Nikolaos Triandopoulos (ntriando)

Nikolaos Triandopoulos

Associate Professor

Charles V. Schaefer, Jr. School of Engineering and Science

Education

  • PhD (2006) Brown University (Computer Science)
  • MS (2002) Brown University (Computer Science)
  • BS (1999) University of Patras (Computer Engineering & Informatics)

Research

Primary research interests broadly span Security, Privacy and Cryptography, as they relate to various aspects of today’s digital reality towards achieving information security and trustworthy computing, and interleave with other scientific, technological or societal areas, within or outside computer science.

Recent focus research areas include:

1. Cyber & Enterprise Security: Intrusion-resilient credential management and self-defending security analytics;

2. Security-Enhanced Big-Data Analytics: Trustworthy, fair and private collaborative machine learning; and

3. Network & Distributed System Security: Secure outsourced, multi-party and blockchain-based computation.

Experience

2010 - 2016, Principal Research Scientist, RSA Laboratories, RSA

2010 - 2016, Adjunct Assistant Professor, Dept. of Computer Science, Boston University

2008 - 2011, Adjunct Assistant Professor (Research), Dept. of Computer Science, Brown University

2008 - 2010, Research Assistant Professor, Dept. of Computer Science, Boston University

2007 - 2008, Research Assistant Professor, Dept. of Computer Science, Aarhus University

2006 - 2007, Postdoctoral Research Fellow, Dept. of Computer Science, Dartmouth College

Appointments

2016 - Present, Associate Professor, Dept. of Computer Science, Stevens Institute of Technology

Grants, Contracts and Funds

2017 - 2020, $.5M, U.S. National Science Foundation, Secure & Trustworthy Cyberspace, Award No. CNS-171882, An integrated approach for enterprise intrusion resilience.

2010 - 2016, $3M, U.S. National Science Foundation, CISE–Trustworthy Computing, Award No. CNS-1012798, Towards trustworthy interactions in the cloud.

2010 - 2016, $3M, U.S. National Science Foundation, CISE–Trustworthy Computing, Award No. CNS-1012910, Securing the open softphone.

2006 - 2007, $150K, U.S. Department of Homeland Security, Office of Science and Technology, Algorithms for high assurance in cyber-security.

Selected Publications

Devharsh Trivedi, Aymen Boudguiga, Nesrine Kaaniche and Nikos Triandopoulos. SigML++: Supervised log anomaly with probabilistic polynomial approximation. Cryptography, 7(4), 52. Special Issue on Cyber Security, Cryptology and Machine Learning, 2023.

Devharsh Trivedi and Nikos Triandopoulos. VaultBox: Enhancing the security and effectiveness of security analytics. In Proceedings of International Conference on Science of Cyber Security (SciSec), LNCS, Vol. 14299, Springer, pp. 401--422, Melbourne, Australia, July 2023.

Devharsh Trivedi, Aymen Boudguiga and Nikos Triandopoulos. SigML: Supervised log anomaly with fully homomorphic encryption. In Proceedings of Cyber Security, Cryptology, and Machine Learning (CSCML), LNCS, Vol. 13914, Springer, pp. 372--388, Be'er Sheva, Israel, June 2023.

Yuchen Zhang, Chengbin Pang, Georgios Portokalidis, Nikos Triandopoulos, and Jun Xu. Debloating address sanitizer. In Proceedings of USENIX Security Symposium (USENIX Security), pp. 4345--4363 Boston, MA, USA, August 2022.

Xianrui Meng, Alina Oprea, Dimitrios Papadopoulos, and Nikos Triandopoulos. Privacy-preserving hierarchical clustering: A secure and efficient approximation. In Proceedings of ACM Cloud Computing Security Workshop (CCSW), pp. 3--20, Seoul, South Korea, November, 2021.

Yifan Wang, Yuchen Zhang, Chengbin Pang, Peng Li, Nikos Triandopoulos, and Jun Xu. Facilitating parallel fuzzing with mutually-exclusive task distribution. In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm), LNICST, pp. 185--206, Canterbury, United Kingdom, September 2021.

Alin Tomescu, Vivek Bhupatiraju, Dimitrios Papadopoulos, Charalampos Papamanthou, Nikos Triandopoulos and Srinivas Devadas. Transparency logs via append-only authenticated dictionaries. In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 1299--1316, London, United Kingdom, November, 2019.

Foteini Baldimtsi, Dimitrios Papadopoulos, Stavros Papadopoulos, Alessandra Scafuro, and Nikos Triandopoulos. Server-aided secure computation with off-line parties. In Proceedings of European Symposium on Research in Computer Security, Part I (ESORICS), LNCS, Vol. 10492, Springer, pp. 103--123, Oslo, Norway, September, 2017.

Charalampos Papamanthou, Roberto Tamassia, and Nikos Triandopoulos, Authenticated hash tables based on cryptographic accumulators. Algorithmica, 74(2):664--712, 2016.

Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, and Nikos Triandopoulos. Zero-knowledge accumulators and set algebra. In Proceedings of IACR International Conference on the Theory and Applications of Cryptology and Information Security, Part II (ASIACRYPT), LNCS, Vol. 10032, Springer, pp. 67--100, Hanoi, Vietnam, December, 2016.

Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, and David Kotz. Location privacy for mobile crowd sensing through population mapping. Sensors, 15(7):15285-- 15310, 2015.

