Publikace
-
2023
BUDINSKÝ, R.; HOMOLIAK, I.; STANČÍKOVÁ, I. Fee-Redistribution Smart Contracts for Transaction-Fee-Based Regime of Blockchains with the Longest Chain Rule. 2023.
p. 0-0. DetailDRGA, J.; HOMOLIAK, I.; VANČO, J.; PEREŠÍNI, M.; HANÁČEK, P.; VASILAKOS, A. Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. In 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Dubai: Institute of Electrical and Electronics Engineers, 2023.
p. 1-4. ISBN: 979-8-3503-1019-1. DetailSTANČÍKOVÁ, I.; HOMOLIAK, I. SBvote: Scalable Self-Tallying Blockchain-Based Voting. In SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. Tallin: Association for Computing Machinery, 2023.
p. 203-2011. ISBN: 978-1-4503-9517-5. DetailVENUGOPALAN, S.; STANČÍKOVÁ, I.; HOMOLIAK, I. Always on Voting: A Framework for Repetitive Voting on the Blockchain. 2023,
p. 1-11. Detail -
2022
BREITENBACHER, D.; HOMOLIAK, I.; AUNG, Y.; ELOVICI, Y.; TIPPENHAUER, N. HADES-IoT: A practical host-based anomaly detection system for IoT devices (Extended Version). IEEE Internet of Things Journal, 2022, vol. 9, no. 12,
p. 9640-9658. ISSN: 2327-4662. DetailHOLÍKOVÁ, L.; HOLÍK, L.; HOMOLIAK, I.; LENGÁL, O.; VEANES, M.; VOJNAR, T. Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers. In Proceedings of the 31st USENIX Security Symposium. Boston, MA: USENIX, 2022.
p. 4165-4182. ISBN: 978-1-939133-31-1. DetailHOMOLIAK, I. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022.
p. 185-210. ISBN: 978-80-86583-34-1. DetailPEREŠÍNI, M.; MALINKA, K.; HOMOLIAK, I.; BENČIĆ, F.; HLADKÝ, T. Simulations of DAG-based Blockchain Protocols and Attacks on the PHANTOM Protocol via Transaction Selection Strategies. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022.
p. 173-184. ISBN: 978-80-86583-34-1. Detail -
2021
CASINO, F.; LYKOUSAS, N.; HOMOLIAK, I.; PATSAKIS, C.; HERNANDEZ-CASTRO, J. Intercepting Hail Hydra: Real-Time Detection of Algorithmically Generated Domains. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, vol. 2021, no. 190,
p. 1-17. ISSN: 1084-8045. DetailHOMOLIAK, I.; VENUGOPALAN, S.; REIJSBERGEN, D.; HUM, Q.; SCHUMI, R.; SZALACHOWSKI, P. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. IEEE COMMUN SURV TUT, 2021, vol. 23, no. 1,
p. 341-390. ISSN: 1553-877X. DetailPEREŠÍNI, M.; BENČIĆ, F.; MALINKA, K.; HOMOLIAK, I. DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy. Rotkreuz: Institute of Electrical and Electronics Engineers, 2021.
p. 1-8. Detail -
2020
BINDER, A.; BREITENBACHER, D.; HARTEL, P.; SZALACHOWSKI, P.; HOMOLIAK, I.; HUJŇÁK, O. SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. In Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. New York City: Association for Computing Machinery, 2020.
p. 145-162. ISBN: 978-1-4503-8139-0. DetailHOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors. IEEE Access, 2020, vol. 8, no. 6,
p. 112427-112453. ISSN: 2169-3536. DetailHUM, Q.; TAN, W.; TEY, S.; LENUS, L.; HOMOLIAK, I.; LIN, Y.; SUN, J. CoinWatch: A Clone-Based Approach for Detecting Vulnerabilities in Cryptocurrencies. In 3rd IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020). Rhodos: Institute of Electrical and Electronics Engineers, 2020.
p. 17-25. ISBN: 978-0-7381-0495-9. DetailOČENÁŠ, M.; HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. Security and Encryption at Modern Databases. In ICCSP 2020: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy. Nanjing: Association for Computing Machinery, 2020.
