Aikaterini Mitrokotsa

Docent at Chalmers, Computer Science and Engineering (Chalmers), Networks and Systems (Chalmers)

My research focuses on security and privacy issues in communication technologies and especially wireless communication systems and the internet of things (IoT) as well as efficient intrusion detection and response systems. Current projects include authentication in constrained environments, privacy-preservation, and intrusion detection and response. Funded by the European Commission, the Swedish Research Council (VR), STINT, Västra Götaland and Chalmers Area of Advance ICT. Link to personal page.

Source: chalmers.se

Projects

2014–2015

Cross-layer Authentication Protocols for Wireless Networks

Aikaterini Mitrokotsa Networks and Systems (Chalmers)
The Swedish Foundation for International Cooperation in Research and Higher Education (STINT)

2015–2016

Secure, Private and Efficient Healthcare with Wearable Computing

Aikaterini Mitrokotsa Networks and Systems (Chalmers)
The Swedish Foundation for International Cooperation in Research and Higher Education (STINT)

2015–2018

PRECIS: Privacy and security in wearable computing devices

Aikaterini Mitrokotsa Networks and Systems (Chalmers)
Swedish Research Council (VR)

2015–2017

SwissSenseSynergia (SNSF)

Christos Dimitrakakis Computing Science (Chalmers)
Aristide Tossou Computing Science (Chalmers)
Aikaterini Mitrokotsa Networks and Systems (Chalmers)
Swiss Federal Laboratories for Materials Science and Technology (Empa)

2015–2016

Support of Learning, Security and Privacy (Intel)

Aikaterini Mitrokotsa Networks and Systems (Chalmers)
Intel Corporation

2013–2016

Biometrics Evaluation and Testing (BEAT)

Aikaterini Mitrokotsa Networks and Systems (Chalmers)
European Commission (FP7)

There might be more projects where Aikaterini Mitrokotsa participates, but you have to be logged in as a Chalmers employee to see them.

Publications

2017

Near-Optimal Blacklisting

Christos Dimitrakakis, Aikaterini Mitrokotsa
Computers and Security. Vol. 64 (1), p. 110-121
Journal article
2017

Privacy-Preserving Biometric Authentication: Challenges and Directions

Elena Pagnin, Aikaterini Mitrokotsa
Security and Communication Networks
Journal article
2017

Differential privacy for Bayesian inference through posterior sampling

Christos Dimitrakakis, B.E.N. Nelson, Zuhe Zhang et al
Journal of Machine Learning Research. Vol. 18 (1 March 2017)
Journal article
2016

Multi-Key Homomorphic Authenticators

Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo et al
Lecture Notes in Computer Science. Vol. 10032 (2), p. 499-530
Paper in proceedings
2016

Chairs' introduction and welcome to AISec 2016

David Mandell Freeman, Aikaterini Mitrokotsa, Arunesh Sinha
AISec 2016 - Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2016, p. iii-
Conference contribution
2016

Efficient Verifiable Computation of XOR for Biometric Authentication

Aysajan Abidin, Abdelrahaman Aly, Enrique Argones Rua et al
Lecture Notes in Computer Science. Vol. 10052, p. 284-298
Paper in proceedings
2016

Proceedings of the 2016 Workshop on Artificial Intelligence and Security Workshop (AISec 2016)

David Freeman, Aikaterini Mitrokotsa, Arunesh Sinha
Book
2016

9th international workshop on artificial intelligence and security (AISec 2016)

David Mandell Freeman, Aikaterini Mitrokotsa, Arunesh Sinha
Proceedings of the ACM Conference on Computer and Communications Security, p. 1881-
Conference contribution
2016

Synergistic user ↔ context analytics

A. Hossmann-Picu, Z. Li, Z. Zhao et al
Advances in Intelligent Systems and Computing, p. 163-172
Chapter in monograph, book - peer reviewed
2016

Grouping-Proof-Distance-Bounding Protocols: Keep All Your Friends Close

Christoffer Karlsson, Aikaterini Mitrokotsa
IEEE Communications Letters. Vol. 20 (7), p. 1365-1368
Journal article
2015

Authentication in Constrained Settings

Aikaterini Mitrokotsa
Lecture Notes in Computer Science. Vol. 9024, p. 3-12
Paper in proceedings
2015

Foreword - Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security

Christos Dimitrakakis, Aikaterini Mitrokotsa, Arunesh Sinha et al
8th ACM Workshop on Artificial Intelligence and Security, AISec 2015 - co-located with CCS 2015; Denver; United States, p. iii-
Conference contribution
2015

Expected loss analysis for authentication in constrained channels

Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay
Journal of Computer Security. Vol. 23 (2), p. 309-329
Journal article
2015

Practical & Provably Secure Distance-Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Journal of Computer Security. Vol. 23 (2), p. 229-257
Journal article
2015

Practical and provably secure distance-bounding

I. Boureanu, Aikaterini Mitrokotsa, S. Vaudenay
Lecture Notes in Computer Science. Vol. 7807, p. 248-258
Paper in proceedings
2015

Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours

Elena Pagnin, G. Hancke, Aikaterini Mitrokotsa
IEEE Communications Letters. Vol. 19 (7), p. 1173-1176
Journal article
2015

Distance-Bounding Protocols: Are You Close Enough?

Christos Dimitrakakis, Aikaterini Mitrokotsa
IEEE Security and Privacy. Vol. 13 (4), p. 47-51
Journal article
2015

HB+DB: Mitigating Man-in-the-Middle Attacks against HB+ with Distance Bounding.

Elena Pagnin, Anjia Yang, G. Hancke et al
Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2015), New York, United States, 22-26 June, p. 1-6
Paper in proceedings
2014

Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE

Aysajan Abidin, Aikaterini Mitrokotsa
IEEE International Workshop on Information Forensics and Security, WIFS 2014; Atlanta; United States; 3 December 2014 through 5 December 2014, p. 60-65
Paper in proceedings
2014

Attacks on Privacy-Preserving Biometric Authentication

Aysajan Abidin, Elena Pagnin, Aikaterini Mitrokotsa
In Proceedings of the 19th Nordic Conference on Secure IT Systems (NordSec 2014), Tromso, Norway, October 2014., p. 293-294
Conference poster
2014

On the Leakage of Information in Biometric Authentication

Elena Pagnin, Christos Dimitrakakis, Aysajan Abidin et al
In Proceedings of Indocrypt - 15th International Conference on Cryptology in India 2014, New Delhi, December 2014., p. 265-280
Paper in proceedings
2014

A Privacy-preserving Biometric Authentication Protocol Revisited

Aysajan Abidin, Aikaterini Mitrokotsa
Paper in proceedings
2014

Location leakage in distance bounding: Why location privacy does not work

Aikaterini Mitrokotsa, C. Onete, S. Vaudenay
Computers and Security. Vol. 45, p. 199-209
Journal article
2014

Robust and private Bayesian inference

Christos Dimitrakakis, Blaine Nelson, Aikaterini Mitrokotsa et al
Lecture Notes in Computer Science. Vol. 8776, p. 291-305
Paper in proceedings
2014

Differential Privacy and Private Bayesian Inference.

Christos Dimitrakakis, Blaine Nelson, Ben Rubinstein et al
n Proceedings of the 19th Nordic Conference on Secure IT Systems (NordSec 2014), Poster, Tromso, Norway, October 2014., p. 289-290
Conference poster
2014

Foreword - Proceedings of the ACM Conference on Computer and Communications Security

Christos Dimitrakakis, Aikaterini Mitrokotsa, B. Rubinstein et al
7th ACM Workshop Artificial Intelligence and Security, AISec 2014, Co-located with the ACM Conference on Computer and Communication Security, CCS 2014, Scottsdale, United States, 7 November 2014. Vol. 2014-November (November), p. ii-
Conference contribution
2014

Security of a Privacy-Preserving Biometric Authentication Protocol Revisited

Aysajan Abidin, Kanta Matsuura, Aikaterini Mitrokotsa
Lecture Notes in Computer Science. Vol. 8813, p. 290-304
Paper in proceedings
2013

Intrusion detection in MANET using classification algorithms: The effects of cost and model selection

Aikaterini Mitrokotsa, Christos Dimitrakakis
Ad Hoc Networks. Vol. 11 (1), p. 226-237
Journal article
2013

