Ing.

Ivan Homoliak

Ph.D.

FIT, UITS – odborný asistent

+420 54114 1185
ihomoliak@fit.vut.cz

Odeslat VUT zprávu

Ing. Ivan Homoliak, Ph.D.

Publikace

  • 2023

    BUDINSKÝ, R.; HOMOLIAK, I.; STANČÍKOVÁ, I. Fee-Redistribution Smart Contracts for Transaction-Fee-Based Regime of Blockchains with the Longest Chain Rule. 2023. s. 0-0.
    Detail

    DRGA, J.; HOMOLIAK, I.; VANČO, J.; PEREŠÍNI, M.; HANÁČEK, P.; VASILAKOS, A. Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. In 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Dubai: Institute of Electrical and Electronics Engineers, 2023. s. 1-4. ISBN: 979-8-3503-1019-1.
    Detail

    STANČÍKOVÁ, I.; HOMOLIAK, I. SBvote: Scalable Self-Tallying Blockchain-Based Voting. In SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. Tallin: Association for Computing Machinery, 2023. s. 203-2011. ISBN: 978-1-4503-9517-5.
    Detail

    VENUGOPALAN, S.; STANČÍKOVÁ, I.; HOMOLIAK, I. Always on Voting: A Framework for Repetitive Voting on the Blockchain. 2023, s. 1-11.
    Detail | WWW

  • 2022

    HOLÍKOVÁ, L.; HOLÍK, L.; HOMOLIAK, I.; LENGÁL, O.; VEANES, M.; VOJNAR, T. Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers. In Proceedings of the 31st USENIX Security Symposium. Boston, MA: USENIX, 2022. s. 4165-4182. ISBN: 978-1-939133-31-1.
    Detail | WWW

    PEREŠÍNI, M.; MALINKA, K.; HOMOLIAK, I.; BENČIĆ, F.; HLADKÝ, T. Simulations of DAG-based Blockchain Protocols and Attacks on the PHANTOM Protocol via Transaction Selection Strategies. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022. s. 173-184. ISBN: 978-80-86583-34-1.
    Detail | WWW

    BREITENBACHER, D.; HOMOLIAK, I.; AUNG, Y.; ELOVICI, Y.; TIPPENHAUER, N. HADES-IoT: A practical host-based anomaly detection system for IoT devices (Extended Version). IEEE Internet of Things Journal, 2022, roč. 9, č. 12, s. 9640-9658. ISSN: 2327-4662.
    Detail | WWW

    HOMOLIAK, I. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022. s. 185-210. ISBN: 978-80-86583-34-1.
    Detail | WWW

  • 2021

    HOMOLIAK, I.; VENUGOPALAN, S.; REIJSBERGEN, D.; HUM, Q.; SCHUMI, R.; SZALACHOWSKI, P. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. IEEE COMMUN SURV TUT, 2021, roč. 23, č. 1, s. 341-390. ISSN: 1553-877X.
    Detail | WWW

    PEREŠÍNI, M.; BENČIĆ, F.; MALINKA, K.; HOMOLIAK, I. DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy. Rotkreuz: Institute of Electrical and Electronics Engineers, 2021. s. 1-8.
    Detail | WWW

    CASINO, F.; LYKOUSAS, N.; HOMOLIAK, I.; PATSAKIS, C.; HERNANDEZ-CASTRO, J. Intercepting Hail Hydra: Real-Time Detection of Algorithmically Generated Domains. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, roč. 2021, č. 190, s. 1-17. ISSN: 1084-8045.
    Detail | WWW

  • 2020

    HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors. IEEE Access, 2020, roč. 8, č. 6, s. 112427-112453. ISSN: 2169-3536.
    Detail | WWW

    BINDER, A.; BREITENBACHER, D.; HARTEL, P.; SZALACHOWSKI, P.; HOMOLIAK, I.; HUJŇÁK, O. SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. In Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. New York City: Association for Computing Machinery, 2020. s. 145-162. ISBN: 978-1-4503-8139-0.
    Detail | WWW

    HUM, Q.; TAN, W.; TEY, S.; LENUS, L.; HOMOLIAK, I.; LIN, Y.; SUN, J. CoinWatch: A Clone-Based Approach for Detecting Vulnerabilities in Cryptocurrencies. In 3rd IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020). Rhodos: Institute of Electrical and Electronics Engineers, 2020. s. 17-25. ISBN: 978-0-7381-0495-9.
    Detail | WWW

    OČENÁŠ, M.; HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. Security and Encryption at Modern Databases. In ICCSP 2020: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy. Nanjing: Association for Computing Machinery, 2020. s. 19-23. ISBN: 978-1-4503-7744-7.
    Detail | WWW