Ari Juels, James Kelley, Roberto Tamassia, and Nikos Triandopoulos. Falcon codes: Fast, authenticated LT codes (Or: Making Rapid Tornadoes unstoppable). In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 1032--1047, Denver, CO, USA, October, 2015.

Dimitrios Papadopoulos, Charalampos Papamanthou, Roberto Tamassia, and Nikos Triandopoulos. Practical authenticated pattern matching with optimal proof size. In Proceedings of the VLDB Endowment (PVLDB), 8(7): 750--761, Kohala Coast, HI, September, 2015.

Dimitrios Papadopoulos, Stavros Papadopoulos, and Nikos Triandopoulos. Taking authenticated range queries to arbitrary dimensions. In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 819--830, Scottsdale, AZ, USA, November, 2014.

Kevin D. Bowers, Catherine Hart, Ari Juels, and Nikos Triandopoulos. PillarBox: Combating next-generation malware with fast forward-secure logging. In Proceedings of International Symposium on Research in Attacks, Intrusions and Defenses (RAID), LNCS, Vol. 8688, Springer, pp. 46--67, Gothenburg, Sweden, September, 2014.

Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, and Nikos Triandopoulos. TRUESET: Faster verifiable set computations. In Proceedings of USENIX Security Symposium (USENIX Security), pp. 765--780, San Diego, CA, USA, August, 2014.

Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, and Nikos Triandopoulos. Verifiable set operations over outsourced databases. In Proceedings of International Conference on Practice and Theory of Public-Key Cryptography (PKC), LNCS, Vol. 8383, Springer, pp. 113--130, Buenos Aires, Argentina, March, 2014.

Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, and Thomas Zacharias. Delegateable pseudorandom functions and applications. In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 669--684, Berlin, Germany, November 2013.

Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, and Nikos Triandopoulos. Defending against the unknown enemy: Applying FlipIt to system security. In Proceedings of Conference on Decision and Game Theory for Security (GameSec), LNCS, Vol. 7638, Springer, pp. 248--263, Budapest, Hungary, November 2012.

Marten van Dijk, Ari Juels, Emil Stefanov, Alina Oprea, Ronald L. Rivest, and Nikos Triandopoulos. Hourglass schemes: How to prove that cloud files are encrypted. In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 265--280, Raleigh, NC, USA, October 2012.

Michael T. Goodrich, Duy Nguyen, Olga Ohrimenko, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos, and Cristina Videira Lopes. Efficient verification of Web-content searching through authenticated Web crawlers. In Proceedings of the VLDB Endowment (PVLDB), 5(10):920--931, Istanbul, Turkey, August 2012.

Michael T. Goodrich, Roberto Tamassia, and Nikos Triandopoulos. Efficient authenticated data structures for graph connectivity and geometric search problems. Algorithmica, 60(3):505--552, 2011.

Minho Shin, Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, and Nikos Triandopoulos. AnonySense: A system for anonymous opportunistic sensing. Journal of Pervasive and Mobile Computing (PMC), 7(1):16--30, 2011.

Charalampos Papamanthou, Roberto Tamassia, and Nikos Triandopoulos. Optimal authentication of operations on dynamic sets. In Proceedings of International Cryptology Conference (CRYPTO), LNCS, Vol. 6841, Springer, pp. 91--110, Santa Barbara CA, USA, August 2011.

Anna Lysyanskaya, Roberto Tamassia, and Nikos Triandopoulos. Authenticated error-correcting codes with applications to multicast authentication. ACM Transactions on Information and System Security (TISSEC), 13(2), 2010.

Peter Bro Miltersen, Jesper Buus Nielsen, and Nikos Triandopoulos. Privacy-enhancing auctions using rational cryptography. In Proceedings of International Cryptology Conference (CRYPTO), LNCS, Vol. 5677, Springer, pp. 541--558, Santa Barbara CA, USA, August 2009.

Cory Cornelius, Apu Kapadia, David Kotz, Daniel Peebles, Minho Shin, and Nikos Triandopoulos. AnonySense: Privacy-aware people-centric sensing. In Proceedings of ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 211--224, Breckenridge CO, USA, June 2008.

Apu Kapadia and Nikos Triandopoulos. Halo: High-assurance locate for distributed hash tables. In Proceedings of Network & Distributed System Security Symposium (NDSS), pp. 61--79, San Diego CA, USA, February 2008.

Anna Lysyanskaya and Nikos Triandopoulos. Rationality and adversarial behavior in multi-party computation. In Proceedings of International Cryptology Conference (CRYPTO), LNCS, Vol. 4117, Springer, pp. 180--197, Santa Barbara CA, USA, August 2006.

Roberto Tamassia and Nikos Triandopoulos. Computational bounds on hierarchical data processing with applications to information security. In Proceedings of International Colloquium on Automata, Languages and Programming (ICALP), Track C: Security and Cryptography Foundations, LNCS, Vol. 3580, Springer, pp. 153--165, Lisbon, Portugal, July 2005.

Anna Lysyanskaya, Roberto Tamassia, and Nikos Triandopoulos. Multicast authentication in fully adversarial networks. In Proceedings of IEEE Symposium on Security and Privacy (S&P - Oakland), pp. 241--255, Oakland CA, USA, May 2004.