Research Interests

I am interested in many areas of networking and security, but here are my top favorites:
  • Distributed systems security
  • Network Security (IDS, IPS)
  • Peer-to-peer networks
  • Privacy and anonymity
In the past, I worked on variety of projects centered around secure network coordinates, distributed hash tables, and censorship resistance.

Recent Publications

Conferences and workshops

2012

V. Heorhiadi, M.K. Reiter, and V. Sekar. New opportunities for load balancing in network-wide intrusion detection systems. In Proceedings of the 8th international conference on Emerging networking experiments and technologies, pages 361-372. ACM, 2012. [ bib ]

E.Y. Vasserman, V. Heorhiadi, N. Hopper, and Y. Kim. One-way indexing for plausible deniability in censorship resistant storage. In 2nd Usenix Workshop on Free and Open Communications on the Internet, FOCI'12, 2012. [ bib ]

2010

Max Schuchard, Alexander W. Dean, Victor Heorhiadi, Nicholas Hopper, and Yongdae Kim. Balancing the shadows. In Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, WPES '10, pages 1-10, New York, NY, USA, 2010. ACM. [ bib | DOI | http ]

Keywords: anonymity, eclipse attack, peer-to-peer, selective denial of service, shadowwalker

Journals

2011

Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, and Yongdae Kim. The frog-boiling attack: Limitations of secure network coordinate systems. ACM Trans. Inf. Syst. Secur., 14(3):27:1-27:23, November 2011. [ bib | DOI | http ]

Keywords: Network coordinate, attack, secure

Technical Reports

2012

V. Heorhiadi, M.K. Reiter, and V. Sekar. Balancing computation-communication tradeoffs in scaling network-wide intrusion detection systems. Technical report, University of North Carolina Chapel Hill, 2012. [ bib ]

2011

E.Y. Vasserman, V. Heorhiadi, Y. Kim, and N. Hopper. Censorship resistant overlay publishing. Technical report, University of Minnesota, 2011. [ bib ]