You are here: Home \ Publications

Presentations given at the Secur’IT platform kick-off :

  • Jonathan Duplicy – Innoviris
  • Christophe Van Mollekot – Microsoft – “How the cloud can help your IT Security”
  • Philippe Thiran – Sirris, UNamur – Secloud project “Security driven Engineering of Cloud-based applications”
  • Yves Savary De Beauregard – Sogeti – “Information Security: Sogeti’s perspective”
  • Stijn Vansummeren – ULB – SPICES project “Scalable Processing and mIning of Compex Events for Security-analytics”
  • Olivier Markowitch – ULB – BRUFENCE project “Scalable machine learning for automating defense system”
  • Ulrich Seldeslachts – LSEC – “Brussels information security accelerregion”
  • François-Xavier Standaert – UCL – SCAUT project “Side-channel Security for Authenticated Encryption”
  • Ann Nowé – VUB – C-CURE project “Cost-Sensitive Dynamic User Authentication with Reinforcement Learning”

Accepted papers and articles:


  • Kivimaki I., Lebichot B., Saramaki J. & Saerens M. (2015), “Two betweenness centrality measures based on randomized shortest paths”. ArXiv:1509.03147; accepted for publication in Scientific Reports.
  • B. Lebichot, F. Braun, O. Caelen and M. Saerens, ”A graph-based, semi- supervised, credit card fraud detection system”, Proceedings of the 2016 Complex Network Conference, 1091-1096, 2016.
  • Sisiaridis D., Carcillo F., Markowitch O., ‘A Framework for Threat Detection in Communication Systems’, PCI 2016, 20th ACM Conference on Informatics, 10-12 November 2016, Patra, Greece
  • Sisiaridis D., Kuchta V., Markowitch O., ‘A Categorical Approach in Handling Event-Ordering in Distributed Systems, ICPADS 2016, 22nd IEEE International Conference on Parallel and Distributed Systems, 13-16 December 2016, Wuhan, China
  • Carcillo F., Dal Pozzolo, A., Le Borgne, Y-A, Caelen, O., Mazzer Y., Bontempi G., ‘Sparkingfraud: A Scalable Framework for Streaming Credit Card Fraud Detection’, special issue in Journal of Information Fusion in Learning from Data Streams (under review)


  • Dobraunig, C., Koeune, F., Mangard, S., Mendel, F., Standaert, F.: Towards fresh and hybrid re-keying schemes with beyond birthday security. In: Homma, N., Medwed, M. (eds.) Smart Card Research and Advanced Applications – 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers. Lecture Notes in Computer Science, vol. 9514, pp. 225–241. Springer (2015)
  • Lerman L., Bontempi G., Markowitch O. The bias-variance decomposition in profiled attacks. Journal of Cryptographic Engineering, 5(4):1-13, 2015
  • Journault A., Standaert FX., Varici K. Improving the Security and Efficiency of Block Ciphers Based on LS-Designs. In Designs, Codes and Cryptography, 2016.
  • Dziembowski S., Faust S., Herold G., Journault A., Masny D., Standaert FX. Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems. In CRYPTO, 2016.
  • Lerman L., Martinasek Z., Markowitch O. Robust profiled attacks: should the adversary trust the dataset? In IET Information Security journal, to appear.
  • Lerman L., Markowitch O., Veshchikov N. Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks. In IEEE Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2016.
  • Barthe G., Dupressoir F., Faust S., Gregoire B., Standaert F.-X., Strub P.-Y., Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, in EUROCRYPT 2017, to appear.
  • Lerman L., Veshchikov N., Picek S., Markowitch O. On the Construction of Side-Channel Attack Resilient S-boxes. In International Workshop on Constructive Side-Channel Analysis and Security Design, COSADE 2017, to appear.


  1. SCARFF: SCAlable Real-time Frauds Finder also available here, by Fabrizio Carcillo (Brufence)
  2. Docker swarm on MLG/IRIDIA cluster also available here, by Yann-Aël Le Borgne (Brufence)