Aikaterini Mitrokotsa

Docent at Chalmers, Computer Science and Engineering (Chalmers), Networks and Systems (Chalmers)

My research focuses on security and privacy issues in communication technologies and especially wireless communication systems and the internet of things (IoT) as well as efficient intrusion detection and response systems. Current projects include authentication in constrained environments, privacy-preservation, and intrusion detection and response. Funded by the European Commission, the Swedish Research Council (VR), STINT, Västra Götaland and Chalmers Area of Advance ICT. Link to personal page.

Source: chalmers.se

Projects

2014–2015

Cross-layer Authentication Protocols for Wireless Networks

Aikaterini Mitrokotsa Networks and Systems (Chalmers)
The Swedish Foundation for International Cooperation in Research and Higher Education (STINT)

2015–2016

Secure, Private and Efficient Healthcare with Wearable Computing

Aikaterini Mitrokotsa Networks and Systems (Chalmers)
The Swedish Foundation for International Cooperation in Research and Higher Education (STINT)

2015–2018

PRECIS: Privacy and security in wearable computing devices

Aikaterini Mitrokotsa Networks and Systems (Chalmers)
Swedish Research Council (VR)

2015–2017

SwissSenseSynergia (SNSF)

Christos Dimitrakakis Computing Science (Chalmers)
Aristide Tossou Computing Science (Chalmers)
Aikaterini Mitrokotsa Networks and Systems (Chalmers)
Swiss Federal Laboratories for Materials Science and Technology (Empa)

2015–2016

Support of Learning, Security and Privacy (Intel)

Aikaterini Mitrokotsa Networks and Systems (Chalmers)
Intel Corporation

2013–2016

Biometrics Evaluation and Testing (BEAT)

Aikaterini Mitrokotsa Networks and Systems (Chalmers)
European Commission (FP7)

There might be more projects where Aikaterini Mitrokotsa participates, but you have to be logged in as a Chalmers employee to see them.

Publications

2017

Differential privacy for Bayesian inference through posterior sampling

Christos Dimitrakakis, Blaine E N Nelson, Zuhe Zhang et al
Journal of Machine Learning Research. Vol. 18 (1 March 2017)
Scientific journal article - peer reviewed
2017

Near-Optimal Blacklisting

Christos Dimitrakakis, Aikaterini Mitrokotsa,
Computers & security. Vol. 64 (1), p. 110-121
Scientific journal article - peer reviewed
2016

9th international workshop on artificial intelligence and security (AISec 2016)

David Mandell Freeman, Aikaterini Mitrokotsa, Arunesh Sinha et al
Proceedings of the ACM Conference on Computer and Communications Security, p. 1881
Conference paper - non peer reviewed
2016

Chairs' introduction and welcome to AISec 2016

D. M. Freeman, Aikaterini Mitrokotsa, A. Sinha et al
AISec 2016 - Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2016, p. iii
Conference paper - non peer reviewed
2016

Proceedings of the 2016 Workshop on Artificial Intelligence and Security Workshop (AISec 2016)

David Freeman, Aikaterini Mitrokotsa, Arunesh Sinha et al
Monograph, book
2016

Multi-Key Homomorphic Authenticators

Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo et al
22nd International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2016, Hanoi, Viet Nam, 4-8 December 2016. Vol. 10032 (2), p. 499-530
Conference paper - peer reviewed
2016

Efficient Verifiable Computation of XOR for Biometric Authentication

Aysajan Abidin, Abdelrahaman Aly, Enrique Argones Rua et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 15th International Conference on Cryptology and Network Security, CANS 2016; Milan; Italy; 14-16 November 2016. Vol. 10052, p. 284-298
Conference paper - peer reviewed
2016

Grouping-Proof-Distance-Bounding Protocols: Keep All Your Friends Close

Christoffer Karlsson, Aikaterini Mitrokotsa,
IEEE Communications Letters. Vol. 20 (7), p. 1365-1368
Scientific journal article - peer reviewed
2016

Synergistic user ↔ context analytics

A. Hossmann-Picu, Z. Li, Z. Zhao et al
Advances in Intelligent Systems and Computing
Chapter in monograph, book
2015

Foreword - Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security

Christos Dimitrakakis, Aikaterini Mitrokotsa, A. Sinha et al
8th ACM Workshop on Artificial Intelligence and Security, AISec 2015 - co-located with CCS 2015; Denver; United States
Conference paper - non peer reviewed
2015

Practical and provably secure distance-bounding

I. Boureanu, Aikaterini Mitrokotsa, S. Vaudenay et al
Lecture Notes in Computer Science - 16th International Conference on Information Security (ISC). Vol. 7807, p. 248-258
Conference paper - peer reviewed
2015

Authentication in Constrained Settings

Aikaterini Mitrokotsa,
Lecture Notes in Computer Science. Cryptography and Information Security in the Balkans. Vol. 9024, p. 3-12
Conference paper - peer reviewed
2015

HB+DB: Mitigating Man-in-the-Middle Attacks against HB+ with Distance Bounding.

Elena Pagnin, Anjia Yang, Gerhard Hancke et al
Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2015), New York, United States, 22-26 June , p. 1-6
Conference paper - peer reviewed
2015

Distance-Bounding Protocols: Are You Close Enough?

Christos Dimitrakakis, Aikaterini Mitrokotsa,
Ieee Security & Privacy. Vol. 13 (4), p. 47-51
Scientific journal article - peer reviewed
2015

Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours

Elena Pagnin, G. Hancke, Aikaterini Mitrokotsa et al
Ieee Communications Letters. Vol. 19 (7), p. 1173-1176
Scientific journal article - peer reviewed
2015

Practical & Provably Secure Distance-Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay et al
Journal of Computer Security. Vol. 23 (2), p. 229-257
Scientific journal article - peer reviewed
2015

Expected loss analysis for authentication in constrained channels

Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay et al
Journal of Computer Security. Vol. 23 (2), p. 309-329
Scientific journal article - peer reviewed
2014

Foreword - Proceedings of the ACM Conference on Computer and Communications Security

Christos Dimitrakakis, Aikaterini Mitrokotsa, B. Rubinstein et al
7th ACM Workshop Artificial Intelligence and Security, AISec 2014, Co-located with the ACM Conference on Computer and Communication Security, CCS 2014, Scottsdale, United States, 7 November 2014. Vol. 2014-November (November), p. ii
Conference paper - non peer reviewed
2014

A Privacy-preserving Biometric Authentication Protocol Revisited

Aysajan Abidin, Aikaterini Mitrokotsa,
In Proceedings of YACC 2014, Porquerolles island, France, June 2014
Conference paper - peer reviewed
2014

Differential Privacy and Private Bayesian Inference.

Christos Dimitrakakis, Blaine Nelson, Ben Rubinstein et al
n Proceedings of the 19th Nordic Conference on Secure IT Systems (NordSec 2014), Poster, Tromso, Norway, October 2014., p. 289-290
Conference poster
2014

Attacks on Privacy-Preserving Biometric Authentication

Aysajan Abidin, Elena Pagnin, Aikaterini Mitrokotsa et al
In Proceedings of the 19th Nordic Conference on Secure IT Systems (NordSec 2014), Tromso, Norway, October 2014., p. 293-294
Conference poster
2014

Security of a Privacy-Preserving Biometric Authentication Protocol Revisited

Aysajan Abidin, Kanta Matsuura, Aikaterini Mitrokotsa et al
Proceedings of the 13th International Conference on Cryptology and Network Security (CANS 2014), Heraklion, Greece, October 2014. . Vol. 8813, p. 290-304
Conference paper - peer reviewed
2014

Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE

Aysajan Abidin, Aikaterini Mitrokotsa,
IEEE International Workshop on Information Forensics and Security, WIFS 2014; Atlanta; United States; 3 December 2014 through 5 December 2014, p. 60-65
Conference paper - peer reviewed
2014

Robust and private Bayesian inference

Christos Dimitrakakis, Blaine Nelson, Aikaterini Mitrokotsa et al
Lecture Notes in Artificial Intelligence: Algorithmic Learning Theory (ALT). 25th International Conference on Algorithmic Learning Theory (ALT), Bled, SLOVENIA, OCT 08-10, 2014. Vol. 8776, p. 291-305
Conference paper - peer reviewed
2014

On the Leakage of Information in Biometric Authentication

Elena Pagnin, Christos Dimitrakakis, Aysajan Abidin et al
In Proceedings of Indocrypt - 15th International Conference on Cryptology in India 2014, New Delhi, December 2014., p. 265-280
Conference paper - peer reviewed
2014

Location leakage in distance bounding: Why location privacy does not work

Aikaterini Mitrokotsa, C. Onete, S. Vaudenay et al
Computers & Security. Vol. 45, p. 199-209
Scientific journal article - peer reviewed
2013

The Bussard-Bagga and other distance-bounding protocols under attacks

A. Bay, I. Boureanu, Aikaterini Mitrokotsa et al
Proceedings of the 8th International Conference on Information Security and Cryptology (Inscrypt 2012)
Conference paper - peer reviewed
2013

Secure and lightweight distance-bounding

I. Boureanu, Aikaterini Mitrokotsa, S. Vaudenay et al
Lecture Notes in Computer Science: Proceedings of Second International Worp on Lightweight Cryptography for Security & Privacy - LightSec 2013ksho. Vol. 8162
Conference paper - peer reviewed
2013

On the Need for Secure Distance Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay et al
Early Symmetric Crypto (ESC) seminar
Conference paper - peer reviewed
2013

Towards Secure Distance Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay et al
Proceedings of the 20th International Workshop on Fast Software Encryption (FSE 2013)
Conference paper - peer reviewed
2013

Practical & Provably Secure Distance Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay et al
Proceedings of the 16th Information Security Conference (ISC 2013)
Conference paper - peer reviewed
2013

Intrusion detection in MANET using classification algorithms: The effects of cost and model selection

Aikaterini Mitrokotsa, Christos Dimitrakakis,
Ad Hoc Networks. Vol. 11 (1), p. 226-237
Scientific journal article - peer reviewed
2013

On selecting the nonce length in distance bounding protocols

Aikaterini Mitrokotsa, Pedro Periz-Lopez, Christos Dimitrakakis et al
The Computer Journal
Scientific journal article - peer reviewed
2012

On the traceability of tags in SUAP RFID authentication protocols

M. Safkhani, N. Bagheri, P. Peris-Lopez et al
2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, p. 292-296
Conference paper - peer reviewed
2012

Weaknesses in another Gen2-based RFID authentication protocol

M. Safkhani, N. Bagheri, P. Peris-Lopez et al
2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, p. 80-84
Conference paper - peer reviewed
2012

Mafia fraud attack against the RČ Distance-Bounding Protocol

Aikaterini Mitrokotsa, C. Onete, S. Vaudenay et al
2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, p. 74-79
Conference paper - peer reviewed
2012

On the pseudorandom function assumption in (secure) distance-bounding protocols: PRF-ness alone does not stop the frauds!

I. Boureanu, Aikaterini Mitrokotsa, S. Vaudenay et al
Proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America ( LATINCRYPT 2012)
Conference paper - peer reviewed
2012

Guest editors' introduction: Special section on learning, games, and security

Christos Dimitrakakis, T. Karygiannis, Aikaterini Mitrokotsa et al
IEEE Transactions on Dependable and Secure Computing. Vol. 9 (4), p. 449-450
Scientific journal article - non peer reviewed
2012

User-driven RFID applications and challenges

Aikaterini Mitrokotsa, Q.Z. Sheng, Z. Maamar et al
Personal and Ubiquitous Computing. Vol. 16 (3), p. 223-224
Scientific journal article - non peer reviewed
2012

Near-optimal Node Blacklisting in Adversarial Networks

Christos Dimitrakakis, Aikaterini Mitrokotsa,
Conference on Decision and Game Theory for Security, GameSec 2012
Conference poster
2012

Expected loss bounds for authentication in constrained channels

Christos Dimitrakakis, Aikaterini Mitrokotsa, S. Vaudenay et al
Proceedings - IEEE INFOCOM 2012, p. 478-485
Conference paper - peer reviewed
2012

Evaluation of classification algorithms for intrusion detection in MANETs

S. Pastrana, Aikaterini Mitrokotsa, A. Orfila et al
Knowledge-Based Systems. Vol. 36, p. 217-225
Scientific journal article - peer reviewed
2011

Security Primitive Classification of RFID Attacks

Aikaterini Mitrokotsa, Michael Beye, Pedro Peris-Lopez et al
Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID Networks
Chapter in monograph, book
2011

A note on a privacy-preserving distance-bounding protocol

J.P. Aumasson, Aikaterini Mitrokotsa, P. Peris-Lopez et al
Proceedings of the13th International Conference on Information and Communications Security (ICICS 2011)
Conference paper - peer reviewed
2011

RFID technology, systems, and applications

Q.Z. Sheng, S. Zeadally, Aikaterini Mitrokotsa et al
Journal of Network and Computer Applications. Vol. 34 (3), p. 797-798
Scientific journal article - non peer reviewed
2011

A comprehensive RFID solution to enhance inpatient medication safety

P. Peris-Lopez, A. Orfila, Aikaterini Mitrokotsa et al
International Journal of Medical Informatics. Vol. 80 (1), p. 13-24
Scientific journal article - peer reviewed
2010

Proceedings of the 4th International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2010

Quan Z. Sheng, Aikaterini Mitrokotsa, Sherali Zeadally et al
Monograph, book - edited
2010

Proceedings of the 1st International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning (PSDML 2010)

Christos Dimitrakakis, Aris Gkoulalas-Divanis, Aikaterini Mitrokotsa et al
Monograph, book - edited
2010

Detecting intrusions within RFID systems through non-monotonic reasoning cleaning

Peter Darcy, Bela Stantic, Aikaterini Mitrokotsa et al
6th International Conference on Intelligent Sensors, Sensor Networks & Information Processing (ISSNIP 2010), p. 257-262
Conference paper - peer reviewed
2010

Integrated RFID and Sensor Networks: Architectures and Applications.

Aikaterini Mitrokotsa, Christos Douligeris,
RFID and Sensor Networks: Architectures, Protocols, Security & Integrations
Chapter in monograph, book
2010

Classifying RFID attacks and defenses

Aikaterini Mitrokotsa, M.R. Rieback, A.S. Tanenbaum et al
Information Systems Frontiers. Vol. 12 (5), p. 491-505
Scientific journal article - peer reviewed
2010

Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks

Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris et al
International Journal of Network Security. Vol. 10 (2), p. 93-106
Scientific journal article - peer reviewed
2010

Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels

Aikaterini Mitrokotsa, Christos Dimitrakakis, P. Peris-Lopez et al
IEEE Communications Letters. Vol. 14 (2), p. 121-123
Scientific journal article - peer reviewed
2009

Proceedings of the 3rd International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2009

Quan Z. Sheng, Aikaterini Mitrokotsa, Sherali Zeadally et al
Monograph, book - edited
2009

Intrusion detection using cost-sensitive classification

Aikaterini Mitrokotsa, Christos Dimitrakakis, C. Douligeris et al
Proceedings of the 3rd European Conference on Computer Network Defense, EC2ND 2007
Conference paper - peer reviewed
2009

Statistical decision making for authentication and intrusion detection

Christos Dimitrakakis, Aikaterini Mitrokotsa,
8th International Conference on Machine Learning and Applications, ICMLA 2009, p. 409-414
Conference paper - peer reviewed
2008

Intrusion Detection Techniques in Sensor Networks

Aikaterini Mitrokotsa, Tom Karygiannis,
Wireless Sensor Network Security, p. 251-272
Chapter in monograph, book
2008

Classification of RFID Attacks

Aikaterini Mitrokotsa, Melanie Rieback, Andrew Tanenbaum et al
2nd International Workshop on RFID Technology - Concepts, Applications, Challenges (IWRT 2008), p. 73-86
Conference paper - peer reviewed
2008

Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms

Aikaterini Mitrokotsa, Manolis Tsagkaris, Christos Douligeris et al
Proceedings of the 7th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2008), p. 133-144
Conference paper - peer reviewed
2007

DoS Attacks and E-Government

Aikaterini Mitrokotsa, Christos Douligeris,
Secure E-Government Web Services, p. 124-142
Chapter in monograph, book
2007

Denial of Service Attacks

Aikaterini Mitrokotsa, Christos Douligeris,
Network Security: Current Status and Future Directions, p. 117-134
Chapter in monograph, book
2007

Intrusion Detection and Response in Ad hoc Networks

Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris et al
International Journal of Computer Research. Vol. 15 (1), p. 643-666
Scientific journal article - peer reviewed
2007

Intrusion Detection Using Cost-Sensitive Classification

Aikaterini Mitrokotsa, Christos Douligeris,
Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND 2007). Vol. 30, p. 35-47
Conference paper - peer reviewed
2007

Intrusion Detection with Neural Networks and Watermarking Techniques for MANET

Aikaterini Mitrokotsa, Christos Douligeris,
IEEE International Conference on Pervasive Services (ICPS 2007), p. 118 - 127
Conference paper - peer reviewed
2007

Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks

Aikaterini Mitrokotsa, Christos Douligeris,
Proceedings of the 6th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), p. 137-144
Conference paper - peer reviewed
2006

Detecting Packet Dropping Attacks Using Emergent Self-Organizing Maps in Mobile Ad Hoc Networks

Aikaterini Mitrokotsa, Rosa Mavropodi, Christos Douligeris et al
Proceedings of International Conference on Intelligent Systems and Computing: Theory and Applications, p. 111-118
Conference paper - peer reviewed
2006

Intrusion detection using emergent self-organizing maps

Aikaterini Mitrokotsa, C. Douligeris,
Proceedings of the 4th Helenic Conference on AI (SETN 2006). Vol. 3955
Conference paper - peer reviewed
2005

Detecting denial of service attacks using emergent self-organizing maps

Aikaterini Mitrokotsa, Christos Douligeris,
5th IEEE International Symposium on Signal Processing & Information Technology, p. 375 - 380
Conference paper - peer reviewed
2004

DDoS attacks and defense mechanisms: Classification and state-of-the-art

C. Douligeris, Aikaterini Mitrokotsa,
Computer Networks. Vol. 44 (5), p. 643-666
Scientific journal article - peer reviewed
2003

DDoS Attacks and Defense Mechanisms: a classification

Aikaterini Mitrokotsa, Christos Douligeris,
3rd IEEE International Symposium on Signal Processing & Information Technology (ISSPIT 2003), p. 190 - 193
Conference paper - peer reviewed