How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior
IACR Cryptology ePrint Archive, Volume 2018, 2018, Pages 1369-1386.
differential privacy heavy hitters malicious model passwords secure computation
Bad choices of passwords were and are a pervasive problem. Users choosing weak passwords do not only compromise themselves, but the whole ecosystem. E.g, common and default passwords in IoT devices were exploited by hackers to create botnets and mount severe attacks on large Internet services, such as the Mirai botnet DDoS attack. We pres...More
Full Text (Upload PDF)
PPT (Upload PPT)