My scholarly work is published as “Artemios G. Voyiatzis” and spans the period 2001-2018. Some of these works are freely available here in PDF format. A more complete list is available via Google Scholar but some of the papers there are behind a paywall. Feel free to contact me in case you need any further information or clarification.
- S. Neuner, A.G. Voyiatzis, S. Fotopoulos, C. Mulliner, and E.R. Weippl. USBlock: Blocking USB-based Keypress Injection Attacks. In 32nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2018). Bergamo, Italy, July 16-18, 2018.
- S. Neuner, A.G. Voyiatzis, M. Schmiedecker, and E.R. Weippl. Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS. In International Conference on Availability, Reliability and Security (ARES 2017). Reggio Calabria, Italy, August 29 to September 1, 2017.
- A. Judmayer, J. Ullrich, G. Merzdovnik, A.G. Voyiatzis, and E. Weippl. Lightweight Address Hopping for Defending the IPv6 IoT. In International Conference on Availability, Reliability and Security (ARES 2017). Reggio Calabria, Italy, August 29 to September 1, 2017.
- Z.A. Khan, J. Ullrich, A.G. Voyiatzis, and P. Herrmann. A Trust-based Resilient Routing Mechanism for the Internet of Things. In International Conference on Availability, Reliability and Security (ARES 2017). Reggio Calabria, Italy, August 29 to September 1, 2017.
- G. Merzdovnik, D. Buhov, A.G. Voyiatzis and E. Weippl. u’smile – Secure Mobile Environments. ERCIM News, (109):53–54, April 2017.
- G. Merzdovnik, A. Judmayer, A.G. Voyiatzis, and E. Weippl. A performance assessment of network address shuffling in IoT systems (Extended Abstract). In 16th International Conference on Computer Aided Systems Theory (EUROCAST 2017). Las Palmas de Gran Canaria, Spain, February 19-24, 2017.
- F. Pirpilidis, A.G. Voyiatzis, L. Pyrgas, and P. Kitsos. An Efficient Reconfigurable Ring Oscillator for Hardware Trojan Detection. In 20th Pan-Hellenic Conference on Informatics (PCI) with International Participation (PCI 2016). Patras, Greece, November 10-12, 2016.
- D.E. Simos, R. Kuhn, A.G. Voyiatzis, and R. Kacker. Combinatorial Methods in Security Testing. IEEE Computer 49(10):80-83, 2016.
- K. Stefanidis and A.G. Voyiatzis. An HMM-based Anomaly Detection Approach for SCADA Systems. In 10th WISTP International Conference on Information Security Theory and Practice (WISTP’2016). Heraklion, Crete, Greece, September 26-27, 2016.
- M. Tornatore, J. André, P. Babarczi, T. Braun, E. Følstad, P. Heegaard, A. Hmaity, M. Furdek, L. Jorge, W. Kmiecik, C. Mas Machuca, L. Martins, C. Medeiros, F. Musumeci, A. Pašić, J. Rak, S. Simpson, R. Travanca, and A. Voyiatzis. A Survey on Network Resiliency Methodologies against Weather-based Disruptions. In 8th International Workshop on Resilient Networks Design and Modeling (RNDM 2016). Halmstad, Sweden, September 13-15, 2016.
- G. Merzdovnik, D. Buhov, A.G. Voyiatzis, and E.R. Weippl. Notary-assisted Certificate Pinning for Improved Security of Android Apps. In 5th International Workshop on Security of Mobile Applications (IWSMA 2016), in conjuction with the 11th International Conference on Availability, Reliability and Security (ARES 2016). Salzburg, Austria, August 31 – September 2, 2016. The proof-of-concept code is available on GitHub.
- P. Kitsos, K.G. Stefanidis, and A.G. Voyiatzis. TERO-based Detection of Hardware Trojans on FPGA Implementation of the AES Algorithm. In 19th EUROMICRO Conference on Digital System Design (DSD 2016). Limassol, Cyprus, August 31 – September 2, 2016.
- S. Neuner, A.G. Voyiatzis, M. Schmiedecker, S. Brunthaler, S. Katzenbeisser, and E.R. Weippl. Time is on my side: Steganography in filesystem metadata (corrigendum). In 16th Annual DFRWS Conference (DFRWS USA 2016). Seattle, WA, USA, August 7-10, 2016. Code and datasets. Accepted 19.4% without shepherding.
- D.E. Simos, K. Kleine, A.G. Voyiatzis, R. Kuhn, and R. Kacker. TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach. In 2016 IEEE International Conference on Software Quality, Reliability & Security (QRS 2016). Vienna, Austria, August 1-3, 2016.
- G. Merzdovnik, K. Falb, M. Schmiedecker, A.G. Voyiatzis, and E. Weippl. Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services (pre-print). In 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016). Trento, Italy, July 18-21, 2016.
- A.G. Voyiatzis, K.G. Stefanidis, and P. Kitsos. Efficient Triggering of Trojan Hardware Logic. In 19th IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS 2016). Kosice, Slovakia, April 20-22, 2016.
