Private Information RetrievalPrateek Mittal, Femi G. Olumofin, Carmela Troncoso, Nikita Borisov, and Ian GoldbergUSENIX Security Symposium 2011
2011, award, fingerprinting, tor, wifs Fingerprinting Tor’s hidden service log files using a timing channel Gold Award to Best Student PaperJuan A. Elices, Fernando Pérez-González, and Carmela TroncosoWIFS 2011
2010, anonymity, network, petImpact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity NetworksClaudia D&iacuteaz, Steven J. Murdoch, and Carmela TroncosoPrivacy Enhancing Technologies 2010
2010, anonymity, network, petDrac. An Architecture for Anonymous Low-Volume CommunicationsGeorge Danezis, Claudia D&iacuteaz, and Carmela Troncoso, Ben LauriePrivacy Enhancing Technologies 2010
2010, privacy, usenixPrETP. Privacy-Preserving Electronic Toll PricingJosep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, and Christophe GeuensUSENIX Security Symposium 2010
2010, anonimity, hostsecScalable Anonymous Communication with Provable SecurityPrateek Mittal, Nikita Borisov, Carmela Troncoso, and Alfredo RialHotSec 2010
2010, anonymity, privacy, wpesUnraveling an old cloak. k-anonymity for location privacyReza Shokri, Carmela Troncoso, Claudia D&iacuteaz, Julien Freudiger, and Jean-Pierre HubauxWPES 2010
2009, ccs, statistics, traffic analysisThe bayesian traffic analysis of mix networksCarmela Troncoso and George DanezisACM Conference on Computer and Communications Security 2009
2009, attack, esoricsThe Wisdom of Crowds. Attacks and Optimal ConstructionsGeorge Danezis, Claudia Diaz, Emilia Käsper, and Carmela TroncosoESORICS 2009
2009, pet, privacy, statisticsVida. How to Use Bayesian Inference to De-anonymize Persistent CommunicationsGeorge Danezis and Carmela TroncosoPrivacy Enhancing Technologies 2009
2008, esorics, steganographyA Framework for the Analysis of Mix-Based Steganographic File SystemsClaudia Diaz, Carmela Troncoso, and Bart PreneelESORICS 2008
2008, attack, petPerfect Matching Disclosure AttacksCarmela Troncoso, Benedikt Gierlichs, Bart Preneel, and Ingrid VerbauwhedePrivacy Enhancing Technologies 2008
2008, anonymity, pet, privacyOn the Impact of Social Network Profiling on AnonymityClaudia Diaz, Carmela Troncoso, and Andrei SerjantovPrivacy Enhancing Technologies 2008
2008, archive, storage, storagessImproving secure long-term archival of digitally signed documentsCarmela Troncoso, Danny De Cock, and Bar PreneelStorageSS 2008
2008, anonymity, privacy, wpesRevisiting a combinatorial approach toward measuring anonymityBenedikt Gierlichs, Carmela Troncoso, Claudia Diaz, Bart Preneel, and Ingrid VerbauwhedeWPES 2008
2007, information hiding, steganography, traffic analysisTraffic Analysis Attacks on a Continuously-Observable Steganographic File System. Carmela Troncoso, Claudia Diaz, Orr Dunkelman, and Bart Preneel.Information Hiding 2007
2007, cryptography, database, hash, iscEfficient Negative Databases from Cryptographic Hash FunctionsGeorge Danezis, Claudia Diaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, and Bart PreneelISC 2007
2007, attack, petTwo-Sided Statistical Disclosure AttacksGeorge Danezis, Claudia Diaz, and Carmela TroncosoPrivacy Enhancing Technologies 2007
2007, anonymity, privacy, wpesDoes additional information always reduce anonymity?Claudia Diaz, Carmela Troncoso, and George DanezisWPES 2007
2007, privacy, wpesPriPAYD. privacy friendly pay-as-you-drive insuranceCarmela Troncoso, George Danezis, Eleni Kosta, and Bart PreneelWPES 2007