Publications
To know more about our research, visit our group web page.
-
Growlithe: A Developer-Centric Compliance Tool for Serverless Applications [Preprint] [Code]
Praveen Gupta, Arshia Moghimi, Devam Sisodraker, Mohammad Shahrad, Aastha Mehta
To appear at Oakland S&P, 2025. -
Targeting the Blind Spot: Evaluating Modern ICS Security Against A Novel Denial of Service (DoS) Attack [Link]
Gargi Mitra, Pritam Dash, Elaine Yao, Aastha Mehta, Karthik Pattabiraman
Workshop on Re-design Industrial Control Systems with Security (RICSS), 2024. -
NetShaper: A Differentially Private Network Side-Channel Mitigation System [PDF] [Artifact Appendix] [Code]
Amir Sabzi, Rut Vora, Swati Goswami, Margo Seltzer, Mathias Lécuyer, Aastha Mehta
USENIX Secuirty Symposium, 2024. -
Stream Processing with Adaptive Edge-Enhanced Confidential Computing [PDF]
Yuqin Yan, Pritish Mishra, Wei Huang, Aastha Mehta, Oana Balmau, David Lie
Workshop on Edge Systems, Analytics and Networking (EdgeSys) 2024. -
ICS-Sniper: A Targeted Blackhole Attack on Encrypted ICS Traffic [Preprint]
Gargi Mitra, Pritam Dash, Elaine Yao, Aastha Mehta, Karthik Pattabiraman
Under review. 2024. -
Microarchitectural Side-Channel Mitigations for Serverless Applications
Yayu Wang, Aastha Mehta
Workshop on Principles of Secure Compilation (PriSC) 2024. -
Microarchitectural Side-Channel Mitigations for Serverless Applications
Yayu Wang, Aastha Mehta
Workshop on Programming Languages and Analysis for Security (PLAS) 2023. -
Reconciling Security and Utility in Next Generation Epidemic Risk Mitigation System [PDF]
Pierfrancesco Ingo, Nichole Boufford, Ming Cheng Jiang, Rowan Lindsay, Roberta De Viti, Matthew Lentz, Gilles Barthe,
Manuel Gomez-Rodriguez, Bernhard Schölkopf, Deepak Garg, Peter Druschel, Aastha Mehta. 2022.
-
Pacer: Network Side-Channel Mitigation in the Cloud [PDF] [Tech Report] [Code]
Aastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B. Brandenburg, Peter Druschel, Deepak Garg
USENIX Security Symposium, 2022. -
Listening to Bluetooth Beacons for Epidemic Risk Mitigation* [PDF]
Gilles Barthe, Roberta De Viti, Peter Druschel, Deepak Garg, Manuel Gomez-Rodriguez, Pierfrancesco Ingo,
Heiner Kremer, Matthew Lentz, Lars Lorch, Aastha Mehta, Bernhard Schölkopf
Scientific Reports. 2022.
*Authors listed in alphabetical order -
PanCast: Listening to Bluetooth Beacons for Epidemic Risk Mitigation* [PDF]
Gilles Barthe, Roberta De Viti, Peter Druschel, Deepak Garg, Manuel Gomez-Rodriguez, Pierfrancesco Ingo,
Matthew Lentz, Aastha Mehta, Bernhard Schölkopf
White Paper, 2020.
*Authors listed in alphabetical order -
Ensuring Compliance with Data Privacy and Usage Policies in Online Services [PDF]
Aastha Mehta
PhD Thesis, 2020. -
Qapla: Policy compliance for database-backed systems [PDF] [Code]
Aastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, Peter Druschel
USENIX Security Symposium, 2017. -
Thoth: Comprehensive Policy Compliance in Data Retrieval Systems [PDF]
Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwagner, Deepak Garg, Peter Druschel
USENIX Security Symposium, 2016. -
Oblivious Multi-Party Machine Learning on Trusted Processors [PDF]
Olga Ohrimenko, Felix Schuster, Cédric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, Manuel Costa
USENIX Security Symposium, 2016. -
Guardat: Enforcing data policies at the storage layer [PDF]
Anjo Vahldiek, Eslam Elnikety, Aastha Mehta, Deepak Garg, Peter Druschel, Ansley Post, Rodrigo Rodriguez, Johannes Gehrke
European Conference on Computer Systems (EuroSys), 2015. -
HDFS Space Consolidation
Aastha Mehta, Deepti Banka, Kartheek Muthyala, Priya Sehgal, Ajay Bakre
Student Research Symposium, International Conference on High Performance Computing (HiPC), 2011.