This page is dedicated to all ASSURED scientific publications.
- “RETRACT: Expressive Designated Verifier Credentials” by H. Bergsson, T. Giannetsos. Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES 2023), 29 August – 01 September 2023
- “Hash-based Direct Anonymous Attestation” by L. Chen, C. Dong , N. El Kassem, C. J.P. Newton, Y. Wang. Proceedings of the International Conference on Post-Quantum Cryptography (PQCrypto 2023), 16-18 August 2023
- “ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks” by P. Rieger, M. Chilese, R. Mohamed, M. Miettinen, H. Fereidooni, A.R. Sadeghi. Proceedings of the 32nd USENIX Security Symposium (USENIX Security 2023), 9-11 August 2022
- “Achieving Higher Level of Assurance in Decentralized and privacy Preserving identity Wallets” by B. Larsen, N. El Kaseem, T. Giannetsos, I. Krontiris, L. Chen. Proceedings of the 23rd Privacy Enhancing Technologies Symposium (PETS 2023), 10-15 July 2023
- “ZEKRA: Zero-Knowledge Control-Flow Attestation” by H. Bergsson Debes, E. Dushku, S. Ali Marandi, T. Giannetsos. Proceedings of the 18th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2023), 10-14 July 2023
- “No Free Wireless Charge: Covert Channels via Wireless Charging on Mobile Devices” by W. Chiu, W. Meng, B. Lampe. Proceedings of the Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2023), 27-30 June 2023
- “PROVE: Provable remote attestation for public verifiability” by E. Dushku, Md. M. Rabbani, J. Vliegen, A. Braeken, N. Mentens. A scientific article published in the Journal of Information Security and Applications (volume 75), May 2023
- “HPAKE: Honey Password-Authenticated Key Exchange for Fast and Safer Online Authentication” by W. Li, P. Wang, K. Liang. A scientific article published in the IEEE Transactions on Information Forensics and Security (volume 18), March 2023
- “Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization” by E. Chen, Y. Zhu, K. Liang, H. Yin. A scientific article published in the IEEE Transactions on Cloud Computing (volume 11), March 2023
- “The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption” by T. Chen, P. Xu, S. Picek, B. Luo, W. Susilo, H. Jin, K. Liang. Proceedings of the Network and Distributed System Security Symposium (NDSS 2023), 27 February – 3 March 2023
- “POSE: Practical Off-chain Smart Contract Execution” by T. Frassetto, P. Jauernig, D. Koisser, D. Kretzler, B. Schlosser, S. Faust, A. Sadeghi. Proceedings of the Network and Distributed System Security Symposium (NDSS 2023), 27 February – 3 March 2023
- “How to Bind a TPM’s Attestation Keys with its Endorsement Key ” by L. Chen, N. El Kassem, C. Newton. A scientific article published in The Computer Journal 2023
- “FLVoogd: Robust And Privacy Preserving Federated Learning” by Y. Tian, R. Wang, Y. Qiao, E. Panaousis, K. Liang. Proceedings of the 14th Asian Conference on Machine Learning (ACML 2022), 12-14 December 2022
- “More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks” by J. Xu, R. Wang, K. Liang, S. Picek. Proceedings of the 38th Annual Computer Security Applications Conference (ACSAC 2022), 5-9 December 2022
- “Combining ID’s, Attributes, and Policies in Hyperledger Fabric” by D. Gordijn, R. Kromes, T. Giannetsos, K. Liang. Proceedings of the 2nd EAI International Conference on Blockchain Technology and Emerging Applications (EAI BlockTEA 2022), 21-22 November 2022
- “ID-based self-encryption via Hyperledger Fabric based smart contract” by I. Grishkov, R. Kromes, T. Giannetsos, K. Liang. Proceedings of the 2nd EAI International Conference on Blockchain Technology and Emerging Applications (EAI BlockTEA 2022), 21-22 November 2022
- “DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay” by Y. Zheng, P. Xu, W. Wang, T. Chen, W. Susilo, K. Liang, H. Jin. Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS 2022), 26-30 September 2022
- “Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption” by X. Wang, Z. Cao, Z. Liu, K. Liang. Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS 2022), 26-30 September 2022
- “VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents.” by S. Lambregts, H. Chen, J. Ning, K. Liang. Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS 2022), 26-30 September 2022
- “No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent” by H. Chen, S. Fu, K. Liang. Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS 2022), 26-30 September 2022
- “ZEKRO: Zero-Knowledge Proof of Integrity Conformance” by H. Bergsson Debes, T. Giannetsos. Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES 2022), 23-26 August 2022
- “V’CER: Efficient Certificate Validation in Constrained Networks” by D. Koisser, P. Jauernig, G. Tsudik, A.R. Sadeghi. Proceedings of the 31st USENIX Security Symposium (USENIX Security 2022), 10-12 August 2022
- “Live System Call Trace Reconstruction on Linux” by T. Nguyen, M. Orenbach, A. Atamli. Proceedings of the 22nd Digital Forensic Research Workshop Conference (DFRWS USA 2022), 11-14 July 2022
- “DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints” by Z. Zhao, X. Chen, Y. Xuan, Y. Dong, D. Wang, K. Liang. Proceedings of the IEEE / CVF Computer Vision and Pattern Recognition Conference (CVPR 2022), 19-24 June 2022
- “Memory Offloading for Remote Attestation of Multi-Service IoT Devices” by E. Dushku, J.H. Østergaard, N. Dragoni. A scientific article published on Sensors 2022, 8 June 2022
- “ROSE: Robust Searchable Encryption With Forward and Backward Security” by P. Xu, W. Susilo, W. Wang, T. Chen, Q. Wu, K. Liang, H. Jin. A scientific article published on the IEEE Transactions on Information Forensics and Security (volume 17), March 2022
- “PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things through Blockchain” by S.F.J.J. Ankergård, E. Dushku, N. Dragoni. Proceedings of the 14th International Symposium on Foundations & Practice of Security (FPS 2021), 7-10 December 2021
- “RealSWATT: Remote Software-based Attestation for Embedded Devices under Real-time Constraints” by C. Niesler, S. Surminski, F. Brasser, L. Davi, A.R. Sadeghi. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (ACM CSS 2021), 15-19 November 2021
- “RESERVE: Remote Attestation of Intermittent loT devices” by MD. Masoom Rabbani, E. Dushku, J. Vliegen, A. Braeken, N. Dragoni, N. Mentens. ACM Conference on Embedded Networked Sensor Systems (ACM SenSys 2021), 15-17 November 2021
- “GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks” by T. Arbera, F. Brasser, L. Gunn, P. Jauerning, D. Koisser, A.R. Shadeghi. Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2021), 6-8 October 2021
- “Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols” by G. Fotiadis, J. Moreira, T. Giannetsos, L. Chen, P.B. Rønne, M.D. Ryan, P.Y.A. Ryan. International Workshop on Security and Trust Management (STM2021), 6-8 October 2021
- “ARCADIS: Asynchronous Remote Control-Flow Attestation of Distributed IoT Services” by R.M. Halldórsson, E. Dushku, N. Dragoni. A scientific article published on the IEEE Access (volume 9), October 2021
- “Towards Efficient Control-Flow Attestation with Software-Assisted Multi-level Execution Tracing” by D. Papamartzivanos, S.A. Menesidou, P. Gouvas, T. Giannetsos. IEEE International Mediterranean Conference on Communications and Networking (MeditCom 2021), 7-10 September 2021
- “Reviewing ISO/IEC Standard for Time-stamping Services” by L. Chen, L. Meng. A scientific article published on the IEEE Communications Standards Magazine, September 2021
- “Incrementally Updateable Honey Password Vaults” by H. Cheng, W. Li, P. Wang, C. Chu, K. Liang. Proceedings of the 30th USENIX Security Symposium (USENIX Security 2021), 11-13 August 2021
- “ERAMO: Effective Remote Attestation through Memory Offloading” by J. Hagelskjær Østergaard , E. Dushku, N. Dragoni. 2021 IEEE International Conference on Cyber Security and Resilience (CSR 2021), 26-28 July 2021
- “Segregating Keys from noncense: Timely Exfil of Ephemeral Keys from Embedded Systems” by H. Bergsson Debes, T. Giannetsos. International Conference on Distributed Computing in Sensor Systems (DCOSS 2021), 14-16 July 2021
- “BlindTrust: Oblivious Remote Attestation for Secure Service Function Chains” by H. Bergsson Debes, T. Giannetsos, I. Krontiris. A scientific paper published on arXiv, 11 July 2021
- “Direct Anonymous Attestation on the Road: Efficient and Privacy-Preserving Revocation in C-ITS” by B. Larsen, T. Giannetsos, I. Krontiris, K. Goldman. Wireless Security Conference (WiSec 2021), 28 June – 2 July 2021
- “Analysis of Client-side Security for Long-term Time-stamping Services” by L. Chen, L. Meng. A scientific paper published for the ACNS conference book of International Conference on Applied Cryptography and Network Security (ACNS 2021), 21-24 June 2021
- “Towards 5G Embedded Trust: Integrating Attestation Extensions in Vertical Industries” by T. Giannetsos, D. Papamartzivanos, S.A. Menesidou, S. Karagiorgou. European Conference on Networks and Communications (EuCNC 2021), 8-11 June 2021
- “Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction” by H. Cheng, W. Li, P. Wang, K. Liang. ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2021), 6-11 June 2021
- “Practical Threshold Multi-Factor Authentication” by H. Cheng, W. Li, P. Wang, K. Liang. A scientific article published on the IEEE Transactions on Information Forensics and Security (volume 16), May 2021
- “State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things” by S. F. J. J. Ankergård, E. Dushku, N. Dragoni. A scientific article published on Sensors 2021, 25 February 2021
- “A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly” by D. Papamartzivanos, S.A. Menesidou, P. Gouvas and T. Giannetsos. A scientific article published on the Special Issue Information and Future Internet Security, Trust and Privacy of Future Internet 2021, 27 January 2021