39

WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How
Page 2: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

WELCOME

Message from the Director ..................................... 04

What They Say about Us ......................................... 06

OUR RESEARCH

Autonomous Vehicles .............................................. 10

Cybersecurity ............................................................ 16

Fintech ........................................................................ 23

Internet of Things ...................................................... 27

Secure and Compliant Data Management ........... 29

Space Resources ...................................................... 32

TECHNOLOGY TRANSFER

Our Partners .............................................................. 36

Partnership Program ................................................ 38

Boosting the Innovation Ecosystem ...................... 39

ABOUT US

Organisation .............................................................. 42

Financial Data ............................................................ 43

Leadership ................................................................. 44

Events ......................................................................... 46

People ......................................................................... 48

Awards ....................................................................... 50

OUR OUTPUT

Projects ...................................................................... 54

Publications ............................................................... 66

Table of contents

03

Page 3: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

MESSAGE FROM THE DIRECTOR

2018 was a year in which we pushed the boundaries, in

every sense of the word. Our researchers not only trod new

scientific ground but also expanded into new industry sectors and countries.

Expanding the scientific frontier is an international endeavour where we team up with top researchers in Europe and beyond. Our presence in the highly competitive EU scientific programmes continues to grow, with 14 new H2020 and European Space Agency projects acquired — a record for SnT. This will double our research activity funded by Euro-pean sources in 2019. And as all eyes turn towards Horizon Europe (FP9), our place at the table for three of the four EU Cybersecurity Competence Networks being launched puts SnT — the only organisation in Europe to achieve such representation — at the heart of global security efforts.

Beyond Europe, in 2018 we welcomed new international partnerships — including QRA, Canada-based developers of systems and require-ments engineering technology — and our first grant from a US research funding agency (ONRG). These are clear signs of the value companies see in tapping into our expertise.

Closer to home, we welcomed nine new partners, beginning collabo-rations in two new sectors, with our first legal and insurance firms, Linklaters and Foyer. Together with our partners we continue to develop Luxembourg’s reputation as an exciting hub for technology driven service innovation.

At the heart of our activities, as with any knowledge organisation, is people. Our success lies in attracting and retaining talented, dedicated, and highly motivated individuals committed to SnT and Luxembourg in a competitive market. SnT researchers have now accumulated over 100 prestigious best paper and individual awards. Together with our third ERC Advanced Grant, awarded to Prof. Dr. Jean-Sébastien Coron, these show that we continue to rise to the challenge we set ourselves: bridging the worlds of cutting edge long-term and demand-driven research.

In pushing the boundaries in 2018, we’ve raised the bar for ourselves in 2019, our 10th anniversary year. Join us on social media to keep track of our celebrations.

Prof. Dr. Björn OtterstenDirector, Interdisciplinary Centre for Security, Reliability and Trust

0504 back to table of contents

Page 4: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

I spent over four years at SnT, and no matter where I work I will always miss my time there. I was honoured to work alongside inspiring researchers such as Prof. Lionel Briand and Dr. Domenico Bianculli. Problem solving is a big part of my work in industry, and it relies heavily upon the skills I learned at SnT, such as scientific thinking, research, and communication skills, as well as a strong sense of determination and persistence.

IEE puts a big emphasis on staying ahead of the curve in software development techniques. This is especially true in our main domain – sensing solutions for automotive applications. So we were excited to get the opportunity to work with Prof. Lionel Briand and his team. One early project focused on automating testing from use case specifications. This helped us cut costs, improve our release quality, and reduce our time to market. The collaboration’s ongoing success led us to hire one of their PhDs, who now leads the creation of new methods and tools to increase our development and management team’s quality and efficiency.

My first and lasting impression of SnT is the diverse skill sets it brings together – I made a lot of friends from different backgrounds from whom I learned a lot. This cultural and technical diversity is good for fostering collaboration and also crucial for identifying novel problems and challenges. I collaborated with talented students and researchers on a variety of computer vision problems, some theoretical, others highly motivated by practical problems. Such a broad exposure is an enabling experience for pursuing a range of carrier paths.

At SMC, a part of our job is covering new technologies and thinking about their benefits for the public. SnT always helps us discover new possibilities, and also to bring them to life. If SnT is working on a new technology, I want to know all about it, because it’ll be a technology that will be here for good!

My time at SnT presented me with the unique opportunity to work with people from around the world, broadening my horizons and helping me to think outside the box. This creative environment was the right place to meet the people with whom I would go on to create SnT spin-off DataThings. Our company exploits the research ideas and technologies that we worked on during our time at the Centre.

Throughout the long relationship between SES and SnT, we’ve collaborated on several major projects. One that sticks out was the development of an automated open source tool to translate satellite control procedures from multiple vendors into a common language. Being able to process them in this way has proved to be of critical importance to us. At SES we have many such areas of interest we would like to explore and eventually exploit, but as we’re not an R&D institution, a close relationship with SnT is essential to doing so effectively.

THOMAS HARTMANNCO-FOUNDER & HEAD OF SOFTWARE ENGINEERING, DATATHINGS

MARTIN HALLIWELLCTO, SES

GIRUM DEMISSEVISITING RESEARCHER, FACEBOOK INC.

What they say about us

DOU WEISOFTWARE ENGINEER, TALKWALKERTHIERRY STEPHANY

CENTRAL R&D, IEE S.A.

MAX GINDTATTACHÉ, MINISTÈRE D’ETAT – SERVICE DES MÉDIAS ET DE LA COMMUNICATION

0606 07

Welcome Welcome

back to table of contents

Page 5: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

OUR RESEARCH

Our scientists conduct research with impact. Whether they are pushing the

boundaries of scientific knowledge or tackling clearly defined problems with

industry partners, their work is rooted in a thorough understanding of societal

and industrial challenges. The result: solutions that are applicable, scalable

and provide a genuine long-term competitive advantage for companies in

Luxembourg and beyond.

Our work aligns with areas of strategic importance for Luxembourg:

AUTONOMOUS VEHICLES

Smart Drones for all Seasons ................................................................... 10

Collective Intelligence Helps Drones Rise above Adversity ............... 12

Bringing 5G to Europe’s Roads ................................................................. 13

The 360Lab: a Vehicle for Collaboration ................................................. 14

Patents on the Radar for Automotive Applications............................... 15

CYBERSECURITY

How to Stop Ransomware in its Tracks? Take Away its Tools ............ 16

SnT at Heart of EU Cybersecurity Push .................................................. 17

It Wasn’t Me: Deniability in a Post-Quantum World ............................. 18

Law and Technology: How to Police the Privacy Beat ......................... 19

Saving Lives at the Sharp End of Software Engineering...................... 20

This Californian Life: Software Solutions in Silicon Valley .................. 22

FINTECH

How to Catch 42,000 Smart Contract Vulnerabilities .....................................23

Building Privacy into the Blockchain ................................................................24

Your AI Advisor: Wealth Management in the 21st Century .........................24

Securing Banks against Digital Heists .............................................................25

Setting the Standard for Requirements Engineers ........................................26

INTERNET OF THINGS

Print Scheduling Solution Cures Mass Customisation Headache ............27

3D Tech for Stroke Survivors ...............................................................................28

SECURE AND COMPLIANT DATA MANAGEMENT

Digital Medical Systems: Who’s Accessing Your Data? ..............................29

Fast but Secure Processing for Your DNA .......................................................30

SPACE RESOURCES

Satellite Pre-coding Clears Congested Airwaves ................................. 32

Christof Ferreira Torres and Mathis Steichen research blockchain topics.

08 09back to table of contents

Page 6: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

On a windy, rainy day last autumn, Dr. Miguel Olivares-Mendez and his colleagues Dr. Jose Luis Sanchez-Lopez, Manuel Castillo-Lopez and Maciej Zurad headed to a bridge over a road just outside of Luxembourg City. Having successfully completed field tests of their airplane inspection drone the week before at Luxembourg Airport, they were ready to explo-re new challenges and applications for their autonomous technology. This time, they were there to assist a team from the University of Luxembourg’s Physics and Materials Science Research Unit conduct a bridge inspection.

While the rain came down, the drones flew more than 30 autonomous flights around the bridge. They inspected the bridge while it was free from vehicles, again with six loaded trucks on it, and a third time after the trucks were removed. Using a variety of sensors including high-resolution RGB (which shows colours true to the human eye) and LiDAR (which produces a 3D model), they gathered the data needed to search for signs that the bridge had sustained deflection.

Any technology is most useful when it is dependable, simple and unobtrusive. And with the rain pouring down, that was exactly what Miguel’s drones were able to provide. The drones worked with one another perfectly, automatically matching their flight paths and communicating with one another to accom-plish this shared mission. The materials scien-tists, meanwhile, could focus on their own part of the job — interpreting the data.

