Research Output 2007 2019

2019
1 Citation (Scopus)

Access control in Internet-of-Things: a survey

Ravidas, S., Lekidis, A., Paci, F. & Zannone, N., 15 Oct 2019, In : Journal of Network and Computer Applications. 144, p. 79-101 23 p.

Research output: Contribution to journalArticleAcademicpeer-review

Access control
Internet of things
Ecosystems
Industry

CARONTE: crawling adversarial resources over non-trusted, high-profile environments

Campobasso, M., Burda, P. & Allodi, L., 1 Jun 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019. Piscataway: Institute of Electrical and Electronics Engineers, p. 433-442 10 p. 8802484

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Scalability
Servers
Resources
Data collection
Monitoring

Characterizing the redundancy of DarkWeb .onion services

Burda, P., Boot, C. & Allodi, L., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019. New York: Association for Computing Machinery, Inc, 10 p. 19. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Redundancy
Law enforcement
Mirrors
9 Downloads (Pure)

Cognitive triaging of phishing attacks

van der Heijden, A. & Allodi, L., 6 May 2019, Usenix Security 2019. Usenix Association, 19 p. ARXIV 190502162v1

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
Electronic mail
Remediation
Learning systems
2 Downloads (Pure)

Discovering reliable evidence of data misuse by exploiting rule redundancy

Genga, L., Zannone, N. & Squicciarini, A., 1 Nov 2019, In : Computers and Security. 87, 17 p., 101577.

Research output: Contribution to journalArticleAcademicpeer-review

Association rules
redundancy
Transparency
Redundancy
Decision making
2 Citations (Scopus)

Doubly half-injective PRGs for incompressible white-box cryptography

Alpirez Bock, E., Amadori, A., Bos, J. W., Brzuska, C. & Michiels, W., 3 Feb 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Cham: Springer, p. 189-209 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cryptography
Injective
Attack
Digital Rights Management
Incompressibility
2 Citations (Scopus)
1 Downloads (Pure)

Leveraging semantics for actionable intrusion detection in building automation systems

Fauri, D., Kapsalakis, M., dos Santos, D. R., Costante, E., den Hartog, J. & Etalle, S., 1 Jan 2019, Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Revised Selected Papers. Luiijf, E., Žutautaitė, I. & Hämmerli, B. M. (eds.). Springer, p. 113-125 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11260 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Intelligent buildings
Intrusion detection
Intrusion Detection
Automation
Semantics

Privacy-conscious threat intelligence using DNSBLoom

van Rijswijk-Deij, R., Rijnders, G., Bomhoff, M. & Allodi, L., 16 May 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019. Piscataway: Institute of Electrical and Electronics Engineers, p. 98-106 9 p. 8717908

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Internet
Monitoring
Privacy
Threat
Malware
2 Downloads (Pure)

Productivity and patterns of activity in bug bounty programs: analysis of hackerone and Google vulnerability research

Luna, D., Allodi, L. & Cremonini, M., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019. New York: Association for Computing Machinery, Inc, 10 p. 67

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Productivity
Fruits
Personnel

Security proof for quantum key recycling with noise

Leermakers, D. & Škorić, B., 1 Sep 2019, In : Quantum Information and Computation. 19, 11-12, p. 913-934 22 p.

Research output: Contribution to journalArticleAcademicpeer-review

Quantum cryptography
Security Proof
Recycling
recycling
Quantum Key Distribution
12 Downloads (Pure)

Security proof for quantum key recycling with noise

Leermakers, D. & Skoric, B., 2019, In : Quantum Information & Computation. 19, 11+12, p. 0913-0934

Research output: Contribution to journalArticleAcademic

File
Quantum cryptography
Security Proof
Recycling
recycling
Quantum Key Distribution
1 Citation (Scopus)

Unveiling systematic biases in decisional processes: an application to discrimination discovery

Genga, L., Allodi, L. & Zannone, N., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. New York: Association for Computing Machinery, Inc, p. 67-72 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Association rules
Regression analysis
Data mining
1 Citation (Scopus)

White-box cryptography: don’t forget about grey-box attacks

Alpirez Bock, E., Bos, J. W., Brzuska, C., Hubain, C., Michiels, W., Mune, C., Sanfelix Gonzalez, E., Teuwen, P. & Treff, A., 1 Oct 2019, In : Journal of Cryptology. 32, 4, p. 1095-1143 49 p.

Research output: Contribution to journalArticleAcademicpeer-review

Cryptography
Attack
Fault Analysis
Reverse engineering
Fault Injection
2018
38 Downloads (Pure)

A bug bounty perspective on the disclosure of web vulnerabilities

Ruohonen, J. & Allodi, L., 2018.

Research output: Contribution to conferencePaperAcademic

Open Access
File
3 Citations (Scopus)

Economic incentives on DNSSEC deployment: time to move from quantity to quality

Le, T., Van Rijswijk-Deij, R., Allodi, L. & Zannone, N., 6 Jul 2018, IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018. Brussels: Institute of Electrical and Electronics Engineers, p. 1-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Incentives
Economics
Operator
Recommendations
Discount
2 Citations (Scopus)

On the ineffectiveness of internal encodings - Revisiting the DCA attack on white-box cryptography

Alpirez Bock, E., Brzuska, C., Michiels, W. & Treff, A., 1 Jan 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Springer, p. 103-120 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Computational Analysis
Cryptography
Encoding
Attack
Internal
7 Downloads (Pure)

Optical PUF statistics

Leermakers, D., Razeghi, B., Rezaeifar, S., Skoric, B., Taran, O. & Voloshynovskiy, S., 1 Oct 2018, Eindhoven: Technische Universiteit Eindhoven. 33 p. (Computer science reports; vol. 1804)

Research output: Book/ReportReportAcademic

statistics
1 Citation (Scopus)
63 Downloads (Pure)

Optimal attacks on qubit-based Quantum Key Recycling

Leermakers, D. & Škorić, B., 1 Mar 2018, In : Quantum Information Processing. 17, 3, 57.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Recycling
Qubit
recycling
attack
coding
3 Downloads (Pure)

Security proof for quantum key recycling with noise

Leermakers, D. & Skoric, B., 2018, In : IACR Cryptology ePrint Archive. 2018, 15 p., 264.

Research output: Contribution to journalArticleAcademic

Open Access
privacy
recycling
reuse
bit error rate
entropy
1 Citation (Scopus)
15 Downloads (Pure)

Security proof for round-robin differential phase shift QKD

Leermakers, D. & Škorić, B., 1 Oct 2018, In : Quantum Information Processing. 17, 10, 36 p., 250.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Security Proof
Phase Shift
Phase shift
privacy
phase shift
8 Downloads (Pure)

The effect of security education and expertise on security assessments: the case of software vulnerabilities

Allodi, L., Cremonini, M., Massacci, F. & Shim, W., 1 Aug 2018.

Research output: Contribution to conferencePaperAcademic

Open Access
File
Education
Information technology
Industry
Chemical analysis

Theory of local search

Michiels, W., Aarts, E. H. L. & Korst, J., 13 Aug 2018, Handbook of heuristics. Martí, R., Pardalos, P. & Resende, M. (eds.). Cham: Springer, p. 299-339 41 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Combinatorial optimization
Local Search
Heuristic methods
Combinatorial Optimization Problem
Computational complexity
1 Downloads (Pure)

Underground economics for vulnerability risk

Allodi, L., Apr 2018, In : ;login:. 43, 1

Research output: Contribution to journalArticleAcademicpeer-review

Risk vulnerability
Attack
Economics
Risk assessment
Economic risk
2017

Assuring virtual network function image integrity and host sealing in telco cloud

Lal, S., Ravidas, S., Oliver, I. & Taleb, T., May 2017, p. 1-6.

Research output: Contribution to conferencePaperAcademic

Open Access
Hardware
Freight transportation
Virtual reality
Seals

Attack potential in impact and complexity

Allodi, L. & Massacci, F., 2017, International Conference on Availability, Reliability and Security, ARES 2017, 29 August - 1 September 2017, Reggio Calabria, Italy. New York: Association for Computing Machinery, Inc

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Computer systems
1 Citation (Scopus)

Diversity: A poor man's solution to drone takeover

Davanian, A., Massacci, F. & Allodi, L., 1 Jan 2017, PECCS 2017 - Proceedings of the 7th International Joint Conference on Pervasive and Embedded Computing and Communication Systems. s.l.: SCITEPRESS-Science and Technology Publications, Lda., p. 25-34 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Energy utilization
Drones
12 Citations (Scopus)

Economic factors of vulnerability trade and exploitation

Allodi, L., 2017, CCS'17 : Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security ; Oktober 30 - November 3, 2017, Dallas, TX, USA. Newc York: Association for Computing Machinery, Inc, p. 1483-1499 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Vulnerability
Economic factors
Exploitation
Attack
Economics
3 Downloads (Pure)

Encryption in ICS networks : a blessing or a curse?

Fauri, D., de Wijs, B., den Hartog, J. I., Costante, E., Zambon, E. & Etalle, S., 2017, IEEE SmartGridCom : Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 23-26 October 2017, Dresden, Germany. Brussels: IEEE Computer Society, p. 289-294 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
Cryptography
Control systems
Telecommunication networks
2 Citations (Scopus)

Estimating the assessment difficulty of CVSS environmental metrics : an experiment

Allodi, L., Biagioni, S., Crispo, B., Labunets, K., Massacci, F. & Santos, W., 2017, Future Data and Security Engineering: 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings. Dang, T. K., Wagner, R., Küng, J., Thoai, N., Takizawa, M. & Neuhold, E. J. (eds.). Berlin: Springer, p. 23-39

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Large scale systems
Students
Experiments
Compliance
4 Citations (Scopus)
3 Downloads (Pure)

From system specification to anomaly detection (and back)

Fauri, D., Dos Santos, D. R., Costante, E., den Hartog, J. J., Etalle, S. & Tonetta, S., 2017, CPS'17 : Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 3 November 2017, Dallas, Texas. New York: Association for Computing Machinery, Inc, p. 13-24 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Specifications
Monitoring
Intrusion detection
Control systems
Formal specification
8 Citations (Scopus)

Incorporating trust in NFV : addressing the challenges

Ravidas, S., Lal, S., Oliver, I. & Hippelainen, L., 7 Mar 2017, 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN), 7-9 March 2017, . Piscataway: Institute of Electrical and Electronics Engineers, p. 87-91

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Terminology
Network function virtualization
Telecommunication networks
Hardware
25 Downloads (Pure)

Optimal attacks on qubit-based Quantum Key Recycling

Leermakers, D. & Skoric, B., 2017, In : IACR Cryptology ePrint Archive. 2017, 331, p. 1-19

Research output: Contribution to journalArticleAcademic

Open Access
File
Recycling
Entropy
Quantum cryptography
Quantum computers
Cryptography
7 Citations (Scopus)
47 Downloads (Pure)

Security proof for round robin differential phase shift QKD

Leermakers, D. & Skoric, B., 2 Sep 2017, In : arXiv. 1709.00552v1, p. 1-17

Research output: Contribution to journalArticleAcademic

Open Access
File
phase shift
bit error rate
1036 Downloads (Pure)

The work-averse cyber attacker model : theory and evidence from two million attack signatures

Allodi, L., Massacci, F. & Williams, J., Jun 2017. 36 p.

Research output: Contribution to conferencePaperAcademic

Open Access
File

Towards realistic threat modeling : attack commodification, irrelevant vulnerabilities, and unrealistic assumptions

Allodi, L. & Etalle, S., 2017, SafeConfig '17 Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 3 November 2017, Dallas, Texas. New York: Association for Computing Machinery, Inc, p. 23-26

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Game theory
2016
10 Citations (Scopus)

A hybrid framework for data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., Den Hartog, J. & Zannone, N., 1 Aug 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, 23-25 May 2016, San Jose, California. Piscataway: Institute of Electrical and Electronics Engineers, p. 324-333 10 p. 7527785

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Loss prevention
Engines
Feedback
2 Citations (Scopus)

A severity-based quantification of data leakages in database systems

Vavilis, S., Petkovic, M. & Zannone, N., 1 Jun 2016, In : Journal of Computer Security. 24, 3, p. 321-345 25 p.

Research output: Contribution to journalArticleAcademicpeer-review

Data structures
Leakage (fluid)
Specifications

Combining data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., den Hartog, J. I. & Zannone, N., 2016.

