|
|
Cristina Nita-Rotaru
Professor of Computer Science
Khoury College of Computer Sciences
Northeastern University
email: c.nitarotaru@northeastern.edu
office: ISEC 626
Directions
lab: Network and Distributed Systems Security [nds2]
Research: resilient network protocols and distributed systems, adversarial testing, formal verification, blockchains, trustworthy AI
|
``There is only one success - to be able to spend your life in your own way.''
Christopher Morley
|
Publications
[White Papers]
[Conferences]
[Journals]
[Education]
Programmable System Security in a Software-Defined World
– Research Challenges and Opportunities
Guofei Gu (TAMU), David Ott (VMware), Vyas Sekar (CMU), Kun Sun (GMU)
Ehab Al-Shaer, Alvaro Cardenas, Yan Chen, William Enck, Hongxin Hu, Dennis Moreau, Cristina Nita-Rotaru, Don Porter, Mike Reiter, Sandra Scott-Hayward, Srinivasan Seshan,
Mike Swift, Xiaofeng Wang, Vinod Yegneswaran and Other Workshop Attendees†, report on NSF Workshop on Programmable System Security in a Software Defined World, December 2018
[PDF]
|
Backdoor Attacks in Peer-to-Peer Federated
Learning.
Georgios Syros,
Gokberk Yar, Simona Boboila, Cristina Nita-Rotaru, Alina Oprea.
ACM TOPS 2024.
[PDF]
|
A Formal Analysis of SCTP: Attack Synthesis and Patch
Verification
Jacob Ginesin, Max von Hippel, Evan Defloor, Cristina Nita-Rotaru, Michael Tuxen.
Usenix Security 2024.
[PDF]
|
Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups.
C. F. Torres,
A. Mamuti,
B. Weintraub,
C. Nita-Rotaru,
S. Shinde.
ACM CCS 2024.
[PDF]
|
Exploiting Temporal Vulnerabilities for Unauthorized Access in
Intent-based Networking.
B. Weintraub, J. Kim, R. Tao, C. Nita-Rotaru, H. Okhravi, D. Tian, B. Ujcich. ACM CCS 2024.
[PDF]
|
Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network.
Ben Weintraub, Satwik Prabhu Kumble, Cristina Nita-Rotaru and Stephanie Ross. ACM CCS 2024.
[PDF]
|
Formal Model-Driven Analysis of Resilience of GossipSub to
Attacks from Misbehaving Peers.
Ankit Kumar, Max von Hippel, Pete Manolios, Cristina Nita-Rotaru.
IEEE Symposium on Security and Privacy 2024.
[PDF]
|
Backdoor Attacks in Peer-to-Peer Federated
Learning.
Gokberk Yar, Simona Boboila, Cristina Nita-Rotaru, Alina Oprea.
IEEE CNS 2023.
[PDF]
|
A Formal Analysis of Karn’s Algorithm.
Max von Hippel, Kenneth L. McMillan, Cristina Nita-Rotaru, and Lenore D. Zuck.
NETYS 2023. Best paper award.
[PDF]
|
Verification of GossipSub in ACL2s.
Ankit Kumar, Max von Hippel, Panagiotis Manolios and Cristina Nita-Rotaru.
ACL2-2023, 2023. Best student paper award.
[PDF]
|
A Case Study in Analytic Protocol Analysis in ACL2.
Max von Hippel, Panagiotis Manolios, Ken McMillan, Cristina Nita-Rotaru and Lenore Zuck.
ACL2-2023, 2023. Best student paper award runner up.
[PDF]
|
MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy
Iffat Anjun, Ramzah Rehman , Jessica Sokal, Ethan Leba, Ben Weintraub, Will Enck, Cristina Nita-Rotaru, Brad Reeves. ACM SACMAT 2023, June 2023.
[PDF]
|
Byzantine Resilience at Swarm Scale: A Decentralized Blocklist from Inter-robot Accusations.
Kacper Wardega, Max von Hippel, Roberto Tron, Cristina Nita-Rotaru and Wenchao Li. The 22nd International Conference on Autonomous Agents and Multiagent Systems (AAMAS), May 2023.
[PDF]
|
HoLA Robots: Mitigating Plan-Deviation Attacks in Multi-Robot Systems with Co-Observations and Horizon-Limiting Announcements.
Kacper Wardega, Max von Hippel, Roberto Tron, Cristina Nita-Rotaru and Wenchao Li. The 22nd International Conference on Autonomous Agents and Multiagent Systems (AAMAS), May 2023.
[PDF]
|
A Flash(bot) in the Pan: Measuring Maximal Extractable Value in Private Pools.
Ben Weintarub, Cristof Ferreira Torres, Radu State, Cristina Nita-Rotaru. In ACM IMC 2022.
[PDF]
|
Network-Level Adversaries in Federated Learning.
Giorgio Severi, Matthew Jagielski, Gokberg Yar, Yuxuan Wang, Cristina Nita-Rotaru, Alina Oprea.
In IEEE CNS 2022.
[PDF]
[code]
|
Securing Communication Against Leaky Switches.
Leila Rashidi, Sogand Sadrhaghighi, Majid Ghaderi, Cristina Nita-Rotaru, Rei Savafi-Naini.
In IEEE CNS 2022.
[PDF]
|
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents
Maria Leonor Pacheco,
Max von Hippel,
Ben Weintraub
Dan Goldwasser
Cristina Nita-Rotaru.
IEEE Security and Privacy, 2022.
[PDF]
[code]
|
ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing.
Kyle Hogan, Sacha Servan-Schreiber,
Zachary Newman,
Ben Weintraub,
Cristina Nita-Rotaru,
Srinivas Devadas.
IEEE Security and Privacy 2022.
[PDF]
[code]
|
Removing the Reliance on Perimeters for Security using Network Views.
Iffat Anjum, Daniel Kostecki, Ethan Leba, Jessica Sokal, Rajit Bharambe, William Enck, Cristina Nita-Rotaru, and Bradley Reaves. ACM SACMAT 2022. Best student paper award.
[PDF]
[code]
|
Alternative Route-Based Attacks in Metropolitan Traffic Systems.
Sidney La Fontaine, Naveen Muralidhar, Michael Clifford, Tina Eliassi-Rad,
Cristina Nita-Rotaru. In the 8$^{th}$ Safety and Security of Intelligent Vehicles Workshop with DSN 2022.
[PDF]
|
The Tale of Discovering a Side Channel in Secure Message Transmission Systems.
Majid Ghaderi, Samuel Jero, Cristina Nita-Rotaru, Hamed Okhravi, and Reihaneh Safavi-Naini
In CFAIL 2022, with Crypto 2022.
[PDF]
|
SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay
Lucian A Trestioreanu,
Cristina Nita-Rotaru,
Aanchal Malhotra,
Radu State.
IEEE CNS, 2021.
[PDF]
|
Structural Attacks on Local Routing in Payment Channel Networks
Ben Weintraub,
Cristina Nita-Rotaru,
Stephanie Roos.
IEEE Workshop Security and Privacy on the Blockchain, in conjunction with Euro S&P 2021.
[PDF]
|
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes.
Leila Rashidi,
Daniel Kostecki,
Alexander James,
Anthony Peterson,
Majid Ghaderi,
Samuel Jero,
Cristina Nita-Rotaru,
Hamed Okhravi
Reihaneh Safavi-Naini.
NDSS 2021.
[PDF]
|
Under the Hood of the Ethereum Gossip Protocol.
Lucianna Kiffer,
Asad Salman,
Northeastern University,
Dave Levin,
Alan Mislove,
Cristina Nita-Rotaru.
FC 2021.
[PDF]
|
aBBRate: Automating BBR Attack Exploration Using a
Model-Based Approach
Anthony Peterson,
Samuel Jero,
Endadul Hoque,
Dave Choffnes,
Cristina Nita-Rotaru.
RAID 2020.
[PDF]
|
Automated Attacker Synthesis for Distributed Protocols.
Max von Hippel, Cole Vick, Stavros Tripakis, Cristina Nita-Rotaru,
March 2020. SafeComp 2020.
[ arXiv].
|
VisConnect: Distributed Event Synchronization for Collaborative Visualization
Michail Schwab, David Saffo, Yixuan Zhang, Shash Sinha, Cristina Nita-Rotaru, James Tompkin, Cody Dunne, Michelle Borkin,
IEEE VIS 2020, Oct. 2020.
|
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC.
Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru.
QUIC Privacy and Security (QUIPS) Workshop 2020, with NDSS 2020.
|
Comparing TLS 1.3 over TCP Fast Open to QUIC.
Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru.
Esorics 2019.
[ arXiv].
|
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks.
Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, and Fabio Roli.
USENIX Security 2019. [ arXiv].
|
ROS-Defender: Dynamic Security Policy Enforcement for Robotic Applications.
Sean Rivera, Sofiane Lagraa, Cristina Nita-Rotaru, Sheila Becker and Radu State.
IEEE Workshop on the Internet of Safe Things, Co-located with IEEE Security and Privacy 2019.
Best paper award.
[PDF]
|
Are Self-Driving Cars Secure? Evasion Attacks against Deep Neural Networks for Steering Angle Prediction.
Alesia Chernikova, Alina Oprea, Cristina Nita-Rotaru and Baekgyu Kim.
IEEE Workshop on the Internet of Safe Things, Co-located with IEEE Security and Privacy 2019.
[ arXiv].
|
Leveraging Textual Specifications for Grammar-based Fuzzing of Network Protocols.
Samuel Jero, Maria L Pacheco, Dan Goldwasser and Cristina Nita-Rotaru.
Thirty-First Annual Conference on Innovative Applications of Artificial Intelligence (IAAI-19), 2019.
[PDF]
|
Cross-App Poisoning in Software-Defined Networking.
