Tudor Dumitraș

Assistant Professor
ECE Department
University of Maryland, College Park

Publications

  1. [CCS 2017] D. Kim, B. J. Kwon, and T. Dumitraș, “Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI,” in ACM Conference on Computer and Communications Security (CCS), Dallas, TX, 2017.
    PDF

  2. [TIST 2017] M. Ovelgonne, T. Dumitraș, A. Prakash, V. S. Subrahmanian, and B. Wang, “Understanding the Relationship between Human Behavior and Susceptibility to CyberAttacks: A DataDriven Approach,” ACM Transactions on Intelligent Systems & Technology, vol. 8, no. 4, Mar. 2017.
    PDF

  3. [PAM 2017] A. Sarabi, Z. Zhu, C. Xiao, M. Liu, and T. Dumitraș, “Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State,” in International Conference on Passive and Active Network Measurement, Sydney, Australia, 2017, pp. 113–125.
    PDF

  4. [NDSS 2017] B. J. Kwon, V. Srinivas, A. Deshpande, and T. Dumitraș, “Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns,” in Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2017.
    PDF

  5. [Onward! 2016] S. Indela, M. Kulkarni, K. Nayak, and T. Dumitraș, “Helping Johnny Encrypt: Toward Semantic Interfaces for Cryptographic Frameworks,” in ACM SPLASH Onward! Conference, Amsterdam, NL, 2016.
    PDF

  6. [SecDev 2016] S. Indela, M. Kulkarni, K. Nayak, and T. Dumitraș, “Toward Semantic Cryptography APIs,” in IEEE SecDev, Boston, MA, 2016.
    PDF

  7. [CCS 2016] Z. Zhu and T. Dumitraș, “FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature,” in ACM Conference on Computer and Communications Security (CCS), Vienna, AT, 2016.
    PDF

  8. [ICSME 2016] K. Saur, T. Dumitraș, and M. Hicks, “Evolving NoSQL Databases Without Downtime,” in IEEE International Conference on Software Maintenance and Evolution (ICSME), Raleigh, NC, 2016.
    PDF

  9. [CCS 2015] B. J. Kwon, J. Mondal, J. Jang, L. Bilge, and T. Dumitraș, “The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics,” in ACM Conference on Computer and Communications Security (CCS), Denver, CO, 2015, pp. 1118–1129.
    PDF

  10. [USENIX Security 2015] C. Sabottke, O. Suciu, and T. Dumitraş, “Vulnerability disclosure in the age of social media: Exploiting Twitter for predicting real-world exploits,” in USENIX Security Symposium (USENIX Security), Washington, DC, 2015.
    PDF

  11. [Oakland 2015] A. Nappa, R. Johnson, L. Bilge, J. Caballero, and T. Dumitraș, “The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching,” in IEEE Symposium on Security and Privacy, San Jose, CA, 2015.
    PDF

  12. [IMC 2014] L. Zhang, D. Choffnes, T. Dumitraș, D. Levin, A. Mislove, A. Schulman, and C. Wilson, “Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed,” in ACM Internet Measurement Conference (IMC), Vancouver, Canada, 2014.
    PDF

  13. [SNAM 2014] E. Papalexakis, T. Dumitraș, D. H. Chau, B. A. Prakash, and C. Faloutsos, “SharkFin: Spatio-temporal mining of software adoption and penetration,” Social Network Analysis and Mining, vol. 4, no. 1, Dec. 2014.

  14. [RAID 2014] K. Nayak, D. Marino, P. Efstathopoulos, and T. Dumitraș, “Some Vulnerabilities Are Different Than Others: Studying Vulnerabilities and Attack Surfaces in the Wild,” in International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Gothenburg, Sweden, 2014.
    PDF

  15. [CSA 2013] T. Dumitraș, “The WINE Platform for Experimenting with Big Data Analytics in Security.” Report of the Big Data Working Group, Cloud Security Alliance, Sep-2013.

  16. [;login: 2013] L. Bilge and T. Dumitraș, “Investigating Zero-Day Attacks,” USENIX ;login: vol. 38, no. 4, Aug. 2013.

