rishabhp@eecs.berkeley.edu
@podcastinator
465 Soda Hall, Berkeley, CA
I'm the Co-Founder & CTO of Opaque Systems.
I received my Ph.D. in computer science from UC Berkeley, working in the RiseLab where I was advised by Raluca Ada Popa. I received my B.Tech. in computer science from IIT Kharagpur. I'm broadly interested in systems security and applied cryptography.
Before moving to Berkeley, I spent a couple of years at IBM Research working on software-defined networks and cloud computing. Before that, I briefly dabbled in management consulting at The Boston Consulting Group in India.
Senate: A Maliciously Secure MPC Platform for Collaborative Analytics
USENIX Security 2021
Paper
Extended version
ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State
USENIX Security 2021
Paper
Visor: Privacy-Preserving Video Analytics as a Cloud Service
USENIX Security 2020
2nd Place, CSAW Applied Research Competition
Paper
Extended version
Practical Volume-Based Attacks on Encrypted Databases
IEEE EuroS&P 2020
(*Co-primary authors)
Paper
Secure Collaborative Training and Inference for XGBoost
PPMLP 2020
Paper
Arx: An Encrypted Database using Semantically Secure Encryption
VLDB 2019
Paper
Extended version
Oblix: An Efficient Oblivious Search Index
IEEE S&P (Oakland) 2018
Paper
SafeBricks: Shielding Network Functions in the Cloud
NSDI 2018
Paper
Slides
Arx: A Strongly Encrypted Database System
Cryptology ePrint Archive, Report 2016/591
ePrint
A Secure One-Roundtrip Index for Range Queries
Cryptology ePrint Archive, Report 2016/568
ePrint
Jury: Validating Controller Actions in Software-Defined Networks
DSN 2016
Paper
Hansel: Diagnosing Faults in OpenStack
CoNEXT 2015
Paper
Sphinx: Detecting Security Attacks in Software-Defined Networks
NDSS 2015
Paper
Haven: Holistic Load Balancing and Auto Scaling in the Cloud
COMSNETS 2015
Paper
Effective Switch Memory Management in OpenFlow Networks
DEBS 2014
Paper
Remedy: Network-Aware Steady State VM Management for Data Centers
NETWORKING 2012
Paper
An Enhanced Differential Cache Attack on Clefia for Large Cache Lines
INDOCRYPT 2011
Paper
A Cache Trace Attack on Camellia
InfoSecHiComNet 2011
Paper