Publications
Journals
|
Towards verifiable web-based code review systems
In Journal of Computer Security, Vol. 31, No. 2, pp. 153-184, 2023
(with Hammad Afzali, Santiago Torres-Arias, and Justin Cappos)
|
Cloud Computing Security: Foundations and Research Directions
In Foundations and Trends in Privacy and Security, Vol. 3, Issue 2, 2022
(with Anrin Chakraborti, Jonathan Katz, Jason Nieh, Ahmad-Reza Sadeghi, Radu Sion, and Yinqian Zhang)
|
DFPS: A Distributed Mobile System for Free Parking Assignment
In IEEE Transactions on Mobile Computing, Vol. 21, Issue 12, 2021
(with Abeer Hakim, Xiaoning Ding, and Cristian Borcea)
|
Towards Adding Verifiability to Web-based Git Repositories
In Journal of Computer Security, Vol. 28, No. 4, pp. 405-436, 2020
(with Hammad Afzali, Santiago Torres-Arias, and Justin Cappos)
|
Dynamic Interior Point Method for Vehicular Traffic Optimization
In IEEE Transactions on Vehicular Technology, Vol. 69, No. 5, May 2020
(with Chang Guo, Demin Li, Guanglin Zhang, Xiaoning Ding, and Cristian Borcea)
|
Design and Implementation of an Overlay File System for Cloud-Assisted Mobile Apps
In IEEE Transactions on Cloud Computing, Vol. 8, No. 1, March 2020
(with Nafize R. Paiker, Jianchen Shan, Cristian Borcea, Narain Gehani, and Xiaoning Ding)
|
The Moitree Middleware for Distributed Mobile-Cloud Computing
In Elsevier Journal of Systems and Software, Volume 157, 2019
(with Hillol Debnath, Mohammad A. Khan, Nafize R. Paiker, Xiaoning Ding, Narain Gehani, and Cristian Borcea)
|
Remote data integrity checking with server-side repair
In Journal of Computer Security (JCS), Vol. 25, No. 6, 2017
(with Bo Chen)
|
Crowdsensing in the Wild with Aliens and Micro-payments
In IEEE Pervasive Computing, Volume 15, Number 1, January-March 2016
(with Manoop Talasila and Cristian Borcea)
|
Collaborative Bluetooth-based Location Authentication on Smart Phones
In Elsevier Pervasive and Mobile Computing Journal, Volume 17, February 2015
(with Manoop Talasila and Cristian Borcea)
|
Fostering ParticipAction in Smart Cities: A Geo-Social CrowdSensing Platform
In IEEE Communications Magazine, Special Issue on Smart Cities, Vol. 51, No. 6, 2013
(with Giuseppe Cardone, Luca Foschini, Cristian Borcea, Paolo Bellavista, Antonio Corradi, and Manoop Talasila)
|
ILR: Improving Location Reliability in Mobile Crowd Sensing
In International Journal of Business Data Communications and Networking, Vol. 9, No. 4, 2013,
(with Manoop Talasila and Cristian Borcea)
|
Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems
In IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 9, Issue 5, 2012
(with Jing Dong,
Cristina Nita-Rotaru, and
David Yau)
|
Searchable symmetric encryption: Improved definitions and efficient constructions
In Journal of Computer Security (JCS), Volume 19, Issue 5, 2011
(with Juan Garay,
Seny Kamara and
Rafail Ostrovsky)
|
Remote Data Checking Using Provable Data Possession
In ACM Transactions on Information and System Security (TISSEC), Volume 14, Issue 1, 2011
(with
Giuseppe Ateniese,
Randal Burns,
Joseph Herring, Osama Khan, Lea Kissner,
Zachary Peterson, and
Dawn Song)
|
Practical Defenses Against Pollution Attacks in Wireless Network Coding
In ACM Transactions on Information and System Security (TISSEC), Volume 14, Issue 1, 2011
(with
Jing Dong and
Cristina Nita-Rotaru)
|
Secure High-Throughput Multicast Routing in Wireless Mesh Networks
In IEEE Transactions on Mobile Computing (TMC), Volume 10, Issue 5, 2011
(with
Jing Dong and
Cristina Nita-Rotaru)
|
Secure Network Coding for Wireless Mesh Networks: Threats, Challenges, and Directions
In Elsevier Computer Communications, Volume 32, Issue 17, 2009
(with
Jing Dong and
Cristina Nita-Rotaru)
|
BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks
In IEEE Transactions on Mobile Computing (TMC), Volume 8, Issue 4, 2009
(with
Cristina Nita-Rotaru)
|
ODSBR: An On-Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks
In ACM Transactions on Information and System Security (TISSEC), Volume 10, Issue 4, 2007
(with
Baruch Awerbuch,
David Holmer,
Cristina Nita-Rotaru and
Herbert Rubens)
Available files:
|
Conferences and Workshops
|
Rethinking Trust in Forge-Based Git Security
To appear in Proc. of the Network and Distributed System Security (NDSS) Symposium
(NDSS 2025)
(NDSS '25), San Diego, February 2025
(with Adithya Sirish A Yelgundhalli, Patrick Zielinski, and Justin Cappos)
|
Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses
Proc. of the 31st USENIX Security Symposium
(USENIX Security '22),
Boston, MA, August 2022
(with Mojtaba Zaheri and Yossi Oren)
|
Bootstrapping Trust in Community Repository Projects
Proc. of The 18th EAI International Conference on Security and Privacy in Communication Networks
(SecureComm '22), Kansas City, MO, October 2022
(with Sangat Vaidya, Santiago Torres-Arias, and Justin Cappos)
|
Leakuidator: Leaky resource attacks and countermeasures
Proc. of The 17th EAI International Conference on Security and Privacy in Communication Networks
(SecureComm '21), September 2021
(with Mojtaba Zaheri)
|
in-toto: Providing farm-to-table guarantees for bits and bytes
Proc. of The 28th USENIX Security Symposium
(USENIX Security '19), Santa Clara, CA, August 2019
(with Santiago Torres-Arias, Hammad Afzali, Trishank Karthik Kuppusamy, and Justin Cappos)
|
Auditable Compressed Storage
Proc. of the 22nd Information Security Conference
(ISC '19), New York, NY, September 2019
(with Iraklis Leontiadis)
|
Multi-Destination Vehicular Route Planning with Parking and Traffic Constraints
Proc. of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
(Mobiquitous '19), Houston, TX, November 2019
(with Abeer Hakeem, Narain Gehani, Xiaoning Ding, and Cristian Borcea)
|
Commit Signatures for Centralized Version Control Systems
Proc. of The 34th International Conference on ICT Systems Security and Privacy Protection
(IFIP SEC '19), Lisbon, Portugal, June 2019
(with Sangat Vaidya, Santiago Torres-Arias, and Justin Cappos)
|
le-git-imate: Towards Verifiable Web-based Git Repositories
Proc. of The 13th ACM Asia Conference on Computer & Communications Security
(ACM ASIACCS '18), Songdo, Incheon, Korea, June 2018
(with Hammad Afzali, Santiago Torres-Arias, and Justin Cappos)
|
Sentio: Distributed Sensor Virtualization for Mobile Apps
Proc. of the IEEE International Conference on Pervasive Computing and Communication
(PerCom '18), Athens, Greece, March 2018
(with Hillol Debnath, Narain Gehani, Xiaoning Ding, and Cristian Borcea)
|
Secure Storage with Replication and Transparent Deduplication
Proc. of The 8th ACM Conference on Data and Application Security and Privacy
(CODASPY '18), Tempe, AZ, March 2018
(with Iraklis Leontiadis)
|
Context-Aware File Discovery System for Distributed Mobile-Cloud Apps
Proc. of The 10th IEEE International Conference on Cloud Computing Technology and Science
(CloudCom '18), Nicosia, Cyprus, December 2018
(with Nafize Paiker, Xiaoning Ding, and Cristian Borcea)
|
Collaborative Offloading for Distributed Mobile-Cloud Apps
Proc. of The 6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
(MobileCloud '18), Bamberg, Germany, March 2018
(with Hillol Debnath, Giacomo Gezzi, Antonio Corradi, Narain Gehani, Xiaoning Ding, and Cristian Borcea)
|
Cooperative System for Free Parking Assignment
Proc. of the IEEE Vehicular Networking Conference
(VNC '17), Torino, Italy, November 2017
(with Abeer Hakeem, Narain Gehani, Xiaoning Ding, and Cristian Borcea)
|
On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering
That (Re)introduces Software Vulnerabilities
Proc. of The 25th USENIX Security Symposium
(USENIX Security '16), Austin, TX, August 2016
(with Santiago Torres-Arias, Anil Ammula, and Justin Cappos)
|
On-The-Fly Curbside Parking Assignment
Proc. of The 8th EAI International Conference on Mobile Computing, Applications and Services
(MobiCase '16), Cambridge, Great Britain, December 2016
(with Abeer Hakeem, Narain Gehani, Xiaoning Ding, and Cristian Borcea)
|
FaceDate: A Mobile Cloud Computing App for People Matching
Proc. of The 7th International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications
(MobilWare '16), Turin, Italy, December 2016
(with Pradyumna Neog, Hillol Debnath, Jianchen Shan, Nafize Paiker, Narain Gehani, Xiaoning Ding, and Cristian Borcea)
|
P2F2: Privacy-Preserving Face Finder
Proc. of The 37th IEEE Sarnoff Symposium
(Sarnoff '16), Newark, NJ, September 2016
(with Nora Almalki, Xiaoning Ding, Narain Gehani, and Cristian Borcea)
|
An Overlay File System for Cloud-Assisted Mobile Applications
Proc. of The 32nd International Conference on Massive Storage Systems and Technology
(MSST '16), Santa Clara, CA, May 2016
(with Jianchen Shan, Nafize R. Paiker, Xiaoning Ding, Narain Gehani, and Cristian Borcea)
|
Indexing Multimedia Learning Materials in Ultimate Course Search
Proc. of The 14th International Workshop on Content-Based Multimedia Indexing
(CBMI '16), Bucharest, Romania, May 2016
(with Sheetal Rajgure, Vincent Oria, Pierre Gouton, Edina Renfro-Michel and Krithika Raghavan)
|
Moitree: A Middleware for Cloud-Assisted Mobile Distributed Apps
Proc. of The 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
(MobileCloud '16), Oxford, United Kingdom, March 2016
(with Mohammad A. Khan, Hillol Debnath, Nafize R. Paiker, Narain Gehani, Xiaoning Ding, and Cristian Borcea)
|
Avatar: Mobile Distributed Computing in the Cloud
Proc. of The 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
(MobileCloud '15), San Francisco, CA, March 2015
(with Cristian Borcea, Xiaoning Ding,
Narain Gehani, Mohammad A. Khan, and Hillol Debnath)
|
Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems
Proc. of The Fifth ACM Conference on Data and Application Security and Privacy
(CODASPY '15), San Antonio, TX, March 2015
(with Bo Chen and Anil Kumar Ammula)
|
Alien vs. Mobile User Game: Fast and Efficient Area Coverage in Crowdsensing
Proc. of The 6th International Conference on Mobile Computing, Applications and Services
(MobiCASE '14), Austin, TX, November 2014
(with Manoop Talasila and Cristian Borcea)
|
Auditable Version Control Systems
Proc. of The 21st ISOC Annual Network & Distributed System Security Symposium
(NDSS '14), San Diego, CA, February 2014
(with Bo Chen)
|
Cloud Computing for Education: A Professional Development Program for High School Teachers
Proc. of The 2014 ASEE Annual Conference
(ASEE AC 2014), Indianapolis, IN, June 2014
(with John Carpinelli, Linda Hirsch, Howard S. Kimmel, and Levelle Burr-Alexander)
|
Improving Location Reliability in Crowd Sensed Data with Minimal Efforts
Proc. of The Sixth Joint IFIP/IEEE Wireless and Mobile Networking Conference
(WMNC '13), Dubai, April 2013
(with Manoop Talasila and Cristian Borcea)
|
Towards Self-Repairing Replication-Based Storage Systems Using Untrusted Clouds
(Outstanding Paper Award)
Proc. of The Third ACM Conference on Data and Application Security and Privacy
(CODASPY '13), San Antonio, TX, February 2013
(with Bo Chen)
|
Entropy Attacks and Countermeasures in Wireless Network Coding
Proc. of The Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks
(WiSec 2012), Tucson, AZ, April 2012
(with Andrew Newell and
Cristina Nita-Rotaru)
|
Robust Dynamic Provable Data Possession
The Third IEEE International Workshop on Security and Privacy in Cloud Computing
(SPCC '12), Macau, China, June 2012
(in conjunction with ICDCS 2012)
(the full version of the paper is available as a Technical Report)
(with Bo Chen)
|
LINK: Location verification through Immediate Neighbors Knowledge
Proc. of The 7th International ICST Conference on Mobile and Ubiquituous Systems
(MobiQuitous '10), Sydney, Australia, December 2010
(with Manoop Talasila and Cristian Borcea)
|
Remote Data Checking for Network Coding-based Distributed Storage Systems
The Second ACM Cloud Computing Security Workshop
(CCSW '10), Chicago, IL, October 2010 (in conjunction with CCS 2010)
(with Bo Chen, Giuseppe Ateniese, and Randal Burns)
|
Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems
The Third IEEE Wireless Network Coding Workshop
(WiNC 2010), Boston, MA, June 2010 (in conjunction with SECON 2010)
(with Jing Dong and
Cristina Nita-Rotaru)
|
Tradeoffs between Security and Communication Performance in Wireless Mesh Networks
The First International Workshop on Data Security and PrivAcy in wireless Networks
(D-SPAN 2010), Montreal, Canada, June 2010 (in conjunction with WoWMoM 2010)
(with Jing Dong and
Cristina Nita-Rotaru)
|
Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks
Proc. of The Second ACM Conference on Wireless Network Security
(WiSec 2009), Zurich, Switzerland, March 2009
(with Jing Dong and
Cristina Nita-Rotaru)
|
Robust Remote Data Checking
The Fourth ACM International Workshop on Storage Security and Survivability
(StorageSS 2008), Alexandria, VA, October 2008 (in conjunction with CCS 2008)
(with Osama Khan and Randal Burns)
|
Toward Secure Network Coding in Wireless Networks: Threats and Challenges
The Fourth IEEE Workshop on Secure Network Protocols
(NPSec 2008), Orlando, FL, October 2008 (in conjunction with ICNP 2008)
(with Jing Dong,
Ruben Sethi, and
Cristina Nita-Rotaru)
|
MR. PDP: Multiple-Replica Provable Data Possession
Proc. of The 28th IEEE International Conference on Distributed Computing Systems
(ICDCS '08), Beijing, China, June 2008
(with Osama Khan, Randal Burns and
Giuseppe Ateniese)
Available files:
|
On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks
Proc. of The Fifth IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks
(SECON '08), San Francisco, CA, June 2008
(with Jing Dong and
Cristina Nita-Rotaru)
Conference proceedings version:
|
Provable Data Possession at Untrusted Stores
Proc. of The 14th ACM Conference on Computer and Communications Security
(CCS '07), Alexandria, VA, October 2007
(with Randal Burns,
Giuseppe Ateniese,
Joseph Herring, Lea Kissner,
Zachary Peterson and
Dawn Song)
Full version available as IACR ePrint report 2007/202
|
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks
Proc. of The Fourth IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks
(SECON '07), San Diego, CA, June 2007
(with Cristina Nita-Rotaru)
Conference proceedings version:
|
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions
Proc. of The 13th ACM Conference on Computer and Communications Security
(CCS '06), Alexandria, VA, October 2006
(with Juan Garay,
Seny Kamara and
Rafail Ostrovsky)
Full version available as IACR ePrint report 2006/210
|
A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks
The Second Workshop on Cryptography for Ad Hoc Networks
(WCAN 2006), Venice (Italy), July 2006 (in conjunction with ICALP 2006)
(published in Electronic Notes in Theoretical Computer Science (ENTCS), Vol. 171, Issue 1, April 2007)
(with
Seny Kamara)
Available files:
|
On the Performance and Analysis of DNS Security Extensions
Proc of The Fourth International Conference on Cryptology and Network Security
(CANS 2005), Xiamen (China), December 2005; LNCS of Springer-Verlag
(with
Giuseppe Ateniese and
Aniello del Sorbo)
Available files:
|
On the Survivability of Routing Protocols in Ad Hoc Wireless Networks
(or how to secure routing protocols for ad hoc wireless networks
against Byzantine attacks)
Proc of The First IEEE Conference on Security and Privacy in Communication Networks
(SecureComm '05), Athens (Greece), September 2005
(with
Baruch Awerbuch,
David Holmer,
Cristina Nita-Rotaru and
Herbert Rubens)
Available files:
Byzantine attack module for ns2
|
Secure Multi-Hop Infrastructure Access
in
NDSS 2005 Wireless and Mobile Security Workshop, San Diego, February 2005
(with
Baruch Awerbuch,
David Holmer,
Cristina Nita-Rotaru and
Herbert Rubens)
Available files:
|
ODSBR: An On-Demand Secure Byzantine Routing Protocol
Technical Report, October 2003.
(with
Baruch Awerbuch,
David Holmer,
Cristina Nita-Rotaru and
Herbert Rubens)
Available files:
|
Medical Information Privacy Assurance: Cryptographic and System Aspects
Proc. of The Third Conference on Security in Communication Networks
(SCN 02), Amalfi (Italy), September 2002; LNCS of Springer-Verlag
(with
Giuseppe Ateniese and
Breno de Medeiros)
Available files:
|
|
|