Publications

To know more about our research, visit our group web page.

  • Growlithe: A Developer-Centric Compliance Tool for Serverless Applications [Preprint] [Code]
    Praveen Gupta, Arshia Moghimi, Devam Sisodraker, Mohammad Shahrad, Aastha Mehta
    To appear at Oakland S&P, 2025.

  • Targeting the Blind Spot: Evaluating Modern ICS Security Against A Novel Denial of Service (DoS) Attack [Link]
    Gargi Mitra, Pritam Dash, Elaine Yao, Aastha Mehta, Karthik Pattabiraman
    Workshop on Re-design Industrial Control Systems with Security (RICSS), 2024.

  • NetShaper: A Differentially Private Network Side-Channel Mitigation System [PDF] [Artifact Appendix] [Code]
    Amir Sabzi, Rut Vora, Swati Goswami, Margo Seltzer, Mathias Lécuyer, Aastha Mehta
    USENIX Secuirty Symposium, 2024.

  • Stream Processing with Adaptive Edge-Enhanced Confidential Computing [PDF]
    Yuqin Yan, Pritish Mishra, Wei Huang, Aastha Mehta, Oana Balmau, David Lie
    Workshop on Edge Systems, Analytics and Networking (EdgeSys) 2024.

  • ICS-Sniper: A Targeted Blackhole Attack on Encrypted ICS Traffic [Preprint]
    Gargi Mitra, Pritam Dash, Elaine Yao, Aastha Mehta, Karthik Pattabiraman
    Under review. 2024.

  • Microarchitectural Side-Channel Mitigations for Serverless Applications
    Yayu Wang, Aastha Mehta
    Workshop on Principles of Secure Compilation (PriSC) 2024.

  • Microarchitectural Side-Channel Mitigations for Serverless Applications
    Yayu Wang, Aastha Mehta
    Workshop on Programming Languages and Analysis for Security (PLAS) 2023.

  • Reconciling Security and Utility in Next Generation Epidemic Risk Mitigation System [PDF]
    Pierfrancesco Ingo, Nichole Boufford, Ming Cheng Jiang, Rowan Lindsay, Matthew Lentz, Gilles Barthe,
    Manuel Gomez-Rodriguez, Bernhard Schölkopf, Deepak Garg, Peter Druschel, Aastha Mehta. 2022.

  • Pacer: Network Side-Channel Mitigation in the Cloud [PDF] [Tech Report] [Code]
    Aastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B. Brandenburg, Peter Druschel, Deepak Garg
    USENIX Security Symposium, 2022.

  • Listening to Bluetooth Beacons for Epidemic Risk Mitigation* [PDF]
    Gilles Barthe, Roberta De Viti, Peter Druschel, Deepak Garg, Manuel Gomez-Rodriguez, Pierfrancesco Ingo,
    Heiner Kremer, Matthew Lentz, Lars Lorch, Aastha Mehta, Bernhard Schölkopf
    Scientific Reports. 2022.
    *Authors listed in alphabetical order

  • PanCast: Listening to Bluetooth Beacons for Epidemic Risk Mitigation* [PDF]
    Gilles Barthe, Roberta De Viti, Peter Druschel, Deepak Garg, Manuel Gomez-Rodriguez, Pierfrancesco Ingo,
    Matthew Lentz, Aastha Mehta, Bernhard Schölkopf
    White Paper, 2020.
    *Authors listed in alphabetical order

  • Ensuring Compliance with Data Privacy and Usage Policies in Online Services [PDF]
    Aastha Mehta
    PhD Thesis, 2020.

  • Qapla: Policy compliance for database-backed systems [PDF] [Code]
    Aastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, Peter Druschel
    USENIX Security Symposium, 2017.

  • Thoth: Comprehensive Policy Compliance in Data Retrieval Systems [PDF]
    Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwagner, Deepak Garg, Peter Druschel
    USENIX Security Symposium, 2016.

  • Oblivious Multi-Party Machine Learning on Trusted Processors [PDF]
    Olga Ohrimenko, Felix Schuster, Cédric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, Manuel Costa
    USENIX Security Symposium, 2016.

  • Guardat: Enforcing data policies at the storage layer [PDF]
    Anjo Vahldiek, Eslam Elnikety, Aastha Mehta, Deepak Garg, Peter Druschel, Ansley Post, Rodrigo Rodriguez, Johannes Gehrke
    European Conference on Computer Systems (EuroSys), 2015.

  • HDFS Space Consolidation
    Aastha Mehta, Deepti Banka, Kartheek Muthyala, Priya Sehgal, Ajay Bakre
    Student Research Symposium, International Conference on High Performance Computing (HiPC), 2011.