  17. [ASONAM 2013] E. E. Papalexakis, T. Dumitraș, D. H. Chau, B. A. Prakash, and C. Faloutsos, “Spatio-temporal mining of software adoption and penetration,” in Advances in Social Networks Analysis and Mining (ASONAM), Niagara, Canada, 2013, pp. 878–885.
    PDF

  18. [COMNET 2013] T. Dumitraș and P. Narasimhan, “A study of unpredictability in fault-tolerant middleware,” Computer Networks, vol. 57, no. 3, pp. 682–698, Feb. 2013.
    PDF

  19. [CCS 2012] L. Bilge and T. Dumitraș, “Before we knew it: An empirical study of zero-day attacks in the real world,” in ACM Conference on Computer and Communications Security, Raleigh, NC, 2012, pp. 833–844.
    PDF

  20. [EDCC 2012] T. Dumitraș and P. Efstathopoulos, “The Provenance of WINE,” in European Dependable Computing Conference (EDCC), Sibiu, Romania, 2012, pp. 126–131.
    PDF

  21. [LEET 2012] T. Dumitraș and P. Efstathopoulos, “Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis,” in USENIX Workshop on Large-Scale Exploits and Emerging Threats (LEET), San Jose, CA, 2012.
    PDF

  22. [MESOCA 2011] I. Neamtiu and T. Dumitraș, “Cloud software upgrades: Challenges and opportunities,” in IEEE International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA), Williamsburg, VA, 2011, pp. 1–10.
    PDF

  23. [CSET 2011] T. Dumitraș and I. Neamtiu, “Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware,” in USENIX Workshop on Cyber Security Experimentation and Test (CSET), San Francisco, CA, 2011.
    PDF

  24. [BADGERS 2011] T. Dumitraș and D. Shou, “Toward a standard benchmark for computer security research: The Worldwide Intelligence Network Environment (WINE),” in ACM Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), Salzburg, Austria, 2011.
    PDF

  25. [EXERT 2011] T. Dumitraș, “Field Data Available at Symantec Research Labs: The Worldwide Intelligence Network Environment (WINE),” in Exascale Evaluation and Research Techniques Workshop (EXERT), Newport Beach, CA, 2011.
    PDF

  26. [Onward! 2010] T. Dumitraș, P. Narasimhan, and E. Tilevich, “To upgrade or not to upgrade: impact of online upgrades across multiple administrative domains,” in ACM SPLASH Onward! Conference, Reno/Tahoe, NV, 2010, pp. 865–876.
    PDF

  27. [Ph.D. Thesis] T. Dumitraș, “Improving the Dependability of Distributed Systems through AIR Software Upgrades,” PhD thesis, Carnegie Mellon University, 2010.
    PDF

  28. [OSR 2010] T. Dumitraș, I. Neamtiu, and E. Tilevich, “Report on the second ACM workshop on hot topics in software upgrades (HotSWUp’09),” osr, vol. 44, no. 4, pp. 146–152, 2010.
    PDF

  29. [OOPSLA 2009 Student Research Competition] T. Dumitraș, “Dependable, Online Upgrades in Enterprise Systems,” in ACM SIGPLAN Student Research Competition at Object-Oriented Programming, Systems, Languages and Applications Conference (OOPSLA), Orlando, FL, 2009.
    PDF

  30. [Middleware 2009] T. Dumitraș and P. Narasimhan, “Why Do Upgrades Fail And What Can We Do About It? Toward Dependable, Online Upgrades in Enterprise Systems,” in ACM/IEEE/IFIP Middleware Conference, Urbana-Champaign, IL, 2009, pp. 349–372.
    PDF

  31. [OOPSLA 2009 - DocSymp] T. Dumitraș, “Dependable, Online Upgrades in Enterprise Systems,” in Doctoral Symposium at Object-Oriented Programming, Systems, Languages and Applications Conference, Orlando, FL, 2009.
    PDF

  32. [Middleware 2009 - poster] T. Dumitraș and P. Narasimhan, “Toward Upgrades-as-a-Service in Distributed Systems,” in ACM/IEEE/IFIP Middleware Conference, Urbana-Champaign, IL, 2009.
    PDF

  33. [HotSWUp 2009] T. Dumitraș, I. Neamtiu, and E. Tilevich, Eds., Proceedings of the 2\upnd ACM Workshop on Hot Topics in Software Upgrades (HotSWUp’09). Orlando, FL: ACM Digital Library, 2009.

  34. [Dagstuhl 2009] T. Dumitraș, F. Eliassen, K. Geihs, H. Muccini, A. Polini, and T. Ungerer, “Testing Run-time Evolving Systems,” in Self-Healing and Self-Adaptive Systems, Dagstuhl, Germany, 2009.

  35. [PDL 2009] T. Dumitraș and P. Narasimhan, “No Downtime for Data Conversions: Rethinking Hot Upgrades,” Carnegie Mellon University, CMU-PDL-09-106, 2009.
    PDF

  36. [HotSWUp 2008] T. Dumitraș, D. Dig, and I. Neamtiu, Eds., Proceedings of the 1\upst ACM Workshop on Hot Topics in Software Upgrades (HotSWUp’08). Nashville, TN: ACM Digital Library, 2008.