This unobtrusive dependability will make Olivares-Mendez‘s smart, goal-driven drones a good fit for an ever-widening range of applications: from art historians examining a UNESCO monument for preservation purposes, to forest management teams deciding when to close a trail, to film crews who need to repli-cate a particular shot with precision. “What we do here is make things that really work, in real-world conditions,” says Olivares-Mendez with a smile. “And that includes wind and rain.”

Dr. Dario Cazzato, Dr. Miguel Olivares Mendez, Dr. Jose Luis Sanchez-Lopez

Smart Drones for all Seasons“What we do here is make things that really work, in real-world conditions,” says Olivares-Mendez with a smile. “And that includes wind and rain.”

10 11back to table of contents10 11

ResearchResearch

Page 7: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

Bringing 5G to Europe’s Roads

Dr. Ion Turcanu

It has happened to all of us: on New Year’s Eve shortly after midnight, we pick up our mobile phones and try to call or write a loved one. And then, nothing. The network is too crowded and we start the new year offline. Crowds, data-guzzling apps, and an ever increasing number of connected devices keep pushing modern cellular networks to the limit. While the consequences of an overcrowded network can be irksome, and even downright inconvenient, the stakes are about to rise significantly as automotive companies develop increasingly connected cars.

Connected cars promise to be safer, to reduce traffic, and to be more fuel efficient. They’ll do this by communicating constantly with one another and their environments, sending mes-sages warning of slowdowns, informing one another of the need to form a rescue lane on the highway, or moving in coordinated platoons to reduce wind resistance. But the foundation of all this communication needs to be more robust and dependable than the networks we live with today. Connected cars need to

communicate without delays, without dropped messages, and without service holes.

What connected cars need is 5G — the next generation of mobile connectivity — and Dr. Ion Turcanu and his colleagues at SnT are laying the foundations for just that. They have teamed up with more than 50 partners within the H2020 5G-MOBIX and 5G-DRIVE projects to test potential use cases for 5G in connected cars. Results from trials across Europe, China and Korea, will then contribute to the standar-disation of the global 5G network.

Turcanu explains that “connected cars will use a heterogeneous network to communicate with each other.” This means that the car will switch between different communication methods according to current conditions — their speed, weather, location, etc.. For example, in a remo-te region that might mean communicating via satellite, while in dense urban traffic, Bluetooth or a modified form of short-range WiFi might be more appropriate.

This ability to switch seamlessly between communication technologies will ensure that important messages arrive in real-time and that no information gets dropped.Ion and his fellow researchers are developing technologies and requirements that not only meet the already obvious needs of connected cars in the near future but that also anticipate potential future needs, leaving room for even more innovation.

Collective Intelligence Helps Drones Rise above Adversity

photo by Phoenixns/Shutterstock.com

Without any central organising mechanism, or indeed any direct communication, ants can outperform computers at scouting an area. Using nothing but passive pheromones to communicate, ants are, in fact, so efficient that Prof. Dr. Pascal Bouvry and Dr. Grégoire Danoy have made them the algorithmic model behind their autonomous drones.

Like the ants, these drones explore independ-ently while automatically informing the swarm of their path. Together they can quickly — al-most instinctively — determine whether an area has been completely explored or whether a given path is efficient. But while insects rely on pheromones, the drones use peer-to-peer communication. The algorithms behind this process don’t rely on consensus or a leader. Rather, through a mechanism analogous to how prices emerge in a free market, individual decisions affect the whole group, without the need for explicit plans or directions.

The great advantage this approach has over its insect role model is that it enables collective intelligence not only within a single swarm but also across multiple swarms. Excitingly, it even opens up the possibility of cooperation between different “species” of drones with different capabilities — working on land, water and in the air.

Multi-swarms, unlike choreographed fleet formations, are resilient in complicated, even adversarial conditions. The loss of any individu-al drone would not cripple the rest of the mul-ti-swarm because the remaining drones would seamlessly adapt. This makes multi-swarms ideal for use, for example, on the heels of natu-ral disasters, where time is of the essence and drones are likely to fall foul of hazards such as falling trees, debris and bad weather. Using a multi-swarm for search-and-rescue operations following a hurricane, earthquake, or tsunami could therefore help responders find victims faster, saving lives.

While ants have been swarming on earth for 92 million years, the multi-swarm drone model is now just entering its proof-of-concept phase. With funding from an FNR Jump Grant and a two-million euro investment in the hardware muscle needed for the high-performance com-puting that powers the algorithms behind the drones, Bouvry and Danoy look forward to pus-hing their multi-swarms to the limit. “Right now we are finding a balance between maximising the area covered and ensuring connectivity,” says Bouvry, “but I am personally most looking forward to multi-species cooperation.”

12 13back to table of contents12 13

ResearchResearch

Page 8: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

Patents on the Radar for Automotive ApplicationsIn 1904, the German patent office awarded the first patent for radar technology. It took forty years and two World Wars, however, before radar was adopted for submarines, ships, and airplanes. And it is only now that radar is finally being incorporated into automobiles for situational awareness.

Radar still has someway to go before it will be adopted as an automotive standard. First, it must be adapted for interference (irrelevant radio waves from other cars equipped with radar) and clutter (irrelevant objects). Then, radar needs to fit into the restricted space and power limitations of cars. Finally, automotive radar operates at a much closer range than aviation and marine radar.

At SnT, Dr. Bhavani Shankar and his team are working hard to meet these challenges. Their close cooperation with leading sensor manu-facturer IEE to develop new automotive radar systems has resulted in no fewer than five patents in the last two years. And this steady output shows no sign of slowing down. “Once radar is standard in cars, we might for example be able to use it to send short emergency mes-sages,” says Shankar as he reflects on future developments.

In the short-term, automotive radar needs to be made affordable, reliable, and robust. It also needs to detect a wider range of objects more reliably. For example, without an adequate sys-tem for coping with clutter, a building or a truck

will send back a stronger signal than a pede-strian or cyclist — leaving the most vulnerable road users undetected.

This is where the team’s adaptation of Multiple Input-Multiple Output, or MIMO, radar excels. By placing sensors at different locations on the car and programming specific patterns in how they transmit, the MIMO radar can detect the objects that matter most, more reliably. It is a solution for the car of tomorrow, already making us safer today.

The 360Lab— A VEHICLE FOR COLLABORATION

“I see myself as an entrepreneur in research,” Dr. Raphaël Frank explains, sat in front of a colorful display of visual data collected by the newly built heart of SnT’s 360Lab: a self- driving car.

“We finished the car in mid-2018 and next we will be building a simulation of it,” Frank con-tinues, outlining the development of the new lab. The simulation will drive the thousands of virtual kilometres required to build a robust dataset before the real car can undertake longer driving trials on public roads.With industry giants such as IEE, Delphi and CEBI based in Luxembourg, there is a growing need for local graduates with a background in automated driving. So beyond testing the self-driving car — the first of its kind in

Luxembourg — Frank looks forward to using the 360Lab to introduce a younger generation to the new field of smart mobility. In 2019, for example, master’s level computer science workshops will provide graduates with the opportunity to explore data from and appli- cations for the lab’s state-of-the-art car.

“We also hope to work with academics from the social sciences,” Frank explains. “For example, collaborating with psychologists to study driver emotional responses, or with lawyers to examine liability issues when it comes to autonomous vehicles.”

Even closer to home, the lab will continue to help researchers at SnT to broaden their horizons, working with colleagues from across

disciplines and backgrounds to develop secure solutions for smart mobility.

Reflecting on his motivation for founding the 360Lab, Frank emphasises that his job is to “bring people together and motivate them to organise.” The goal is to maximise the potential of SnT’s talented researchers, through connec-tion and collaboration. It is the embodiment of the interdisciplinary model at SnT.

Dr. Georgios Varisteas, Dr. Amin Sajadi, Dr. Raphaël Frank,

Dr. Radu State, François Robinet

14 15back to table of contents14 15

ResearchResearch

Page 9: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

How to Stop Ransomware in its Tracks? — TAKE AWAY ITS TOOLS

Right around the time that the WannaCry ran-somware began to wreak havoc globally, SnT’s Ziya Alper Genç, had a big idea. “It became my obsession,” says Genç. “I had this idea that I just couldn’t let go.” What Genç dreamt up was a method for preventing ransomware from encrypting files in the first place — a method that would make ransomware viruses like WannaCry harmless.

Ransomware gets onto our devices the same way all malware does — through infected emails, downloads, or unprotected internet connections. Once on a device, the malware’s first step is to produce the cryptographic tools used by the ransomware to encrypt valuable documents on the computer. Once locked, only the hackers can prompt the malware to decrypt them.

What Genç saw is — at first glance — simple: if the ransomware cannot find its cryptographic tools in the first place, then it cannot encrypt.

“We create basically a whitelist of the pro-grams that are allowed to ask for such tools and then just deny programs not on the list. So ransomware would be denied access to the instruments they need to lock your computer.” By cutting off ransomware‘s ability to do its job, the encryption process, you render modern ransomware effectively impotent.

Up to now, there have been just three levels of malware protection. Users can regularly backup their data, anti-malware programs can analyse program behaviour, or anti-malware programs can analyse a program file’s unique signature. Genç’s innovative approach is an additional fourth level of malware protection, a potential game-changer in the anti-mal-ware business. With the support of an FNR Pathfinder grant, Genç has already tested his research’s marketability — the first step to bring a new product to market. Having gathered extensive evidence that his idea works under real-world conditions and against

actual ransomware, in 2019 he will follow up with another FNR grant, this time to develop a proof-of-concept.

“Anticipating the evolution of ransomware is a must, not a luxury,” adds Dr. Gabriele Lenzini, Genç’s thesis supervisor. So while we will all soon be a little more secure, the fight will go on. But it is comforting to know that by the time the world is again gripped with panic at the next round of hacks, researchers such as Genç will almost certainly have another big idea that they just can’t let go.

Ziya Alper Genç, Dr. Gabriele Lenzini

SnT at Heart of EU Cybersecurity Push“I was always an interdisciplinary guy,” begins Prof. Dr. Paulo Esteves-Veríssimo, FNR PEARL Chair. “Electrical engineers, computer scientists and data scientists... they all have promising contributions to make to common problems. The same with dependability and se-curity — it is always a two-way street, where we learn from each other.” Esteves-Veríssimo’s team has been applying this interdisciplinary perspective to develop trustworthy cutting-edge technologies, from computer multi-cores to biomedical data analy-sis systems. They build software that is not only dependable (which is to say, safe from acci-dental malfunctions), but also secure (resistant to intentional hacks). “The systems we use today are complex, and that creates vulnerabilities. All too often,

even with a robust system, all it takes is one defect and the whole system is done. What we do is investigate innovative algorithms and mechanisms we can apply to make systems tolerate faults and intrusions in an automatic way.” And they do this from both perspecti-ves: dependability, and security. “Our critical information infrastructures need to endure and adapt, regardless of whether the problem is an accidental malfunction or a malicious attack. We call it resilience, and it needs to be built into our digital infrastructure.” Since 2016, the team has brought this unique perspective to the agenda of the European Cyber Security Organisation (ECSO), a Pub-lic-Private Partnership aimed at developing the digital infrastructure for a secure Europe. And beginning in 2019, they will continue this work as part of the H2020 initiative of Cybersecurity

Competence Networks, where SnT won highly competitive seats in three of the four networks — the only organisation in Europe to do so. With cybersecurity set to be high on the agen-da for Horizon Europe, the successor to H2020, SnT is thus extremely well positioned to shape the development of the field. Each Cybersecurity Competence Network brings together some 40 partners from across Europe, with a total initial financing of around 65 million Euros. These networks will improve the cybersecurity of the entire Digital Single Market, ensuring European-wide security for critical industries such as healthcare, energy, finance, transportation, and public administra-tion. It is an ambitious push to begin bridging the safety-security gap, ensuring that our vital infrastructures have the capacity to recover, come what may, accidents or attacks.

photo by artjazz/Shutterstock.com16 17back to table of contents16 17

ResearchResearch

Page 10: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

LAW AND TECHNOLOGY:

How to Police the Privacy Beat

“Most websites and web services, including Google‘s, don‘t change their behaviour when they receive a Do Not Track request. Chrome doesn‘t provide details of which websites and web services respect Do Not Track requests and how websites interpret them.“ That’s how Google Chrome concludes the FAQ page on its Do Not Track privacy feature. In the box below that, you’ll find the instructions for activating the setting, just in case you still care.

The “Do Not Track” experiment, begun in 2009, is a voluntary system to allow users to request websites not to collect data on their online activities. Although most browsers offer the feature, the scheme ultimately fell apart. It was never backed with the force of law and for many websites and third-party trackers, the advantages of collecting user data far outweig-hed the benefits of complying with polite “Do Not Track” requests.

The irresistible lure of collecting increasingly invasive user data has led the European Union to pass a regulation with teeth: the General

Data Protection Regulation (GDPR). This has made clear that privacy violations are a crime, just like any other. But it also presents a new problem: we now need to develop new methods and standards for policing this brand new beat in the world of cybercrime. That’s how SnT’s Dr. Marharyta Aleksandrova and Dr. Stefan Schiffner got involved with the H2020-funded SAINT project — an internatio-nal task-force quantifying the economic cost of cybercrimes. They are developing the unders-tanding and the tools we need to enforce the new law.

Aleksandrova’s research, concluded in 2018, focused on protecting TOR users — such as journalists, whistleblowers and dissidents — who depend on strong anonymity while online. While TOR masks a user’s identity, a third party could take advantage of the differences between website metadata to launch a “finger-printing” attack, undermining TOR’s promised anonymity. To empower users, Aleksandrova has developed a tool that grades websites ba-sed on their susceptibility to this vulnerability.

This easy-to-understand privacy score will let users decide if they really want to proceed to any particular website.

Schiffner’s research, on the other hand, is more abstract. He has been working to develop a common framework for concepts outlined in the GDPR, such as “anonymity”, “confidentiali-ty”, and “privacy”, but which aren’t yet well de-fined; because before we can police violations, we need clear metrics with which to measure them. Laying the groundwork for this, Schiffner has combed through existing privacy research to map concepts and distill definitions. His aim is to formalise the existing expertise in the field of privacy research so that we can determine, for example, what really counts as the “state of the art” protections required by the GDPR. And then, finally, we might be able to really start holding corporations to account.

Dr. Marharyta Aleksandrova, Dr. Stefan Schiffner, Wladimir de la Cadena RamosDr. Peter Roenne, Dr. Dimiter Ostrev

IT WASN’T ME:

Deniability in a Post-Quantum WorldThe quantum supremacy — the point at which quantum computers will begin to outperform traditional computers — is just around the corner. Quantum supercomputers will be able to execute ultra-complex calculations so fast, it will leave our laptops looking like abaci and their processing power will drive dramatic advances in fields such as pharmaceutical, AI research, and much, much more. But when the quantum supremacy comes, one of the first changes it will bring will be to the field of cryptography. Because quantum computing will break it.

The threat to modern cryptography is a threat to everything for which we use cryptography, from securing national, critical infrastructures to our individual privacy. In anticipation of the

looming quantum shift, researchers around the world are already working on post-quantum cryptography — including SnT’s own Dr. Peter Roenne.

Dr. Roenne and the quantum team are explor- ing options for preserving our privacy in a post-quantum future when attackers might have access to quantum computers. To do this, they are researching how today’s technologies might be used to ensure deniability, the proper-ty that enables the original author, receiver, and content of the message all to remain uncertain, so everyone involved can plausibly claim, “it wasn’t me.”

Building deniability into computer security is an insurance policy against hacks and leaks,

ensuring messages can’t be pinned on you even if the unthinkable happens and somehow your encryption is broken. One way the team has been able to achieve this is by hiding mes-sages in the noise that is inherent in quantum communication itself.

Their strategy, called ‘covert communication’, can help ensure that your communication remains safe even after quantum computers change our technological realities. So, by the time quantum computing is accessible, we will have the tools we need to stay one step ahead of the next challenge to our digital privacy.

18 19back to table of contents18 19

ResearchResearch

Page 11: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

Saving Lives at the Sharp End of Software

EngineeringWhile a “blue screen of death” on our desktop can ruin a day,

that sort of a failure in an autopilot could ruin a life.

According to the last major study in IT project failures, conducted by McKinsey and the University of Oxford, half of all large IT projects “massively blow” their budgets. These large projects (defined as IT projects starting out with a budget of over $15 million) on average exceed their budgets by about 45%. In fact, the 5,400 IT projects studied had a collective cost overrun of $ 66 billion – more than the GDP of Luxembourg. In many cases, the report suggests, these failures boil down to a lack of focus and clarity. In other words, they boil down to inadequate requirements. And while the prospect of inade-quate requirements leading to project overruns is one thing, the prospect of them resulting in software defects that could cause deaths is quite another. This is the reality faced by software engineers working in the field of cyber-physical systems, where complex software is deeply intertwined with a physical system in order to perform a vital function. From travelling in airplanes equipped with autopilot, to depending on the

anti-lock braking system in our cars, we rely almost every day on these complex, intelligent technologies. The safety of the people interacting with cyber-physical systems often depends on the embedded software working reliably. Because while a “blue screen of death” on our desktop computers can ruin a day, that sort of a failure in an autopilot could ruin lives. But SnT’s Dr. Sallam Abualhaija and Dr. Shiva Nejati are giving software engineers the tools to make our increasingly cyber-physical world safer. Dr. Abualhaija is developing a tool for ex-amining software requirements documents written for cyber-physical systems. Her tool lets project managers, software engineers, and government regulators alike comb soft-ware requirements documents to check for ambiguity, vagueness, and inconsistencies. What makes her tool particularly useful is that it seeks out only legally binding requirements. This means that stakeholders don’t get bog-ged down by supplementary information, for example regarding preferred design choices,

as they move through the requirements writing process. This lets all the parties really focus on what matters most. Dr. Nejati and her team, meanwhile, are building a technology that takes a completed requirements document and turns it into a math- ematical representation. By translating English sentences into logical equations, defects in the system can be spotted systematically. With cyber-physical systems, the software can then be checked to ensure it respects all of the systems’ physical limitations as well. Their projects, conducted in collaboration with Canada-based QRA Corp., a company specia-lising in the development of enterprise tools for software quality assurance, will help make the cyber-physical systems we interact with every day a whole lot safer.

