Konstantinos Markantonakis

Orcid: 0000-0003-3975-9033

Affiliations:
  • Royal Holloway, University of London, Egham, UK


According to our database1, Konstantinos Markantonakis authored at least 173 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Side-Channel Analysis of Sensor Multiplexing for Covert Channels and Application Profiling on Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2024

Control-Flow Attestation: Concepts, Solutions, and Open Challenges.
CoRR, 2024

Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study.
IEEE Access, 2024

ZKP Enabled Identity and Reputation Verification in P2P Marketplaces.
Proceedings of the IEEE International Conference on Blockchain, 2024

Trusted Execution Environments
Springer, ISBN: 978-3-031-55560-2, 2024

2023
Investigating Black-Box Function Recognition Using Hardware Performance Counters.
IEEE Trans. Computers, July, 2023

A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

2022
New Diagnostic Forensic Protocol for Damaged Secure Digital Memory Cards.
IEEE Access, 2022

2021
Privacy-Preserving Group Authentication for RFID Tags Using Bit-Collision Patterns.
IEEE Internet Things J., 2021

A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles.
CoRR, 2021

Exploiting Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices.
CoRR, 2021

Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Survey.
CoRR, 2021

A DLT-based Smart Contract Architecture for Atomic and Scalable Trading.
CoRR, 2021

Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis.
Comput. Secur., 2021

LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices.
Proceedings of the IEEE Security and Privacy Workshops, 2021

2020
A Session Hijacking Attack Against a Device-Assisted Physical-Layer Key Agreement.
IEEE Trans. Ind. Informatics, 2020

One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

Return-Oriented Programming on RISC-V.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
Ensuring Secure Application Execution and Platform-Specific Execution in Embedded Devices.
ACM Trans. Embed. Comput. Syst., 2019

Removing epoxy underfill between neighbouring components using acid for component chip-off.
Digit. Investig., 2019

Location Tracking Using Smartphone Accelerometer and Magnetometer Traces.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Reprint of "You can't touch this: Consumer-centric android application repackaging detection".
Future Gener. Comput. Syst., 2018

Forensic smartphone analysis using adhesives: Transplantation of Package on Package components.
Digit. Investig., 2018

E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy.
CoRR, 2018

Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs.
CoRR, 2018

Remote Credential Management with Mutual Attestation for Trusted Execution Environments.
Proceedings of the Information Security Theory and Practice, 2018

Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper.
Proceedings of the Information Security Theory and Practice, 2018

Consumer Centric Data Control, Tracking and Transparency - A Position Paper.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Fair and Transparent Blockchain Based Tendering Framework - A Step Towards Open Governance.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Good Vibrations: Artificial Ambience-Based Relay Attack Detection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

An Evaluation of the Security of the Bitcoin Peer-To-Peer Network.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

2017
Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones.
CoRR, 2017

Serverless Protocols for Inventory and Tracking with a UAV.
CoRR, 2017

EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs.
Proceedings of the Information Security Theory and Practice, 2017

Philanthropy on the Blockchain.
Proceedings of the Information Security Theory and Practice, 2017

A Secure and Trusted Channel Protocol for UAVs Fleets.
Proceedings of the Information Security Theory and Practice, 2017

On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

An Exploratory Analysis of the Security Risks of the Internet of Things in Finance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Proximity Assurances Based on Natural and Artificial Ambient Environments.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017

Towards trusted execution of multi-modal continuous authentication schemes.
Proceedings of the Symposium on Applied Computing, 2017

Preventing relay attacks in mobile transactions using infrared light.
Proceedings of the Symposium on Applied Computing, 2017

Comparison of dynamic biometrie security characteristics against other biometrics.
Proceedings of the IEEE International Conference on Communications, 2017

Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

May the Force Be with You: Force-Based Relay Attack Detection.
Proceedings of the Smart Card Research and Advanced Applications, 2017

Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Provisioning Software with Hardware-Software Binding.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Artificial Ambient Environments for Proximity Critical Applications.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Smart Card Reader and Mobile APIs.
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017

Smart Cards for Banking and Finance.
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017

Multi-Application Smart Card Platforms and Operating Systems.
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017