  37. [PDL 2008] T. Dumitraș, S. Kavulya, and P. Narasimhan, “A Fault Model for Upgrades in Distributed Systems,” Carnegie Mellon University, CMU-PDL-08-115, 2008.

  38. [HotSWUp 2008 report] T. Dumitraș, D. Dig, and I. Neamtiu, “Report on the first ACM Workshop on Hot Topics in Software Upgrades (HotSWUp’08).” 2008.

  39. [Middleware 2007] T. Dumitraș and P. Narasimhan, “Got Predictability? Experiences with Fault-Tolerant Middleware,” in ACM/IEEE/IFIP Middleware Conference, Newport Beach, CA, 2007.
    PDF

  40. [HotDep-2007] T. Dumitraș, J. Tan, Z. Gho, and P. Narasimhan, “No More HotDependencies: Toward Dependency-Agnostic Upgrades in Distributed Systems,” in Workshop on Hot Topics in System Dependability, Edinburgh, Scotland, 2007.
    PDF

  41. [ADS IV] T. Dumitraș, D. Roșu, A. Dan, and P. Narasimhan, “Ecotopia: An Ecological Framework for Change Management in Distributed Systems,” in Architecting Dependable Systems IV, C. Gacek, A. Romanovsky, and R. de Lemos, Eds. Springer-Verlag, LNCS 4615, 2007, pp. 262–286.
    PDF

  42. [VLSI Design 2007] P. Bogdan, T. Dumitraș, and R. Mărculescu, “Stochastic Communication: A New Paradigm for Fault-Tolerant Networks-on-Chip,” VLSI Design, vol. special issue on Networks-on-Chip, 2007.
    PDF

  43. [ISWC 2006] T. Dumitraș, M. Lee, P. Quinones, A. Smailagic, D. Siewiorek, and P. Narasimhan, “Eye of the Beholder: Phone-Based Text-Recognition for the Visually-Impaired,” in International Symposium on Wearable Computers, Montreux, Switzerland, 2006, pp. 145–146.
    PDF

  44. [WADS 2006] T. Dumitraș, D. Roșu, A. Dan, and P. Narasimhan, “Impact-Sensitive Framework for Dynamic Change-Management,” in Workshop on Architecting Dependable Systems (WADS), Philadelphia, PA, 2006.
    PDF

  45. [ADS III] T. Dumitraș, D. Srivastava, and P. Narasimhan, “Architecting and Implementing Versatile Dependability,” in Architecting Dependable Systems III, R. de Lemos, C. Gacek, and A. Romanovsky, Eds. Springer-Verlag, LNCS 3549, 2005, pp. 212–231.
    PDF

  46. [Middleware 2005] T. Dumitraș and P. Narasimhan, “Fault-Tolerant Middleware and the Magical 1%,” in ACM/IEEE/IFIP Middleware Conference, Grenoble, France, 2005, pp. 431–441.
    PDF

  47. [CC:PE 2005] P. Narasimhan, T. Dumitraș, A. Paulos, S. Pertet, C. Reverte, J. Slember, and D. Srivastava, “MEAD: Support for Real-time, fault-tolerant CORBA,” Concurrency and Computation: Practice and Experience, vol. 17, pp. 1527–1545, 2005.
    PDF

  48. [WADS 2004] T. Dumitraș and P. Narasimhan, “An Architecture for Versatile Dependability,” in Workshop on Architecting Dependable Systems (WADS), Florence, Italy, 2004.
    PDF

  49. [ASP-DAC 2004] T. Dumitraș, S. Kerner, and R. Mărculescu, “Enabling On-Chip Diversity through Architectural Communication Design,” in Asia and South Pacific Design Automation Conference (ASP-DAC), Yokohama, Japan, 2004.

  50. [M.S. Thesis] T. Dumitraș, “On-Chip Stochastic Communication,” Master’s thesis, Carnegie Mellon University, 2003.
    PDF

  51. [DATE 2003] T. Dumitraș and R. Mărculescu, “On-Chip Stochastic Communication,” in Design, Automation and Test in Europe (DATE), Munich, Germany, 2003.
    PDF

  52. [ASP-DAC 2003] T. Dumitraș, S. Kerner, and R. Mărculescu, “Towards On-Chip Fault-Tolerant Communication,” in Asia and South Pacific Design Automation Conference (ASP-DAC), Kitakyushu, Japan, 2003, pp. 225–232.
    PDF