Publications — Arvind Narayanan

« Back

See also: Google scholar profile

Titles point to blog posts, abstracts, or project pages from where the paper can be downloaded.

Conference
The Web never forgets: Persistent tracking mechanisms in the wild
Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, Claudia Diaz.
ACM Conference on Computer and Communications Security, 2014.
Related blog post: The hidden perils of cookie syncing.
Policy
No silver bullet: De-identification still doesn’t work
Arvind Narayanan, Edward W. Felten.
Manuscript, 2014.
Position
Privacy concerns of implicit secondary factors for web authentication
Joseph Bonneau, Edward W. Felten, Prateek Mittal, Arvind Narayanan
Adventures in Authentication: WAY Workshop, 2014.
Draft
Web Privacy Measurement: Scientific principles, engineering platform, and new results
Steven Englehardt, Christian Eubank, Peter Zimmerman, Dillon Reisman, Arvind Narayanan.
Manuscript, 2014.
Conference
On Decentralizing Prediction Markets and Order Books
Jeremy Clark, Joseph Bonneau, Edward W. Felten, Joshua A. Kroll, Andrew Miller, Arvind Narayanan
WEIS 2014.
Draft
Cookies that give you away: Evaluating the surveillance implications of web tracking
Dillon Reisman, Steven Englehardt, Christian Eubank, Peter Zimmerman, Arvind Narayanan.
Manuscript, 2014.
Draft
Securing Bitcoin wallets via threshold signatures
Steven Goldfeder, Joseph Bonneau, Edward W. Felten, Joshua A. Kroll, Arvind Narayanan.
Manuscript, 2014.
Conference
Mixcoin: Anonymity for Bitcoin with accountable mixes
Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten
Financial Cryptography 2014
Related blog post: The importance of anonymous cryptocurrencies
Journal (invited)
Why software engineering courses should include ethics coverage
Arvind Narayanan, Shannon Vallor.
Communications of the ACM, 2014.
Journal
Routes for breaching and protecting genetic privacy
Yaniv Erlich, Arvind Narayanan.
Nature Reviews Genetics, 2014.
Law review
Privacy substitutes
Jonathan Mayer, Arvind Narayanan.
Special issue of Stanford Law Review Online, 2013.
Workshop
Privacy technologies: An annotated syllabus
Arvind Narayanan
HotPETs 2013.
Conference
A Scanner Darkly: Protecting User Privacy from Perceptual Applications
Suman Jana, Arvind Narayanan, Vitaly Shmatikov.
IEEE Security and Privacy (Oakland) 2013.
2014 Privacy Enhancing Technologies award.
Workshop
Shining the Floodlights on Mobile Web Tracking — A Privacy Survey
Christian Eubank, Marcela Melara, Diego Perez-Botero, Arvind Narayanan.
Web 2.0 Security & Privacy (W2SP) 2013.
Journal (invited)
What Happened to the Crypto Dream?
Arvind Narayanan.
IEEE Security and Privacy Magazine 2013.
Journal (invited)
Unlikely Outcomes? A Distributed Discussion on Decentralized Personal Data Architectures
Solon Barocas, Seda Gürses, Arvind Narayanan, Vincent Toubiana.
Institute of Network Cultures — Unlike Us Reader 2013.
Policy
Privacy considerations of online behavioural tracking
Claude Castelluccia and Arvind Narayanan.
European Network and Information Security Agency (ENISA) expert report, 2012.
Haha
33 Bits of Entropy: Myths and Fallacies of “Personally Identifiable Information”
Arvind Narayanan.
Volume 1 of Tiny Transactions on Computer Science, 2012. ("The premier venue for computer science research of 140 characters or less.")
Workshop
A Critical Look at Decentralized Personal Data Architectures
Arvind Narayanan, Vincent Toubiana, Solon Barocas, Helen Nissenbaum, Dan Boneh.
Data Usage Management on the Web Workshop 2012.
Conference
On the Feasibility of Internet-Scale Author Identification
Arvind Narayanan, Hristo Paskov, Neil Gong, John Bethencourt, Emil Stefanov, Richard Shin, Dawn Song.
