Follow
Trishita Tiwari
Trishita Tiwari
PhD Candidate, Cornell University
Verified email at cornell.edu
Title
Cited by
Cited by
Year
Page cache attacks
D Gruss, E Kraft, T Tiwari, M Schwarz, A Trachtenberg, J Hennessey, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
552019
User-profile-based analytics for detecting cloud security breaches
T Tiwari, A Turk, A Oprea, K Olcoz, AK Coskun
2017 IEEE International Conference on Big Data (Big Data), 4529-4535, 2017
102017
Location leakage from network access patterns
T Tiwari, A Klausner, M Andreev, A Trachtenberg, A Yerukhimovich
2019 IEEE Conference on Communications and Network Security (CNS), 214-222, 2019
8*2019
Alternative (ab) uses for {HTTP} Alternative Services
T Tiwari, A Trachtenberg
13th USENIX Workshop on Offensive Technologies (WOOT 19), 2019
62019
Information flow control in machine learning through modular model architecture
T Tiwari, S Gururangan, C Guo, W Hua, S Kariyappa, U Gupta, W Xiong, ...
33rd USENIX Security Symposium (USENIX Security 24), 6921-6938, 2024
52024
Distributed web mining of ethereum
T Tiwari, D Starobinski, A Trachtenberg
Cyber Security Cryptography and Machine Learning: Second International …, 2018
52018
Cashing in on the file-system cache
T Tiwari, A Trachtenberg
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
42018
Union buster: A cross-container covert-channel exploiting union mounting
N Boskov, N Radami, T Tiwari, A Trachtenberg
International Symposium on Cyber Security, Cryptology, and Machine Learning …, 2022
32022
Sequence-Level Analysis of Leakage Risk of Training Data in Large Language Models
T Tiwari, GE Suh
arXiv preprint arXiv:2412.11302, 2024
2024
Guessing Outputs of Dynamically Pruned CNNs Using Memory Access Patterns
B Wu, T Tiwari, GE Suh, AB Wagner
IEEE Computer Architecture Letters 20 (2), 98-101, 2021
2021
Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies
J Milligan, S Scheffler, A Sellars, T Tiwari, A Trachtenberg, M Varia
International Workshop on Socio-Technical Aspects in Security and Trust, 175-186, 2019
2019
Detecting Anomalies in User Profiles in the Cloud via Machine Learning
C Wong, T Tiwari, A Narayan, AK Coskun
The system can't perform the operation now. Try again later.
Articles 1–12