Cybersecurity Research
Device-centric
Publications | |
---|---|
D-Score: An Expert-Based Method for Assessing the Detectability of IoT-Related Cyber-Attacks, Yair Meidan, Daniel Benatar, Ron Bitton, Dan Avraham, Asaf Shabtai: Computers & Security, Volume 126, March 2023 | |
Safe Reinforcement Learning using Data-Driven Predictive Control, Mahmoud Selim, Amr Alanwar, M Watheq El-Kharashi, Hazem M Abbas, Karl H Johansson: International Conference on Communications, Signal Processing, and their Applications, 27 – 29 December, 2022 |
|
Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems, Moshe Kravchik, Luca Demetrio, Battista Biggio, Asaf Shabtai: Computers & Security, Volume 122, November 2022 | |
Robust Data-driven Predictive Control Using Reachability Analysis, Amr Alanwar, Yvonne Sturz, Karl H Johansson: European Journal of Control, Volume 68, November 2022 | |
AC-SIF: ACE Access Control for Standardized Secure IoT Firmware Updates, Joel Höglund, Anum Khurshid, Shahid Raza: SECURWARE 2022, 16 – 20 Occtober 2022 | |
High-Level Synthesis design approach for Number-Theoretic Multiplier, Alexander El-Kady, Apostolos P. Fournaris, Evangelos Haleplidis, Vassilis Paliouras: 2022 IFIP/IEEE 30th International Conference on Very Large Scale Integration (VLSI-SoC), 3 – 5 October 2022 | |
Efficient abac based information sharing within mqtt environments under emergencies, Pietro Colombo, Elena Ferrari, and Engin Deniz Tu ̈mer: Computer & Security, Volume 120, September 2022 | |
ICN With DHT Support in Mobile Networks, Eryk Schiller, Timo Surbeck, Mikael Gasparyan, Burkhard Stiller, Torsten Braun: LCN’22 IEEE, 26 – 29 September 2022 | |
IoT device identification based on network communication analysis using deep learning, Jaidip Kotakm Yuval Elovici: Journal of Ambient Intelligence and Humanized Computing, 26 September 2022 | |
IoT-Based Access Management Supported by AI and Blockchains, Eryk Schiller, Elfat Esati, Burkhard Stiller: Electronics (2079-9292), 19 September 2022 | |
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack, Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici: Transactions on Information Forensics and Security, 24 August 2022 | |
CADeSH: Collaborative Anomaly Detection for Smart Homes, Yair Meidan, Dan Avraham, Hanan Libhaber, Asaf Shabtai: Internet of Things Journal, 28 July 2022 | |
Data-driven set-based estimation using matrix zonotopes with set containment guarantees, Amr Alanwar, Alexander Berndt, Karl Henrik Johansson, Henrik Sandberg: European Control Conference (ECC), 12 – 15 July 2022 | |
Data-driven Set-based Estimation of Polynomial Systems with Application to SIR Epidemics, Amr Alanwar, Muhammad Umar B Niazi, Karl H Johansson: European Control Conference (ECC), 12 – 15 July 2022 | |
Security Assurance in Modern IoT Systems, Nicola Bena, Ruslan Bondaruc, Antongiacomo Polimeno: 95th IEEE Vehicular Technology Conference 2022-Spring (IEEE VTC2022-Spring), workshop: 4th Workshop on Connected Intelligence for IoT and Industrial IoT Applications (C3IA), 19 -22 June 2022 | |
Scheduling Machine Learning Inference on CPU-GPU Integrated Architectures, Rafail Tsirbas, Giorgos Vasiliadis, Sotiris Ioannidis: 2022 Heterogeneity in Computing Workshop, 2 June 2022 | |
TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices, Anum Khurshid, Sileshi Demesie Yalew, Mudassar Aslam, Shahid Raza: Security and Communication Networks, 25 May 2022 | |
Landscape of IoT security, Eryk Schiller, Andy Aidoo, Jara Fuhrer, Jonathan Stahl, Michael Ziörjen, Burkhard Stiller: Computer Science Review (1574-0137), Volume 44, May 2022 | |
Toward a Live BBU Container Migration in Wireless Networks, Eryk Schiller, Jesutofunmi Ajayi, Silas Weber, Torsten Braun, Burkhard Stiller: Open Journal of the Communications Society, 10 February 2022 | |
Python-Based TinyIPFIX in Wireless Sensor Networks, Eryk Schiller, Ramon Huber, Burkhard Stiller: Electronics (2079-9292), 5 February 2022 | |
Fair and accurate age prediction using distribution aware data curation and augmentation, Cao, Y., Berend, D., Tolmach, P., Levy, M., Amit, G., Liu, Y., Shabtai A., and Elovici Y.: 2022 IEEE Winter Conference on Applications of Computer Vision (WACV), 4-8 January 2022 | |
ShieLD: Shielding Cross-zone Communication within Limited-resourced IoT Devices running Vulnerable Software Stack, Anum Khurshid, Sileshi Demesie Yalew, Mudassar Aslam, Shahid Raza: IEEE Transactions on Dependable and Secure Computing, 1 February 2022 | |
Towards an Assurance Framework for Edge and IoT Systems, Marco Anisetti, Claudio Ardagna, Nicola Bena, Ruslan Bondaruc: IEEE International Conference on Edge Computing 2021 (EDGE 2021), 18-20 December 2021 | |
Fault-Enabled Chosen-Ciphertext Attacks on Kyber, Julius Hermelink, Peter Pessl, and Thomas Poeppelmann: 22nd International Conference on Cryptology in India, 13-15 December 2021 | |
Security and Standardization of a Notary-based Blockchain Interoperability API, Eder John Scheid, Pascal Kiechl, Muriel Franco, Bruno Rodrigues, Christian Killer, Burkhard Stiller: 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA 2021), 15-17 November 2021 | |
SaCI: a Blockchain-based Cyber Insurance Approach for the Deployment and Management of a Contract Coverage , Muriel Franco, Noah Berni, Eder John Scheid, Bruno Rodrigues, Christian Killer, Burkhard Stiller: 8th International Conference on the Economics of Grids, Clouds, Systems and Services (GECON 2021), 3 November 2021 | |
IoT-based Access Management Supported by AI and Blockchains, Eryk Schiller, Elfat Esati, Burkhard Stiller: 17th International Conference on Network and Service Management, 25-29 October 2021 | |
High-Level Synthesis design approach for Number-Theoretic Transform Implementations, Alexander ElKady, Apostolos P. Fournaris, Thanasis Tsakoulis, Haleplidis Evangelos, Vassilis Paliouras: 29th IFIP/IEEE International Conference on Very Large Scale Integration, 4-8 October 2021 | |
Python-Based TinyIPFIX in Wireless Sensor Networks, Eryk Schiller, Ramon Huber, Burkhard Stiller: IEEE 46th Conference on Local Computer Networks (LCN), 4-7 October 2021 | |
A comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective, Daniel Schlette, Marco Caselli, Günther Pernul: IEEE Communications Surveys & Tutorials, 4 October 2021 | |
Revisiting RPKI Route Origin Validation on the Data Plane,Rodday, N., Cunha, Í., Bush, R., Katz-Bassett, E., Rodosek, G.D., Schmidt, T.C. and Wählisch, M. : In Proc. of Network Traffic Measurement and Analysis Conference (TMA), IFIP, September 14-15, 2021 | |
Security Certification Scheme for Content-centric Networks, Marco Anisetti, Claudio Ardagna, Filippo Berto, Ernesto Damiani: IEEE International Conference on Services Computing 2021 (SCC 2021), 5-11 September 2021 | |
An Assurance-Based Risk Management Framework for Distributed Systems, Marco Anisetti, Claudio A. Ardagna. Nicola Bena, Andrea Foppiani: IEEE International Conference on Web Services 2021 (ICWS 2021), 5-11 September 2021 | |
Blockchain-based Privacy Enforcement in the IoT domain, Federico Daidone , Barbara Carminati and Elena Ferrari: IEEE Transactions on Dependable and Secure Computing, IEEE, 03 September 2021 | |
Studying OpenCL-based Number Theoretic Transform for heterogeneous platforms, Evangelos Haleplidis, Thanasis Tsakoulis, Alexander El-Kady, Charis Dimopoulos, Odysseas Koufopavlou, Apostolos P. Fournaris: 2021 24th Euromicro Conference on Digital System Design (DSD), 1-3 September 2021 | |
Machine Learning Attacks and Countermeasures on Hardware Binary Edwards Curve Scalar Multipliers, Charis Dimopoulos, Apostolos P. Fournaris, Odysseas Koufopavlou: Journal of Sensor and Actuator Networks, 16 August 2021 | |
On the Deployment of Default Routes in Inter-domain Routing,Rodday, N., Kaltenbach, L., Cunha, I., Bush, R., Katz-Bassett, E., Rodosek, G.D., Schmidt, T.C. and Wählisch, M. : In Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a Responsible Internet (pp. 14-20), August 2021 | |
Hard edges: Hardware-based Control-Flow Integrity for Embedded Devices, George Christou, Giorgos Vasiliadis, Elias Athanasopoulos, Sotiris Ioannidis: International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation, 5 July 2021 | |
Applying Metamorphic Testing to Homomorphic Cryptography, M. Wolf, J. Schönwälder: 6th IEEE/ACM International Workshop on Metamorphic Testing (MET 2021), 2 June 2021 | |
Edge2BC: a Practical Approach for Edge-to-Blockchain IoT Transactions, Eder John Scheid, Andreas Knecht, Tim Strasser, Christian Killer, Muriel Franco, Bruno Rodrigues, Burkhard Stiller: IEEE International Conference on Blockchain and Cryptocurrency 2021, 3-6 May 2021 | |
From Trustworthy Data to Trustworthy IoT: A Data Collection Methodology Based on Blockchain, Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Mehdi Elahi, Claus Pahl: ACM Transactions on Cyber-Physical Systems, Issue March 2021 | |
DeepStream: Autoencoder-Based Stream Temporal Clustering, Harush, s., Meidan, Y., and Shabtai, A.:SAC’2021: The 36th ACM/SIGAPP Symposium On Applied Computing, 22-26 March 2021 | |
Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems, Kravchik, M., Biggio, B., Shabtai, A.: SAC’2021: The 36th ACM/SIGAPP Symposium On Applied Computing, 22-26 March 2021 | |
Blockchain-based Bug Bounty Framework, Badash, L., Tapas, N., Nadler, A., Longo, F., Puliafito, A., Shabtai, A.: SAC’2021: The 36th ACM/SIGAPP Symposium On Applied Computing, 22-26 March 2021 | |
Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA,Kravchik, M., Shabtai, A.:IEEE TDSC: Transactions on Dependable and Secure Computing, 08 January 2021 | |
Regulating data sharing across MQTT environments, Colombo Pietro, Elena Ferrari, and Engin Deniz Tümer: Journal of Network and Computer Applications, Elsevier, Volume 174, 15 January 2021 | |
Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware Eva Papadogiannaki, Sotiris Ioannidis: Sensors 21 (4), 1140. January 2021 | |
Requirements and Challenges for Secure and Trustworthy UAV Collaboration, Marco Anisetti, Claudio A. Ardagna, Barbara Carminati, Elena Ferrari, Cora Perner:2020 IEEE CIC/CogMI/TPS Joint Conferences, 1-3 December 2020 | |
Blockchain on MSP430 with IEEE 802.15.4, Eryk Schiller, Elfat Esati, Sina Rafati Niya, Burkhard Stiller: The 45th IEEE Conference on Local Computer Networks (LCN),November 16-19, 2020 | |
KYoT: Self-Sovereign IoT Identification with A Physically Unclonable Function,Sina Rafati Niya, Benjamin Jeffrey, Burkhard Stiller: The 45th IEEE Conference on Local Computer Networks (LCN),November 16-19, 2020 | |
A novel approach for detecting vulnerable IoT devices connected behind a home NAT, Yair Meidan, Vinay Sachidananda, Hongyi Peng, Racheli Sagron, Yuval Elovici, Asaf Shabtai: Computers & Security, October 2020 | |
Helix: DGA Domain Embeddings for Tracking and Exploring Botnets, Sidi, L., Mirsky, Y., Nadler, A., Elovici, Y. and Shabtai, A.: Proceedings of the 29th ACM International Conference on Information & Knowledge Management October 2020 Pages 2741–2748 | |
UZH Spotting political social bots in Twitter: A use case of the 2019 Spanish general election, Javier Pastor, Mattia Zago, Pantaleone Nespoli, Sergio López, Alberto Huertas, Manuel Gil, José A. Ruipérez, Gregorio Martínez, Félix Gómez :EEE Transactions on Network and Service Management, October 2020 | |
Be Your Neighbor’s Miner: Building Trust in Ledger Content via Reciprocally Useful Work,Lara Mauri, Ernesto Damiani, Stelvio Cimato: 2020 IEEE 13th International Conference on Cloud Computing (CLOUD), 18-24 October 2020 | |
IoT Device Identification Using Deep Learning, Jaidip Kotak, Yuval Elovici: 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020), 16-18 September 2020 | |
MaskDGA: An Evasion Attack Against DGA Classifiers and Adversarial Defenses,Sidi, L., Nadler, A., Shabtai, A.:IEEE Access, 10 September 2020 | |
Mining and Monitoring Darknet Traffic, Dvir Cohen, Yisroel Mirsky, Manuel Kamp, Tobias Martin, Yuval Elovici, Rami Puzis, Asaf Shabtai: European Symposium on Research in Computer Security (ESORICS), 14-18 September 2020 | |
Enabling Digital Forensics Readiness for Internet of Vehicles, Alexakos C., Katsini, C., Votis K., Lalas A., Tzovaras D., Serpanos D:23rd EURO Working Group on Transportation Meeting, EWGT 2020, September 2020 | |
Real-time Thread Isolation and Trusted Execution on Embedded RISC-V,Samuel Lindemer, Gustav Midéus, Shahid Raza:First International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V’20), 23 August 2020 | |
When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures, Gil Fidel, Ron Bitton, Asaf Shabtai: International Joint Conference on Neural Networks (IJCNN), 19-24 July 2020 | |
Stay Thrifty, Stay Secure: A VPN-Based Assurance Framework for Hybrid Systems, Marco Anisetti, Claudio A. Ardagna, Nicola Bena, Ernesto Damiani: 17th International Conference on Security and Cryptography (SECRYPT 2020), July 2020 | |
Towards Efficient and Secure Analysis of Large Datasets,Stelvio Cimato, Stefano Nicolò: 44th IEEE Annual Computers, Software, and Applications Conference (COMPSAC 2020), 13-17 July 2020 | |
Mammoth: Monitoring the ABAC Monitor of MQTT-based Internet of Things ecosystems, Pietro Colombo, Elena Ferrari, Samuele Salvia: The 25th ACM Symposium on Access Control Models and Technologies (SACMAT 2020), 10-12 June 2020 | |
A Resource Efficient Implementation of the RESTCONF Protocol for OpenWrt Systems, Malte Granderath, Jürgen Schönwälder: IEEE/IFIP Network Operations and Management Symposium (NOMS), June 2020 | |
Decentralized, Secure and Cognitive Architecture for Automotive CyberPhysical System of Systems, Apostolos Fournaris, Aris Lalos, Petros Kapsalas, Christos Koulamas:8th International Conference on Cyber-Physical Systems and Internet-of-Things (CPS&IoT’2020), June 2020 | |
Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices, Apostolos P. Fournaris, Charis Dimopoulos, Konstantinos Lampropoulos, Odysseas Koufopavlou : Sensors, May 2020 | |
ELSA: efficient long-term secure storage of large datasets, Philipp Muth, Matthias Geihs, Tolga Arul, Johannes Buchmann, Stefan Katzenbeisser: EURASIP Journal on Information Security, 1 May 2020 | |
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem, Stelvio Cimato, Gabriele Gianini, Maryam Sepehri, Rasool Asal, Ernesto Damiani: Journal of Information Security and Applications, April 2020 | |
An enclave assisted snapshot-based kernel integrity monitor, Deyannis Dimitris, Dimitris Karnikis, Giorgos Vasiliadis, and Sotiris Ioannidis: In Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking, pp. 19-24. April 2020 | |
BIIT: Standardization of Blockchain-based I2oT Systems in the I4 Era, Sina Rafati-Niya, Eryk Schiller, Ile Cepilov, Burkhard Stiller: IEEE/IFIP Network Operations and Management Symposium (NOMS 2020), 20-24 April 2020 | |
Trustav: Practical and privacy preserving malware analysis in the cloud, Deyannis Dimitris, Eva Papadogiannaki, Giorgos Kalivianakis, Giorgos Vasiliadis, and Sotiris Ioannidis: In Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, pp. 39-48. March 2020 | |
Creating Trusted Security Sensors for Anomaly Detection Systems using Hardware components, Apostolos Fournaris, Charis Dimopoulos, and Odysseas Koufopavlou:TRUDEVICE 2020: Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, Design, Automation and Test in Europe Conference (DATE 2020), March 2020 | |
Reining in the Web’s Inconsistencies with Site Policy,S. Calzavara, T. Urban, D. Tatang, M. Steffens, and B. Stock:Network and Distributed System Security Symposium (NDSS), 23-26 February 2020 | |
Privacy Preservation in Industrial IoT via Fast Adaptive Correlation Matrix Completion, Aris S. Lalos, Evangelos Vlachos, K. Berberidis, Apostolos Fournaris, Christos Koulamas:IEEE Transactions on Industrial Informatics, December 2019 | |
Secure Semantic Interoperability for IoT Applications with Linked Data, G. Hatzivasilis, O. Soultatos, E. Lakka, S. Ioannidis, D. Anicic, A. Broring, L. Ciechomski, M. Falchetto, K. Fysarakis, G. Spanoudakis: IEEE Global Communications Conference (GLOBECOM 2019), IEEE, Waikoloa, HI, USA, 9- 13 December, 2019, pp. 1-7 | |
Attacking SRAM PUFs using very-low-temperature data remanence, Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Markus Rosenstihl, André Schaller, Sebastian Gabmeyer, Stefan Katzenbeisser: Microprocessors and Microsystems, volume 71, page 102,864, 1 November 2019 |
|
“https://doi.org/10.1109/ISSREW.2019.00110″>A Proposal for Security Assessment of Trustzone-M based Software, Antonio Ken Iannillo, Radu State:Fast Abstract at the 30th International Symposium on Software Reliability Engineering (ISSRE 2019),28-31 October 2019, Berlin, Germany | |
Scalable Transport Mechanisms for Blockchain IoT Applications, Eryk Schiller, Sina Rafati Niya, Timo Surbeck, Burkhard Stiller: 2019 IEEE 44th Conference on Local Computer Networks (LCN) (LCN 2019), 14-17 October, 2019, Osnabrück, Germany | |
End-to-End Semantic Interoperability Mechanisms for IoT,E. Lakka, N. E. Petroulakis, G. Hatzivasilis, O. Soultatos, M. Michalodimitrakis, U. Rak, K. Waledzik, D. Anicic, V. Kulkarni:24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2019), IEEE, Limassol, Cyprus, 11-13 September, 2019, pp. 1-6. | |
Reconfiguring the Functionality of IoT Edge/End nodes using FPGA based System on Chips, Apostolos P. Fournaris, Aris Lalos and Christos Koulamas:First international conference on Societal Automation conference, September 2019 | |
MobileTrust: Secure Knowledge Integration in VANETs, G. Hatzivasilis, O. Soultatos, S. Ioannidis, G. Spanoudakis, V. Katos, G. Demetriou: ACM Transactions on Cyber-Physical Systems Special Issue on User-Centric Security and Safety for Cyber-Physical Systems, ACM, vol., pp., September 2019 | |
Generative Adversarial Networks in AI-Enabled Safety-Critical Systems: Friend or Foe?, A. P. Fournaris, A. S. Lalos and D. Serpanos:IEEE Computer, August2019 | |
Robust and Efficient Privacy Preservation in Industrial IoT via correlation completion and tracking, Aris S. Lalos, Evangelos Vlachos, Konstantinos Berberidis, Apostolos Fournaris, Christos Koulamas:2019 IEEE 17th International Conference on Industrial Informatics (INDIN), 22-25 July 2019 | |
Trustworthy IoT: An Evidence Collection Approach based on Smart Contracts, Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Claus Pahl: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy | |
A trust assurance technique for Internet of things based on human behavior compliance, Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Alessandro Sala:Concurrency and Computation: Practice and Experience, June 2019 | |
Adaptation of Proof-of-Stake-based Blockchains for IoT Data Streams (Demo),Sina Rafati Niya, Eryk Schiller, Ile Cepilov, Fabio Maddaloni, Timo Surbeck, Kürsat Aydinli, Thomas Bocek, Burkhard Stiller:1st IEEE International Conference on Blockchains and Cryptocurrencies (ICBC 2019), Seoul, South Korea, May 2019, pp 15-16 | |
Revisiting Rowhammer Attacks in Embedded Systems, Lidia Pocero Fraile, Apostolos P. Fournaris, Odysseas Koufopavlou: 14th IEEE International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 16-18 April 2019, Mykonos, Greece | |
AR-PUFs: Advanced Security Primitives for the Internet of Things and Cyber-Physical Systems, Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Yufan Fan, Manish Kumar, Stefan Katzenbeisser: IEEE International Conference on Consumer Electronics, 11-13 January 2019 |
Network-centric
Publications | |
---|---|
Event-Flow Correlation for Anomaly Detection in HTTP/3 Web Traffic, Stanislav Špaček, Petr Velan, Martin Holkovič and Tomáš Plesník: NOMS 2023 – IEEE/IFIP Network Operations and Management Symposium, February 2023 | |
VeNiCE: Enabling Automatic VNF Management based on Smart Contract Events, Eder J. Scheid, Muriel F. Franco, Fabian Kuffer, Niels Kubler, Pascal Kiechl, Burkhard Stiller: 47th IEEE Conference on Local Computer Networks (LCN 2022), 26-29 September 2022 | |
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations, Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák: The 17th International Conference on Availability, Reliability and Security (ARES 2022), 23-26 August 2022 | |
Ethereum’s Peer-to-Peer Network Monitoring and Sybil Attack Prevention, Jean-Philippe Eisenbarth, Thibault Cholez, Olivier Perrin: Journal of Network and Systems Management, 29 July 2022 | |
Network Intrusion Detection in Encrypted Traffic, Eva Papadogiannaki, Giorgos Tsirantonakis, Sotiris Ioannidis: IEEE DSC 2022, 22 – 24 June 2022 | |
Identification of Attack Paths Using Kill Chain and Attack Graphs, Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák: NOMS 2022 – 2022 IEEE/IFIP Network Operations and Management Symposium, 25-29 April 2022 | |
HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic, Stanislav Špaček, Petr Velan, Pavel Čeleda, Daniel Tovarňák: Network Operations and Management Symposium 2022, 25-29 April 2022 | |
Fault-Enabled Chosen-Ciphertext Attacks on Kyber, Julius Hermelink, Peter Pessl, and Thomas Poeppelmann: 22nd International Conference on Cryptology in India, 13-15 December 2021 | |
Do You Really Like Me? Anycast Latency and Root DNS Popularity, John Heidemann(USC/ISI, USC/Computers) Giovane Moura (SIDN Labs), Wes Hardaker (USC/ISI): DINR 2021 Workshop, 16-17 November 2021 | |
Forecasting the Impact of IXP Outages Using Anycas, Bertholdo, Leandro M and Ceron, Joao M and Granville, Lisandro Z and van Rijswijk-Deij, Roland: In Proceedings of the 2021 Network Traffic Measurement and Analysis Conference (TMA 2021), 4 November 2021 | |
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure, Raffaele Sommese, Gautam Akiwate, Mattijs Jonker, Giovane C. M. Moura, Marco Davids, Roland van Rijswijk-Deij, Geoffrey M. Voelker, Stefan Savage, K.C. Claffy, Anna Sperotto: In Proceedings of the 2021 Network Traffic Measurement and Analysis Conference (TMA 2021), 4 November 2021 | |
SaCI: a Blockchain-based Cyber Insurance Approach for the Deployment and Management of a Contract Coverage , Muriel Franco, Noah Berni, Eder John Scheid, Bruno Rodrigues, Christian Killer, Burkhard Stiller: 8th International Conference on the Economics of Grids, Clouds, Systems and Services (GECON 2021), 3 November 2021 | |
tsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS, Giovane Moura, Sebastian Castro, John Heidemann Wes Hardaker: ACM Internet Measurement Conference 2021, 2-4 November 2021 | |
ANYway: Measuring the Amplification DDoS Potential of Domains, Olivier van der Toorn, Johannes Krupp, Mattijs Jonker, Roland van Rijswijk-Deij, Christian Rossow, Anna Sperotto: In Proceedings of the 17th International Conference on Network and Service Management (CNSM 2021), 14 October 2021 | |
On the Employment of Machine Learning in the Blockchain Selection Process, Eder J. Scheid, Ratanak Hy, Muriel F. Franco, Christian Killer, Burkhard Stiller: IEEE Transactions on Network and Service Management, 10 October 2022 | |
SecGrid: A Visual System for the Analysis and ML-Based Classification of Cyberattack Traffic, Muriel Franco, Jan Von der Assen, Luc Boillat, Christian Killer, Bruno Rodrigues, Eder John Scheid, Lisandro Granville, Burkhard Stiller: IEEE 46th Conference on Local Computer Networks (LCN 2021), 4-7 October 2021 | |
A comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective, Daniel Schlette, Marco Caselli, Günther Pernul: IEEE Communications Surveys & Tutorials, 4 October 2021 | |
The Far Side of DNS Amplification: Tracing the DDoS Attack Ecosystem from the Internet Core, Marcin Nawrocki, Mattijs Jonker, Thomas C. Schmidt, Matthias Wählisch: In Proceedings of the 2021 Internet Measurement Conference (IMC 2021), September 2021 | |
A Comprehensive Study of the Bitcoin P2P Network, Jean-Philippe Eisenbarth, Thibault Cholez, Olivier Perrin: 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 27-30 September 2021 | |
Forecasting the Impact of IXP Outages Using Anycast, Leandro M. Bertholdo (Universiteit Twente), João M. Ceron (SIDN Labs), Lisandro Z. Granville (Federal University of Rio Grande do Sul), Roland van Rijswijk-Deij(NLnet Labs): Network Traffic Measurement and Analysis Conference 2021, September 14-15, 2021 |
|
Revisiting RPKI Route Origin Validation on the Data Plane,Rodday, N., Cunha, Í., Bush, R., Katz-Bassett, E., Rodosek, G.D., Schmidt, T.C. and Wählisch, M. : In Proc. of Network Traffic Measurement and Analysis Conference (TMA), IFIP, September 14-15, 2021 | |
On the Deployment of Default Routes in Inter-domain Routing,Rodday, N., Kaltenbach, L., Cunha, I., Bush, R., Katz-Bassett, E., Rodosek, G.D., Schmidt, T.C. and Wählisch, M. : In Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a Responsible Internet (pp. 14-20), August 2021 | |
A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures, Eva Papadogiannaki and Sotiris Ioannidis: ACM Computing Surveys, Volume 54, Issue 6, Article No: 123, pp 1-35, 13 July 2021 | |
Tangled: A cooperative anycast testbed, Bertholdo, Leandro M and Ceron, Joao M and de Vries, Wouter B and de Oliveira Schmidt, Ricardo and Granville, Lisandro Zambenedetti and van Rijswijk-Deij, Roland and Pras, Aiko: In Proceedings of the 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM 2021), 30 June 2021 | |
Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption, Stanislav Špaček, Daniel Tovarňák, Pavel Čeleda: IFIP International Conference on ICT Systems Security and Privacy Protection, 22–24 June 2021 | |
Non-IID Data Re-balancing at IoT Edge with Peer-to-peer Federated Learning for Anomaly Detection,Han Wang, Luis Muñoz-González, David Eklund, Shahid Raza: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’21), June 2021 | |
Tangled: A Cooperative Anycast Testbed, Leandro M. Bertholdo (Universiteit Twente) , Joao M. Ceron (SIDN Labs) , Wouter B. de Vries (Tesorion) , Ricardo de Oliveira Schmidt (University of Passo), Lisandro Zambenedetti Granville (Federal University of Rio Grande do Sul), Roland van Rijswijk-Deij (Universiteit Twente), Aiko Pras (Universiteit Twente): 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM 2021), experience track (best experience paper award), 17-21 May 2021 | |
An open measurement dataset on the Bitcoin P2P Network, Jean-Philippe Eisenbarth, Thibault Cholez, Olivier Perrin :IM 2021 – The 17th IFIP/IEEE International Symposium on Integrated Network Management, 17-21 May 2021 | |
Fragmentation, truncation, and timeouts: are large DNS messages falling to bits?, Giovane C. M. Moura, Moritz Müller, Marco Davids, Maarten Wullink, Cristian Hesselman: Passive and Active Measurement Conference 2021, 29-31 March 2021 |
|
Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware Eva Papadogiannaki, Sotiris Ioannidis: Sensors 21 (4), 1140. January 2021 | |
Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space, Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez, Olivier Bettan:Proceedings of the 12th IEEE International Workshop on Information Forensics and Security (WIFS) 2020, 6-11 December 2020 | |
Provotum: A Blockchain-Based and End-To-End Verifiable Remote Electronic Voting System, Christian Killer, Bruno Rodrigues, Eder Scheid, Muriel Franco, Moritz Eck, Nik Zaugg, Alex Scheitlin, Burkhard Stiller: 45th Conference on Local Computer Networks (LCN), November 16-19, 2020 | |
OpenMTD: A Framework for Efficient Network-Level MTD Evaluation, Richard Poschinger, Nils Rodday, Raphael Labaca Castro, Gabi Dreo Rodosek: ACM 27th Conference on Computer and Communications Security (CCS) – MTD Workshop, 9-13 November 2020 | |
BGP Anycast Tuner: Intuitive Route Management for Anycast Services, L. Bertholdo, J. Ceron, L. Granvillez, G. Moura, C. Hesselman, and R. van Rijswijk-Deij:16th International Conference on Network and Service Management (CNSM), 2-6 November 2020 | |
SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management, Muriel Franco, Bruno Rodrigues, Eder Scheid, Arthur Jacobs, Christian Killer, Lisandro Granville, Burkhard Stiller: 16th International Conference on Network and Service Management (CNSM 2020), 2-6 November 2020 | |
Retrofitting Post-Quantum Cryptography in Internet Protocols: A Case Study of DNSSEC, M. Müller, J. de Jong, M. van Heesch, B. Overeinder & R. van Rijswijk-Deij: ACM SIGCOMM Computer Communication Review, October 2020 | |
The Reality of Algorithm Agility: Studying the DNSSEC Algorithm Life-Cycle,Moritz Muller, Willem Toorop, Taejoong Chung, Jelte Jansen, and Roland van Rijswijk-Deij: In Proceedings of ACM Internet Measurement Conference(IMC 2020), 27-29 October 2020 | |
UZH Spotting political social bots in Twitter: A use case of the 2019 Spanish general election, Javier Pastor, Mattia Zago, Pantaleone Nespoli, Sergio López, Alberto Huertas, Manuel Gil, José A. Ruipérez, Gregorio Martínez, Félix Gómez :EEE Transactions on Network and Service Management, October 2020 | |
ProtectDDoS: A Platform for Trustworthy Offering and Recommendation of Protections, Muriel Franco, Erion, Sula, Bruno Rodrigues, Eder Scheid, Burkhard Stiller: International Conference on Economics of Grids, Clouds, Software and Services (GECON 2020), 15-17 September 2020 | |
Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures, Eva Papadogiannaki, Dimitris Deyannis, Sotiris Ioannidis: IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD2020), 14-16 September 2020 | |
Blockchain Signaling System (BloSS): Cooperative Signaling of Distributed Denial-of-Service Attacks, Bruno Rodrigues, Eder Scheid, Christian Killer, Muriel Franco, Burkhard Stiller: Journal of Network and Systems Management (JNSM) 2020, 24 August 2020 | |
Proverum: A Hybrid Public Verifiability and Decentralized Identity Management, Christian Killer, Lucas Thorbecke, Bruno Rodrigues, Eder Scheid, Muriel Franco, Burkhard Stiller: Cryptography and Security (cs.CR), 22 August 2020 | |
Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries, Sean Rivera, Vijay Gurbani, Sofiane Lagraa, Antonio Ken Iannillo and Radu State: ARES 2020/CUING 2020, August 2020 | |
The DNS in IoT: Opportunities, Risks, and Challenges, C. Hesselman, M. Kaeo, L. Chapin, kc claffy, M. Seiden, D. McPherson, D. Piscitello, A. McConachie, T. April, J. Latour, and R. Rasmussen:IEEE Internet Computing, Vol. 24 , No. 4 , July-Aug 2020 | |
A Practical Analysis on Mirai Botnet Traffic, Getoar Gallopeni, Bruno Rodrigues, Muriel Franco, Burkhard Stiller: IFIP Networking 2020, June 22 – 25, 2020 | |
Multi-Sector Assessment Framework – A New Approach to Analyze Cybersecurity Challenges and Opportunities,Salvatore Marco Pappalardo, Marcin Niemiec, Maya Bozhilova, Nikolai Stoianov, Andrzej Dziech, Burkhard Stiller:10th International Conference on Multimedia Communications, Services, and Security (MCSS 2020),18-19 June 2020 | |
SC-FLARE: Cooperative DDoS Signaling based on Smart Contracts,Bruno Rodrigues, Spasen Trendafilov, Eder Scheid, Burkhard Stiller: IEEE International Conference on Blockchain and Cryptocurrency 2-6 May 2020, Virtual Conference | |
Using TLS Fingerprints for OS Identification in Encrypted Traffic, Martin Lastovicka, Stanislav Spacek, Petr Velan, Pavel Celeda: NOMS 2020 – 2020 IEEE/IFIP Network Operations and Management Symposium, 20-24 April 2020 | |
Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD, C. Dietz, G. Dreo Rodosek, A. Sperotto, A. Pras: IEEE/IFIP Network Operations and Management Symposium (NOMS 2020), 20-24 April 2020 | |
Distributed DDoS Defense: A Collaborative Approach at Internet Scale, Jessica Steinberger, Anna Sperotto, Aiko Pras, Harald Baier: 2020 IEEE/IFIP Network Operations and Management Symposium, 20-24 April 2020 | |
DDoS Mitigation: A Measurement-Based Approach, Mattijs Jonker, Anna Sperotto, Aiko Pras: 2020 IEEE/IFIP Network Operations and Management Symposium, 20-24 April 2020 | |
Reliable measurements with BGP and RPKI, Mattijs Jonker, Nils Rodday: IEEE/IFIP Network Operations and Management Symposium (NOMS), 20-24 April 2020 | |
Blockchains in the Age of Softwarization – Hands-on Experiences with Programming Smart Contracts and Their Security Pitfalls, Bruno Rodrigues, Eder Scheid, Burkhard Stiller:IEEE/IFIP Network Operations and Management Symposium (NOMS),20-24 April 2020, Virtual Conference | |
WeTrace: Privacy-preserving Mobile COVID-19 Tracing Approach and Application,Alessandro De Carli, Muriel Franco, Andreas Gassmann, Christian Killer, Bruno Rodrigues, Eder John Scheid, David Schoenbaechler, Burkhard Stille: Whitepaper , April 2020 | |
Design and implementation of cast-as-intended verifiability for a blockchain-based voting system, Christian Killer, Bruno Rodrigues, Raphael Matile, Eder Scheid, Burkhard Stiller:SAC ’20: Proceedings of the 35th Annual ACM Symposium on Applied Computing,March 30-April 3, 2020, Virtual Conference | |
State Channel as a Service based on a Distributed and Decentralized Web,Blaž Podgorelec, Marjan Heričko, Muhamed Turkanović:IEEE Access,30 March 2020 | |
Looking Beyond the Horizon: Thoughts on Proactive Detection of Threats, Olivier van der Toorn, Anna Sperotto: Digital Threats: Research and Practice, March 2020 | |
A Novel Intrusion Detection System Against Spoofing Attacks in Connected Electric Vehicles, Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyiannis, Francisco J. Navarro, Antonios Argyriou and Helge Janicke: Array, Volume 5, March 2020 | |
ARIMA Supplemented Security Metrics for Quality Assurance and Situational Awareness,Jan Kohlrausch and Eugene A. Brin:ACM DTRAP Journal Vol 1 No 1,March 2020 | |
Evaluating TCP Connection Healthiness, Nils Rodday, Raphael Labaca Castro, Klement Streit and Gabi Dreo Rodosek: International Telecommunication Networks and Applications Conference ITNAC 2019, 27-29 November 2019, Auckland, New Zealand | |
Machine Learning for Security at the IoT Edge – A Feasibility Study, Han Wang, Luis Barriga, Arash Vahidi, Shahid Raza: International Workshop on Machine Learning Security and Privacy: Experiences and Applications, 4 – 7 November 2019, Monterey, CA, USA | |
MENTOR: The Design and Evaluation of a Protection Services Recommender System, Muriel Franco, Bruno Rodrigues, Burkhard Stiller: 15th International Conference on Network and Service Management (CNSM 2019), 21-25 October, 2019, Halifax, Canada | |
DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown, Daniel Kopp, Matthias Wichtlhuber, Ingmar Poese, Jair Santanna, Oliver Hohlfeld, and Christoph Dietzel:Internet Measurement Conference (IMC ’19), 21-23 October 2019, Amsterdam, Netherlands | |
RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins, Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John Rula, and Nick Sullivan:Internet Measurement Conference (IMC ’19), 21-23 October 2019, Amsterdam, Netherlands | |
Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover, Moritz Müller, Matthew Thomas, Duane Wessels, Wes Hardaker, Taejoong Chung, Willem Toorop, and Roland van Rijswijk-Deij:Internet Measurement Conference (IMC ’19) Distinguished paper award, 21-23 October 2019, Amsterdam, Netherlands | |
Wireless SDN for Highly Utilized MANETs, Klement Streit, Nils Rodday, Florian Steuber, Corinna Schmitt, Gabi Dreo Rodosek:6th Workshop: ICT Systems for Public Protection and Risk Reduction at the International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2019), 21-23 October, Barcelona, Spain | |
Analysis of Fault Tolerance in Permissioned Blockchain Networks, Blaž Podgorelec, Vid Keršič and Muhamed Turkanović: ICAT-BCTA 2019, 20-23 October 2019, Sarajevo, Bosnia and Herzegovina | |
Cooperative Signaling of DDoS Attacks in a Blockchain-based Network, Bruno Rodrigues, Burkhard Stiller: ACM SIGCOMM 2019 Conference (SIGCOMM Posters and Demos ’19), 19-24 August, 2019, Beijing, China | |
Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic, Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez and Olivier Bettan:IEEE Transactions on Network and Service Management, 05 August 2019 | |
At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes, P. Lutscher, Nils Weidmann, Molly E. Roberts, M. Jonker, A. King, A. Dainotti:Journal of Conflict Resolutions, July 2019 |
Software/System-centric
Publications | |
---|---|
Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud (Poster), Salman Manzoor, Antonios Gouglidis, Matthew Bradbury and Neeraj Suri: ACM Conference on Computer and Communications Security (CCS), 7-11 November 2022 | |
Multi-Layer Threat Analysis of the Cloud (Poster), Salman Manzoor, Antonios Gouglidis, Matthew Bradbury and Neeraj Suri: ACM Conference on Computer and Communications Security (CCS), 7-11 November 2022 | |
Towards Effective Performance Fuzzing (fast abstract), Yiqun Chen, Matthew Bradbury and Neeraj Suri: International Symposium on Software Reliability Engineering (ISSRE), 31 October – 3 November 2022 | |
SlowCoach: Mutating Code to Simulate Performance Bugs, Yiqun Chen, Oliver Schwahn, Roberto Natella, Matthew Bradbury, Neeraj Suri: International Symposium on Software Reliability Engineering (ISSRE), 31 October – 3 November 2022 | |
HA-Grid: Security Aware Hazard Analysis for Smart Grids, L. Castiglione, Z. Hau, P. Ge, L. Munoz-Gonzalez, K.T. Co, F. Teng, E. C. Lupu: IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 25–28 October 2022 | |
Understanding the confounding factors of inter-domain routing modeling (Poster), Savvas Kastanakis, Vasilios Giotsas and Neeraj Suri: Internet Measurement Conference (IMC), 25 – 27 October 2022 | |
A Bayesian Model Combination based approach to Active Malware Analysis, Abhilash Hota, J. Schönwälder: 2022 IEEE International Conference on Cyber Security and Resilience (CSR), 27 – 29 July 2022 | |
Assessing the RPKI Validator Ecosystem, Paul Henry Friedemann, Nils Rodday, and Gabi Dreo Rodosek: 2022 IEEE 13th International Conference on Ubiquitous and Future Networks (ICUFN), 5 -8 July 2022 | |
Fault-Enabled Chosen-Ciphertext Attacks on Kyber, Julius Hermelink, Peter Pessl, and Thomas Poeppelmann: 22nd International Conference on Cryptology in India, 13-15 December 2021 | |
Challenges in Identifying Network Attacks Using Netflow Data, Edward Chuah, Neeraj Suri, Arshad Jhumka and Samantha Alt: IEEE International Symposium on Network Computing and Applications (NCA), 23-26 November 2021 | |
PCaaD: Towards automated determination and exploitation of industrial systems, B. Green, R. Derbyshire, M. Krotofil, W. Knowles, D. Prince, N. Suri: Elsevier computers & security, Volume 110, November 2021, | |
SaCI: a Blockchain-based Cyber Insurance Approach for the Deployment and Management of a Contract Coverage , Muriel Franco, Noah Berni, Eder John Scheid, Bruno Rodrigues, Christian Killer, Burkhard Stiller: 8th International Conference on the Economics of Grids, Clouds, Systems and Services (GECON 2021), 3 November 2021 | |
A comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective, Daniel Schlette, Marco Caselli, Günther Pernul: IEEE Communications Surveys & Tutorials, 4 October 2021 | |
Failure Diagnosis for Cluster Systems using Partial Correlations, Edward Chuah, Arshad Jhumka, Samantha Alt, Todd Evans, Neeraj Suri: The 19th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA’21), September 30-October 3 2021 | |
Revisiting RPKI Route Origin Validation on the Data Plane,Rodday, N., Cunha, Í., Bush, R., Katz-Bassett, E., Rodosek, G.D., Schmidt, T.C. and Wählisch, M. : In Proc. of Network Traffic Measurement and Analysis Conference (TMA), IFIP, September 14-15, 2021 | |
Analyzing the Viability of UAV Missions Facing Cyber Attacks, Jukka Soikkeli, Cora Perner, Emil Lupu: Euro S&P (1st Workshop on Secure and Reliable Communication and Navigation in the Aerospace Domain), 7-11 September 2021 | |
Obfuscation-Resilient Executable Payload Extraction From Packed Malware, Binlin Cheng, Jiang Ming, Erika A. Leal, Haotian Zhang, Jianming Fu, Guojun Peng, Jean-Yves Marion: USENIX Security Symposium, 11 August 2021 | |
On the Deployment of Default Routes in Inter-domain Routing,Rodday, N., Kaltenbach, L., Cunha, I., Bush, R., Katz-Bassett, E., Rodosek, G.D., Schmidt, T.C. and Wählisch, M. : In Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a Responsible Internet (pp. 14-20), August 2021 | |
Fast Kernel Error Propagation Analysis in Virtualized Environments,Nicolas Coppik, Oliver Schwahn and Neeraj Suri:IEEE International Conference on Software Testing, Verification and Validation (ICST) 2021, 12-16 April 2021 | |
ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts, Christof Ferreira Torres, Antonio Ken Iannillo , Arthur Gervais , and Radu State: Euro S&P, 19 March 2021 | |
Binary level toolchain provenance identification with graph neural networks, Tristan Benoit, Jean-Yves Marion, Sébastien Bardin: 2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 9-12 March 2021 | |
Retrofitting Post-Quantum Cryptography in Internet Protocols: A Case Study of DNSSEC, M. Müller, J. de Jong, M. van Heesch, B. Overeinder & R. van Rijswijk-Deij: ACM SIGCOMM Computer Communication Review, October 2020 | |
Clouding up the Internet: how centralized is DNS traffic becoming?Giovane C. M. Moura, Sebastian Castro, Wes Hardaker, Maarten Wullink, Cristian HesselmanProceedings of the ACM Internet Measurement Conference, Virtual Conference, 27-29 October 2020 | |
