Circular Image

G. Smaragdakis

47 records found

Trust in network nodes

Implementation of secure communication and data storage using a post-quantum encryption algorithm and signature scheme with a blockchain environment

The development of quantum computing poses a significant threat to currently deployed cryptographic primitives. To address this challenge, we design and implement a system to communicate and store data using post-quantum secure algorithms for a distributed blockchain environment ...
Cybercrime is becoming increasingly sophisticated, creating major challenges for cybersecurity and, in particular, network forensics. Network forensics analysts play an essential role in detecting intrusions, investigating incidents, and preventing attacks through the analysis of ...
Blockchain technology has significantly impacted digital transactions and data management by providing a decentralized, transparent, and immutable ledger. Private blockchains, unlike public blockchains, are restricted to a pre-selected group of participants, making them more suit ...

Exploring Beyond the Happy Path

Practical Automated Network-Level Fault Injection Testing of Service-Oriented Distributed Systems

Organisations are increasingly adopting Microservice and Service-Oriented Architectures, moving from monolithic applications to (service-oriented) distributed systems. By their nature, distributed systems are prone to partial failures, where a subset of processes fail while other ...
The efficient rendering of scenes with many light sources remains one of the most challenging problems in real-time ray tracing. As the complexity of virtual environments continues to increase, with some scenes containing thousands of light sources, traditional Monte Carlo method ...

Fair Transaction Ordering on DAGs

Preventing MEV extraction without sacrificing practicality

Blockchain technologies enable the decentralized storage and verification of records, such as financial transactions.
Systems like Bitcoin and Ethereum see a considerable usage and have market values in the order of 10s of billions of dollars.
A recent evolution of blockc ...
Spectral Monte Carlo rendering stands as the gold standard for accurately simulating complex optical phenomena, such as fluorescence and chromatic dispersion, but typically exhibits slow convergence behavior due to challenges in sampling the wavelength domain. Convergence is even ...
Gaze estimation systems powered by deep neural networks are commonly used in sensitive applications such as driver assist or human-computer interaction. While backdoor attacks have been widely studied for classification tasks, vulnerability of regression networks like gaze estima ...

Backdoor attacks on deep regresion models

BadNet attacks on Headpose estimation models

With the rise of AI, more attacks are targeted towards AI models. Trying to gain control over the output of the model. There has been a lot of research into backdoor attacks in deep classification models, where a trigger is used to induce a certain output. However, whether deep r ...

Worldspace ReSTIR for direct illumination

Storing precomputed reservoir values with a normal-aware hashgrid

This thesis addresses the challenge of initial frame noise in real-time ray tracing when using ReSTIR. We propose and evaluate an approach that integrates a normal- aware hash grid for precomputed reservoir caching to improve direct illumination. The research investigates how res ...

Manipulating Head Pose Estimation Models

Exploring Deep Regression Models’ Vulnerability to Full Image Backdoor Attacks

Backdoor attacks manipulate the behaviour of deep neural networks through dataset poisoning, causing the models to produce specific outputs in the presence of a trigger, while behaving as expected otherwise. Although these attacks are well studied in classification tasks, their i ...

Subpixel level Pathtracing

How considering subpixels can increase the perceived resolution of a pathtracer

In this paper, we propose techniques to increase the effective resolution of a pathtracer without changing the resolution of the screen for which it is rendered. These make use of the fact that displays are made up of pixels, each of which is made up of three distinct subpixels. ...
Unit test case generation aims to help software developers test programmes. The evolutionary algorithm is one of the successful approaches for unit test case generation that evolves problem solutions over time. Previous research on seeding, the use of previously available informa ...

Backdoor Attacks in Active Learning

An Extensive Analysis of Backdoor Injection in Active Learning-Trained Computer Vision Models

Deep learning sustained great success in several domains, particularly in computer vision, where it facilitates tasks such as image classification and object recognition. However, one significant challenge in deep learning is data labeling, due to the high cost and effort require ...
In this work, we propose a general solution to address the non-IID challenges that hinder many defense methods against backdoor attacks in federated learning. Backdoor attacks involve malicious clients attempting to poison the global model. While many defense methods effectively ...

Exploring the Gorillas in the Malware Jungle

Investigating the communication and attack characteristics of the Gorilla botnet

The rise of the Internet of Things (IoT) has introduced levels of convenience never seen before, but also presents a significant cybersecurity challenge. Especially the insecure nature of many of these IoT devices fuels the emergence of advanced IoT botnets. The Gorilla botnet is ...

The Vesper Protocol

Leveraging Zero-Knowledge Proofs and SGX Enclaves in Hyperledger Fabric Smart Contracts

This work explores the feasibility of combining zero-knowledge proofs with SGX enclave protection technology, using the Hyperledger fabric, as the testing environment. The focus is on assessing the viability of this combination in real-world scenarios where post-quantum security ...
Cyber attacks have become increasingly more prominent and the associated cost to society is by several estimates reaching trillions of US dollars. A typical cyber attack goes
through the several consecutive phases of the cyber kill chain. As a precursor for any attack, the ma ...
The increasing number of malicious packages being deployed in open source package repositories like PyPI or npm prompted numerous works aiming to secure open source ecosys- tems. The increased availability and deployment of safeguards raises the question whether and how attackers ...