Publications

2019

See detailP3LS : Plausible Deniability for Practical Privacy-Preserving Live Streaming
Decouchant, Jérémie; Boutet, Antoine; Yu, Jiangshan; Verissimo, Paulo

Scientific Conference (2019, October)

Full Text
See detailDNA-SeAl: Sensitivity Levels to Optimize the Performance of Privacy-Preserving DNA Alignment
Fernandes, Maria; Decouchant, Jérémie; Volp, Marcus; Couto, Francisco; Verissimo, Paulo

in IEEE Journal of Biomedical and Health Informatics (2019)

Full Text
See detailRT-ByzCast: Byzantine-Resilient Real-Time Reliable Broadcast
Kozhaya, David; Decouchant, Jérémie; Verissimo, Paulo

in IEEE Transactions on Computers (2019), 68(3),

Full Text
See detailDeconstructing Blockchains: A Comprehensive Survey on Consensus, Membership and Structure
Natoli, Christopher; Yu, Jiangshan; Gramoli, Vincent; Verissimo, Paulo

E-print/Working paper (2019)

Full Text
See detailAsphalion: Trustworthy Shielding Against Byzantine Faults
Vukotic, Ivana; Rahli, Vincent; Verissimo, Paulo

in Vukotic, Ivana; Rahli, Vincent; Verissimo, Paulo (Eds.) Asphalion: Trustworthy Shielding Against Byzantine Faults (2019)

See detailRe-thinking untraceability in the CryptoNote-style blockchain
Yu, Jiangshan; Au, Man Ho Allen; Verissimo, Paulo

Scientific Conference (2019, June)

Full Text
See detailRepuCoin: Your Reputation is Your Power
Yu, Jiangshan; Kozhaya, David; Decouchant, Jérémie; Verissimo, Paulo

in IEEE Transactions on Computers (2019)

Top of Page

2018

Full Text
See detailComputability Beyond Church-Turing via Choice Sequences
Bickford, Mark; Cohen, Liron; Constable, Robert; Rahli, Vincent

in LICS 2018 (2018)

Full Text
See detailRevisiting Network-Level Attacks on Blockchain Network
Cao, Tong; Yu, Jiangshan; Decouchant, Jérémie; Verissimo, Paulo

Scientific Conference (2018, June 25)

Full Text
See detailAccurate filtering of privacy-sensitive information in raw genomic data
Decouchant, Jérémie; Fernandes, Maria; Volp, Marcus; Couto, Francisco M.; Verissimo, Paulo

in Journal of Biomedical Informatics (2018)

Full Text
See detailByzantine Resilient Protocol for the IoT
Fröhlich, Antônio Augusto; Scheffel, M.Roberto; Kozhaya, David; Verissimo, Paulo

in IEEE Internet of Things Journal (2018)

Full Text
See detailThe KISS principle in Software-Defined Networking: a framework for secure communications
Kreutz, Diego; Yu, Jiangshan; Verissimo, Paulo; Ramos, Fernando; Magalhaes, Catia

in IEEE Security & Privacy Magazine (2018), 16(05), 60-70

Full Text
See detailVulnerability Analysis and Mitigation of Directed Timing Inference Based Attacks on Time-Triggered Systems
Krüger, Kristin; Volp, Marcus; Fohler, Gerhard

in LIPIcs-Leibniz International Proceedings in Informatics (2018), 106

Full Text
See detailMaskAl: Privacy Preserving Masked Reads Alignment using Intel SGX
Lambert, Christoph; Fernandes, Maria; Decouchant, Jérémie; Verissimo, Paulo

Scientific Conference (2018)

Full Text
See detailProbabilistic Formal Methods Applied to Blockchain’s Consensus Protocol
Mirto, Cristian; Yu, Jiangshan; Rahli, Vincent; Verissimo, Paulo

Scientific Conference (2018)

Full Text
See detailA Verified Theorem Prover Backend Supported by a Monotonic Library
Rahli, Vincent; Cohen, Liron; Bickford, Mark

in LPAR 2018 (2018)

Full Text
See detailVelisarios: Byzantine Fault-Tolerant Protocols Powered by Coq
Rahli, Vincent; Vukotic, Ivana; Volp, Marcus; Verissimo, Paulo

in ESOP 2018 (2018, April)

Full Text
See detailIntrusion-Tolerant Autonomous Driving
Volp, Marcus; Verissimo, Paulo

in Proceedings of 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC) (2018, May 29)

Full Text
See detailDECIM: Detecting Endpoint Compromise In Messaging
Yu, Jiangshan; Ryan, Mark; Cremers, Cas

in IEEE Transactions on Information Forensics & Security (2018)

Top of Page

2017

Full Text
See detailFormally Verified Differential Dynamic Logic
Bohrer, Brandon; Rahli, Vincent; Vukotic, Ivana; Volp, Marcus; Platzer, Andre

in CPP 2017 (2017)

Full Text
See detailA Hardware/Software Stack for Heterogeneous Systems
Castrillon, Jeronimo; Lieber, Matthias; Klueppelholz, Sascha; Volp, Marcus; Asmussen, Nils; Assmann, Uwe; Baader, Franz; Baier, Christel; Fettweis, Gerhard; Froehlich, Jochen

in IEEE Transactions on Multi-Scale Computing Systems (2017), PP(99), 1

Full Text
See detailHow can photo sharing inspire sharing genomes?
Cogo, Vinicius Vielmo; Bessani, Alysson; Couto, Francisco M.; Gama-Carvalho, Margarida; Fernandes, Maria; Verissimo, Paulo

in 11th International Conference on Practical Applications of Computational Biology & Bioinformatics 2017 (2017)

Full Text
See detailA Perspective of Security for Mobile Service Robots
Cornelius, Gary Philippe; Hochgeschwender, Nico; Voos, Holger; Olivares Mendez, Miguel Angel; Caire, Patrice; Volp, Marcus; Verissimo, Paulo

in Iberian Robotics Conference, Seville, Spain, 2017 (2017, November 22)

Full Text
See detailA Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment
Esfahani, Alireza; Mantas, G.; Matischek, R.; Saghezchi, F. B.; Rodriguez, J.; Bicaku, A.; Maksuti, S.; Tauber, M. G.; Schmittner, C.; Bastos, J.

in IEEE Internet of Things Journal (2017), 6(1), 288-296

Full Text
See detailCloud-Assisted Read Alignment and Privacy
Fernandes, Maria; Decouchant, Jérémie; Couto, Francisco M.; Verissimo, Paulo

in 11th International Conference on Practical Applications of Computational Biology & Bioinformatics 2017 (2017)

Full Text
See detailThe KISS principle in Software-Defined Networking: An architecture for Keeping It Simple and Secure
Kreutz, Diego; Verissimo, Paulo; Magalhaes, Catia; Ramos, Fernando M. V.

Report (2017)

Full Text
See detailANCHOR: logically-centralized security for Software-Defined Networks
Kreutz, Diego; Yu, Jiangshan; Ramos, Fernando M. V.; Verissimo, Paulo

E-print/Working paper (2017)

Full Text
See detailImproving Security for Time-Triggered Real-Time Systems against Timing Inference Based Attacks by Schedule Obfuscation
Krüger, Kristin; Fohler, Gerhard; Volp, Marcus

Scientific Conference (2017, June)

Full Text
See detailProbabilistic Analysis of Low-Criticality Execution
Küttler, Martin; Roitzsch, Michael; Hamann, Claude-Joachim; Volp, Marcus

Scientific Conference (2017, December)

Full Text
See detailAutomatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications
Milner, Kevin; Cremers, Cas; Yu, Jiangshan; Ryan, Mark

in 30th IEEE Computer Security Foundations Symposium (2017)

Full Text
See detailMultistage Downstream Attack Detection in a Cyber Physical System
Qadeer, Rizwan; Murguia, Carlos; Ahmed, Chuadhry Mujeeb; Ruths, Justin

in 3rd Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems In Conjunction With ESORICS 2017 (2017, September)

Full Text
See detailValidating Brouwer's Continuity Principle for Numbers Using Named Exceptions
Rahli, Vincent; Bickford, Mark

in Mathematical Structures in Computer Science (2017)

Full Text
See detailBar Induction: The Good, the Bad, and the Ugly
Rahli, Vincent; Bickford, Mark; Constable, Robert

in Thirty-Second Annual ACM/IEEE Symposium on Logic in Computer Science (LICS) (2017)

Full Text
See detailEventML: Specification, Verification, and Implementation of Crash-Tolerant State Machine Replication Systems
Rahli, Vincent; Guaspari, David; Bickford, Mark; Constable, Robert

in Science of Computer Programming (2017)

Full Text
See detailExploiting Transistor-Level Reconfiguration to Optimize Combinational Circuits on the Example of a Conditional Sum Adder
Raitza, Michael; Kumar, Akash; Volp, Marcus; Walter, Dennis; Trommer, Jens; Mikolajick, Thomas; Weber, Walter M.

Scientific Conference (2017, March)

Full Text
See detailMeeting the Challenges of Critical and Extreme Dependability and Security
Verissimo, Paulo; Volp, Marcus; Decouchant, Jérémie; Rocha, Francisco

in Proceedings of the 22nd Pacific Rim International Symposium on Dependable Computing (2017)

Full Text
See detailEnclave-Based Privacy-Preserving Alignment of Raw Genomic Information
Volp, Marcus; Decouchant, Jérémie; Lambert, Christoph; Fernandes, Maria; Verissimo, Paulo

Scientific Conference (2017, October)

Full Text
See detailFacing the Safety-Security Gap in RTES: the Challenge of Timeliness
Volp, Marcus; Kozhaya, David; Verissimo, Paulo

Scientific Conference (2017, December)

Full Text
See detailPermanent Reencryption: How to Survive Generations of Cryptanalysts to Come
Volp, Marcus; Rocha, Francisco; Decouchant, Jérémie; Yu, Jiangshan; Verissimo, Paulo

in Twenty-fifth International Workshop on Security Protocols (2017)

Full Text
See detailChapter 7: Evaluating web PKIs
Yu, Jiangshan; Ryan, Mark

in Software Architecture for Big Data and the Cloud, 1st Edition, Chapter 7, June 2017. (2017)

Full Text
See detailAuthenticating compromisable storage systems
Yu, Jiangshan; Ryan, Mark; Chen, Liqun

in The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (2017)

Top of Page

2016

Full Text
See detailM3: A Hardware/Operating-System Co-Design to Tame Heterogeneous Manycores
Asmussen, Nils; Volp, Marcus; Nöthen, Benedikt; Härtig, Hermann; Fettweis, Gerhard

in Architectural Support for Programming Languages and Operating Systems (ASPLOS) (2016, April)

Full Text
See detailJITeR: Just-in-time application-layer routing
Bessani, Alysson; Neves, Nuno F.; Verissimo, Paulo; Wagner, Dantas; Fonseca, Alexandre; Rui, Silva; Luz, Pedro; Correia, Miguel

in Computer Networks (2016), (104), 122-136

Full Text
See detailTowards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems
Caldeira Lima, Antonio; Rocha, Francisco; Volp, Marcus; Verissimo, Paulo

in Proceedings of the Second ACM Workshop on Cyber-Physical Systems Security and PrivaCy (2016, October)

Full Text
See detailPAG: Private and Accountable Gossip
Decouchant, Jérémie; Ben Mokhtar, Sonia; Petit, Albin; Quéma, Vivien

Scientific Conference (2016, June 28)

Full Text
See detailAn efficient null space-based homomorphic MAC scheme against tag pollution attacks in RLNC
Esfahani, Alireza; Mantas, Georgios; Rodriguez, Jonathan

in IEEE Communications Letters (2016), 20(5), 918--921

Full Text
See detailExercising Nuprl's Open-Endedness
Rahli, Vincent

in The 5th International Congress on Mathematical Software (2016)

Full Text
See detailA Nominal Exploration of Intuitionism
Rahli, Vincent; Bickford, Mark

in The 5th ACM SIGPLAN Conference on Certified Programs and Proofs (CPP 2016) (2016)

Full Text
See detailSkalpel: A Constraint-Based Type Error Slicer for Standard ML
Rahli, Vincent; Wells, Joe; Pirie, John; Kamareddine, Fairouz

in Journal of Symbolic Computation (2016)

Full Text
See detailThe big data deluge in biomedicine: addressing the privacy vs. sharing dilemma
Verissimo, Paulo; Decouchant, Jérémie

Scientific Conference (2016, March 16)

