The spyware used in intimate partner violence R Chatterjee, P Doerfler, H Orgad, S Havron, J Palmer, D Freed, K Levy, ... 2018 IEEE Symposium on Security and Privacy (SP), 441-458, 2018 | 197 | 2018 |
Clinical computer security for victims of intimate partner violence S Havron, D Freed, R Chatterjee, D McCoy, N Dell, T Ristenpart 28th USENIX Security Symposium (USENIX Security 19), 105-122, 2019 | 115 | 2019 |
Beyond credential stuffing: Password similarity models using neural networks B Pal, T Daniel, R Chatterjee, T Ristenpart 2019 IEEE Symposium on Security and Privacy (SP), 417-434, 2019 | 113 | 2019 |
The pythia {PRF} service A Everspaugh, R Chaterjee, S Scott, A Juels, T Ristenpart 24th USENIX Security Symposium (USENIX Security 15), 547-562, 2015 | 109 | 2015 |
Cracking-resistant password vaults using natural language encoders R Chatterjee, J Bonneau, A Juels, T Ristenpart 2015 IEEE Symposium on Security and Privacy, 481-498, 2015 | 96 | 2015 |
" Is My Phone Hacked?" Analyzing Clinical Computer Security Interventions With Survivors of Intimate Partner Violence D Freed, S Havron, E Tseng, A Gallardo, R Chatterjee, T Ristenpart, ... Proceedings of the ACM on Human-Computer Interaction 3 (CSCW), 1-24, 2019 | 93 | 2019 |
Protocols for checking compromised credentials L Li, B Pal, J Ali, N Sullivan, R Chatterjee, T Ristenpart Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 86 | 2019 |
pASSWORD tYPOS and How to Correct Them Securely R Chatterjee, A Athalye, D Akhawe, A Juels, T Ristenpart https://www.cs.cornell.edu/~rahul/papers/pwtypos.pdf, 2016 | 69 | 2016 |
Invisible perturbations: Physical adversarial examples exploiting the rolling shutter effect A Sayles, A Hooda, M Gupta, R Chatterjee, E Fernandes Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021 | 66 | 2021 |
Sok: Authentication in augmented and virtual reality S Stephenson, B Pal, S Fan, E Fernandes, Y Zhao, R Chatterjee 2022 IEEE Symposium on Security and Privacy (SP), 267-284, 2022 | 54 | 2022 |
A new distribution-sensitive secure sketch and popularity-proportional hashing J Woodage, R Chatterjee, Y Dodis, A Juels, T Ristenpart Annual International Cryptology Conference, 682-710, 2017 | 33 | 2017 |
The typtop system: Personalized typo-tolerant password checking R Chatterjee, J Woodage, Y Pnueli, A Chowdhury, T Ristenpart Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 31 | 2017 |
Might I get pwned: A second generation compromised credential checking service B Pal, M Islam, MS Bohuk, N Sullivan, L Valenta, T Whalen, C Wood, ... 31st USENIX Security Symposium (USENIX Security 22), 1831-1848, 2022 | 25* | 2022 |
Data privacy in trigger-action systems Y Chen, AR Chowdhury, R Wang, A Sabelfeld, R Chatterjee, E Fernandes 2021 IEEE Symposium on Security and Privacy (SP), 501-518, 2021 | 21 | 2021 |
Multisketches: Practical secure sketches using off-the-shelf biometric matching algorithms R Chatterjee, MS Riazi, T Chowdhury, E Marasco, F Koushanfar, A Juels Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 20 | 2019 |
Practical data access minimization in {Trigger-Action} platforms Y Chen, M Alhanahnah, A Sabelfeld, R Chatterjee, E Fernandes 31st USENIX Security Symposium (USENIX Security 22), 2929-2945, 2022 | 18 | 2022 |
How secure are our computer systems courses? M Almansoori, J Lam, E Fang, K Mulligan, AG Soosai Raj, R Chatterjee Proceedings of the 2020 ACM conference on international computing education …, 2020 | 17 | 2020 |
Unsupervised and supervised classification of hyperspectral imaging data using projection pursuit and Markov random field segmentation A Sarkar, A Vulimiri, S Paul, MJ Iqbal, A Banerjee, R Chatterjee, SS Ray International Journal of Remote Sensing 33 (18), 5799-5818, 2012 | 17 | 2012 |
Abuse Vectors: A Framework for Conceptualizing {IoT-Enabled} Interpersonal Abuse S Stephenson, M Almansoori, P Emami-Naeini, DY Huang, R Chatterjee 32nd USENIX Security Symposium (USENIX Security 23), 69-86, 2023 | 14 | 2023 |
" It's the Equivalent of Feeling Like You're in {Jail”}: Lessons from Firsthand and Secondhand Accounts of {IoT-Enabled} Intimate Partner Abuse S Stephenson, M Almansoori, P Emami-Naeini, R Chatterjee 32nd USENIX Security Symposium (USENIX Security 23), 105-122, 2023 | 13 | 2023 |