Research output: Contribution to conferencePosterAcademic

25 Citations (Scopus)

Differential computation analysis: hiding your white-box designs is not enough

Bos, J. W., Hubain, C., Michiels, W. & Teuwen, P., 2016, Cryptographic Hardware and Embedded Systems – CHES 2016: 18th International Conference, Santa Barbara, California, August 17-19, 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (eds.). Dordrecht: Springer, p. 215-236 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9813).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Reverse engineering
Box Product
Trace
Attack
Differential Power Analysis
2 Citations (Scopus)

Role mining with missing values

Vavilis, S., Egner, A. I., Petkovic, M. & Zannone, N., 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES), 31 August - 2 September 2016, Salzburg, Austria. Piscataway: Institute of Electrical and Electronics Engineers, p. 167-176

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2015
6 Citations (Scopus)

A capacity-achieving simple decoder for bias-based traitor tracing schemes

Oosterwijk, J., Skoric, B. & Doumen, J. M., 2015, In : IEEE Transactions on Information Theory. 61, 7, p. 3882-3900

Research output: Contribution to journalArticleAcademicpeer-review

trend
coalition
scaling
symbol
1 Citation (Scopus)
69 Downloads (Pure)

Access control with non-deterministic and probabilistic attribute retrieval

Crampton, J., Morisset, C. & Zannone, N., 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust (2015, London, UK, April 18, 2015; affiliated with ETAPS 2015). p. 1-19

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Access control
Specifications
24 Citations (Scopus)
3 Downloads (Pure)

Analysis of XACML policies with SMT

Turkmen, F., den Hartog, J. I., Ranise, S. & Zannone, N., 2015, Principles of Security and Trust (4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, 11-18 April, 2015. Proceedings). Focardi, R. & Myters, A. (eds.). Dordrecht: Springer, p. 115-134 (Lecture Notes in Computer Science; vol. 9036).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Surface mount technology
Access control
XML
Markup languages
Specifications
7 Citations (Scopus)
5 Downloads (Pure)

An anomaly analysis framework for database systems

Vavilis, S., Egner, A. I., Petkovic, M. & Zannone, N., 2015, In : Computers and Security. 53, p. 156-173 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

incident
ranking
Risk assessment
Visualization
Monitoring
48 Downloads (Pure)

Auditing with incomplete logs

Mian, U. S., Hartog, den, J. I., Etalle, S. & Zannone, N., 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust (2015, London, UK, April 18, 2015; affiliated with ETAPS 2015). p. 1-23

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Compliance
Industry
7 Citations (Scopus)
34 Downloads (Pure)

Binary and q-ary Tardos codes, revisited

Skoric, B. & Oosterwijk, J., 2015, In : Designs, Codes and Cryptography. 74, 1, p. 75-111 37 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Binary
Collusion
Fingerprinting
Coalitions
Traitor Tracing
266 Downloads (Pure)

Differential computation analysis : hiding your white-box designs is not enough

Bos, J. W., Hubain, C., Michiels, W. P. A. J. & Teuwen, P., 2015, IACR. 22 p. (Cryptology ePrint Archive; vol. 2015/753)

Research output: Book/ReportReportAcademic

Open Access
File
Reverse engineering
Cryptography
Hardware
Data storage equipment
Industry
35 Downloads (Pure)

Evidence-based discounting rule in subjective logic

Skoric, B., Hoogh, de, S. J. A. & Zannone, N., 2015, Proceedings of the 36th WIC Symposium on Information Theory in the Benelux (Brussels, Belgium, May 6-7, 2015). Roland, J. & Horlin, F. (eds.). Werkgemeenschap voor Informatie- en Communicatietheorie (WIC), p. 1-3

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
45 Downloads (Pure)

False negative probabilities in Tardos codes

Simone, A. & Skoric, B., 2015, In : Designs, Codes and Cryptography. 74, 1, p. 159-182

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Watermarking
Convolution
Collusion
Series Expansion
Attack
66 Downloads (Pure)

False positive probabilities in q-ary Tardos codes : comparison of attacks

Simone, A. & Skoric, B., 1 Jun 2015, In : Designs, Codes and Cryptography. 75, 3, p. 519-542 24 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
False Positive
Attack
Convolution
Voting
Series Expansion