first.last (at) unil.ch
I'm an assistant professor at the University of Lausanne in the School of Law, Criminal Justice and Public Administration working in security, privacy, and digital forensics, more specifically: anonymity networks (traffic analysis vulnerabilities of Tor hidden services), stylometry (authorship attribution based on writing style), cybercriminal networks, and social media based attacks with particular expertise and interest in using data science and machine learning methods to study security. Prior, I was a postdoctoral researcher at EPFL and a postdoctoral researcher in the Computer Security and Industrial Cryptography (COSIC) at KU Leuven in Belgium. I completed my Ph.D. in Computer Science at Drexel University in the College of Computing and Informatics under the direction of Rachel Greenstadt.
Research Output
- Breitinger, F. and Hilgert, J. and Hargreaves, C. and Sheppard, J. and Overdorf, R. Scanlon, M. DFRWS EU 10-year review and future directions in Digital Forensic Research. Forensic Science International: Digital Investigation. 2024
- Elmas, T. , Overdorf, R. , Akgül, Ö. F. , Aberer, K. Misleading Repurposing on Twitter. Proceedings of the International AAAI Conference on Web and Social Media, ICWSM 2023. 2023
- Gressel, C., Overdorf, R., Hagenstedt, I., Karaboga, M., Lurtz, H., Raschke, M., Bulling, A. Privacy-Aware Eye Tracking: Challenges and Future Directions. IEEE Pervasive Computing. 2023
- Elmas T., Ibanez T.R., Hutter A., Overdorf R., Aberer K. WayPop Machine: A Wayback Machine to Investigate Popularity and Root Out Trolls. Foundations of Open Source Intelligence and Security Informatics. 2022
- Elmas, T. , Overdorf, R. , Aberer, K. Characterizing Retweet Bots: The Case of Black Market Accounts. Proceedings of the International AAAI Conference on Web and Social Media. 2022
- Elmas T., Overdorf R., Aberer K. A Dataset of State-Censored Tweets. Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, ICWSM 2021. 2021
- Elmas T., Overdorf R., Özkalay A.F., Aberer K. Ephemeral Astroturfing Attacks: The Case of Fake Twitter Trends. IEEE European Symposium on Security and Privacy, EuroS&P. 2021
- Elmas T., Overdorf R., Aberer K. Tactical Reframing of Online Disinformation Campaigns Against The Istanbul Convention. Workshop on Data for the Wellbeing of Most Vulnerable (ICWSM Workshop). 2021
- Kulynych* B., Overdorf* R., Troncoso C., Gürses S.F. POTs: protective optimization technologies. FAT* '20: Conference on Fairness, Accountability, and Transparency. 2020
- Schwartz C., Overdorf R. Disinformation from the Inside: Combining Machine Learning and Journalism to Investigate Sockpuppet Campaigns. CyberSafety (The Web Conference Workshop). 2020
- Elmas T., Hardi K., Overdorf R., Aberer K. Can Celebrities Burst Your Bubble?. Innovative Ideas in Data Science (The Web Conference Workshop). 2020
- Overdorf R., Kulynych B., Gürses S. A guide to revolutionary counter-optimization. Internet Freedom Festival (IFF). 2019
- Schwartz C., Overdorf R. Subtle Censorship via Adversarial Fakeness in Kyrgyzstan. In Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs). 2019
- Gürses S., Overdorf R., Balsa E. POTs: The revolution will not be optimized?. Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs). 2018
- Overdorf R., Kulynych B., Balsa E., Troncoso C., Gürses S. Questioning the assumptions behind fairness solutions. Critiquing and Correcting Trends in Machine Learning (NeurIPS Workshop). 2018
- Overdorf R., Troncoso C., Greenstadt R., McCoy D. Under the Underground: Predicting Private Interactions in Underground Forums. 2018
- Dauber E., Overdorf R., Greenstadt R. Stylometric authorship Attribution of Collaborative Documents. Cyber Security Cryptography and Machine Learning, (CSCML). 2017
- Overdorf R., Juárez M., Acar G., Greenstadt R., Díaz C. How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion Services. ACM SIGSAC Conference on Computer and Communications Security, CCS. 2017
- Overdorf R., Greenstadt R. Blogs, Twitter Feeds, and Reddit Comments: Cross-domain authorship Attribution. Proceedings on Privacy Enhancing Technologies (PoPETs). 2016
- Garg V., Afroz S., Overdorf R., Greenstadt R. Computer-Supported Cooperative Crime. Financial Cryptography and Data Security (FC). 2015
- Stolerman A., Overdorf R., Afroz S., Greenstadt R. Breaking the Closed-World Assumption in Stylometric authorship Attribution. Advances in Digital Forensics X (IFIP WG). 2014
- Overdorf R., Dutko T., Greenstadt R. Blogs and Twitter Feeds: A Stylometric Environmental Impact Study. Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs). 2014
- Overdorf R., Islam A.C., Greenstadt R. Source Code and Cross Domain Stylometry. Role of Stylometry in Privacy. Chaos Communication Congress (CCC). 2014
- Overdorf R., Lang M. Reaching out to aid in retention: empowering undergraduate women. ACM Technical Symposium on Computer science Education (SIGCSE). 2011