Ivan Homoliak

Orcid: 0000-0002-0790-0875

According to our database1, Ivan Homoliak authored at least 49 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enhancing Security of AI-Based Code Synthesis with GitHub Copilot via Cheap and Efficient Prompt-Engineering.
CoRR, 2024

SoK: Cryptocurrency Wallets - A Security Review and Classification based on Authentication Factors.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

DAG-Sword: A Simulator of Large-Scale Network Topologies for DAG-Oriented Proof-of-Work Blockchains.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Resilience of Voice Assistants to Synthetic Speech.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
Always on Voting: A Framework for Repetitive Voting on the Blockchain.
IEEE Trans. Emerg. Top. Comput., 2023

CBDC-AquaSphere: Interoperable Central Bank Digital Currency Built on Trusted Computing and Blockchain.
CoRR, 2023

Fee-Redistribution Smart Contracts for Transaction-Fee-Based Regime of Blockchains with the Longest Chain Rule.
CoRR, 2023

SBvote: Scalable Self-Tallying Blockchain-Based Voting.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Incentive Attacks on DAG-Based Blockchains with Random Transaction Selection.
Proceedings of the IEEE International Conference on Blockchain, 2023

BBB-Voting: Self-Tallying End-to-End Verifiable 1-out-of-k Blockchain-Based Boardroom Voting.
Proceedings of the IEEE International Conference on Blockchain, 2023

Mitigating Undercutting Attacks: Fee-Redistribution Smart Contracts for Transaction-Fee-Based Regime of Blockchains with the Longest Chain Rule.
Proceedings of the IEEE International Conference on Blockchain, 2023

2022
ASNM Datasets: A Collection of Network Traffic Data for Testing of Adversarial Classifiers and Network Intrusion Detectors.
Dataset, May, 2022

HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version).
IEEE Internet Things J., 2022

Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management.
CoRR, 2022

Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains.
J. Netw. Comput. Appl., 2021

DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy.
CoRR, 2021

Always on Voting: A Framework for Repetitive Voting on the Blockchain.
CoRR, 2021

The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses.
IEEE Commun. Surv. Tutorials, 2021

2020
BBB-Voting: 1-out-of-k Blockchain-Based Boardroom Voting.
CoRR, 2020

Aquareum: A Centralized Ledger Enhanced with Blockchain and Trusted Computing.
CoRR, 2020

ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors.
IEEE Access, 2020

Security and Encryption at Modern Databases.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

CoinWatch: A Clone-Based Approach For Detecting Vulnerabilities in Cryptocurrencies.
Proceedings of the IEEE International Conference on Blockchain, 2020

SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets.
Proceedings of the AFT '20: 2nd ACM Conference on Advances in Financial Technologies, 2020

2019
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach.
EAI Endorsed Trans. Security Safety, 2019

Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures.
ACM Comput. Surv., 2019

ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors.
CoRR, 2019

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses.
CoRR, 2019

HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version).
CoRR, 2019

An Empirical Study Into the Success of Listed Smart Contracts in Ethereum.
IEEE Access, 2019

StrongChain: Transparent and Collaborative Proof-of-Work Consensus.
Proceedings of the 28th USENIX Security Symposium, 2019

Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics.
Proceedings of the International Joint Conference on Neural Networks, 2019

Increasing Trust in Tor Node List Using Blockchain.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

A Security Reference Architecture for Blockchains.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets.
CoRR, 2018

Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures.
CoRR, 2018

Detection of Masqueraders Based on Graph Partitioning of File System Access Events.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

2017
Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset.
J. Comput., 2017

TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

2016
Detekce Útoků v Síťovém Provozu ; Intrusion Detection in Network Traffic.
PhD thesis, 2016

Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection.
Proceedings of the Security and Privacy in Communication Networks, 2016

On the application of symbolic regression and genetic programming for cryptanalysis of symmetric encryption algorithm.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2016

2014
NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Characteristics of buffer overflow attacks tunneled in HTTP traffic.
Proceedings of the International Carnahan Conference on Security Technology, 2014


  Loading...