- J. Ullrich, A.G. Voyiatzis, and E.R. Weippl. Secure cyber-physical production systems: Solid steps towards realization. In 1st International Workshop on Cyber-Physical Production Systems (CPPS 2016), pages 1–4. IEEE CPS, 2016. CPS Week 2016, Vienna, Austria, April 12, 2016.
- J. Ullrich, A.G. Voyiatzis, and E.R. Weippl. The quest for privacy in consumer IoT. In 1st International Workshop on Consumers and the Internet of Things (ConsIoT 2016), pages 1–5. IEEE CPS, 2016. CPS Week 2016, Vienna, Austria, April 11, 2016.
- P. Kitsos, D.E. Simos, K.G. Stefanidis, and A.G. Voyiatzis. Malicious hardware logic detection based on combinatorial testing. Presentation in Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE 2016), DATE 2016 Friday Workshops, Dresden, Germany, March 18, 2016.
- P. Kitsos, D.E. Simos, J. Torres-Jimenez, and A.G. Voyiatzis. Exciting FPGA Cryptographic Trojans using Combinatorial Testing. In 26th IEEE International Symposium on Software Reliability Engineering (ISSRE 2015). Gaithersburg, MD, USA, November 2-5, 2015. Full paper acceptance rate 19.8%
- A.G. Voyiatzis, K. Katsigiannis, and S. Koubias. A Modbus/TCP Fuzzer for Internetworked Industrial Systems. In 20th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2015). Luxembourg, September 8-11, 2015. The fuzzer code is available on GitHub.
- A. Papalambrou, D. Karadimas, J. Gialelis, A.G. Voyiatzis. A Versatile Scalable Smart Waste-bin System based on Resource-limited Embedded Devices. In 20th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2015). Luxembourg, September 8-11, 2015.
- P. Kitsos and A.G. Voyiatzis. A Comparison of TERO and RO Timing Sensitivity for Hardware Trojan Detection Applications. In 18th EUROMICRO Conference on Digital System Design (DSD 2015). Madeira, Portugal, August 26-28, 2015.
- E. Papapetrou, V.F. Bourgos, and A.G. Voyiatzis. Privacy-preserving Routing in Delay Tolerant Networks based on Bloom Filters. In 16th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM 2015), Boston, MA, USA, June 14-17, 2015.
- L. Ioannou, H.E. Michail, and A.G. Voyiatzis. High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm. In 4th Mediterranean Conference on Embedded Computing (MECO 2015). Budva, Montenegro, June 14-18, 2015.
- G. Asimakopoulos, S. Christodoulou, A. Gizas, V. Triantafillou, G. Tsimas, J. Gialelis, A.G. Voyiatzis, D. Karadimas, and A. Papalambrou. “Architecture and Implementation Issues, Towards a Dynamic Waste Collection Management System“. In 2015 Workshop on Web Data Science meets Smart Cities – (WDS4SC’15), 24th International World Wide Web Conference (WWW 2015), Florence, Italy, May 18-22, 2015.
- P. Kitsos and A.G. Voyiatzis. “Investigating TERO for Hardware Trojan Horse Detection“. Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE 2015), DATE 2015 Friday Workshops, Grenoble, France, March 13, 2015.
- A.G. Voyiatzis and J. Gialelis. “Dynacargo: An urban solid waste collection information system“. ERCIM News, (100):50–51, January 2015.
- H. Michail, L. Ioannou, and A.G. Voyiatzis. “Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis. In Second Workshop on Cryptography and Security in Computing Systems (HiPEAC 2015 CS2 Worskhop), Amsterdam, The Netherlands, January 19-21, 2015.
- P. Kitsos and A.G. Voyiatzis. “FPGA Trojan Detection Using Length-optimized Ring Oscillators“. In 17th Euromicro Conference on Digital Systems (DSD 2014), Verona, Italy, 27-29 August, 2014.
- P. Kitsos and A.G. Voyiatzis. “Towards a Hardware Trojan Detection Methodology“. In 2nd EUROMICRO/IEEE Workshop on Embedded and Cyber-Physical Systems (ECYPS 2014), Budva, Montenegro, June 15-19, 2014.
- C.A. Fidas and A.G. Voyiatzis. “An empirical study on efficiency and effectiveness of localized vs. Latin-based CAPTCHA challenges“. In 17th Panhellenic Conference on Informatics (PCI 2013), Thessaloniki, Greece, September 19-21, 2013.
- D.N. Serpanos and A.G. Voyiatzis. “Security Challenges in Embedded Systems“. ACM Transactions on Embedded Computing Systems (TECS), Volume 12 Issue 1s, March 2013.
- A.G. Voyiatzis. “A Survey of Delay- and Disruption-Tolerant Networking Applications. Journal of Internet Engineering 5(1):331-344, 2012. Special Issue on Future Internet Architectures. (direct link).
- A.G. Voyiatzis, K.G. Stefanidis, and D.N. Serpanos. “Increasing lifetime of cryptographic keys on smartphone platforms with the controlled randomness protocol. In Proceedings of the 2011 Workshop on Embeded Systems Security (WESS ’11). Taipei, Taiwan, October 13, 2011.
