Cristina Nita-Rotaru

Orcid: 0000-0002-9649-6789

Affiliations:
  • Northeastern University, Boston, MA, USA
  • Purdue University, West Lafayette,IN, USA (former)


According to our database1, Cristina Nita-Rotaru authored at least 145 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Formal, Symbolic Analysis of the Matrix Cryptographic Protocol Suite.
CoRR, 2024

Phantom: General Trigger Attacks on Retrieval Augmented Language Generation.
CoRR, 2024

Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network.
CoRR, 2024

Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups.
CoRR, 2024

A Formal Analysis of SCTP: Attack Synthesis and Patch Verification.
Proceedings of the 33rd USENIX Security Symposium, 2024

Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
Verification of GossipSub in ACL2s.
Proceedings of the 18th International Workshop on the ACL2 Theorem Prover and Its Applications, 2023

A Case Study in Analytic Protocol Analysis in ACL2.
Proceedings of the 18th International Workshop on the ACL2 Theorem Prover and Its Applications, 2023

SABRE: Robust Bayesian Peer-to-Peer Federated Learning.
CoRR, 2023

Experimental Security Analysis of DNN-based Adaptive Cruise Control under Context-Aware Perception Attacks.
CoRR, 2023

Backdoor Attacks in Peer-to-Peer Federated Learning.
CoRR, 2023

MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

A Formal Analysis of Karn's Algorithm.
Proceedings of the Networked Systems - 11th International Conference, 2023

HoLA Robots: Mitigating Plan-Deviation Attacks in Multi-Robot Systems with Co-Observations and Horizon-Limiting Announcements.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

Byzantine Resilience at Swarm Scale: A Decentralized Blocklist Protocol from Inter-robot Accusations.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

2022
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Removing the Reliance on Perimeters for Security using Network Views.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

A flash(bot) in the pan: measuring maximal extractable value in private pools.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Alternative Route-Based Attacks in Metropolitan Traffic Systems.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Network-Level Adversaries in Federated Learning.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Securing Communication Against Leaky Switches.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Dynamic Security with SDN: Opportunities, Challenges, and Lessons Learned.
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022

On Randomization in MTD Systems.
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022

2021
VisConnect: Distributed Event Synchronization for Collaborative Visualization.
IEEE Trans. Vis. Comput. Graph., 2021

Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC.
J. Cryptol., 2021

More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Under the Hood of the Ethereum Gossip Protocol.
Proceedings of the Financial Cryptography and Data Security, 2021

Structural Attacks on Local Routing in Payment Channel Networks.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

2020
Exploiting Centrality: Attacks in Payment Channel Networks with Local Routing.
CoRR, 2020

Automated Attacker Synthesis for Distributed Protocols.
Proceedings of the Computer Safety, Reliability, and Security, 2020

aBBRate: Automating BBR Attack Exploration Using a Model-Based Approach.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

2019
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC.
IACR Cryptol. ePrint Arch., 2019

The House That Knows You: User Authentication Based on IoT Data.
CoRR, 2019

Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols.
Commun. ACM, 2019

Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019

ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Are Self-Driving Cars Secure? Evasion Attacks Against Deep Neural Networks for Steering Angle Prediction.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Leveraging Textual Specifications for Grammar-Based Fuzzing of Network Protocols.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks.
CoRR, 2018

Threat Detection for Collaborative Adaptive Cruise Control in Connected Cars.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Network and system level security in connected vehicle applications.
Proceedings of the International Conference on Computer-Aided Design, 2018

Cross-App Poisoning in Software-Defined Networking.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

The House That Knows You: User Authentication Based on IoT Data.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Toward a Taxonomy and Attacker Model for Secure Routing Protocols.
Comput. Commun. Rev., 2017

Identifier Binding Attacks and Defenses in Software-Defined Networks.
Proceedings of the 26th USENIX Security Symposium, 2017

SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Chizpurfle: A Gray-Box Android Fuzzer for Vendor Service Customizations.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017

Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Automated Adversarial Testing of Unmodified Wireless Routing Implementations.
IEEE/ACM Trans. Netw., 2016

Security of electrostatic field persistent routing: Attacks and defense mechanisms.
Ad Hoc Networks, 2016

MOSAIC: A Platform for Monitoring and Security Analytics in Public Clouds.
Proceedings of the IEEE Cybersecurity Development, 2016

Building Robust Distributed Systems and Network Protocols by Using Adversarial Testing and Behavioral Analysis.
Proceedings of the IEEE Cybersecurity Development, 2016

Practical Intrusion-Tolerant Networks.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

2015
Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed Systems.
ACM Trans. Inf. Syst. Secur., 2015

Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes.
IEEE Trans. Dependable Secur. Comput., 2015

ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection.
Proc. VLDB Endow., 2015

How Secure and Quick is QUIC? Provable Security and Performance Analyses.
IACR Cryptol. ePrint Arch., 2015

Taming epidemic outbreaks in mobile adhoc networks.
Ad Hoc Networks, 2015

Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

CCSW 2015: The 7th ACM Cloud Computing Security Workshop.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Newton: Securing Virtual Coordinates by Enforcing Physical Laws.
IEEE/ACM Trans. Netw., 2014

