Robust Linear Regression Against Training Data Poisoning.
Chang Liu, Bo Li, Yevgeniy Vorobeychik, and Alina Oprea.
In Proceedings of 10th ACM Workshop on Artificial Intelligence and Security (AISEC), 2017. Best paper award.
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach.
Samuel Jero,
Endadul Hoque,
David Choffnes,
Alan Mislove,
Cristina Nita-Rotaru.
NDSS 2018, Feb. 2018. CISCO Network Security Distinguished Paper
Award.
[ SRC ]
[PDF]
|
Taking a Long Look at QUIC: An Approach for Rigorous
Evaluation of Rapidly Evolving Transport Protocols.
Arash Molavi Kakhki,
Samuel Jero,
David Choffnes,
Alan Mislove,
Cristina Nita-Rotaru.
IMC 2017, Nov. 2017. Awarded
IETF/IRTF
Applied
Networking
Research Prize
2018
[PDF]
|
Chizpurfle: A Gray-Box Android Fuzzer for Vendor Service Customizations
Antonio Ken Iannillo, Roberto Natella, Domenico Cotroneo, Cristina Nita-Rotaru.
IEEE ISSRE 2017, September 2017.
|
BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems.
Samuel Jero, Xiangyu Bu, Hamed Okhravi,
Cristina Nita-Rotaru, Richard Skowyra, Sonia Fahmy.
RAID 2017, September 2017.
[PDF]
|
Identifier Binding Attacks and Defenses in Software-Defined
Networks.
Samuel Jero, William Koch, Richard Skowyra, Hamed Okhravi,
Cristina Nita-Rotaru, David Bigelow.
USENIX Security 2017, August 2017.
[PDF]
|
Analyzing Operational Behavior of Stateful Protocol
Implementations for Detecting Semantic Bugs.
Endadul Hoque, Omar Chowdhury, Sze Yiu Chau, Cristina
Nita-Rotaru, Ninghui Li. DSN 2017, June 2017.
[PDF]
|
SymCerts: Practical Symbolic Execution For Exposing
Noncompliance in X.509 Certificate Validation Implementations.
Sze Yiu Chau, Omar Chowdhury, Endadul Hoque, Huangyi Ge, Aniket Kate,
Cristina Nita-Rotaru, Ninghui Li. IEEE Security and Privacy, May 2017.
[PDF]
|
Building Robust Distributed Systems and Network Protocols by Using
Adversarial Testing and Behavioral Analysis.
Endadul Hoque and Cristina Nita-Rotaru. IEEE Cybersecurity Development (SecDev), Nov. 2016.
[PDF]
|
Practical Intrusion-Tolerant Networks.
D. Obenshain, T. Tantillo, A. Baby, J. Schultz, A. Newell, E.Hoque, Y. Amir and C. Nita-Rotaru. ICDCS 2016,
[PDF]
|
Leveraging State Information for Automated Attack Discovery
in Transport Protocol Implementations.
S. Jero, H. Lee, and C. Nita-Rotaru. In the 45th
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
June 2015. Best paper award.
[PDF]
[BIBTEX]
|
ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection.
R. Potharaju, J. Chan, L. Hu, C. Nita-Rotaru, M. Wang, L. Zhang, N. Jain. VLDB 2015, Industrial Track.
|
How Secure and Quick is QUIC? Provable Security and Performance Analyses.
R. Lychev, S. Jero, A. Boldyreva, and C. Nita-Rotaru. 36th IEEE Symposium on Security and Privacy (Oakland), May 2015. Awarded IETF/IRTF Applied Networking Research Prize, 2016.
[PDF]
|
On the Practicality of Integrity Attacks on Document-Level Sentiment Analysis.
A. Newell, R. Potharaju. L. Xiang, and C. Nita-Rotaru.
In the 7th ACM Workshop on Artificial Intelligence and Security (AISec) with the 21st ACM CCS, Nov. 2014.
[PDF]
|
Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations
Hyojeong Lee, Jeff Seibert, Md. Endadul Hoque, Charles Killian, and Cristina Nita-Rotaru.
34th International Conference on Distributed Computing Systems (ICDCS), Jun. 2014.
[PDF]
[BIBTEX]
|
Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes.
Andrew Newell, Daniel Obenshain, Tom Tantillo, Cristina Nita-Rotuaru, and Yair Amir. In Proc. of The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013.