DR. SALLAM ABUALHAIJA

Working with QRA helps us

to see beyond the research

horizon, all the way to appli-

cation. It’s like a compass

that orientates our research

efforts towards the problems

their customers and engineers

have to deal with. It’s fun!

20 21back to table of contents20 21

ResearchResearch

Page 12: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

How to Catch 42,000 Smart Contract Vulnerabilities“In some ways with Blockchain it is like we went 30 years back in time,” explains doctoral researcher Christof Ferreira Torres. “Lessons from 30 years ago ought to apply to blockchain programming, but people have moved so fast they didn’t think of it.” Remember, for example, the panic around the turn of the millennium? Because storage was expensive, computers were only programmed to work with the last two digits of the date, e.g. “99” instead of “1999”. Computers then needed to be updated en masse to ensure that on 1 January 2000 they wouldn’t believe we had time traveled back to 1900.

Jump forward 19 years to today’s Ethereum blockchain system. Its primary programming language, Solidity, suffers from a similar error. It has failed to account for “integer over-flows” — incidents where the number of digits the computer can store is not adequate for representing the true sum. Within Ethereum’s smart contract ecosystem, this is a potentially dire problem. A malicious actor could exploit

an integer overflow to leave an account empty. That would be as simple as sending a target account the exact number of coins needed to “overflow” their balance back to “(1)0000”. The other direction is, however, also possible; a malicious actor could subtract a coin from their empty account, leaving themselves with “9999” coins after the “(1)0000” counter is wound back by one.

Today, most computer programming langua-ges have built-in guard rails against integer overflow and underflow. And indeed, the next generation of Ethereum’s programming language — Vyper — will too. But the develop-ment of that language is still ongoing and some programmers might prefer to stick with Solidity anyway. Moreover, the contracts already deployed in Solidity will, by the very nature of the blockchain, continue to exist forever.

This is where Torres can help. Working with in-dustry partner Banque et Caisse d‘Épargne de l‘État, he has developed a tool that works with

Solidity — the most widely used programming language on the Ethereum blockchain — to check for integer over and underflows. It does this by producing a control flow graph of the program, and when the tool detects a problem it can follow it back along its branch to its source. This allows Solidity programmers — and those inheriting or acquiring older contracts — to deal with errors in their coding much more efficiently.

The program has, in fact, already found 42,000 contracts with integer over- and underflow bugs — in one case even identifying a poten-tial $30,000 error. “We were floored when we found that,” says Torres, beaming. “It really highlights what a big impact our tool could have in the real world.”

Christof Ferreira TorresProf. Dr. Yves Le Traon

THIS CALIFORNIAN LIFE:

Software Solutions in Silicon Valley

Decompress. Focus your attention. Expand your perspective. That, Prof. Dr. Yves Le Traon explains, is the aim while on sabbatical. While at the University of California, Berkeley, howe-ver, Le Traon did one more thing: he connected.

“I had the opportunity to work not only with Prof. Koushik Sen at UC Berkeley, but also to go to Google and PayPal at least once every week.” Working so closely with industry means keeping your research relevant. “We can work on real solutions for real problems,” says Le Traon. At both Google and PayPal, Le Traon discussed methods for testing code and hunting for bugs in both of their continuous integration processes. The two companies, Le Traon explains, are so different that while you can take inspiration from one project to the other, they need specific solutions.

Google’s Test Automation Process (TAP) ensures that any updates to their vast software do not contain bugs or break existing software

functionality. But the process of deciding which software tests to run and when to run them needs optimisation. On top of that, Google needs to understand which tests aren’t work- ing reliably and why — a problem known in software engineering as “flakiness”. Together with Google, Le Traon hopes to develop machi-ne-learning algorithms that will ultimately help engineers select just the best tests to run.

His time at PayPal was different. “PayPal has a different software architecture and therefore different problems.” Like Google, PayPal needs to guarantee the reliability of their software. But while PayPal’s flexible service-oriented architecture is less diverse than Google‘s, the potential configurations are more complicated. On top of this, at PayPal software incidents lead to crisis situations that have to be mana-ged urgently. Their engineers need to be able to locate the root cause of an incident, the buggy code, very quickly. Add in the huge flow of real-time data and the task resembles a race

to find a needle in a haystack. The collabora-tion with PayPal focuses, therefore, not only on bug prevention done through improvements in the continuous integration process, similar to Google’s, but also on rapid incident response. In the coming year, Le Traon will recruit a team of researchers, including two PhD students, to investigate this two-pronged project.

Le Traon describes his research as “mul-ti-core.” It is an interdisciplinary model that insists on exploring diverse real-world con-texts. But the common denominator is always people: “Humans are gifted at creating a mess. The challenge in software quality is, therefore, to cope with human nature. That’s what I like about working in software engineering. There is never perfect certitude in software testing, there is always a human element. Therefore, you can never fully formalise or automate it, because you have to face the imaginative way humans tend to err.”

22 23back to table of contents22 23

ResearchResearch

Page 13: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

In 2011, shortly after a new no-frills budget bank was founded in the UK, the CEO found himself in an unexpected situation. Customers were pouring in, but not just for no-cost checking accounts. Hundreds of high-net-worth individuals were leaving prestigious private banks to free themselves from unhelpful advice.

The heart of private banking has always been personalised customer service. But times are changing and private banking must too. SnT’s Ans-human Bhadauria has built his PhD research around bringing the custo-mer service ethos of traditional private banking into the 21st century.

In collaboration with BGL BNP Paribas, he is developing a tool that will use existing market conditions to suggest relevant products, advise on courses of action and even warn about risk in a portfolio. But this isn’t a recommendation engine like you might know from Amazon. That’s be-cause in finance, the products themselves are not static, and customer preference is influenced just as much by external economic and political factors as by previous customer choices or profile. Bhadauria’s algo-rithms, he explains, therefore look at customer portfolios “as if they were texts and use natural language processing to then identify how other investors have invested their own portfolios based on external contextual input, like stock-market conditions.” The system therefore takes into ac-count the historical actions of an investor as well as the market situation at the time of those actions to learn their preferences and needs. “Another thing that is great about our system is that ‘fairness’ is built in,” says Anne Goujon, project supervisor and Director of BGL BNP Paribas’s Data Science Lab. “Because we look only at the contents of the portfolio and the situation in markets, we make suggestions without considering customer demographic profile.” Which is good news because in the end our needs are all a lot more alike than we sometimes realise, and we all deserve the best possible decision-making support in our financial lives.

Your AI Advisor: Wealth Management in the 21st Century

Securing Banks against Digital HeistsOn 20 January 2018, two computer scientists

boarded a propeller plane in Wisconsin with an air-gapped laptop, a Geiger counter, and some radioactive material from Chernobyl. They were just one small part of what the developers of Zcash call “the ceremony” — an elaborate procedure to produce a completely random and secret cryptographic key. This key is the backbone of Zcash cryptocurrency, which promises to provide the same functionality as Bitcoin but with significantly improved privacy.

The thing is: despite the elaborate ceremony, even Zcash fails to live up to its promise of privacy. “Cryptocurrencies look anonymous, but they are not,” explains doctoral researcher Sergei Tikhomirov. That’s because the very way transactions occur on their networks can provide a savvy observer with potentially identifying information.

Which isn’t to say that cryptocurrencies cannot ever fulfill their promise of anonymity for all. Rather, as Tikhomirov points out, achieving anonymity is a “gradual process” that needs to be built into technological foundations.

So Tikhomirov, with funding first through a Zcash Foundation Grant award and an FNR Grant, spends many of his days working as a white-hat hacker. He searches for ways to exploit information on the blockchain at the network level (for example: how, where, and when a transaction is conducted). He is on the lookout for patterns in blockchain network traffic that would allow him to unmask users, many of whom believe their transactions are totally anonymous.

Once he has found a vulnerability, he suggests countermeasures at the level of the “wallet”

and the end user, leading to better privacy in blockchain transactions. But he also makes suggestions to improve the foundations of the blockchain system (called the “core”), mov- ing the entire system closer to offering true anonymity.

Someday, when blockchain-powered curren-cies are more seamlessly incorporated into our everyday lives, Tikhomirov’s work will help make privacy a real option. “Solutions like the GDPR apply old frameworks to new problems,” points out Tikhomirov. Rather, by building privacy into the technological foundations of the blockchain, maybe we can all look forward to a future where we can make genuinely empowered choices about retaining or waving our anonymity.

