Research Interests
- Distributed systems security
- Network Security (IDS, IPS)
- Peer-to-peer networks
- Privacy and anonymity
V. Heorhiadi, M.K. Reiter, and V. Sekar. New opportunities for load balancing in network-wide intrusion detection systems. In Proceedings of the 8th international conference on Emerging networking experiments and technologies, pages 361-372. ACM, 2012. [ bib ]
E.Y. Vasserman, V. Heorhiadi, N. Hopper, and Y. Kim. One-way indexing for plausible deniability in censorship resistant storage. In 2nd Usenix Workshop on Free and Open Communications on the Internet, FOCI'12, 2012. [ bib ]
Max Schuchard, Alexander W. Dean, Victor Heorhiadi, Nicholas Hopper, and Yongdae Kim. Balancing the shadows. In Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, WPES '10, pages 1-10, New York, NY, USA, 2010. ACM. [ bib | DOI | http ]
Keywords: anonymity, eclipse attack, peer-to-peer, selective denial of service, shadowwalker
Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, and Yongdae Kim. The frog-boiling attack: Limitations of secure network coordinate systems. ACM Trans. Inf. Syst. Secur., 14(3):27:1-27:23, November 2011. [ bib | DOI | http ]
Keywords: Network coordinate, attack, secure
V. Heorhiadi, M.K. Reiter, and V. Sekar. Balancing computation-communication tradeoffs in scaling network-wide intrusion detection systems. Technical report, University of North Carolina Chapel Hill, 2012. [ bib ]
E.Y. Vasserman, V. Heorhiadi, Y. Kim, and N. Hopper. Censorship resistant overlay publishing. Technical report, University of Minnesota, 2011. [ bib ]