Benjamin E. Ujcich,
Samuel Jero,
Anne Edmundson,
Qi Wang,
Richard Skowyra,
James Landry,
Adam Bates,
William H. Sanders,
Cristina Nita-Rotaru,
Hamed Okhravi. ACM CCS, 2018
[PDF]
|
Threat Detection for Collaborative Adaptive Cruise Control in Connected Cars.
Matthew Jagielski, Nicholas Jones, Chung-Wei Lin, Cristina Nita-Rotaru, and Shinichi Shiraishi.
In Proceedings of ACM Conference on Security and Privacy in Wireless
Networks, 2018. Short paper.
[PDF]
|
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning.
Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, and Bo Li.
In Proceedings of the IEEE Symposium on Security and Privacy, 2018.
[PDF]
|
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach.
Samuel Jero,
Endadul Hoque,
David Choffnes,
Alan Mislove,
Cristina Nita-Rotaru.
NDSS 2018, Feb. 2018.
CISCO Network Security Distinguished Paper Award.
[ SRC ]
[PDF]
|
Taking a Long Look at QUIC: An Approach for Rigorous
Evaluation of Rapidly Evolving Transport Protocols.
Arash Molavi Kakhki,
Samuel Jero,
David Choffnes,
Alan Mislove,
Cristina Nita-Rotaru.
IMC 2017, Nov. 2017. Awarded IETF/IRTF Applied Networking Research Prize 2018.
[PDF]
|
Chizpurfle: A Gray-Box Android Fuzzer for Vendor Service Customizations
Antonio Ken Iannillo, Roberto Natella, Domenico Cotroneo, Cristina Nita-Rotaru.
IEEE ISSRE 2017, September 2017. Best paper award.
[PDF]
|
BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems.
Samuel Jero, Xiangyu Bu, Hamed Okhravi,
Cristina Nita-Rotaru, Richard Skowyra, Sonia Fahmy.
RAID 2017, September 2017.
[PDF]
|
Identifier Binding Attacks and Defenses in Software-Defined
Networks.
Samuel Jero, William Koch, Richard Skowyra, Hamed Okhravi,
Cristina Nita-Rotaru, David Bigelow.
USENIX Security 2017, August 2017.
[PDF]
|
Analyzing Operational Behavior of Stateful Protocol
Implementations for Detecting Semantic Bugs.
Endadul Hoque, Omar Chowdhury, Sze Yiu Chau, Cristina
Nita-Rotaru, Ninghui Li. IEEE DSN 2017, June 2017.
[PDF]
|
SymCerts: Practical Symbolic Execution For Exposing
Noncompliance in X.509 Certificate Validation Implementations.
Sze Yiu Chau, Omar Chowdhury, Endadul Hoque, Huangyi Ge, Aniket Kate,
Cristina Nita-Rotaru, Ninghui Li. IEEE Security and Privacy, May 2017.
[PDF]
|
Building Robust Distributed Systems and Network Protocols by Using
Adversarial Testing and Behavioral Analysis.
Endadul Hoque and Cristina Nita-Rotaru. IEEE Cybersecurity Development (SecDev), Nov. 2016.
[PDF]
|
Practical Intrusion-Tolerant Networks.
D. Obenshain, T. Tantillo, A. Baby, J. Schultz, A. Newell, E.Hoque, Y. Amir and C. Nita-Rotaru. ICDCS 2016,
[PDF]
|
Leveraging State Information for Automated Attack Discovery
in Transport Protocol Implementations.
S. Jero, H. Lee, and C. Nita-Rotaru. In the 45th
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
June 2015. Best paper award.
[PDF]
|
ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection.
R. Potharaju, J. Chan, L. Hu, C. Nita-Rotaru, M. Wang, L. Zhang, N. Jain. VLDB 2015, Industrial Track.
|
How Secure and Quick is QUIC? Provable Security and Performance Analyses.
R. Lychev, S. Jero, A. Boldyreva, and C. Nita-Rotaru. 36th IEEE Symposium on Security and Privacy (Oakland), May 2015.
Awarded IETF/IRTF Applied Networking Research Prize, 2016.
[PDF]
|
On the Practicality of Integrity Attacks on Document-Level Sentiment Analysis.
A. Newell, R. Potharaju. L. Xiang, and C. Nita-Rotaru.
In the Seventh ACM Workshop on Artificial Intelligence and Security (AISec)
with the 21st ACM Conference on Computer and Communications (CCS), Nov. 2014.
[PDF]
|
Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations.
H. Lee, J. Seibert, E. Hoque, C. Killian. and C. Nita-Rotaru.
In ICDCS 2014.
[PDF]
|
Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes.
A. Newell, D. Obenshain, T. Tantillo, C. Nita-Rotaru, and Y. Amir.
DSN 2013, June 2013.
[PDF]
|
Adversarial Testing of Wireless Routing Implementations.
E. Hoque, H. Lee, R. Potharaju, C. Killian, and C.
Nita-Rotaru.