On the evening of 10 July 2016, two men made their way through typhoon rain to an ATM in Taipei. After the men loitered for a few minutes, the machines began to spit out cash. Hundreds of euros worth in cash. Quickly, the men picked the money up, stuffed it into a bag, and took off. They were two of fifteen “money mules” completing the final step in one of the Carba-nak gang’s high-tech bank heists.

So forget Ocean’s Eleven. Forget Bonnie and Clyde. Today’s most successful bank robbers work with software code, not a pick lock. And to protect themselves, banks rely on security requirements engineers to draw up the digital equivalent of super-secure bank vaults.These engineers determine the who, where, and how of data accessibility. They need to make sure that hackers cannot access their internal systems to inflate bank balances, transfer money or take control of ATMs. Before a security requirements engineer’s job is done, they have considered hundreds of different

parameters and developed a holistic security strategy.

And yet, the process is highly individual. Two engineers might do the same job in slightly dif-ferent ways. Often even a very capable securi-ty requirements engineer might not be able to explain why an existing system is like it is — it seems almost impossible to reverse-engineer the logic behind a set of security requirements. But Dr. Mehrdad Sabetzadeh and his colleagu-es have begun to change that. Together with their partners at BGL BNP Paribas, they are building a tool that provides automated decisi-on support for specifying security requirements from beginning to end. The aim: to standardise and streamline the security requirements engineering process.

The resulting standardisation will not only make it easier for new team members to understand the security concerns and build upon the existing groundwork more quickly. It will also

help ensure that security decisions are applied consistently across whole organisations.All of this is achieved in three broad stages. The tool will first help to define the existing se-curity architecture and indicate what features are desirable according to its logic. Second, using machine learning, it will identify com-plementary techniques and recommend how to implement them. Finally, it will use natural language processing to extract information from related textual sources, identifying further relevant security measures.

The project is an example of modern artifi-cial intelligence applied to an ultra-complex application environment — made possible by BGL BNP Paribas Bank, who granted unpre-cedented access to their expert security team. It is a unique partnership that has enabled computer-supported security assessment at a level previously unseen in research.

Building Privacy into the Blockchain

Seifeddine Bettaieb, Dr. Seung Yeob Shin, Dr. Mehrdad Sabetzadeh

Anne Goujon, Anshuman Bhadauria

24 25back to table of contents24 25

ResearchResearch

Page 14: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

Setting the Standard for Requirements EngineersThe first step towards good software is good communication. Requirements engineers, who work at the earliest stage of software develop-ment, work closely with clients to develop ‘what’ software should do before it is passed on to developers to work out the ‘how’. Like archi-tects creating blueprints before construction, requirements engineers create outlines that software developers then turn into the code.

While architects, however, have universal stan-dards for blueprints — nobody, afterall, wants to get feet and metres confused — require-ments engineers do not. Most requirements engineering processes are bespoke. On top of this, business-oriented clients and compu-ter-science-oriented software professionals can miscommunicate, making the requirements writing process even more complicated. When all is done, there is a good chance that some requirements may end up being unclear, incomplete, or even contradictory. Errors in requirements engineering have a

ripple effect on the software development process. These errors can make multiple, un-planned project iterations necessary and result in significant headaches. This ultimately puts projects in danger of being over budget, below expectations, or even completely abandoned. But what if requirements could be made more consistent? More complete? What if there were a “blueprints” standard that requirements analysts could follow?

This is what SnT researchers in the field of software verification and validation, including Dr. Mauricio Alferez, Alvaro Veizaga, Dr. Mike Sabetzadeh and Prof. Dr. Lionel Briand are working to achieve. Together with financial firm Clearstream and IT coaching company, Escent, they are putting together a tool that guides requirements engineers through the process of developing and testing software requirements for the financial and insurance sectors. This will help identify unclear text, contradictory requirements, and inefficient workflows.

Their tool will employ artificial intelligence techniques to derive a model of how the envi-sioned software will work. This model provides an ideal mechanism for uncovering potential errors and omissions through such means as automated testing. The resulting technologies can be used from the very beginning of the requirements gathering and documentation process to guide requirements engineers in consistently following best practices and planning for later software verification and validation activities.

By ensuring that requirements are complete, clear and verifiable before they are handed down to software developers, the whole development process can be streamlined — and latent problems in the software can be fixed early so software turns out as correct and complete as possible the first time around.

Print Scheduling Solution Cures Mass Customisation Headache

We increasingly choose to print only our most important documents — documents that we hope will stand out, like colourful posters; that have a strong emotional significance, like wedd- ing invitations; or that mark major personal achievements, like thesis dissertations. That’s because paper can break through electronic distractions and hold someone’s full attention. Indeed, as it turns out, the digital revolution has not meant the death of paper — but it has meant the rise of custom printing.

Commercial printing factories remain competi-tive in the age of email by creating offers with varying degrees of customisation, order-fulfill-ment speed, and product quality. We can have our save-the-dates printed in two days’ time at bargain prices or stunning brochures guaran-teed by the morning of a big meeting.

But even without the extra complications that these bespoke offers have introduced to printing factories, the scheduling optimisation

problems faced by commercial printing ope-rations are massive. Different printing orders require different processing workflows, and complex custom orders might need to run through half-a-dozen machines or more before they are completed. How can an industry that is already so complicated handle the added complexity of mass-market customisation?

As Prof. Dr. Holger Voos explains, while “prin-ting production planning works well when it is formalised as an abstract numerical problem, managers have found that these abstract models just don’t work well with the actual chaos on the ground.” With some factories turning to conventional forms of more-or-less manual scheduling, the industry needed a tool that could handle high volumes of orders and execute remodelling. And they needed it soon, because, as Voos continues, “a perfect solution is not helpful if it comes too late. What printing factories needed was a very good solution, fast.”

They needed an algorithm that was, well, more down-to-earth. So that’s just what Voos and his team at SnT have built for them. Unlike some other approaches, their algorithm reasons based on practical constraints that can be adjusted to reflect the actual situation on the factory floor. It can accept changes in priorities, such as the arrival of rush orders, or even a shift in emphasis from quality to cost minimisation. Once adjusted, it performs a rapid search for an optimised workflow. It is the flexible tool printing factories need to execute the mass customisation of products. Working in close cooperation with their partners at Rogler — a developer of print ma-nagement solutions — Voos and his team have developed an algorithmic solution so flexible that it can be applied broadly to other industries in need of a flexible solution for mass-market customisation. It is a high-tech solution with its feet on the ground.

Standing, from left to right: Benoit Cardinael, Dr. Mauricio Alferez, Jean-Richard Riccardi, Alvaro Veizaga, Sabina RohackovaSitting, from left to right: Elene Pitskhelauri, Thomas Henin, Dr. Mehrdad Sabetzadeh

26 27back to table of contents26 27

ResearchResearch

Page 15: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

DIGITAL MEDICAL SYSTEMS:

Who’s Accessing Your Data?

Dr. Dayana Spagnuelo

3D Tech for Stroke SurvivorsWalking into the 4th floor conference room at SnT, I was expecting to see something big and unusual. I was on my way to participate in a trial of 3D motion detection and body repre-sentation for a piece of software that promises to improve the recovery process for stroke patients in Europe. But opening the door, all I saw was a small black box like a DVD player and a big screen monitor; it all seemed rather ordinary.

The fact that the hardware setup for the STARR project’s software is so economical is part of its brilliance. Through the H2020 STARR project (short for Decision SupporT and self-mAnage-ment system for stRoke survivoRs), SnT is developing a home-support system for stroke patients and their doctors. It provides real-time feedback as the patient performs physical therapy exercises in the comfort of their home, and it gives doctors the data they need to ensu-re that their patients keep making progress.

It isn’t just the equipment that resembles a video game. What patients see on the screen

is reminiscent of a game too: a stick person mirrors their movements, moving as they move, with limbs turning green, yellow, and red. This cartoon avatar tells patients if they are perfor-ming their exercises correctly; lean too far to one side and the spine turns yellow. Bend over and the spine turns red.

What is especially innovative about this system is that the “ideal” motion the patient should perform is not only measured against a physical therapist’s example; at the start of their program, patients perform their physical therapy exercises with the unaffected side of their body. Their own dexterity is then taken as the baseline that they are working to achieve with the affected side. This process is powered by the team’s movement optimisation feedback algorithm. “That has been the main building block” says Dr. Djamila Aouada, the project leader.

Beyond guiding patients in their exercises, the setup ensures patient safety. Should the patient fall down or deviate wildly from their

regular motion, their doctor or therapist can be notified immediately. They can check in on patients personally or even send an ambulance to address the situation.

“The whole process is always driven by the patients first and foremost. That’s what is really important to us in this project,” says Dr. Aoua-da. Take the posture feedback, for example: “That was something patients explicitly wan-ted, so we made it happen. And in the end, we turned that work into an award-winning paper.” It is a human-centred approach to academic excellence in computer science.

Dr. Enjie Ghorbel, Dr. Abd El Rahman Shabayek, Renato Baptista, Dr. Djamila Aouada

In June of 2018 security researchers disco-vered that the American marketing company Exactis had inadvertently leaked the private information of over 218 million people. Not only was the data leak massive, but for the vast majority of people, the first time they heard of Exactis was when they found out the company had leaked their personal information to the world.

Data breaches increasingly affect people who had no idea that the company in question ever had their data. This is because data is often passed along channels that we as consumers — who pay for the services we love with our data — are not made aware of. While this sort of surprise is bad enough when just your email address is leaked, what if it were part of your health records? Your pregnancy result? HIV status? Prescription records?

While digitalising medical records can be a tool to empower patients, it is essential that

patients understand (and ultimately control) who then gets to access that data. Even with this transparent handling of data, as required by the new European GDPR law, we might not be able to exclude the possibility of accidents, but we can preclude the possibility of unplea-sant surprises.

But what exactly counts as “transparent” anyway? Is the usual fine print, supposedly defining what data is being collected, why and by whom, good enough? While researchers have been examining standards of data privacy (including concepts of transparency) for years, they have not all been using a common vocabulary, let alone a common framework. And that’s where doctoral candidate Dayana Spagnuelo comes in.

In her research — conducted under the super-vision of Dr. Gabriele Lenzini and in collaborati-on with researchers in Luxembourg, Brazil, and Portugal — she examined the various ways

transparency has been defined and assessed. She also clarified the building blocks of trans-parency, such as the availability, portability, and readability of information, the verifiability of a system, and the auditability of privacy policy compliance.

Using her definition of transparency and outline of its building blocks, Spagnuelo developed a checklist of requirements that developers can reference when creating transparent-by- design digital medical systems. She also developed metrics by which they can evaluate transparency in existing systems. This means that we can look forward to a future where we know exactly where, how and by whom our medical data is processed. While we might never have control over all contingencies, we can expect fewer surprises and will be able to hold the individuals and corporations who do have our most valuable data to account.

28 29back to table of contents28 29

ResearchResearch

Page 16: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

Fast but Secure Processing

for Your DNABecause sequencing your genome should empower you as an individual, our researchers are putting control over the

data where it belongs — in your hands.

Humans have much more in common with one another than we sometimes imagine. Indeed, only 3% of DNA is unique to a person, while the balance is shared with the rest of humanity. But that 3% is powerful. It determines eye color, height, and bone structure. It can make you smarter and healthier than your neighbours. Or it could give you a tendency to put on weight, an inability to digest lactose, or a predisposition to developing a number of life-threatening diseases. As our understanding of the genome develops, medicine is searching for treat-ment options guided by the patient’s genetic makeup. Already companies sell kits to map your genome in the comfort of your own home, using equipment smaller than a loaf of bread. Other “mail-order” services map your genome in the lab.

To date, the process has focused on complete, accurate results. But an important question remains: what happens to those results? Who controls the data? How should it be stored? These privacy and security driven questions have hardly been considered. As researcher Dr. Jérémie Decouchant puts it, “I would like

info on my DNA, but I, as a computer scientist, don’t trust the stakeholders or their computing infrastructures.” There is, after all, no data more sensitive than that 3% of your genome. That’s why Decouchant and doctoral resear-cher Maria Fernandes have developed a new methodology for human genome analysis that keeps 10% of the information produced truly secure. 90% of the genome can be processed as usual — it is, after all, information that is common to all humans. The remaining 10% (including that discriminating 3%) can then be processed either locally or in a secure enclave in the cloud. This system has the important advantage of leaving private data in the own- er’s control, and crucially, it is only marginally slower than the standard way of processing the human genome.

With this control, you decide who gets to see your data and when. You could take any infor-mation that might be relevant to a nutritionist, for example, with you to your appointment and would not have to reveal unrelated details. And you could ensure that insurance companies,

hospitals or even employers cannot use your data to make decisions about your premium, eligibility or treatment options.

Because sequencing your genome should empower you as an individual, Decouchant and Fernandes are putting control over the data where it belongs — in your hands. And having filed a patent last year and recently launched a Proof of Concept funded by FNR, they are looking forward to taking their work another step nearer to application. So consider waiting just a bit longer before you get your genome sequenced. A better approach is just a short way off.

Maria Fernandes, Dr. Jérémie Decouchant

30 31back to table of contents 31

Research

30

Research

Page 17: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

Satellite Pre-coding Clears Congested Airwaves

These precise alterations, called “pre-coding”, are calculated based on interference informa-tion received along with test signals already being sent for synchronisation purposes. Moreover, this pre-coding does not require any alterations to existing satellites — it can be accomplished with simple processing power upgrades at the earthbound transmitter.

Pre-coding transmissions in this way allows multiple transmissions to be sent simultaneous-ly on the same frequency. The end effect for frequencies is like that of the skyscraper for land: you can layer multiple transmissions on

top of each other. Just as skyscrapers have elevators with buttons to reach the floor you need, these layered transmissions arrive with the keys needed to clean up the signal to focus on any given one. This means telecoms can make significantly better use of their allocated frequencies.

Together with SES and Airbus, and with funding from the European Space Agency, SnT’s LiveSatPreDem project is implemen-ting the theoretical framework produced by SERENADE. So perhaps very soon we can expect a significant improvement in the quality

of Internet on airplanes, boats and in remote regions — or more prosaically, as Dr. Nicola Maturo, researcher on the LiveSat project said with a smile, “with these data-capacity impro-vements, before long we will be able to receive a lot more channels on Ultra-HD satellite TV.”

“Buy land, they’re not making any more of it.” Mark Twain’s famous advice was probably sound for the generation that came after him. But then, things changed. While land remains a finite resource, the way we use it would hardly be recognisable to Twain. We work and live, for example, in buildings hundreds of metres taller than anything he could have imagined. Yes, physical space remains finite. It is the way we relate to that space and use it that has changed dramatically.

Like land, the radio frequency spectrum, including the frequencies used for satellite communications, is also a finite resource. And each year, the demands we put on it have been increasing; telecommunications companies have been preparing for a coming frequency crunch. But thanks to SnT’s SERENADE project, they might not need to look quite as far to find the satellite bandwidth they need — because the way they utilise frequencies they already have is about to change.

Up to now, telecoms have had to minimise interference by leaving dedicated buffer frequencies empty and then sending only one signal on a frequency at a time. Last year, however, the FNR-funded project SERENADE, led by Dr. Symeon Chatzinotas with Dr. Juan Carlos Merlano Duncan, developed a method of altering wavelengths to cancel out the anticipated inference, leaving simultaneous messages crystal clear.

Access the Internet wherever and whenever you need to, whether in a plane or out at sea

Dr. Jorge Querol Borras, Dr. Nicola Maturo, Dr. Juan Merlano Duncan

32 33back to table of contents32 33

ResearchResearch

33

Page 18: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

TECHNOLOGY TRANSFERSnT has a broad range of vehicles for ensuring that we play a central role in Luxembourg’s innovation ecosystem. Whether we are putting our researchers in direct contact with industry through our Partnership Program and business network, or encouraging entrepreneurial activity all the way through from patenting to spin-offs, we ensure that our research has socio-economic impact.

Jacek Plucinski and Jose Soares bridge the gap between research and industry.

34 35back to table of contents

Page 19: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

SnT Partners 2018In 2018 SnT’s Partnership Program counted 43 industry and public partners. In addition to collaborating on projects with our research partners, we also foster communication and knowledge sharing between the key players in Luxembourg’s innovation ecosystem with our networking partners.

In 2018, nine new partners joined the SnT Partnership Program. Meet the latest companies to join the program:

Cebi is a global developer and manufacturer of electromechanical components for the automotive and household appliance industries. SnT resear-chers will work with Cebi Luxembourg S. A. to make Industry 4.0 a reality at their flagship factory in Luxembourg.

Foyer S.A is a leading player in Luxembourg in the local life and non-life insurance market, with activities in several European countries through insurance, benefit protection insurance and wealth management. In two projects, SnT will work on data analytics for personalised insurance, and risk assessments based on driving data fused from multiple sources while maintaining user privacy.

Linklaters is a leading global law firm, supporting clients in achieving their strategies wherever they do business. This project will help organisations come to terms with the implications of the new GDPR regulation by converting the legal texts into an intuitive and machine-analysable format, opening the way for computer-assisted compliance analysis.

VNX Exchange is a marketplace and trading platform for tokenised venture capital assets, aiming to unlock liquidity for the venture capital industry. Through this partnership, SnT researchers will design new IT frameworks facilitating the secure exchange of digital assets on blockchain networks.

Huawei is a leading global provider of ICT infrastructure and smart devices. In this project, SnT researchers will develop automated tools for testing Android smartphone updates, replacing the painstaking manual process of identifying “regression faults” in Android OS updates.

The LHoFT Foundation is a public-private sector incubator initiative that drives technology innovation for Luxembourg’s financial services industry, connecting the domestic and international Fintech community to develop solutions that shape the world of tomorrow. This networking partnership will enable SnT researchers to interact with the start-ups and institutions making use of the Fintech innovation hub.

