


default search action
Cristina Nita-Rotaru
Person information
- affiliation: Northeastern University, Boston, MA, USA
- affiliation (former): Purdue University, West Lafayette,IN, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j40]Georgios Syros
, Gökberk Yar
, Simona Boboila
, Cristina Nita-Rotaru
, Alina Oprea
:
Backdoor Attacks in Peer-to-Peer Federated Learning. ACM Trans. Priv. Secur. 28(1): 8:1-8:28 (2025) - [i26]Georgios Syros, Anshuman Suri, Farinaz Koushanfar, Cristina Nita-Rotaru, Alina Oprea:
DROP: Poison Dilution via Knowledge Distillation for Federated Learning. CoRR abs/2502.07011 (2025) - 2024
- [c103]Ben Weintraub
, Satwik Prabhu Kumble
, Cristina Nita-Rotaru
, Stefanie Roos
:
Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network. CCS 2024: 2562-2576 - [c102]Christof Ferreira Torres
, Albin Mamuti
, Ben Weintraub
, Cristina Nita-Rotaru
, Shweta Shinde
:
Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups. CCS 2024: 2591-2605 - [c101]Ben Weintraub
, Jiwon Kim
, Ran Tao
, Cristina Nita-Rotaru
, Hamed Okhravi
, Dave (Jing) Tian
, Benjamin E. Ujcich
:
Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based Networking. CCS 2024: 3630-3644 - [c100]Ankit Kumar, Max von Hippel, Panagiotis Manolios, Cristina Nita-Rotaru:
Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers. SP 2024: 2142-2160 - [c99]Jacob Ginesin, Max von Hippel, Evan Defloor, Cristina Nita-Rotaru, Michael Tüxen:
A Formal Analysis of SCTP: Attack Synthesis and Patch Verification. USENIX Security Symposium 2024 - [i25]Jacob Ginesin, Max von Hippel, Evan Defloor, Cristina Nita-Rotaru, Michael Tüxen:
A Formal Analysis of SCTP: Attack Synthesis and Patch Verification. CoRR abs/2403.05663 (2024) - [i24]Christof Ferreira Torres, Albin Mamuti, Ben Weintraub, Cristina Nita-Rotaru, Shweta Shinde:
Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups. CoRR abs/2405.00138 (2024) - [i23]Ben Weintraub, Satwik Prabhu Kumble, Cristina Nita-Rotaru, Stefanie Roos:
Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network. CoRR abs/2405.02147 (2024) - [i22]Harsh Chaudhari, Giorgio Severi, John Abascal, Matthew Jagielski, Christopher A. Choquette-Choo, Milad Nasr, Cristina Nita-Rotaru, Alina Oprea:
Phantom: General Trigger Attacks on Retrieval Augmented Language Generation. CoRR abs/2405.20485 (2024) - [i21]Jacob Ginesin, Cristina Nita-Rotaru:
A Formal, Symbolic Analysis of the Matrix Cryptographic Protocol Suite. CoRR abs/2408.12743 (2024) - 2023
- [c98]Kacper Wardega, Max von Hippel, Roberto Tron, Cristina Nita-Rotaru, Wenchao Li:
Byzantine Resilience at Swarm Scale: A Decentralized Blocklist Protocol from Inter-robot Accusations. AAMAS 2023: 1430-1438 - [c97]Kacper Wardega, Max von Hippel, Roberto Tron, Cristina Nita-Rotaru, Wenchao Li:
HoLA Robots: Mitigating Plan-Deviation Attacks in Multi-Robot Systems with Co-Observations and Horizon-Limiting Announcements. AAMAS 2023: 2553-2555 - [c96]Max von Hippel, Kenneth L. McMillan, Cristina Nita-Rotaru, Lenore D. Zuck:
A Formal Analysis of Karn's Algorithm. NETYS 2023: 43-61 - [c95]Iffat Anjum
, Jessica Sokal
, Hafiza Ramzah Rehman
, Ben Weintraub
, Ethan Leba
, William Enck
, Cristina Nita-Rotaru
, Bradley Reaves
:
MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy. SACMAT 2023: 121-132 - [c94]Max von Hippel, Panagiotis Manolios, Kenneth L. McMillan, Cristina Nita-Rotaru, Lenore D. Zuck:
A Case Study in Analytic Protocol Analysis in ACL2. ACL2 2023: 50-66 - [c93]Ankit Kumar, Max von Hippel, Panagiotis Manolios, Cristina Nita-Rotaru:
Verification of GossipSub in ACL2s. ACL2 2023: 113-132 - [i20]Kacper Wardega, Max von Hippel, Roberto Tron, Cristina Nita-Rotaru, Wenchao Li:
Byzantine Resilience at Swarm Scale: A Decentralized Blocklist Protocol from Inter-robot Accusations. CoRR abs/2301.06977 (2023) - [i19]Gökberk Yar, Cristina Nita-Rotaru, Alina Oprea:
Backdoor Attacks in Peer-to-Peer Federated Learning. CoRR abs/2301.09732 (2023) - [i18]Kacper Wardega, Max von Hippel, Roberto Tron, Cristina Nita-Rotaru, Wenchao Li:
HoLA Robots: Mitigating Plan-Deviation Attacks in Multi-Robot Systems with Co-Observations and Horizon-Limiting Announcements. CoRR abs/2301.10704 (2023) - [i17]Xugui Zhou, Anqi Chen, Maxfield Kouzel, Haotian Ren, Morgan McCarty, Cristina Nita-Rotaru, Homa Alemzadeh:
Experimental Security Analysis of DNN-based Adaptive Cruise Control under Context-Aware Perception Attacks. CoRR abs/2307.08939 (2023) - [i16]Nasimeh Heydaribeni, Ruisi Zhang, Tara Javidi, Cristina Nita-Rotaru, Farinaz Koushanfar:
SABRE: Robust Bayesian Peer-to-Peer Federated Learning. CoRR abs/2308.02747 (2023) - 2022
- [c92]Cristina Nita-Rotaru:
Dynamic Security with SDN: Opportunities, Challenges, and Lessons Learned. MTD@CCS 2022: 1-2 - [c91]Majid Ghaderi, Samuel Jero, Cristina Nita-Rotaru, Reihaneh Safavi-Naini:
On Randomization in MTD Systems. MTD@CCS 2022: 37-43 - [c90]Giorgio Severi, Matthew Jagielski, Gökberk Yar, Yuxuan Wang, Alina Oprea, Cristina Nita-Rotaru:
Network-Level Adversaries in Federated Learning. CNS 2022: 19-27 - [c89]Leila Rashidi, Sogand SadrHaghighi, Majid Ghaderi, Cristina Nita-Rotaru, Reihaneh Safavi-Naini:
Securing Communication Against Leaky Switches. CNS 2022: 335-343 - [c88]Sidney La Fontaine, Naveen Muralidhar, Michael Clifford, Tina Eliassi-Rad, Cristina Nita-Rotaru:
Alternative Route-Based Attacks in Metropolitan Traffic Systems. DSN Workshops 2022: 20-27 - [c87]Ben Weintraub, Christof Ferreira Torres
, Cristina Nita-Rotaru, Radu State:
A flash(bot) in the pan: measuring maximal extractable value in private pools. IMC 2022: 458-471 - [c86]Iffat Anjum, Daniel Kostecki, Ethan Leba, Jessica Sokal, Rajit Bharambe, William Enck, Cristina Nita-Rotaru, Bradley Reaves:
Removing the Reliance on Perimeters for Security using Network Views. SACMAT 2022: 151-162 - [c85]Maria Leonor Pacheco
, Max von Hippel, Ben Weintraub, Dan Goldwasser, Cristina Nita-Rotaru:
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents. SP 2022: 51-68 - [c84]Kyle Hogan, Sacha Servan-Schreiber, Zachary Newman
, Ben Weintraub, Cristina Nita-Rotaru, Srinivas Devadas:
ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing. SP 2022: 1933-1952 - [i15]Maria Leonor Pacheco, Max von Hippel, Ben Weintraub, Dan Goldwasser, Cristina Nita-Rotaru:
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents. CoRR abs/2202.09470 (2022) - [i14]Kyle Hogan, Sacha Servan-Schreiber, Zachary Newman
, Ben Weintraub, Cristina Nita-Rotaru, Srinivas Devadas:
ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing. CoRR abs/2204.04489 (2022) - [i13]Ben Weintraub, Christof Ferreira Torres, Cristina Nita-Rotaru, Radu State:
A Flash(bot) in the Pan: Measuring Maximal Extractable Value in Private Pools. CoRR abs/2206.04185 (2022) - [i12]Giorgio Severi, Matthew Jagielski, Gökberk Yar, Yuxuan Wang, Alina Oprea, Cristina Nita-Rotaru:
Network-Level Adversaries in Federated Learning. CoRR abs/2208.12911 (2022) - [i11]Ankit Kumar, Max von Hippel, Pete Manolios
, Cristina Nita-Rotaru:
Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers. CoRR abs/2212.05197 (2022) - 2021
- [j39]Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru:
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC. J. Cryptol. 34(3): 26 (2021) - [j38]Michail Schwab, David Saffo, Yixuan Zhang, Shash Sinha, Cristina Nita-Rotaru, James Tompkin
, Cody Dunne
, Michelle A. Borkin
:
VisConnect: Distributed Event Synchronization for Collaborative Visualization. IEEE Trans. Vis. Comput. Graph. 27(2): 347-357 (2021) - [c83]Lucian Trestioreanu, Cristina Nita-Rotaru, Aanchal Malhotra, Radu State:
SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay. CNS 2021: 92-100 - [c82]Ben Weintraub, Cristina Nita-Rotaru:
Structural Attacks on Local Routing in Payment Channel Networks. EuroS&P Workshops 2021: 367-379 - [c81]Lucianna Kiffer, Asad Salman, Dave Levin, Alan Mislove, Cristina Nita-Rotaru:
Under the Hood of the Ethereum Gossip Protocol. Financial Cryptography (2) 2021: 437-456 - [c80]Leila Rashidi, Daniel Kostecki, Alexander James, Anthony Peterson, Majid Ghaderi, Samuel Jero, Cristina Nita-Rotaru, Hamed Okhravi, Reihaneh Safavi-Naini:
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes. NDSS 2021 - [i10]Lucian Trestioreanu
, Cristina Nita-Rotaru, Aanchal Malhotra, Radu State:
SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay. CoRR abs/2110.09207 (2021) - 2020
- [c79]Anthony Peterson, Samuel Jero, Md. Endadul Hoque, David R. Choffnes, Cristina Nita-Rotaru:
aBBRate: Automating BBR Attack Exploration Using a Model-Based Approach. RAID 2020: 225-240 - [c78]Max von Hippel, Cole Vick
, Stavros Tripakis, Cristina Nita-Rotaru:
Automated Attacker Synthesis for Distributed Protocols. SAFECOMP 2020: 133-149 - [i9]Max von Hippel, Cole Vick, Stavros Tripakis, Cristina Nita-Rotaru:
Automated Attacker Synthesis for Distributed Protocols. CoRR abs/2004.01220 (2020) - [i8]Ben Weintraub, Cristina Nita-Rotaru, Stefanie Roos:
Exploiting Centrality: Attacks in Payment Channel Networks with Local Routing. CoRR abs/2007.09047 (2020)
2010 – 2019
- 2019
- [j37]Arash Molavi Kakhki, Samuel Jero, David R. Choffnes, Cristina Nita-Rotaru, Alan Mislove:
Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols. Commun. ACM 62(7): 86-94 (2019) - [c77]Samuel Jero, Maria Leonor Pacheco
, Dan Goldwasser, Cristina Nita-Rotaru:
Leveraging Textual Specifications for Grammar-Based Fuzzing of Network Protocols. AAAI 2019: 9478-9483 - [c76]Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru:
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC. ESORICS (1) 2019: 404-426 - [c75]Sean Rivera, Sofiane Lagraa, Cristina Nita-Rotaru, Sheila Becker, Radu State:
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications. IEEE Symposium on Security and Privacy Workshops 2019: 114-119 - [c74]Alesia Chernikova, Alina Oprea, Cristina Nita-Rotaru, BaekGyu Kim
:
Are Self-Driving Cars Secure? Evasion Attacks Against Deep Neural Networks for Steering Angle Prediction. IEEE Symposium on Security and Privacy Workshops 2019: 132-137 - [c73]Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli:
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks. USENIX Security Symposium 2019: 321-338 - [i7]Alesia Chernikova, Alina Oprea, Cristina Nita-Rotaru, BaekGyu Kim:
Are Self-Driving Cars Secure? Evasion Attacks against Deep Neural Networks for Steering Angle Prediction. CoRR abs/1904.07370 (2019) - [i6]Talha Ongun, Oliver Spohngellert, Alina Oprea, Cristina Nita-Rotaru, Mihai Christodorescu, Negin Salajegheh:
The House That Knows You: User Authentication Based on IoT Data. CoRR abs/1908.00592 (2019) - [i5]Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru:
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC. IACR Cryptol. ePrint Arch. 2019: 433 (2019) - 2018
- [c72]Samuel Jero, Md. Endadul Hoque, David R. Choffnes, Alan Mislove, Cristina Nita-Rotaru:
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach. ANRW 2018: 95 - [c71]Benjamin E. Ujcich
, Samuel Jero, Anne Edmundson, Qi Wang, Richard Skowyra, James Landry, Adam Bates, William H. Sanders, Cristina Nita-Rotaru, Hamed Okhravi
:
Cross-App Poisoning in Software-Defined Networking. CCS 2018: 648-663 - [c70]Talha Ongun, Alina Oprea, Cristina Nita-Rotaru, Mihai Christodorescu, Negin Salajegheh:
The House That Knows You: User Authentication Based on IoT Data. CCS 2018: 2255-2257 - [c69]Hengyi Liang, Matthew Jagielski, Bowen Zheng, Chung-Wei Lin, Eunsuk Kang, Shinichi Shiraishi, Cristina Nita-Rotaru, Qi Zhu:
Network and system level security in connected vehicle applications. ICCAD 2018: 94 - [c68]Samuel Jero, Md. Endadul Hoque, David R. Choffnes, Alan Mislove, Cristina Nita-Rotaru:
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach. NDSS 2018 - [c67]Matthew Jagielski, Alina Oprea, Battista Biggio
, Chang Liu, Cristina Nita-Rotaru, Bo Li:
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning. IEEE Symposium on Security and Privacy 2018: 19-35 - [c66]Matthew Jagielski, Nicholas Jones, Chung-Wei Lin, Cristina Nita-Rotaru, Shinichi Shiraishi:
Threat Detection for Collaborative Adaptive Cruise Control in Connected Cars. WISEC 2018: 184-189 - [i4]Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li:
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning. CoRR abs/1804.00308 (2018) - [i3]Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli:
On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks. CoRR abs/1809.02861 (2018) - [i2]Samuel Jero, Maria Leonor Pacheco, Dan Goldwasser, Cristina Nita-Rotaru:
Leveraging Textual Specifications for Grammar-based Fuzzing of Network Protocols. CoRR abs/1810.04755 (2018) - 2017
- [j36]Matthias Hollick
, Cristina Nita-Rotaru, Panagiotis Papadimitratos
, Adrian Perrig, Stefan Schmid
:
Toward a Taxonomy and Attacker Model for Secure Routing Protocols. Comput. Commun. Rev. 47(1): 43-48 (2017) - [c65]Md. Endadul Hoque
, Omar Chowdhury, Sze Yiu Chau
, Cristina Nita-Rotaru, Ninghui Li:
Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs. DSN 2017: 627-638 - [c64]Arash Molavi Kakhki, Samuel Jero, David R. Choffnes, Cristina Nita-Rotaru, Alan Mislove:
Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols. Internet Measurement Conference 2017: 290-303 - [c63]Antonio Ken Iannillo
, Roberto Natella
, Domenico Cotroneo, Cristina Nita-Rotaru:
Chizpurfle: A Gray-Box Android Fuzzer for Vendor Service Customizations. ISSRE 2017: 1-11 - [c62]Samuel Jero, Xiangyu Bu, Cristina Nita-Rotaru, Hamed Okhravi
, Richard Skowyra, Sonia Fahmy
:
BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems. RAID 2017: 311-333 - [c61]Sze Yiu Chau
, Omar Chowdhury, Md. Endadul Hoque
, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, Ninghui Li:
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations. IEEE Symposium on Security and Privacy 2017: 503-520 - [c60]Samuel Jero, William Koch, Richard Skowyra, Hamed Okhravi, Cristina Nita-Rotaru, David Bigelow:
Identifier Binding Attacks and Defenses in Software-Defined Networks. USENIX Security Symposium 2017: 415-432 - 2016
- [j35]Oliviu C. Ghica, Cristina Nita-Rotaru, Goce Trajcevski, Peter Scheuermann:
Security of electrostatic field persistent routing: Attacks and defense mechanisms. Ad Hoc Networks 36: 270-295 (2016) - [j34]Md. Endadul Hoque
, Hyojeong Lee, Rahul Potharaju, Charles Killian, Cristina Nita-Rotaru:
Automated Adversarial Testing of Unmodified Wireless Routing Implementations. IEEE/ACM Trans. Netw. 24(6): 3369-3382 (2016) - [c59]Daniel Obenshain, Thomas Tantillo, Amy Babay
, John L. Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, Cristina Nita-Rotaru:
Practical Intrusion-Tolerant Networks. ICDCS 2016: 45-56 - [c58]Alina Oprea, Ata Turk, Cristina Nita-Rotaru, Orran Krieger:
MOSAIC: A Platform for Monitoring and Security Analytics in Public Clouds. SecDev 2016: 69-70 - [c57]Md. Endadul Hoque
, Cristina Nita-Rotaru:
Building Robust Distributed Systems and Network Protocols by Using Adversarial Testing and Behavioral Analysis. SecDev 2016: 138-145 - 2015
- [j33]Md. Endadul Hoque, Rahul Potharaju, Cristina Nita-Rotaru, Saswati Sarkar, Santosh S. Venkatesh:
Taming epidemic outbreaks in mobile adhoc networks. Ad Hoc Networks 24: 57-72 (2015) - [j32]Rahul Potharaju, Joseph Chan, Luhui Hu, Cristina Nita-Rotaru, Mingshi Wang, Liyuan Zhang, Navendu Jain:
ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection. Proc. VLDB Endow. 8(12): 1828-1839 (2015) - [j31]Andrew Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, Yair Amir:
Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes. IEEE Trans. Dependable Secur. Comput. 12(6): 602-614 (2015) - [j30]Hyojeong Lee, Jeff Seibert, Dylan Fistrovic, Charles Killian, Cristina Nita-Rotaru:
Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed Systems. ACM Trans. Inf. Syst. Secur. 17(4): 13:1-13:34 (2015) - [c56]Florian Kerschbaum, Cristina Nita-Rotaru, Indrajit Ray:
CCSW 2015: The 7th ACM Cloud Computing Security Workshop. CCS 2015: 1703-1704 - [c55]Samuel Jero, Hyojeong Lee, Cristina Nita-Rotaru:
Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations. DSN 2015: 1-12 - [c54]Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru:
How Secure and Quick is QUIC? Provable Security and Performance Analyses. IEEE Symposium on Security and Privacy 2015: 214-231 - [e6]Indrajit Ray, Xiaofeng Wang, Kui Ren, Florian Kerschbaum, Cristina Nita-Rotaru:
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, CCSW 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3825-7 [contents] - [i1]Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru:
How Secure and Quick is QUIC? Provable Security and Performance Analyses. IACR Cryptol. ePrint Arch. 2015: 582 (2015) - 2014
- [j29]Andrew Newell, Hongyi Yao, Alex Ryker, Tracey Ho, Cristina Nita-Rotaru:
Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols. ACM Comput. Surv. 47(2): 24:1-24:34 (2014) - [j28]Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Pratim Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Generating Summary Risk Scores for Mobile Applications. IEEE Trans. Dependable Secur. Comput. 11(3): 238-251 (2014) - [j27]Jeff Seibert, Sheila Becker, Cristina Nita-Rotaru, Radu State:
Newton: Securing Virtual Coordinates by Enforcing Physical Laws. IEEE/ACM Trans. Netw. 22(3): 798-811 (2014) - [c53]Andrew Newell, Rahul Potharaju, Luojie Xiang, Cristina Nita-Rotaru:
On the Practicality of Integrity Attacks on Document-Level Sentiment Analysis. AISec@CCS 2014: 83-93 - [c52]Hyojeong Lee, Jeff Seibert, Md. Endadul Hoque, Charles Killian, Cristina Nita-Rotaru:
Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations. ICDCS 2014: 660-669 - 2013
- [j26]Andrew Newell, Jing Dong, Cristina Nita-Rotaru:
On the practicality of cryptographic defences against pollution attacks in wireless network coding. ACM Comput. Surv. 45(3): 39:1-39:26 (2013) - [j25]Stefano Paris, Cristina Nita-Rotaru, Fabio Martignon, Antonio Capone
:
Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks. IEEE/ACM Trans. Netw. 21(3): 1003-1016 (2013) - [c51]Andrew Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, Yair Amir:
Increasing network resiliency by optimally assigning diverse variants to routing nodes. DSN 2013: 1-12 - [c50]Rafae Bhatti, Camille Gaspard, Cristina Nita-Rotaru:
Access Control in Social Enterprise Applications: An Empirical Evaluation. ICDCS Workshops 2013: 167-171 - [c49]Rahul Potharaju, Navendu Jain, Cristina Nita-Rotaru:
Juggling the Jigsaw: Towards Automated Problem Inference from Network Trouble Tickets. NSDI 2013: 127-141 - [c48]Md. Endadul Hoque, Hyojeong Lee, Rahul Potharaju, Charles E. Killian, Cristina Nita-Rotaru:
Adversarial testing of wireless routing implementations. WISEC 2013: 143-148 - [e5]Michel Abdalla
, Cristina Nita-Rotaru, Ricardo Dahab:
Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings. Lecture Notes in Computer Science 8257, Springer 2013, ISBN 978-3-319-02936-8 [contents] - [e4]Sajal K. Das, Cristina Nita-Rotaru, Murat Kantarcioglu:
Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings. Lecture Notes in Computer Science 8252, Springer 2013, ISBN 978-3-319-02785-2 [contents] - 2012
- [j24]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru, David K. Y. Yau:
Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems. IEEE Trans. Dependable Secur. Comput. 9(5): 741-755 (2012) - [j23]Jeff Seibert, Ruben Torres, Marco Mellia
, Maurizio M. Munafò, Cristina Nita-Rotaru, Sanjay G. Rao:
The internet-wide impact of P2P traffic localization on ISP profitability. IEEE/ACM Trans. Netw. 20(6): 1910-1923 (2012) - [c47]Hao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Using probabilistic generative models for ranking risks of Android apps. CCS 2012: 241-252 - [c46]Oliviu Ghica, Cristina Nita-Rotaru, Goce Trajcevski, Peter Scheuermann:
Security of Electrostatic Field Persistent Routing: Attacks and Defense Mechanisms. EDCC 2012: 102-113 - [c45]Rahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, Xiangyu Zhang:
Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques. ESSoS 2012: 106-120 - [c44]Jeffrey Seibert, Sheila Becker, Cristina Nita-Rotaru, Radu State:
Securing Virtual Coordinates by Enforcing Physical Laws. ICDCS 2012: 315-324 - [c43]Rahul Potharaju, Md. Endadul Hoque, Cristina Nita-Rotaru, Saswati Sarkar, Santosh S. Venkatesh:
Closing the Pandora's box: Defenses for thwarting epidemic outbreaks in mobile adhoc networks. MASS 2012: 200-208 - [c42]Hyojeong Lee, Jeff Seibert, Charles Killian, Cristina Nita-Rotaru:
Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems. NDSS 2012 - [c41]Jeff Seibert, Sheila Becker, Cristina Nita-Rotaru, Radu State:
Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems. NDSS 2012 - [c40]Bhaskar Pratim Sarma, Ninghui Li, Christopher S. Gates, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Android permissions: a perspective combining risks and benefits. SACMAT 2012: 13-22 - [c39]Andrew Newell, Cristina Nita-Rotaru:
Split Null Keys: A null space based defense for pollution attacks in wireless network coding. SECON 2012: 479-487 - [c38]Andrew Newell, Reza Curtmola, Cristina Nita-Rotaru:
Entropy attacks and countermeasures in wireless network coding. WISEC 2012: 185-196 - 2011
- [j22]Jeff Seibert, Xin Sun, Cristina Nita-Rotaru, Sanjay G. Rao:
A design for securing data delivery in mesh-based peer-to-peer streaming. Comput. Networks 55(12): 2730-2745 (2011) - [j21]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Practical defenses against pollution attacks in wireless network coding. ACM Trans. Inf. Syst. Secur. 14(1): 7:1-7:31 (2011) - [j20]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Secure High-Throughput Multicast Routing in Wireless Mesh Networks. IEEE Trans. Mob. Comput. 10(5): 653-668 (2011) - [c37]Hongyi Yao, Tracey Ho, Cristina Nita-Rotaru:
Key agreement for wireless networks in the presence of active adversaries. ACSCC 2011: 792-796 - [c36]Sheila Becker, Jeff Seibert, David Zage, Cristina Nita-Rotaru, Radu State:
Applying game theory to analyze attacks and defenses in virtual coordinate systems. DSN 2011: 133-144 - [c35]Stefano Paris, Cristina Nita-Rotaru, Fabio Martignon, Antonio Capone
:
EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants. INFOCOM 2011: 576-580 - [c34]David Zage, Charles Killian, Cristina Nita-Rotaru:
Removing the blinders: Using information to mitigate adversaries in adaptive overlays. NSS 2011: 129-136 - [c33]Rahul Potharaju, Jeff Seibert, Sonia Fahmy
, Cristina Nita-Rotaru:
Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors. PAM 2011: 122-132 - [c32]Sheila Becker, Jeff Seibert, Cristina Nita-Rotaru, Radu State:
Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack. RAID 2011: 201-221 - [r4]Cristina Nita-Rotaru, Reza Curtmola:
Secure Network Coding for Wireless Mesh Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1123-1126 - [r3]Cristina Nita-Rotaru, Jing Dong, Reza Curtmola:
Secure Routing in Wireless Mesh Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1126-1130 - [r2]Cristina Nita-Rotaru, Reza Curtmola, Jing Dong:
Security of Group Communication in Wireless Mesh Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1159-1163 - [r1]Reza Curtmola, Jing Dong, Cristina Nita-Rotaru:
Security of Wireless Mesh Networks (General Overview). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1163-1167 - 2010
- [j19]Issa M. Khalil
, Saurabh Bagchi, Cristina Nita-Rotaru, Ness B. Shroff:
UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad Hoc Networks 8(2): 148-164 (2010) - [j18]Stefano Paris, Antonio Capone, Cristina Nita-Rotaru, Fabio Martignon:
A cross-layer reliability metric for wireless mesh networks with selfish participants. ACM SIGMOBILE Mob. Comput. Commun. Rev. 14(3): 1-3 (2010) - [j17]Rahul Potharaju, Cristina Nita-Rotaru:
Pandora: a platform for worm simulations in mobile ad-hoc networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 14(4): 16-18 (2010) - [j16]Yair Amir, Claudiu Danilov, Danny Dolev
, Jonathan Kirsch, John Lane, Cristina Nita-Rotaru, Josh Olsen, David Zage:
Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks. IEEE Trans. Dependable Secur. Comput. 7(1): 80-93 (2010) - [j15]David Zage, Cristina Nita-Rotaru:
Robust Decentralized Virtual Coordinate Systems in Adversarial Environments. ACM Trans. Inf. Syst. Secur. 13(4): 38:1-38:34 (2010) - [j14]Jing Dong, Kurt Erik Ackermann, Brett Bavar, Cristina Nita-Rotaru:
Secure and robust virtual coordinate system in wireless sensor networks. ACM Trans. Sens. Networks 6(4): 29:1-29:34 (2010) - [c31]Rahul Potharaju, Bogdan Carbunar, Cristina Nita-Rotaru:
iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networks. CCS 2010: 723-725 - [c30]Jeffrey Seibert, Xin Sun, Cristina Nita-Rotaru, Sanjay G. Rao:
Towards securing data delivery in peer-to-peer streaming. COMSNETS 2010: 1-10 - [c29]Reza Curtmola, Jing Dong, Cristina Nita-Rotaru:
Tradeoffs between security and communication performance in wireless mesh networks. WOWMOM 2010: 1-6 - [e3]Susanne Wetzel, Cristina Nita-Rotaru, Frank Stajano:
Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010. ACM 2010, ISBN 978-1-60558-923-7 [contents]
2000 – 2009
- 2009
- [j13]Jing Dong, Kurt Erik Ackermann, Cristina Nita-Rotaru:
Secure group communication in wireless mesh networks. Ad Hoc Networks 7(8): 1563-1576 (2009) - [j12]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Secure network coding for wireless mesh networks: Threats, challenges, and directions. Comput. Commun. 32(17): 1790-1801 (2009) - [j11]Kevin J. Hoffman, David Zage, Cristina Nita-Rotaru:
A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 42(1): 1:1-1:31 (2009) - [j10]Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-Rotaru:
JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks. IEEE Trans. Dependable Secur. Comput. 6(4): 295-308 (2009) - [j9]Reza Curtmola, Cristina Nita-Rotaru:
BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks. IEEE Trans. Mob. Comput. 8(4): 445-459 (2009) - [c28]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. WISEC 2009: 111-122 - [e2]Shouhuai Xu, N. Asokan, Cristina Nita-Rotaru, Jean-Pierre Seifert:
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009. ACM 2009, ISBN 978-1-60558-788-2 [contents] - 2008
- [j8]Radu Dondera, Chun Jia, Voicu Popescu, Cristina Nita-Rotaru, Melissa Dark, Cynthia S. York:
Virtual Classroom Extension for Effective Distance Education. IEEE Computer Graphics and Applications 28(1): 64-74 (2008) - [j7]Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru, Herbert Rubens:
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans. Inf. Syst. Secur. 10(4): 6:1-6:35 (2008) - [j6]Aaron Walters, David Zage, Cristina Nita-Rotaru:
A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks. IEEE/ACM Trans. Netw. 16(6): 1434-1446 (2008) - [c27]Jeff Seibert, David Zage, Sonia Fahmy
, Cristina Nita-Rotaru:
Experimental comparison of peer-to-peer streaming overlays: An application perspective. LCN 2008: 20-27 - [c26]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks. SECON 2008: 224-232 - [c25]Jing Dong, Kurt Erik Ackermann, Brett Bavar, Cristina Nita-Rotaru:
Mitigating attacks against virtual coordinate based routing in wireless sensor networks. WISEC 2008: 89-99 - [c24]Jing Dong, Kurt Erik Ackermann, Cristina Nita-Rotaru:
Secure group communication in wireless mesh networks. WOWMOM 2008: 1-8 - [e1]Shouhuai Xu, Cristina Nita-Rotaru, Jean-Pierre Seifert:
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008. ACM 2008, ISBN 978-1-60558-295-5 [contents] - 2007
- [j5]Ruben Torres, Xin Sun, AAron Walters, Cristina Nita-Rotaru, Sanjay G. Rao:
Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System. IEEE J. Sel. Areas Commun. 25(9): 1732-1744 (2007) - [j4]Reza Curtmola, Cristina Nita-Rotaru:
Secure multicast routing in wireless networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 11(2): 55-56 (2007) - [c23]David John Zage, Cristina Nita-Rotaru:
On the accuracy of decentralized virtual coordinate systems in adversarial networks. CCS 2007: 214-224 - [c22]Ruben Torres, Xin Sun, AAron Walters, Cristina Nita-Rotaru, Sanjay G. Rao:
Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System. INFOCOM 2007: 607-615 - [c21]Reza Curtmola, Cristina Nita-Rotaru:
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks. SECON 2007: 263-272 - [c20]Cristina Nita-Rotaru, Melissa Dark, Voicu Popescu:
A multi-expertise application-driven class. SIGCSE 2007: 119-123 - 2006
- [c19]Yair Amir, Claudiu Danilov, Jonathan Kirsch, John Lane, Danny Dolev, Cristina Nita-Rotaru, Josh Olsen, David John Zage:
Scaling Byzantine Fault-Tolerant Replication toWide Area Networks. DSN 2006: 105-114 - [c18]AAron Walters, David John Zage, Cristina Nita-Rotaru:
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks. ICNP 2006: 65-74 - [c17]Xiaoxin Wu, Cristina Nita-Rotaru:
Po^2V Network Layer Position Verification in Multi-HopWireless Networks. WOWMOM 2006: 150-158 - 2005
- [j3]Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik:
Secure Spread: An Integrated Architecture for Secure Group Communication. IEEE Trans. Dependable Secur. Comput. 2(3): 248-261 (2005) - [c16]Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, Cristina Nita-Rotaru:
ViWiD : Visible Watermarking Based Defense Against Phishing. IWDW 2005: 470-483 - [c15]Mohamed H. Ali, Walid G. Aref, Cristina Nita-Rotaru:
SPASS: scalable and energy-efficient data acquisition in sensor databases. MobiDE 2005: 81-88 - [c14]Xiaoxin Wu, Cristina Nita-Rotaru:
On the Security of Distributed Position Services. SecureComm 2005: 35-46 - [c13]Issa M. Khalil
, Saurabh Bagchi, Cristina Nita-Rotaru:
DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks. SecureComm 2005: 89-100 - [c12]Baruch Awerbuch, Reza Curtmola, David Holmer, Herbert Rubens, Cristina Nita-Rotaru:
On the Survivability of Routing Protocols in Ad Hoc Wireless Networks. SecureComm 2005: 327-338 - [c11]AAron Walters, Cristina Nita-Rotaru:
Analysis of malicious abstract sensor faults in adaptive measurement-based overlay networks. SOSP 2005: 1-2 - [c10]Ioannis Ioannidis, Bogdan Carbunar, Cristina Nita-Rotaru:
High Throughput Routing in Hybrid Cellular and Ad-Hoc Networks. WOWMOM 2005: 171-176 - 2004
- [j2]Yair Amir, Yongdae Kim
, Cristina Nita-Rotaru, Gene Tsudik:
On the performance of group key agreement protocols. ACM Trans. Inf. Syst. Secur. 7(3): 457-488 (2004) - [j1]Yair Amir, Yongdae Kim
, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik:
Secure Group Communication Using Robust Contributory Key Agreement. IEEE Trans. Parallel Distributed Syst. 15(5): 468-480 (2004) - [c9]Cristina Nita-Rotaru, Ninghui Li:
A Framework for Role-Based Access Control in Group Communication Systems. PDCS 2004: 522-529 - [c8]Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-Rotaru:
JANUS: towards robust and malicious resilient routing in hybrid wireless networks. Workshop on Wireless Security 2004: 11-20 - 2003
- [c7]Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik:
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer. DISCEX (1) 2003: 226-237 - 2002
- [c6]Giuseppe Ateniese, Cristina Nita-Rotaru:
Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption. CT-RSA 2002: 182-199 - [c5]Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik:
On the Performance of Group Key Agreement Protocols. ICDCS 2002: 463-464 - [c4]Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru, Herbert Rubens:
An on-demand secure routing protocol resilient to byzantine failures. Workshop on Wireless Security 2002: 21-30 - 2001
- [c3]Yair Amir, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Yongdae Kim, Gene Tsudik:
Exploring Robustness in Group Key Agreement. ICDCS 2001: 399-408 - [c2]Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton:
Framework for Authentication and Access Control of Client-Server Group Communication Systems. Networked Group Communication 2001: 128-140 - 2000
- [c1]Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese
, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik:
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. ICDCS 2000: 330-343
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-13 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint