Přístupnostní navigace
E-application
Search Search Close
Ing.
Ph.D.
FIT, DITS – Assistant professor
+420 54114 1185ihomoliak@fit.vut.cz
Send BUT message
2023
BUDINSKÝ, R.; HOMOLIAK, I.; STANČÍKOVÁ, I. Fee-Redistribution Smart Contracts for Transaction-Fee-Based Regime of Blockchains with the Longest Chain Rule. 2023. p. 0-0. Detail
DRGA, J.; HOMOLIAK, I.; VANČO, J.; PEREŠÍNI, M.; HANÁČEK, P.; VASILAKOS, A. Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. In 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Dubai: Institute of Electrical and Electronics Engineers, 2023. p. 1-4. ISBN: 979-8-3503-1019-1.Detail
STANČÍKOVÁ, I.; HOMOLIAK, I. SBvote: Scalable Self-Tallying Blockchain-Based Voting. In SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. Tallin: Association for Computing Machinery, 2023. p. 203-2011. ISBN: 978-1-4503-9517-5.Detail
VENUGOPALAN, S.; STANČÍKOVÁ, I.; HOMOLIAK, I. Always on Voting: A Framework for Repetitive Voting on the Blockchain. 2023, p. 1-11. Detail | WWW
2022
HOLÍKOVÁ, L.; HOLÍK, L.; HOMOLIAK, I.; LENGÁL, O.; VEANES, M.; VOJNAR, T. Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers. In Proceedings of the 31st USENIX Security Symposium. Boston, MA: USENIX, 2022. p. 4165-4182. ISBN: 978-1-939133-31-1.Detail | WWW
PEREŠÍNI, M.; MALINKA, K.; HOMOLIAK, I.; BENČIĆ, F.; HLADKÝ, T. Simulations of DAG-based Blockchain Protocols and Attacks on the PHANTOM Protocol via Transaction Selection Strategies. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022. p. 173-184. ISBN: 978-80-86583-34-1.Detail | WWW
BREITENBACHER, D.; HOMOLIAK, I.; AUNG, Y.; ELOVICI, Y.; TIPPENHAUER, N. HADES-IoT: A practical host-based anomaly detection system for IoT devices (Extended Version). IEEE Internet of Things Journal, 2022, vol. 9, no. 12, p. 9640-9658. ISSN: 2327-4662.Detail | WWW
HOMOLIAK, I. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022. p. 185-210. ISBN: 978-80-86583-34-1.Detail | WWW
2021
HOMOLIAK, I.; VENUGOPALAN, S.; REIJSBERGEN, D.; HUM, Q.; SCHUMI, R.; SZALACHOWSKI, P. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. IEEE COMMUN SURV TUT, 2021, vol. 23, no. 1, p. 341-390. ISSN: 1553-877X.Detail | WWW
PEREŠÍNI, M.; BENČIĆ, F.; MALINKA, K.; HOMOLIAK, I. DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy. Rotkreuz: Institute of Electrical and Electronics Engineers, 2021. p. 1-8. Detail | WWW
CASINO, F.; LYKOUSAS, N.; HOMOLIAK, I.; PATSAKIS, C.; HERNANDEZ-CASTRO, J. Intercepting Hail Hydra: Real-Time Detection of Algorithmically Generated Domains. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, vol. 2021, no. 190, p. 1-17. ISSN: 1084-8045.Detail | WWW
2020
HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors. IEEE Access, 2020, vol. 8, no. 6, p. 112427-112453. ISSN: 2169-3536.Detail | WWW
BINDER, A.; BREITENBACHER, D.; HARTEL, P.; SZALACHOWSKI, P.; HOMOLIAK, I.; HUJŇÁK, O. SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. In Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. New York City: Association for Computing Machinery, 2020. p. 145-162. ISBN: 978-1-4503-8139-0.Detail | WWW
HUM, Q.; TAN, W.; TEY, S.; LENUS, L.; HOMOLIAK, I.; LIN, Y.; SUN, J. CoinWatch: A Clone-Based Approach for Detecting Vulnerabilities in Cryptocurrencies. In 3rd IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020). Rhodos: Institute of Electrical and Electronics Engineers, 2020. p. 17-25. ISBN: 978-0-7381-0495-9.Detail | WWW
OČENÁŠ, M.; HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. Security and Encryption at Modern Databases. In ICCSP 2020: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy. Nanjing: Association for Computing Machinery, 2020. p. 19-23. ISBN: 978-1-4503-7744-7.Detail | WWW
