Publications

Sous presse

Full Text
See detailSI‐AKAV: Secure integrated authentication and key agreement for cellular‐connected IoT devices in vehicular social networks
Esfahani, Alireza; Decouchant, Jérémie; Volp, Marcus; Mumtaz, Shahid; Konstantin Igorevich, Kostromitin

in Transactions on Emerging Telecommunications Technologies (in press)

Top of Page

2022

Top of Page

2021

Full Text
See detailCharacterizing the Impact of Network Delay on Bitcoin Mining
Cao, Tong; Decouchant, Jérémie; Yu, Jiangshan; Esteves-Veríssimo, Paulo

Scientific Conference (2021, September)

Full Text
See detailEphemeriShield - Defence Against Cyber-Antisatellite Weapons
Graczyk, Rafal; Volp, Marcus

Scientific Conference (2021, October 14)

Full Text
See detailRandomization as Mitigation of Directed Timing Inference Based Attacks on Time-Triggered Real-Time Systems with Task Replication
Krüger, Kristin; Vreman, Nils; Pates, Richard; Maggio, Martina; Volp, Marcus; Fohler, Gerhard

in LITES: Leibnitz Transactions on Embedded Systems (2021)

Full Text
See detailDyPS: Dynamic, Private and Secure GWAS
Pascoal, Túlio; Decouchant, Jérémie; Boutet, Antoine; Esteves-Verissimo, Paulo

in Proceedings on Privacy Enhancing Technologies (2021)

Full Text
See detailDyPS: Dynamic, Private and Secure GWAS (Summary) - GenoPri'21 Talk
Pascoal, Túlio; Decouchant, Jérémie; Boutet, Antoine; Esteves-Verissimo, Paulo

Presentation (2021, September 22)

Full Text
See detailTo verify or tolerate, that’s the question
Pinto Gouveia, Ines; Sakr, Mouhammad; Graczyk, Rafal; Volp, Marcus

Scientific Conference (2021, December 06)

Full Text
See detailThreat Adaptive Byzantine Fault Tolerant State-Machine Replication
Simoes Silva, Douglas; Graczyk, Rafal; Decouchant, Jérémie; Volp, Marcus; Esteves-Verissimo, Paulo

Scientific Conference (2021, September)

Top of Page

2020

Full Text
See detailExploring the Monero Peer-to-Peer Network
Cao, Tong; Yu, Jiangshan; Decouchant, Jérémie; Luo, Xiapu; Verissimo, Paulo

in Cao, Tong; Yu, Jiangshan; Decouchant, Jérémie; Luo, Xiapu; Verissimo, Paulo (Eds.) Financial Cryptography and Data Security 2020, Sabah, 10-14 February 2020 (2020, February)

Full Text
See detailPriLok:Citizen-protecting distributed epidemic tracing
Esteves-Verissimo, Paulo; Decouchant, Jérémie; Volp, Marcus; Esfahani, Alireza; Graczyk, Rafal

E-print/Working paper (2020)

Full Text
See detailPISTIS: From a Word-of-Mouth to a Gentleman’s Agreement
Kozhaya, David; Decouchant, Jérémie; Rahli, Vincent; Esteves-Verissimo, Paulo

E-print/Working paper (2020)

Full Text
See detailSlow Denial-of-Service Attacks on Software Defined Networks
Pascoal, Tulio; E. Fonseca, Iguatemi; Nigam, Vivek

in Computer Networks (2020)

Full Text
See detailBehind the Last Line of Defense -- Surviving SoC Faults and Intrusions
Pinto Gouveia, Ines; Volp, Marcus; Esteves-Verissimo, Paulo

E-print/Working paper (2020)

Top of Page

2019

Full Text
See detailP3LS : Plausible Deniability for Practical Privacy-Preserving Live Streaming
Decouchant, Jérémie; Boutet, Antoine; Yu, Jiangshan; Verissimo, Paulo

Scientific Conference (2019, October)

Full Text
See detailDNA-SeAl: Sensitivity Levels to Optimize the Performance of Privacy-Preserving DNA Alignment
Fernandes, Maria; Decouchant, Jérémie; Volp, Marcus; Couto, Francisco; Verissimo, Paulo

in IEEE Journal of Biomedical and Health Informatics (2019)

Full Text
See detailPrivacy-Preserving Processing of Filtered DNA Reads
Fernandes, Maria; Decouchant, Jérémie; Volp, Marcus; M. Couto, Francisco; Verissimo, Paulo