[PDF]
[BIBTEX]
[Technical report]
|
Adversarial Testing of Wireless Routing Implementations
Md. Endadul Hoque, Hyojeong Lee, Rahul Potharaju, Charles Killian, and Cristina Nita-Rotaru.
6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Apr. 2013
[PDF][BIBTEX]
|
Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems
Hyojeong Lee, Jeff Seibert, Charles Killian, and Cristina Nita-Rotaru.
In Proc. of 19th Annual Network & Distributed System Security Symposium (NDSS), Feb. 2012.
[PDF][BIBTEX]
|
Closing the Pandora's Box: Defenses for Thwarting Epidemic
Outbreaks in Mobile Adhoc Networks.
R. Potharaju, E. Hoque, C. Nita-Rotaru, S. S. Venkatesh, and S. Sarkar.
In Proceedings of the 9th IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS 2012), Oct. 2012.
[PDF][BIBTEX]
|
Using Probabilistic Generative Models For Ranking Risks of Android Apps.
H. Peng, C. Gates, B. Sarma, N. Li, A. Qi, R. Potharaju, C.
Nita-Rotaru and I. Molloy.
In Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012), pp 241-252, Oct. 2012.
[PDF][BIBTEX]
|
Android Permissions: A Perspective Combining Risks and Benefits.
Bhaskar Sarma, Ninghui Li, Chris Gates, Rahul Potharaju, Cristina Nita-Rotaru and Ian Molloy.
In Proceedings of The ACM Symposium on Access Control Models and Technologies (SACMAT), 2012.
[PDF]
[BIBTEX]
|
Intrusion-Tolerant Cloud Monitoring and Control.
Daniel Obenshain, Tom Tantillo, Andrew Newell, Cristina Nita-Rotaru and Yair Amir.
In Proc. of Large-Scale Distributed Systems and Middleware (LADIS), 2012.
[BIBTEX]
|
Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques.
Rahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, and Xiangyu Zhang.
In Proceedings of International Symposium on Engineering Secure Software and Systems (ESSoS), 2012. [PDF][BIBTEX]
|
Applying Game Theory to Analyze Attacks and Defenses in Virtual Coordinate Systems.
S. Becker, J. Seibert, D. Zage, C. Nita-Rotaru, and R. State.
In International Conference on Dependable Systems and Networks (DSN), 2011.
|
Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors.
R. Potharaju, J. Seibert, S. Fahmy, and C. Nita-Rotaru.
In Passive and Active Measurement Conference (PAM), 2011.
[PDF]
|
Towards Securing Data Delivery in Peer-to-Peer Streaming.
J. Seibert, X. Sun, C. Nita-Rotaru, and S. Rao.
IEEE Conference on Communication Systems and Networks (COMSNETS), 2010.
[PDF]
|
Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks.
J. Dong, R. Curtmola, C. Nita-Rotaru. In the Second ACM Conference on Wireless Network Security (WiSec), Zurich, Switzerland, March 2009.
|
Experimental Comparison of Peer-to-Peer Streaming Overlays: An Application perspective.
J. Seibert, D. Zage, S. Fahmy and C. Nita-Rotaru.
The 33rd IEEE Conference on Local Computer Networks (LCN), Montreal, Quebec, Canada, October 14 - 17, 2008.
[PDF]
|
Toward Secure Network Coding in Wireless Networks: Threats and Challenges.
J. Dong, R. Curtmola, R. Sethi, and C. Nita-Rotaru.
In Proceedings of 4th Workshop on Secure Network Protocols (NPSEC) in
conjunction with IEEE ICNP, Orlando, Florida, Oct 2008.
|
Mitigating Attacks against Virtual Coordinate System Based
Routing in Wireless Sensor Networks.
J. Dong, B. Bhavar, E. Ackermann and C. Nita-Rotaru.
In First ACM Conference
on Wireless Network Security (WiSec), Alexandria, VA, March 2008.
|
On the Pitfalls of Using High-Throughput Metrics in Adversarial Wireless
Mesh Networks,
J. Dong, R. Curtmola and C. Nita-Rotaru.
In the Fifth Annual IEEE Communications Society Conference
on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2008),
San Francisco CA, June 2008.
|
Secure Group Communication in Wireless Mesh Networks.
In Ninth IEEE International Symposium on a World of Wireless, Mobile
and Multimedia Networks (WOWMOM), Newport Beach, CA, June, 2008.
J. Dong, K. Ackermann, and Cristina Nita-Rotaru.
|
On the Accuracy of Decentralized Network Coordinate Systems in Adversarial Networks.
