Cristina Nita-Rotaru
Orcid: 0000-0002-9649-6789Affiliations:
- Northeastern University, Boston, MA, USA
- Purdue University, West Lafayette,IN, USA (former)
According to our database1,
Cristina Nita-Rotaru
authored at least 146 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based Networking.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proceedings of the 18th International Workshop on the ACL2 Theorem Prover and Its Applications, 2023
Proceedings of the 18th International Workshop on the ACL2 Theorem Prover and Its Applications, 2023
Experimental Security Analysis of DNN-based Adaptive Cruise Control under Context-Aware Perception Attacks.
CoRR, 2023
MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
Proceedings of the Networked Systems - 11th International Conference, 2023
HoLA Robots: Mitigating Plan-Deviation Attacks in Multi-Robot Systems with Co-Observations and Horizon-Limiting Announcements.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023
Byzantine Resilience at Swarm Scale: A Decentralized Blocklist Protocol from Inter-robot Accusations.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023
2022
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022
2021
IEEE Trans. Vis. Comput. Graph., 2021
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC.
J. Cryptol., 2021
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021
Proceedings of the IEEE Conference on Communications and Network Security, 2021
2020
CoRR, 2020
Proceedings of the Computer Safety, Reliability, and Security, 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols.
Commun. ACM, 2019
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Are Self-Driving Cars Secure? Evasion Attacks Against Deep Neural Networks for Steering Angle Prediction.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks.
CoRR, 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the International Conference on Computer-Aided Design, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Comput. Commun. Rev., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017
Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
2016
IEEE/ACM Trans. Netw., 2016
Ad Hoc Networks, 2016
Proceedings of the IEEE Cybersecurity Development, 2016
Building Robust Distributed Systems and Network Protocols by Using Adversarial Testing and Behavioral Analysis.
Proceedings of the IEEE Cybersecurity Development, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
2015
ACM Trans. Inf. Syst. Secur., 2015
Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes.
IEEE Trans. Dependable Secur. Comput., 2015
ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection.
Proc. VLDB Endow., 2015
IACR Cryptol. ePrint Arch., 2015
Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEEE/ACM Trans. Netw., 2014
IEEE Trans. Dependable Secur. Comput., 2014
Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols.
ACM Comput. Surv., 2014
Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014
2013
IEEE/ACM Trans. Netw., 2013
On the practicality of cryptographic defences against pollution attacks in wireless network coding.
ACM Comput. Surv., 2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Juggling the Jigsaw: Towards Automated Problem Inference from Network Trouble Tickets.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
2012
IEEE/ACM Trans. Netw., 2012
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Split Null Keys: A null space based defense for pollution attacks in wireless network coding.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Closing the Pandora's box: Defenses for thwarting epidemic outbreaks in mobile adhoc networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IEEE Trans. Mob. Comput., 2011
ACM Trans. Inf. Syst. Secur., 2011
Comput. Networks, 2011
Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011
Removing the blinders: Using information to mitigate adversaries in adaptive overlays.
Proceedings of the 5th International Conference on Network and System Security, 2011
EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
Proceedings of the Conference Record of the Forty Fifth Asilomar Conference on Signals, 2011
2010
ACM Trans. Sens. Networks, 2010
ACM Trans. Inf. Syst. Secur., 2010
IEEE Trans. Dependable Secur. Comput., 2010
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010
A cross-layer reliability metric for wireless mesh networks with selfish participants.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010
UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks.
Ad Hoc Networks, 2010
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Proceedings of the Second International Conference on Communication Systems and Networks, 2010
iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networks.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
IEEE Trans. Mob. Comput., 2009
IEEE Trans. Dependable Secur. Comput., 2009
ACM Comput. Surv., 2009
Secure network coding for wireless mesh networks: Threats, challenges, and directions.
Comput. Commun., 2009
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
2008
A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks.
IEEE/ACM Trans. Netw., 2008
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks.
ACM Trans. Inf. Syst. Secur., 2008
IEEE Computer Graphics and Applications, 2008
Mitigating attacks against virtual coordinate based routing in wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008
On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008
Experimental comparison of peer-to-peer streaming overlays: An application perspective.
Proceedings of the LCN 2008, 2008
2007
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2007
IEEE J. Sel. Areas Commun., 2007
Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, 2007
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
Proceedings of the 2006 International Symposium on a World of Wireless, 2006
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
2005
IEEE Trans. Dependable Secur. Comput., 2005
Proceedings of the 2005 International Conference on a World of Wireless, 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the 4th ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
2004
IEEE Trans. Parallel Distributed Syst., 2004
ACM Trans. Inf. Syst. Secur., 2004
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004
A Framework for Role-Based Access Control in Group Communication Systems.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004
2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
2002
Proceedings of the 2002 ACM Workshop on Wireless Security, 2002
Proceedings of the Topics in Cryptology, 2002
2001
Framework for Authentication and Access Control of Client-Server Group Communication Systems.
Proceedings of the Networked Group Communication, 2001
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001
2000
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000