Thanassis Giannetsos
YOU?
Author Swipe
View article: Reinforcing Secure Live Migration through Verifiable State Management
Reinforcing Secure Live Migration through Verifiable State Management Open
Live migration of applications is a fundamental capability for enabling resilient computing in modern distributed systems. However, extending this functionality to trusted applications (TA) -- executing within Trusted Execution Environment…
View article: A PUF-based Root-of-Trust for resource-constrained IoT devices
A PUF-based Root-of-Trust for resource-constrained IoT devices Open
Ensuring cybersecurity resilience in far-edge IoT devices remains a significant challenge, as these systems often lack dedicated hardware security elements such as TPMs or secure enclaves. This paper introduces a cost-effective, SRAM PUFba…
View article: PRIVÉ: Towards Privacy-Preserving Swarm Attestation
PRIVÉ: Towards Privacy-Preserving Swarm Attestation Open
In modern large-scale systems comprising multiple heterogeneous devices, the introduction of swarm attestation schemes aims to alleviate the scalability and efficiency issues of traditional single-Prover and single-Verifier attestation. In…
View article: Human in the AI Loop via xAI and Active Learning for Visual Inspection
Human in the AI Loop via xAI and Active Learning for Visual Inspection Open
Industrial revolutions have historically disrupted manufacturing by introducing automation into production. Increasing automation reshapes the role of the human worker. Advances in robotics and artificial intelligence open new frontiers of…
View article: RETRACT: Expressive Designated Verifier Anonymous Credentials
RETRACT: Expressive Designated Verifier Anonymous Credentials Open
Anonymous credentials (ACs) are digital cryptographically-secure versions of paper and digital credentials that let us selectively prove possession of encoded attributes (claims) to verifiers such as digital services, employers, or governm…
View article: ZEKRA: Zero-Knowledge Control-Flow Attestation
ZEKRA: Zero-Knowledge Control-Flow Attestation Open
To detect runtime attacks against programs running on a remote computing platform, Control-Flow Attestation (CFA) lets a (trusted) verifier determine the legality of the program’s execution path, as recorded and reported by the remote plat…
View article: Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets
Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets Open
Recent advances in decentralized digital identity based on Verifiable Credentials utilize identity wallets to ensure that the identity data control remains with the user. However, they still lack higher Level of Assurance guarantees, restr…
View article: ZEKRA: Zero-Knowledge Control-Flow Attestation
ZEKRA: Zero-Knowledge Control-Flow Attestation Open
To detect runtime attacks against programs running on a remote computing platform, Control-Flow Attestation (CFA) lets a (trusted) verifier determine the legality of the program's execution path, as recorded and reported by the remote plat…
View article: Combining ID's, Attributes, and Policies in Hyperledger Fabric
Combining ID's, Attributes, and Policies in Hyperledger Fabric Open
This work aims to provide a more secure access control in Hyperledger Fabric blockchain by combining multiple ID’s, attributes, and policies with the components that regulate access control. The access control system currently used by Hype…
View article: Human in the AI loop via xAI and Active Learning for Visual Inspection
Human in the AI loop via xAI and Active Learning for Visual Inspection Open
Industrial revolutions have historically disrupted manufacturing by introducing automation into production. Increasing automation reshapes the role of the human worker. Advances in robotics and artificial intelligence open new frontiers of…
View article: Identity management standards: A literature review
Identity management standards: A literature review Open
Electronic identification (eID) and Identity Management (IDM) in the context of information systems is considered of crucial importance for citizen data safety, since it can authorize the proper stakeholders to access sensitive data. The p…
View article: ID-based self-encryption via Hyperledger Fabric based smart contract
ID-based self-encryption via Hyperledger Fabric based smart contract Open
This paper offers a prototype of a Hyperledger Fabric-IPFS based network architecture including a smart contract based encryption scheme that meant to improve the security of user’s data that is being uploaded to the distributed ledger. A …
View article: Information and Future Internet Security, Trust and Privacy
Information and Future Internet Security, Trust and Privacy Open
The Internet has rapidly grown into a distributed and collaborative network with over one billion users, e.g., the Internet of Things (IoT). The future Internet will become the core of the next information infrastructure in regard to compu…
View article: Human-centric artificial intelligence architecture for industry 5.0 applications
Human-centric artificial intelligence architecture for industry 5.0 applications Open
Human-centricity is the core value behind the evolution of manufacturing towards Industry 5.0. Nevertheless, there is a lack of architecture that considers safety, trustworthiness, and human-centricity at its core. Therefore, we propose an…
View article: Towards Robustifying Image Classifiers against the Perils of Adversarial Attacks on Artificial Intelligence Systems