O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs,O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPsVasileios Giotsas, George Nomikos Vasileios Kotronis; Pavlos Sermpezis; Petros Gigis; Lefteris Manassakis; Christoph Dietzel; Stavros Konstantaras; Xenofontas Dimitropoulos: IEEE/ACM Transactions on Networking, 23 October 2020 | |
UZH Spotting political social bots in Twitter: A use case of the 2019 Spanish general election, Javier Pastor, Mattia Zago, Pantaleone Nespoli, Sergio López, Alberto Huertas, Manuel Gil, José A. Ruipérez, Gregorio Martínez, Félix Gómez :EEE Transactions on Network and Service Management, October 2020 | |
A Responsible Internet to Increase Trust in the Digital World,C. Hesselman, P. Grosso, R. Holz, F. Kuipers, J. Hui Xue, M. Jonker, J. de Ruiter, A. Sperotto, R. van Rijswijk-Deij, G. C. M. Moura, A. Pras, and C. de Laat: Invited paper for the Journal of Network and Systems Management (JNSM), special issue on “Future of Network and Service Operations and Management: Trends, Developments, and Directions”, September 2020 | |
Enabling Digital Forensics Readiness for Internet of Vehicles, Alexakos C., Katsini, C., Votis K., Lalas A., Tzovaras D., Serpanos D:23rd EURO Working Group on Transportation Meeting, EWGT 2020, September 2020 | |
Real-time Thread Isolation and Trusted Execution on Embedded RISC-V,Samuel Lindemer, Gustav Midéus, Shahid Raza:First International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V’20), 23 August 2020 | |
ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource,Benjamin Green, Richard Derbyshire, William Knowles, James Boorman, Pierre Ciholas, Daniel Prince and David Hutchison:Proc. of USENIX Security – CSET Workshop, 10 August 2020 | |
The DNS in IoT: Opportunities, Risks, and Challenges, C. Hesselman, M. Kaeo, L. Chapin, kc claffy, M. Seiden, D. McPherson, D. Piscitello, A. McConachie, T. April, J. Latour, and R. Rasmussen:IEEE Internet Computing, Vol. 24 , No. 4 , July-Aug 2020 | |
(How Much) Does a Private WAN Improve Cloud Performance?Todd Arnold, Ege Gürmeriçliler, Georgia Essig, Arpit Gupta, Matt Calder, Vasileios Giotsas, Ethan Katz-Bassett:IEEE INFOCOM 2020,6-9 July 2020 | |
TraceSanitizer – Eliminating the Effects of Non-determinism on Error Propagation Analysis, Habib Saissi, Stefan Winter, Oliver Schwahn, Karthik Pattabiraman Neeraj:Proc. of Dependable Systems and Networks, 29th June – 2th July, 2020 | |
Multi-Sector Assessment Framework – A New Approach to Analyze Cybersecurity Challenges and Opportunities,Salvatore Marco Pappalardo, Marcin Niemiec, Maya Bozhilova, Nikolai Stoianov, Andrzej Dziech, Burkhard Stiller:10th International Conference on Multimedia Communications, Services, and Security (MCSS 2020),18-19 June 2020 | |
Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure,Ahmed Taha, Ahmed Zakaria, Dongseong Kim, Neeraj Suri:Proc. of Intl. Conference on Cloud Engineering, April 2020 | |
Counterfighting Counterfeit: detecting and taking down fraudulent webshops at a ccTLD, Thymen Wabeke, Giovane C. M. Moura, Nanneke Franken and Cristian Hesselman: Proceedings of the Passive and Active Measurement Workshop (Eugene, OR, USA, 30-31 March 2020 | |
A First Look at the Misuse and Abuse of the IPv4 Transfer Market,Vasileios Giotsas, Ioana Livadariu, Petros Gigis: International Conference on Passive and Active Network Measurement, 30-31 March 2020 | |
When parents and children disagree: Diving into DNS delegation inconsistency,Raffaele Sommese, Giovane C. M. Moura, Mattijs Jonker, Roland van Rijswijk-Deij , Alberto Dainotti, K Claffy, Anna Sperotto:2020 Passive and Active Measurement Conference (PAM2020),March 2020 | |
Counterfighting Counterfeit: detecting and taking down fraudulent webshops at a ccTLD,Thymen Wabeke, Giovane C. M. Moura, Nanneke Franken, Cristian Hesselman:2020 Passive and Active Measurement Conference (PAM2020),March 2020 | |
How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections), Mathilde Ollivier, Sébastien Bardin, Richard Bonichon, Jean-Yves Marion: Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, December 2019 | |
Cybersecurity Evaluation of Enterprise Architectures: The e-SENS Case, Tanja Pavleska, Helder Aranha, Massimiliano Masi, Eric Grandry and Giovanni Paolo Sellitto: Practice of Enterprise Modelling (PoEM) 2019, 27-29 November 2019, Luxembourg | |
Auto-encoding Robot State against Sensor Spoofing Attacks, Sean Rivera, Sofiane Lagraa, Antonio Ken Iannillo, Radu State:The 4th IEEE International Workshop on Reliability and Security Data Analysis (RSDA 2019), co-located with the 30th International Symposium on Software Reliability Engineering (ISSRE 2019), 28-31 October 2019, Berlin, Germany | |
Analyzing and Improving Customer-side Cloud Security Certifiability, Shujie Zhao, Yiqun Chen, Stefan Winter and Neeraj Suri:IEEE International Workshop on Software Certification (WoSoCeR), 28-31 October 2019, Berlin, Germany | |
Mobile App to SGX Enclave Secure Channel, Fernando Kaway Carvalho Ota, Jorge Augusto Meira, Cyril Renaud Cassagnes and Radu State: 4th IEEE International Workshop on Reliability and Security Data Analysis (RSDA), co-located with ISSRE, 28-31 October 2019, Berlin, Germany | |
Inferring Performance Bug Patterns from Developer Commits, Yiqun Chen, Stefan Winter and Neeraj Suri : International Symposium on Software Reliability Engineering (ISSRE), 28-31 October 2019, Berlin, Germany | |
Securing Mobile e-Health Environments by Design: A Holistic Architectural Approach, Helder Aranha, Massimiliano Masi, Tanja Pavleska, Giovanni Paolo Sellitto:Seventh International Workshop on e-Health Pervasive Wireless Applications and Services 2019, 21 October 2019, Barcelona, Spain | |
Gyro: A Modular Scale-Out Layer for Single-Server DBMSs, Habib Saissi, Marco Serafini and Neeraj Suri: Symposium on Reliable Distributed Systems (SRDS) 2019, 1-4 October, 2019, Lyon, France | |
Distributed Systems Security Knowledge Area,Neeraj Suri: EPSRC Cybersecurity Body of Knowledge, CyBOK, 1 October 2019 | |
Enabling Security-by-design in Smart Grids: An architecture-based approach, Helder Aranha, Massimiliano Masi, Giovanni Paolo Sellitto and Tanja Pavleska:2019 15th European Dependable Computing Conference (EDCC), 20-27 September 2019, Naples, Italy | |
Improving Detection of Malicious Office Documents using One-Side Classifiers, Silviu Constantin Vitel, Gheorghe Balan, Dumitru Bogdan Prelipcean:21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC2019), Timisoara, Romania, September 4-7 2019 | |
Preventing File-less Attacks with Machine Learning Techniques, Alexandru Gabriel Bucevschi, Gheorghe Balan, Dumitru Bogdan Prelipcean: 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC2019), Timisoara, Romania, September 4-7 2019 | |
Generative Adversarial Networks in AI-Enabled Safety-Critical Systems: Friend or Foe?, A. P. Fournaris, A. S. Lalos and D. Serpanos:IEEE Computer, August2019 | |
Extracting Safe Thread Schedules from Incomplete Model Checking Results, Patrick Metzler, Neeraj Suri and Georg Weissenbacher: International Symposium on Model Checking of Software (SPIN) 2019, 15 – 19 July 2019, Beijing, China | |
Assessing the State and Improving the Art of Parallel Testing for C, Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri: The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) 2019, 15 – 19 July 2019, Beijing, China | |
An Analysis of Cryptographic Algorithms in IoT, Samed Bajrić: Smart devices, applications, and protocols for the IoT, March 2019 |
Data/Application-centric
Publications | |
---|---|
CMSec: A Vulnerability Prevention Tool for Supporting Migrations in Cloud Composite Services, Mohamed Oulaaffart, Rémi Badonnel, Olivier Festor: IEEE CloudNet 2022, 7–10 November 2022 | |
Multi-Dimensional Certification of Modern Distributed Systems, Marco Anisetti, Claudio A. Ardagna, Nicola Bena: IEEE Transactions on Services Computing, 29 July 2022 | |
Privacy Guarantees for Cloud-Based State Estimation using Partially Homomorphic Encryption, Sawsan Emad, Amr Alanwar, Yousra Alkabani, M Watheq EL-Kharashi, Henrik Sandberg, Karl H Johansson: European Control Conference (ECC), 12 – 15 July 2022 | |
A Blockchain-based Framework in Support of Privacy Preferences Enforcement for Scientific Workflows : (Invited Paper), Federico Daidone, Barbara Carminati, and Elena Ferrari: IEEE International Conference on Web Services, 11-15 July 2022 | |
Incident Handling for Healthcare Organizations and Supply-Chains, Eftychia Lakka, George Hatzivasilis , Stelios Karagiannis, Andreas Alexopoulos , Manos Athanatos, Sotiris Ioannidis, Manolis Chatzimpyrros, Grigorios Kalogiannis, George Spanoudakis: 2nd IEEE Conference on ICT Solutions for eHealth (ICTS4eHealth) 2022, 30th June – 3rd July 2022 | |
Threat Modelling for 5G networks, Bernardo Santos, Luis Barriga, Bruno Dzogovic, Ismail Hassan, Boning Feng, Niels Jacot, Van Thuan Do, Thanh Van Do: 2022 International Wireless Communications and Mobile Computing (IWCMC), 30 May – 3 June 2022 | |
Zero-Trust Cybersecurity Approach for Dynamic 5G Network Slicing with Network Service Mesh and Segment-Routing over IPv6, Bruno Dzogovic, Bernardo Santos, Ismail Hassan, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do: 2022 International Conference on Development and Application Systems (DAS), 26-28 May 2022 | |
An Automated SMT- based Security Framework for Supporting Migrations in Cloud Composite Services, Mohamed Oulaaffart, Rémi Badonnel, Christophe Bianco: NOMS 2022 IEEE/IFIP, 25-29 April 2022 | |
A Security Certification Scheme for Information-Centric Networks, Marco Anisetti, Claudio A. Ardagna, Filippo Berto, Ernesto Damiani: IEEE Transactions on Network and Service Management, 6 April 2022 | |
Fault-Enabled Chosen-Ciphertext Attacks on Kyber, Julius Hermelink, Peter Pessl, and Thomas Poeppelmann: 22nd International Conference on Cryptology in India, 13-15 December 2021 | |
PAutoBotCatcher: A blockchain-based privacy-preserving botnet detector for Internet of Things, Ahmed Lekssays, Luca Landa, Barbara Carminati, and Elena Ferrari: Computer Networks, Elsevier, Volume 200, 9 December 2021 | |
Securing Runtime Memory via MMU manipulation, Marinos Tsantekidis and Vassilis Prevelakis: 15th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), 14-18 November 2021 | |
SaCI: a Blockchain-based Cyber Insurance Approach for the Deployment and Management of a Contract Coverage , Muriel Franco, Noah Berni, Eder John Scheid, Bruno Rodrigues, Christian Killer, Burkhard Stiller: 8th International Conference on the Economics of Grids, Clouds, Systems and Services (GECON 2021), 3 November 2021 | |
A comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective, Daniel Schlette, Marco Caselli, Günther Pernul: IEEE Communications Surveys & Tutorials, 4 October 2021 | |
LiMNet: Early-Stage Detection of IoT Botnets with Lightweight Memory Networks, Lodovico Giaretta, Ahmed Lekssays, Barbara Carminati, Elena Ferrari, and Sarunas Girdzijauskas: The European Symposium on Research in Computer Security, 30 September 2021 | |
Anomaly Detection in Cellular IoT with Machine Learning, Bernardo Santos, Imran Qayyrm Khan, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do: EAI Goodtechs 2021, 15-17 September 2021 | |
Advanced 5G Network Slicing Isolation Using Enhanced VPN+ for Healthcare Verticals, Bruno Dzogovic, Tariq Mahmood, Bernardo Santos, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do: EAI Goodtechs 2021, 15-17 September 2021 | |
Ageing@home: A Secure 5G Welfare Technology Solution for Elderlies, Boning Feng, Birgitta Langhammer, Van Thuan Do, Niels Jacot, Bernardo Santos, Bruno Dzogovic, Per Jonny Nesse, Thanh van Do: EAI Goodtechs 2021, 15-17 September 2021 | |
Revisiting RPKI Route Origin Validation on the Data Plane,Rodday, N., Cunha, Í., Bush, R., Katz-Bassett, E., Rodosek, G.D., Schmidt, T.C. and Wählisch, M. : In Proc. of Network Traffic Measurement and Analysis Conference (TMA), IFIP, September 14-15, 2021 | |
Optimizing 5G VPN+ Transport Networks with Vector Packet Processing and FPGA Cryptographic Offloading, Bruno Dzogovic, Bernardo Santos, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do: MobiWIS 2021, 23-25 August 2021 | |
A Secure 5G Eldercare Solution Using Millimeterwave Sensors, Boning Feng, Akihiro Kajiwara, Van Thuan Do, Niels Jacot, Bernardo Santos, Bruno Dzogovic, Thanh Van Do: MobiWIS 2021, 23-25 August 2021 | |
On the Deployment of Default Routes in Inter-domain Routing,Rodday, N., Kaltenbach, L., Cunha, I., Bush, R., Katz-Bassett, E., Rodosek, G.D., Schmidt, T.C. and Wählisch, M. : In Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a Responsible Internet (pp. 14-20), August 2021 | |
Synergy of Blockchain Technology and Data Mining Techniques for Anomaly Detection,Kamišalić A., Kramberger R., Fister I. Jr.:Applied Sciences MDPI, August 2021 | |
MMU-based Access Control for Libraries, Marinos Tsantekidis and Vassilis Prevelakis: 18th International Conference on Security and Cryptography (SECRYPT), 6-8 July 2021 | |
Towards Automating Security Enhancement for Cloud Services, Mohamed Oulaaffart, Remi Badonnel, Olivier Festor: IFIP/IEEE International Symposium on Integrated Network Managemen( IFIP/IEEE IM), 17-21 May 2021 | |
Universal Adversarial Perturbations for Malware, Raphael Labaca-Castro, Luis Muñoz-González, Feargus Pendlebury, Gabi Dreo Rodosek, Fabio Pierazzi, Lorenzo Cavallaro:February 12, 2021 | |
Applying k-vertex cardinality constraints on a Neo4j graph database,Martina Šestak, Marjan Heričko, Tatjana Welzer Družovec, Muhamed Turkanović: Future Generation Computer Systems Volume 115, February 2021, Pages 459-474 | |
Blockchain-Based Reputation Systems: Implementation Challenges and Mitigation, Ammar Battah, Youssef Iraqi, Ernesto Damiani: MDPI Electronics, 26 January 2021 | |
A Methodology for Non-Functional Property Evaluation of Machine Learning Models, Marco Anisetti, Claudio A. Ardagna, Ernesto Damiani, Paolo G. Panero: 12th International Conference on Management of Digital EcoSystems, 2-4 November 2020 | |
UZH Spotting political social bots in Twitter: A use case of the 2019 Spanish general election, Javier Pastor, Mattia Zago, Pantaleone Nespoli, Sergio López, Alberto Huertas, Manuel Gil, José A. Ruipérez, Gregorio Martínez, Félix Gómez :EEE Transactions on Network and Service Management, October 2020 | |
The Million Dollar Handshake: Secure and Attested Communications in the Cloud, Nikolaos Chalkiadakis, Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis: IEEE International Conference on Cloud Computing (IEEE Cloud 2020), 18-24 October 2020 | |
A Brief Review of Database Solutions Used within Blockchain Platforms, Blaž Podgorelec, Muhamed Turkanović, Martina Šestak: 2nd International Congress on Blockchain and Applications, 7-9 October 2020 | |
Software System Exploration using Library Call Analysis, Marinos Tsantekidis, Vassilis Prevelakis: 2nd Workshop on Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), 17 September 2020 | |
Evaluating the effects of access control policies within NoSQL systems, Pietro Colombo, Elena Ferrari: Future Generation Computer Systems, August 2020 | |
Stay Thrifty, Stay Secure: A VPN-Based Assurance Framework for Hybrid Systems, Marco Anisetti, Claudio A. Ardagna, Nicola Bena, Ernesto Damiani: 17th International Conference on Security and Cryptography (SECRYPT 2020), July 2020 | |
A Brief Review of Database Solution used within Blockchain Platforms,Blaž Podgorelec, Muhamed Turkanović, Martina Šestak:Advances in Intelligent Systems and Computing (AISC, volume 1238). Springer, Cham./ BLOCKCHAIN 2020: Blockchain and Applications, 15 July 2020 | |
SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study, Mohammad Hamad, Vassilis Prevelakis:Information, 19 May 2020 | |
Improving Cellular IoT Security with Identity Federation and Anomaly Detection, Bernardo Santos, Bruno Dzogovic, Boning Feng, Niels Jacot, Van Thuan Do, Thanh Van Do: 2020 5th International Conference on Computer and Communication Systems (ICCCS 2020), May 15-18 2020 | |
Secure Healthcare: 5G-enabled network slicing for elderly care, Bruno Dzogovic, Van Thuan Do, Bernardo Santos, Niels Jacot, Boning Feng, Thanh Van Do: 2020 5th International Conference on Computer and Communication Systems (ICCCS 2020), May 15 – 18 2020 | |
Blockchain-based controlled information sharing in inter-organizational workflows, Christian Rondanini, Federico Daidone, Barbara Carminati, Elena Ferrari:International Conference on Services Computing (SCC 2020), March 2020 | |
Certified Machine-Learning Models,Ernesto Damiani, Claudio Agostino Ardagna: 46th International Conference on Current Trends in Theory and Practice of Informatics (SOFSEM 2020), 20-24 January 2020,Limassol,Cyprus | |
Cost-Effective Deployment of Certified Cloud Composite Services, Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Filippo Gaudenzi, Gwanggil Jeon: Journal of Parallel and Distributed Computing, January 2020 | |
A Continuous Certification Methodology for DevOps, M. Anisetti, C. Ardagna, E. Damiani, F. Gaudenzi: ACM MEDES, 12-14 November 2019, Limassol, Cyprus | |
Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality, Raphael Labaca Castro, Battista Biggio, Gabi Dreo Rodosek:ACM SIGSAC Conference on Computer and Communications Security (CCS’ 19) – Posters & Demos, 11-15 November 2019, London, UK | |
Efficient Monitoring of Library Call Invocation, Marinos Tsantekidis and Vassilis Prevelakis:The 2nd IEEE International Symposium on Future Cyber Security Technologies (FCST),22-25 October 2019, Granada, Spain | |
Thunderbolt-3 Backbone for Augmented 5G Network Slicing in Cloud-Radio Access Networks, Bruno Dzogovic, Thanh van Do, Bernardo Santos, Van Thuan Do, Boning Feng, Niels Jacot:IEEE 5GWF’19, 30 September – 2. October, Dresden, Germany | |
Secure Data Exchange for Computationally Constrained Devices, Vassilis Prevelakis, Mohammad Hamad, Jihane Najar, and Ilias Spais:International workshop on Information & Operational Technology (IT & OT) security systems (IOSec 2019), 26-27 September 2019, Luxemburg | |
Using blockchains to enable Big Data analysis of private information, Konstantinos Lampropoulos, Giorgos Georgakakos, Sotiris Ioannidis: IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2019), 11-13 September 2019, Limassol, Cyprus | |
Enhancing Security of Cellular IoT with Identity Federation, Bernardo Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh van Do:The 11th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2019); 5 – 7 September 2019, Oita, Japan | |
Correlation Between Students’ Background and the Knowledge on Conceptual Database Modelling, Lili Nemec Zlatolas, Aida Kamišalić, Muhamed Turkanović:in book New Trends in Databases and Information Systems, Chapter · September 2019 | |
AIMED: Evolving Malware with Genetic Programming to Evade Detection, Raphael Labaca Castro, Corinna Schmitt, Gabi Dreo Rodosek: IEEE 18th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 5-8 August, Rotorua, New Zealand | |
Bringing 5G Into User’s Smart Home, Bruno Dzogovic, Niels Jacot, Bernardo Santos, Van Thuan Do, Boning Feng, Thanh van Do:17th IEEE International Conference on Pervasive Intelligence and Computing, 5 – 8 August 2019, Fukuoka, Japan | |
Confidential Discovery of IoT devices through Blockchain, Christian Rondanini, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy | |
Adapting Users’ Privacy Preferences in Smart Environments,Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy | |
Helping Users Managing Context-based Privacy Preferences, Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy | |
Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks, Bernardo Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh van Do:2019 6th IEEE International Conference on Cyber Security and Cloud Computing / 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud. IEEE conference proceedings 2019 ISBN 978-1-7281-1660-0. s. 130-135, 21-23 June 2019, Paris, France | |
Connecting Remote eNodeB with Containerized 5G C-RANs in OpenStack Cloud, Bruno Dzogovic, Bernardo Santos, Van Thuan Do, Boning Feng, Niels Jacot, Thanh van Do:2019 6th IEEE International Conference on Cyber Security and Cloud Computing / 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud. IEEE conference proceedings 2019 ISBN 978-1-7281-1660-0. s. 14-19, 21-23 June 2019, Paris, France | |
