Publications
You are here: Home \ Publications

Presentations given at the Secur’IT platform kick-off :

  • Jonathan Duplicy – Innoviris
  • Christophe Van Mollekot – Microsoft – “How the cloud can help your IT Security”
  • Philippe Thiran – Sirris, UNamur – Secloud project “Security driven Engineering of Cloud-based applications”
  • Yves Savary De Beauregard – Sogeti – “Information Security: Sogeti’s perspective”
  • Stijn Vansummeren – ULB – SPICES project “Scalable Processing and mIning of Compex Events for Security-analytics”
  • Olivier Markowitch – ULB – BRUFENCE project “Scalable machine learning for automating defense system”
  • Ulrich Seldeslachts – LSEC – “Brussels information security accelerregion”
  • François-Xavier Standaert – UCL – SCAUT project “Side-channel Security for Authenticated Encryption”
  • Ann Nowé – VUB – C-CURE project “Cost-Sensitive Dynamic User Authentication with Reinforcement Learning”

Accepted papers and articles:

Brufence:

  • Kivimaki I., Lebichot B., Saramaki J. & Saerens M. (2015), “Two betweenness centrality measures based on randomized shortest paths”. ArXiv:1509.03147; accepted for publication in Scientific Reports.
  • B. Lebichot, F. Braun, O. Caelen and M. Saerens, ”A graph-based, semi- supervised, credit card fraud detection system”, Proceedings of the 2016 Complex Network Conference, 1091-1096, 2016.
  • Sisiaridis D., Carcillo F., Markowitch O., ‘A Framework for Threat Detection in Communication Systems’, PCI 2016, 20th ACM Conference on Informatics, 10-12 November 2016, Patra, Greece
  • Sisiaridis D., Kuchta V., Markowitch O., ‘A Categorical Approach in Handling Event-Ordering in Distributed Systems, ICPADS 2016, 22nd IEEE International Conference on Parallel and Distributed Systems, 13-16 December 2016, Wuhan, China
  • Fabrizio Carcillo, Andrea Dal Pozzolo, Yann-Aël Le Borgne, Olivier Caelen, Yannis Mazzer, Gianluca Bontempi, SCARFF: a Scalable Framework for Streaming Credit Card Fraud Detection with Spark, Information Fusion, Available online 9 September 2017, ISSN 1566-2535, https://doi.org/10.1016/j.inffus.2017.09.005.
  • Fabrizio Carcillo, Yann-Aël Le Borgne, Olivier Caelen, Gianluca Bontempi: “An Assessment of Streaming Active Learning Strategies for Real-Life Credit Card Fraud Detection”,DSAA2017 – The 4th IEEE International Conference on Data Science and Advanced Analytics

SCAUT:

  • Dobraunig, C., Koeune, F., Mangard, S., Mendel, F., Standaert, F.: Towards fresh and hybrid re-keying schemes with beyond birthday security. In: Homma, N., Medwed, M. (eds.) Smart Card Research and Advanced Applications – 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers. Lecture Notes in Computer Science, vol. 9514, pp. 225–241. Springer (2015)
  • Lerman L., Bontempi G., Markowitch O. The bias-variance decomposition in profiled attacks. Journal of Cryptographic Engineering, 5(4):1-13, 2015
  • Journault A., Standaert FX., Varici K. Improving the Security and Efficiency of Block Ciphers Based on LS-Designs. In Designs, Codes and Cryptography, 2016.
  • Dziembowski S., Faust S., Herold G., Journault A., Masny D., Standaert FX. Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems. In CRYPTO, 2016.
  • Lerman L., Martinasek Z., Markowitch O. Robust profiled attacks: should the adversary trust the dataset?. IET Information Security, 11(4):188-194, 2017.
  • Lerman L., Markowitch O., Veshchikov N. Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks. In IEEE Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2016.
  • Barthe G., Dupressoir F., Faust S., Gregoire B., Standaert F.-X., Strub P.-Y., Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, in the proceedings of EUROCRYPT 2017, Lecture Notes in Computer Science, vol 10210, pp 535–566, Paris, France, May 2017, Springer.
  • Lerman L., Veshchikov N., Picek S., Markowitch O. On the Construction of Side-Channel Attack Resilient S-boxes. In the Proceedings of International Workshop on Constructive Side-Channel Analysis and Security Design, COSADE 2017, volume 10348 of Lecture Notes in Computer Science, pages 102-119, Springer, 2017.
  • A. Journault, F.-X. Standaert, Very High Order Masking: Efficient Implementation and Security Evaluation, CHES 2017, to appear.
  • Lerman L., Poussier R., Markowitch O., Standaert F.-X. Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version. Journal of Cryptographic Engineering
  • Veshchikov N., Fernandes Medeiros S., Lerman L. Variety of scalable shuffling countermeasures against side channel attacks. Journal of Cyber Security and Mobility, 5(3):195-232, 2017.
  • Lerman L., Veshchikov N., Markowitch O., Standaert F.-X. Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis Tool for Leakage Profiling. IEEE Transactions on Computers, to appear.
  • Berti F., Koeune F., Pereira O., Peters T., Standaert F.-X.: Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives. AsiaCCS 201

Tutorials

  1. SCARFF: SCAlable Real-time Frauds Finder also available here, by Fabrizio Carcillo (Brufence)
  2. Docker swarm on MLG/IRIDIA cluster also available here, by Yann-Aël Le Borgne (Brufence)

SeCloud

  • Cuvelier, É. and Pereira, O. (2016) “Verifiable Multi-party Computation with Perfectly Private Audit Trail”, International Conference on Applied Cryptography and Network Security (pp. 367-385). Springer International Publishing.
  • De Bleser, J., Stiévenart, Q., Nicolay, J., De Roover, C., (2017) “Static Taint Analysis of Event-driven Scheme Programs”, ELS 2017.
  • Konstantinou, I. & Kamara, I. “Cloud computing and personal data processing: sorting out legal requirements” in Data Security in Cloud Computing . Kumar, V., Ko, R. & Chaisiri, S. (eds.), Institution of Engineering and Technology (2017).
  • Kuchta, V. & Markowitch, O. (2016) “Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices”, International Conference on Cryptology in Malaysia (pp. 409-435). Springer, Cham.
  • Kuchta, V. & Markowitch, O. (2016) “Identity-Based Threshold Encryption on Lattices with Application to Searchable Encryption”, International Conference on Applications and Techniques in Information Security (pp. 117-129). Springer Singapore.
  • Frederic Vleminckx. SeCloud Web services hardening. March 20, 2018. HogeSchool, Brussels.

  • Kuchta, V., Sharma, G., Sahu, R.A., Bhatia, T., Markowitch, O. (2017) “Secure Certificateless Proxy Re-encryption Without Pairing”, International Workshop on Security (pp. 85-101). Springer, Cham.
  • Angel Luis Scull Pupo, Laurent Christophe, Jens Nicolay, Coen de Roover, and Elisa Gonzalez Boix. Practical Information Flow Control for Web Applications. Nov 8, 2018 (Springer online conference paper). Vrije Universiteit Brussel, Pleinlaan 2, 1050 Brussels, Belgium.

  • Nicolay, J., Noguera, C., De Roover, C., De Meuter, W. (2015), “Detecting function purity in JavaScript”, Source Code Analysis and Manipulation (SCAM), 2015 IEEE 15th International Working Conference on(pp. 101-110).
  • Angel Luis Scull Pupo Jens Nicolay Elisa Gonzalez Boix. Declaratively Specifying Security Policies For Web Applications. META’16 October 30, 2016, Amsterdam, The Nederlands.

  • Nicolay, J., Spruyt, V., De Roover, C. (2016) “Static Detection of User-specified Security Vulnerabilities in Client-side JavaScript”, Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security (pp. 3-13). ACM.
  • Angel Luis Scull Pupo, Jens Nicolay, Elisa Gonzalez Boix. GUARDIA: specification and enforcement of JavaScript security policies without VM modifications. ManLang’18, September 12–14, 2018, Linz, Austria.

  • Nicolay, J., Stiévenart, Q., De Meuter, W., De Roover, C. (2017) “Purity analysis for JavaScript through abstract interpretation”, Journal of Software: Evolution and Process.
  • Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, and Olivier Markowitch. Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings. ICISC 2017, LNCS 10779, pp. 71–92, 2018. Springer International Publishing AG.

  • M. Arnhem, E. Karpov and  N. J.  Cerf. Optimal estimation of parameters encoded in coherent states quadratures. Université Libre de Bruxelles (April, 2018).
  • Gaurav Sharma, Rajeev Anand Sahu, Veronika Kuchta1, Olivier Markowitch, and Suman Bala. Authenticated Group Key Agreement Protocol Without Pairing. ICICS 2017, LNCS 10631, pp. 606–618, 2018. Springer International Publishing AG.

  • Veronika Kuchta, Rajeev Anand Sahu, Vishal Saraswat,  Gaurauv Sharma,  Neetu  Sharma and Olivier Markowitch. Anonymous yet traceable  Strong Designed Verifier Signature. Information Security, Springer AG, 2018.
  • Veronika Kuchta(B), Gaurav Sharma, Rajeev Anand Sahu, and Olivier Markowitch. Generic Framework for Attribute-Based Group Signature. Springer International Publishing AG 2017. ISPEC 2017, LNCS 10701, pp. 814–834, 2017.

  • Vishal  Saraswat, Rajeev Anand Sahu. Short  Integrated  PKE+PEKS in standard  Model. R.C. Boss Center for Cryptology and security. Indian Statistical Institute. Computer Science Faculty, Université Libre de Bruxelles. LNCS 10662, pp. 226–246, 2017. Springer International Publishing AG.
  • Luc R. Vanbever, Evgueni Karpov, and Krassimir Panajotov. Semiconductor surface emitting lasers for photon pairs generation. published online 15 September 2017 by AIP publisher.

  • Sakr M. &  Zimányi E. (2016) A Model For A Spatial Data Marketplace, Dutch-Belgian DataBase Day 2016 (DBDBD’16) Mons, Belgium. October 2016.
  • Luc R. Vanbever,  Evgueni Karpov and Krassimir Panajotov. Semiconductor Surface Emitting Lasers For Entangled Photons Generation. Proceedings Symposium IEEE Photonics Society Benelux, 2016, Ghent, Belgium.

  • Bojan Spasic, Annanda Rath, Philippe Thiran, Nick Boucart. Security Pattern for Cloud SaaS: from system and data security to privacy. 4th IEEE CloudTech 27-28 Nov 2018, Brussels, Belgium.