D. Zage and C. Nita-Rotaru.
In the 14th ACM CCS, Alexandria, VA, USA, October 29 - November 2, 2007.
[PDF].
|
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop
Wireless Networks.
R. Curtmola and C. Nita-Rotaru.
In SECON 2007, June 2007, San Diego, CA.
[ PDF ]
|
Enabling
Confidentiality of Data Delivery in an Overlay Broadcasting System.
R. Torres X. Sun, A. Walters, C. Nita-Rotaru and S. Rao.
In INFOCOM 2007, Anchorage, Alaska.
[PDF]
|
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks.
AAron Walters, David Zage and Cristina Nita-Rotaru,
The 14th IEEE International Conference on Network Protocols
November (ICNP) 12-15, 2006
Santa Barbara, California.
[PDF]
|
Steward: Scaling Byzantine Fault-Tolerant Systems to Wide Area Networks.
Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan Kirsch, John Lane, Cristina Nita-Rotaru, Josh Olsen, David Zage,
In The International Conference on Dependable Systems and Networks
(DSN-2006), Philadelphia, PA, June 2006.
[PDF].
Also Technical Report CSD TR 05-029.
[PDF] .
|
A Byzantine Resilient Distributed Position Service.
Josh Olsen, David Zage and Cristina Nita-Rotaru. Extended Abstract.
In The International Conference on Dependable Systems and Networks
(DSN-2006), Philadelphia, PA, June 2006.
|
Po2V: Network Layer Position Verification in Multi-Hop Wireless Networks.
In IEEE International Symposium on a World of Wireless, Mobile
and Multimedia Networks (WOWMOM), Niagara Falls, NY June, 2006.
Xiaoxin Wu and Cristina Nita-Rotaru.
|
On the Survivability of Routing Protocols in Ad Hoc Wireless Networks.
In IEEE Conference on Security and Privacy for Emerging Areas in
Communication Networks (SecureComm) 2005, Sept. 2005.
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru and H. Rubens.
[PDF].
|
DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks.
In IEEE Conference on Security and Privacy for Emerging Areas in
Communication Networks (SecureComm) 2005, Sept. 2005.
I. Khalil, S. Bagchi and C. Nita-Rotaru.
[PDF].
|
On the Security of Distributed Position Services.
In IEEE Conference on Security and Privacy for Emerging Areas in
Communication Networks (SecureComm) 2005, Sept. 2005.
X. Wu and C. Nita-Rotaru.
[PDF].
|
WiViD: Visible Watermak Based Defense Against Phishing.
In International Workshop of Digital Watermarking (IWDW), Sept. 2005.
A. Shamara, M. Topkara, M. Atallah and C. Nita-Rotaru.
[PDF].
|
Network Layer Position Verification
In MobiHoc 2005, Poster , Urbana-Champaign, IL, May 2005.
Xiaoxin Wu and Cristina Nita-Rotaru.
|
SPASS: Scalable and Energy-Efficient Data Acquisition in Sensor Databases.
In 4th International ACM Workshop on Data Engineering for Wireless and
Mobile Access (MobiDe 2005) in conjunction with ACM SIGMOD/PODS.
Baltimore, June 2005.
M.H. Ali, Walid G. Aref and C. Nita-Rotaru.
[PDF].
|
Scalable Routing in Hybrid Cellular and Ad-Hoc Networks.
In IEEE International Symposium on a World of Wireless, Mobile
and Multimedia Networks, Taormina / Giardini Naxos, Italy June, 2005.
Ioannis Ioannidis, Bogdan Carbunar, Cristina Nita-Rotaru.
[PDF]
[Extended Technical Report CSD TR# 05-006]
|
Secure Multi-Hop Infrastructure Access.
In Wireless and Mobile Security Workshop, NDSS'05
Catamaran Resort HotelSan Diego, California, Feb. 2005.
Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru and Herbert Rubens.
|
Synchronization Attacks Against 802.11.
In Wireless and Mobile Security Workshop, NDSS'05
Catamaran Resort HotelSan Diego, California, Feb. 2005.
Gunjan Khanna, Ammar Masood and Cristina Nita-Rotaru.
|
JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless
Networks
In Workshop in Wireless Security WiSe 2004,
In conjunction with MOBICOM 2004, Philadelphia, PA, 2004
Bogdan Carbunar, Ioanis Ioannidis and Cristina Nita-Rotaru.
[PDF] .
|
A Framework for Role-Based Access Control in Group Communication Systems.
