I am an Associate Professor at Northeastern University in the College of Computing and Information Science. I joined Northeastern in Fall 2016. Before that, I was a consultant research scientist at RSA Laboratories, performing research in cloud security, applied cryptography, foundations of cybersecurity, and security analytics. I have successfully transferred research technologies developed at RSA Laboratories into RSA’s products. I am the receipient of the TR35 award for my research in cloud security in 2011.

Publications

Manuscripts

  1. Robust High-Dimensional Linear Regression
    Chang Liu, Bo Li, Yevgeniy Vorobeychik, and Alina Oprea
    arXiv:1608.02257, 2016
Journals and Conferences

  1. [RAID 2017] Lens on the endpoint: Hunting for malicious software through endpoint data analysis.
    Ahmet Buyukkayhan, Alina Oprea, Zhou Li, and William Robertson.
    In Proceedings of Recent Advances in Intrusion Detection (RAID), 2017 [PDF]
  2. [ACSAC 2016] Catching Predators at Watering Holes: Finding and Understanding Strategically Compromised Websites
    Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Xiaojing Liao, Alina Oprea, Xiaofeng Wang and Zhou Li
    In Proceedings of Annual Computer Security Applications Conference (ACSAC), 2016 [PDF]
  3. [SecDev 2016] Operational security log analytics for enterprise breach detection
    Zhou Li and Alina Oprea
    In Proceedings of the First IEEE Cybersecurity Development Conference (SecDev), 2016 [PDF]
  4. [SecDev 2016] MOSAIC: A Platform for Monitoring and Anomaly Detection in Cloud Computing
    Alina Oprea, Ata Turk, Cristina Nita-Rotaru and Orran Krieger
    In First IEEE Cybersecurity Development Conference (SecDev), 2016. Short paper. [PDF]
  5. [DSN 2015] Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data
    Alina Oprea, Zhou Li, Ting-Fang Yen, Sang H. Chin, and Sumyah Alrwais
    In Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2015 [PDF]
  6. [CCS 2014] An Epidemiological Study of Malware Encounters in a Large Enterprise
    Ting-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, and Ari Juels
    In Proceedings of ACM Conference on Computer and Communications Security (CCS), 2014 [PDF]
  7. [ACSAC 2013] Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks
    Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William Robertson, Ari Juels, and Engin Kirda
    In Proceedings of Annual Computer Security Applications Conference (ACSAC), 2013 [PDF]
  8. [Journal of Cryptology 2013] FlipIt: The Game of Stealthy Takeover
    Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest
    In Journal of Cryptology, volume 26, issue 4, pages 655-713, 2013 [PDF]
  9. [CACM 2013] New Approaches to Security and Availability for Cloud Data
    Ari Juels and Alina Oprea
    In Communications of the ACM (CACM) volume 56, issue 2, pages 64-73, 2013 [PDF]
  10. [ACSAC 2012] Iris: A Scalable Cloud File System with Efficient Integrity Checks
    Emil Stefanov, Marten van Dijk, Alina Oprea, and Ari Juels
    In Proceedings of Annual Computer Security Applications Conference (ACSAC) , 2013 [PDF]
  11. [CCS 2012] Hourglass Schemes: How to Prove that Cloud Files Are Encrypted
    Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest, Emil Stefanov, and Nikos Triandopoulos
    In Proceedings of ACM Conference on Computer and Communications Security (CCS), 2012 [PDF]
  12. [GameSec 2012] Defending Against the Unknown Enemy: Applying FlipIt to System Security
    Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, and Nikos Triandopoulos
    In Proceedings of Conference on Decision and Game Theory for Security (GameSec), 2012 [PDF]
  13. [DSN 2012] Practical Scrubbing: Getting to the Bad Sector at the Right Time
