Cristina Nita-Rotaru

According to our database1, Cristina Nita-Rotaru authored at least 123 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC.
IACR Cryptology ePrint Archive, 2019

The House That Knows You: User Authentication Based on IoT Data.
CoRR, 2019

Are Self-Driving Cars Secure? Evasion Attacks against Deep Neural Networks for Steering Angle Prediction.
CoRR, 2019

Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols.
Commun. ACM, 2019

Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019

ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Are Self-Driving Cars Secure? Evasion Attacks Against Deep Neural Networks for Steering Angle Prediction.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC.
Proceedings of the Computer Security - ESORICS 2019, 2019

Leveraging Textual Specifications for Grammar-Based Fuzzing of Network Protocols.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Leveraging Textual Specifications for Grammar-based Fuzzing of Network Protocols.
CoRR, 2018

On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks.
CoRR, 2018

Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning.
CoRR, 2018

Threat Detection for Collaborative Adaptive Cruise Control in Connected Cars.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Network and system level security in connected vehicle applications.
Proceedings of the International Conference on Computer-Aided Design, 2018

Cross-App Poisoning in Software-Defined Networking.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

The House That Knows You: User Authentication Based on IoT Data.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach.
Proceedings of the Applied Networking Research Workshop, 2018

2017
Toward a Taxonomy and Attacker Model for Secure Routing Protocols.
Computer Communication Review, 2017

Identifier Binding Attacks and Defenses in Software-Defined Networks.
Proceedings of the 26th USENIX Security Symposium, 2017

SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Chizpurfle: A Gray-Box Android Fuzzer for Vendor Service Customizations.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017

Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols.
Proceedings of the 2017 Internet Measurement Conference, 2017

Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Automated Adversarial Testing of Unmodified Wireless Routing Implementations.
IEEE/ACM Trans. Netw., 2016

Security of electrostatic field persistent routing: Attacks and defense mechanisms.
Ad Hoc Networks, 2016

MOSAIC: A Platform for Monitoring and Security Analytics in Public Clouds.
Proceedings of the IEEE Cybersecurity Development, 2016

Building Robust Distributed Systems and Network Protocols by Using Adversarial Testing and Behavioral Analysis.
Proceedings of the IEEE Cybersecurity Development, 2016

Practical Intrusion-Tolerant Networks.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

2015
Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed Systems.
ACM Trans. Inf. Syst. Secur., 2015

Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes.
IEEE Trans. Dependable Sec. Comput., 2015

ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection.
PVLDB, 2015

How Secure and Quick is QUIC? Provable Security and Performance Analyses.
IACR Cryptology ePrint Archive, 2015

Taming epidemic outbreaks in mobile adhoc networks.
Ad Hoc Networks, 2015

How Secure and Quick is QUIC? Provable Security and Performance Analyses.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

CCSW 2015: The 7th ACM Cloud Computing Security Workshop.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Newton: Securing Virtual Coordinates by Enforcing Physical Laws.
IEEE/ACM Trans. Netw., 2014

Generating Summary Risk Scores for Mobile Applications.
IEEE Trans. Dependable Sec. Comput., 2014

Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols.
ACM Comput. Surv., 2014

Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

On the Practicality of Integrity Attacks on Document-Level Sentiment Analysis.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks.
IEEE/ACM Trans. Netw., 2013

On the practicality of cryptographic defences against pollution attacks in wireless network coding.
ACM Comput. Surv., 2013

Adversarial testing of wireless routing implementations.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Juggling the Jigsaw: Towards Automated Problem Inference from Network Trouble Tickets.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

Access Control in Social Enterprise Applications: An Empirical Evaluation.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Increasing network resiliency by optimally assigning diverse variants to routing nodes.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
The internet-wide impact of P2P traffic localization on ISP profitability.
IEEE/ACM Trans. Netw., 2012

Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems.
IEEE Trans. Dependable Sec. Comput., 2012

Entropy attacks and countermeasures in wireless network coding.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Split Null Keys: A null space based defense for pollution attacks in wireless network coding.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Android permissions: a perspective combining risks and benefits.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Closing the Pandora's box: Defenses for thwarting epidemic outbreaks in mobile adhoc networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Securing Virtual Coordinates by Enforcing Physical Laws.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

Security of Electrostatic Field Persistent Routing: Attacks and Defense Mechanisms.
Proceedings of the 2012 Ninth European Dependable Computing Conference, 2012

Using probabilistic generative models for ranking risks of Android apps.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Secure Routing in Wireless Mesh Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Security of Group Communication in Wireless Mesh Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure Network Coding for Wireless Mesh Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Security of Wireless Mesh Networks (General Overview).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure High-Throughput Multicast Routing in Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2011

Practical defenses against pollution attacks in wireless network coding.
ACM Trans. Inf. Syst. Secur., 2011

A design for securing data delivery in mesh-based peer-to-peer streaming.
Computer Networks, 2011

Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors.
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011

Removing the blinders: Using information to mitigate adversaries in adaptive overlays.
Proceedings of the 5th International Conference on Network and System Security, 2011

EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Applying game theory to analyze attacks and defenses in virtual coordinate systems.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Key agreement for wireless networks in the presence of active adversaries.
Proceedings of the Conference Record of the Forty Fifth Asilomar Conference on Signals, 2011

2010
Secure and robust virtual coordinate system in wireless sensor networks.
TOSN, 2010

Robust Decentralized Virtual Coordinate Systems in Adversarial Environments.
ACM Trans. Inf. Syst. Secur., 2010

Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks.
IEEE Trans. Dependable Sec. Comput., 2010

Pandora: a platform for worm simulations in mobile ad-hoc networks.
Mobile Computing and Communications Review, 2010

A cross-layer reliability metric for wireless mesh networks with selfish participants.
Mobile Computing and Communications Review, 2010

UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks.
Ad Hoc Networks, 2010

Tradeoffs between security and communication performance in wireless mesh networks.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Towards securing data delivery in peer-to-peer streaming.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networks.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks.
IEEE Trans. Mob. Comput., 2009

JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks.
IEEE Trans. Dependable Sec. Comput., 2009

A survey of attack and defense techniques for reputation systems.
ACM Comput. Surv., 2009

Secure network coding for wireless mesh networks: Threats, challenges, and directions.
Computer Communications, 2009

Secure group communication in wireless mesh networks.
Ad Hoc Networks, 2009

Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

2008
A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks.
IEEE/ACM Trans. Netw., 2008

ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks.
ACM Trans. Inf. Syst. Secur., 2008

Virtual Classroom Extension for Effective Distance Education.
IEEE Computer Graphics and Applications, 2008

Secure group communication in wireless mesh networks.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Mitigating attacks against virtual coordinate based routing in wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Experimental comparison of peer-to-peer streaming overlays: An application perspective.
Proceedings of the LCN 2008, 2008

2007
Secure multicast routing in wireless networks.
Mobile Computing and Communications Review, 2007

Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System.
IEEE Journal on Selected Areas in Communications, 2007

A multi-expertise application-driven class.
Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, 2007

BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

On the accuracy of decentralized virtual coordinate systems in adversarial networks.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Po^2V Network Layer Position Verification in Multi-HopWireless Networks.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

Scaling Byzantine Fault-Tolerant Replication toWide Area Networks.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

2005
Secure Spread: An Integrated Architecture for Secure Group Communication.
IEEE Trans. Dependable Sec. Comput., 2005

High Throughput Routing in Hybrid Cellular and Ad-Hoc Networks.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

On the Security of Distributed Position Services.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

On the Survivability of Routing Protocols in Ad Hoc Wireless Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

SPASS: scalable and energy-efficient data acquisition in sensor databases.
Proceedings of the 4th ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2005

ViWiD : Visible Watermarking Based Defense Against Phishing.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

2004
Secure Group Communication Using Robust Contributory Key Agreement.
IEEE Trans. Parallel Distrib. Syst., 2004

On the performance of group key agreement protocols.
ACM Trans. Inf. Syst. Secur., 2004

JANUS: towards robust and malicious resilient routing in hybrid wireless networks.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

A Framework for Role-Based Access Control in Group Communication Systems.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
An on-demand secure routing protocol resilient to byzantine failures.
Proceedings of the 2002 ACM Workshop on Wireless Security, 2002

On the Performance of Group Key Agreement Protocols.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption.
Proceedings of the Topics in Cryptology, 2002

2001
Framework for Authentication and Access Control of Client-Server Group Communication Systems.
Proceedings of the Networked Group Communication, 2001

Exploring Robustness in Group Key Agreement.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

2000
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000


  Loading...