ACM WiSec 2013, Apr. 2013.
[PDF]
|
Juggling the Jigsaw: Towards Automated Problem Inference from Network Trouble Tickets.
R. Potharaju, N. Jain, and C. Nita-Rotaru.
USENIX NSDI 2013, Apr. 2013.
[PDF]
|
Using Probabilistic Generative Models For Ranking Risks of Android Apps.
H. Peng, C. Gates, B. Sarma, N. Li, A. Qi, R. Potharaju, C.
Nita-Rotaru and I. Molloy.
ACM CCS 2012, Oct. 2012.
[PDF]
|
Closing the Pandora's Box: Defenses for Thwarting Epidemic
Outbreaks in Mobile Adhoc Networks.
R. Potharaju, E. Hoque, C. Nita-Rotaru, S. S. Venkatesh, and S. Sarkar.
IEEE MASS 2012, Oct. 2012.
[PDF]
|
Access Control in Social Enterprise Applications: An Empirical Evaluation.
R. Bhatti, C. Gaspard and C. Nita-Rotaru.
In the Fifth International Workshop on Hot Topics in Peer-to-peer computing and Online Social Networking,
in conjunction with ICDCS 2013, July 2013.
|
Securing Virtual Coordinates by Enforcing Physical
Laws.
J. Seibert, S. Becker, C. Nita-Rotaru, and R. State, IEEE ICDCS 2012.
[PDF]
|
Android Permissions: A Perspective Combining Risks and Benefits.
B. Sarma, C. Gates, N. Li, R. Potharaju, C. Nita-Rotaru, I. Molloy. ACM SACMAT 2012, June 2012.
Test-of-Time Award SACMAT 2022.
[PDF]
|
Entropy Attacks in Wireless Network Coding.
A. Newell, R. Curtmola, and C. Nita-Rotaru.
ACM Wireless Security Conference (WiSec) 2012, April 2012.
[PDF]
|
Split Null Keys: A Null Space Based Defense for Pollution Attacks in Wireless Network Coding.
A. Newell and C. Nita-Rotaru.
IEEE SECON 2012, June 2012.
[PDF]
|
On the Security of Persistent Electrostatic Field-based Routing in Wireless Sensor Networks.
O. C. Ghica, C. Nita-Rotaru, G. Trajcevsky, and P. Scheuermann.
Ninth European Dependable Computing Conference (EDCC) 2012, May 2012.
[PDF]
|
Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques.
R. Potharaju, A. Newell, C. Nita-Rotaru, X. Zhang.
Proc. of International Symposium on
Engineering Secure Software and Systems (ESoSS) 2012, Feb. 2012.
[PDF]
|
Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems.
J. Seibert, HJ. Lee, C. Killian, and C. Nita-Rotaru.
Proc. of NDSS 2012, Feb. 2012.
[PDF]
|
Applying Game Theory to Analyze Attacks and Defenses in Virtual Coordinate Systems.
S. Becker, J.Seibert, D. Zage, C. Nita-Rotaru, and R. State.
Proc. of DSN 2011, June 2011.
[PDF]
|
Securing Application-Level Topology Estimation Networks:
Facing the Frog-Boiling Attack.
S. Becker, J. Seibert, C. Nita-Rotaru, and R. State.
Proc. of RAID 2011, 20 pages, Sept. 2011.
[PDF]
|
Removing the Blinders: Using Information to Mitigate Adversaries in Adaptive Overlays.
David Zage, Charles Killian and Cristina Nita-Rotaru
Proc. of the 5th International Conference on Network and System Security (NSS 2011), Sept. 2011.
[PDF]
|
EFW: A Cross-Layer Metric for Reliable Routing in
Wireless Mesh Networks with Selfish Participants.
S. Paris, C. Nita-Rotaru, F. Martignon, and A. Capone.
Proc. of IEEE Infocom Mini Conferences (INFOCOM-Mini), Shanghai, China, Apr. 2011. [PDF]
|
Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors.
R. Potharaju, J. Seibert, S. Fahmy, and C. Nita-Rotaru.
Passive and Active Measurement Conference (PAM), 2011.
[PDF]
|
Towards Securing Data Delivery in Peer-to-Peer Streaming.
J. Seibert, X. Sun, C. Nita-Rotaru, and S. Rao.
IEEE Conference on Communication Systems and Networks (COMSNETS), 2010.
[PDF]
|
Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru, and David Yau. In Workshop on Wireless Network Coding with SECON 2010.
|
SINE: Cache-Friendly Integrity for the Web.
C. Gaspard, S. Goldberg, W. Itani, E. Bertino, and C. Nita-Rotaru.
In Proceedings of 4th Workshop on Secure Network Protocols (NPSec) in conjunction with ICNP 2009, July 2009.
[PDF]
|
Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks.
J. Dong, R. Curtmola, C. Nita-Rotaru. In the Second ACM Conference on Wireless Network Security (WiSec), Zurich, Switzerland, March 2009.
[PDF]
|
Toward Secure Network Coding in Wireless Networks: Threats and Challenges.
J. Dong, R. Curtmola, R. Sethi, and C. Nita-Rotaru.
In Proceedings of 4th Workshop on Secure Network Protocols (NPSEC) in
conjunction with IEEE ICNP, Orlando, Florida, Oct 2008.
[PDF]
|
Mitigating Attacks against Virtual Coordinate System Based
Routing in Wireless Sensor Networks.
J. Dong, B. Bhavar, E. Ackermann, and C. Nita-Rotaru.
In First ACM Conference
on Wireless Network Security (WiSec), Alexandria, VA, March 2008.
[PDF].
|
On the Pitfalls of Using High-Throughput Metrics in Adversarial Wireless
Mesh Networks,
J. Dong, R. Curtmola and C. Nita-Rotaru.
In the Fifth Annual IEEE Communications Society Conference
on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2008),
San Francisco CA, June 2008.
[PDF].
|
Experimental Comparison of Peer-to-Peer Streaming Overlays: An Application perspective.
J. Seibert, D. Zage, S. Fahmy and C. Nita-Rotaru.
In Proceedings of IEEE LCN 2008, Montreal, CA, Oct., 2008.
[PDF].
|
Secure Group Communication in Wireless Mesh Networks.
In Ninth IEEE International Symposium on a World of Wireless, Mobile
and Multimedia Networks (WOWMOM), Newport Beach, CA, June, 2008.
J. Dong, K. Ackermann, and Cristina Nita-Rotaru.
[PDF].
|
On the Accuracy of Decentralized Network Coordinate Systems in Adversarial Networks.
D. Zage and C. Nita-Rotaru.
In the 14th ACM CCS, Alexandria, VA, USA, October 29 - November 2, 2007.
[PDF].
|
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop
Wireless Networks.
R. Curtmola and C. Nita-Rotaru.
In SECON 2007, June 2007, San Diego, CA.
[PDF]
|
Enabling
Confidentiality of Data Delivery in an Overlay Broadcasting System.
R. Torres X. Sun, A. Walters, C. Nita-Rotaru and S. Rao.
In INFOCOM 2007, Anchorage, Alaska.
[PDF]
|
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks.
AAron Walters, David Zage and Cristina Nita-Rotaru,
The 14th IEEE International Conference on Network Protocols
November (ICNP) 12-15, 2006
Santa Barbara, California.
[PDF].
|
Steward: Scaling Byzantine Fault-Tolerant Systems to Wide Area Networks.
Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan Kirsch, John Lane, Cristina Nita-Rotaru, Josh Olsen, David Zage,
In The International Conference on Dependable Systems and Networks
(DSN-2006), Philadelphia, PA, June 2006.
[PDF].
Also Technical Report CSD TR 05-029.
[PDF] .
|
A Byzantine Resilient Distributed Position Service.
Josh Olsen, David Zage and Cristina Nita-Rotaru. Extended Abstract.
In The International Conference on Dependable Systems and Networks
(DSN-2006), Philadelphia, PA, June 2006.
|
Po2V: Network Layer Position Verification in Multi-Hop Wireless Networks.
In IEEE International Symposium on a World of Wireless, Mobile
and Multimedia Networks (WOWMOM), Niagara Falls, NY June, 2006.
Xiaoxin Wu and Cristina Nita-Rotaru.
|
On the Survivability of Routing Protocols in Ad Hoc
Wireless Networks.
In IEEE Conference on Security and Privacy for Emerging Areas in
Communication Networks (SecureComm) 2005, Sept. 2005.
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru and H. Rubens.
[PDF]
|
DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks.
In IEEE Conference on Security and Privacy for Emerging Areas in
Communication Networks (SecureComm) 2005, Sept. 2005.
I. Khalil, S. Bagchi and C. Nita-Rotaru.
[PDF]
|
On the Security of Distributed Position Services.
In IEEE Conference on Security and Privacy for Emerging Areas in
Communication Networks (SecureComm) 2005, Sept. 2005.
X. Wu and C. Nita-Rotaru,
[PDF].
|
WiViD: Visible Watermak Based Defense Against Phishing.
In International Workshop of Digital Watermarking (IWDW), Sept. 2005.
A. Shamara, M. Topkara, M. Atallah and C. Nita-Rotaru.
[PDF].
|
SPASS: Scalable and Energy-Efficient Data Acquisition in Sensor Databases.
In 4th International ACM Workshop on Data Engineering for Wireless and
Mobile Access (MobiDe 2005) in conjunction with ACM SIGMOD/PODS.
Baltimore, June 2005.
M.H. Ali, Walid G. Aref and C. Nita-Rotaru.
[PDF].
|
Scalable Routing in Hybrid Cellular and Ad-Hoc Networks.
In IEEE International Symposium on a World of Wireless, Mobile
and Multimedia Networks, Taormina / Giardini Naxos, Italy
June, 2005.