2016
Recovering from a lost digital wallet: A smart cards perspective extended abstract.
Pervasive Mob. Comput., 2016

You can't touch this: Consumer-centric android application repackaging detection.
Future Gener. Comput. Syst., 2016

When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data.
CoRR, 2016

An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks.
CoRR, 2016

Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks.
CoRR, 2016

Challenges of Security and Trust of Mobile Devices as Digital Avionics Component.
CoRR, 2016

Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments.
CoRR, 2016

Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Log Your Car: The Non-invasive Vehicle Forensics.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Extending EMV Tokenised Payments to Offline-Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Tokenisation Blacklisting Using Linkable Group Signatures.
Proceedings of the Security and Privacy in Communication Networks, 2016

Enhancing EMV Tokenisation with Dynamic Transaction Tokens.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

Two rounds RFID grouping-proof protocol.
Proceedings of the 2016 IEEE International Conference on RFID, 2016

A Smart Card Web Server in the Web of Things.
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016, 2016

Can You Call the Software in Your Device be Firmware?
Proceedings of the 13th IEEE International Conference on e-Business Engineering, 2016

Log Your Car: Reliable Maintenance Services Record.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016

Secure Application Execution in Mobile Devices.
Proceedings of the New Codebreakers, 2016

2015
A novel consumer-centric card management architecture and potential security issues.
Inf. Sci., 2015

Enhancing EMV Online PIN Verification.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Secure and Trusted Application Execution on Embedded Devices.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015

Let's Get Mobile: Secure FOTA for Automotive System.
Proceedings of the Network and System Security - 9th International Conference, 2015

Authentication based on a changeable biometric using gesture recognition with the Kinect™.
Proceedings of the International Conference on Biometrics, 2015

Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks.
Proceedings of the Computer Security - ESORICS 2015, 2015

Don't Brick Your Car: Firmware Confidentiality and Rollback for Vehicles.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Remote E-Voting Using the Smart Card Web Server.
Int. J. Secur. Softw. Eng., 2014

Security and resilience for smart devices and applications.
EURASIP J. Wirel. Commun. Netw., 2014

CAN Bus Risk Analysis Revisit.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Trusted Platform Module for Smart Cards.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Precise Instruction-Level Side Channel Profiling of Embedded Processors.
Proceedings of the Information Security Practice and Experience, 2014

Optimistic Fair-Exchange with Anonymity for Bitcoin Users.
Proceedings of the 11th IEEE International Conference on e-Business Engineering, 2014

Rethinking the Smart Card Technology.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Secure Improved Cloud-Based RFID Authentication Protocol.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Practical Attacks on Virtual Worlds.
Proceedings of the Risks and Security of Internet and Systems, 2014

Verifying Software Integrity in Embedded Systems: A Side Channel Approach.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

Analysis of Potential Vulnerabilities in Payment Terminals.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

Mobile Communication Security Controllers.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

Information Security Best Practices.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

An Introduction to Smart Cards and RFIDs.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

Errata to: Secure Smart Embedded Devices, Platforms and Applications.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

Errata to: Secure Smart Embedded Devices, Platforms and Applications.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

The BIOS and Rootkits.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

An Introduction to Java Card Programming.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

An Introduction to the Trusted Platform Module and Mobile Trusted Module.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

2013
Editorial: advanced semantic and social multimedia technologies for future computing environment.
Multim. Tools Appl., 2013

Card-Present Transactions on the Internet Using the Smart Card Web Server.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Virtual World Authentication Using the Smart Card Web Server.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems.
Proceedings of the Security and Privacy in Communication Networks, 2013

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions.
Proceedings of the Radio Frequency Identification System Security, 2013

Using the Smart Card Web Server in Secure Branchless Banking.
Proceedings of the Network and System Security - 7th International Conference, 2013

Smart cards: State-of-the-art to future directions.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPA.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Subscriber Centric Conditional Access System for Pay-TV Systems.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

Recovering from a Lost Digital Wallet.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Vulnerability Analysis of a Commercial .NET Smart Card.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
A Privacy Preserving Application Acquisition Protocol.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis.
Proceedings of the 5th International Conference on New Technologies, 2012

Tag Group Authentication Using Bit-Collisions.
Proceedings of the 2012 Information Security for South Africa, 2012

Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Distributed e-voting using the Smart Card Web Server.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

Building the Bridges - A Proposal for Merging Different Paradigms in Mobile NFC Ecosystem.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Considerations for mobile authentication in the Cloud.
Inf. Secur. Tech. Rep., 2011

Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones.
IACR Cryptol. ePrint Arch., 2011

Cross-Platform Application Sharing Mechanism.
Proceedings of the IEEE 10th International Conference on Trust, 2011

User Centric Security Model for Tamper-Resistant Devices.
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011

Application-Binding Protocol in the User Centric Smart Card Ownership Model.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing.
Int. J. Secur. Networks, 2010

Practical NFC Peer-to-Peer Relay Attack using Mobile Phones.
IACR Cryptol. ePrint Arch., 2010

Website Credential Storage and Two-Factor Web Authentication with a Java SIM.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

A location based security framework for authenticating mobile phones.
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2010), 2010

A Paradigm Shift in Smart Card Ownership Model.
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010

Simulator Problem in User Centric Smart Card Ownership Model.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Firewall Mechanism in a User Centric Smart Card Ownership Model.
Proceedings of the Smart Card Research and Advanced Application, 2010

A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010

2009
Transport ticketing security and fraud controls.
Inf. Secur. Tech. Rep., 2009

Attacking smart card systems: Theory and practice.
Inf. Secur. Tech. Rep., 2009

Confidence in smart token proximity: Relay attacks revisited.
Comput. Secur., 2009

Application Management Framework in User Centric Smart Card Ownership Model.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Location Based Application Availability.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009 Workshops, 2009

A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks.
Proceedings of the Mobile Lightweight Wireless Systems, 2009

Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Select-Response Grouping Proof for RFID Tags.
Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009

A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Mobile communication security controllers an evaluation paper.
Inf. Secur. Tech. Rep., 2008

A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Overview of Security Threats for Smart Cards in the Public Transport Industry.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
Smart Card Security.
Proceedings of the Computational Intelligence in Information Assurance and Security, 2007

A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

Problems and Prospects of Multi Application Smart cards in the UK Financial Industry.
Proceedings of ICEBE 2007, 2007

2006
On the potential of high density smart cards.
Inf. Secur. Tech. Rep., 2006

A Mutual Authentication Enabled Fair-Exchange and Anonymous E-Payment Protocol.
Proceedings of the Eighth IEEE International Conference on E-Commerce Technology (CEC 2006) / Third IEEE International Conference on Enterprise Computing, 2006

Secure Deployment of Applications to Fielded Devices and Smart Cards.
Proceedings of the Security in Information Systems, 2006

Inhibiting Card Sharing Attacks.
Proceedings of the Advances in Information and Computer Security, 2006

Design, Installation and Execution of a Security Agent for Mobile Stations.
Proceedings of the Smart Card Research and Advanced Applications, 2006

Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical Delivery.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2005
On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Countermeasures for Attacks on Satellite TV Cards using Open Receivers.
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005

2004
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards.
Proceedings of the Security and Protection in Information Processing Systems, 2004

A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography.
Proceedings of the Communications and Multimedia Security, 2004

2003
Are we smart about security?
Inf. Secur. Tech. Rep., 2003

An overview of the GlobalPlatform smart card specification.
Inf. Secur. Tech. Rep., 2003

2001
Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck?
Proceedings of the Trusted Information: The New Decade Challenge, 2001

1999
Interfacing with smartcard applications - (ThOpen Card Framework and PC/SC).
Inf. Secur. Tech. Rep., 1999

Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards.
Proceedings of the Information and Communication Security, Second International Conference, 1999

Implementing a Secure Log File Download Manager for the Java Card.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

1998
Java card technology and security.
Inf. Secur. Tech. Rep., 1998

Secure Log File Download Mechanisms for Smart Cards.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

1997
The Case for a Secure Multi-Application Smart Card Operating System.
Proceedings of the Information Security, First International Workshop, 1997


  Loading...