What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Cristina Nita-Rotaru
Google Scholar
47
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiaccs
Runtime Stealthy Perception Attacks against DNN-based Adaptive Cruise Control Systems.
Xugui Zhou
Anqi Chen
Maxfield Kouzel
Haotian Ren
Morgan McCarty
Cristina Nita-Rotaru
Homa Alemzadeh
2024
conf/ccs
Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups.
Christof Ferreira Torres
Albin Mamuti
Ben Weintraub
Cristina Nita-Rotaru
Shweta Shinde
2024
conf/ccs
Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based Networking.
Ben Weintraub
Jiwon Kim
Ran Tao
Cristina Nita-Rotaru
Hamed Okhravi
Dave (Jing) Tian
Benjamin E. Ujcich
2024
conf/ccs
Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network.
Ben Weintraub
Satwik Prabhu Kumble
Cristina Nita-Rotaru
Stefanie Roos
2024
conf/uss
A Formal Analysis of SCTP: Attack Synthesis and Patch Verification.
Jacob Ginesin
Max von Hippel
Evan Defloor
Cristina Nita-Rotaru
Michael Tüxen
2024
conf/sp
Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers.
Ankit Kumar
Max von Hippel
Panagiotis Manolios
Cristina Nita-Rotaru
2022
conf/ccs
Dynamic Security with SDN: Opportunities, Challenges, and Lessons Learned.
Cristina Nita-Rotaru
2022
conf/ccs
On Randomization in MTD Systems.
Majid Ghaderi
Samuel Jero
Cristina Nita-Rotaru
Reihaneh Safavi-Naini
2022
conf/sp
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.
Maria Leonor Pacheco
Max von Hippel
Ben Weintraub
Dan Goldwasser
Cristina Nita-Rotaru
2022
conf/sp
ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing.
Kyle Hogan
Sacha Servan-Schreiber
Zachary Newman
Ben Weintraub
Cristina Nita-Rotaru
Srinivas Devadas
2022
conf/cns
Network-Level Adversaries in Federated Learning.
Giorgio Severi
Matthew Jagielski
Gökberk Yar
Yuxuan Wang
Alina Oprea
Cristina Nita-Rotaru
2022
conf/cns
Securing Communication Against Leaky Switches.
Leila Rashidi
Sogand SadrHaghighi
Majid Ghaderi
Cristina Nita-Rotaru
Reihaneh Safavi-Naini
2022
conf/dsn
Alternative Route-Based Attacks in Metropolitan Traffic Systems.
Sidney La Fontaine
Naveen Muralidhar
Michael Clifford
Tina Eliassi-Rad
Cristina Nita-Rotaru
2021
journals/joc
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC.
Shan Chen
Samuel Jero
Matthew Jagielski
Alexandra Boldyreva
Cristina Nita-Rotaru
2021
conf/fc
Under the Hood of the Ethereum Gossip Protocol.
Lucianna Kiffer
Asad Salman
Dave Levin
Alan Mislove
Cristina Nita-Rotaru
2021
conf/eurosp
Structural Attacks on Local Routing in Payment Channel Networks.
Ben Weintraub
Cristina Nita-Rotaru
2021
conf/cns
SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay.
Lucian Trestioreanu
Cristina Nita-Rotaru
Aanchal Malhotra
Radu State
2021
conf/ndss
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes.
Leila Rashidi
Daniel Kostecki
Alexander James
Anthony Peterson
Majid Ghaderi
Samuel Jero
Cristina Nita-Rotaru
Hamed Okhravi
Reihaneh Safavi-Naini
2019
conf/uss
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks.
Ambra Demontis
Marco Melis
Maura Pintor
Matthew Jagielski
Battista Biggio
Alina Oprea
Cristina Nita-Rotaru
Fabio Roli
2019
conf/sp
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications.
Sean Rivera
Sofiane Lagraa
Cristina Nita-Rotaru
Sheila Becker
Radu State
2019
conf/sp
Are Self-Driving Cars Secure? Evasion Attacks Against Deep Neural Networks for Steering Angle Prediction.
Alesia Chernikova
Alina Oprea
Cristina Nita-Rotaru
BaekGyu Kim
2019
conf/esorics
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC.
Shan Chen
Samuel Jero
Matthew Jagielski
Alexandra Boldyreva
Cristina Nita-Rotaru
2018
conf/ccs
Cross-App Poisoning in Software-Defined Networking.
