Publications

Publications

 Publications
SC-FLARE: Cooperative DDoS Signaling based on Smart Contracts,Bruno Rodrigues, Spasen Trendafilov, Eder Scheid, Burkhard Stiller: IEEE International Conference on Blockchain and Cryptocurrency 2-6 May 2020, Virtual Conference
WeTrace: Privacy-preserving Mobile COVID-19 Tracing Approach and Application,Alessandro De Carli, Muriel Franco, Andreas Gassmann, Christian Killer, Bruno Rodrigues, Eder John Scheid, David Schoenbaechler, Burkhard Stille: Whitepaper , April 2020
Design and implementation of cast-as-intended verifiability for a blockchain-based voting system, Christian Killer, Bruno Rodrigues, Raphael Matile, Eder Scheid, Burkhard Stiller:SAC '20: Proceedings of the 35th Annual ACM Symposium on Applied Computing,March 30-April 3, 2020, Virtual Conference
Blockchains in the Age of Softwarization - Hands-on Experiences with Programming Smart Contracts and Their Security Pitfalls, Bruno Rodrigues, Eder Scheid, Burkhard Stiller:IEEE/IFIP Network Operations and Management Symposium (NOMS),20-24 April 2020, Virtual Conference
State Channel as a Service based on a Distributed and Decentralized Web,Blaž Podgorelec, Marjan Heričko, Muhamed Turkanović:IEEE Access,30 March 2020
When parents and children disagree: Diving into DNS delegation inconsistency,Raffaele Sommese, Giovane C. M. Moura, Mattijs Jonker, Roland van Rijswijk-Deij , Alberto Dainotti, K Claffy, Anna Sperotto:2020 Passive and Active Measurement Conference (PAM2020),March 2020
Counterfighting Counterfeit: detecting and taking down fraudulent webshops at a ccTLD,Thymen Wabeke, Giovane C. M. Moura, Nanneke Franken, Cristian Hesselman:2020 Passive and Active Measurement Conference (PAM2020),March 2020
A Novel Intrusion Detection System Against Spoofing Attacks in Connected Electric Vehicle, Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyiannis, Francisco J. Navarro, Antonios Argyriou and Helge Janicke: Array, Volume 5, March 2020
ARIMA Supplemented Security Metrics for Quality Assurance and Situational Awareness,Jan Kohlrausch and Eugene A. Brin:ACM DTRAP Journal Vol 1 No 1,March 2020
Angry Birds Flock Together: Aggression Propagation on Social Media,
Chrysoula Terizi, Despoina Chatzakou, Evaggelia Pitoura, Panayiotis Tsaparas, Nicolas Kourtellis:
February 2020
Certified Machine-Learning Models,Ernesto Damiani, Claudio Agostino Ardagna:
46th International Conference on Current Trends in Theory and Practice of Informatics (SOFSEM 2020), 20-24 January 2020,Limassol,Cyprus
Cost-Effective Deployment of Certified Cloud Composite Services, Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Filippo Gaudenzi, Gwanggil Jeon: Journal of Parallel and Distributed Computing, January 2020
A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection,Blaž Podgorelec, Muhamed Turkanović, Sašo Karakatič: Journal article Sensors, 25 December 2019
Secure Semantic Interoperability for IoT Applications with Linked Data, G. Hatzivasilis, O. Soultatos, E. Lakka, S. Ioannidis, D. Anicic, A. Broring, L. Ciechomski, M. Falchetto, K. Fysarakis, G. Spanoudakis: IEEE Global Communications Conference (GLOBECOM 2019), IEEE, Waikoloa, HI, USA, 9- 13 December, 2019, pp. 1-7
Beyond content analysis: Detecting targeted ads via distributed counting, Costas Iordanou (MPI, Nicolas Kourtellis (TID), Juan Miguel Carrascosa (LSTech), Claudio Soriente (NEC Europe), Ruben Cuevas (UC3M), Nikolaos Laoutaris (IMDEA Networks): 15th International Conference on emerging Networking EXperiments and Technologies (ACM CoNEXT'19), 9-12 December 2019,Orlando, Florida, U.S.
Cybersecurity Evaluation of Enterprise Architectures: The e-SENS Case,
Tanja Pavleska, Helder Aranha, Massimiliano Masi, Eric Grandry and Giovanni Paolo Sellitto:
Practice of Enterprise Modelling (PoEM) 2019, 27-29 November 2019, Luxembourg
Evaluating TCP Connection Healthiness, Nils Rodday, Raphael Labaca Castro, Klement Streit and Gabi Dreo Rodosek: International Telecommunication Networks and Applications Conference ITNAC 2019, 27-29 November 2019, Auckland, New Zealand
A Continuous Certification Methodology for DevOps, M. Anisetti, C. Ardagna, E. Damiani, F. Gaudenzi: ACM MEDES, 12-14 November 2019, Limassol, Cyprus
Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality, Raphael Labaca Castro, Battista Biggio, Gabi Dreo Rodosek:ACM SIGSAC Conference on Computer and Communications Security (CCS' 19) - Posters & Demos, 11-15 November 2019, London, UK
Machine Learning for Security at the IoT Edge - A Feasibility Study, Han Wang, Luis Barriga, Arash Vahidi, Shahid Raza: International Workshop on Machine Learning Security and Privacy: Experiences and Applications, 4 - 7 November 2019, Monterey, CA, USA
A Proposal for Security Assessment of Trustzone-M based Software, Antonio Ken Iannillo, Radu State:Fast Abstract at the 30th International Symposium on Software Reliability Engineering (ISSRE 2019),28-31 October 2019, Berlin, Germany
Auto-encoding Robot State against Sensor Spoofing Attacks, Sean Rivera, Sofiane Lagraa, Antonio Ken Iannillo, Radu State:The 4th IEEE International Workshop on Reliability and Security Data Analysis (RSDA 2019), co-located with the 30th International Symposium on Software Reliability Engineering (ISSRE 2019), 28-31 October 2019, Berlin, Germany
Analyzing and Improving Customer-side Cloud Security Certifiability, Shujie Zhao, Yiqun Chen, Stefan Winter and Neeraj Suri:IEEE International Workshop on Software Certification (WoSoCeR), 28-31 October 2019, Berlin, Germany
Mobile App to SGX Enclave Secure Channe, Fernando Kaway Carvalho Ota, Jorge Augusto Meira, Cyril Renaud Cassagnes and Radu State: 4th IEEE International Workshop on Reliability and Security Data Analysis (RSDA), co-located with ISSRE, 28-31 October 2019, Berlin, Germany
Inferring Performance Bug Patterns from Developer Commits, Yiqun Chen, Stefan Winter and Neeraj Suri: International Symposium on Software Reliability Engineering (ISSRE), 28-31 October 2019, Berlin, Germany
Efficient Monitoring of Library Call Invocation, Marinos Tsantekidis and Vassilis Prevelakis:The 2nd IEEE International Symposium on Future Cyber Security Technologies (FCST),22-25 October 2019, Granada, Spain
TradeMap: A FINMA-compliant Anonymous Management of an End-2-end Trading Market Place, Sina Rafati Niya, Sebastian Allemann, Arik Gabay, Burkhard Stiller:15th International Conference on Network and Service Management , 21-25 October 2019 Halifax, Canada
MENTOR: The Design and Evaluation of a Protection Services Recommender System, Muriel Franco, Bruno Rodrigues, Burkhard Stiller: 15th International Conference on Network and Service Management (CNSM 2019), 21-25 October, 2019, Halifax, Canada
DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown, Daniel Kopp, Matthias Wichtlhuber, Ingmar Poese, Jair Santanna, Oliver Hohlfeld, and Christoph Dietzel:Internet Measurement Conference (IMC '19), 21-23 October 2019, Amsterdam, Netherlands
RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins, Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John Rula, and Nick Sullivan:Internet Measurement Conference (IMC '19), 21-23 October 2019, Amsterdam, Netherlands
Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover, Moritz Müller, Matthew Thomas, Duane Wessels, Wes Hardaker, Taejoong Chung, Willem Toorop, and Roland van Rijswijk-Deij:Internet Measurement Conference (IMC '19) Distinguished paper award, 21-23 October 2019, Amsterdam, Netherlands
No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem,Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis:  The 19th ACM on Internet Measurement Conference, 21-23 October, 2019, Amsterdam, Netherlands
Wireless SDN for Highly Utilized MANETs, Klement Streit, Nils Rodday, Florian Steuber, Corinna Schmitt, Gabi Dreo Rodosek:6th Workshop: ICT Systems for Public Protection and Risk Reduction at the International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2019), 21-23 October, Barcelona, Spain
Securing Mobile e-Health Environments by
Design: A Holistic Architectural Approach, Helder Aranha, Massimiliano Masi, Tanja Pavleska, Giovanni Paolo Sellitto:
Seventh International Workshop on e-Health Pervasive Wireless Applications and Services 2019, 21 October 2019, Barcelona, Spain
Analysis of Fault Tolerance in Permissioned Blockchain Networks, Blaž Podgorelec, Vid Keršič and Muhamed Turkanović: ICAT-BCTA 2019, 20-23 October 2019, Sarajevo, Bosnia and Herzegovina
Scalable Transport Mechanisms for Blockchain IoT Applications, Eryk Schiller, Sina Rafati Niya, Timo Surbeck, Burkhard Stiller: 2019 IEEE 44th Conference on Local Computer Networks (LCN) (LCN 2019),  14-17 October, 2019, Osnabrück, Germany
Gyro: A Modular Scale-Out Layer for Single-Server DBMSs, Habib Saissi, Marco Serafini and Neeraj Suri: Symposium on Reliable Distributed Systems (SRDS) 2019, 1-4 October, 2019, Lyon, France
On the Influence of Twitter Trolls during the 2016 US Presidential Election, Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Michael Sirivianos: October 2019
Thunderbolt-3 Backbone for Augmented 5G Network Slicing in Cloud-Radio Access Networks, Bruno Dzogovic, Thanh van Do, Bernardo Santos, Van Thuan Do, Boning Feng, Niels Jacot:IEEE 5GWF'19, 30 September - 2. October, Dresden, Germany
Towards the Insurance of Healthcare Systems, G. Hatzivasilis, P. Chatziadam, A. Miaoudakis, E. Lakka, S. Ioannidis, A. Alessio, M. Smyrlis, G. Spanoudakis, A. Yautsiukhin, M. Antoniou, N. Stathiakis:
1st Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), ESORICS, Springer, 27 September, 2019, Luxembourg, pp. 1-14.
Secure Data Exchange for Computationally Constrained Devices, Vassilis Prevelakis, Mohammad Hamad, Jihane Najar, and Ilias Spais:International workshop on Information & Operational Technology (IT & OT) security systems (IOSec 2019), 26-27 September 2019, Luxemburg
You Shall Not Register! Detecting Privacy Leaks across Registration Forms, Manolis Chatzimpyrros, Konstantinos Solomos and Sotiris Ioannidis: ESORICS 2019 European Symposium on Research in Computer Security 23-27 September 2019, Luxembourg
TALON: An automated framework for Cross-Device Tracking Detection,  Kostas Solomos, Panagiotis Ilias, Sotiris Ioannidis, Nicolas Kourtellis: 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), 23-25 September, 2019, Beijing, China
Complexity Analysis of Decentralized Application Development, Patrik Rek, Blaž Podgorelec and Muhamed Turkanović:SQAMIA 2019, 22-25 September 2019, Ohrid, North Macedonia
Enabling Security-by-design in Smart Grids: An architecture-based approach, Helder Aranha, Massimiliano Masi, Giovanni Paolo Sellitto and Tanja Pavleska:2019 15th European Dependable Computing Conference (EDCC), 20-27 September 2019, Naples, Italy
End-to-End Semantic Interoperability Mechanisms for IoT,E. Lakka, N. E. Petroulakis, G. Hatzivasilis, O. Soultatos, M. Michalodimitrakis, U. Rak, K. Waledzik, D. Anicic, V. Kulkarni:24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2019), IEEE, Limassol, Cyprus, 11-13 September, 2019, pp. 1-6.
