Selected Papers

Performing excellent academic research is the essential objective of the CONCORDIA project.

Our research activities are organized into five tasks, each focusing on a particular aspect of cybersecurity. 

During the project’s lifetime, we produced 324 publications. The total number of papers entered into the EU-ECAS system is even higher since white papers and papers without peer review are not counted. You can find all our publications on our website.

Security Aspects2019202020212022Total
Device1023192577
Network930152074
Software and system8134732
Data and application1615181261
User security and privacy1626201880
Total591077682324

Here we present only our selection. Selected publications are all journal papers with SJR >= 2.0 and all CORE A* conference papers (excluding poster and demo papers).

  1. P. Colombo, E. Ferrari, E.D. Tümer (UI): Regulating data sharing across MQTT environments. Elsevier Journal of Network and Computer Applications, 174, January 2021 https://doi.org/10.1016/j.jnca.2020.102907 [D1.2, SJR 2.19]
  1. A.S. Lalos, E. Vlachos, K. Berberidis, A.P. Fournaris, C. Koulamas (ISI): Privacy Preservation in Industrial IoT via Fast Adaptive Correlation Matrix Completion. IEEE Transactions on Industrial Informatics 16(12), 2020 https://doi.org/10.1109/TII.2019.2960275 [D1.2, SJR 4.33]
  1. I. Ahmed, M. Anisetti, A. Ahmad, G. Jeon (UMIL): A Multilayer Deep Learning Approach for Malware Classification in 5G-Enabled IIoT. IEEE Transactions on Industrial Informatics, 2022 https://doi.org/10.1109/TII.2022.3205366 [D1.4, SJR 4.33]
  1. E. Schiller, A. Aidoo, J. Fuhrer, J. Stahl, M. Ziörjen, B. Stiller (UZH): Landscape of IoT Security. Elsevier Computer Science Review 44, May 2022 https://doi.org/10.1016/j.cosrev.2022.100467 [D1.4, SJR 2.562]
  1. A. Khurshid, S. D. Yalew, M. Aslam, S. Raza (RISE): ShieLD: Shielding Cross-zone Communication within Limited-resourced IoT Devices running Vulnerable Software Stack IEEE Transactions on Dependable and Secure Computing, 2022 https://doi.org/10.1109/TDSC.2022.3147262 [D1.4, SJR 2.265]
  1. Y. Meidan, D. Avraham, H. Libhaber, A. Shabtai (BGU): CADeSH: Collaborative Anomaly Detection for Smart Homes. IEEE Internet of Things Journal, 2022 https://doi.org/10.1109/JIOT.2022.3194813 [D1.4, SJR 3.848]
  1. Y. Sharon, D. Berend, Y. Liu, A. Shabtai, Y. Elovici (BGU): TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack. IEEE Transactions on Information Forensics and Security 17, 2022 https://doi.org/10.1109/TIFS.2022.3201377 [D1.4, SJR 3.299]
  1. M. Hamad, A. Finkenzeller, H. Liu, J. Lauinger, V. Prevelakis, S. Steinhorst (TUBS): Secure Endto-End MQTT-Based Communication for Mobile IoT Systems Using Secret Sharing and Trust Delegation. IEEE Internet of Things Journal, November 2022 https://doi.org/10.1109/JIOT.2022.3221857 [D1.4, SJR 3.848]
  1. H. Lee, A. Gireesh, A.V. Vidyapeetham, R.v. Rijswijk-Deij, T. Kwon, T. Chung (UT): A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email. Proceedings of the USENIX Security Symposium, 2020 USENIX Association [D1.2, CORE A*]
  2. E. Papadogiannaki, S. Ioannidis (FORTH): A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures. ACM Computing Surveys 54(6), 2021 https://doi.org/10.1145/3457904 [D1.3, SJR 5.090]
  3. E.J. Scheid, B. Rodrigues, B. Stiller (UZH): Policy-Based Blockchain Selection. IEEE Communications Magazine 59(10), October 2021 https://doi.org/10.1109/MCOM.100.2100120 [D1.3, SJR 5.147]
  4. A.S.M. Rizvi, L. Bertholdo, J. Ceron, J. Heidemann (UT, SIDN): Anycast Agility: Network Playbooks to Fight DDoS. Proceedings of the 31st USENIX Security Symposium, August 2022 USENIX Association [D1.4, CORE A*]
  5. H. Lee, Md.I. Ashiq, M. Müller, R. van Rijswijk-Deij, T. Kwon, T. Chung (UT, SIDN): Under the Hood of DANE Mismanagement in SMTP. Proceedings of the 31st USENIX Security Symposium, August 2022 USENIX Association [D1.4, CORE A*]