Benjamin E. Ujcich
Samuel Jero
Anne Edmundson
Qi Wang
Richard Skowyra
James Landry
Adam Bates
William H. Sanders
Cristina Nita-Rotaru
Hamed Okhravi
2018
conf/ccs
The House That Knows You: User Authentication Based on IoT Data.
Talha Ongun
Alina Oprea
Cristina Nita-Rotaru
Mihai Christodorescu
Negin Salajegheh
2018
conf/sp
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning.
Matthew Jagielski
Alina Oprea
Battista Biggio
Chang Liu
Cristina Nita-Rotaru
Bo Li
2018
conf/ndss
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach.
Samuel Jero
Md. Endadul Hoque
David R. Choffnes
Alan Mislove
Cristina Nita-Rotaru
2018
conf/wisec
Threat Detection for Collaborative Adaptive Cruise Control in Connected Cars.
Matthew Jagielski
Nicholas Jones
Chung-Wei Lin
Cristina Nita-Rotaru
Shinichi Shiraishi
2017
conf/uss
Identifier Binding Attacks and Defenses in Software-Defined Networks.
Samuel Jero
William Koch
Richard Skowyra
Hamed Okhravi
Cristina Nita-Rotaru
David Bigelow
2017
conf/sp
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
Sze Yiu Chau
Omar Chowdhury
Md. Endadul Hoque
Huangyi Ge
Aniket Kate
Cristina Nita-Rotaru
Ninghui Li
2017
conf/dsn
Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs.
Md. Endadul Hoque
Omar Chowdhury
Sze Yiu Chau
Cristina Nita-Rotaru
Ninghui Li
2015
conf/ccs
CCSW 2015: The 7th ACM Cloud Computing Security Workshop.
Florian Kerschbaum
Cristina Nita-Rotaru
Indrajit Ray
2015
conf/sp
How Secure and Quick is QUIC? Provable Security and Performance Analyses.
Robert Lychev
Samuel Jero
Alexandra Boldyreva
Cristina Nita-Rotaru
2015
conf/dsn
Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations.
Samuel Jero
Hyojeong Lee
Cristina Nita-Rotaru
2014
conf/ccs
On the Practicality of Integrity Attacks on Document-Level Sentiment Analysis.
Andrew Newell
Rahul Potharaju
Luojie Xiang
Cristina Nita-Rotaru
2013
conf/dsn
Increasing network resiliency by optimally assigning diverse variants to routing nodes.
Andrew Newell
Daniel Obenshain
Thomas Tantillo
Cristina Nita-Rotaru
Yair Amir
2013
conf/wisec
Adversarial testing of wireless routing implementations.
Md. Endadul Hoque
Hyojeong Lee
Rahul Potharaju
Charles E. Killian
Cristina Nita-Rotaru
2012
conf/ccs
Using probabilistic generative models for ranking risks of Android apps.
Hao Peng
Christopher S. Gates
Bhaskar Pratim Sarma
Ninghui Li
Yuan Qi
Rahul Potharaju
Cristina Nita-Rotaru
Ian M. Molloy
2012
conf/ndss
Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems.
Jeff Seibert
Sheila Becker
Cristina Nita-Rotaru
Radu State
2012
conf/ndss
Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems.
Hyojeong Lee
Jeff Seibert
Charles Killian
Cristina Nita-Rotaru
2012
conf/wisec
Entropy attacks and countermeasures in wireless network coding.
Andrew Newell
Reza Curtmola
Cristina Nita-Rotaru
2011
conf/dsn
Applying game theory to analyze attacks and defenses in virtual coordinate systems.
Sheila Becker
Jeff Seibert
David Zage
Cristina Nita-Rotaru
Radu State
2010
conf/ccs
iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networks.
Rahul Potharaju
Bogdan Carbunar
Cristina Nita-Rotaru
2009
conf/wisec
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks.
Jing Dong
Reza Curtmola
Cristina Nita-Rotaru
2008
conf/wisec
Mitigating attacks against virtual coordinate based routing in wireless sensor networks.
Jing Dong
Kurt Erik Ackermann
Brett Bavar
Cristina Nita-Rotaru
2007
conf/ccs
On the accuracy of decentralized virtual coordinate systems in adversarial networks.
David John Zage
Cristina Nita-Rotaru
2006
conf/dsn
Scaling Byzantine Fault-Tolerant Replication toWide Area Networks.
Yair Amir
Claudiu Danilov
Jonathan Kirsch
John Lane
Danny Dolev
Cristina Nita-Rotaru
Josh Olsen
David John Zage
2002
conf/ctrsa
Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption.
Giuseppe Ateniese
Cristina Nita-Rotaru
Coauthors
Aanchal Malhotra
(1)
Adam Bates
(1)
Alan Mislove
(2)
Albin Mamuti
(1)
Alesia Chernikova
(1)
Alexander James
(1)
Alexandra Boldyreva
(3)
Alina Oprea
(5)
Ambra Demontis
(1)
Andrew Newell
(3)
Aniket Kate
(1)
Ankit Kumar
(1)
Anne Edmundson
(1)
Anqi Chen
(1)
Anthony Peterson
(1)
Asad Salman
(1)
BaekGyu Kim
(1)
Battista Biggio
(2)
Ben Weintraub
(6)
Benjamin E. Ujcich
(2)
Bhaskar Pratim Sarma
(1)
Bo Li
(1)
Bogdan Carbunar
(1)
Brett Bavar
(1)
Chang Liu
(1)
Charles E. Killian
(1)
Charles Killian
(1)
Christof Ferreira Torres
(1)
Christopher S. Gates
(1)
Chung-Wei Lin
(1)
Claudiu Danilov
(1)
Cristina Nita-Rotaru
(47)
Dan Goldwasser
(1)
Daniel Kostecki
(1)
Daniel Obenshain
(1)
Danny Dolev
(1)
Dave (Jing) Tian
(1)
Dave Levin
(1)
David Bigelow
(1)
David John Zage
(2)
David R. Choffnes
(1)
David Zage
(1)
Evan Defloor
(1)
Fabio Roli
(1)
Florian Kerschbaum
(1)
Giorgio Severi
(1)
Giuseppe Ateniese
(1)
Gökberk Yar
(1)
Hamed Okhravi
(4)
Hao Peng
(1)
Haotian Ren
(1)
Homa Alemzadeh
(1)
Huangyi Ge
(1)
Hyojeong Lee
(3)
Ian M. Molloy
(1)
Indrajit Ray
(1)
Jacob Ginesin
(1)
James Landry
(1)
Jeff Seibert
(3)
Jing Dong
(2)
Jiwon Kim
(1)
John Lane
(1)
Jonathan Kirsch
(1)
Josh Olsen
(1)
Kurt Erik Ackermann
(1)
Kyle Hogan
(1)
Leila Rashidi
(2)
Lucian Trestioreanu
(1)
Lucianna Kiffer
(1)
Luojie Xiang
(1)
Majid Ghaderi
(3)
Marco Melis
(1)
Maria Leonor Pacheco
(1)
Matthew Jagielski
(6)
Maura Pintor
(1)
Max von Hippel
(3)
Maxfield Kouzel
(1)
Md. Endadul Hoque
(4)
Michael Clifford
(1)
Michael Tüxen
(1)
Mihai Christodorescu
(1)
Morgan McCarty
(1)
Naveen Muralidhar
(1)
Negin Salajegheh
(1)
Nicholas Jones
(1)
Ninghui Li
(3)
Omar Chowdhury
(2)
Panagiotis Manolios
(1)
Qi Wang
(1)
Radu State
(4)
Rahul Potharaju
(4)
Ran Tao
(1)
Reihaneh Safavi-Naini
(3)
Reza Curtmola
(2)
Richard Skowyra
(2)
Robert Lychev
(1)
Sacha Servan-Schreiber
(1)
Samuel Jero
(9)
Satwik Prabhu Kumble
(1)
Sean Rivera
(1)
Shan Chen
(2)
Sheila Becker
(3)
Shinichi Shiraishi
(1)
Shweta Shinde
(1)
Sidney La Fontaine
(1)
Sofiane Lagraa
(1)
Sogand SadrHaghighi
(1)
Srinivas Devadas
(1)
Stefanie Roos
(1)
Sze Yiu Chau
(2)
Talha Ongun
(1)
Thomas Tantillo
(1)
Tina Eliassi-Rad
(1)
William H. Sanders
(1)
William Koch
(1)
Xugui Zhou
(1)
Yair Amir
(2)
Yuan Qi
(1)
Yuxuan Wang
(1)
Zachary Newman
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to