p. 19-23. ISBN: 978-1-4503-7744-7. Detail -
2019
HARTEL, P.; HOMOLIAK, I.; REIJSBERGEN, D. An Empirical Study into the Success of Listed Smart Contracts in Ethereum. IEEE Access, 2019, vol. 07, no. 12,
p. 177539-177555. ISSN: 2169-3536. DetailHELLEBRANDT, L.; HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. Increasing Trust in Tor Node List Using Blockchain. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Soul: Institute of Electrical and Electronics Engineers, 2019.
p. 29-32. ISBN: 978-1-7281-1328-9. DetailHOMOLIAK, I. A Security Reference Architecture for Blockchains. 2019 2nd IEEE International Conference on Blockchain. Atlanta: 2019.
p. 390-397. ISBN: 978-1-7281-4693-5. DetailHOMOLIAK, I. Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics. In 2019 International Joint Conference on Neural Networks (IJCNN). Budapest: Institute of Electrical and Electronics Engineers, 2019.
p. 1-10. ISBN: 978-1-7281-1986-1. DetailHOMOLIAK, I. HADES-IoT: A practical host-based anomaly detection system for IoT devices. In Asia CCS '19: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Aukland, New Zealand: 2019.
p. 479-484. DetailHOMOLIAK, I. StrongChain: Transparent and Collaborative Proof-of-Work Consensus. In Proceedings of The 28th USENIX Security Symposium. Santa Clara: 2019.
p. 819-836. ISBN: 978-1-939133-06-9. DetailHOMOLIAK, I.; TOFFALINI, F.; GUARNIZO, J.; ELOVICI, Y.; OCHOA, M. Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. ACM COMPUTING SURVEYS, 2019, vol. 52, no. 2,
p. 1-40. ISSN: 0360-0300. Detail -
2018
HOMOLIAK, I. Detection of masqueraders based on graph partitioning of file system access events. 2018 IEEE Symposium on Security and Privacy Workshops SPW 2018. San Francisco, CA: Institute of Electrical and Electronics Engineers, 2018.
p. 217-227. ISBN: 978-1-5386-8276-0. DetailHOMOLIAK, I. The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2018, vol. 9, no. 1,
p. 54-85. ISSN: 2093-5382. DetailHOMOLIAK, I.; TEKNŐS, M.; BREITENBACHER, D.; HANÁČEK, P. Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. EAI Endorsed Transactions on Security and Safety, 2018, vol. 5, no. 17,
p. 1-15. ISSN: 2032-9393. Detail -
2017
HELLEBRANDT, L.; HUJŇÁK, O.; HANÁČEK, P.; HOMOLIAK, I. Survey of Privacy Enabling Strategies in IoT Networks. In Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence. Jakarta: Association for Computing Machinery, 2017.
p. 216-221. ISBN: 978-1-4503-5392-2. DetailHOMOLIAK, I. TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. In MIST '17: Proceedings of the 2017 International Workshop on Managing Insider Security Threats. Dallas: 2017.
p. 45-56. ISBN: 978-1-4503-5177-5. DetailHOMOLIAK, I.; BREITENBACHER, D.; HANÁČEK, P. Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset. Journal of Computers, 2017, vol. 12, no. 2,
p. 143-155. ISSN: 1796-203X. DetailHOMOLIAK, I.; ŠULÁK, L.; HANÁČEK, P. Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks. In Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Jeju Island: Springer International Publishing, 2017.
p. 66-78. ISBN: 978-3-319-56549-1. ISSN: 0302-9743. DetailHOMOLIAK, I.; TEKNŐS, M.; BARABAS, M.; HANÁČEK, P. Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. In Proceedings of 12th International Conference on Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Guangzhou: Springer International Publishing, 2017.
p. 770-773. ISBN: 978-3-319-59607-5. Detail -
2016
BREITENBACHER, D.; HOMOLIAK, I.; JAROŠ, J.; HANÁČEK, P. Impact of Optimization and Parallelism on Factorization Speed of SIQS. Journal on Systemics, Cybernetics and Informatics, 2016, vol. 14, no. 3,
p. 51-58. ISSN: 1690-4524. DetailBREITENBACHER, D.; HOMOLIAK, I.; JAROŠ, J.; HANÁČEK, P. Impact of Optimization and Parallelism on Factorization Speed of SIQS. In Proceedings of The 20th World Multi-Conference on Systemics, Cybernetics and Informatics. Journal on Systemics, Cybernetics and Informatics. WMSCI 2016 - 20th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings. Orlando: The International Institute of Informatics and Systemics, 2016.
p. 55-62. ISBN: 978-1-941763-47-6. ISSN: 1690-4524. DetailSMETKA, T.; HOMOLIAK, I.; HANÁČEK, P. On the Application of Symbolic Regression and Genetic Programming for Cryptanalysis of Symmetric Encryption Algorithm. In Proceedings of 2016 IEEE International Carnahan Conference on Security Technology. Orlando, Fl: Institute of Electrical and Electronics Engineers, 2016.
p. 305-312. ISBN: 978-1-5090-1072-1. Detail -
2015
BREITENBACHER, D.; HOMOLIAK, I.; HANÁČEK, P. Parallelized Self-Initializing Quadratic Sieve using OpenMP. Santa's Crypto Get-Together 2015. Praha: Trusted Network Solutions, a.s., 2015.
p. 39-40. ISBN: 978-80-904257-7-4. DetailSMETKA, T.; HOMOLIAK, I.; HANÁČEK, P. Cryptanalysis of Symmetric Encryption Algorithm Using Symbolic Regression and Genetic Programming. Santa's Crypto Get-Together 2015. Praha: TNS, 2015.
p. 43-44. ISBN: 978-80-904257-7-4. Detail -
2014
HOMOLIAK, I.; OVŠONKA, D.; GRÉGR, M.; HANÁČEK, P. NBA of Obfuscated Network Vulnerabilities' Exploitation Hidden into HTTPS Traffic. In Proceedings of International Conference for Internet Technology and Secured Transactions (ICITST-2014). London: IEEE Computer Society, 2014.
p. 310-317. ISBN: 978-1-908320-40-7. DetailHOMOLIAK, I.; OVŠONKA, D.; KORANDA, K.; HANÁČEK, P. Characteristics of Buffer Overflow Attacks Tunneled in HTTP Traffic. In International Carnahan Conference on Security Technology. 48th Annual International Carnahan Conference on Security Technology. Řím: IEEE Computer Society, 2014.
p. 188-193. ISBN: 978-1-4799-3531-4. Detail -
2013
BARABAS, M.; HOMOLIAK, I.; DROZD, M.; HANÁČEK, P. Automated Malware Detection Based on Novel Network Behavioral Signatures. International Journal of Engineering and Technology, 2013, vol. 5, no. 2,
p. 249-253. ISSN: 1793-8236. DetailBARABAS, M.; HOMOLIAK, I.; HANÁČEK, P.; KAČIC, M. Detection of Network Buffer Overflow Attacks: A Case Study. The 47th Annual International Carnahan Conference on Security Technology. Mendellin: Institute of Electrical and Electronics Engineers, 2013.
p. 128-131. ISBN: 978-958-8790-65-7. DetailHOMOLIAK, I.; BARABAS, M.; CHMELAŘ, P.; DROZD, M.; HANÁČEK, P. ASNM: Advanced Security Network Metrics for Attack Vector Description. Proceedings of the 2013 International Conference on Security & Management. Las Vegas: Computer Science Research, Education, and Applications Press, 2013.
p. 350-358. ISBN: 1-60132-259-3. DetailHOMOLIAK, I.; BARABAS, M.; CHMELAŘ, P.; DROZD, M.; HANÁČEK, P. Advanced Security Network Metrics. In Emerging Trends in ICT Security. Waltham: Elsevier Science, 2013.
p. 187-202. ISBN: 978-0-12-411474-6. DetailKAČIC, M.; HANÁČEK, P.; HENZL, M.; HOMOLIAK, I. A Concept of Behavioral Reputation System in Wireless Networks. The 47th Annual International Carnahan Conference on Security Technology. Medellín: Institute of Electrical and Electronics Engineers, 2013.
p. 86-90. ISBN: 978-958-8790-65-7. Detail -
2012
HOMOLIAK, I. Increasing Classification Accuracy in LibSVM Using String Kernel Functions. Proceedings of the 18th Conference STUDENT EEICT 2012. Student EEICT, Volume 2. Brno: Faculty of Electrical Engineering and Communication BUT, 2012.
p. 281-283. ISBN: 978-80-214-4461-4. Detail