Using blockchains to enable Big Data analysis of private information, Konstantinos Lampropoulos, Giorgos Georgakakos, Sotiris Ioannidis: IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2019), 11-13 September 2019, Limassol, Cyprus
Cyber Insurance of Information Systems, G. Hatzivasilis, P. Chatziadam, N. E. Petroulakis, M. Mangini, C. Kloukinas, A. Yautsiukhin, M. Antoniou, D. G. Katehakis, M. Panayiotou:24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2019), IEEE, Limassol, Cyprus, 11-13 September, 2019, pp. 1-7.
Enhancing Security of Cellular IoT with Identity Federation, Bernardo Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh van Do:The 11th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2019); 5 - 7 September 2019, Oita, Japan
Improving Detection of Malicious Office Documents using One-Side Classifiers, Silviu Constantin Vitel, Gheorghe Balan, Dumitru Bogdan Prelipcean:21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC2019), Timisoara, Romania, September 4-7 2019
Preventing File-less Attacks with Machine Learning Techniques, Alexandru Gabriel Bucevschi, Gheorghe Balan, Dumitru Bogdan Prelipcean: 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC2019), Timisoara, Romania, September 4-7 2019
An Example of a Cybersecurity Education Model, Muhamed Turkanović, Tatjana Welzer, Marko Hölbl:29th Annual Conference of the European Association
For Education in Electrical and Information Engineering (EAEEIE), 4-6 September 2019, University of Ruse, Bulgaria
MobileTrust: Secure Knowledge Integration in VANETs, G. Hatzivasilis, O. Soultatos, S. Ioannidis, G. Spanoudakis, V. Katos, G. Demetriou: ACM Transactions on Cyber-Physical Systems Special Issue on User-Centric Security and Safety for Cyber-Physical Systems, ACM, vol., pp., September 2019
Correlation Between Students’ Background and the Knowledge on Conceptual Database Modelling, Lili Nemec Zlatolas, Aida Kamišalić, Muhamed Turkanović:in book New Trends in Databases and Information Systems, Chapter · September 2019
Cooperative Signaling of DDoS Attacks in a Blockchain-based Network, Bruno Rodrigues, Burkhard Stiller: ACM SIGCOMM 2019 Conference (SIGCOMM Posters and Demos '19), 19-24 August, 2019, Beijing, China
AIMED: Evolving Malware with Genetic Programming to Evade Detection, Raphael Labaca Castro, Corinna Schmitt, Gabi Dreo Rodosek: IEEE 18th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 5-8 August, Rotorua, New Zealand
Bringing 5G Into User’s Smart Home, Bruno Dzogovic, Niels Jacot, Bernardo Santos, Van Thuan Do, Boning Feng, Thanh van Do:17th IEEE International Conference on Pervasive Intelligence and Computing, 5 - 8 August 2019, Fukuoka, Japan
Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic, Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez and Olivier Bettan:IEEE Transactions on Network and Service Management, 05 August 2019
A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks, Lili Nemec Zlatolas, Tatjana Welzer, Marko Hölbl, Marjan Heričko and Aida Kamišalić:MDPI Entropy, August 2019
At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes, P. Lutscher, Nils Weidmann, Molly E. Roberts, M. Jonker, A. King, A. Dainotti:Journal of Conflict Resolutions, July 2019
Extracting Safe Thread Schedules from Incomplete Model Checking Results, Patrick Metzler, Neeraj Suri and Georg Weissenbacher: International Symposium on Model Checking of Software (SPIN) 2019,  15 - 19 July 2019, Beijing, China
Assessing the State and Improving the Art of Parallel Testing for C, Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri: The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) 2019, 15 - 19 July 2019, Beijing, China
Confidential Discovery of IoT devices through Blockchain, Christian Rondanini, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy
Adapting Users' Privacy Preferences in Smart Environments,Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy
Helping Users Managing Context-based Privacy Preferences, Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy
Trustworthy IoT: An Evidence Collection Approach based on Smart Contracts, Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Claus Pahl: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy
Cyber Security Assessment of the Public Sector in Greece, George Drivas, Leandros Maglaras, Helge Janicke, Sotiris Ioannidis: 18th European Conference on Cyber Warfare and Security (ECCWS 2019), 4-5 July 2019, Coimbra, Portugal
Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls, Savvas Zannettou, Tristan Caulfield, William Setzer, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn: ACM International Web Science Conference (WebSci), June 30 – July 3, 2019 Boston, MA, USA
Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks, Bernardo Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh van Do:2019 6th IEEE International Conference on Cyber Security and Cloud Computing / 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud. IEEE conference proceedings 2019 ISBN 978-1-7281-1660-0. s. 130-135, 21-23 June 2019, Paris, France
Connecting Remote eNodeB with Containerized 5G C-RANs in OpenStack Cloud, Bruno Dzogovic, Bernardo Santos, Van Thuan Do, Boning Feng, Niels Jacot, Thanh van Do:2019 6th IEEE International Conference on Cyber Security and Cloud Computing / 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud. IEEE conference proceedings 2019 ISBN 978-1-7281-1660-0. s. 14-19, 21-23 June 2019, Paris, France
Nothing is free in the web: Transparency on RTB with YourAdvalue tool, Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis: Cybersecurity and Privacy (CySeP) Summer School, 10-14 June , 2019, Stockholm, Sweden
Performance analysis of fact-checking organizations and initiatives in Europe: A critical overview of online platforms fighting fake news, Tanja Pavleska, Andrej Školkay, Bissera Zankova, Nelson Ribeiro, Anja Bechmann:“Disinformation and Digital Media as a Challenge for Democracy”
European Integration and Democracy Series Vol. 6, June 2019
Blockchain-based Anonymous P2P Trading System, Sina Rafati Niya, Sebastian Allemann, Arik Gabay, Burkhard Stiller: UZH, IFI-TecReport No. 2019.04, Zürich, Switzerland, June 2019
A trust assurance technique for Internet of things based on human behavior compliance, Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Alessandro Sala:Concurrency and Computation: Practice and Experience, June 2019
Cookie Synchronization: Everything You Always Wanted to Know but were afraid to ask, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos: The 30th International Web Conference (WWW), May 13-17, 2019, San Francisco
Demo: Blockchain for the Simplification and Automation of KYC Result Sharing, Robert Norvill, Mathis Steichen, Wazen M. Shbair, Radu State: IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (ICBC 2019), 14-17 May 2019,  Seoul, South Korea
BlockZoom: Large-Scale Blockchain Testbed, Wazen M. Shbair, Mathis Steichen , Jerome Francois, Radu State: IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (ICBC 2019), 14-17 May 2019,  Seoul, South Korea
Security Management and Visualization in a Blockchain-based Collaborative Defense, Christian Killer, Bruno Rodrigues, Burkhard Stiller: IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (ICBC 2019), 14-17 May 2019,  Seoul, South Korea
Disinformation Warfare: Understanding State-Sponsored Trolls On Twitter And Their Influence On The Web, Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini And Jeremy Blackburn: Workshop On Computational Methods In CyberSafety, Online Harassment And Misinformation, 13-14 May 2019, San Francisco, California, USA
Red-Zone: Towards an Intrusion Response Framework for Intra-Vehicle System, Mohammad Hamad, Marinos Tsantekidis and Vassilis Prevelakis: 5th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2019), 3-5 May 2019, Heraklion, Crete, Greece
Adaptation of Proof-of-Stake-based Blockchains for IoT Data Streams (Demo),Sina Rafati Niya, Eryk Schiller, Ile Cepilov, Fabio Maddaloni, Timo Surbeck, Kürsat Aydinli, Thomas Bocek, Burkhard Stiller:1st IEEE International Conference on Blockchains and Cryptocurrencies (ICBC 2019), Seoul, South Korea, May 2019, pp 15-16
An Analysis of Cryptographic Algorithms in IoT,Samed Bajrić: Smart devices, applications, and protocols for the IoT, March 2019
Revisiting Rowhammer Attacks in Embedded Systems, Lidia Pocero Fraile, Apostolos P. Fournaris, Odysseas Koufopavlou: 14th IEEE International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 16-18 April 2019, Mykonos, Greece