CONCORDIA Service – Cybersecurity Research

Cybersecurity Research

Publications

 Publications
Secure Semantic Interoperability for IoT Applications with Linked Data, G. Hatzivasilis, O. Soultatos, E. Lakka, S. Ioannidis, D. Anicic, A. Broring, L. Ciechomski, M. Falchetto, K. Fysarakis, G. Spanoudakis:IEEE Global Communications Conference (GLOBECOM 2019), IEEE, Waikoloa, HI, USA, 9- 13 December, 2019, pp. 1-7
A Proposal for Security Assessment of Trustzone-M based Software, Antonio Ken Iannillo, Radu State:Fast Abstract at the 30th International Symposium on Software Reliability Engineering (ISSRE 2019),28-31 October 2019, Berlin, Germany
Scalable Transport Mechanisms for Blockchain IoT Applications, Eryk Schiller, Sina Rafati Niya, Timo Surbeck, Burkhard Stiller: 2019 IEEE 44th Conference on Local Computer Networks (LCN) (LCN 2019),  14-17 October, 2019, Osnabrück, Germany
End-to-End Semantic Interoperability Mechanisms for IoT,E. Lakka, N. E. Petroulakis, G. Hatzivasilis, O. Soultatos, M. Michalodimitrakis, U. Rak, K. Waledzik, D. Anicic, V. Kulkarni:24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2019), IEEE, Limassol, Cyprus, 11-13 September, 2019, pp. 1-6.
MobileTrust: Secure Knowledge Integration in VANETs, G. Hatzivasilis, O. Soultatos, S. Ioannidis, G. Spanoudakis, V. Katos, G. Demetriou: ACM Transactions on Cyber-Physical Systems Special Issue on User-Centric Security and Safety for Cyber-Physical Systems, ACM, vol., pp., September 2019
Trustworthy IoT: An Evidence Collection Approach based on Smart Contracts, Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Claus Pahl: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy
A trust assurance technique for Internet of things based on human behavior compliance, Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Alessandro Sala:Concurrency and Computation: Practice and Experience, June 2019
Adaptation of Proof-of-Stake-based Blockchains for IoT Data Streams (Demo),Sina Rafati Niya, Eryk Schiller, Ile Cepilov, Fabio Maddaloni, Timo Surbeck, Kürsat Aydinli, Thomas Bocek, Burkhard Stiller:1st IEEE International Conference on Blockchains and Cryptocurrencies (ICBC 2019), Seoul, South Korea, May 2019, pp 15-16
Revisiting Rowhammer Attacks in Embedded Systems, Lidia Pocero Fraile, Apostolos P. Fournaris, Odysseas Koufopavlou: 14th IEEE International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 16-18 April 2019, Mykonos, Greece

 Publications
A Novel Intrusion Detection System Against Spoofing Attacks in Connected Electric Vehicle, Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyiannis, Francisco J. Navarro, Antonios Argyriou and Helge Janicke: Array, Volume 5, March 2020
Evaluating TCP Connection Healthiness, Nils Rodday, Raphael Labaca Castro, Klement Streit and Gabi Dreo Rodosek:International Telecommunication Networks and Applications Conference ITNAC 2019, 27-29 November 2019, Auckland, New Zealand
Machine Learning for Security at the IoT Edge – A Feasibility Study, Han Wang, Luis Barriga, Arash Vahidi, Shahid Raza: International Workshop on Machine Learning Security and Privacy: Experiences and Applications, 4 – 7 November 2019, Monterey, CA, USA
MENTOR: The Design and Evaluation of a Protection Services Recommender System, Muriel Franco, Bruno Rodrigues, Burkhard Stiller: 15th International Conference on Network and Service Management (CNSM 2019), 21-25 October, 2019, Halifax, Canada
DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown, Daniel Kopp, Matthias Wichtlhuber, Ingmar Poese, Jair Santanna, Oliver Hohlfeld, and Christoph Dietzel:Internet Measurement Conference (IMC ’19), 21-23 October 2019, Amsterdam, Netherlands
RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins, Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John Rula, and Nick Sullivan:Internet Measurement Conference (IMC ’19), 21-23 October 2019, Amsterdam, Netherlands
Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover, Moritz Müller, Matthew Thomas, Duane Wessels, Wes Hardaker, Taejoong Chung, Willem Toorop, and Roland van Rijswijk-Deij:Internet Measurement Conference (IMC ’19) Distinguished paper award, 21-23 October 2019, Amsterdam, Netherlands
Wireless SDN for Highly Utilized MANETs, Klement Streit, Nils Rodday, Florian Steuber, Corinna Schmitt, Gabi Dreo Rodosek:6th Workshop: ICT Systems for Public Protection and Risk Reduction at the International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2019), 21-23 October, Barcelona, Spain
Analysis of Fault Tolerance in Permissioned Blockchain Networks, Blaž Podgorelec, Vid Keršič and Muhamed Turkanović: ICAT-BCTA 2019, 20-23 October 2019, Sarajevo, Bosnia and Herzegovina
Cooperative Signaling of DDoS Attacks in a Blockchain-based Network, Bruno Rodrigues, Burkhard Stiller: ACM SIGCOMM 2019 Conference (SIGCOMM Posters and Demos ’19), 19-24 August, 2019, Beijing, China
Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic, Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez and Olivier Bettan:IEEE Transactions on Network and Service Management, 05 August 2019
At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes, P. Lutscher, Nils Weidmann, Molly E. Roberts, M. Jonker, A. King, A. Dainotti:Journal of Conflict Resolutions, July 2019

 Publications
Cybersecurity Evaluation of Enterprise Architectures: The e-SENS Case,
Tanja Pavleska, Helder Aranha, Massimiliano Masi, Eric Grandry and Giovanni Paolo Sellitto:
Practice of Enterprise Modelling (PoEM) 2019, 27-29 November 2019, Luxembourg
Auto-encoding Robot State against Sensor Spoofing Attacks, Sean Rivera, Sofiane Lagraa, Antonio Ken Iannillo, Radu State:The 4th IEEE International Workshop on Reliability and Security Data Analysis (RSDA 2019), co-located with the 30th International Symposium on Software Reliability Engineering (ISSRE 2019), 28-31 October 2019, Berlin, Germany
Analyzing and Improving Customer-side Cloud Security Certifiability, Shujie Zhao, Yiqun Chen, Stefan Winter and Neeraj Suri:IEEE International Workshop on Software Certification (WoSoCeR), 28-31 October 2019, Berlin, Germany
Mobile App to SGX Enclave Secure Channe, Fernando Kaway Carvalho Ota, Jorge Augusto Meira, Cyril Renaud Cassagnes and Radu State: 4th IEEE International Workshop on Reliability and Security Data Analysis (RSDA), co-located with ISSRE, 28-31 October 2019, Berlin, Germany
Inferring Performance Bug Patterns from Developer Commits, Yiqun Chen, Stefan Winter and Neeraj Suri: International Symposium on Software Reliability Engineering (ISSRE), 28-31 October 2019, Berlin, Germany
Securing Mobile e-Health Environments by
Design: A Holistic Architectural Approach, Helder Aranha, Massimiliano Masi, Tanja Pavleska, Giovanni Paolo Sellitto:
Seventh International Workshop on e-Health Pervasive Wireless Applications and Services 2019, 21 October 2019, Barcelona, Spain
Gyro: A Modular Scale-Out Layer for Single-Server DBMSs, Habib Saissi, Marco Serafini and Neeraj Suri: Symposium on Reliable Distributed Systems (SRDS) 2019, 1-4 October, 2019, Lyon, France
Enabling Security-by-design in Smart Grids: An architecture-based approach, Helder Aranha, Massimiliano Masi, Giovanni Paolo Sellitto and Tanja Pavleska:2019 15th European Dependable Computing Conference (EDCC), 20-27 September 2019, Naples, Italy
Improving Detection of Malicious Office Documents using One-Side Classifiers, Silviu Constantin Vitel, Gheorghe Balan, Dumitru Bogdan Prelipcean:21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC2019), Timisoara, Romania, September 4-7 2019
Preventing File-less Attacks with Machine Learning Techniques, Alexandru Gabriel Bucevschi, Gheorghe Balan, Dumitru Bogdan Prelipcean: 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC2019), Timisoara, Romania, September 4-7 2019
Extracting Safe Thread Schedules from Incomplete Model Checking Results, Patrick Metzler, Neeraj Suri and Georg Weissenbacher: International Symposium on Model Checking of Software (SPIN) 2019,  15 – 19 July 2019, Beijing, China
Assessing the State and Improving the Art of Parallel Testing for C, Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri: The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) 2019, 15 – 19 July 2019, Beijing, China
An Analysis of Cryptographic Algorithms in IoT,Samed Bajrić: Smart devices, applications, and protocols for the IoT, March 2019

 