  • 2019

    HOMOLIAK, I. Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics. In 2019 International Joint Conference on Neural Networks (IJCNN). Budapest: Institute of Electrical and Electronics Engineers, 2019. s. 1-10. ISBN: 978-1-7281-1986-1.
    Detail

    HELLEBRANDT, L.; HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. Increasing Trust in Tor Node List Using Blockchain. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Soul: Institute of Electrical and Electronics Engineers, 2019. s. 29-32. ISBN: 978-1-7281-1328-9.
    Detail

    HOMOLIAK, I. A Security Reference Architecture for Blockchains. 2019 2nd IEEE International Conference on Blockchain. Atlanta: 2019. s. 390-397. ISBN: 978-1-7281-4693-5.
    Detail | WWW

    HOMOLIAK, I. HADES-IoT: A practical host-based anomaly detection system for IoT devices. In Asia CCS '19: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Aukland, New Zealand: 2019. s. 479-484.
    Detail | WWW

    HARTEL, P.; HOMOLIAK, I.; REIJSBERGEN, D. An Empirical Study into the Success of Listed Smart Contracts in Ethereum. IEEE Access, 2019, roč. 07, č. 12, s. 177539-177555. ISSN: 2169-3536.
    Detail | WWW

    HOMOLIAK, I.; TOFFALINI, F.; GUARNIZO, J.; ELOVICI, Y.; OCHOA, M. Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. ACM COMPUTING SURVEYS, 2019, roč. 52, č. 2, s. 1-40. ISSN: 0360-0300.
    Detail | WWW

    HOMOLIAK, I. StrongChain: Transparent and Collaborative Proof-of-Work Consensus. In Proceedings of The 28th USENIX Security Symposium. Santa Clara: 2019. s. 819-836. ISBN: 978-1-939133-06-9.
    Detail | WWW

  • 2018

    HOMOLIAK, I. Detection of masqueraders based on graph partitioning of file system access events. 2018 IEEE Symposium on Security and Privacy Workshops SPW 2018. San Francisco, CA: Institute of Electrical and Electronics Engineers, 2018. s. 217-227. ISBN: 978-1-5386-8276-0.
    Detail | WWW

    HOMOLIAK, I.; TEKNŐS, M.; BREITENBACHER, D.; HANÁČEK, P. Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. EAI Endorsed Transactions on Security and Safety, 2018, roč. 5, č. 17, s. 1-15. ISSN: 2032-9393.
    Detail | WWW

    HOMOLIAK, I. The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2018, roč. 9, č. 1, s. 54-85. ISSN: 2093-5382.
    Detail | WWW

  • 2017

    HOMOLIAK, I.; TEKNŐS, M.; BARABAS, M.; HANÁČEK, P. Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. In Proceedings of 12th International Conference on Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Guangzhou: Springer International Publishing, 2017. s. 770-773. ISBN: 978-3-319-59607-5.
    Detail | WWW

    HOMOLIAK, I.; BREITENBACHER, D.; HANÁČEK, P. Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset. Journal of Computers, 2017, roč. 12, č. 2, s. 143-155. ISSN: 1796-203X.
    Detail | WWW

    HOMOLIAK, I. TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. In MIST '17: Proceedings of the 2017 International Workshop on Managing Insider Security Threats. Dallas: 2017. s. 45-56. ISBN: 978-1-4503-5177-5.
    Detail | WWW

    HELLEBRANDT, L.; HUJŇÁK, O.; HANÁČEK, P.; HOMOLIAK, I. Survey of Privacy Enabling Strategies in IoT Networks. In Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence. Jakarta: Association for Computing Machinery, 2017. s. 216-221. ISBN: 978-1-4503-5392-2.
    Detail | WWW

    HOMOLIAK, I.; ŠULÁK, L.; HANÁČEK, P. Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks. In Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Jeju Island: Springer International Publishing, 2017. s. 66-78. ISBN: 978-3-319-56549-1. ISSN: 0302-9743.
    Detail | WWW

  • 2016

    BREITENBACHER, D.; HOMOLIAK, I.; JAROŠ, J.; HANÁČEK, P. Impact of Optimization and Parallelism on Factorization Speed of SIQS. Journal on Systemics, Cybernetics and Informatics, 2016, roč. 14, č. 3, s. 51-58. ISSN: 1690-4524.
    Detail | WWW

