Publications

To know more about our research, visit our group web page.

  • Stream Processing with Adaptive Edge-Enhanced Confidential Computing [Preprint]
    Yuqin Yan, Pritish Mishra, Wei Huang, Aastha Mehta, Oana Balmau, David Lie
    Workshop on Edge Systems, Analytics and Networking (EdgeSys) 2024.

  • ICS-Sniper: A Targeted Blackhole Attack on Encrypted ICS Traffic [Preprint]
    Gargi Mitra, Pritam Dash, Elaine Yao, Aastha Mehta, Karthik Pattabiraman
    Under review. 2024.

  • NetShaper: A Differentially Private Network Side-Channel Mitigation System [Preprint]
    Amir Sabzi, Rut Vora, Swati Goswami, Margo Seltzer, Mathias Lécuyer, Aastha Mehta
    USENIX Secuirty Symposium, 2024 (to appear).

  • Michroarchitectural Side-Channel Mitigations for Serverless Applications
    Yayu Wang, Aastha Mehta
    Workshop on Principles of Secure Compilation (PriSC) 2024 (to appear).

  • Michroarchitectural Side-Channel Mitigations for Serverless Applications
    Yayu Wang, Aastha Mehta
    Workshop on Programming Languages and Analysis for Security (PLAS) 2023.

  • Reconciling Security and Utility in Next Generation Epidemic Risk Mitigation System [PDF]
    Pierfrancesco Ingo, Nichole Boufford, Ming Cheng Jiang, Rowan Lindsay, Roberta De Viti, Matthew Lentz, Gilles Barthe, Manuel Gomez-Rodriguez, Bernhard Schölkopf, Deepak Garg, Peter Druschel, Aastha Mehta
    Arxiv 2022.

  • Pacer: Network Side-Channel Mitigation in the Cloud [PDF] [Tech Report] [Code]
    Aastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B. Brandenburg, Peter Druschel, Deepak Garg
    USENIX Security Symposium, 2022.

  • Listening to Bluetooth Beacons for Epidemic Risk Mitigation* [PDF]
    Gilles Barthe, Roberta De Viti, Peter Druschel, Deepak Garg, Manuel Gomez-Rodriguez, Pierfrancesco Ingo, Heiner Kremer, Matthew Lentz, Lars Lorch, Aastha Mehta, Bernhard Schölkopf
    Scientific Reports. 2022.
    *Authors listed in alphabetical order

  • PanCast: Listening to Bluetooth Beacons for Epidemic Risk Mitigation* [PDF]
    Gilles Barthe, Roberta De Viti, Peter Druschel, Deepak Garg, Manuel Gomez-Rodriguez, Pierfrancesco Ingo, Matthew Lentz, Aastha Mehta, Bernhard Schölkopf
    White Paper, 2020.
    *Authors listed in alphabetical order

  • Ensuring Compliance with Data Privacy and Usage Policies in Online Services [PDF]
    Aastha Mehta
    PhD Thesis, 2020.

  • Qapla: Policy compliance for database-backed systems [PDF] [Code]
    Aastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, Peter Druschel
    USENIX Security Symposium, 2017.

  • Thoth: Comprehensive Policy Compliance in Data Retrieval Systems [PDF]
    Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwagner, Deepak Garg, Peter Druschel
    USENIX Security Symposium, 2016.

  • Oblivious Multi-Party Machine Learning on Trusted Processors [PDF]
    Olga Ohrimenko, Felix Schuster, Cédric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, Manuel Costa
    USENIX Security Symposium, 2016.

  • Guardat: Enforcing data policies at the storage layer [PDF]
    Anjo Vahldiek, Eslam Elnikety, Aastha Mehta, Deepak Garg, Peter Druschel, Ansley Post, Rodrigo Rodriguez, Johannes Gehrke
    European Conference on Computer Systems (EuroSys), 2015.

  • HDFS Space Consolidation
    Aastha Mehta, Deepti Banka, Kartheek Muthyala, Priya Sehgal, Ajay Bakre
    Student Research Symposium, International Conference on High Performance Computing (HiPC), 2011.