Dr. Alina Oprea
11 Cambridge Center
Cambridge, MA 02142 USA
Alina Oprea is a Consultant Research Scientist at RSA Laboratories, the security division of EMC. Her research interests span multiple areas in computer and communications security including data analysis for security applications, cloud and storage security, foundations of cybersecurity and detection of advanced attacks. Alina holds a B.S. degree in Mathematics and Computer Science from University of Bucharest, Romania, and has obtained M.Sc. and Ph.D. degrees in Computer Science from Carnegie Mellon University in 2003 and 2007, respectively. She is the recipient of the 2011 TR35 award for her research in cloud security.
Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William Robertson, Ari Juels, and Engin Kirda. Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks. Annual Computer Security Applications Conference (ACSAC) 2013.
Marten van Dijk, Ari Juels, Alina Oprea, and Ron L. Rivest. FlipIt: The Game of Stealthy Takeover. Journal of Cryptology volume 26, issue 4, pages 655-713, 2013.
Ari Juels and Alina Oprea. New Approaches to Security and Availability for Cloud Data. Communications of the ACM (CACM) volume 56, issue 2, pages 64-73, 2013.
Emil Stefanov, Marten van Dijk, Alina Oprea, and Ari Juels. Iris: A Scalable Cloud File System with Efficient Integrity Checks. Annual Computer Security Applications Conference (ACSAC) 2012.
Marten van Dijk, Ari Juels, Alina Oprea, Ron L. Rivest, Emil Stefanov and Nikos Triandopoulos. Hourglass Schemes: How to Prove that Cloud Files Are Encrypted. ACM Conference on Computer and Communications Security (CCS) 2012.
Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ron L. Rivest, and Nikos Triandopoulos. Defending Against the Unknown Enemy: Applying FlipIt to System Security. Conference on Decision and Game Theory for Security (GameSec) 2012.
George Amvrosiadis, Bianca Schroeder, and Alina Oprea. Practical Scrubbing: Getting to the Bad Sector at the Right Time. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2012.
Jianqiang Luo, Kevin D. Bowers, Alina Oprea, and Lihao Xu. Efficient Implementation of Large Finite Fields GF(2^n) for Secure Storage Applications. ACM Transactions on Storage 2012.
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, and Ron L. Rivest. How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes. ACM Conference on Computer and Communications Security (CCS) 2011.
Yinqian Zhang, Ari Juels, Alina Oprea, and Michael K. Reiter. HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis. IEEE Symposium on Security and Privacy (Oakland) 2011.
Alina Oprea and Ari Juels. A Clean-Slate Look at Disk Scrubbing. USENIX Conference on File and Storage Technologies (FAST) 2010.
Kevin D. Bowers, Ari Juels, Alina Oprea. HAIL: A High-Availability and Integrity Layer for Cloud Storage. ACM Conference on Computer and Communications Security (CCS) 2009.
Kevin D. Bowers, Ari Juels, and Alina Oprea. Proofs of Retrievability: Theory and Implementation. ACM Cloud Computing Security Workshop (CCSW) 2009.
Alina Oprea and Kevin D. Bowers. Authentic Time-Stamps for Archival Storage. European Symposium on Research in Computer Security (ESORICS) 2009
Alina Oprea and Michael K. Reiter. Integrity Checking in Cryptographic File Systems with Constant Trusted Storage. USENIX Security Symposium (SECURITY) 2007.
Alina Oprea and Michael K. Reiter. On Consistency of Encrypted Files. Symposium on Distributed Computing (DISC) 2006.
Michael Backes, Christian Cachin, and Alina Oprea. Secure Key-Updating for Lazy Revocation. European Symposium on Research in Computer Security (ESORICS) 2006.
Michael Backes, Christian Cachin, and Alina Oprea. Lazy Revocation in Cryptographic File Systems. IEEE Security in Storage Workshop (SISW) 2005.
Alina Oprea, Michael K. Reiter, and Ke Yang. Space-Efficient Block Storage Integrity. Network and Distributed System Security Symposium (NDSS) 2005.
Alina Oprea, Dirk Balfanz, Glenn Durfee, and Diana K. Smetters. Securing a Remote Terminal Application with a Mobile Trusted Device. Annual Computer Security Applications Conference (ACSAC) 2004.
Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Song, and Ke Yang. Private Keyword-Based Push and Pull with Applications to Anonymous Communication. Applied Cryptography and Network Security Conference (ACNS) 2004.
Philip MacKenzie, Alina Oprea, and Michael K. Reiter. Automatic Generation of Two-Party Computations. ACM Conference on Computer and Communications Security (CCS) 2003.
Efficient Cryptographic Techniques for Securing Storage Systems. Ph.D. Thesis, Carnegie Mellon University, April 2007. Technical Report CMU-CS-07-119.
Program Committee Member for the following upcoming conferences: