


default search action
Cristina Nita-Rotaru
Person information
- affiliation: Northeastern University, Boston, MA, USA
- affiliation (former): Purdue University, West Lafayette,IN, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c103]Ben Weintraub
, Satwik Prabhu Kumble
, Cristina Nita-Rotaru
, Stefanie Roos
:
Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network. CCS 2024: 2562-2576 - [c102]Christof Ferreira Torres
, Albin Mamuti
, Ben Weintraub
, Cristina Nita-Rotaru
, Shweta Shinde
:
Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups. CCS 2024: 2591-2605 - [c101]Ben Weintraub
, Jiwon Kim
, Ran Tao
, Cristina Nita-Rotaru
, Hamed Okhravi
, Dave (Jing) Tian
, Benjamin E. Ujcich
:
Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based Networking. CCS 2024: 3630-3644 - [c100]Ankit Kumar, Max von Hippel, Panagiotis Manolios, Cristina Nita-Rotaru:
Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers. SP 2024: 2142-2160 - [c99]Jacob Ginesin, Max von Hippel, Evan Defloor, Cristina Nita-Rotaru, Michael Tüxen:
A Formal Analysis of SCTP: Attack Synthesis and Patch Verification. USENIX Security Symposium 2024 - [i25]Jacob Ginesin, Max von Hippel, Evan Defloor, Cristina Nita-Rotaru, Michael Tüxen:
A Formal Analysis of SCTP: Attack Synthesis and Patch Verification. CoRR abs/2403.05663 (2024) - [i24]Christof Ferreira Torres, Albin Mamuti, Ben Weintraub, Cristina Nita-Rotaru, Shweta Shinde:
Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups. CoRR abs/2405.00138 (2024) - [i23]Ben Weintraub, Satwik Prabhu Kumble, Cristina Nita-Rotaru, Stefanie Roos:
Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network. CoRR abs/2405.02147 (2024) - [i22]Harsh Chaudhari, Giorgio Severi, John Abascal, Matthew Jagielski, Christopher A. Choquette-Choo, Milad Nasr, Cristina Nita-Rotaru, Alina Oprea:
Phantom: General Trigger Attacks on Retrieval Augmented Language Generation. CoRR abs/2405.20485 (2024) - [i21]Jacob Ginesin, Cristina Nita-Rotaru:
A Formal, Symbolic Analysis of the Matrix Cryptographic Protocol Suite. CoRR abs/2408.12743 (2024) - 2023
- [c98]Kacper Wardega, Max von Hippel, Roberto Tron, Cristina Nita-Rotaru, Wenchao Li:
Byzantine Resilience at Swarm Scale: A Decentralized Blocklist Protocol from Inter-robot Accusations. AAMAS 2023: 1430-1438 - [c97]Kacper Wardega, Max von Hippel, Roberto Tron, Cristina Nita-Rotaru, Wenchao Li:
HoLA Robots: Mitigating Plan-Deviation Attacks in Multi-Robot Systems with Co-Observations and Horizon-Limiting Announcements. AAMAS 2023: 2553-2555 - [c96]Max von Hippel, Kenneth L. McMillan, Cristina Nita-Rotaru, Lenore D. Zuck:
A Formal Analysis of Karn's Algorithm. NETYS 2023: 43-61 - [c95]Iffat Anjum
, Jessica Sokal
, Hafiza Ramzah Rehman
, Ben Weintraub
, Ethan Leba
, William Enck
, Cristina Nita-Rotaru
, Bradley Reaves
:
MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy. SACMAT 2023: 121-132 - [c94]Max von Hippel, Panagiotis Manolios, Kenneth L. McMillan, Cristina Nita-Rotaru, Lenore D. Zuck:
A Case Study in Analytic Protocol Analysis in ACL2. ACL2 2023: 50-66 - [c93]Ankit Kumar, Max von Hippel, Panagiotis Manolios, Cristina Nita-Rotaru:
Verification of GossipSub in ACL2s. ACL2 2023: 113-132 - [i20]Kacper Wardega, Max von Hippel, Roberto Tron, Cristina Nita-Rotaru, Wenchao Li:
Byzantine Resilience at Swarm Scale: A Decentralized Blocklist Protocol from Inter-robot Accusations. CoRR abs/2301.06977 (2023) - [i19]Gökberk Yar, Cristina Nita-Rotaru, Alina Oprea:
Backdoor Attacks in Peer-to-Peer Federated Learning. CoRR abs/2301.09732 (2023) - [i18]Kacper Wardega, Max von Hippel, Roberto Tron, Cristina Nita-Rotaru, Wenchao Li:
HoLA Robots: Mitigating Plan-Deviation Attacks in Multi-Robot Systems with Co-Observations and Horizon-Limiting Announcements. CoRR abs/2301.10704 (2023) - [i17]Xugui Zhou, Anqi Chen, Maxfield Kouzel, Haotian Ren, Morgan McCarty, Cristina Nita-Rotaru, Homa Alemzadeh:
Experimental Security Analysis of DNN-based Adaptive Cruise Control under Context-Aware Perception Attacks. CoRR abs/2307.08939 (2023) - [i16]Nasimeh Heydaribeni, Ruisi Zhang, Tara Javidi, Cristina Nita-Rotaru, Farinaz Koushanfar:
SABRE: Robust Bayesian Peer-to-Peer Federated Learning. CoRR abs/2308.02747 (2023) - 2022
- [c92]Cristina Nita-Rotaru:
Dynamic Security with SDN: Opportunities, Challenges, and Lessons Learned. MTD@CCS 2022: 1-2 - [c91]Majid Ghaderi, Samuel Jero, Cristina Nita-Rotaru, Reihaneh Safavi-Naini:
On Randomization in MTD Systems. MTD@CCS 2022: 37-43 - [c90]Giorgio Severi, Matthew Jagielski, Gökberk Yar, Yuxuan Wang, Alina Oprea, Cristina Nita-Rotaru:
Network-Level Adversaries in Federated Learning. CNS 2022: 19-27 - [c89]Leila Rashidi, Sogand SadrHaghighi, Majid Ghaderi, Cristina Nita-Rotaru, Reihaneh Safavi-Naini:
Securing Communication Against Leaky Switches. CNS 2022: 335-343 - [c88]Sidney La Fontaine, Naveen Muralidhar, Michael Clifford, Tina Eliassi-Rad, Cristina Nita-Rotaru:
Alternative Route-Based Attacks in Metropolitan Traffic Systems. DSN Workshops 2022: 20-27 - [c87]Ben Weintraub, Christof Ferreira Torres
, Cristina Nita-Rotaru, Radu State:
A flash(bot) in the pan: measuring maximal extractable value in private pools. IMC 2022: 458-471 - [c86]Iffat Anjum, Daniel Kostecki, Ethan Leba, Jessica Sokal, Rajit Bharambe, William Enck, Cristina Nita-Rotaru, Bradley Reaves:
Removing the Reliance on Perimeters for Security using Network Views. SACMAT 2022: 151-162 - [c85]Maria Leonor Pacheco
, Max von Hippel, Ben Weintraub, Dan Goldwasser, Cristina Nita-Rotaru:
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents. SP 2022: 51-68 - [c84]Kyle Hogan, Sacha Servan-Schreiber, Zachary Newman
, Ben Weintraub, Cristina Nita-Rotaru, Srinivas Devadas:
ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing. SP 2022: 1933-1952 - [i15]Maria Leonor Pacheco, Max von Hippel, Ben Weintraub, Dan Goldwasser, Cristina Nita-Rotaru:
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents. CoRR abs/2202.09470 (2022) - [i14]Kyle Hogan, Sacha Servan-Schreiber, Zachary Newman
, Ben Weintraub, Cristina Nita-Rotaru, Srinivas Devadas:
ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing. CoRR abs/2204.04489 (2022) - [i13]Ben Weintraub, Christof Ferreira Torres, Cristina Nita-Rotaru, Radu State:
A Flash(bot) in the Pan: Measuring Maximal Extractable Value in Private Pools. CoRR abs/2206.04185 (2022) - [i12]Giorgio Severi, Matthew Jagielski, Gökberk Yar, Yuxuan Wang, Alina Oprea, Cristina Nita-Rotaru:
Network-Level Adversaries in Federated Learning. CoRR abs/2208.12911 (2022) - [i11]Ankit Kumar, Max von Hippel, Pete Manolios
, Cristina Nita-Rotaru:
Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers. CoRR abs/2212.05197 (2022) - 2021
- [j39]Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru:
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC. J. Cryptol. 34(3): 26 (2021) - [j38]Michail Schwab, David Saffo, Yixuan Zhang, Shash Sinha, Cristina Nita-Rotaru, James Tompkin
, Cody Dunne
, Michelle A. Borkin
:
VisConnect: Distributed Event Synchronization for Collaborative Visualization. IEEE Trans. Vis. Comput. Graph. 27(2): 347-357 (2021) - [c83]Lucian Trestioreanu, Cristina Nita-Rotaru, Aanchal Malhotra, Radu State:
SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay. CNS 2021: 92-100 - [c82]Ben Weintraub, Cristina Nita-Rotaru:
Structural Attacks on Local Routing in Payment Channel Networks. EuroS&P Workshops 2021: 367-379 - [c81]Lucianna Kiffer, Asad Salman, Dave Levin, Alan Mislove, Cristina Nita-Rotaru:
Under the Hood of the Ethereum Gossip Protocol. Financial Cryptography (2) 2021: 437-456 - [c80]Leila Rashidi, Daniel Kostecki, Alexander James, Anthony Peterson, Majid Ghaderi, Samuel Jero, Cristina Nita-Rotaru, Hamed Okhravi, Reihaneh Safavi-Naini:
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes. NDSS 2021 - [i10]Lucian Trestioreanu
, Cristina Nita-Rotaru, Aanchal Malhotra, Radu State:
SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay. CoRR abs/2110.09207 (2021) - 2020
- [c79]Anthony Peterson, Samuel Jero, Md. Endadul Hoque, David R. Choffnes, Cristina Nita-Rotaru:
aBBRate: Automating BBR Attack Exploration Using a Model-Based Approach. RAID 2020: 225-240 - [c78]Max von Hippel, Cole Vick
, Stavros Tripakis, Cristina Nita-Rotaru:
Automated Attacker Synthesis for Distributed Protocols. SAFECOMP 2020: 133-149 - [i9]Max von Hippel, Cole Vick, Stavros Tripakis, Cristina Nita-Rotaru:
Automated Attacker Synthesis for Distributed Protocols. CoRR abs/2004.01220 (2020) - [i8]Ben Weintraub, Cristina Nita-Rotaru, Stefanie Roos:
Exploiting Centrality: Attacks in Payment Channel Networks with Local Routing. CoRR abs/2007.09047 (2020)
2010 – 2019
- 2019
- [j37]Arash Molavi Kakhki, Samuel Jero, David R. Choffnes, Cristina Nita-Rotaru, Alan Mislove:
Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols. Commun. ACM 62(7): 86-94 (2019) - [c77]Samuel Jero, Maria Leonor Pacheco
, Dan Goldwasser, Cristina Nita-Rotaru:
Leveraging Textual Specifications for Grammar-Based Fuzzing of Network Protocols. AAAI 2019: 9478-9483 - [c76]Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru:
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC. ESORICS (1) 2019: 404-426 - [c75]Sean Rivera, Sofiane Lagraa, Cristina Nita-Rotaru, Sheila Becker, Radu State:
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications. IEEE Symposium on Security and Privacy Workshops 2019: 114-119 - [c74]Alesia Chernikova, Alina Oprea, Cristina Nita-Rotaru, BaekGyu Kim
:
Are Self-Driving Cars Secure? Evasion Attacks Against Deep Neural Networks for Steering Angle Prediction. IEEE Symposium on Security and Privacy Workshops 2019: 132-137 - [c73]Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli:
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks. USENIX Security Symposium 2019: 321-338 - [i7]Alesia Chernikova, Alina Oprea, Cristina Nita-Rotaru, BaekGyu Kim:
Are Self-Driving Cars Secure? Evasion Attacks against Deep Neural Networks for Steering Angle Prediction. CoRR abs/1904.07370 (2019) - [i6]Talha Ongun, Oliver Spohngellert, Alina Oprea, Cristina Nita-Rotaru, Mihai Christodorescu, Negin Salajegheh:
The House That Knows You: User Authentication Based on IoT Data. CoRR abs/1908.00592 (2019) - [i5]Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru:
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC. IACR Cryptol. ePrint Arch. 2019: 433 (2019) - 2018
- [c72]Samuel Jero, Md. Endadul Hoque, David R. Choffnes, Alan Mislove, Cristina Nita-Rotaru:
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach. ANRW 2018: 95 - [c71]Benjamin E. Ujcich
, Samuel Jero, Anne Edmundson, Qi Wang, Richard Skowyra, James Landry, Adam Bates, William H. Sanders, Cristina Nita-Rotaru, Hamed Okhravi:
Cross-App Poisoning in Software-Defined Networking. CCS 2018: 648-663 - [c70]Talha Ongun, Alina Oprea, Cristina Nita-Rotaru, Mihai Christodorescu, Negin Salajegheh:
The House That Knows You: User Authentication Based on IoT Data. CCS 2018: 2255-2257 - [c69]Hengyi Liang, Matthew Jagielski, Bowen Zheng, Chung-Wei Lin, Eunsuk Kang, Shinichi Shiraishi, Cristina Nita-Rotaru, Qi Zhu:
Network and system level security in connected vehicle applications. ICCAD 2018: 94 - [c68]Samuel Jero, Md. Endadul Hoque, David R. Choffnes, Alan Mislove, Cristina Nita-Rotaru:
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach. NDSS 2018 - [c67]Matthew Jagielski, Alina Oprea, Battista Biggio
, Chang Liu, Cristina Nita-Rotaru, Bo Li:
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning. IEEE Symposium on Security and Privacy 2018: 19-35 - [c66]Matthew Jagielski, Nicholas Jones, Chung-Wei Lin, Cristina Nita-Rotaru, Shinichi Shiraishi:
Threat Detection for Collaborative Adaptive Cruise Control in Connected Cars. WISEC 2018: 184-189 - [i4]Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li:
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning. CoRR abs/1804.00308 (2018) - [i3]Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli:
On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks. CoRR abs/1809.02861 (2018) - [i2]Samuel Jero, Maria Leonor Pacheco, Dan Goldwasser, Cristina Nita-Rotaru:
Leveraging Textual Specifications for Grammar-based Fuzzing of Network Protocols. CoRR abs/1810.04755 (2018) - 2017
- [j36]Matthias Hollick, Cristina Nita-Rotaru, Panagiotis Papadimitratos, Adrian Perrig, Stefan Schmid
:
Toward a Taxonomy and Attacker Model for Secure Routing Protocols. Comput. Commun. Rev. 47(1): 43-48 (2017) - [c65]Md. Endadul Hoque
, Omar Chowdhury, Sze Yiu Chau
, Cristina Nita-Rotaru, Ninghui Li:
Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs. DSN 2017: 627-638 - [c64]Arash Molavi Kakhki, Samuel Jero, David R. Choffnes, Cristina Nita-Rotaru, Alan Mislove:
Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols. Internet Measurement Conference 2017: 290-303 - [c63]Antonio Ken Iannillo
, Roberto Natella
, Domenico Cotroneo, Cristina Nita-Rotaru:
Chizpurfle: A Gray-Box Android Fuzzer for Vendor Service Customizations. ISSRE 2017: 1-11 - [c62]Samuel Jero, Xiangyu Bu, Cristina Nita-Rotaru, Hamed Okhravi, Richard Skowyra, Sonia Fahmy
:
BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems. RAID 2017: 311-333 - [c61]Sze Yiu Chau
, Omar Chowdhury, Md. Endadul Hoque
, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, Ninghui Li:
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations. IEEE Symposium on Security and Privacy 2017: 503-520 - [c60]Samuel Jero, William Koch, Richard Skowyra, Hamed Okhravi, Cristina Nita-Rotaru, David Bigelow:
Identifier Binding Attacks and Defenses in Software-Defined Networks. USENIX Security Symposium 2017: 415-432 - 2016
- [j35]Oliviu C. Ghica, Cristina Nita-Rotaru, Goce Trajcevski, Peter Scheuermann:
Security of electrostatic field persistent routing: Attacks and defense mechanisms. Ad Hoc Networks 36: 270-295 (2016) - [j34]Md. Endadul Hoque
, Hyojeong Lee, Rahul Potharaju, Charles Killian, Cristina Nita-Rotaru:
Automated Adversarial Testing of Unmodified Wireless Routing Implementations. IEEE/ACM Trans. Netw. 24(6): 3369-3382 (2016) - [c59]Daniel Obenshain, Thomas Tantillo, Amy Babay
, John L. Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, Cristina Nita-Rotaru:
Practical Intrusion-Tolerant Networks. ICDCS 2016: 45-56 - [c58]Alina Oprea, Ata Turk, Cristina Nita-Rotaru, Orran Krieger:
MOSAIC: A Platform for Monitoring and Security Analytics in Public Clouds. SecDev 2016: 69-70 - [c57]Md. Endadul Hoque
, Cristina Nita-Rotaru:
Building Robust Distributed Systems and Network Protocols by Using Adversarial Testing and Behavioral Analysis. SecDev 2016: 138-145 - 2015
- [j33]Md. Endadul Hoque, Rahul Potharaju, Cristina Nita-Rotaru, Saswati Sarkar, Santosh S. Venkatesh:
Taming epidemic outbreaks in mobile adhoc networks. Ad Hoc Networks 24: 57-72 (2015) - [j32]Rahul Potharaju, Joseph Chan, Luhui Hu, Cristina Nita-Rotaru, Mingshi Wang, Liyuan Zhang, Navendu Jain:
ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection. Proc. VLDB Endow. 8(12): 1828-1839 (2015) - [j31]Andrew Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, Yair Amir:
Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes. IEEE Trans. Dependable Secur. Comput. 12(6): 602-614 (2015) - [j30]Hyojeong Lee, Jeff Seibert, Dylan Fistrovic, Charles Killian, Cristina Nita-Rotaru:
Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed Systems. ACM Trans. Inf. Syst. Secur. 17(4): 13:1-13:34 (2015) - [c56]Florian Kerschbaum, Cristina Nita-Rotaru, Indrajit Ray:
CCSW 2015: The 7th ACM Cloud Computing Security Workshop. CCS 2015: 1703-1704 - [c55]Samuel Jero, Hyojeong Lee, Cristina Nita-Rotaru:
Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations. DSN 2015: 1-12 - [c54]Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru:
How Secure and Quick is QUIC? Provable Security and Performance Analyses. IEEE Symposium on Security and Privacy 2015: 214-231 - [e6]Indrajit Ray, Xiaofeng Wang, Kui Ren, Florian Kerschbaum, Cristina Nita-Rotaru:
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, CCSW 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3825-7 [contents] - [i1]Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru:
How Secure and Quick is QUIC? Provable Security and Performance Analyses. IACR Cryptol. ePrint Arch. 2015: 582 (2015) - 2014
- [j29]Andrew Newell, Hongyi Yao, Alex Ryker, Tracey Ho, Cristina Nita-Rotaru:
Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols. ACM Comput. Surv. 47(2): 24:1-24:34 (2014) - [j28]Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Pratim Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Generating Summary Risk Scores for Mobile Applications. IEEE Trans. Dependable Secur. Comput. 11(3): 238-251 (2014) - [j27]Jeff Seibert, Sheila Becker, Cristina Nita-Rotaru, Radu State:
Newton: Securing Virtual Coordinates by Enforcing Physical Laws. IEEE/ACM Trans. Netw. 22(3): 798-811 (2014) - [c53]Andrew Newell, Rahul Potharaju, Luojie Xiang, Cristina Nita-Rotaru:
On the Practicality of Integrity Attacks on Document-Level Sentiment Analysis. AISec@CCS 2014: 83-93 - [c52]Hyojeong Lee, Jeff Seibert, Md. Endadul Hoque, Charles Killian, Cristina Nita-Rotaru:
Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations. ICDCS 2014: 660-669 - 2013
- [j26]Andrew Newell, Jing Dong, Cristina Nita-Rotaru:
On the practicality of cryptographic defences against pollution attacks in wireless network coding. ACM Comput. Surv. 45(3): 39:1-39:26 (2013) - [j25]Stefano Paris, Cristina Nita-Rotaru, Fabio Martignon, Antonio Capone
:
Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks. IEEE/ACM Trans. Netw. 21(3): 1003-1016 (2013) - [c51]Andrew Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, Yair Amir:
Increasing network resiliency by optimally assigning diverse variants to routing nodes. DSN 2013: 1-12 - [c50]Rafae Bhatti, Camille Gaspard, Cristina Nita-Rotaru:
Access Control in Social Enterprise Applications: An Empirical Evaluation. ICDCS Workshops 2013: 167-171 - [c49]Rahul Potharaju, Navendu Jain, Cristina Nita-Rotaru:
Juggling the Jigsaw: Towards Automated Problem Inference from Network Trouble Tickets. NSDI 2013: 127-141 - [c48]Md. Endadul Hoque, Hyojeong Lee, Rahul Potharaju, Charles E. Killian, Cristina Nita-Rotaru:
Adversarial testing of wireless routing implementations. WISEC 2013: 143-148 - [e5]Michel Abdalla
, Cristina Nita-Rotaru, Ricardo Dahab:
Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings. Lecture Notes in Computer Science 8257, Springer 2013, ISBN 978-3-319-02936-8 [contents] - [e4]Sajal K. Das, Cristina Nita-Rotaru, Murat Kantarcioglu:
Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings. Lecture Notes in Computer Science 8252, Springer 2013, ISBN 978-3-319-02785-2 [contents] - 2012
- [j24]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru, David K. Y. Yau:
Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems. IEEE Trans. Dependable Secur. Comput. 9(5): 741-755 (2012) - [j23]Jeff Seibert, Ruben Torres, Marco Mellia
, Maurizio M. Munafò, Cristina Nita-Rotaru, Sanjay G. Rao:
The internet-wide impact of P2P traffic localization on ISP profitability. IEEE/ACM Trans. Netw. 20(6): 1910-1923 (2012) - [c47]Hao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Using probabilistic generative models for ranking risks of Android apps. CCS 2012: 241-252 - [c46]Oliviu Ghica, Cristina Nita-Rotaru, Goce Trajcevski, Peter Scheuermann:
Security of Electrostatic Field Persistent Routing: Attacks and Defense Mechanisms. EDCC 2012: 102-113 - [c45]Rahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, Xiangyu Zhang:
Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques. ESSoS 2012: 106-120 - [c44]Jeffrey Seibert, Sheila Becker, Cristina Nita-Rotaru, Radu State:
Securing Virtual Coordinates by Enforcing Physical Laws. ICDCS 2012: 315-324 - [c43]Rahul Potharaju, Md. Endadul Hoque, Cristina Nita-Rotaru, Saswati Sarkar, Santosh S. Venkatesh:
Closing the Pandora's box: Defenses for thwarting epidemic outbreaks in mobile adhoc networks. MASS 2012: 200-208 - [c42]Hyojeong Lee, Jeff Seibert, Charles Killian, Cristina Nita-Rotaru:
Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems. NDSS 2012 - [c41]Jeff Seibert, Sheila Becker, Cristina Nita-Rotaru, Radu State:
Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems. NDSS 2012 - [c40]Bhaskar Pratim Sarma, Ninghui Li, Christopher S. Gates, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Android permissions: a perspective combining risks and benefits. SACMAT 2012: 13-22 - [c39]Andrew Newell, Cristina Nita-Rotaru:
Split Null Keys: A null space based defense for pollution attacks in wireless network coding. SECON 2012: 479-487 - [c38]Andrew Newell, Reza Curtmola, Cristina Nita-Rotaru:
Entropy attacks and countermeasures in wireless network coding. WISEC 2012: 185-196 - 2011
- [j22]Jeff Seibert, Xin Sun, Cristina Nita-Rotaru, Sanjay G. Rao:
A design for securing data delivery in mesh-based peer-to-peer streaming. Comput. Networks 55(12): 2730-2745 (2011) - [j21]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Practical defenses against pollution attacks in wireless network coding. ACM Trans. Inf. Syst. Secur. 14(1): 7:1-7:31 (2011) - [j20]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Secure High-Throughput Multicast Routing in Wireless Mesh Networks. IEEE Trans. Mob. Comput. 10(5): 653-668 (2011) - [c37]Hongyi Yao, Tracey Ho, Cristina Nita-Rotaru:
Key agreement for wireless networks in the presence of active adversaries. ACSCC 2011: 792-796 - [c36]Sheila Becker, Jeff Seibert, David Zage, Cristina Nita-Rotaru, Radu State:
Applying game theory to analyze attacks and defenses in virtual coordinate systems. DSN 2011: 133-144 - [c35]