Full Text
See detailThe Orchestration Stack: The Impossible Task of Designing Software for Unknown Future Post-CMOS Hardware
Volp, Marcus; Klüppelholz, Sascha; Castrillon, Jeronimo; Härtig, Hermann; Asmussen, Nils; Assmann, Uwe; Baader, Franz; Baier, Christel; Fettweis, Gerhard; Fröhlich, Jochen; Goens, Andrés; Haas, Sebastian; Habich, Dirk; Hasler, Mattis; Huismann, Immo; Karnagel, Tomas; Karol, Sven; Lehner, Wolfgang; Leuschner, Linda; Lieber, Matthias; Ling, Siqi; Märcker, Steffen; Mey, Johannes; Nagel, Wolfgang; Nöthen, Benedikt; Penaloza, Rafael; Raitza, Michael; Stiller, Jörg; Ungethüm, Annett; Voigt, Axel

Scientific Conference (2016, November 14)

Full Text
See detailAvoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control
Volp, Marcus; Lackorzynski, Adam; Decouchant, Jérémie; Rahli, Vincent; Rocha, Francisco; Verissimo, Paulo

Scientific Conference (2016, December 12)

Full Text
See detailDTKI: A New Formalized PKI with Verifiable Trusted Parties
Yu, Jiangshan; Cheval, Vincent; Ryan, Mark

in The Computer Journal (2016), 59(11), 1695--1713

Top of Page

2015

Full Text
See detailA High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data
Cogo, Vinicius Vielmo; Bessani, Alysson; Couto, Francisco M.; Verissimo, Paulo

in Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society (2015)

Full Text
See detailCollusions and Privacy in Rational-Resilient Gossip
Decouchant, Jérémie

Doctoral thesis (2015)

Full Text
See detailSoftware-Defined Networking: A Comprehensive Survey
Kreutz, Diego; Ramos, F. M. V.; Verissimo, Paulo; Rothenberg, C. E.; Azodolmolky, S.; Uhlig, S.

in Proceedings of the IEEE (2015), 103(1), 14-76

Full Text
See detailCoq as a Metatheory for Nuprl with Bar Induction
Rahli, Vincent; Bickford, Mark

Scientific Conference (2015)

Full Text
See detailFormal Specification, Verification, and Implementation of Fault-Tolerant Systems using EventML
Rahli, Vincent; Guaspari, David; Bickford, Mark; Constable, Robert L.

in EASST (2015)

See detailOn the Road to the Softwarization of Networking
Ramos, Fernando M. V.; Kreutz, Diego; Verissimo, Paulo

in Cutter IT Journal (2015), 28

Full Text
See detailTowards Dependable CPS Infrastructures: Architectural and Operating-System Challenges
Volp, Marcus; Asmussen, Nils; Härtig, Hermann; Nöthen, Benedikt; Fettweis, Gerhard

Scientific Conference (2015)

Full Text
See detailDevice Attacker Models: Fact and Fiction
Yu, Jiangshan; Ryan, Mark Dermot

in Security Protocols XXIII - 23rd International Workshop, Cambridge UK, March 31 - April 2, 2015, Revised Selected Papers (2015)

Top of Page

2014

Full Text
See detailAcTinG: Accurate Freerider Tracking in Gossip
Decouchant, Jérémie; Ben Mokhtar, Sonia; Quéma, Vivien

Scientific Conference (2014, October 09)

Full Text
See detailLarge Pages May Be Harmful on NUMA Systems
Gaud, Fabien; Lepers, Baptiste; Decouchant, Jérémie; Fuston, Justin; Fedorova, Alexandra; Quéma, Vivien

Scientific Conference (2014, June)

Full Text
See detailAn Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation
Yu, Jiangshan; Wang, Guilin; Mu, Yi; Gao, Wei

in IEEE Transactions on Information Forensics and Security (2014), 9(12), 2302--2313

Top of Page

2013

Full Text
See detailSecurity Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
Wang, Guilin; Yu, Jiangshan; Xie, Qi

in IEEE Transactions on Industrial Informatics (2013), 9(1), 294--302

Top of Page

2012

Full Text
See detailProvably Secure Single Sign-on Scheme in Distributed Systems and Networks
Yu, Jiangshan; Wang, Guilin; Mu, Yi

in 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012 (2012)

Top of Page