    George Amvrosiadis, Bianca Schroeder, and Alina Oprea
    In Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2012 [PDF]
  14. [ACM ToS 2012] Efficient Implementation of Large Finite Fields GF(2^n) for Secure Storage Applications
    Jianqiang Luo, Kevin D. Bowers, Alina Oprea, and Lihao Xu
    In ACM Transactions on Storage, volume 8, issue 1, pages 1-27, 2012 [PDF]
  15. [CCS 2011] How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes
    Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest
    In Proceedings of ACM Conference on Computer and Communications Security (CCS), 2011 [PDF]
  16. [S&P 2011] HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis
    Yinqian Zhang, Ari Juels, Alina Oprea, and Michael K. Reiter
    In Proceedings of IEEE Symposium on Security and Privacy (Oakland), 2011 [PDF]
  17. [FAST 2010] A Clean-Slate Look at Disk Scrubbing
    Alina Oprea and Ari Juels
    In Proceedings of USENIX Conference on File and Storage Technologies (FAST), 2010 [PDF]
  18. [CCS 2009] HAIL: A High-Availability and Integrity Layer for Cloud Storage
    Kevin D. Bowers, Ari Juels, and Alina Oprea
    In Proceedings of ACM Conference on Computer and Communications Security (CCS), 2009 [PDF]
  19. [CCSW 2009] Proofs of Retrievability: Theory and Implementation
    Kevin D. Bowers, Ari Juels, and Alina Oprea
    In Proceedings of ACM Cloud Computing Security Workshop (CCSW), [PDF]
  20. [ESORICS 2009] Authentic Time-Stamps for Archival Storage
    Alina Oprea and Kevin D. Bowers
    In Proceedings of European Symposium on Research in Computer Security (ESORICS), 2009 [PDF]
  21. [USENIX Security 2007] Integrity Checking in Cryptographic File Systems with Constant Trusted Storage
    Alina Oprea and Michael K. Reiter
    In Proceedings of USENIX Security Symposium (SECURITY), 2007
  22. [DISC 2006] On Consistency of Encrypted Files
    Alina Oprea and Michael K. Reiter
    In Proceedings of Symposium on Distributed Computing (DISC), 2006
  23. [ESORICS 2006] Secure Key-Updating for Lazy Revocation
    Michael Backes, Christian Cachin, and Alina Oprea
    In Proceedings of European Symposium on Research in Computer Security (ESORICS), 2009
  24. [SISW 2005] Lazy Revocation in Cryptographic File Systems
    Michael Backes, Christian Cachin, and Alina Oprea
    In Proceedings of IEEE Security in Storage Workshop (SISW), 2005
  25. [NDSS 2005] Space-Efficient Block Storage Integrity
    Alina Oprea, Michael K. Reiter, and Ke Yang
    In Proceedings of Network and Distributed System Security Symposium (NDSS), 2005
  26. [ACSAC 2004] Securing a Remote Terminal Application with a Mobile Trusted Device
    Alina Oprea, Dirk Balfanz, Glenn Durfee, and Diana K. Smetters
    In Proceedings of Annual Computer Security Applications Conference (ACSAC), 2004
  27. [ACNS 2004] Private Keyword-Based Push and Pull with Applications to Anonymous Communication
    Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Song, and Ke Yang
    In Proceedings of Applied Cryptography and Network Security Conference (ACNS), 2004
  28. [CCS 2003] Automatic Generation of Two-Party Computations
    Philip MacKenzie, Alina Oprea, and Michael K. Reiter
    In Proceedings of ACM Conference on Computer and Communications Security (CCS), 2003
Theses

  1. [Ph.D. Thesis 2007] Efficient Cryptographic Techniques for Securing Storage Systems
    Alina Oprea
    Carnegie Mellon University, Technical Report CMU-CS-07-119, May 2007
Other

  1. [Security Brief 2011] Mobilizing Intelligent Security Operations for Advanced Persistent Threats
    Sam Curry, Bret Hartman, David P. Hunter, David Martin, Dennis R. Moreau, Alina Oprea, Uri Rivner, and Dana E. Wolf
    RSA Security Brief, February 2011