 Publications
Cost-Effective Deployment of Certified Cloud Composite Services, Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Filippo Gaudenzi, Gwanggil Jeon: Journal of Parallel and Distributed Computing, January 2020
A Continuous Certification Methodology for DevOps, M. Anisetti, C. Ardagna, E. Damiani, F. Gaudenzi: ACM MEDES, 12-14 November 2019, Limassol, Cyprus
Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality, Raphael Labaca Castro, Battista Biggio, Gabi Dreo Rodosek:ACM SIGSAC Conference on Computer and Communications Security (CCS’ 19) – Posters & Demos, 11-15 November 2019, London, UK
Efficient Monitoring of Library Call Invocation, Marinos Tsantekidis and Vassilis Prevelakis:The 2nd IEEE International Symposium on Future Cyber Security Technologies (FCST),22-25 October 2019, Granada, Spain
Thunderbolt-3 Backbone for Augmented 5G Network Slicing in Cloud-Radio Access Networks, Bruno Dzogovic, Thanh van Do, Bernardo Santos, Van Thuan Do, Boning Feng, Niels Jacot:IEEE 5GWF’19, 30 September – 2. October, Dresden, Germany
Secure Data Exchange for Computationally Constrained Devices, Vassilis Prevelakis, Mohammad Hamad, Jihane Najar, and Ilias Spais:International workshop on Information & Operational Technology (IT & OT) security systems (IOSec 2019), 26-27 September 2019, Luxemburg
Using blockchains to enable Big Data analysis of private information, Konstantinos Lampropoulos, Giorgos Georgakakos, Sotiris Ioannidis: IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2019), 11-13 September 2019, Limassol, Cyprus
Enhancing Security of Cellular IoT with Identity Federation, Bernardo Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh van Do:The 11th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2019); 5 – 7 September 2019, Oita, Japan
Correlation Between Students’ Background and the Knowledge on Conceptual Database Modelling, Lili Nemec Zlatolas, Aida Kamišalić, Muhamed Turkanović:in book New Trends in Databases and Information Systems, Chapter · September 2019
AIMED: Evolving Malware with Genetic Programming to Evade Detection, Raphael Labaca Castro, Corinna Schmitt, Gabi Dreo Rodosek: IEEE 18th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 5-8 August, Rotorua, New Zealand
Bringing 5G Into User’s Smart Home, Bruno Dzogovic, Niels Jacot, Bernardo Santos, Van Thuan Do, Boning Feng, Thanh van Do:17th IEEE International Conference on Pervasive Intelligence and Computing, 5 – 8 August 2019, Fukuoka, Japan
Confidential Discovery of IoT devices through Blockchain, Christian Rondanini, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy
Adapting Users’ Privacy Preferences in Smart Environments,Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy
Helping Users Managing Context-based Privacy Preferences, Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy
Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks, Bernardo Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh van Do:2019 6th IEEE International Conference on Cyber Security and Cloud Computing / 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud. IEEE conference proceedings 2019 ISBN 978-1-7281-1660-0. s. 130-135, 21-23 June 2019, Paris, France
Connecting Remote eNodeB with Containerized 5G C-RANs in OpenStack Cloud, Bruno Dzogovic, Bernardo Santos, Van Thuan Do, Boning Feng, Niels Jacot, Thanh van Do:2019 6th IEEE International Conference on Cyber Security and Cloud Computing / 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud. IEEE conference proceedings 2019 ISBN 978-1-7281-1660-0. s. 14-19, 21-23 June 2019, Paris, France
Security Management and Visualization in a Blockchain-based Collaborative Defense, Christian Killer, Bruno Rodrigues, Burkhard Stiller: IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (ICBC 2019), 14-17 May 2019,  Seoul, South Korea
Red-Zone: Towards an Intrusion Response Framework for Intra-Vehicle System, Mohammad Hamad, Marinos Tsantekidis and Vassilis Prevelakis: 5th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2019), 3-5 May 2019, Heraklion, Crete, Greece

 

