Publications
-
2024
MALINKA Kamil, FIRC Anton, KAŠKA Petr, LAPŠANSKÝ Tomáš, ŠANDOR Oskar and HOMOLIAK Ivan. Resilience of Voice Assistants to Synthetic Speech. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Bydgoszcz: Springer Nature Switzerland AG, 2024, pp. 66-84. ISBN 978-3-031-70878-7.
Detail -
2023
VENUGOPALAN Sarad, STANČÍKOVÁ Ivana and HOMOLIAK Ivan. Always on Voting: A Framework for Repetitive Voting on the Blockchain. 2023, pp. 1-11.
DetailLI Zengpeng, SZALACHOWSKI Pawel, VENUGOPALAN Sarad and HOMOLIAK Ivan. BBB-Voting: 1-out-of-k Blockchain-Based Boardroom Voting with Fault Recovery. In: 2023, p. 15.
DetailPEREŠÍNI Martin, HLADKÝ Tomáš, MALINKA Kamil and HOMOLIAK Ivan. DAG-Sword: A Simulator for DAG-Oriented Proof-of-Work Blockchains with Realistic Network Topologies. In: 2023.
DetailDRGA Jozef, HOMOLIAK Ivan, VANČO Juraj, PEREŠÍNI Martin, HANÁČEK Petr and VASILAKOS Athanasios. Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. In: 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Dubai: Institute of Electrical and Electronics Engineers, 2023, pp. 1-4. ISBN 0-06-000020-1.
DetailBUDINSKÝ Rastislav, HOMOLIAK Ivan and STANČÍKOVÁ Ivana. Fee-Redistribution Smart Contracts for Transaction-Fee-Based Regime of Blockchains with the Longest Chain Rule. In: 2023.
DetailPEREŠÍNI Martin, HOMOLIAK Ivan, HRUBÝ Martin, BENČIĆ Federico M. and MALINKA Kamil. Incentive Attacks on DAG-Oriented Blockchains with Random Transaction Selection. In: 2023, p. 12.
DetailSTANČÍKOVÁ Ivana and HOMOLIAK Ivan. SBvote: Scalable Self-Tallying Blockchain-Based Voting. In: SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. Tallin: Association for Computing Machinery, 2023, pp. 203-2011. ISBN 978-1-4503-9517-5.
Detail -
2022
HOLÍKOVÁ Lenka, HOLÍK Lukáš, HOMOLIAK Ivan, LENGÁL Ondřej, VEANES Margus and VOJNAR Tomáš. Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers. In: Proceedings of the 31st USENIX Security Symposium. Boston, MA: USENIX, 2022, pp. 4165-4182. ISBN 978-1-939133-31-1.
DetailBREITENBACHER Dominik, HOMOLIAK Ivan, AUNG Yan Lin, ELOVICI Yuval and TIPPENHAUER Nils Ole. HADES-IoT: A practical host-based anomaly detection system for IoT devices (Extended Version). IEEE Internet of Things Journal, vol. 9, no. 12, 2022, pp. 9640-9658. ISSN 2327-4662.
DetailPEREŠÍNI Martin, MALINKA Kamil, HOMOLIAK Ivan, BENČIĆ Federico M. and HLADKÝ Tomáš. Simulations of DAG-based Blockchain Protocols and Attacks on the PHANTOM Protocol via Transaction Selection Strategies. In: Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022, pp. 173-184. ISBN 978-80-86583-34-1.
DetailHOMOLIAK Ivan. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. In: Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022, pp. 185-210. ISBN 978-80-86583-34-1.
Detail -
2021
CASINO Fran, LYKOUSAS Nikolaos, HOMOLIAK Ivan, PATSAKIS Constantinos and HERNANDEZ-CASTRO Julio. Intercepting Hail Hydra: Real-Time Detection of Algorithmically Generated Domains. Journal of Network and Computer Applications, vol. 2021, no. 190, pp. 1-17. ISSN 1084-8045.
DetailHOMOLIAK Ivan, VENUGOPALAN Sarad, REIJSBERGEN Daniel, HUM Qingze, SCHUMI Richard and SZALACHOWSKI Pawel. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. IEEE Communications Surveys and Tutorials, vol. 23, no. 1, 2021, pp. 341-390. ISSN 1553-877X.
Detail -
2020
HOMOLIAK Ivan, MALINKA Kamil and HANÁČEK Petr. ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors. IEEE Access, vol. 8, no. 6, 2020, pp. 112427-112453. ISSN 2169-3536.
DetailHUM Qingze, TAN Wei Jin, TEY Shi Ying, LENUS Latasha, HOMOLIAK Ivan, LIN Yun and SUN Jun. CoinWatch: A Clone-Based Approach for Detecting Vulnerabilities in Cryptocurrencies. In: 3rd IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020). Rhodos: Institute of Electrical and Electronics Engineers, 2020, pp. 17-25. ISBN 978-0-7381-0495-9.
DetailOČENÁŠ Martin, HOMOLIAK Ivan, MALINKA Kamil and HANÁČEK Petr. Security and Encryption at Modern Databases. In: ICCSP 2020: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy. Nanjing: Association for Computing Machinery, 2020, pp. 19-23. ISBN 978-1-4503-7744-7.
DetailBINDER Alexander, BREITENBACHER Dominik, HARTEL Pieter H., SZALACHOWSKI Pawel, HOMOLIAK Ivan and HUJŇÁK Ondřej. SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. In: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. New York City: Association for Computing Machinery, 2020, pp. 145-162. ISBN 978-1-4503-8139-0.
Detail -
2019
HOMOLIAK Ivan. A Security Reference Architecture for Blockchains. In: 2019 2nd IEEE International Conference on Blockchain. Atlanta, 2019, pp. 390-397. ISBN 978-1-7281-4693-5.
DetailHOMOLIAK Ivan. Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics. In: 2019 International Joint Conference on Neural Networks (IJCNN). Budapest: Institute of Electrical and Electronics Engineers, 2019, pp. 1-10. ISBN 978-1-7281-1986-1.
DetailHARTEL Pieter H., HOMOLIAK Ivan and REIJSBERGEN Daniel. An Empirical Study into the Success of Listed Smart Contracts in Ethereum. IEEE Access, vol. 07, no. 12, 2019, pp. 177539-177555. ISSN 2169-3536.
DetailHOMOLIAK Ivan. HADES-IoT: A practical host-based anomaly detection system for IoT devices. In: Asia CCS '19: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Aukland, New Zealand, 2019, pp. 479-484.
DetailHELLEBRANDT Lukáš, HOMOLIAK Ivan, MALINKA Kamil and HANÁČEK Petr. Increasing Trust in Tor Node List Using Blockchain. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Soul: Institute of Electrical and Electronics Engineers, 2019, pp. 29-32. ISBN 978-1-7281-1328-9.
DetailHOMOLIAK Ivan, TOFFALINI Flavio, GUARNIZO Juan D., ELOVICI Yuval and OCHOA Martín. Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. ACM Computing Surveys, vol. 52, no. 2, 2019, pp. 1-40. ISSN 0360-0300.
DetailHOMOLIAK Ivan. StrongChain: Transparent and Collaborative Proof-of-Work Consensus. In: Proceedings of The 28th USENIX Security Symposium. Santa Clara, 2019, pp. 819-836. ISBN 978-1-939133-06-9.
Detail -
2018
HOMOLIAK Ivan. Detection of masqueraders based on graph partitioning of file system access events. In: 2018 IEEE Symposium on Security and Privacy Workshops SPW 2018. San Francisco, CA: Institute of Electrical and Electronics Engineers, 2018, pp. 217-227. ISBN 978-1-5386-8276-0.
DetailHOMOLIAK Ivan, TEKNŐS Martin, BREITENBACHER Dominik and HANÁČEK Petr. Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. EAI Endorsed Transactions on Security and Safety, vol. 5, no. 17, 2018, pp. 1-15. ISSN 2032-9393.
DetailHOMOLIAK Ivan. The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 9, no. 1, 2018, pp. 54-85. ISSN 2093-5382.
Detail -
2017
HOMOLIAK Ivan, BREITENBACHER Dominik and HANÁČEK Petr. Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset. Journal of Computers, vol. 12, no. 2, 2017, pp. 143-155. ISSN 1796-203X.
DetailHOMOLIAK Ivan, TEKNŐS Martin, BARABAS Maroš and HANÁČEK Petr. Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. In: Proceedings of 12th International Conference on Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Guangzhou: Springer International Publishing, 2017, pp. 770-773. ISBN 978-3-319-59607-5.
DetailHOMOLIAK Ivan, ŠULÁK Ladislav and HANÁČEK Petr. Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks. In: Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers. Lecture Notes in Computer Science, vol. 10144. Jeju Island: Springer International Publishing, 2017, pp. 66-78. ISBN 978-3-319-56549-1. ISSN 0302-9743.
DetailHELLEBRANDT Lukáš, HUJŇÁK Ondřej, HANÁČEK Petr and HOMOLIAK Ivan. Survey of Privacy Enabling Strategies in IoT Networks. In: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence. Jakarta: Association for Computing Machinery, 2017, pp. 216-221. ISBN 978-1-4503-5392-2.
DetailHOMOLIAK Ivan. TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. In: MIST '17: Proceedings of the 2017 International Workshop on Managing Insider Security Threats. Dallas, 2017, pp. 45-56. ISBN 978-1-4503-5177-5.
Detail -
2016
BREITENBACHER Dominik, HOMOLIAK Ivan, JAROŠ Jiří and HANÁČEK Petr. Impact of Optimization and Parallelism on Factorization Speed of SIQS. In: Proceedings of The 20th World Multi-Conference on Systemics, Cybernetics and Informatics. WMSCI 2016 - 20th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings, vol. 1. Orlando: The International Institute of Informatics and Systemics, 2016, pp. 55-62. ISBN 978-1-941763-47-6. ISSN 1690-4524.
DetailBREITENBACHER Dominik, HOMOLIAK Ivan, JAROŠ Jiří and HANÁČEK Petr. Impact of Optimization and Parallelism on Factorization Speed of SIQS. Journal on Systemics, Cybernetics and Informatics, vol. 14, no. 3, 2016, pp. 51-58. ISSN 1690-4524.
DetailSMETKA Tomáš, HOMOLIAK Ivan and HANÁČEK Petr. On the Application of Symbolic Regression and Genetic Programming for Cryptanalysis of Symmetric Encryption Algorithm. In: Proceedings of 2016 IEEE International Carnahan Conference on Security Technology. Orlando, Fl: Institute of Electrical and Electronics Engineers, 2016, pp. 305-312. ISBN 978-1-5090-1072-1.
Detail -
2015
SMETKA Tomáš, HOMOLIAK Ivan and HANÁČEK Petr. Cryptanalysis of Symmetric Encryption Algorithm Using Symbolic Regression and Genetic Programming. In: Santa's Crypto Get-Together 2015. Praha: TNS, 2015, pp. 43-44. ISBN 978-80-904257-7-4.
DetailBREITENBACHER Dominik, HOMOLIAK Ivan and HANÁČEK Petr. Parallelized Self-Initializing Quadratic Sieve using OpenMP. In: Santa's Crypto Get-Together 2015. Praha: Trusted Network Solutions, a.s., 2015, pp. 39-40. ISBN 978-80-904257-7-4.
Detail -
2014
HOMOLIAK Ivan, OVŠONKA Daniel, KORANDA Karel and HANÁČEK Petr. Characteristics of Buffer Overflow Attacks Tunneled in HTTP Traffic. In: International Carnahan Conference on Security Technology. 48th Annual International Carnahan Conference on Security Technology. Řím: IEEE Computer Society, 2014, pp. 188-193. ISBN 978-1-4799-3531-4.
DetailHOMOLIAK Ivan, OVŠONKA Daniel, GRÉGR Matěj and HANÁČEK Petr. NBA of Obfuscated Network Vulnerabilities' Exploitation Hidden into HTTPS Traffic. In: Proceedings of International Conference for Internet Technology and Secured Transactions (ICITST-2014). London: IEEE Computer Society, 2014, pp. 310-317. ISBN 978-1-908320-40-7.
Detail -
2013
KAČIC Matej, HANÁČEK Petr, HENZL Martin and HOMOLIAK Ivan. A Concept of Behavioral Reputation System in Wireless Networks. In: The 47th Annual International Carnahan Conference on Security Technology. Medellín: Institute of Electrical and Electronics Engineers, 2013, pp. 86-90. ISBN 978-958-8790-65-7.
DetailHOMOLIAK Ivan, BARABAS Maroš, CHMELAŘ Petr, DROZD Michal and HANÁČEK Petr. Advanced Security Network Metrics. Emerging Trends in ICT Security. Waltham: Elsevier Science, 2013, pp. 187-202. ISBN 978-0-12-411474-6.
DetailHOMOLIAK Ivan, BARABAS Maroš, CHMELAŘ Petr, DROZD Michal and HANÁČEK Petr. ASNM: Advanced Security Network Metrics for Attack Vector Description. In: Proceedings of the 2013 International Conference on Security & Management. Las Vegas: Computer Science Research, Education, and Applications Press, 2013, pp. 350-358. ISBN 1-60132-259-3.
DetailBARABAS Maroš, HOMOLIAK Ivan, DROZD Michal and HANÁČEK Petr. Automated Malware Detection Based on Novel Network Behavioral Signatures. International Journal of Engineering and Technology, vol. 5, no. 2, 2013, pp. 249-253. ISSN 1793-8236.
DetailBARABAS Maroš, HANÁČEK Petr, HOMOLIAK Ivan and KAČIC Matej. Detection of Network Buffer Overflow Attacks: A Case Study. In: The 47th Annual International Carnahan Conference on Security Technology. Mendellin: Institute of Electrical and Electronics Engineers, 2013, pp. 128-131. ISBN 978-958-8790-65-7.
Detail -
2012
HOMOLIAK Ivan. Increasing Classification Accuracy in LibSVM Using String Kernel Functions. In: Proceedings of the 18th Conference STUDENT EEICT 2012. Student EEICT, Volume 2. Brno: Faculty of Electrical Engineering and Communication BUT, 2012, pp. 281-283. ISBN 978-80-214-4461-4.
Detail