    SMETKA, T.; HOMOLIAK, I.; HANÁČEK, P. On the Application of Symbolic Regression and Genetic Programming for Cryptanalysis of Symmetric Encryption Algorithm. In Proceedings of 2016 IEEE International Carnahan Conference on Security Technology. Orlando, Fl: Institute of Electrical and Electronics Engineers, 2016. s. 305-312. ISBN: 978-1-5090-1072-1.
    Detail | WWW

    BREITENBACHER, D.; HOMOLIAK, I.; JAROŠ, J.; HANÁČEK, P. Impact of Optimization and Parallelism on Factorization Speed of SIQS. In Proceedings of The 20th World Multi-Conference on Systemics, Cybernetics and Informatics. Journal on Systemics, Cybernetics and Informatics. WMSCI 2016 - 20th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings. Orlando: The International Institute of Informatics and Systemics, 2016. s. 55-62. ISBN: 978-1-941763-47-6. ISSN: 1690-4524.
    Detail | WWW

  • 2015

    SMETKA, T.; HOMOLIAK, I.; HANÁČEK, P. Cryptanalysis of Symmetric Encryption Algorithm Using Symbolic Regression and Genetic Programming. Santa's Crypto Get-Together 2015. Praha: TNS, 2015. s. 43-44. ISBN: 978-80-904257-7-4.
    Detail

    BREITENBACHER, D.; HOMOLIAK, I.; HANÁČEK, P. Parallelized Self-Initializing Quadratic Sieve using OpenMP. Santa's Crypto Get-Together 2015. Praha: Trusted Network Solutions, a.s., 2015. s. 39-40. ISBN: 978-80-904257-7-4.
    Detail

  • 2014

    HOMOLIAK, I.; OVŠONKA, D.; GRÉGR, M.; HANÁČEK, P. NBA of Obfuscated Network Vulnerabilities' Exploitation Hidden into HTTPS Traffic. In Proceedings of International Conference for Internet Technology and Secured Transactions (ICITST-2014). London: IEEE Computer Society, 2014. s. 310-317. ISBN: 978-1-908320-40-7.
    Detail | WWW

    HOMOLIAK, I.; OVŠONKA, D.; KORANDA, K.; HANÁČEK, P. Characteristics of Buffer Overflow Attacks Tunneled in HTTP Traffic. In International Carnahan Conference on Security Technology. 48th Annual International Carnahan Conference on Security Technology. Řím: IEEE Computer Society, 2014. s. 188-193. ISBN: 978-1-4799-3531-4.
    Detail | WWW

  • 2013

    HOMOLIAK, I.; BARABAS, M.; CHMELAŘ, P.; DROZD, M.; HANÁČEK, P. ASNM: Advanced Security Network Metrics for Attack Vector Description. Proceedings of the 2013 International Conference on Security & Management. Las Vegas: Computer Science Research, Education, and Applications Press, 2013. s. 350-358. ISBN: 1-60132-259-3.
    Detail | WWW

    HOMOLIAK, I.; BARABAS, M.; CHMELAŘ, P.; DROZD, M.; HANÁČEK, P. Advanced Security Network Metrics. In Emerging Trends in ICT Security. Waltham: Elsevier Science, 2013. s. 187-202. ISBN: 978-0-12-411474-6.
    Detail | WWW

    BARABAS, M.; HOMOLIAK, I.; DROZD, M.; HANÁČEK, P. Automated Malware Detection Based on Novel Network Behavioral Signatures. International Journal of Engineering and Technology, 2013, roč. 5, č. 2, s. 249-253. ISSN: 1793-8236.
    Detail | WWW

    KAČIC, M.; HANÁČEK, P.; HENZL, M.; HOMOLIAK, I. A Concept of Behavioral Reputation System in Wireless Networks. The 47th Annual International Carnahan Conference on Security Technology. Medellín: Institute of Electrical and Electronics Engineers, 2013. s. 86-90. ISBN: 978-958-8790-65-7.
    Detail | WWW

    BARABAS, M.; HOMOLIAK, I.; HANÁČEK, P.; KAČIC, M. Detection of Network Buffer Overflow Attacks: A Case Study. The 47th Annual International Carnahan Conference on Security Technology. Mendellin: Institute of Electrical and Electronics Engineers, 2013. s. 128-131. ISBN: 978-958-8790-65-7.
    Detail | WWW

  • 2012

    HOMOLIAK, I. Increasing Classification Accuracy in LibSVM Using String Kernel Functions. Proceedings of the 18th Conference STUDENT EEICT 2012. Student EEICT, Volume 2. Brno: Faculty of Electrical Engineering and Communication BUT, 2012. s. 281-283. ISBN: 978-80-214-4461-4.
    Detail | WWW

*) Citace publikací se generují jednou za 24 hodin.