Publikace
2024
PEREŠÍNI, M.; HLADKÝ, T.; MALINKA, K.; HOMOLIAK, I. DAG-Sword: A Simulator for DAG-Oriented Proof-of-Work Blockchains with Realistic Network Topologies. In Proceedings of the 57th Annual Hawaii International Conference on System Sciences. Waikiki: IEEE Computer Society, 2024.
s. 1-10. ISBN: 978-0-9981331-7-1.
Detail | WWWMALINKA, K.; FIRC, A.; KAŠKA, P.; LAPŠANSKÝ, T.; ŠANDOR, O.; HOMOLIAK, I. Resilience of Voice Assistants to Synthetic Speech. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Bydgoszcz: Springer Nature Switzerland AG, 2024.
s. 66-84. ISBN: 978-3-031-70878-7.
Detail | WWWBUDINSKÝ, R.; STANČÍKOVÁ, I.; HOMOLIAK, I. Mitigating Undercutting Attacks: Fee-Redistribution Smart Contracts for Transaction-Fee-Based Regime of Blockchains with the Longest Chain Rule. In 2023 IEEE International Conference on Blockchain (Blockchain). Danzhou, China: Institute of Electrical and Electronics Engineers, 2024.
s. 25-32. ISBN: 979-8-3503-1929-3.
Detail | WWWHOMOLIAK, I.; PEREŠÍNI, M. SoK: Cryptocurrency Wallets - A Security Review and Classification based on Authentication Factors. In 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) - Proceedings. Dublin: Institute of Electrical and Electronics Engineers, 2024.
s. 1-8. ISBN: 979-8-3503-1674-2.
Detail | WWW2023
PEREŠÍNI, M.; HOMOLIAK, I.; HRUBÝ, M.; BENČIĆ, F.; MALINKA, K. Incentive Attacks on DAG-Based Blockchains with Random Transaction Selection. In IEEE International Conference on Blockchain. Institute of Electrical and Electronics Engineers Inc., 2023.
s. 1-8. ISBN: 979-8-3503-1929-3.
DetailDRGA, J.; HOMOLIAK, I.; VANČO, J.; PEREŠÍNI, M.; HANÁČEK, P.; VASILAKOS, A. Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. In 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Dubai: Institute of Electrical and Electronics Engineers, 2023.
s. 1-4. ISBN: 979-8-3503-1019-1.
DetailHOMOLIAK, I.; LI, Z.; SZALACHOWSKI, P. BBB-Voting: Self-Tallying End-to-End Verifiable 1-out-of-k Blockchain-Based Boardroom Voting. In 2023 IEEE International Conference on Blockchain (Blockchain). Hainan: Institute of Electrical and Electronics Engineers, 2023.
s. 297-306. ISBN: 979-8-3503-1929-3.
Detail | WWWVENUGOPALAN, S.; STANČÍKOVÁ, I.; HOMOLIAK, I. Always on Voting: A Framework for Repetitive Voting on the Blockchain. IEEE Transactions on Emerging Topics in Computing, 2023, roč. 11, č. 4,
s. 1-11. ISSN: 2168-6750.
Detail | WWWSTANČÍKOVÁ, I.; HOMOLIAK, I. SBvote: Scalable Self-Tallying Blockchain-Based Voting. In SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. Tallin: Association for Computing Machinery, 2023.
s. 203-211. ISBN: 978-1-4503-9517-5.
Detail2022
BREITENBACHER, D.; HOMOLIAK, I.; AUNG, Y.; ELOVICI, Y.; TIPPENHAUER, N. HADES-IoT: A practical host-based anomaly detection system for IoT devices (Extended Version). IEEE Internet of Things Journal, 2022, roč. 9, č. 12,
s. 9640-9658. ISSN: 2327-4662.
Detail | WWWPEREŠÍNI, M.; MALINKA, K.; HOMOLIAK, I.; BENČIĆ, F.; HLADKÝ, T. Simulations of DAG-based Blockchain Protocols and Attacks on the PHANTOM Protocol via Transaction Selection Strategies. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022.
s. 173-184. ISBN: 978-80-86583-34-1.
Detail | WWWHOLÍKOVÁ, L.; HOLÍK, L.; HOMOLIAK, I.; LENGÁL, O.; VEANES, M.; VOJNAR, T. Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers. In Proceedings of the 31st USENIX Security Symposium. Boston, MA: USENIX, 2022.
s. 4165-4182. ISBN: 978-1-939133-31-1.
Detail | WWWHOMOLIAK, I. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022.
s. 185-210. ISBN: 978-80-86583-34-1.
Detail | WWW2021
CASINO, F.; LYKOUSAS, N.; HOMOLIAK, I.; PATSAKIS, C.; HERNANDEZ-CASTRO, J. Intercepting Hail Hydra: Real-Time Detection of Algorithmically Generated Domains. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, roč. 2021, č. 190,
s. 1-17. ISSN: 1084-8045.
Detail | WWWHOMOLIAK, I.; VENUGOPALAN, S.; REIJSBERGEN, D.; HUM, Q.; SCHUMI, R.; SZALACHOWSKI, P. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. IEEE COMMUN SURV TUT, 2021, roč. 23, č. 1,
s. 341-390. ISSN: 1553-877X.
Detail | WWWPEREŠÍNI, M.; BENČIĆ, F.; MALINKA, K.; HOMOLIAK, I. DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy. Rotkreuz: Institute of Electrical and Electronics Engineers, 2021.
s. 1-8.
Detail | WWW2020
HUM, Q.; TAN, W.; TEY, S.; LENUS, L.; HOMOLIAK, I.; LIN, Y.; SUN, J. CoinWatch: A Clone-Based Approach for Detecting Vulnerabilities in Cryptocurrencies. In 3rd IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020). Rhodos: Institute of Electrical and Electronics Engineers, 2020.
s. 17-25. ISBN: 978-0-7381-0495-9.
Detail | WWWHOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors. IEEE Access, 2020, roč. 8, č. 6,
s. 112427-112453. ISSN: 2169-3536.
Detail | WWWBINDER, A.; BREITENBACHER, D.; HARTEL, P.; SZALACHOWSKI, P.; HOMOLIAK, I.; HUJŇÁK, O. SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. In Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. New York City: Association for Computing Machinery, 2020.
s. 145-162. ISBN: 978-1-4503-8139-0.
Detail | WWWOČENÁŠ, M.; HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. Security and Encryption at Modern Databases. In ICCSP 2020: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy. Nanjing: Association for Computing Machinery, 2020.
s. 19-23. ISBN: 978-1-4503-7744-7.
Detail | WWW2019
HELLEBRANDT, L.; HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. Increasing Trust in Tor Node List Using Blockchain. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Soul: Institute of Electrical and Electronics Engineers, 2019.
s. 29-32. ISBN: 978-1-7281-1328-9.
DetailHOMOLIAK, I. StrongChain: Transparent and Collaborative Proof-of-Work Consensus. In Proceedings of The 28th USENIX Security Symposium. Santa Clara: 2019.
s. 819-836. ISBN: 978-1-939133-06-9.
Detail | WWWHOMOLIAK, I.; TOFFALINI, F.; GUARNIZO, J.; ELOVICI, Y.; OCHOA, M. Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. ACM COMPUTING SURVEYS, 2019, roč. 52, č. 2,
s. 1-40. ISSN: 0360-0300.
Detail | WWWHARTEL, P.; HOMOLIAK, I.; REIJSBERGEN, D. An Empirical Study into the Success of Listed Smart Contracts in Ethereum. IEEE Access, 2019, roč. 07, č. 12,
s. 177539-177555. ISSN: 2169-3536.