IEEE Security and Privacy (Oakland) 2012.
Report
An Adversarial Analysis of the Reidentifiability of the Heritage Health Prize Dataset.
Arvind Narayanan.
Manuscript, 2011.
Conference
“You Might Also Like:” Privacy Risks of Collaborative Filtering
Joseph A. Calandrino, Ann Kilzer, Arvind Narayanan, Edward W. Felten, Vitaly Shmatikov.
IEEE Security and Privacy (Oakland) 2011.
Conference
Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge
Arvind Narayanan, Elaine Shi, Benjamin I. P. Rubinstein.
International Joint Conference on Neural Networks 2011.
Policy
Do Not Track: A Universal Third-Party Web Tracking Opt Out
Jonathan Mayer, Arvind Narayanan, Sid Stamm.
IETF Internet-Draft, 2011.
Conference
Location Privacy via Private Proximity Testing
Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Mike Hamburg, Dan Boneh.
Network and Distributed Security Symposium 2011.
Distinguished paper award.
Policy
Do Not Track FTC Comment
Jonathan Mayer, Arvind Narayanan.
2011.
Position
SocialKeys: Transparent Cryptography via Key Distribution over Social Networks
Arvind Narayanan.
IAB/IETF/W3C Internet Privacy workshop position paper, 2010.
Policy
Comment on the Draft National Strategy for Trusted Identities in Cyberspace
Jonathan Mayer, Arvind Narayanan.
2010.
Journal (invited)
Myths and Fallacies of “Personally Identifiable Information”
Arvind Narayanan, Vitaly Shmatikov.
Communications of the ACM, 2010.
Conference
Adnostic: Privacy Preserving Targeted Advertising
Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Solon Barocas.
Network and Distributed System Security Symposium 2010.
Conference
De-anonymizing Social Networks
Arvind Narayanan, Vitaly Shmatikov.
IEEE Security and Privacy 2009.
Conference
Robust De-anonymization of Large Sparse Datasets (How To Break Anonymity of the Netflix Prize Dataset)
Arvind Narayanan, Vitaly Shmatikov.
IEEE Security and Privacy (Oakland) 2008.
2008 Privacy Enhancing Technologies award.
Book chapter
Uncircumventable Enforcement of Privacy Policies via Cryptographic Obfuscation
Arvind Narayanan, Vitaly Shmatikov.
In Digital Privacy: Theory, Technologies and Practices". Editors: A. Acquisti et al. Auerbach Publications 2007.
This is an expanded version of "Obfuscated Databases and Group Privacy" below.
Workshop
Domain extensions for random oracles: beyond the birthday-paradox bound
Ilya Mironov, Arvind Narayanan.
ECRYPT Hash Workshop 2007.
On the Limits of Point Function Obfuscation
Arvind Narayanan, Vitaly Shmatikov.
Manuscript, 2006.
Conference
Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff
Arvind Narayanan, Vitaly Shmatikov.
ACM Conference on Computer and Communications Security 2005.
Conference
Obfuscated Databases and Group Privacy
Arvind Narayanan, Vitaly Shmatikov.
ACM Conference on Computer and Communications Security 2005.

Undergrad/Master's work

Journal
Perfectly Reliable Message Transmission
Arvind Narayanan, Kannan Srinathan, C. Pandu Rangan.
Information Processing Letters 100:1, pages 23--28, 2006. [Abstract]
Conference
Optimal Perfectly Secure Message Transmission.
Kannan Srinathan, Arvind Narayanan, C. Pandu Rangan.
Advances in Cryptology -- CRYPTO 2004, volume 3152 of LNCS, pages 545--561. [Download: Postscript]
Conference
On the power of Computational Secret Sharing.
Vinod Vaikuntanathan, Arvind Narayanan, Kannan Srinathan, C. Pandu Rangan, Kwangjo Kim. Indocrypt 2003, volume 2904 of LNCS, pages 162--176.
Conference
Practical Pay TV Schemes
Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim.
Australasian Conference on Information Security and Privacy (ACISP) 2003, volume 2727 of LNCS, pages 192--203.