The Bussard-Bagga and other distance-bounding protocols under attacks

A. Bay, I. Boureanu, Aikaterini Mitrokotsa et al
Paper in proceedings
2013

Practical & Provably Secure Distance Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Paper in proceedings
2013

On the Need for Secure Distance Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Paper in proceedings
2013

Towards Secure Distance Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Paper in proceedings
2013

Secure and lightweight distance-bounding

I. Boureanu, Aikaterini Mitrokotsa, S. Vaudenay
Lecture Notes in Computer Science. Vol. 8162
Paper in proceedings
2013

On selecting the nonce length in distance bounding protocols

Aikaterini Mitrokotsa, Pedro Periz-Lopez, Christos Dimitrakakis et al
Computer Journal
Journal article
2012

Weaknesses in another Gen2-based RFID authentication protocol

M. Safkhani, N. Bagheri, P. Peris-Lopez et al
2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, p. 80-84
Paper in proceedings
2012

On the traceability of tags in SUAP RFID authentication protocols

M. Safkhani, N. Bagheri, P. Peris-Lopez et al
2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, p. 292-296
Paper in proceedings
2012

Near-optimal Node Blacklisting in Adversarial Networks

Christos Dimitrakakis, Aikaterini Mitrokotsa
Conference poster
2012

Evaluation of classification algorithms for intrusion detection in MANETs

S. Pastrana, Aikaterini Mitrokotsa, A. Orfila et al
Knowledge-Based Systems. Vol. 36, p. 217-225
Journal article
2012

Guest editors' introduction: Special section on learning, games, and security

Christos Dimitrakakis, T. Karygiannis, Aikaterini Mitrokotsa
IEEE Transactions on Dependable and Secure Computing. Vol. 9 (4), p. 449-450
Magazine article
2012

User-driven RFID applications and challenges

Aikaterini Mitrokotsa, Q.Z. Sheng, Z. Maamar
Personal and Ubiquitous Computing. Vol. 16 (3), p. 223-224
Magazine article
2012

Expected loss bounds for authentication in constrained channels

Christos Dimitrakakis, Aikaterini Mitrokotsa, S. Vaudenay
Journal of Logic and Computation, p. 478-485
Paper in proceedings
2012

Mafia fraud attack against the RČ Distance-Bounding Protocol

Aikaterini Mitrokotsa, C. Onete, S. Vaudenay
2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, p. 74-79
Paper in proceedings
2011

A note on a privacy-preserving distance-bounding protocol

J.P. Aumasson, Aikaterini Mitrokotsa, P. Peris-Lopez
Paper in proceedings
2011

RFID technology, systems, and applications

Q.Z. Sheng, S. Zeadally, Aikaterini Mitrokotsa et al
Journal of Network and Computer Applications. Vol. 34 (3), p. 797-798
Magazine article
2011

A comprehensive RFID solution to enhance inpatient medication safety

P. Peris-Lopez, A. Orfila, Aikaterini Mitrokotsa et al
International Journal of Medical Informatics. Vol. 80 (1), p. 13-24
Journal article
2011

Security Primitive Classification of RFID Attacks

Aikaterini Mitrokotsa, Michael Beye, Pedro Peris-Lopez
Chapter in monograph, book - peer reviewed
2010

Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels

Aikaterini Mitrokotsa, Christos Dimitrakakis, P. Peris-Lopez et al
IEEE Communications Letters. Vol. 14 (2), p. 121-123
Journal article
2010

Proceedings of the 1st International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning (PSDML 2010)

Christos Dimitrakakis, Aris Gkoulalas-Divanis, Aikaterini Mitrokotsa et al
Edited book
2010

Classifying RFID attacks and defenses

Aikaterini Mitrokotsa, M.R. Rieback, A.S. Tanenbaum
Information Systems Frontiers. Vol. 12 (5), p. 491-505
Journal article
2010

Proceedings of the 4th International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2010

Quan Z. Sheng, Aikaterini Mitrokotsa, Sherali Zeadally et al
Edited book
2010

Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks

Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris
International Journal of Network Security. Vol. 10 (2), p. 93-106
Journal article
2010

Integrated RFID and Sensor Networks: Architectures and Applications.

Aikaterini Mitrokotsa, Christos Douligeris
Chapter in monograph, book - peer reviewed
2010

Detecting intrusions within RFID systems through non-monotonic reasoning cleaning

Peter Darcy, Bela Stantic, Aikaterini Mitrokotsa et al
6th International Conference on Intelligent Sensors, Sensor Networks & Information Processing (ISSNIP 2010), p. 257-262
Paper in proceedings
2009

Proceedings of the 3rd International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2009

Quan Z. Sheng, Aikaterini Mitrokotsa, Sherali Zeadally et al
Edited book
2009

Intrusion detection using cost-sensitive classification

Aikaterini Mitrokotsa, Christos Dimitrakakis, C. Douligeris
Paper in proceedings
2009

Statistical decision making for authentication and intrusion detection

Christos Dimitrakakis, Aikaterini Mitrokotsa
8th International Conference on Machine Learning and Applications, ICMLA 2009, p. 409-414
Paper in proceedings
2008

Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms

Aikaterini Mitrokotsa, Manolis Tsagkaris, Christos Douligeris
Proceedings of the 7th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2008), p. 133-144
Paper in proceedings
2008

Classification of RFID Attacks

Aikaterini Mitrokotsa, Melanie Rieback, Andrew Tanenbaum
2nd International Workshop on RFID Technology - Concepts, Applications, Challenges (IWRT 2008), p. 73-86
Paper in proceedings
2008

Intrusion Detection Techniques in Sensor Networks

Aikaterini Mitrokotsa, Tom Karygiannis
Wireless Sensor Network Security, p. 251-272
Chapter in monograph, book - peer reviewed
2007

Denial of Service Attacks

Aikaterini Mitrokotsa, Christos Douligeris
Network Security: Current Status and Future Directions, p. 117-134
Chapter in monograph, book - peer reviewed
2007

Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks

Aikaterini Mitrokotsa, Christos Douligeris
Proceedings of the 6th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), p. 137-144
Paper in proceedings
2007

Intrusion Detection and Response in Ad hoc Networks

Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris
Frontiers in Artificial Intelligence and Applications. Vol. 15 (1), p. 643-666
Journal article
2007

Intrusion Detection with Neural Networks and Watermarking Techniques for MANET

Aikaterini Mitrokotsa, Christos Douligeris
IEEE International Conference on Pervasive Services (ICPS 2007), p. 118 - 127
Paper in proceedings
2007

Intrusion Detection Using Cost-Sensitive Classification

Aikaterini Mitrokotsa, Christos Douligeris
Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND 2007). Vol. 30, p. 35-47
Paper in proceedings
2007

DoS Attacks and E-Government

Aikaterini Mitrokotsa, Christos Douligeris
Secure E-Government Web Services, p. 124-142
Chapter in monograph, book - peer reviewed
2006

Intrusion detection using emergent self-organizing maps

Aikaterini Mitrokotsa, C. Douligeris
Proceedings of the 4th Helenic Conference on AI (SETN 2006). Vol. 3955
Paper in proceedings
2006

Detecting Packet Dropping Attacks Using Emergent Self-Organizing Maps in Mobile Ad Hoc Networks

Aikaterini Mitrokotsa, Rosa Mavropodi, Christos Douligeris
Proceedings of International Conference on Intelligent Systems and Computing: Theory and Applications, p. 111-118
Paper in proceedings
2005

Detecting denial of service attacks using emergent self-organizing maps

Aikaterini Mitrokotsa, Christos Douligeris
5th IEEE International Symposium on Signal Processing & Information Technology, p. 375 - 380
Paper in proceedings
2004

DDoS attacks and defense mechanisms: Classification and state-of-the-art

C. Douligeris, Aikaterini Mitrokotsa
Computer Networks. Vol. 44 (5), p. 643-666
Journal article
2003

DDoS Attacks and Defense Mechanisms: a classification

Aikaterini Mitrokotsa, Christos Douligeris
3rd IEEE International Symposium on Signal Processing & Information Technology (ISSPIT 2003), p. 190 - 193
Paper in proceedings