In
2004 International Workshop on Security in Parallel and Distributed Systems
In conjunction with the 17th International Conference on Parallel and Distributed
Computing Systems PDCS-2004 San Francisco , CA, September 15-17, 2004
Cristina Nita-Rotaru and Ninghui Li.
[PDF],
[Extended Technical Report CERIAS TR #2003-31] .
|
Coping with the Insider Threat in Scalable Distributed Information Systems
Service. In FuDiCo II: (S.O.S.)Survivability: Obstacles and
Solutions, 2nd International Workshop on Future
Directions in Distributed Computing ,
University of Bologna Residential Center
Bertinoro(Forli), Italy,
June 23-25 2004.
Yair Amir and Cristina Nita-Rotaru.
[PDF].
|
Scaling Secure Group Communication Systems: Beyond
Peer-to-Peer In the Proceedings of DISCEX3,
Washington DC, April 22-24, 2003.
Yair Amir,
Cristina Nita-Rotaru,
Jonathan Stanton,
Gene Tsudik.
[PDF],
[BIB].
|
On the Performance
of Group Key Agreement Protocols. Published in the
Proceedings of the 22nd IEEE International Conference on Distributed
Computing Systems, Vienna, Austria, July 2-5, 2002, short paper.
YairAmir, Yongdae Kim, Cristina Nita-Rotaru, and Gene Tsudik.
[PDF],
[BIB].
|
Stateless-Recipient Certified E-mail System based on
Verifiable Encryption. Published in the Proceedings of RSA
2002 , McEnery Convention Center, San Jose, CA, USA, February
18-22, 2002.
Giuseppe Ateniese and Cristina Nita-Rotaru.
[PDF],
[BIB].
|
Exploring Robustness in Group Key Agreement.
Published in the Proceedings of the 21th IEEE International
Conference on Distributed Computing Systems, Phoenix, Arizona,
April 16-19, 2001, pp 399-408. Nominated for Best Paper Award.
Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John Schultz,
Jonathan Stanton, and Gene Tsudik.
[PDF],
[BIB],
[Extended Technical Report CNDS #2000-4].
|
Secure Group Communication in Asynchronous Networks with Failures:
Integration and Experiments Published in the Proceedings
of the 20th IEEE International Conference on Distributed Computing
Systems, Taipei, Taiwan, April 10-13, 2000, pp 330-343.
Yair Amir,Giuseppe Ateniese,
Damian Hasse, Yongdae Kim,Cristina Nita-Rotaru,
Theo Schlossnagle, John Schultz, Jonathan Stanton, and
Gene Tsudik.
[PDF],
[BIB].
|
An On-Demand Secure Routing Protocol Resilient to Byzantine
Failures. In ACM Workshop on Wireless Security
(WiSe), Atlanta, Georgia, September 28 2002.
Baruch Awerbuch, Dave Holmer,Cristina Nita-Rotaru,
and Herbert Rubens.
[PDF],
[BIB].
|
High Performance, Secure, Robust and Transparent Messaging
Service. In FuDiCo 2002: International Workshop on Future
Directions in Distributed Computing , Bertinoro(Forli), Italy,
June 3-7 2002.
Yair Amir, Claudiu Danilov, and Cristina Nita-Rotaru.
[PS].
|
Framework for Authentication and Access Control of
Client-Server Group Communication Systems Published in the
Proceedings of the Third International Workshop on Networked Group
Communication, London, UK November 7-9 2001.
Yair Amir, Cristina Nita-Rotaru,and Jonathan Stanton.
[PS],
[BIB],
[Extended Technical Report CNDS #2001-2].
|
Survey of Attack and Defense Techniques for Reputation Systems
K. Hoffman, D. Zage and C. Nita-Rotaru.
Technical report CSD TR #07-013, May 2007.
[PDF].
|
Enhancing Distributed Systems with Mechanisms to Cope with Malicious Clients.
Yair Amir, Claudiu Danilov, John Lane, Michal Miskin-Amir, Cristina Nita-Rotaru
[PDF] .
|
DAISY: Increasing Scalability and Robustness of Anonymity Systems
Chi-Bun Chan and Cristina Nita-Rotaru. Technical Report CSD TR #04-018. Oct. 2004.
[PDF] .
|
Robust Security Mechanisms for Data Streams Systems
Mohamed Ali, Mohamed ElTabakh, and Cristina Nita-Rotaru.
Technical Report CSD TR #04-019, May 2004.
[PDF] .
|
|