2019
HOMOLIAK, I. Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics. In 2019 International Joint Conference on Neural Networks (IJCNN). Budapest: Institute of Electrical and Electronics Engineers, 2019. p. 1-10. ISBN: 978-1-7281-1986-1.Detail
HELLEBRANDT, L.; HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. Increasing Trust in Tor Node List Using Blockchain. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Soul: Institute of Electrical and Electronics Engineers, 2019. p. 29-32. ISBN: 978-1-7281-1328-9.Detail
HOMOLIAK, I. A Security Reference Architecture for Blockchains. 2019 2nd IEEE International Conference on Blockchain. Atlanta: 2019. p. 390-397. ISBN: 978-1-7281-4693-5.Detail | WWW
HOMOLIAK, I. HADES-IoT: A practical host-based anomaly detection system for IoT devices. In Asia CCS '19: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Aukland, New Zealand: 2019. p. 479-484. Detail | WWW
HARTEL, P.; HOMOLIAK, I.; REIJSBERGEN, D. An Empirical Study into the Success of Listed Smart Contracts in Ethereum. IEEE Access, 2019, vol. 07, no. 12, p. 177539-177555. ISSN: 2169-3536.Detail | WWW
HOMOLIAK, I.; TOFFALINI, F.; GUARNIZO, J.; ELOVICI, Y.; OCHOA, M. Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. ACM COMPUTING SURVEYS, 2019, vol. 52, no. 2, p. 1-40. ISSN: 0360-0300.Detail | WWW
HOMOLIAK, I. StrongChain: Transparent and Collaborative Proof-of-Work Consensus. In Proceedings of The 28th USENIX Security Symposium. Santa Clara: 2019. p. 819-836. ISBN: 978-1-939133-06-9.Detail | WWW
2018
HOMOLIAK, I. Detection of masqueraders based on graph partitioning of file system access events. 2018 IEEE Symposium on Security and Privacy Workshops SPW 2018. San Francisco, CA: Institute of Electrical and Electronics Engineers, 2018. p. 217-227. ISBN: 978-1-5386-8276-0.Detail | WWW
HOMOLIAK, I.; TEKNŐS, M.; BREITENBACHER, D.; HANÁČEK, P. Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. EAI Endorsed Transactions on Security and Safety, 2018, vol. 5, no. 17, p. 1-15. ISSN: 2032-9393.Detail | WWW
HOMOLIAK, I. The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2018, vol. 9, no. 1, p. 54-85. ISSN: 2093-5382.Detail | WWW
2017
HOMOLIAK, I.; TEKNŐS, M.; BARABAS, M.; HANÁČEK, P. Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. In Proceedings of 12th International Conference on Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Guangzhou: Springer International Publishing, 2017. p. 770-773. ISBN: 978-3-319-59607-5.Detail | WWW
HOMOLIAK, I.; BREITENBACHER, D.; HANÁČEK, P. Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset. Journal of Computers, 2017, vol. 12, no. 2, p. 143-155. ISSN: 1796-203X.Detail | WWW
HOMOLIAK, I. TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. In MIST '17: Proceedings of the 2017 International Workshop on Managing Insider Security Threats. Dallas: 2017. p. 45-56. ISBN: 978-1-4503-5177-5.Detail | WWW
HELLEBRANDT, L.; HUJŇÁK, O.; HANÁČEK, P.; HOMOLIAK, I. Survey of Privacy Enabling Strategies in IoT Networks. In Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence. Jakarta: Association for Computing Machinery, 2017. p. 216-221. ISBN: 978-1-4503-5392-2.Detail | WWW
HOMOLIAK, I.; ŠULÁK, L.; HANÁČEK, P. Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks. In Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Jeju Island: Springer International Publishing, 2017. p. 66-78. ISBN: 978-3-319-56549-1. ISSN: 0302-9743.Detail | WWW
2016
BREITENBACHER, D.; HOMOLIAK, I.; JAROŠ, J.; HANÁČEK, P. Impact of Optimization and Parallelism on Factorization Speed of SIQS. Journal on Systemics, Cybernetics and Informatics, 2016, vol. 14, no. 3, p. 51-58. ISSN: 1690-4524.Detail | WWW
SMETKA, T.; HOMOLIAK, I.; HANÁČEK, P. On the Application of Symbolic Regression and Genetic Programming for Cryptanalysis of Symmetric Encryption Algorithm. In Proceedings of 2016 IEEE International Carnahan Conference on Security Technology. Orlando, Fl: Institute of Electrical and Electronics Engineers, 2016. p. 305-312. ISBN: 978-1-5090-1072-1.Detail | WWW
BREITENBACHER, D.; HOMOLIAK, I.; JAROŠ, J.; HANÁČEK, P. Impact of Optimization and Parallelism on Factorization Speed of SIQS. In Proceedings of The 20th World Multi-Conference on Systemics, Cybernetics and Informatics. Journal on Systemics, Cybernetics and Informatics. WMSCI 2016 - 20th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings. Orlando: The International Institute of Informatics and Systemics, 2016. p. 55-62. ISBN: 978-1-941763-47-6. ISSN: 1690-4524.Detail | WWW
2015
SMETKA, T.; HOMOLIAK, I.; HANÁČEK, P. Cryptanalysis of Symmetric Encryption Algorithm Using Symbolic Regression and Genetic Programming. Santa's Crypto Get-Together 2015. Praha: TNS, 2015. p. 43-44. ISBN: 978-80-904257-7-4.Detail
BREITENBACHER, D.; HOMOLIAK, I.; HANÁČEK, P. Parallelized Self-Initializing Quadratic Sieve using OpenMP. Santa's Crypto Get-Together 2015. Praha: Trusted Network Solutions, a.s., 2015. p. 39-40. ISBN: 978-80-904257-7-4.Detail
2014
HOMOLIAK, I.; OVŠONKA, D.; GRÉGR, M.; HANÁČEK, P. NBA of Obfuscated Network Vulnerabilities' Exploitation Hidden into HTTPS Traffic. In Proceedings of International Conference for Internet Technology and Secured Transactions (ICITST-2014). London: IEEE Computer Society, 2014. p. 310-317. ISBN: 978-1-908320-40-7.Detail | WWW
HOMOLIAK, I.; OVŠONKA, D.; KORANDA, K.; HANÁČEK, P. Characteristics of Buffer Overflow Attacks Tunneled in HTTP Traffic. In International Carnahan Conference on Security Technology. 48th Annual International Carnahan Conference on Security Technology. Řím: IEEE Computer Society, 2014. p. 188-193. ISBN: 978-1-4799-3531-4.Detail | WWW
2013
HOMOLIAK, I.; BARABAS, M.; CHMELAŘ, P.; DROZD, M.; HANÁČEK, P. ASNM: Advanced Security Network Metrics for Attack Vector Description. Proceedings of the 2013 International Conference on Security & Management. Las Vegas: Computer Science Research, Education, and Applications Press, 2013. p. 350-358. ISBN: 1-60132-259-3.Detail | WWW
HOMOLIAK, I.; BARABAS, M.; CHMELAŘ, P.; DROZD, M.; HANÁČEK, P. Advanced Security Network Metrics. In Emerging Trends in ICT Security. Waltham: Elsevier Science, 2013. p. 187-202. ISBN: 978-0-12-411474-6.Detail | WWW
BARABAS, M.; HOMOLIAK, I.; DROZD, M.; HANÁČEK, P. Automated Malware Detection Based on Novel Network Behavioral Signatures. International Journal of Engineering and Technology, 2013, vol. 5, no. 2, p. 249-253. ISSN: 1793-8236.Detail | WWW
KAČIC, M.; HANÁČEK, P.; HENZL, M.; HOMOLIAK, I. A Concept of Behavioral Reputation System in Wireless Networks. The 47th Annual International Carnahan Conference on Security Technology. Medellín: Institute of Electrical and Electronics Engineers, 2013. p. 86-90. ISBN: 978-958-8790-65-7.Detail | WWW
BARABAS, M.; HOMOLIAK, I.; HANÁČEK, P.; KAČIC, M. Detection of Network Buffer Overflow Attacks: A Case Study. The 47th Annual International Carnahan Conference on Security Technology. Mendellin: Institute of Electrical and Electronics Engineers, 2013. p. 128-131. ISBN: 978-958-8790-65-7.Detail | WWW
2012
HOMOLIAK, I. Increasing Classification Accuracy in LibSVM Using String Kernel Functions. Proceedings of the 18th Conference STUDENT EEICT 2012. Student EEICT, Volume 2. Brno: Faculty of Electrical Engineering and Communication BUT, 2012. p. 281-283. ISBN: 978-80-214-4461-4.Detail | WWW
*) Publications are generated once a 24 hours.