I am an Associate Professor at Northeastern University in the College of Computing and Information Science. I joined Northeastern in Fall 2016. Before that, I was a consultant research scientist at RSA Laboratories, performing research in cloud security, applied cryptography, foundations of cybersecurity, and security analytics. I have successfully transferred research technologies developed at RSA Laboratories into RSA’s products. I am the receipient of the TR35 award for my research in cloud security in 2011.

Publications

Journals and Conferences

  1. [Oakland 2018] Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning.
    Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, and Bo Li
    In Proceedings of the IEEE Symposium on Security and Privacy, 2018.
  2. [PSBD 2017] User-Profile-Based Analytics for Detecting Cloud Security Breaches.
    Trishita Tiwari, Ata Turk, Alina Oprea, Katzalin Olcoz, and Ayse K. Coskun
    In Proceedings of the 4th International Workshop on Privacy and Security of Big Data (PSBD), 2017. [PDF]
  3. [AISEC 2017] Robust Linear Regression Against Training Data Poisoning.
    Chang Liu, Bo Li, Yevgeniy Vorobeychik, and Alina Oprea.
    In Proceedings of 10th ACM Workshop on Artificial Intelligence and Security (AISEC), 2017. Best paper award. [PDF]
  4. [RAID 2017] Lens on the endpoint: Hunting for malicious software through endpoint data analysis.
    Ahmet Buyukkayhan, Alina Oprea, Zhou Li, and William Robertson.
    In Proceedings of Recent Advances in Intrusion Detection (RAID), 2017 [PDF]
  5. [ACSAC 2016] Catching Predators at Watering Holes: Finding and Understanding Strategically Compromised Websites.
    Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Xiaojing Liao, Alina Oprea, Xiaofeng Wang and Zhou Li
    In Proceedings of Annual Computer Security Applications Conference (ACSAC), 2016 [PDF]
  6. [SecDev 2016] Operational security log analytics for enterprise breach detection.
    Zhou Li and Alina Oprea
    In Proceedings of the First IEEE Cybersecurity Development Conference (SecDev), 2016 [PDF]
  7. [SecDev 2016] MOSAIC: A Platform for Monitoring and Anomaly Detection in Cloud Computing.
    Alina Oprea, Ata Turk, Cristina Nita-Rotaru and Orran Krieger
    In First IEEE Cybersecurity Development Conference (SecDev), 2016. Short paper. [PDF]
  8. [DSN 2015] Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data.
    Alina Oprea, Zhou Li, Ting-Fang Yen, Sang H. Chin, and Sumyah Alrwais
    In Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2015 [PDF]
  9. [CCS 2014] An Epidemiological Study of Malware Encounters in a Large Enterprise.
    Ting-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, and Ari Juels
    In Proceedings of ACM Conference on Computer and Communications Security (CCS), 2014 [PDF]
  10. [ACSAC 2013] Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks.
    Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William Robertson, Ari Juels, and Engin Kirda
    In Proceedings of Annual Computer Security Applications Conference (ACSAC), 2013 [PDF]
  11. [Journal of Cryptology 2013] FlipIt: The Game of Stealthy Takeover.
    Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest
    In Journal of Cryptology, volume 26, issue 4, pages 655-713, 2013 [PDF]
  12. [CACM 2013] New Approaches to Security and Availability for Cloud Data.
    Ari Juels and Alina Oprea
    In Communications of the ACM (CACM) volume 56, issue 2, pages 64-73, 2013 [PDF]
  13. [ACSAC 2012] Iris: A Scalable Cloud File System with Efficient Integrity Checks.
    Emil Stefanov, Marten van Dijk, Alina Oprea, and Ari Juels
    In Proceedings of Annual Computer Security Applications Conference (ACSAC) , 2013 [PDF]
  14. [CCS 2012] Hourglass Schemes: How to Prove that Cloud Files Are Encrypted.
    Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest, Emil Stefanov, and Nikos Triandopoulos
    In Proceedings of ACM Conference on Computer and Communications Security (CCS), 2012 [PDF]
  15. [GameSec 2012] Defending Against the Unknown Enemy: Applying FlipIt to System Security.
    Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, and Nikos Triandopoulos
    In Proceedings of Conference on Decision and Game Theory for Security (GameSec), 2012 [PDF]
  16. [DSN 2012] Practical Scrubbing: Getting to the Bad Sector at the Right Time.
    George Amvrosiadis, Bianca Schroeder, and Alina Oprea
    In Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2012 [PDF]
  17. [ACM ToS 2012] Efficient Implementation of Large Finite Fields GF(2^n) for Secure Storage Applications.
    Jianqiang Luo, Kevin D. Bowers, Alina Oprea, and Lihao Xu
    In ACM Transactions on Storage, volume 8, issue 1, pages 1-27, 2012 [PDF]
  18. [CCS 2011] How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes.
    Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest
    In Proceedings of ACM Conference on Computer and Communications Security (CCS), 2011 [PDF]
  19. [S&P 2011] HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis.
    Yinqian Zhang, Ari Juels, Alina Oprea, and Michael K. Reiter
    In Proceedings of IEEE Symposium on Security and Privacy (Oakland), 2011 [PDF]
  20. [FAST 2010] A Clean-Slate Look at Disk Scrubbing.
    Alina Oprea and Ari Juels
    In Proceedings of USENIX Conference on File and Storage Technologies (FAST), 2010 [PDF]
  21. [CCS 2009] HAIL: A High-Availability and Integrity Layer for Cloud Storage.
    Kevin D. Bowers, Ari Juels, and Alina Oprea
    In Proceedings of ACM Conference on Computer and Communications Security (CCS), 2009 [PDF]
  22. [CCSW 2009] Proofs of Retrievability: Theory and Implementation.
    Kevin D. Bowers, Ari Juels, and Alina Oprea
    In Proceedings of ACM Cloud Computing Security Workshop (CCSW), [PDF]
  23. [ESORICS 2009] Authentic Time-Stamps for Archival Storage.
    Alina Oprea and Kevin D. Bowers
    In Proceedings of European Symposium on Research in Computer Security (ESORICS), 2009 [PDF]
  24. [USENIX Security 2007] Integrity Checking in Cryptographic File Systems with Constant Trusted Storage.
    Alina Oprea and Michael K. Reiter
    In Proceedings of USENIX Security Symposium (SECURITY), 2007
  25. [DISC 2006] On Consistency of Encrypted Files.
    Alina Oprea and Michael K. Reiter
    In Proceedings of Symposium on Distributed Computing (DISC), 2006
  26. [ESORICS 2006] Secure Key-Updating for Lazy Revocation.
    Michael Backes, Christian Cachin, and Alina Oprea
    In Proceedings of European Symposium on Research in Computer Security (ESORICS), 2009
  27. [SISW 2005] Lazy Revocation in Cryptographic File Systems.
    Michael Backes, Christian Cachin, and Alina Oprea
    In Proceedings of IEEE Security in Storage Workshop (SISW), 2005
  28. [NDSS 2005] Space-Efficient Block Storage Integrity.
    Alina Oprea, Michael K. Reiter, and Ke Yang
    In Proceedings of Network and Distributed System Security Symposium (NDSS), 2005. Best paper award.
  29. [ACSAC 2004] Securing a Remote Terminal Application with a Mobile Trusted Device.
    Alina Oprea, Dirk Balfanz, Glenn Durfee, and Diana K. Smetters
    In Proceedings of Annual Computer Security Applications Conference (ACSAC), 2004
  30. [ACNS 2004] Private Keyword-Based Push and Pull with Applications to Anonymous Communication.
    Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Song, and Ke Yang
    In Proceedings of Applied Cryptography and Network Security Conference (ACNS), 2004
  31. [CCS 2003] Automatic Generation of Two-Party Computations.
    Philip MacKenzie, Alina Oprea, and Michael K. Reiter
    In Proceedings of ACM Conference on Computer and Communications Security (CCS), 2003
Theses

  1. [Ph.D. Thesis 2007] Efficient Cryptographic Techniques for Securing Storage Systems.
    Alina Oprea
    Carnegie Mellon University, Technical Report CMU-CS-07-119, May 2007
Other

  1. Robust High-Dimensional Linear Regression.
    Chang Liu, Bo Li, Yevgeniy Vorobeychik, and Alina Oprea
    arXiv:1608.02257, 2016
  2. [Security Brief 2011] Mobilizing Intelligent Security Operations for Advanced Persistent Threats.
    Sam Curry, Bret Hartman, David P. Hunter, David Martin, Dennis R. Moreau, Alina Oprea, Uri Rivner, and Dana E. Wolf
    RSA Security Brief, February 2011