- A. Papalambrou, P. Soufrilas, A.G. Voyiatzis, and D.N. Serpanos. “A secure DTN-based smart camera surveillance system. In Proceedings of the 2011 Workshop on Embedded Systems Security (WESS ’11). Taipei, Taiwan, October 13, 2011.
- C.A. Fidas, A.G. Voyiatzis, and N.M. Avouris. “On the necessity of user-friendly CAPTCHA. In Proceedings of the 2011 annual conference on Human factors in computing (CHI ’11). Vancouver, BC, Canada, May 7-12, 2011.
- C.A. Fidas, A.G. Voyiatzis, and N.M. Avouris. “When Security Meets Usability: A User-Centric Approach on a Crossroads Priority Problem“. In 14th Panhellenic Conference on Informatics (PCI 2010). Tripoli, Greece, September 10-12, 2010. (pdf © 2010 IEEE).
- M.G. Iatrou, A.G. Voyiatzis, and D.N. Serpanos. “Network Stack Optimization for Improved IPsec Performance on Linux“. In “International Conference on Security and Cryptography (SECRYPT 2009)”. Milan, Italy, July 7-10, 2009. (pdf © 2009 INSTICC Press). Full paper acceptance rate 11%.
- A.A. Antonopoulos, K.G. Stefanidis, and A.G. Voyiatzis. “Fighting Spammers with Spam“. In “9th IEEE International Symposium on Autonomous Decentralized Systems (ISADS 2009)”. Titania Hotel, Athens, Greece, March 23-25, 2009. (© 2009 IEEE).
- A.G. Voyiatzis and D.N. Serpanos. “The security of the Fiat-Shamir scheme in the presence of transient hardware faults“. ACM Transactions on Embedded Computing Systems (TECS), Volume 7 Issue 3, April 2008.
- T. Fragopoulos, A. Athanasopoulos, A. Vogiatzis, E. Topalis, J. Gialelis, and S. Koubias. “Security and DRM in Indoor/Outdoor Heterogenous Networking Applications for User-Centric Frameworks“. In “12th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2007)”. University of Patras, Patras, Greece, September 25-28, 2007. (© 2007 IEEE).
- G.C. Alexandridis, A.G. Voyiatzis, and D.N. Serpanos. “CryptoPalm: A Cryptographic Library for PalmOS“, 10th Panhellenic Conference on Informatics (PCI 2005), P. Bozanis and E.N. Houstis (Eds.), Springer-Verlag, LNCS 3746, pp. 651-660, Volos, Greece, November 11-13, 2005. (pdf © Springer-Verlag).
- D.N. Serpanos and A.G. Voyiatzis. “Increasing Symmetric Key Lifetime by Controlled Randomness“. In “10th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2005)”. Facolta’ di Ingegneria, Catania, Italy, September 19-22, 2005. (© 2005 IEEE).
- A.G. Voyiatzis. “An Introduction to Side-Channel Cryptanalysis of RSA“, ACM Crossroads 11(3), Special Issue “Cryptography”, Spring 2005.
- A.G. Voyiatzis and D.N. Serpanos. “A Fault-Injection Attack on Fiat-Shamir Cryptosystems“. In “Assurance in Distributed Systems and Networks 2004 Workshop”, during the 24th International Conference on Distributed Computing Systems (ICDCS 2004). Tokyo, Japan, March 23, 2004. (© 2004 IEEE).
- A.G. Voyiatzis and D.N. Serpanos. “Pulse: A Class of Super-Worms against Network Infrastructure“. In “Assurance in Distributed Systems and Networks 2003 Workshop”, during the 23rd International Conference on Distributed Computing Systems (ICDCS 2003). Providence, Rhode Island, USA, May 19, 2003. (© 2003 IEEE).
- D.N. Serpanos and A.G. Voyiatzis. “Secure Network Design: A Layered Approach“. In “2nd International Workshop on Autonomous Decentralized System (IWADS 2002)”. Beijing, P.R. China, November 6-7, 2002. (© 2002 IEEE).
- A.G. Voyiatzis and D.N. Serpanos. “Active Hardware Attacks and Proactive Countermeasures“. In the “Proceedings of IEEE ISCC 2002”. Taormina, Italy, July 2-4 2002. (© 2002 IEEE).
- Α. Βογιατζής και Δ. Σερπάνος. “Ανάλυση Ασφαλείας Επιπέδου Σύνδεσης Δεδομένων για Δίκτυα Τεχνολογίας Bluetooth. Στο “Διμηνιαία Έκδοση Τεχνικά Χρονικά Τ.Ε.Ε.”, 1ο Τεύχος 2005 (Ιανουάριος-Φεβρουάριος).
- A.G. Voyiatzis. “Security Analysis of Smart Card Systems“, M.Sc. thesis, University of Crete, Greece, December 2001.
- E.P. Antoniadis, A.G. Voyiatzis, D.N. Serpanos and A. Traganitis. “Software Simulation of Active Attacks on Cryptographic Systems“, Technical Report CSD-TR-2001-01, University of Crete, Greece, March 13, 2001.
The following disclaimer must be present in this page for work copyrighted by IEEE: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.