Towards Robustifying Image Classifiers against the Perils of Adversarial Attacks on Artificial Intelligence Systems Open
Adversarial machine learning (AML) is a class of data manipulation techniques that cause alterations in the behavior of artificial intelligence (AI) systems while going unnoticed by humans. These alterations can cause serious vulnerabiliti…
View article: ID-based self-encryption via Hyperledger Fabric based smart contract
ID-based self-encryption via Hyperledger Fabric based smart contract Open
This paper offers a prototype of a Hyperledger Fabric-IPFS based network architecture including a smart contract based encryption scheme that meant to improve the security of user's data that is being uploaded to the distributed ledger. A …
View article: Combining ID's, Attributes, and Policies in Hyperledger Fabric
Combining ID's, Attributes, and Policies in Hyperledger Fabric Open
This work aims to provide a more secure access control in Hyperledger Fabric blockchain by combining multiple ID's, attributes, and policies with the components that regulate access control. The access control system currently used by Hype…
View article: Human-Centric Artificial Intelligence Architecture for Industry 5.0 Applications
Human-Centric Artificial Intelligence Architecture for Industry 5.0 Applications Open
Human-centricity is the core value behind the evolution of manufacturing towards Industry 5.0. Nevertheless, there is a lack of architecture that considers safety, trustworthiness, and human-centricity at its core. Therefore, we propose an…
View article: Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols Open
A key component in building trusted computing services is a highly secure anchor that serves as a Root-of-Trust (RoT). There are several works that conduct formal analysis on the security of such commodity RoTs (or parts of it), and also a…
View article: Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols Open
A key component in building trusted computing services is a highly secure anchor that serves as a Root-of-Trust (RoT). There are several works that conduct formal analysis on the security of such commodity RoTs (or parts of it), and also a…
View article: A Perfect Match: Deep Learning Towards Enhanced Data Trustworthiness in Crowd-Sensing Systems
A Perfect Match: Deep Learning Towards Enhanced Data Trustworthiness in Crowd-Sensing Systems Open
The advent of IoT edge devices has enabled the collection of rich datasets, as part of Mobile Crowd Sensing (MCS), which has emerged as a key enabler for a wide gamut of safety-critical applications ranging from traffic control, environmen…
View article: Towards Efficient Control-Flow Attestation with Software-Assisted Multi-level Execution Tracing
Towards Efficient Control-Flow Attestation with Software-Assisted Multi-level Execution Tracing Open
In the face of an increasing attack landscape, it is necessary to cater for efficient mechanisms to verify software and device integrity for detecting run-time modifications in nextgeneration systems-of-systems. In this context, remote att…
View article: Towards Efficient Control-Flow Attestation with Software-Assisted Multi-level Execution Tracing
Towards Efficient Control-Flow Attestation with Software-Assisted Multi-level Execution Tracing Open
In the face of an increasing attack landscape, it is necessary to cater for efficient mechanisms to verify software and device integrity for detecting run-time modifications in next generation systems-of-systems. In this context, remote at…
View article: BLINDTRUST: Oblivious Remote Attestation for Secure Service Function Chains
BLINDTRUST: Oblivious Remote Attestation for Secure Service Function Chains Open
With the rapidly evolving next-generation systems-of-systems, we face new security, resilience, and operational assurance challenges. In the face of the increasing attack landscape, it is necessary to cater to efficient mechanisms to verif…
View article: BlindTrust: Oblivious Remote Attestation for Secure Service Function Chains
BlindTrust: Oblivious Remote Attestation for Secure Service Function Chains Open
With the rapidly evolving next-generation systems- of-systems, we face new security, resilience, and operational as- surance challenges. In the face of the increasing attack landscape, it is necessary to cater to efficient mechanisms to ve…
View article: Segregating Keys from noncense: Timely Exfil of Ephemeral Keys from Embedded Systems
Segregating Keys from noncense: Timely Exfil of Ephemeral Keys from Embedded Systems Open
As lightweight embedded devices become increasingly ubiquitous and connected, they present a disturbing target for adversaries circumventing the gates of cryptography. We consider the challenge of exfiltrating and locating cryptographic ke…
View article: Segregating Keys from noncense: Timely Exfil of Ephemeral Keys from Embedded Systems
Segregating Keys from noncense: Timely Exfil of Ephemeral Keys from Embedded Systems Open
As lightweight embedded devices become increasingly ubiquitous and connected, they present a disturbing target for adversaries circumventing the gates of cryptography. We consider the challenge of exfiltrating and locating cryptographic ke…
View article: Direct anonymous attestation on the road
Direct anonymous attestation on the road Open
Vehicular networks rely on Public Key Infrastructure (PKIs) to generate long-term and short-term pseudonyms that protect vehicle’s privacy. Instead of relying on a complex and centralized ecosystem of PKI entities, a more scalable solution…