Ioannis Ioannidis, Bogdan Carbunar, Cristina Nita-Rotaru.
[PDF]
[Extended Technical Report CSD TR# 05-006]
|
Secure Multi-Hop Infrastructure Access.
In Wireless and Mobile Security Workshop, NDSS'05
Catamaran Resort Hotel
San Diego, California, Feb. 2005.
Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru and Herbert Rubens.
|
Synchronization Attacks Against 802.11.
In Wireless and Mobile Security Workshop, NDSS'05
Catamaran Resort Hotel
San Diego, California, Feb. 2005.
Gunjan Khanna, Ammar Masood and Cristina Nita-Rotaru.
|
JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless
Networks.
In Workshop in Wireless Security WiSe 2004,
In conjunction with MOBICOM 2004, Philadelphia, PA, Sept. 2004
Bogdan Carbunar, Ioanis Ioannidis and Cristina Nita-Rotaru.
[PDF]
|
A Framework for Role-Based Access Control in Group Communication Systems.
In
2004 International Workshop on Security in Parallel and Distributed Systems
In conjunction with the 17th International Conference on Parallel and Distributed
Computing Systems PDCS-2004 San Francisco , CA, September 15-17, 2004
Cristina Nita-Rotaru and Ninghui Li.
[PDF],
[Extended Technical Report CERIAS TR #2003-31] .
|
Coping with the Insider Threat in Scalable Distributed Information Systems
Service. In FuDiCo II: (S.O.S.)Survivability: Obstacles and
Solutions, 2nd International Workshop on Future
Directions in Distributed Computing ,
University of Bologna Residential Center
Bertinoro(Forli), Italy,
June 23-25 2004.
Yair Amir and Cristina Nita-Rotaru.
[PDF].
|
Scaling Secure Group Communication Systems: Beyond
Peer-to-Peer In the Proceedings of DISCEX3,
Washington DC, April 22-24, 2003. Obsoletes Technical Report CNDS-2002-3, October 2002.
Yair Amir, Cristina Nita-Rotaru, Jonathan Stanton,
and Gene Tsudik.
[PDF].
|
On the Performance
of Group Key Agreement Protocols. Published in the
Proceedings of the 22nd IEEE International Conference on Distributed
Computing Systems, Vienna, Austria, July 2-5, 2002, short paper.
Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, and Gene Tsudik.
[PDF].
|
Stateless-Recipient Certified E-mail System based on
Verifiable Encryption. Published in the Proceedings of RSA
2002 , McEnery Convention Center, San Jose, CA, USA, February
18-22, 2002.
Giuseppe Ateniese and Cristina Nita-Rotaru.
[PDF].
|
Exploring Robustness in Group Key Agreement.
Published in the Proceedings of the 21th IEEE International
Conference on Distributed Computing Systems, Phoenix, Arizona,
April 16-19, 2001, pp 399-408. Nominated for Best Paper Award.
Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John Schultz,
Jonathan Stanton, and Gene Tsudik.
[PDF].
[Extended Technical Report CNDS #2000-4].
|
Secure Group Communication in Asynchronous Networks with Failures:
Integration and Experiments Published in the Proceedings
of the 20th IEEE International Conference on Distributed Computing
Systems, Taipei, Taiwan, April 10-13, 2000, pp 330-343.
Yair Amir,Giuseppe Ateniese,
Damian Hasse, Yongdae Kim,Cristina Nita-Rotaru,
Theo Schlossnagle, John Schultz, Jonathan Stanton, and
Gene Tsudik.
[PDF].
|
An On-Demand Secure Routing Protocol Resilient to Byzantine
Failures. In ACM Workshop on Wireless Security
(WiSe), Atlanta, Georgia, September 28 2002.
Baruch Awerbuch, Dave Holmer,Cristina Nita-Rotaru,
and Herbert Rubens.
[PDF].
|
High Performance, Secure, Robust and Transparent Messaging
Service. In FuDiCo 2002: International Workshop on Future
Directions in Distributed Computing , Bertinoro(Forli), Italy,
June 3-7 2002.
Yair Amir, Claudiu Danilov, and Cristina Nita-Rotaru.
[PS].
|
Framework for Authentication and Access Control of
Client-Server Group Communication Systems Published in the
Proceedings of the Third International Workshop on Networked Group
Communication, London, UK November 7-9 2001.
Yair Amir, Cristina Nita-Rotaru,and Jonathan Stanton.
[PS],
[Extended Technical Report CNDS #2001-2].
|
Backdoor Attacks in Peer-to-Peer Federated
Learning.
Georgios Syros,
Gokberk Yar, Simona Boboila, Cristina Nita-Rotaru, Alina Oprea.
ACM TOPS 2024.
[PDF]
|
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC
Shan Chen, Samuel Jero, Matthew Jagielski, Cristina Nita-Rotaru, Alexandra Boldyreva
Journal of Cryptology, Vol. 24 No. 26, 2021.
[ PDF ]
|
Taking a Long Look at QUIC: An Approach for Rigorous Evaluation of Rapidly Evolving Transport Protocols
Arash Molavi Kakhki, Samuel Jero, David Choffnes, Cristina Nita-Rotaru, Alan Mislove
Communications of the ACM, July 2019, Vol. 62 No. 7, Pages 86-94.
[ PDF ]
|
Toward a Taxonomy and Attacker Model for Secure Routing Protocols.
M. Hollick, C. Nita-Rotaru, P. Papadimitratos, A. Perrig, Stefan Schmid.
In ACM SIGCOMM Computer Communication Review, Volume 47 Issue 1, January 2017.
|
Adversarial Testing of Wireless Routing Implementations.
E. Hoque, H. Lee, R. Potharaju, C. Killian. and C. Nita-Rotaru.
In IEEE/ACM Transactions on Networking, vol. 24, issue 6, 2016.
|
Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed Systems.
H. Lee, J. Seibert, D. Fistrovic, C. Killian, and C. Nita-Rotaru.
ACM Transactions on Systems and Information Security, issue 4, vol. 17. April 2015.
|
Security of Electrostatic Field Persistent Routing: Attacks and Defense Mechanisms.
O. C. Ghica, C. Nita-Rotaru, G. Trajcevsky, and P. Scheuermann.
Elsevier Journal of Ad Hoc Networks, vol. 36, part 1, Jan. 2016.
|
Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes.
A. Newell, D. Obenshain, T. Tantillo, C. Nita-Rotaru, and Y. Amir.
IEEE Transactions on Dependable and Secure Systems, vol. 12, issue 6, Nov-Dec. 2015.
|
Closing the Pandora's Box: Defenses for Thwarting Epidemic Outbreaks in Mobile Adhoc Networks.
R. Potharaju, E. Hoque, C. Nita-Rotaru, S. S. Venkatesh, and S. Sarkar.
Elsevier Journal of Ad Hoc Networks, vol. 24, Jan. 2015.
|
Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols.
A. Newell, H. Yao, A. Ryker, T. Ho, and C. Nita-Rotaru.
ACM Computing Surveys, vol. 47, issue 2, December 2014.
|
Generating Summary Risk Scores for Mobile Applications.
H. Peng, C. Gates, B. Sarma, N. Li, A. Qi, R. Potharaju, C. Nita-Rotaru and I. Molloy.
IEEE Transactions on Dependable and Secure Systems, vol. 11, issue 3, May-June 2014.
|
Newton: Securing Virtual Coordinates by Enforcing Physical Laws.
J. Seibert, S. Becker, C. Nita-Rotaru and R. State.
IEEE/ACM Transactions on Networking, vol. 22, issue 3, June 2014.
[PDF]
|
EFW: A Cross-Layer Metric for Reliable Routing in Wireless Mesh Networks
with Selfish Participants.
S. Paris, A. Capone, F. Martignon, and C. Nita-Rotaru.
IEEE/ACM Transactions on Networking, vol. 21, issue 3, June 2013.
[PDF]
|
On the Practicality of Cryptographic Defenses against Pollution Attacks in Wireless Network Coding.
Andrew Newell, Jing Dong, and Cristina Nita-Rotaru.
ACM Computing Surveys, vol. 45, issue 3, June 2013.
[PDF]
|
Pollution Attacks and Defense in Inter-flow Network Coding Systems.
J. Dong, R. Curtmola, C. Nita-Rotaru, and D. Yau.
In IEEE Transactions on Dependable and Secure Systems, vol. 9 , issue 5, 2012.
[PDF]
|
The Internet-wide Impact of P2P Traffic Localization on ISP Profitability.
J. Seibert, R. Torres, M. Maffiano, M. Mella, C. Nita-Rotaru, and S. Rao.
In IEEE/ACM Transactions on Networking, Dec. 2012.
[PDF]
|
A Design for Securing Data Delivery in Mesh-Based Peer-to-Peer Streaming.
J. Seibert, X. Sun, C. Nita-Rotaru, and S. Rao.
Computer Networks, vol. 55, no. 12, August 2011.
[PDF]
|
Practical Defenses Against Pollution Attacks in Wireless Network Coding.
J. Dong, R. Curtmola, and C. Nita-Rotaru.
In ACM Transactions on Systems and Information Security, vol. 14 no. 1, May 2011.
[PDF]
|
Secure High-Throughput Multicast Routing in Wireless Mesh Networks.
J. Dong, R. Curtmola, and C. Nita-Rotaru.
In ACM Transactions on Mobile Computing, vol. 10 no. 5, May 2011.
[PDF]
|
On the Accuracy of Virtual Coordinate Systems in Adversarial Networks.
D. Zage and C. Nita-Rotaru.
In ACM Transactions on Systems and Information Security, vol. 13, issue 4, December 2010.
[PDF]
|
Mitigating Attacks against Virtual Coordinate System Based
Routing in Wireless Sensor Networks.