Scientific Conference (2019, October 22)

Full Text
See detailRT-ByzCast: Byzantine-Resilient Real-Time Reliable Broadcast
Kozhaya, David; Decouchant, Jérémie; Verissimo, Paulo

in IEEE Transactions on Computers (2019), 68(3),

Full Text
See detailANCHOR: logically-centralized security for Software-Defined Networks
Kreutz, Diego; Yu, Jiangshan; Ramos, Fernando M. V.; Verissimo, Paulo

E-print/Working paper (2019)

Full Text
See detailDeconstructing Blockchains: A Comprehensive Survey on Consensus, Membership and Structure
Natoli, Christopher; Yu, Jiangshan; Gramoli, Vincent; Verissimo, Paulo

E-print/Working paper (2019)

Full Text
See detailSustainable Security and Safety: Challenges and Opportunities
Paverd, Andrew; Volp, Marcus; Brasser, Ferdinand; Schunter, Matthias; N Asokan; Sadeghi, Ahmad-Reza; Verissimo, Paulo; Steininger, Andreas; Holz, Thorsten

in OpenAccess Series in Informatics (OASIcs) (2019), 73

Full Text
See detailAsphalion: Trustworthy Shielding Against Byzantine Faults
Vukotic, Ivana; Rahli, Vincent; Verissimo, Paulo

in Vukotic, Ivana; Rahli, Vincent; Verissimo, Paulo (Eds.) Asphalion: Trustworthy Shielding Against Byzantine Faults (2019)

See detailRe-thinking untraceability in the CryptoNote-style blockchain
Yu, Jiangshan; Au, Man Ho Allen; Verissimo, Paulo

Scientific Conference (2019, June)

Full Text
See detailRepuCoin: Your Reputation is Your Power
Yu, Jiangshan; Kozhaya, David; Decouchant, Jérémie; Verissimo, Paulo

in IEEE Transactions on Computers (2019)

Top of Page

2018

Full Text
See detailComputability Beyond Church-Turing via Choice Sequences
Bickford, Mark; Cohen, Liron; Constable, Robert; Rahli, Vincent

in LICS 2018 (2018)

Full Text
See detailRevisiting Network-Level Attacks on Blockchain Network
Cao, Tong; Yu, Jiangshan; Decouchant, Jérémie; Verissimo, Paulo

Scientific Conference (2018, June 25)

Full Text
See detailAccurate filtering of privacy-sensitive information in raw genomic data
Decouchant, Jérémie; Fernandes, Maria; Volp, Marcus; Couto, Francisco M.; Verissimo, Paulo

in Journal of Biomedical Informatics (2018)

Full Text
See detailByzantine Resilient Protocol for the IoT
Fröhlich, Antônio Augusto; Scheffel, M.Roberto; Kozhaya, David; Verissimo, Paulo

in IEEE Internet of Things Journal (2018)

Full Text
See detailThe KISS principle in Software-Defined Networking: a framework for secure communications
Kreutz, Diego; Yu, Jiangshan; Verissimo, Paulo; Ramos, Fernando; Magalhaes, Catia

in IEEE Security & Privacy Magazine (2018), 16(05), 60-70

Full Text
See detailVulnerability Analysis and Mitigation of Directed Timing Inference Based Attacks on Time-Triggered Systems
Krüger, Kristin; Volp, Marcus; Fohler, Gerhard

in LIPIcs-Leibniz International Proceedings in Informatics (2018), 106

Full Text
See detailMaskAl: Privacy Preserving Masked Reads Alignment using Intel SGX
Lambert, Christoph; Fernandes, Maria; Decouchant, Jérémie; Verissimo, Paulo

Scientific Conference (2018)

Full Text
See detailProbabilistic Formal Methods Applied to Blockchain’s Consensus Protocol
Mirto, Cristian; Yu, Jiangshan; Rahli, Vincent; Verissimo, Paulo

Scientific Conference (2018)

Full Text
See detailA Verified Theorem Prover Backend Supported by a Monotonic Library
Rahli, Vincent; Cohen, Liron; Bickford, Mark

in LPAR 2018 (2018)

Full Text
See detailVelisarios: Byzantine Fault-Tolerant Protocols Powered by Coq
Rahli, Vincent; Vukotic, Ivana; Volp, Marcus; Verissimo, Paulo

in ESOP 2018 (2018, April)

