Rahul Chatterjee
Rahul Chatterjee
Assistant Professor at University of Wisconsin--Madison
Verified email at - Homepage
Cited by
Cited by
The spyware used in intimate partner violence
R Chatterjee, P Doerfler, H Orgad, S Havron, J Palmer, D Freed, K Levy, ...
2018 IEEE Symposium on Security and Privacy (SP), 441-458, 2018
The Pythia {PRF} Service
A Everspaugh, R Chaterjee, S Scott, A Juels, T Ristenpart
24th {USENIX} Security Symposium ({USENIX} Security 15), 547-562, 2015
Cracking-resistant password vaults using natural language encoders
R Chatterjee, J Bonneau, A Juels, T Ristenpart
2015 IEEE Symposium on Security and Privacy, 481-498, 2015
Clinical Computer Security for Victims of Intimate Partner Violence.
S Havron, D Freed, R Chatterjee, D McCoy, N Dell, T Ristenpart
USENIX Security Symposium, 105-122, 2019
Beyond credential stuffing: Password similarity models using neural networks
B Pal, T Daniel, R Chatterjee, T Ristenpart
2019 IEEE Symposium on Security and Privacy (SP), 417-434, 2019
" Is My Phone Hacked?" Analyzing Clinical Computer Security Interventions With Survivors of Intimate Partner Violence
D Freed, S Havron, E Tseng, A Gallardo, R Chatterjee, T Ristenpart, ...
Proceedings of the ACM on Human-Computer Interaction 3 (CSCW), 1-24, 2019
pASSWORD tYPOS and How to Correct Them Securely
R Chatterjee, A Athalye, D Akhawe, A Juels, T Ristenpart, 2016
Protocols for checking compromised credentials
L Li, B Pal, J Ali, N Sullivan, R Chatterjee, T Ristenpart
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Invisible perturbations: Physical adversarial examples exploiting the rolling shutter effect
A Sayles, A Hooda, M Gupta, R Chatterjee, E Fernandes
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
A new distribution-sensitive secure sketch and popularity-proportional hashing
J Woodage, R Chatterjee, Y Dodis, A Juels, T Ristenpart
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
The typtop system: Personalized typo-tolerant password checking
R Chatterjee, J Woodage, Y Pnueli, A Chowdhury, T Ristenpart
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Unsupervised and supervised classification of hyperspectral imaging data using projection pursuit and Markov random field segmentation
A Sarkar, A Vulimiri, S Paul, MJ Iqbal, A Banerjee, R Chatterjee, SS Ray
International Journal of Remote Sensing 33 (18), 5799-5818, 2012
Multisketches: Practical secure sketches using off-the-shelf biometric matching algorithms
R Chatterjee, MS Riazi, T Chowdhury, E Marasco, F Koushanfar, A Juels
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
Data privacy in trigger-action systems
Y Chen, AR Chowdhury, R Wang, A Sabelfeld, R Chatterjee, E Fernandes
2021 IEEE Symposium on Security and Privacy (SP), 501-518, 2021
How secure are our computer systems courses?
M Almansoori, J Lam, E Fang, K Mulligan, AG Soosai Raj, R Chatterjee
Proceedings of the 2020 ACM conference on international computing education …, 2020
Sok: Authentication in augmented and virtual reality
S Stephenson, B Pal, S Fan, E Fernandes, Y Zhao, R Chatterjee
2022 IEEE Symposium on Security and Privacy (SP), 267-284, 2022
Might i get pwned: A second generation compromised credential checking service
B Pal, M Islam, MS Bohuk, N Sullivan, L Valenta, T Whalen, C Wood, ...
31st USENIX Security Symposium (USENIX Security 22), 1831-1848, 2022
Identifying gaps in the secure programming knowledge and skills of students
J Lam, E Fang, M Almansoori, R Chatterjee, AG Soosai Raj
Proceedings of the 53rd ACM Technical Symposium on Computer Science …, 2022
Textbook underflow: Insufficient security discussions in textbooks used for computer systems courses
M Almansoori, J Lam, E Fang, AG Soosai Raj, R Chatterjee
Proceedings of the 52nd ACM Technical Symposium on Computer Science …, 2021
A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance
M Almansoori, A Gallardo, J Poveda, A Ahmed, R Chatterjee
Proceedings of Privacy Enhancing Technologies 4, 120-139, 2022
The system can't perform the operation now. Try again later.
Articles 1–20