This page is dedicated to all ASSURED scientific publications.
- “FLVoogd: Robust And Privacy Preserving Federated Learning.” by Y. Tian, R. Wang, Y. Qiao, E. Panaousis, K. Liang. Proceedings of the 14th Asian Conference on Machine Learning (ACML 2022), 12-14 December 2022
- “More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks” by J. Xu, R. Wang, K. Liang, S. Picek. Proceedings of the Annual Computer Security Applications Conference (ACSAC 2022), 5-9 December 2022
- “Combining ID’s, Attributes, and Policies in Hyperledger Fabric” by D. Gordijn, R. Kromes, T. Giannetsos, K. Liang. Proceedings of the 2nd EAI International Conference on Blockchain Technology and Emerging Applications (EAI BlockTEA 2022), 21-22 November 2022
- “ID-based self-encryption via Hyperledger Fabric based smart contract” by I. Grishkov, R. Kromes, T. Giannetsos, K. Liang. Proceedings of the 2nd EAI International Conference on Blockchain Technology and Emerging Applications (EAI BlockTEA 2022), 21-22 November 2022
- “DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay” by Y. Zheng, P. Xu, W. Wang, T. Chen, W. Susilo, K. Liang, H. Jin. Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS 2022), 26-30 September 2022
- “Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption” by X. Wang, Z. Cao, Z. Liu, K. Liang. Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS 2022), 26-30 September 2022
- “VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents.” by S. Lambregts, H. Chen, J. Ning, K. Liang. Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS 2022), 26-30 September 2022
- “No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent” by H. Chen, S. Fu, K. Liang. Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS 2022), 26-30 September 2022
- “ZEKRO: Zero-Knowledge Proof of Integrity Conformance” by H. Bergsson Debes, T. Giannetsos. Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES 2022), 23-26 August 2022
- “V’CER: Efficient Certificate Validation in Constrained Networks” by D. Koisser, P. Jauernig, G. Tsudik, A.R. Sadeghi. Proceedings of the 31st USENIX Security Symposium (USENIX Security 2022), 10-12 August 2022
- “Live System Call Trace Reconstruction on Linux” by T. Nguyen, M. Orenbach, A. Atamli. Proceedings of the Digital Forensic Research Workshop Conference (DFRWS USA 2022), 11-14 July 2022
- “DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints” by Z. Zhao, X. Chen, Y. Xuan, Y. Dong, D. Wang, K. Liang. Proceedings of the IEEE / CVF Computer Vision and Pattern Recognition Conference (CVPR 2022), 19-24 June 2022
- “Memory Offloading for Remote Attestation of Multi-Service IoT Devices” by E. Dushku, J.H. Østergaard, N. Dragoni. A scientific article published on Sensors 2022, 8 June 2022
- “DOOR: Hardware Roots-of-Trust as an Enabler of Trustworthiness for Verifiable Credentials” by B. Larsen, T. Giannetsos, I. Krontiris, D. Chadwick. Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2022), 16-19 May 2022
- “ROSE: Robust Searchable Encryption With Forward and Backward Security” by P. Xu, W. Susilo, W. Wang, T. Chen, Q. Wu, K. Liang, H. Jin. A scientific article published on the IEEE Transactions on Information Forensics and Security (volume 17), March 2022
- “PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things through Blockchain” by S.F.J.J. Ankergård, E. Dushku, N. Dragoni. Proceedings of the 14th International Symposium on Foundations & Practice of Security (FPS 2021), 7-10 December 2021
- “RealSWATT: Remote Software-based Attestation for Embedded Devices under Real-time Constraints” by C. Niesler, S. Surminski, F. Brasser, L. Davi, A.R. Sadeghi. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (ACM CSS 2021), 15-19 November 2021
- “RESERVE: Remote Attestation of Intermittent loT devices” by MD. Masoom Rabbani, E. Dushku, J. Vliegen, A. Braeken, N. Dragoni, N. Mentens. ACM Conference on Embedded Networked Sensor Systems (ACM SenSys 2021), 15-17 November 2021
- “GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks” by T. Arbera, F. Brasser, L. Gunn, P. Jauerning, D. Koisser, A.R. Shadeghi. Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2021), 6-8 October 2021
- “Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols” by G. Fotiadis, J. Moreira, T. Giannetsos, L. Chen, P.B. Rønne, M.D. Ryan, P.Y.A. Ryan. International Workshop on Security and Trust Management (STM2021), 6-8 October 2021
- “ARCADIS: Asynchronous Remote Control-Flow Attestation of Distributed IoT Services” by R.M. Halldórsson, E. Dushku, N. Dragoni. A scientific article published on the IEEE Access (volume 9), October 2021
- “Towards Efficient Control-Flow Attestation with Software-Assisted Multi-level Execution Tracing” by D. Papamartzivanos, S.A. Menesidou, P. Gouvas, T. Giannetsos. IEEE International Mediterranean Conference on Communications and Networking (MeditCom 2021), 7-10 September 2021
- “Reviewing ISO/IEC Standard for Time-stamping Services” by L. Chen, L. Meng. A scientific article published on the IEEE Communications Standards Magazine, September 2021
- “Incrementally Updateable Honey Password Vaults” by H. Cheng, W. Li, P. Wang, C. Chu, K. Liang. Proceedings of the 30th USENIX Security Symposium (USENIX Security 2021), 11-13 August 2021
- “ERAMO: Effective Remote Attestation through Memory Offloading” by J. Hagelskjær Østergaard , E. Dushku, N. Dragoni. 2021 IEEE International Conference on Cyber Security and Resilience (CSR 2021), 26-28 July 2021
- “Direct Anonymous Attestation on the Road: Efficient and Privacy-Preserving Revocation in C-ITS” by B. Larsen, T. Giannetsos, I. Krontiris, K. Goldman. International Conference on Distributed Computing in Sensor Systems (DCOSS 2021), 14-16 July 2021
- “BlindTrust: Oblivious Remote Attestation for Secure Service Function Chains” by H. Bergsson Debes, T. Giannetsos, I. Krontiris. A scientific paper published on arXiv, 11 July 2021
- “Segregating Keys from noncense: Timely Exfil of Ephemeral Keys from Embedded Systems” by H. Bergsson Debes, T. Giannetsos. Wireless Security Conference (WiSec 2021), 28 June – 2 July 2021
- “Analysis of Client-side Security for Long-term Time-stamping Services” by L. Chen, L. Meng. A scientific paper published for the ACNS conference book of International Conference on Applied Cryptography and Network Security (ACNS 2021), 21-24 June 2021
- “Towards 5G Embedded Trust: Integrating Attestation Extensions in Vertical Industries” by T. Giannetsos, D. Papamartzivanos, S.A. Menesidou, S. Karagiorgou. European Conference on Networks and Communications (EuCNC 2021), 8-11 June 2021
- “Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction” by H. Cheng, W. Li, P. Wang, K. Liang. ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2021), 6-11 June 2021
- “Practical Threshold Multi-Factor Authentication” by H. Cheng, W. Li, P. Wang, K. Liang. A scientific article published on the IEEE Transactions on Information Forensics and Security (volume 16), May 2021
- “State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things” by S. F. J. J. Ankergård, E. Dushku, N. Dragoni. A scientific article published on Sensors 2021, 25 February 2021
- “A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly” by D. Papamartzivanos, S.A. Menesidou, P. Gouvas and T. Giannetsos. A scientific article published on the Special Issue Information and Future Internet Security, Trust and Privacy of Future Internet 2021, 27 January 2021