Security Management and Visualization in a Blockchain-based Collaborative Defense, Christian Killer, Bruno Rodrigues, Burkhard Stiller: IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (ICBC 2019), 14-17 May 2019, Seoul, South Korea | |
Red-Zone: Towards an Intrusion Response Framework for Intra-Vehicle System, Mohammad Hamad, Marinos Tsantekidis and Vassilis Prevelakis: 5th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2019), 3-5 May 2019, Heraklion, Crete, Greece |
User-centric
Publications | |
---|---|
PriApp-Install: Learning User Privacy Preferences on Mobile Apps’ Installation, Ha Xuan Son, Barbara Carminati, and Elena Ferrari: International Conference on Information Security Practice and Experience, 23 – 25 November 2022 | |
A survey on privacy for b5g/6g: New privacy challenges, and research directions, Chamara Sandeepa and Bartlomiej Siniarski and Nicolas Kourtellis and Shen Wang and Madhusanka Liyanage: Journal of Industrial Information Integration, Volume 30, November 2022 | |
Time-Aware Anonymization of Knowledge Graphs, Anh-Tu Hoang, Barbara Carminati, Elena Ferrari: ACM Transactions on Privacy and Security, 23 September 2022 | |
Bridging the Gap Between Certification and Software Development, Claudio A. Ardagna, Nicola Bena, Ramon Martín de Pozuelo: 17th International Conference on Availability, Reliability and Security (ARES 2022),23 – 26 August 2022 | |
A Risk Estimation Mechanism for Android Apps based on Hybrid Analysis, Ha Xuan Son, Barbara Carminati, and Elena Ferrari: Data Science & Engineering, 29 July 2022 | |
Youtubers not madeforkids: Detecting channels sharing inappropriate videos targeting children, Myrsini Gkolemi, Panagiotis Papadopoulos, Evangelos Markatos, and Nicolas Kourtellis: 14th ACM Web Science Conference, 26 – 29 June 2022 | |
Flaas-enabling practical federated learning on mobile environments, Kleomenis Katevas, Diego Perino, and Nicolas Kourtellis: ACM MobiSys, 27 June – 1 July 2022 | |
I call BS: Fraud Detection in Crowdfunding Campaigns, Beatrice Perez, Sara R. Machado, Jerone T. A. Andrews, Nicolas Kourtellis: 14th ACM Web Science Conference, 26 June 2022 | |
I Call BS: Fraud Detection In Crowdfunding Campaigns, Beatrice Perez, Sara R. Machado, Jerone T. A. Andrews, Nicolas Kourtellis: WebSci 2022, 26 – 29 June 2022 | |
Identification of Twitter Bots Based on an Explainable Machine Learning Framework: The US 2020 Elections Case Study, Alexander Shevtsov, Christos Tzagkarakis, Despoina Antonakaki, Sotiris Ioannidis: International AAAI Conference on Web and Social Media (ICWSM 2022), 6-9 June 2022 | |
A Unified Graph-Based Approach to Disinformation Detection using Contextual and Semantic Relations, Marius Paraschiv, Nikos Salamanos, Costas Iordanou, Nikolaos Laoutaris, Michael Sirivianos: International AAAI Conference on Web and Social Media (ICWSM 2022), 6-9 June 2022 | |
Privacy-preserving ai for future networks, Diego Perino, Kleomenis Katevas, Andra Lutu, Eduard Marin, and Nicolas Kourtellis: Communications of the ACM: Europe Region Hot Topics, April 2022, Vol. 65 No. 4, Pages 52-53 | |
Discovery and Classification of Twitter Bots,Alexander Shevtsov, Maria Oikonomidou, Despoina Antonakaki, Polyvios Pratikakis, Alexandros Kanterakis, Paraskevi Fragopoulou, Sotiris Ioannidis: SN Computer Science, 28 April 2022 | |
Leveraging google’s publisher-specific ids to detect website administration, Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Evangelos P.Markatos and Nicolas Kourtellis: ACM The Web Conference (WWW), 25 – 29 April 2022 | |
Measuring the (over)use of service workers for in-page push advertising purposes, George Pantelakis, Panagiotis Papadopoulos, Nicolas Kourtellis, and Evangelos P Markatos: Passive Active Measurements Conference (PAM), 28-30 March 2022 | |
Flaas – practical federated learning as a service for mobile applications, Kleomenis Katevas, Diego Perino, and Nicolas Kourtellis: ACM HotMobile, 9 -10 March 2022 | |
Extracting New Temporal Features to Improve the Interpretability of Undiagnosed Type 2 Diabetes Mellitus Prediction Models, Simon Kocbek, Primož Kocbek, Lucija Gosak, Nino Fijačko, Gregor Štiglic: Journal of Personalized Medicine, 28 February 2022 |
|
Security Perception of IoT Devices in Smart Homes, Lili Nemec Zlatolas, Nataša Feher, Marko Hölbl: Journal of Cybersecurity and Privacy, 14 February 2022 | |
Models of Privacy and Disclosure on Social Networking Sites: A Systematic Literature Review, Lili Nemec Zlatolas, Luka Hrgarek, Tatjana Welzer, Marko Hölbl: Mathematics 2022, 4 January 2022 | |
Ppfl: Enhancing privacy in federated learning with confidential computing, Fan Mo, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, and Nico- las Kourtellis: GetMobile: Mobile Computing and Communications, Volume 25, Issue 4, December 2021 | |
Fault-Enabled Chosen-Ciphertext Attacks on Kyber, Julius Hermelink, Peter Pessl, and Thomas Poeppelmann: 22nd International Conference on Cryptology in India, 13-15 December 2021 | |
YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy, Michalis Pachilakis, Panagiotis Papadopoulos, Nikolaos Laoutaris, Evangelos Markatos, Nicolas Kourtellis : ACM Measurement and Analysis of Computing Systems (POMACS), 4 November 2021 | |
Who’s got your mail?: characterizing mail service provider usage, Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Stefan Savage, Geoffrey M. Voelker: In Proceedings of the 2021 Internet Measurement Conference (IMC 2021), November 2021 | |
SaCI: a Blockchain-based Cyber Insurance Approach for the Deployment and Management of a Contract Coverage , Muriel Franco, Noah Berni, Eder John Scheid, Bruno Rodrigues, Christian Killer, Burkhard Stiller: 8th International Conference on the Economics of Grids, Clouds, Systems and Services (GECON 2021), 3 November 2021 | |
Exploring Content Moderation in the Decentralised Web: The Pleroma Case, Anaobi Ishaku Hassan, Aravindh Raman, Ignacio Castro, Haris Bin Zia, Emiliano De Cristofaro, Nishanth Sastry, and Gareth Tyson: ACM CONEXT, 30 October 2021 | |
A comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective, Daniel Schlette, Marco Caselli, Günther Pernul: IEEE Communications Surveys & Tutorials, 4 October 2021 | |
Gender differences in privacy awareness on social networking sites,Lili Nemec Zlatolas, Tatjana Welzer: 8th ACM Celebration of Women in Computing: womENcourage™ 2021, 22-23 September 2021 | |
Revisiting RPKI Route Origin Validation on the Data Plane,Rodday, N., Cunha, Í., Bush, R., Katz-Bassett, E., Rodosek, G.D., Schmidt, T.C. and Wählisch, M. : In Proc. of Network Traffic Measurement and Analysis Conference (TMA), IFIP, September 14-15, 2021 | |
Exploring Content Moderation in the Decentralised Web: The Pleroma Case, Anaobi Ishaku Hassan, Aravindh Raman, Ignacio Castro, Haris Bin Zia, Emiliano De Cristofaro, Nishanth Sastry, and Gareth Tyson: ACM CONEXT, 30 October 2021 | |
On the Aggression Diffusion Modeling and Minimization in Twitter, Marinos Poiitis, Athena Vakali, Nicolas Kourtellis: ACM Transactions on the Web, 30 August 2021 | |
A risk assessment mechanism for android apps, Ha Xuan Son, Barbara Carminati, and Elena Ferrari: The 2021 IEEE International Conference on Smart Internet of Things (SmartIoT), 13-15 August 2021 | |
On the Deployment of Default Routes in Inter-domain Routing,Rodday, N., Kaltenbach, L., Cunha, I., Bush, R., Katz-Bassett, E., Rodosek, G.D., Schmidt, T.C. and Wählisch, M. : In Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a Responsible Internet (pp. 14-20), August 2021 | |
Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists, Claudio Ardagna, Valerio Bellandi, Ernesto Damiani, Michele Bezzi, Cedric Hebert: Computers & Electrical Engineering Volume 93, July 2021, 107215 | |
Modeling aggression propagation on social media, Chrysoula Terizi, Despoina Chatzakou Evaggelia Pitoura Panayiotis Tsaparas Nicolas Kourtellis: Online Social Networks and Media, Volume 24, July 2021, 100137 | |
PPFL: Privacy-preserving Federated Learning with Trusted Execution Environments, Fan Mo, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, Nicolas Kourtellis: The 19th ACM International Conference on Mobile Systems, Applications, and Services, 28 June – 2 July 2021 | |
Differential Tracking Across Topical Webpages of Indian News Media, Yash Vekaria, Vibhor Agarwal, Pushkal Agarwal, Sangeeta Mahapatra, Sakthi Balan Muthiah, Nishanth Sastry, Nicolas Kourtellis :13th ACM Web Science Conference 2021, 21 – 25 June 2021 | |
The Rise and Fall of Fake News sites: A Traffic Analysis, Manolis Chalkiadakis, Alexandros Kornilakis, Panagiotis Papadopoulos, Evangelos Markatos, Nicolas Kourtellis: 13th ACM Web Science Conference 2021, 21 – 25 June 2021 | |
YouTubing at Home: Media Sharing Behavior Change as Proxy for Mobility Around COVID-19 Lockdowns, Yelena Mejova, Nicolas Kourtellis: 13th ACM Web Science Conference 2021, 21 – 25 June 2021 | |
Under the Spotlight: Web Tracking in Indian Partisan News Websites, Vibhor Agarwal, Yash Vekaria, Pushkal Agarwal, Sangeeta Mahapatra, Shounak Set, Sakthi Balan Muthiah, Nishanth Sastry, Nicolas Kourtellis: Proceedings of the Fifteenth International AAAI Conference on Web and Social Media(ICWSM 2021), 7-10 June 2021 | |
ITrade: A Blockchain-based, Self-Sovereign, and Scalable Marketplace for IoT Data Streams, Sina Rafati Niya, Danijel Dordevic, Burkhard Stiller:IM 2021 – The 17th IFIP/IEEE International Symposium on Integrated Network Management, 17-21 May 2021 | |
Æternum: A Decentralized Voting System with Unconditional Privacy, Christian Killer, Markus Knecht, Claude Müller, Bruno Rodrigues, Eder John Scheid, Muriel Franco, Burkhard Stiller: IEEE International Conference on Blockchain and Cryptocurrency 2021, 3-6 May 2021 | |
HSM-based Key Management Solution for Ethereum Blockchain, Wazen Shbair, Eugene Gavrilov, and Radu State:IEEE International Conference on Blockchain and Cryptocurrency 2021, 3-6 May 2021 | |
Privacy-Preserving Sequential Publishing of Knowledge Graphs, Anh-Tu Hoang: The 2021 IEEE 37th International Conference on Data Engineering (ICDE), 19-22 April 2021 | |
User Tracking in the Post-Cookie Era: How Websites Bypass GDPR Consent to Track Users, Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P Markatos: The Web Conference 2021, 19 – 23 April 2021 | |
“How over is it?” Understanding the Incel Community on YouTube, Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburny, Emiliano De Cristofaroz, Gianluca Stringhini, Michael Sirivianos:The 24th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2021), 22 March 2021 | |
FLaaS: Federated Learning as a Service, Nicolas Kourtellis, Kleomenis Katevas, Diego Perino :DistributedML’20: Proceedings of the 1st Workshop on Distributed Machine Learning, December 2020, Pages 7–13 | |
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning, Benjamin Zi Hao Zhao, Mohamed Ali Kaafar, Nicolas Kourtellis: CCSW 2020: The ACM Cloud Computing Security Workshop, 9 November 2020 | |
DLIT: A Scalable Distributed Ledger for IoT Data, Sina Rafati Niya, Raphael Beckmann, Burkhard Stiller:Second International Conference on Blockchain Computing and Applications (BCCA), 3 November 2020 | |
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning,Benjamin Zi Hao Zhao, Mohamed Ali Kaafar, Nicolas Kourtellis: CCSW’20: Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, November 2020, Pages 15–26 | |
“It is just a flu”: Assessing the Effect of Watch History on YouTube’s Pseudoscientific Video Recommendations, Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Michael Sirivianos:October 2020 |
|
UZH Spotting political social bots in Twitter: A use case of the 2019 Spanish general election, Javier Pastor, Mattia Zago, Pantaleone Nespoli, Sergio López, Alberto Huertas, Manuel Gil, José A. Ruipérez, Gregorio Martínez, Félix Gómez :EEE Transactions on Network and Service Management, October 2020 | |
Signing Blockchain Transactions using Qualified Certificates, Muhamed Turkanović, Blaž Podgorelec:IEEE Internet Computing, 25 September 2020 | |
A Deep Learning Model for Twitter Spam Detection, Zulfikar Alom, Barbara Carminati and Elena Ferrari:Online Social Networks and Media,2020 | |
Evaluating the effects of access control policies within NoSQL systems, Pietro Colombo, Elena Ferrari: Future Generation Computer Systems, August 2020 | |
The Seven Deadly Sins of the HTML5 WebAPI: A Large-scale Study on the Risks of Mobile Sensor-based Attacks, Michalis Diamantaris, Francesco Marcantoni, Sotiris Ioannidis, Jason Polakis: ACM Transactions on Privacy and Security (TOPS) July 2020 | |
Multi-Sector Assessment Framework – A New Approach to Analyze Cybersecurity Challenges and Opportunities,Salvatore Marco Pappalardo, Marcin Niemiec, Maya Bozhilova, Nikolai Stoianov, Andrzej Dziech, Burkhard Stiller:10th International Conference on Multimedia Communications, Services, and Security (MCSS 2020),18-19 June 2020 | |
A Streaming Machine Learning Framework for Online Aggression Detection on Twitter,Herodotos Herodotou, Despoina Chatzakou, Nicolas Kourtellis: International Conference on Big Data (IEEE BigData), 17 June 2020 | |
Catching them red-handed: Real-time Aggression Detection on Social Media, Herodotos Herodotou, Despoina Chatzakou, Nicolas Kourtellis: International Conference on Data Engineering (ICDE), 17 June 2020 | |
Did State-sponsored Trolls Shape the US Presidential Election Discourse? Quantifying Influence on Twitter, Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Costas Iordanou, Michael Sirivianos: 17 June 2020 | |
Clash of the trackers: measuring the evolution of the online tracking ecosystem,Kostantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis:International Conference on Network Traffic Measurement and Analysis Conference, 10-11 June 2020 | |
On the Aggression Diffusion Modeling and Minimization in Online Social Networks, Marinos Poiitis, Athena Vakali, Nicolas Kourtellis: 21 May 2020 | |
Stop tracking me Bro! Differential Tracking of User Demographics on Hyper-Partisan Websites, Pushkal Agarwal, Sagar Joglekar, Panagiotis Papadopoulos, Nishanth Sastry, Nicolas Kourtellis: The Web Conference (2020), 1 April 2020 | |
Angry Birds Flock Together: Aggression Propagation on Social Media, Chrysoula Terizi, Despoina Chatzakou, Evaggelia Pitoura, Panayiotis Tsaparas, Nicolas Kourtellis: February 2020 | |
Understanding the Incel Community on YouTube, Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburny, Emiliano De Cristofaroz, Gianluca Stringhini, Michael Sirivianos:22 January 2020 | |
A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection,Blaž Podgorelec, Muhamed Turkanović, Sašo Karakatič: Journal article Sensors, 25 December 2019 | |
Cluster-Based Anonymization of Directed Graphs,Anh-Tu Hoang, Barbara Carminati and Elena Ferrari: IEEE 5th International Conference on Collaboration and Internet Computing (CIC 2019), 12-14 December 2019 | |
Beyond content analysis: Detecting targeted ads via distributed counting, Costas Iordanou (MPI, Nicolas Kourtellis (TID), Juan Miguel Carrascosa (LSTech), Claudio Soriente (NEC Europe), Ruben Cuevas (UC3M), Nikolaos Laoutaris (IMDEA Networks): 15th International Conference on emerging Networking EXperiments and Technologies (ACM CoNEXT’19), 9-12 December 2019,Orlando, Florida, U.S. | |
TradeMap: A FINMA-compliant Anonymous Management of an End-2-end Trading Market Place, Sina Rafati Niya, Sebastian Allemann, Arik Gabay, Burkhard Stiller:15th International Conference on Network and Service Management , 21-25 October 2019 Halifax, Canada | |
No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem,Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis: The 19th ACM on Internet Measurement Conference, 21-23 October, 2019, Amsterdam, Netherlands | |
On the Influence of Twitter Trolls during the 2016 US Presidential Election, Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Michael Sirivianos: October 2019 | |
Towards the Insurance of Healthcare Systems, G. Hatzivasilis, P. Chatziadam, A. Miaoudakis, E. Lakka, S. Ioannidis, A. Alessio, M. Smyrlis, G. Spanoudakis, A. Yautsiukhin, M. Antoniou, N. Stathiakis: 1st Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), ESORICS, Springer, 27 September, 2019, Luxembourg, pp. 1-14. |
|
You Shall Not Register! Detecting Privacy Leaks across Registration Forms, Manolis Chatzimpyrros, Konstantinos Solomos and Sotiris Ioannidis: ESORICS 2019 European Symposium on Research in Computer Security 23-27 September 2019, Luxembourg | |
TALON: An automated framework for Cross-Device Tracking Detection, Kostas Solomos, Panagiotis Ilias, Sotiris Ioannidis, Nicolas Kourtellis: 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), 23-25 September, 2019, Beijing, China | |
Complexity Analysis of Decentralized Application Development, Patrik Rek, Blaž Podgorelec and Muhamed Turkanović:SQAMIA 2019, 22-25 September 2019, Ohrid, North Macedonia | |
Cyber Insurance of Information Systems, G. Hatzivasilis, P. Chatziadam, N. E. Petroulakis, M. Mangini, C. Kloukinas, A. Yautsiukhin, M. Antoniou, D. G. Katehakis, M. Panayiotou:24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2019), IEEE, Limassol, Cyprus, 11-13 September, 2019, pp. 1-7. | |
An Example of a Cybersecurity Education Model, Muhamed Turkanović, Tatjana Welzer, Marko Hölbl:29th Annual Conference of the European Association For Education in Electrical and Information Engineering (EAEEIE), 4-6 September 2019, University of Ruse, Bulgaria | |
A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks, Lili Nemec Zlatolas, Tatjana Welzer, Marko Hölbl, Marjan Heričko and Aida Kamišalić:MDPI Entropy, August 2019 | |
Clash of the Trackers: Measuring the Evolution of the Online Tracking Ecosystem,Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis: TMA Conference, 30 July 2019 | |
Confidential Discovery of IoT devices through Blockchain, Christian Rondanini, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy | |
Adapting Users’ Privacy Preferences in Smart Environments,Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy | |
Helping Users Managing Context-based Privacy Preferences, Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy | |
Trustworthy IoT: An Evidence Collection Approach based on Smart Contracts, Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Claus Pahl: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy | |
Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls, Savvas Zannettou, Tristan Caulfield, William Setzer, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn: ACM International Web Science Conference (WebSci), June 30 – July 3, 2019 Boston, MA, USA | |
Nothing is free in the web: Transparency on RTB with YourAdvalue tool, Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis: Cybersecurity and Privacy (CySeP) Summer School, 10-14 June , 2019, Stockholm, Sweden | |
Performance analysis of fact-checking organizations and initiatives in Europe: A critical overview of online platforms fighting fake news, Tanja Pavleska, Andrej Školkay, Bissera Zankova, Nelson Ribeiro, Anja Bechmann:“Disinformation and Digital Media as a Challenge for Democracy” European Integration and Democracy Series Vol. 6, June 2019 | |
Blockchain-based Anonymous P2P Trading System, Sina Rafati Niya, Sebastian Allemann, Arik Gabay, Burkhard Stiller: UZH, IFI-TecReport No. 2019.04, Zürich, Switzerland, June 2019 | |
A trust assurance technique for Internet of things based on human behavior compliance, Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Alessandro Sala:Concurrency and Computation: Practice and Experience, June 2019 | |
Cookie Synchronization: Everything You Always Wanted to Know but were afraid to ask, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos: The 30th International Web Conference (WWW), May 13-17, 2019, San Francisco | |
Demo: Blockchain for the Simplification and Automation of KYC Result Sharing, Robert Norvill, Mathis Steichen, Wazen M. Shbair, Radu State: IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (ICBC 2019), 14-17 May 2019, Seoul, South Korea | |
BlockZoom: Large-Scale Blockchain Testbed, Wazen M. Shbair, Mathis Steichen , Jerome Francois, Radu State: IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (ICBC 2019), 14-17 May 2019, Seoul, South Korea | |
Disinformation Warfare: Understanding State-Sponsored Trolls On Twitter And Their Influence On The Web, Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini And Jeremy Blackburn: Workshop On Computational Methods In CyberSafety, Online Harassment And Misinformation, 13-14 May 2019, San Francisco, California, USA |