RESEARCH PARTNERS

NETWORKING PARTNERS

36 37back to table of contents36 37

Technology Transfer Technology Transfer

Page 20: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

Partnership ProgramPublic and private organisations collaborate with SnT to open up new possibilities using cutting-edge concepts in computer science and ICT. Guided by a partner’s domain knowledge, SnT researchers bring their expertise to bear on specific industry pain points, from the need to improve efficiency in software testing to challenges in making smart manufacturing a reality.

Boosting the Innovation Ecosystem

OUR SPIN-OFFS

SPOTLIGHT ON MOTION-S2018 was a landmark year for SnT spin-off Motion-S, which closed its first round of investment with one million euros from FEBIAC, the federation of automotive manufacturers and importers in Belgium and Luxembourg.

Motion-S collects, augments and analyses mobility data for the insuran-ce market. The spin-off will now take the next step in its journey, expan-ding its data services to encompass the full range of modern mobility, from car sharing to fleet management and predictive maintenance.

> www.motion-s.com

A STRONG NETWORKInnovations don’t make it all the way from discovery to commercialisa-tion by chance – the transition requires a robust network of players from across the research and innovation ecosystem.

To make this network a reality, SnT works closely with government, trade offices, SMEs, large corporates, and entrepreneurs and investors, orga-nising events and other platforms to share knowledge (see all events on pages 46-47).

In 2018, SnT was delighted to launch a new collaboration with The Luxembourg House of Financial Technology (LhoFT), bringing our re- searchers into daily contact with the firms and institutions making use of Luxembourg’s Fintech incubator.

PATENTED

1. Acquiring Ideas 2. Lab Development 3. Market Research & Validation

5. Minimum Viable Product 4. IP Protection6. Business Model7. License Agreement8. Spin-off

Research and Development Stage

Proof of Concept StageTransfer Stage

CULTIVATING ENTREPRENEURSHIPOur researchers are encouraged to be entrepreneurs. Regular training sessions on IP commercialisation together with ideation camps at the University of Luxembourg Incubator help them to develop the skills they need to build a business from an idea.

On the practical side, IP experts are always on-hand to help researchers navigate the winding road from research results and invention disclosures through to proof of concepts and spin-offs.

WHY COLLABORATE WITH SNT?This combination of scientific excellence and domain knowledge results in technological solutions that are applicable and scalable in real contexts, providing a long-lasting competitive advantage for companies in Luxembourg and beyond.

MORE PRECISELY, PARTNERS BENEFIT FROM:

• Joint research results and Intellectual Property (IP) commercialisation rights

• Leveraging of public research funding

• Scientific knowledge and research excellence

• Access to research equipment

• Highly specialised talent for future hiring needs

• IP management expertise

• Networking across Luxembourg’s innovation ecosystem

HOW DOES A PARTNERSHIP WORK?The Partnership Program provides an attractive form of collaboration with SnT. Project costs are split 50/50, and the Program leverages European and national public research funding.

SnT and the partner define a three-to-four-year project, addressing a specific industry challenge and targeting results of long-term scientific value

SnT recruits an Industrial PhD candidate for the project. S/he will conduct applied research within a team of experienced SnT scientists

A steering committee monitors and evaluates the project, ensuring that activities remain in line with project goals

Experts in Intellectual Property at SnT work with the partner to identify and protect re-search results with potential commercial value

A KEY PART OF OUR RESEARCH MODELOur scientists are inspired by the challenge of conducting academic research in the face of industry realities. These collaborations provide a different perspective, allowing them to tackle well-defined problems within well-understood domains. The results? IP for licensing and com-mercialisation, and award-winning papers and theses.

DATATHINGS

1

2

3

4

Jacek Plucinski, Isabelle Chesnay, Dr. Marc Lemmer and Jose Soares work on technology transfer and partnership development.

38 39back to table of contents38 39

Technology Transfer Technology Transfer

Page 21: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

ABOUT USThe University of Luxembourg launched its Interdisciplinary Centre for Security,

Reliability and Trust (SnT) in 2009. SnT has a two-fold approach focusing on both

collaborative demand-driven research and high-risk, long-term research projects.

The Centre brings 290 staff, from some 40 nationalities, together in Luxembourg.

Nine research groups with complementary expertise tackle the biggest problems

facing industry and society in Luxembourg and beyond.

Serket Quintanar Guzman and Anush Manukyan conduct research in automation and robotics. SnT is strategically located on Kirchberg (pictured here) and in Belval.

40 414140 back to table of contents

Page 22: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

OrganisationThe SnT Advisory Board advises the President of the University of Luxem-bourg on the Centre’s activities. The SnT Director, supported by the Management Board (see pages 44–45), is responsible for the day-to-day management of the Centre.

Facts and Figures

Location and Labs

2018 SNT EXPENSES (IN KEUR)2018 SNT CONSUMED INCOME (IN KEUR)

SNT 2014–2018 CONSUMED INCOME PER SOURCE (IN KEUR)

For me, SnT is one of the strongest arguments for Luxembourg’s achievements in terms of research excellence. The list of inter- national players that have chosen SnT as a research institute is truly impressive and because of SnT, I can tell our international partners:

“Yes, we have innovation in Luxembourg, we’re even a technology exporter!”

ANNE-CATHERINE RIESPREMIER CONSEILLER DE DIRECTION,

MINISTÈRE DES COMMUNICATIONS ET DES MÉDIAS, LE GOUVERNEMENT DU

GRAND-DUCHÉ DU LUXEMBOURG

0UL Partners EU/ESA FNR Other

2018

2014

2015

2016

20171,000

2,000

3,000

4,000

5,000

6,000

7,000

8,000

398 (2 %)

6,919 (33 %)

7,586 (37 %)

UL

Partners

EU/ESA

FNR

Other

2,092 (10 %)

3,808 (18 %)

SnT is strategically located on two sites – one in the centre of Luxembourg’s Kirchberg financial district and one on the University’s vibrant Belval Campus.

When SnT researchers are refining their work for real-world application, they can test and vali-date their ideas on state of the art hardware and software in SnT’s laboratory infrastructure. To date, we count some 10 labs that offer unique environments for work relating to computer vision, satellite communications, autonomous driving, aerial robotics, server networks, cybersecurity and safety and Artificial Intelligence.

CENTRE ADVISORY BOARD*

Stéphane Pallage, Chairman President, University of Luxembourg

Erica Monfardini Director of Administration, University of Luxembourg

Anne-Catherine Ries Premier Conseiller de direction, Ministère des Communications et des Médias, Le Gouvernement du Grand-Duché du Luxembourg

Pierre Zimmer Chief Information Officer, POST

Ruy Pinto Chief Technology Officer, SES

*as of 15.02.2019

SNT MANAGEMENT BOARD

1,931 (9 %)

629 (3 %)

875 (4%)

1,042 (5 %)

385 (2 %)

1,101 (6 %)

14,604 (70%)

Manpower expenses

Sub-contracting

Investments

Travel

Repres. & Registr.

Operating exp.

In-Kind contributions

42 43back to table of contents42 43

About us About us

Page 23: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

LeadershipSnT’s Management Board consists of internationally renowned experts from across the ICT landscape. We provide them with a platform to do research that matters.

Under their leadership, computer scientists at SnT conduct outstanding research driven by industry needs, collaborate on interdisciplinary solutions to complex problems, and nurture the next generation of specialists in ICT.

PROF. DR. BJÖRN OTTERSTEN, SNT DIRECTORSIGNAL PROCESSING AND COMMUNICATIONS RESEARCH GROUP (SIGCOM)

SIGCOM focusses on signal processing in wireless communications, radar and computer vision. Applications range from satellite systems to vehicular sensors and 3D body modelling.

PROF. DR. LIONEL BRIAND, SNT VICE-DIRECTORSOFTWARE VERIFICATION AND VALIDATION RESEARCH GROUP (SVV)

SVV develops novel and effective techniques to ensure that software systems are reliable, safe, secure, and compli-ant. Their work heavily relies on artificial intelligence and is done in collaboration with partners in domains such as satellite, automotive, finance, public service, and legal.

PROF. DR. ALEX BIRYUKOVCRYPTOLUX RESEARCH GROUP

CryptoLux strives for a greater understanding of how cryptosystems get broken in the real world, how they can be de-signed and implemented to better resist attacks, and how they should be used to build secure systems and networks.

PROF. DR. THOMAS ENGELNETWORKING RESEARCH GROUP (NETLAB)

NetLab works on privacy by distribution, network and system security, Supervisory Control and Data Acquisition and cybersecurity, IoT, vehicular communication and multimodal traffic management, and wireless networks and mobile security.

PROF. DR. PAULO ESTEVES-VERÍSSIMOCRITICAL AND EXTREME SECURITY AND DEPENDABILITY RESEARCH GROUP (CRITIX)

CritiX investigates methods and architectures to ensure systems resilience in an automated way, keeping them safe, secure and operational even in the face of unexpected threats, like when compromised by highly skilled and well equipped hacker attacks. Such systems include autonomous driving, e-health, blockchains, or powergrids.