Detail | WWWHOMOLIAK, I. Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics. In 2019 International Joint Conference on Neural Networks (IJCNN). Budapest: Institute of Electrical and Electronics Engineers, 2019.
s. 1-10. ISBN: 978-1-7281-1986-1.
DetailHOMOLIAK, I. A Security Reference Architecture for Blockchains. 2019 2nd IEEE International Conference on Blockchain. Atlanta: 2019.
s. 390-397. ISBN: 978-1-7281-4693-5.
Detail | WWWHOMOLIAK, I. HADES-IoT: A practical host-based anomaly detection system for IoT devices. In Asia CCS '19: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Aukland, New Zealand: 2019.
s. 479-484.
Detail | WWW2018
HOMOLIAK, I. Detection of masqueraders based on graph partitioning of file system access events. 2018 IEEE Symposium on Security and Privacy Workshops SPW 2018. San Francisco, CA: Institute of Electrical and Electronics Engineers, 2018.
s. 217-227. ISBN: 978-1-5386-8276-0.
Detail | WWWHOMOLIAK, I. The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2018, roč. 9, č. 1,
s. 54-85. ISSN: 2093-5382.
Detail | WWWHOMOLIAK, I.; TEKNŐS, M.; BREITENBACHER, D.; HANÁČEK, P. Improving Network Intrusion Detection Classifiers by Non-Payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. EAI Endorsed Transactions on Security and Safety, 2018, roč. 5, č. 17,
s. 1-15. ISSN: 2032-9393.
Detail | WWW2017
HOMOLIAK, I. TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. In MIST '17: Proceedings of the 2017 International Workshop on Managing Insider Security Threats. Dallas: 2017.
s. 45-56. ISBN: 978-1-4503-5177-5.
Detail | WWWHOMOLIAK, I.; TEKNŐS, M.; BARABAS, M.; HANÁČEK, P. Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. In Proceedings of 12th International Conference on Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Guangzhou: Springer International Publishing, 2017.
s. 770-773. ISBN: 978-3-319-59607-5.
Detail | WWWHOMOLIAK, I.; ŠULÁK, L.; HANÁČEK, P. Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks. In Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Jeju Island: Springer International Publishing, 2017.
s. 66-78. ISBN: 978-3-319-56549-1. ISSN: 0302-9743.
Detail | WWWHOMOLIAK, I.; BREITENBACHER, D.; HANÁČEK, P. Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset. Journal of Computers, 2017, roč. 12, č. 2,
s. 143-155. ISSN: 1796-203X.
Detail | WWWHELLEBRANDT, L.; HUJŇÁK, O.; HANÁČEK, P.; HOMOLIAK, I. Survey of Privacy Enabling Strategies in IoT Networks. In Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence. Jakarta: Association for Computing Machinery, 2017.
s. 216-221. ISBN: 978-1-4503-5392-2.
Detail | WWW2016
BREITENBACHER, D.; HOMOLIAK, I.; JAROŠ, J.; HANÁČEK, P. Impact of Optimization and Parallelism on Factorization Speed of SIQS. In Proceedings of The 20th World Multi-Conference on Systemics, Cybernetics and Informatics. Journal on Systemics, Cybernetics and Informatics. WMSCI 2016 - 20th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings. Orlando: The International Institute of Informatics and Systemics, 2016.
s. 55-62. ISBN: 978-1-941763-47-6. ISSN: 1690-4524.
Detail | WWWBREITENBACHER, D.; HOMOLIAK, I.; JAROŠ, J.; HANÁČEK, P. Impact of Optimization and Parallelism on Factorization Speed of SIQS. Journal on Systemics, Cybernetics and Informatics, 2016, roč. 14, č. 3,
s. 51-58. ISSN: 1690-4524.
Detail | WWWSMETKA, T.; HOMOLIAK, I.; HANÁČEK, P. On the Application of Symbolic Regression and Genetic Programming for Cryptanalysis of Symmetric Encryption Algorithm. In Proceedings of 2016 IEEE International Carnahan Conference on Security Technology. Orlando, Fl: Institute of Electrical and Electronics Engineers, 2016.
s. 305-312. ISBN: 978-1-5090-1072-1.
Detail | WWW2015
BREITENBACHER, D.; HOMOLIAK, I.; HANÁČEK, P. Parallelized Self-Initializing Quadratic Sieve using OpenMP. Santa's Crypto Get-Together 2015. Praha: Trusted Network Solutions, a.s., 2015.
s. 39-40. ISBN: 978-80-904257-7-4.
DetailSMETKA, T.; HOMOLIAK, I.; HANÁČEK, P. Cryptanalysis of Symmetric Encryption Algorithm Using Symbolic Regression and Genetic Programming. Santa's Crypto Get-Together 2015. Praha: Trusted Network Solutions, a.s., 2015.
s. 43-44. ISBN: 978-80-904257-7-4.
Detail2014
HOMOLIAK, I.; OVŠONKA, D.; GRÉGR, M.; HANÁČEK, P. NBA of Obfuscated Network Vulnerabilities' Exploitation Hidden into HTTPS Traffic. In Proceedings of International Conference for Internet Technology and Secured Transactions (ICITST-2014). London: IEEE Computer Society, 2014.
s. 310-317. ISBN: 978-1-908320-40-7.
Detail | WWWHOMOLIAK, I.; OVŠONKA, D.; KORANDA, K.; HANÁČEK, P. Characteristics of Buffer Overflow Attacks Tunneled in HTTP Traffic. In International Carnahan Conference on Security Technology. 48th Annual International Carnahan Conference on Security Technology. Řím: IEEE Computer Society, 2014.
s. 188-193. ISBN: 978-1-4799-3531-4.
Detail | WWW2013
HOMOLIAK, I.; BARABAS, M.; CHMELAŘ, P.; DROZD, M.; HANÁČEK, P. Advanced Security Network Metrics. In Emerging Trends in ICT Security. Waltham: Elsevier Science, 2013.
s. 187-202. ISBN: 978-0-12-411474-6.
Detail | WWWBARABAS, M.; HOMOLIAK, I.; HANÁČEK, P.; KAČIC, M. Detection of Network Buffer Overflow Attacks: A Case Study. The 47th Annual International Carnahan Conference on Security Technology. Mendellin: Institute of Electrical and Electronics Engineers, 2013.
s. 128-131. ISBN: 978-958-8790-65-7.
Detail | WWWHOMOLIAK, I.; BARABAS, M.; CHMELAŘ, P.; DROZD, M.; HANÁČEK, P. ASNM: Advanced Security Network Metrics for Attack Vector Description. Proceedings of the 2013 International Conference on Security & Management. Las Vegas: Computer Science Research, Education, and Applications Press, 2013.
s. 350-358. ISBN: 1-60132-259-3.
Detail | WWWKAČIC, M.; HANÁČEK, P.; HENZL, M.; HOMOLIAK, I. A Concept of Behavioral Reputation System in Wireless Networks. The 47th Annual International Carnahan Conference on Security Technology. Medellín: Institute of Electrical and Electronics Engineers, 2013.
s. 86-90. ISBN: 978-958-8790-65-7.
Detail | WWWBARABAS, M.; HOMOLIAK, I.; DROZD, M.; HANÁČEK, P. Automated Malware Detection Based on Novel Network Behavioral Signatures. International Journal of Engineering and Technology, 2013, roč. 5, č. 2,
s. 249-253. ISSN: 1793-8236.
Detail | WWW2012
HOMOLIAK, I. Increasing Classification Accuracy in LibSVM Using String Kernel Functions. Proceedings of the 18th Conference STUDENT EEICT 2012. Student EEICT, Volume 2. Brno: Faculty of Electrical Engineering and Communication BUT, 2012.
s. 281-283. ISBN: 978-80-214-4461-4.
Detail | WWW
*) Citace publikací se generují jednou za 24 hodin.