J. Dong, E. Ackermann, B. Bhavar, and C. Nita-Rotaru.
In Transactions on Sensor Networks, vol 6., issue 4, 2010.
[PDF]
|
Secure Network Coding for Wireless Mesh Networks: Threats, Challenges, and Directions.
J. Dong, R. Curtmola, and C. Nita-Rotaru.
In Computer Communications (Elsevier), vol.32. no. 17, November 2009.
[PDF]
|
UNMASK: Utilizing Neighbor Monitoring for Attack Mitigation in Multihop Wireless Sensor Networks.
I. Khalil, S. Bagchi, C. Nita-Rotaru, and N. B Schroff.
In Journal of Ad Hoc and Sensor Networks}, pp. 148 -- 164, vol. 8, issue 2, March 2010.
[PDF]
|
Secure Group Communication in Wireless Mesh Networks.
J. Dong, K. E. Ackermann, C. Nita-Rotaru.
In Ad Hoc Networks Journal (Elsevier), Special Issue: Privacy and Security in Wireless Sensor and Ad Hoc Networks, vol. 7, no. 8, November 2009.
[PDF]
|
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks.
R. Curtmola and C. Nita-Rotaru.
In IEEE Transactions on Mobile Computing (TMC), vol. 8, no. 4, April 2009.
[PDF]
|
STEWARD: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks.
Y. Amir, C. Danilov, D. Dolev, J. Kirsch, J. Lane, C. Nita-Rotaru,
J. Olsen, and D. Zage.
In IEEE Transactions on Dependable and Secure Computing, vol. 7, no.1, Jan. 2010.
[PDF]
|
A Survey of Attack and Defense Techniques for Reputation Systems
K. Hoffman, D. Zage and C. Nita-Rotaru.
In ACM Computing Surveys, vol. 42, no. 1, March 2010.
[PDF].
|
A Framework for Mitigating Attacks Against Measurement-Based Adaptation
Mechanisms in Unstructured Multicast Overlay Networks.
A. Walters, D. Zage and C. Nita-Rotaru.
In IEEE/ACM Transactions on Networking, vol. 16, no. 6, Dec. 2008.
[PDF].
|
Virtual Classroom Extension for Effective Distance Education.
C. Jia, R. Dondera, V. Popescu, C. Nita-Rotaru, M. Dark, and C. S. York.
In IEEE Computer Graphics and Applications, Jan./Feb. 2008.
[PDF]
|
JANUS: A Framework for Scalable and Secure Routing
in Hybrid Wireless Networks.
B. Carbunar, I. Ioannidis and C. Nita-Rotaru.
In IEEE Transactions on Dependable and Secure Systems (TDSC), vol. 6, no.4, 2009.
[PDF].
|
Enabling
Confidentiality of Data Delivery in an Overlay Broadcasting System.
R. Torres X. Sun, A. Walters, C. Nita-Rotaru and S. Rao.
In
Special Issue of IEEE JSAC on Advances in
Peer-to-Peer Streaming Systems, vol. 25, no. 9, December 2007.
[PDF].
|
ODSBR: An On-Demand Secure Byzantine Resilient Routing Protocol
for Wireless Ad Hoc Networks.
Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru and Herbert Rubens.
In ACM Transactions on Information Systems Security (TISSEC), vol. 10. no.4, January 2008.
[PDF].
|
Secure Spread: An Integrated Architecture for Secure Group Communication
Yair Amir, Cristina Nita-Rotaru
, Jonathan Stanton and Gene Tzudik. In IEEE Transactions
on Dependable and Secure Computing (TDSC), vol. 2, no. 3, August 2005.[PDF].
|
On the Performance of Group Key Agreement Protocols.
Yair Amir,Yongdae Kim,Cristina Nita-Rotaru, and Gene Tsudik.
ACM Transactions on Information Systems Security (TISSEC), vol. 7, no. 3, August 2004.
[PDF].
|
Secure Group Communication Using Robust Contributory Key Agreement.
Yair Amir, Yongdae Kim,Cristina Nita-Rotaru,John Schultz,
Jonathan Stanton, and Gene Tsudik.
IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 15, no. 5, pp. 468-480, May 2004.
[PDF].
|
A Multi-Expertise Application-Driven Class.
In the 38th ACM Technical Symposium on Computer Science Education
SIGCSE 2007,
C. Nita-Rotaru, M. Dark and V. Popescu.
|
Evaluating Interactivity and Presence in an Online Distance Learning System.
In Frontiers in Education (FIE) 2007,
M. Dark, C. York, V. Popescu and C. Nita-Rotaru.
|
A Pilot Study on the Design Effectiveness of a New Distance Learning System.
In American Educational Research Association(AERA) 2008, Advanced Technologies
for Learning (ATL) SIG.
M. Dark, C. York, D. Yang, V. Popescu and C. Nita-Rotaru.
|
Send your comments and questions to Cristina Nita-Rotaru
|
|
|