  1. T. Arnold, E. Gürmeri.liler, G. Essig, A. Gupta, M. Calder, V. Giotsas, E. Katz-Bassett (ULANC): (How Much) Does a Private WAN Improve Cloud Performance? IEEE Conference on Computer Communications (INFOCOM), 2020 https://doi.org/10.1109/INFOCOM41043.2020.9155428 [D1.2, CORE A*]
  2. B. Cheng, J. Ming, E. Leal, H. Zhang, J. Fu, G. Peng, J.-Y. Marion (UL): Obfuscation-Resilient Executable Payload Extraction From Packed Malware. Proceedings USENIX Security, February 2021 USENIX Association [D1.3, CORE A*]
  1. P. Colombo, E. Ferrari (UI): Evaluating the effects of access control policies within NoSQL systems. Elsevier Future Generation Computer Systems 114, January 2021 https://doi.org/10.1016/j.future.2020.08.026 [D1.2, SJR 2.23]
  2. F. Daidone, B. Carminati, E. Ferrari (UI): Blockchain-based Privacy Enforcement in the IoT Domain. IEEE Transactions on Dependable and Secure Computing, September 2021 https://doi.org/10.1109/TDSC.2021.3110181 [D1.3, SJR 2.265]
  3. M. Sestak, M. Hericko, T. Welzer Druzˇovec, M. Turkanovic (UM): Applying k-vertex cardinality constraints on a neo4j graph database. Elsevier Future Generation Computer Systems, February 2021 https://doi.org/10.1016/j.future.2020.09.036 [D1.3, SJR 2.233]
  4. M. Anisetti, C. A. Ardagna, N. Bena (UMIL): Multi-Dimensional Certification of Modern Distributed Systems. IEEE Transactions on Services Computing, 2022 [D1.4, SJR 2.714]
  1. P. Papadopoulos, N. Kourtellis, E. Markatos (FORTH, TID): Cookie synchronization: Everything you always wanted to know but were afraid to ask. Proceedings of the World Wide Web Conference (WWW). May 2019 https://doi.org/10.1145/3308558.3313542 [D1.1, CORE A*]
  2. S. Zannettou, T. Caulfield, E. De Cristofaro, M. Sirivianos, G. Stringhini, J. Blackburn (CUT): Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and their Influence on the Web. Companion Proceedings of The 2019 World Wide Web Conference, May 2019 https://doi.org/10.1145/3308560.3316495 [D1.1, CORE A*]
  3. P. Agarwal, S. Joglekar, P. Papadopoulos, N. Sastry, N. Kourtellis (TID): Stop tracking me Bro! Differential Tracking of User Demographics on Hyper-Partisan Websites. Proceedings of The Web Conference 2020, April 2020 https://doi.org/10.1145/3366423.3380221 [D1.2, CORE A*]
  4. H. Herodotou, Despoina Chatzakou, N. Kourtellis (TID, CUT): Catching them red-handed: Realtime Aggression Detection on Social Media. Proceedings of the International Conference on Data Engineering (ICDE), June 2020 https://doi.org/10.1109/ICDE51399.2021.00211 [D1.2, CORE A*]
  5. M. Diamantaris, S. Moustakas, L. Sun, S. Ioannidis, J. Polakis (FORTH): This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration. ACM SIGSAC Conference on Computer and Communications Security (CCS ’21), November 2021 https://doi.org/10.1145/3460120.3485366 [D1.3, CORE A*]
  6. A.-T. Hoang, B. Carminati, E. Ferrari (UI): Privacy-Preserving Sequential Publishing of Knowledge Graphs. Proceedings of the IEEE International Conference on Data Engineering (ICDE), 2021 https://doi.org/10.1109/ICDE51399.2021.00194 [D1.3, CORE A*]
  7. E. Papadogiannakis, P. Papadopoulos, N. Kourtellis, E.P. Markatos (TID): User Tracking in the Post-cookie Era: How Websites Bypass GDPR Consent to Track Users. Proceedings of the Web Conference 2021, WWW ’21, April 2021. https://doi.org/10.1145/3442381.3450056 [D1.3, CORE A*]
  8. C. Sandeepa, B. Siniarski, N. Kourtellis, S. Wang, M. Liyanage (TID): A survey on privacy for B5G/6G: New privacy challenges, and research directions. Journal of Industrial Information Integration 30, November 2022 https://doi.org/10.1016/j.jii.2022.100405 [D1.4, SJR 2.745]
  9. E. Papadogiannakis, P. Papadopoulos, E.P. Markatos, N. Kourtellis (TID, FORTH): Leveraging Google’s Publisher-Specific IDs to Detect Website Administration. Proceedings of the ACM Web Conference, April 2022 https://doi.org/10.1145/3485447.3512124 [D1.4, CORE A*]