Full Text
See detailIntrusion-Tolerant Autonomous Driving
Volp, Marcus; Verissimo, Paulo

in Proceedings of 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC) (2018, May 29)

Full Text
See detailDECIM: Detecting Endpoint Compromise In Messaging
Yu, Jiangshan; Ryan, Mark; Cremers, Cas

in IEEE Transactions on Information Forensics and Security (2018)

Top of Page

2017

Full Text
See detailFormally Verified Differential Dynamic Logic
Bohrer, Brandon; Rahli, Vincent; Vukotic, Ivana; Volp, Marcus; Platzer, Andre

in CPP 2017 (2017)

Full Text
See detailA Hardware/Software Stack for Heterogeneous Systems
Castrillon, Jeronimo; Lieber, Matthias; Klueppelholz, Sascha; Volp, Marcus; Asmussen, Nils; Assmann, Uwe; Baader, Franz; Baier, Christel; Fettweis, Gerhard; Froehlich, Jochen

in IEEE Transactions on Multi-Scale Computing Systems (2017), PP(99), 1

Full Text
See detailHow can photo sharing inspire sharing genomes?
Cogo, Vinicius Vielmo; Bessani, Alysson; Couto, Francisco M.; Gama-Carvalho, Margarida; Fernandes, Maria; Verissimo, Paulo

in 11th International Conference on Practical Applications of Computational Biology & Bioinformatics 2017 (2017)

Full Text
See detailA Perspective of Security for Mobile Service Robots
Cornelius, Gary Philippe; Hochgeschwender, Nico; Voos, Holger; Olivares Mendez, Miguel Angel; Caire, Patrice; Volp, Marcus; Verissimo, Paulo

in Iberian Robotics Conference, Seville, Spain, 2017 (2017, November 22)

Full Text
See detailA Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment
Esfahani, Alireza; Mantas, G.; Matischek, R.; Saghezchi, F. B.; Rodriguez, J.; Bicaku, A.; Maksuti, S.; Tauber, M. G.; Schmittner, C.; Bastos, J.

in IEEE Internet of Things Journal (2017), 6(1), 288-296

Full Text
See detailCloud-Assisted Read Alignment and Privacy
Fernandes, Maria; Decouchant, Jérémie; Couto, Francisco M.; Verissimo, Paulo

in 11th International Conference on Practical Applications of Computational Biology & Bioinformatics 2017 (2017)

Full Text
See detailThe KISS principle in Software-Defined Networking: An architecture for Keeping It Simple and Secure
Kreutz, Diego; Verissimo, Paulo; Magalhaes, Catia; Ramos, Fernando M. V.

Report (2017)

Full Text
See detailImproving Security for Time-Triggered Real-Time Systems against Timing Inference Based Attacks by Schedule Obfuscation
Krüger, Kristin; Fohler, Gerhard; Volp, Marcus

Scientific Conference (2017, June)

Full Text
See detailProbabilistic Analysis of Low-Criticality Execution
Küttler, Martin; Roitzsch, Michael; Hamann, Claude-Joachim; Volp, Marcus

Scientific Conference (2017, December)

Full Text
See detailAutomatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications
Milner, Kevin; Cremers, Cas; Yu, Jiangshan; Ryan, Mark

in 30th IEEE Computer Security Foundations Symposium (2017)

Full Text
See detailMultistage Downstream Attack Detection in a Cyber Physical System
Qadeer, Rizwan; Murguia, Carlos; Ahmed, Chuadhry Mujeeb; Ruths, Justin

in 3rd Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems In Conjunction With ESORICS 2017 (2017, September)

Full Text
See detailValidating Brouwer's Continuity Principle for Numbers Using Named Exceptions
Rahli, Vincent; Bickford, Mark

in Mathematical Structures in Computer Science (2017)

Full Text
See detailBar Induction: The Good, the Bad, and the Ugly
Rahli, Vincent; Bickford, Mark; Constable, Robert

in Thirty-Second Annual ACM/IEEE Symposium on Logic in Computer Science (LICS) (2017)

Full Text
See detailEventML: Specification, Verification, and Implementation of Crash-Tolerant State Machine Replication Systems
Rahli, Vincent; Guaspari, David; Bickford, Mark; Constable, Robert

in Science of Computer Programming (2017)

Full Text
See detailExploiting Transistor-Level Reconfiguration to Optimize Combinational Circuits on the Example of a Conditional Sum Adder
Raitza, Michael; Kumar, Akash; Volp, Marcus; Walter, Dennis; Trommer, Jens; Mikolajick, Thomas; Weber, Walter M.

Scientific Conference (2017, March)

Full Text
See detailMeeting the Challenges of Critical and Extreme Dependability and Security
Verissimo, Paulo; Volp, Marcus; Decouchant, Jérémie; Rocha, Francisco

in Proceedings of the 22nd Pacific Rim International Symposium on Dependable Computing (2017)

Full Text
See detailEnclave-Based Privacy-Preserving Alignment of Raw Genomic Information
Volp, Marcus; Decouchant, Jérémie; Lambert, Christoph; Fernandes, Maria; Verissimo, Paulo

Scientific Conference (2017, October)

Full Text
See detailFacing the Safety-Security Gap in RTES: the Challenge of Timeliness
Volp, Marcus; Kozhaya, David; Verissimo, Paulo

Scientific Conference (2017, December)

Full Text
See detailPermanent Reencryption: How to Survive Generations of Cryptanalysts to Come
Volp, Marcus; Rocha, Francisco; Decouchant, Jérémie; Yu, Jiangshan; Verissimo, Paulo

in Twenty-fifth International Workshop on Security Protocols (2017)

Full Text
See detailChapter 7: Evaluating web PKIs
Yu, Jiangshan; Ryan, Mark

in Software Architecture for Big Data and the Cloud, 1st Edition, Chapter 7, June 2017. (2017)

Full Text
See detailAuthenticating compromisable storage systems
Yu, Jiangshan; Ryan, Mark; Chen, Liqun

in The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (2017)

Top of Page

2016

Full Text
See detailM3: A Hardware/Operating-System Co-Design to Tame Heterogeneous Manycores
Asmussen, Nils; Volp, Marcus; Nöthen, Benedikt; Härtig, Hermann; Fettweis, Gerhard

in Architectural Support for Programming Languages and Operating Systems (ASPLOS) (2016, April)

Full Text
See detailJITeR: Just-in-time application-layer routing
Bessani, Alysson; Neves, Nuno F.; Verissimo, Paulo; Wagner, Dantas; Fonseca, Alexandre; Rui, Silva; Luz, Pedro; Correia, Miguel

in Computer Networks (2016), (104), 122-136

Full Text
See detailTowards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems
Caldeira Lima, Antonio; Rocha, Francisco; Volp, Marcus; Verissimo, Paulo

in Proceedings of the Second ACM Workshop on Cyber-Physical Systems Security and PrivaCy (2016, October)

Full Text
See detailPAG: Private and Accountable Gossip
Decouchant, Jérémie; Ben Mokhtar, Sonia; Petit, Albin; Quéma, Vivien

Scientific Conference (2016, June 28)

Full Text
See detailAn efficient null space-based homomorphic MAC scheme against tag pollution attacks in RLNC
Esfahani, Alireza; Mantas, Georgios; Rodriguez, Jonathan

in IEEE Communications Letters (2016), 20(5), 918--921

Full Text
See detailExercising Nuprl's Open-Endedness
Rahli, Vincent

in The 5th International Congress on Mathematical Software (2016)

Full Text
See detailA Nominal Exploration of Intuitionism
Rahli, Vincent; Bickford, Mark

in The 5th ACM SIGPLAN Conference on Certified Programs and Proofs (CPP 2016) (2016)

Full Text
See detailSkalpel: A Constraint-Based Type Error Slicer for Standard ML
Rahli, Vincent; Wells, Joe; Pirie, John; Kamareddine, Fairouz

in Journal of Symbolic Computation (2016)

Full Text
See detailThe big data deluge in biomedicine: addressing the privacy vs. sharing dilemma
Verissimo, Paulo; Decouchant, Jérémie

Scientific Conference (2016, March 16)

Full Text
See detailThe Orchestration Stack: The Impossible Task of Designing Software for Unknown Future Post-CMOS Hardware
Volp, Marcus; Klüppelholz, Sascha; Castrillon, Jeronimo; Härtig, Hermann; Asmussen, Nils; Assmann, Uwe; Baader, Franz; Baier, Christel; Fettweis, Gerhard; Fröhlich, Jochen; Goens, Andrés; Haas, Sebastian; Habich, Dirk; Hasler, Mattis; Huismann, Immo; Karnagel, Tomas; Karol, Sven; Lehner, Wolfgang; Leuschner, Linda; Lieber, Matthias; Ling, Siqi; Märcker, Steffen; Mey, Johannes; Nagel, Wolfgang; Nöthen, Benedikt; Penaloza, Rafael; Raitza, Michael; Stiller, Jörg; Ungethüm, Annett; Voigt, Axel

