11 Cambridge Center
Cambridge, MA 02142 USA
Alina Oprea is a Principal Research Scientist at RSA Laboratories, the security division of EMC. Her research interests span multiple areas in computer and communications security including applied cryptography, cloud security, storage security, security in distributed systems, and malware detection. More recently, her research has focused on providing strong assurances to cloud computing users about handling of their data and computation. Alina holds a B.S. degree in Mathematics and Computer Science from University of Bucharest, Romania, and has obtained M.Sc. and Ph.D. degrees in Computer Science from Carnegie Mellon University in 2003 and 2007, respectively. She is the recipient of the 2011 TR35 award for her research in cloud security.
Marten van Dijk, Ari Juels, Alina Oprea and Ronald L. Rivest. FlipIt: The Game of "Stealthy Takeover". Cryptology ePrint Archive, Report 2012/103, 2012.
Emil Stefanov, Marten van Dijk, Alina Oprea and Ari Juels. Iris: A Scalable Cloud File System with Efficient Integrity Checks. Cryptology ePrint Archive, Report 2011/585, 2011.
George Amvrosiadis, Bianca Schroeder and Alina Oprea. Practical Scrubbing: Getting to the bad sector at the right time. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2012, To appear.
Jianqiang Luo, Kevin D. Bowers, Alina Oprea, and Lihao Xu. Efficient Implementations of Large Finite Fields GF(2n) for Secure Storage Applications. ACM Transactions on Storage, Volume 8, Issue 1, February 2012.
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea and Ronald L. Rivest. How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes. In Proceedings of the18th ACM Conference on Computer and Communications Security (ACM CCS 2011).
Yinqian Zhang, Ari Juels, Alina Oprea, and Michael K. Reiter. HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis. In Proceedings of the IEEE Symposium on Security and Privacy, 2011
Alina Oprea and Ari Juels. A Clean-Slate Look at Disk Scrubbing. In Proceedings of the 8th USENIX Conference on File and Storage Technologies (FAST '10)
Kevin Bowers, Ari Juels, and Alina Oprea. HAIL: A High-Availability and Integrity Layer for Cloud Storage. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009). Full version at http://eprint.iacr.org/2008/489.
Kevin Bowers, Ari Juels, and Alina Oprea. Proofs of Retrievability: Theory and Implementation. In Proceedings of the ACM Cloud Computing Security Workshop (CCSW 2009). Full version at http://eprint.iacr.org/2008/175.
Alina Oprea and Kevin Bowers. Authentic Time-Stamps for Archival Storage. In Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009). Full version available at http://eprint.iacr.org/2009/306.
Alina Oprea and Michael K. Reiter. Integrity checking in cryptographic file systems with constant trusted storage. In Proceedings of the 16th Usenix Security Symposium, 2007.
Alina Oprea and Michael K. Reiter. On consistency of encrypted files. In Proceedings of the 20th International Symposium on Distributed Computing (DISC 2006).
Michael Backes, Christian Cachin and Alina Oprea. Secure key-updating for lazy revocation. In Proceedings of the 11th European Symposium On Research In Computer Security (ESORICS 2006).
Michael Backes, Christian Cachin and Alina Oprea. Lazy revocation in cryptographic file systems. In Proceedings of the 3rd IEEE Security in Storage Workshop (SISW 2005).
Alina Oprea, Michael K. Reiter and Ke Yang. Space-Efficient Block Storage Integrity. In Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS 2005). Received Best Paper Award.
Alina Oprea, Dirk Balfanz, Glenn Durfee and Diana K. Smetters. Securing a Remote Terminal Application with a Mobile Trusted Device. In Proceedings of the Annual Computer Security Applications Conference (ACSAC 2004).
Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Song and Ke Yang. Private Keyword-Based Push and Pull with Applications to Anonymous Communication. In Proceedings of the 2nd Conference of Applied Cryptography and Network Security (ACNS 2004).
Philip MacKenzie, Alina Oprea and Michael K. Reiter. Automatic Generation of Two-Party Computations (extended abstract). In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003).
Efficient Cryptographic Techniques for Securing Storage Systems. Ph.D. Thesis, Carnegie Mellon University, April 2007. Technical Report CMU-CS-07-119.
Program Committee Member for the following upcoming conferences:
19th ACM Computer and Communications Security Conference (ACM CCS 2012)
4th ACM Cloud Computing Security Workshop (CCSW 2012)