Follow
Sandra Siby
Sandra Siby
Verified email at imperial.ac.uk - Homepage
Title
Cited by
Cited by
Year
Encrypted DNS--> Privacy? A Traffic Analysis Perspective
S Siby, M Juarez, C Diaz, N Vallina-Rodriguez, C Troncoso
Network and Distributed Systems Security (NDSS) Symposium 2020, 2019
105*2019
IoTScanner: Detecting privacy threats in IoT neighborhoods
S Siby, RR Maiti, NO Tippenhauer
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and …, 2017
862017
Wearable environmental sensors and infrastructure for mobile large-scale urban deployment
E Wilhelm, S Siby, Y Zhou, XJS Ashok, M Jayasuriya, S Foong, J Kee, ...
IEEE Sensors Journal 16 (22), 8111-8123, 2016
692016
Verifiable management of private data under byzantine failures
E Kokoris-Kogias, EC Alp, SD Siby, N Gailly, L Gasser, P Jovanovic, ...
IACR ePrint 209, 2018, 2018
59*2018
Iotscanner: Detecting and classifying privacy threats in iot neighborhoods
S Siby, RR Maiti, N Tippenhauer
arXiv preprint arXiv:1701.05007, 2017
372017
Mobile-enabled delay tolerant networking in rural developing regions
A Galati, T Bourchas, S Siby, S Frey, M Olivares, S Mangold
IEEE Global Humanitarian Technology Conference (GHTC 2014), 699-705, 2014
272014
Link-layer device type classification on encrypted wireless traffic with COTS radios
RR Maiti, S Siby, R Sridharan, NO Tippenhauer
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
192017
Dns privacy not so private: the traffic analysis perspective
S Siby, M Juarez, N Vallina-Rodriguez, C Troncoso
The 11th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2018), 2018
132018
System architecture for delay tolerant media distribution for rural south africa
A Galati, T Bourchas, S Siby, S Mangold
Proceedings of the 9th ACM international workshop on Wireless network …, 2014
112014
Practical Evaluation of Passive COTS Eavesdropping in 802.11 b/n/ac WLAN
D Antonioli, S Siby, NO Tippenhauer
Cryptology and Network Security: 16th International Conference, CANS 2017 …, 2018
102018
Webgraph: Capturing advertising and tracking information flows for ro-bust blocking
S Siby, U Iqbal, S Englehardt, Z Shafiq, C Troncoso
USENIX Security 2022, 2021
92021
METhoD: a framework for the emulation of a delay tolerant network scenario for media-content distribution in under-served regions
S Siby, A Galati, T Bourchas, M Olivares, TR Gross, S Mangold
2015 24th International Conference on Computer Communication and Networks …, 2015
82015
Apparatus and method for monitoring a wireless network
NO Tippenhauer, RR Maiti, S Sandra, R Sridharan
US Patent 10,567,243, 2020
52020
You get PADDING, everybody gets PADDING! You get privacy? Evaluating practical QUIC website fingerprinting protections for the masses
S Siby, L Barman, C Wood, M Fayed, N Sullivan, C Troncoso
arXiv e-prints, arXiv: 2203.07806, 2022
2*2022
Paying your internet, one byte at a time
S Siby
22013
ISSTA: an integrated sensing system for transportation applications
K Yeo-Moriuchi, SD Siby, Z Hu, M Motani
2011 IEEE Vehicular Technology Conference (VTC Fall), 1-5, 2011
22011
Method: A framework for the emulation of a delay-tolerant network scenario for media content distribution in under-served regions
A Galati, S Siby, T Bourchas, M Olivares, S Mangold, TR Gross
Advances in Computer Communications and Networks From Green, Mobile …, 2022
12022
COOKIEGRAPH: Measuring and Countering First-Party Tracking Cookies
S Munir, S Siby, U Iqbal, S Englehardt, Z Shafiq, C Troncoso
arXiv preprint arXiv:2208.12370, 2022
12022
Protecting privacy through metadata analysis
SD Siby
EPFL, 2022
2022
Decentralized access control
S Siby
2017
The system can't perform the operation now. Try again later.
Articles 1–20