Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sergiu Costea is active.

Publication


Featured researches published by Sergiu Costea.


ieee computer security foundations symposium | 2016

Secure Software Licensing: Models, Constructions, and Proofs

Sergiu Costea; Bogdan Warinschi

The problem of secure software licensing is to enforce meaningful restrictions on how software is run on machines outside the control of the software author/vendor. The problem has been addressed through a variety of approaches from software obfuscation to hardware-based solutions, but existent solutions offer only heuristic guarantees which are often invalidated by attacks. This paper establishes foundations for secure software licensing in the form of rigorous models. We identify and formalize two key properties. Privacy demands that licensed software does not leak unwanted information, and integrity ensures that the use of licensed software is compliant with a license - the license is a parameter of our models. Our formal definitions and proposed constructions leverage the isolation/attestation capabilities of recently proposed trusted hardware like SGX which proves to be a key enabling technology for provably secure software licensing.


international conference on control systems and computer science | 2015

Reduced Relative Errors for Short Sequence Counting with Differential Privacy

Sergiu Costea; Gabriel Ghinita; Rvzvan Rughinis; Nicolae Tapus

Current concerns about data privacy have lead to increased focus on data anonymization methods. Differential privacy is a new mechanism that offers formal guarantees about anonymization strength. The main challenge when using differential privacy consists in the difficulty in designing correct algorithms when operating on complex data types. One such data type is sequential data, which is used to model many actions like location or browsing history. We propose a new differential privacy algorithm for short sequence counting called Recursive Budget Allocation (RBA). We show that RBA leads to lower relative errors than current state of the art techniques. In addition, it can also be used to improve relative errors for generic differential privacy algorithms which operate on data trees.


intelligent networking and collaborative systems | 2012

A Comparative Evaluation of Private Information Retrieval Techniques in Location-Based Services

Sergiu Costea; Dumitru Marian Barbu; Gabriel Ghinita; Razvan Rughinis

Private Information Retrieval (PIR) schemes offer privacy to Internet users by protecting the contents of their queries from the servers that they use. As the problem of user data collected by various services is becoming an issue of increasing concern, the functionality offered by such schemes is gaining a lot of attention. There are various PIR methods that ensure privacy, ranging from information-theoretic secure solutions that require multiple non-colluding servers, to hardware implementations based on secure trusted components. In this paper, we focus on computational PIR (cPIR) techniques which ensure privacy while using only one server and no dedicated hardware modules. Privacy is achieved with the help of encryption that relies on mathematical problems that are computationally intractable. We present an overview of the available cPIR techniques, we identify the major challenges of implementing such schemes, and we evaluate their relative performance. We provide an in-depth analysis of the strengths and weaknesses of cPIR solutions, and present scenarios where each technique is best suited.


international workshop on security | 2017

Security from Disjoint Paths: Is It Possible?

Sergiu Costea; Marios O. Choudary; Costin Raiciu

We propose a work-in-progress protocol to detect man-in-the-middle attacks during the communication between two parties, by leveraging the existence of disjoint paths between the communicating parties. Our protocol allows us to detect attackers either at the protocol level (through delay measurements) or at the user level (if the attackers tamper with the data).


international conference on control systems and computer science | 2015

Input Validation for the Laplace Differential Privacy Mechanism

Sergiu Costea; Nicolae Tapus

Privacy is an increasing concern as the number of databases containing personal information grows. Differential privacy algorithms can be used to provide safe database queries through the insertion of noise. Attackers cannot recover pieces of the initial data with certainty, but this comes at the cost of data utility. Noise insertion leads to errors, and signal to noise ratio can become an issue. In such cases, current differential privacy mechanisms cannot inform the end user that the sanitized data might not be reliable. We propose a new differential privacy algorithm that signals the user when relative errors surpass a predefined threshold. This allows users running complex differential privacy algorithms, such as sequence processing or geographical data analysis, to improve utility through better management of large errors. We prove that our algorithm satisfies differential privacy, and perform a formal analysis of its performance. Finally, we provide guidelines on how to customize behaviour to improve results.


2011 RoEduNet International Conference 10th Edition: Networking in Education and Research | 2011

MiriaPOD A distributed solution for virtual network topologies management

Sergiu Costea; Vlad Dumitrescu; Răzvan Rughiniş; Mihai Bucicoiu


international conference on networking | 2013

Qualitative analysis of differential privacy applied over graph structures

Sergiu Costea; Marian Barbu; Razvan Rughinis


2013 RoEduNet International Conference 12th Edition: Networking in Education and Research | 2013

Resource allocation heuristics for the miriaPOD platform

Sergiu Costea; Marian Barbu; Constantin Muraru; Razvan Rughinis


international conference on networking | 2015

Solving the Top-K problem for sequence counting using differential privacy

Sergiu Costea; Nicolae Tapus


international conference on networking | 2015

Implementation and optimization of a somewhat homomorphic encryption scheme

Andrei Ciocan; Sergiu Costea; Nicolae Tapus

Collaboration


Dive into the Sergiu Costea's collaboration.

Top Co-Authors

Avatar

Nicolae Tapus

Politehnica University of Bucharest

View shared research outputs
Top Co-Authors

Avatar

Razvan Rughinis

Politehnica University of Bucharest

View shared research outputs
Top Co-Authors

Avatar

Dumitru Marian Barbu

Politehnica University of Bucharest

View shared research outputs
Top Co-Authors

Avatar

Marian Barbu

Politehnica University of Bucharest

View shared research outputs
Top Co-Authors

Avatar

Gabriel Ghinita

University of Massachusetts Boston

View shared research outputs
Top Co-Authors

Avatar

Andrei Ciocan

Politehnica University of Bucharest

View shared research outputs
Top Co-Authors

Avatar

Costin Raiciu

Politehnica University of Bucharest

View shared research outputs
Top Co-Authors

Avatar

Marios O. Choudary

Politehnica University of Bucharest

View shared research outputs
Top Co-Authors

Avatar

Mihai Bucicoiu

Politehnica University of Bucharest

View shared research outputs
Top Co-Authors

Avatar

Răzvan Rughiniş

Politehnica University of Bucharest

View shared research outputs
Researchain Logo
Decentralizing Knowledge