Profile picture of Anish

Anish Athalye

Email: aathalye@mit.edu
Blog: anishathalye.com
GitHub: @anishathalye
Twitter: @anishathalye

Bio

I am CTO and co-founder at Cleanlab, where we are building tools for data-centric AI. Previously, I completed my PhD at MIT CSAIL in the PDOS group. Before that, I was an undergrad at MIT, during which I co-founded Code for Good, helped run HackMIT, and interned at OpenAI, Dropbox, Google, and Oak Ridge National Lab.

Publications

  1. Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation

    Anish Athalye, Henry Corrigan-Gibbs, M. Frans Kaashoek, Joseph Tassarotti, and Nickolai Zeldovich.

    30th ACM Symposium on Operating Systems Principles (SOSP 2024).

  2. Verifying Hardware Security Modules with Information-Preserving Refinement

    Anish Athalye, M. Frans Kaashoek, and Nickolai Zeldovich.

    16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2022).

  3. Pervasive Label Errors in Test Sets Destabilize Machine Learning Benchmarks

    Curtis G. Northcutt, Anish Athalye, and Jonas Mueller.

    35th Conference on Neural Information Processing Systems (NeurIPS 2021)
    Track on Datasets and Benchmarks
    .

  4. Notary: A Device for Secure Transaction Approval

    Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Morris, and Nickolai Zeldovich.

    27th ACM Symposium on Operating Systems Principles (SOSP 2019).

  5. Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples

    Anish Athalye*, Nicholas Carlini*, and David Wagner.

    35th International Conference on Machine Learning (ICML 2018).

    (Best Paper Award)

  6. Synthesizing Robust Adversarial Examples

    Anish Athalye*, Logan Engstrom*, Andrew Ilyas*, and Kevin Kwok.

    35th International Conference on Machine Learning (ICML 2018).

  7. Black-box Adversarial Attacks with Limited Queries and Information

    Andrew Ilyas*, Logan Engstrom*, Anish Athalye*, and Jessy Lin*.

    35th International Conference on Machine Learning (ICML 2018).

  8. pASSWORD tYPOS and How to Correct Them Securely

    Rahul Chatterjee, Anish Athalye, Devdatta Akhawe, Ari Juels, and Thomas Ristenpart.

    37th IEEE Symposium on Security and Privacy (SP 2016).

    (Distinguished Student Paper Award)

Short Papers

  1. The K2 Architecture for Trustworthy Hardware Security Modules

    Anish Athalye, M. Frans Kaashoek, Nickolai Zeldovich, and Joseph Tassarotti.

    1st Workshop on Kernel Isolation, Safety and Verification (KISV 2023).

  2. Leakage models are a leaky abstraction: the case for cycle-level verification of constant-time cryptography

    Anish Athalye, M. Frans Kaashoek, Nickolai Zeldovich, and Joseph Tassarotti.

    1st Workshop on Programming Languages and Computer Architecture (PLARCH 2023).

  3. rtlv: push-button verification of software on hardware

    Noah Moroze, Anish Athalye, M. Frans Kaashoek, and Nickolai Zeldovich.

    5th Workshop on Computer Architecture Research with RISC-V (CARRV 2021).

  4. Evaluating and Understanding the Robustness of Adversarial Logit Pairing

    Logan Engstrom*, Andrew Ilyas*, and Anish Athalye*.

    NeurIPS 2018 Workshop on Security in Machine Learning (SECML 2018).

  5. On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses

    Anish Athalye* and Nicholas Carlini*.

    The Bright and Dark Sides of Computer Vision: Challenges and Opportunities for Privacy and Security (CV-COPS 2018).

Manuscripts

  1. Formally Verifying Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation

    Anish Athalye.

    Ph.D. thesis, Massachusetts Institute of Technology, August 2024.

  2. On Evaluating Adversarial Robustness

    Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian Goodfellow, Aleksander Madry, and Alexey Kurakin.

Projects