Shoker, A., ESTEVES-VERISSIMO, P., & VÖLP, M. (2023). The Path to Fault- and Intrusion-Resilient Manycore Systems on a Chip. In Proceedings - 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2023. Institute of Electrical and Electronics Engineers Inc. doi:10.1109/DSN-S58398.2023.00043 Peer reviewed |
PASCOAL, T., Decouchant, J., Boutet, A., & ESTEVES-VERISSIMO, P. (22 September 2021). DyPS: Dynamic, Private and Secure GWAS (Summary) - GenoPri'21 Talk [Paper presentation]. 8th International Workshop on Genome Privacy and Security (GenoPri'21). |
PASCOAL, T., DECOUCHANT, J., Boutet, A., & ESTEVES-VERISSIMO, P. (2021). DyPS: Dynamic, Private and Secure GWAS. Proceedings on Privacy Enhancing Technologies. doi:10.2478/popets-2021-0025 Peer Reviewed verified by ORBi |
Kozhaya, D., DECOUCHANT, J., Rahli, V., & ESTEVES-VERISSIMO, P. (2020). PISTIS: From a Word-of-Mouth to a Gentleman’s Agreement. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/44078. |
ESTEVES-VERISSIMO, P., DECOUCHANT, J., VOLP, M., ESFAHANI, A., & GRACZYK, R. (2020). PriLok:Citizen-protecting distributed epidemic tracing. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/43191. |
PINTO GOUVEIA, I., VOLP, M., & ESTEVES-VERISSIMO, P. (2020). Behind the Last Line of Defense -- Surviving SoC Faults and Intrusions. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/43197. |
CAO, T., Yu, J., DECOUCHANT, J., Luo, X., & VERISSIMO, P. (2020). Exploring the Monero Peer-to-Peer Network. In T. CAO, J. Yu, J. DECOUCHANT, X. Luo, ... P. VERISSIMO, Financial Cryptography and Data Security 2020, Sabah, 10-14 February 2020. Peer reviewed |
FERNANDES, M., DECOUCHANT, J., VOLP, M., M. Couto, F., & VERISSIMO, P. (22 October 2019). Privacy-Preserving Processing of Filtered DNA Reads [Paper presentation]. 6th International Workshop on Genome Privacy and Security. |
Natoli, C., Yu, J., Gramoli, V., & VERISSIMO, P. (2019). Deconstructing Blockchains: A Comprehensive Survey on Consensus, Membership and Structure. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/40745. |
DECOUCHANT, J., Boutet, A., Yu, J., & VERISSIMO, P. (October 2019). P3LS : Plausible Deniability for Practical Privacy-Preserving Live Streaming [Paper presentation]. 38th International Symposium on Reliable Distributed Systems (SRDS 2019). |
Yu, J., Au, M. H. A., & VERISSIMO, P. (June 2019). Re-thinking untraceability in the CryptoNote-style blockchain [Paper presentation]. IEEE Computer Security Foundations Symposium (CSF) 2019. |
FERNANDES, M., DECOUCHANT, J., VOLP, M., Couto, F., & VERISSIMO, P. (2019). DNA-SeAl: Sensitivity Levels to Optimize the Performance of Privacy-Preserving DNA Alignment. IEEE Journal of Biomedical and Health Informatics. doi:10.1109/JBHI.2019.2914952 Peer Reviewed verified by ORBi |
Kozhaya, D., DECOUCHANT, J., & VERISSIMO, P. (01 March 2019). RT-ByzCast: Byzantine-Resilient Real-Time Reliable Broadcast. IEEE Transactions on Computers, 68 (3). doi:10.1109/TC.2018.2871443 Peer Reviewed verified by ORBi |
Yu, J., Kozhaya, D., DECOUCHANT, J., & VERISSIMO, P. (2019). RepuCoin: Your Reputation is Your Power. IEEE Transactions on Computers. doi:10.1109/TC.2019.2900648 Peer Reviewed verified by ORBi |
KREUTZ, D., YU, J., Ramos, F. M. V., & VERISSIMO, P. (2019). ANCHOR: logically-centralized security for Software-Defined Networks. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/34586. doi:10.1145/3301305 |
VUKOTIC, I., RAHLI, V., & VERISSIMO, P. (2019). Asphalion: Trustworthy Shielding Against Byzantine Faults. In I. VUKOTIC, V. Rahli, ... P. VERISSIMO, Asphalion: Trustworthy Shielding Against Byzantine Faults. Peer reviewed |
Paverd, A., VOLP, M., Brasser, F., Schunter, M., N Asokan, Sadeghi, A.-R., VERISSIMO, P., Steininger, A., & Holz, T. (2019). Sustainable Security and Safety: Challenges and Opportunities. OASIcs: OpenAccess Series in Informatics, 73. doi:10.4230/OASICS.CERTS.2019.4 Peer Reviewed verified by ORBi |
KREUTZ, D., YU, J., VERISSIMO, P., Ramos, F., & Magalhaes, C. (October 2018). The KISS principle in Software-Defined Networking: a framework for secure communications. IEEE Security & Privacy Magazine, 16 (05), 60-70. doi:10.1109/MSP.2018.3761717 Peer reviewed |
Fröhlich, A. A., Scheffel, M. R., Kozhaya, D., & VERISSIMO, P. (2018). Byzantine Resilient Protocol for the IoT. IEEE Internet of Things Journal. doi:10.1109/JIOT.2018.2871157 Peer Reviewed verified by ORBi |
CAO, T., YU, J., DECOUCHANT, J., & VERISSIMO, P. (25 June 2018). Revisiting Network-Level Attacks on Blockchain Network [Paper presentation]. DSN Workshop on Byzantine Consensus and Resilient Blockchains. |
VOLP, M., & VERISSIMO, P. (2018). Intrusion-Tolerant Autonomous Driving. Proceedings of 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC). doi:10.1109/ISORC.2018.00026 Peer reviewed |
RAHLI, V., VUKOTIC, I., VOLP, M., & VERISSIMO, P. (2018). Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq. In ESOP 2018. Peer reviewed |
LAMBERT, C., FERNANDES, M., DECOUCHANT, J., & VERISSIMO, P. (2018). MaskAl: Privacy Preserving Masked Reads Alignment using Intel SGX [Paper presentation]. 37th IEEE International Symposium on Reliable Distributed Systems. |
DECOUCHANT, J., FERNANDES, M., VOLP, M., Couto, F. M., & VERISSIMO, P. (2018). Accurate filtering of privacy-sensitive information in raw genomic data. Journal of Biomedical Informatics. doi:10.1016/j.jbi.2018.04.006 Peer Reviewed verified by ORBi |
Mirto, C., Yu, J., RAHLI, V., & VERISSIMO, P. (2018). Probabilistic Formal Methods Applied to Blockchain’s Consensus Protocol [Paper presentation]. DSN Workshop on Byzantine Consensus and Resilient Blockchains. |
VOLP, M., KOZHAYA, D., & VERISSIMO, P. (December 2017). Facing the Safety-Security Gap in RTES: the Challenge of Timeliness [Paper presentation]. 2nd Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS 2017) co-located with RTSS 2017. |
CORNELIUS, G. P., HOCHGESCHWENDER, N., VOOS, H., OLIVARES MENDEZ, M. A., Caire, P., VOLP, M., & VERISSIMO, P. (2017). A Perspective of Security for Mobile Service Robots. In Iberian Robotics Conference, Seville, Spain, 2017. Peer reviewed |
VOLP, M., DECOUCHANT, J., LAMBERT, C., FERNANDES, M., & VERISSIMO, P. (October 2017). Enclave-Based Privacy-Preserving Alignment of Raw Genomic Information [Paper presentation]. SysTEX 2017. doi:10.1145/3152701.3152707 |
VOLP, M., Rocha, F., DECOUCHANT, J., YU, J., & VERISSIMO, P. (2017). Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come. In Twenty-fifth International Workshop on Security Protocols. Peer reviewed |
KREUTZ, D., VERISSIMO, P., Magalhaes, C., & Ramos, F. M. V. (2017). The KISS principle in Software-Defined Networking: An architecture for Keeping It Simple and Secure. https://orbilu.uni.lu/handle/10993/34585 |
FERNANDES, M., DECOUCHANT, J., Couto, F. M., & VERISSIMO, P. (2017). Cloud-Assisted Read Alignment and Privacy. In 11th International Conference on Practical Applications of Computational Biology & Bioinformatics 2017. Peer reviewed |
Cogo, V. V., Bessani, A., Couto, F. M., Gama-Carvalho, M., FERNANDES, M., & VERISSIMO, P. (2017). How can photo sharing inspire sharing genomes? In 11th International Conference on Practical Applications of Computational Biology & Bioinformatics 2017. Peer reviewed |
VERISSIMO, P., VOLP, M., DECOUCHANT, J., & Rocha, F. (2017). Meeting the Challenges of Critical and Extreme Dependability and Security. In Proceedings of the 22nd Pacific Rim International Symposium on Dependable Computing (pp. 92-97). Peer reviewed |
VOLP, M., Lackorzynski, A., DECOUCHANT, J., RAHLI, V., ROCHA, F., & VERISSIMO, P. (12 December 2016). Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control [Paper presentation]. 1st Workshop on System Software for Trusted Execution (SysTEX '16), Trento, Italy. doi:10.1145/3007788.3007794 |
CALDEIRA LIMA, A., ROCHA, F., VOLP, M., & VERISSIMO, P. (2016). Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems. In Proceedings of the Second ACM Workshop on Cyber-Physical Systems Security and PrivaCy. doi:10.1145/2994487.2994489 Peer reviewed |
Bessani, A., Neves, N. F., VERISSIMO, P., Wagner, D., Fonseca, A., Rui, S., Luz, P., & Correia, M. (2016). JITeR: Just-in-time application-layer routing. Computer Networks, (104), 122-136. doi:10.1016/j.comnet.2016.05.010 Peer Reviewed verified by ORBi |
VERISSIMO, P., & DECOUCHANT, J. (16 March 2016). The big data deluge in biomedicine: addressing the privacy vs. sharing dilemma [Paper presentation]. Grande Region Security and Reliability Day, Nancy, France. |
Cogo, V. V., Bessani, A., Couto, F. M., & VERISSIMO, P. (2015). A High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data. Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 101-110. doi:10.1145/2808138.2808139 Peer reviewed |
KREUTZ, D., Ramos, F. M. V., VERISSIMO, P., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2015). Software-Defined Networking: A Comprehensive Survey. Proceedings of the IEEE, 103 (1), 14-76. doi:10.1109/JPROC.2014.2371999 Peer reviewed |
Ramos, F. M. V., KREUTZ, D., & VERISSIMO, P. (2015). On the Road to the Softwarization of Networking. Cutter IT Journal, 28, 6-13. |