Scientific Conference (2016, November 14)

Full Text
See detailAvoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control
Volp, Marcus; Lackorzynski, Adam; Decouchant, Jérémie; Rahli, Vincent; Rocha, Francisco; Verissimo, Paulo

Scientific Conference (2016, December 12)

Full Text
See detailDTKI: A New Formalized PKI with Verifiable Trusted Parties
Yu, Jiangshan; Cheval, Vincent; Ryan, Mark

in Computer Journal (2016), 59(11), 1695--1713

Top of Page

2015

Full Text
See detailPosition space Feynman quadrics and their motives
Ceyhan, Ozgur

E-print/Working paper (2015)

Full Text
See detailA High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data
Cogo, Vinicius Vielmo; Bessani, Alysson; Couto, Francisco M.; Verissimo, Paulo

in Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society (2015)

Full Text
See detailCollusions and Privacy in Rational-Resilient Gossip
Decouchant, Jérémie

Doctoral thesis (2015)

Full Text
See detailSoftware-Defined Networking: A Comprehensive Survey
Kreutz, Diego; Ramos, F. M. V.; Verissimo, Paulo; Rothenberg, C. E.; Azodolmolky, S.; Uhlig, S.

in Proceedings of the IEEE (2015), 103(1), 14-76

Full Text
See detailCoq as a Metatheory for Nuprl with Bar Induction
Rahli, Vincent; Bickford, Mark

Scientific Conference (2015)

Full Text
See detailFormal Specification, Verification, and Implementation of Fault-Tolerant Systems using EventML
Rahli, Vincent; Guaspari, David; Bickford, Mark; Constable, Robert L.

in EASST (2015)

See detailOn the Road to the Softwarization of Networking
Ramos, Fernando M. V.; Kreutz, Diego; Verissimo, Paulo

in Cutter IT Journal (2015), 28

Full Text
See detailTowards Dependable CPS Infrastructures: Architectural and Operating-System Challenges
Volp, Marcus; Asmussen, Nils; Härtig, Hermann; Nöthen, Benedikt; Fettweis, Gerhard

Scientific Conference (2015)

Full Text
See detailDevice Attacker Models: Fact and Fiction
Yu, Jiangshan; Ryan, Mark Dermot

in Security Protocols XXIII - 23rd International Workshop, Cambridge UK, March 31 - April 2, 2015, Revised Selected Papers (2015)

Top of Page

2014

Full Text
See detailAlgebraic renormalization and Feynman integrals in configuration spaces
Ceyhan, Ozgur; Marcolli, Matilde

in Advances in Theoretical and Mathematical Physics (2014), 18(2), 469-511

Full Text
See detailAcTinG: Accurate Freerider Tracking in Gossip
Decouchant, Jérémie; Ben Mokhtar, Sonia; Quéma, Vivien

Scientific Conference (2014, October 09)

Full Text
See detailLarge Pages May Be Harmful on NUMA Systems
Gaud, Fabien; Lepers, Baptiste; Decouchant, Jérémie; Fuston, Justin; Fedorova, Alexandra; Quéma, Vivien

Scientific Conference (2014, June)

Full Text
See detailAn Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation
Yu, Jiangshan; Wang, Guilin; Mu, Yi; Gao, Wei

in IEEE Transactions on Information Forensics and Security (2014), 9(12), 2302--2313

Top of Page

2013

Full Text
See detailSecurity Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
Wang, Guilin; Yu, Jiangshan; Xie, Qi

in IEEE Transactions on Industrial Informatics (2013), 9(1), 294--302

Top of Page

2012

Full Text
See detailFeynman integrals and motives of configuration spaces
Ceyhan, Ozgur; Marcolli, Matilde

in Communications in Mathematical Physics (2012), 313

Full Text
See detailFeynman integrals and periods in configuration spaces
Ceyhan, Ozgur; Marcolli, Matilde

E-print/Working paper (2012)

Full Text
See detailProvably Secure Single Sign-on Scheme in Distributed Systems and Networks
Yu, Jiangshan; Wang, Guilin; Mu, Yi

in 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012 (2012)

Top of Page