PROF. DR. YVES LE TRAONSECURITY, REASONING AND VALIDATION RESEARCH GROUP (SERVAL)

SerVal focusses on three areas: testing, debugging and repair techniques; mobile security and reliability using static code analysis and machine learning; and model-driven engineering with a focus on analytics and artificial intelligen-ce. They work on applications ranging from automated Android app debugging to IoT data analytics with decision making capabilities.

PROF. DR. PETER Y. A. RYANAPPLIED SECURITY AND INFORMATION ASSURANCE RESEARCH GROUP (APSIA)

APSIA specialises in the mathematical foundations of cybersecurity and the design and modelling of security proto-cols (classical and quantum). Applications range from electronic voting systems to privacy enhancing technologies. The group also performs interdisciplinary research in cybersecurity, with close collaborations with social sciences, physics and law.

DR. RADU STATESERVICE AND DATA MANAGEMENT IN DISTRIBUTED SYSTEMS RESEARCH GROUP (SEDAN)

SEDAN works on blockchain, cloud computing, and data analytics, developing new architectures, algorithms and approaches for dealing with ever-increasing volumes of data. Applications range from blockchain infrastructures for KYC and digital trading to analysis and visualisation of big data for public utilities.

PROF. DR. HOLGER VOOSAUTOMATION AND ROBOTICS RESEARCH GROUP

Automation and Robotics investigates approaches to perception, control, adaptation and learning for networked autonomous cars, service robots, drones and space robots. In large-scale distributed systems it works on novel distributed estimation, control and optimisation algorithms.

Operations

ISABELLE CHESNAYADMINISTRATION

As Head of Office, Isabelle Chesnay guarantees the efficient support of SnT’s researchers from an administrative perspective, while also complying with University policies and procedures.

DR. MARC LEMMERTECHNOLOGY TRANSFER

Marc Lemmer’s team shapes the Centre’s interaction with industry, enables IP commercialisation and fosters entre-preneurship throughout the country and at international level.

44 45back to table of contents44 45

About us About us

Page 24: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

EventsDISTINGUISHED LECTURESProf. Stephen Boyd (Stanford University, USA): Convex Optimisation, July 2018Prof. Bryan Ford (Swiss Federal Institute of Technology in Lausanne, Switzerland): Coins, Clubs, and Crowds: Scaling and Decentralisation in Next-Generation Blockchains and Cryptocurrencies, December 2018Prof. Francois Coallier (École de technologie supérieure, Canada): Engineering Challenges in IoT based Systems, December 2018

SCIENTIFIC EVENTSFlysec Proof of Concept at lux-Airport by Aurel Machalek, February 2018SatNEx IV Summer School 2018 by Dr. Bhavani Shankar, Dr. Symeon Chatzinotas and Prof. Dr. Björn Ottersten. In collaboration with SES, May 2018International Conference on Dependable Systems and Networks (DSN 2018) by Prof. Dr. Paulo Esteves-Veríssimo, June 201874th Meeting of IFIP Working Group 10.4 by Prof. Dr. Paulo Esteves-Veríssimo, June 2018ATENA H2020 Workshop by Dr. Florian Adamsky, October 2018

SnT hosted 27 Research Seminars during 2018.

BUSINESSGDPR Roundtable Session 1: Legal Solutions: How to Accommodate the GDPR Challenges in Your IT Contracts by Dr. Andra Giurgiu. In collaboration with Stibbe and FDEF, December 2017GDPR Roundtable Session 2: Big Data Projects: How to Draft Efficient and Pragmatic Privacy Policies? by Dr. Andra Giurgiu. In collaboration with Stibbe and FDEF, January 2018GDPR Roundtable Session 3: Help Me, I’m Hacked – Incident Management and GDPR Governance by Dr. Andra Giurgiu. In collaboration with Stibbe and FDEF, February 2018GDPR Roundtable Session 4: International Data Transfers by Dr. Andra Giurgiu. In collaboration with Stibbe and FDEF, March 2018

Data Centres, GPUs and Machine Learning. In collaboration with Digital Luxembourg, March 2018GDPR Roundtable Session 5: GDPR and New Technologies by Dr. Andra Giurgiu. In collaboration with Stibbe and FDEF, April 20187th SnT Partnership Day, June 2018VNX Partnership Launch Event, November 2018

SnT hosted 11 Meetups during 2018, welcoming professionals from Data Science Luxembourg and JavaScript Luxembourg.

TRAININGSA New Awareness of the GDPR By Dr. Sandine Munoz and Christian Hutter, March 2018Turning Your Research into a Proof-Of-Concept Proposal Worth Funding by Dr. Jeff Skinner, October 2018

PUBLICShapify 3D Scanning at Belle Étoile by Dr. Djamila Aouada, August 2018Aerial Robotics Lab Open House by Dr. Miguel A. Olivares-Mendez. Part of European Robotics Week 2018, November 2018FNR Researchers’ Days, November 2018

SPOTLIGHT ON: GDPR ROUNDTABLE SERIESThe European General Data Protection Regulation (GDPR) came into play on 25 May 2018. In the lead up, professionals from across industries were struggling to come to terms with its implications. SnT legal expert, Dr. Andra Giurgiu took the opportunity to lead the discussion in a popular series of five monthly GDPR roundtables. Stakeholders and experts gathered to tackle subjects ranging from IT contracts and privacy policies for big data projects to applying the law to new disruptive technologies.

The Shapify team at Belle EtoileFrances May Lintag (VNX) and Alex Panican (LHoFT) moderating the VNX partnership launch event

GDPR Roundtable Debates Marc Hansen and their Royal Highnesses Princess Stéphanie and Prince Guillaume attending Partnership Day 2018

46 47back to table of contents46 47

About us About us

Page 25: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

Heads of SnT research groups

• OTTERSTEN, Björn, Prof. Dr., Director• BRIAND, Lionel, Prof. Dr., Vice-Director• BIRYUKOV, Alex, Prof. Dr.• ENGEL, Thomas, Prof. Dr.• LE TRAON, Yves, Prof. Dr.• RYAN, Peter, Prof. Dr.• STATE, Radu, Dr.• VERÍSSIMO, Paulo, Prof. Dr.• VOOS, Holger, Prof. Dr.

Affiliated Faculty• BOUVRY, Pascal, Prof. Dr.• COLE, Mark, Prof. Dr.• CORON Jean-Sebastien, Prof. Dr.• HILGER, Jean• HOFMANN, Mahulena, Prof. Dr.• KELSEN, Pierre, Prof. Dr.• LEPREVOST, Franck, Prof. Dr.• MARTIN, Romain, Prof. Dr.• MAUW, Sjouke, Prof. Dr.• MAX, Charles, Prof. Dr.• VAN DER TORRE, Leon, Prof. Dr.• VITI, Francesco, Prof. Dr.

Senior Research Scientists• CHATZINOTAS Symeon, Dr.• KLEIN, Jacques, Dr.• LENZINI, Gabriele, Dr.• NEJATI, Shiva, Dr.• SABETZADEH, Mehrdad, Dr.

Research Scientists• AOUADA, Djamila, Dr.• BIANCULLI, Domenico, Dr.• BISSYANDÉ, Tegawendé F., Dr.• FRANK, Raphael, Dr.• LAGUNAS, Eva, Dr.• MYSORE R.R., Bhavani Shankar, Dr.• OLIVARES-MENDEZ, Miguel Ángel, Dr• PANCHENKO, Andriy, Dr.• PANG, Jun, Dr.• PAPADAKIS, Michail, Dr.• PASTORE, Fabrizio, Dr.• SHARMA, Shree Krishma, Dr.• VÖLP, Marcus, Dr.

Research Associates• ABUALHAIJA, Sallam, Dr.• ADAMSKY, Florian, Dr.• ALAEEKERAHROODI, Mohammad, Dr.• ALEKSANDROVA Marharyta, Dr.• ALFEREZ Mauricio, Dr.• AL HRAISHAWI, Hayde, Dr.• ALLIX, Kevin, Dr.• ANDRENACCI, Stefano, Dr.• ANTONELO, Eric, Dr.• BANA, Gergely, Dr.• BANIASADI, Zohreh• BARTEL, Alexandre, Dr.• BARTOLINI, Cesare , Dr.• BEIERLE, Christof, Dr.• BEN FADHEL Ameni, Dr.• BEZZAOUCHA, Souad, Dr.• BOYTSOV, Andrey, Dr.• BRUST, Matthias, Dr.• BHAUMIK, Ritam, Dr.• CASINI, Giovanni, Dr.• CASSAGNES, Cyril, Dr.

• CAZZATO, Dario, Dr.• ·CECI, Marcello, Dr.• DAS, Rig, DR.• DASHEVSKYI, Stanislav, Dr.• DECOUCHANT, Jérémie, