Publications
You are here: Home \ Publications

Presentations given at the Secur’IT platform kick-off :

  • Jonathan Duplicy – Innoviris
  • Christophe Van Mollekot – Microsoft – “How the cloud can help your IT Security”
  • Philippe Thiran – Sirris, UNamur – Secloud project “Security driven Engineering of Cloud-based applications”
  • Yves Savary De Beauregard – Sogeti – “Information Security: Sogeti’s perspective”
  • Stijn Vansummeren – ULB – SPICES project “Scalable Processing and mIning of Compex Events for Security-analytics”
  • Olivier Markowitch – ULB – BRUFENCE project “Scalable machine learning for automating defense system”
  • Ulrich Seldeslachts – LSEC – “Brussels information security accelerregion”
  • François-Xavier Standaert – UCL – SCAUT project “Side-channel Security for Authenticated Encryption”
  • Ann Nowé – VUB – C-CURE project “Cost-Sensitive Dynamic User Authentication with Reinforcement Learning”

Accepted papers and articles:

Brufence:

  • Kivimaki I., Lebichot B., Saramaki J. & Saerens M. (2015), “Two betweenness centrality measures based on randomized shortest paths”. ArXiv:1509.03147; accepted for publication in Scientific Reports.
  • B. Lebichot, F. Braun, O. Caelen and M. Saerens, ”A graph-based, semi- supervised, credit card fraud detection system”, Proceedings of the 2016 Complex Network Conference, 1091-1096, 2016.
  • Sisiaridis D., Carcillo F., Markowitch O., ‘A Framework for Threat Detection in Communication Systems’, PCI 2016, 20th ACM Conference on Informatics, 10-12 November 2016, Patra, Greece
  • Sisiaridis D., Kuchta V., Markowitch O., ‘A Categorical Approach in Handling Event-Ordering in Distributed Systems, ICPADS 2016, 22nd IEEE International Conference on Parallel and Distributed Systems, 13-16 December 2016, Wuhan, China
  • Fabrizio Carcillo, Andrea Dal Pozzolo, Yann-Aël Le Borgne, Olivier Caelen, Yannis Mazzer, Gianluca Bontempi, SCARFF: a Scalable Framework for Streaming Credit Card Fraud Detection with Spark, Information Fusion, Available online 9 September 2017, ISSN 1566-2535, https://doi.org/10.1016/j.inffus.2017.09.005.
  • Fabrizio Carcillo, Yann-Aël Le Borgne, Olivier Caelen, Gianluca Bontempi: “An Assessment of Streaming Active Learning Strategies for Real-Life Credit Card Fraud Detection”,DSAA2017 – The 4th IEEE International Conference on Data Science and Advanced Analytics

SCAUT:

  • Dobraunig, C., Koeune, F., Mangard, S., Mendel, F., Standaert, F.: Towards fresh and hybrid re-keying schemes with beyond birthday security. In: Homma, N., Medwed, M. (eds.) Smart Card Research and Advanced Applications – 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers. Lecture Notes in Computer Science, vol. 9514, pp. 225–241. Springer (2015)
  • Lerman L., Bontempi G., Markowitch O. The bias-variance decomposition in profiled attacks. Journal of Cryptographic Engineering, 5(4):1-13, 2015
  • Journault A., Standaert FX., Varici K. Improving the Security and Efficiency of Block Ciphers Based on LS-Designs. In Designs, Codes and Cryptography, 2016.
  • Dziembowski S., Faust S., Herold G., Journault A., Masny D., Standaert FX. Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems. In CRYPTO, 2016.
  • Lerman L., Martinasek Z., Markowitch O. Robust profiled attacks: should the adversary trust the dataset?. IET Information Security, 11(4):188-194, 2017.
  • Lerman L., Markowitch O., Veshchikov N. Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks. In IEEE Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2016.
  • Barthe G., Dupressoir F., Faust S., Gregoire B., Standaert F.-X., Strub P.-Y., Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, in the proceedings of EUROCRYPT 2017, Lecture Notes in Computer Science, vol 10210, pp 535–566, Paris, France, May 2017, Springer.
  • Lerman L., Veshchikov N., Picek S., Markowitch O. On the Construction of Side-Channel Attack Resilient S-boxes. In the Proceedings of International Workshop on Constructive Side-Channel Analysis and Security Design, COSADE 2017, volume 10348 of Lecture Notes in Computer Science, pages 102-119, Springer, 2017.
  • A. Journault, F.-X. Standaert, Very High Order Masking: Efficient Implementation and Security Evaluation, CHES 2017, to appear.
  • Lerman L., Poussier R., Markowitch O., Standaert F.-X. Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version. Journal of Cryptographic Engineering
  • Veshchikov N., Fernandes Medeiros S., Lerman L. Variety of scalable shuffling countermeasures against side channel attacks. Journal of Cyber Security and Mobility, 5(3):195-232, 2017.
  • Lerman L., Veshchikov N., Markowitch O., Standaert F.-X. Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis Tool for Leakage Profiling. IEEE Transactions on Computers, to appear.

Tutorials

  1. SCARFF: SCAlable Real-time Frauds Finder also available here, by Fabrizio Carcillo (Brufence)
  2. Docker swarm on MLG/IRIDIA cluster also available here, by Yann-Aël Le Borgne (Brufence)

SeCloud

  • Cuvelier, É. and Pereira, O. (2016) “Verifiable Multi-party Computation with Perfectly Private Audit Trail”, International Conference on Applied Cryptography and Network Security (pp. 367-385). Springer International Publishing.
  • De Bleser, J., Stiévenart, Q., Nicolay, J., De Roover, C., (2017) “Static Taint Analysis of Event-driven Scheme Programs”, ELS2017
  • Konstantinou, I. & Kamara, I. (2017) “Cloud computing and personal data processing: sorting out legal requirements” in Data Security in Cloud Computing . Kumar, V., Ko, R. & Chaisiri, S. (eds.), Institution of Engineering and Technology
  • Kuchta, V. & Markowitch, O. (2016) “Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices”, International Conference on Cryptology in Malaysia (pp. 409-435). Springer, Cham.
  • Kuchta, V. & Markowitch, O. (2016) “Identity-Based Threshold Encryption on Lattices with Application to Searchable Encryption”, International Conference on Applications and Techniques in Information Security (pp. 117-129). Springer Singapore.
  • Kuchta, V., Sharma, G., Sahu, R.A., Bhatia, T., Markowitch, O. (2017) “Secure Certificateless Proxy Re-encryption Without Pairing”, International Workshop on Security (pp. 85-101). Springer, Cham.
  • Nicolay, J., Noguera, C., De Roover, C., De Meuter, W. (2015), “Detecting function purity in JavaScript”, Source Code Analysis and Manipulation (SCAM), 2015 IEEE 15th International Working Conference on(pp. 101-110). IEEE.
  • Nicolay, J., Spruyt, V., De Roover, C. (2016) “Static Detection of User-specified Security Vulnerabilities in Client-side JavaScript”, Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security (pp. 3-13). ACM.
  • Nicolay, J., Stiévenart, Q., De Meuter, W., De Roover, C. (2017) “Purity analysis for JavaScript through abstract interpretation”, Journal of Software: Evolution and Process.
  • Sakr M. &  Zimányi E. (2016) A Model For A Spatial Data Marketplace, Dutch-Belgian DataBase Day 2016 (DBDBD’16) Mons, Belgium. October 2016.