 Publications
Beyond content analysis: Detecting targeted ads via distributed counting, Costas Iordanou (MPI, Nicolas Kourtellis (TID), Juan Miguel Carrascosa (LSTech), Claudio Soriente (NEC Europe), Ruben Cuevas (UC3M), Nikolaos Laoutaris (IMDEA Networks):15th International Conference on emerging Networking EXperiments and Technologies (ACM CoNEXT’19), 9-12 December 2019,Orlando, Florida, U.S.
TradeMap: A FINMA-compliant Anonymous Management of an End-2-end Trading Market Place, Sina Rafati Niya, Sebastian Allemann, Arik Gabay, Burkhard Stiller:15th International Conference on Network and Service Management , 21-25 October 2019 Halifax, Canada
No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem,Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis:  The 19th ACM on Internet Measurement Conference, 21-23 October, 2019, Amsterdam, Netherlands
On the Influence of Twitter Trolls during the 2016 US Presidential Election, Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Michael Sirivianos: October 2019
Towards the Insurance of Healthcare Systems, G. Hatzivasilis, P. Chatziadam, A. Miaoudakis, E. Lakka, S. Ioannidis, A. Alessio, M. Smyrlis, G. Spanoudakis, A. Yautsiukhin, M. Antoniou, N. Stathiakis:
1st Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), ESORICS, Springer, 27 September, 2019, Luxembourg, pp. 1-14.
You Shall Not Register! Detecting Privacy Leaks across Registration Forms, Manolis Chatzimpyrros, Konstantinos Solomos and Sotiris Ioannidis: ESORICS 2019 European Symposium on Research in Computer Security 23-27 September 2019, Luxembourg
TALON: An automated framework for Cross-Device Tracking Detection,  Kostas Solomos, Panagiotis Ilias, Sotiris Ioannidis, Nicolas Kourtellis: 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), 23-25 September, 2019, Beijing, China
Complexity Analysis of Decentralized Application Development, Patrik Rek, Blaž Podgorelec and Muhamed Turkanović:SQAMIA 2019, 22-25 September 2019, Ohrid, North Macedonia
Cyber Insurance of Information Systems, G. Hatzivasilis, P. Chatziadam, N. E. Petroulakis, M. Mangini, C. Kloukinas, A. Yautsiukhin, M. Antoniou, D. G. Katehakis, M. Panayiotou:24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2019), IEEE, Limassol, Cyprus, 11-13 September, 2019, pp. 1-7.
An Example of a Cybersecurity Education Model, Muhamed Turkanović, Tatjana Welzer, Marko Hölbl:29th Annual Conference of the European Association
For Education in Electrical and Information Engineering (EAEEIE), 4-6 September 2019, University of Ruse, Bulgaria
A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks, Lili Nemec Zlatolas, Tatjana Welzer, Marko Hölbl, Marjan Heričko and Aida Kamišalić:MDPI Entropy, August 2019
Confidential Discovery of IoT devices through Blockchain, Christian Rondanini, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy
Adapting Users’ Privacy Preferences in Smart Environments,Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy
Helping Users Managing Context-based Privacy Preferences, Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy
Trustworthy IoT: An Evidence Collection Approach based on Smart Contracts, Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Claus Pahl: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy
Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls, Savvas Zannettou, Tristan Caulfield, William Setzer, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn: ACM International Web Science Conference (WebSci), June 30 – July 3, 2019 Boston, MA, USA
Nothing is free in the web: Transparency on RTB with YourAdvalue tool, Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis: Cybersecurity and Privacy (CySeP) Summer School, 10-14 June , 2019, Stockholm, Sweden
Performance analysis of fact-checking organizations and initiatives in Europe: A critical overview of online platforms fighting fake news, Tanja Pavleska, Andrej Školkay, Bissera Zankova, Nelson Ribeiro, Anja Bechmann:“Disinformation and Digital Media as a Challenge for Democracy”
European Integration and Democracy Series Vol. 6, June 2019
Blockchain-based Anonymous P2P Trading System, Sina Rafati Niya, Sebastian Allemann, Arik Gabay, Burkhard Stiller: UZH, IFI-TecReport No. 2019.04, Zürich, Switzerland, June 2019
A trust assurance technique for Internet of things based on human behavior compliance, Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Alessandro Sala:Concurrency and Computation: Practice and Experience, June 2019
Cookie Synchronization: Everything You Always Wanted to Know but were afraid to ask, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos: The 30th International Web Conference (WWW), May 13-17, 2019, San Francisco
Demo: Blockchain for the Simplification and Automation of KYC Result Sharing, Robert Norvill, Mathis Steichen, Wazen M. Shbair, Radu State: IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (ICBC 2019), 14-17 May 2019,  Seoul, South Korea
BlockZoom: Large-Scale Blockchain Testbed, Wazen M. Shbair, Mathis Steichen , Jerome Francois, Radu State: IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (ICBC 2019), 14-17 May 2019,  Seoul, South Korea
Disinformation Warfare: Understanding State-Sponsored Trolls On Twitter And Their Influence On The Web, Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini And Jeremy Blackburn: Workshop On Computational Methods In CyberSafety, Online Harassment And Misinformation, 13-14 May 2019, San Francisco, California, USA