Generating Summary Risk Scores for Mobile Applications.
IEEE Trans. Dependable Secur. Comput., 2014

Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols.
ACM Comput. Surv., 2014

Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

On the Practicality of Integrity Attacks on Document-Level Sentiment Analysis.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks.
IEEE/ACM Trans. Netw., 2013

On the practicality of cryptographic defences against pollution attacks in wireless network coding.
ACM Comput. Surv., 2013

Adversarial testing of wireless routing implementations.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Juggling the Jigsaw: Towards Automated Problem Inference from Network Trouble Tickets.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

Access Control in Social Enterprise Applications: An Empirical Evaluation.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

2012
The internet-wide impact of P2P traffic localization on ISP profitability.
IEEE/ACM Trans. Netw., 2012

Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems.
IEEE Trans. Dependable Secur. Comput., 2012

Entropy attacks and countermeasures in wireless network coding.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Split Null Keys: A null space based defense for pollution attacks in wireless network coding.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Android permissions: a perspective combining risks and benefits.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Closing the Pandora's box: Defenses for thwarting epidemic outbreaks in mobile adhoc networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Securing Virtual Coordinates by Enforcing Physical Laws.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

Using probabilistic generative models for ranking risks of Android apps.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Secure Routing in Wireless Mesh Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Security of Group Communication in Wireless Mesh Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure Network Coding for Wireless Mesh Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Security of Wireless Mesh Networks (General Overview).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure High-Throughput Multicast Routing in Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2011

Practical defenses against pollution attacks in wireless network coding.
ACM Trans. Inf. Syst. Secur., 2011

A design for securing data delivery in mesh-based peer-to-peer streaming.
Comput. Networks, 2011

Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors.
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011

Removing the blinders: Using information to mitigate adversaries in adaptive overlays.
Proceedings of the 5th International Conference on Network and System Security, 2011

EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Applying game theory to analyze attacks and defenses in virtual coordinate systems.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Key agreement for wireless networks in the presence of active adversaries.
Proceedings of the Conference Record of the Forty Fifth Asilomar Conference on Signals, 2011

2010
Secure and robust virtual coordinate system in wireless sensor networks.
ACM Trans. Sens. Networks, 2010

Robust Decentralized Virtual Coordinate Systems in Adversarial Environments.
ACM Trans. Inf. Syst. Secur., 2010

Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks.
IEEE Trans. Dependable Secur. Comput., 2010

Pandora: a platform for worm simulations in mobile ad-hoc networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

A cross-layer reliability metric for wireless mesh networks with selfish participants.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks.
Ad Hoc Networks, 2010

Tradeoffs between security and communication performance in wireless mesh networks.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Towards securing data delivery in peer-to-peer streaming.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networks.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks.
IEEE Trans. Mob. Comput., 2009

JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks.
IEEE Trans. Dependable Secur. Comput., 2009

A survey of attack and defense techniques for reputation systems.
ACM Comput. Surv., 2009

Secure network coding for wireless mesh networks: Threats, challenges, and directions.
Comput. Commun., 2009

Secure group communication in wireless mesh networks.
Ad Hoc Networks, 2009

Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

2008
A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks.
IEEE/ACM Trans. Netw., 2008

ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks.
ACM Trans. Inf. Syst. Secur., 2008

Virtual Classroom Extension for Effective Distance Education.
IEEE Computer Graphics and Applications, 2008

Mitigating attacks against virtual coordinate based routing in wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Experimental comparison of peer-to-peer streaming overlays: An application perspective.
Proceedings of the LCN 2008, 2008

2007
Secure multicast routing in wireless networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2007

Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System.
IEEE J. Sel. Areas Commun., 2007

A multi-expertise application-driven class.
Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, 2007

BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

On the accuracy of decentralized virtual coordinate systems in adversarial networks.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Po^2V Network Layer Position Verification in Multi-HopWireless Networks.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

Scaling Byzantine Fault-Tolerant Replication toWide Area Networks.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

2005
Secure Spread: An Integrated Architecture for Secure Group Communication.
IEEE Trans. Dependable Secur. Comput., 2005

High Throughput Routing in Hybrid Cellular and Ad-Hoc Networks.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

On the Security of Distributed Position Services.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

On the Survivability of Routing Protocols in Ad Hoc Wireless Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

SPASS: scalable and energy-efficient data acquisition in sensor databases.
Proceedings of the 4th ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2005

ViWiD : Visible Watermarking Based Defense Against Phishing.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

2004
Secure Group Communication Using Robust Contributory Key Agreement.
IEEE Trans. Parallel Distributed Syst., 2004

On the performance of group key agreement protocols.
ACM Trans. Inf. Syst. Secur., 2004

JANUS: towards robust and malicious resilient routing in hybrid wireless networks.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

A Framework for Role-Based Access Control in Group Communication Systems.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
An on-demand secure routing protocol resilient to byzantine failures.
Proceedings of the 2002 ACM Workshop on Wireless Security, 2002

Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption.
Proceedings of the Topics in Cryptology, 2002

2001
Framework for Authentication and Access Control of Client-Server Group Communication Systems.
Proceedings of the Networked Group Communication, 2001

Exploring Robustness in Group Key Agreement.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

2000
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000


  Loading...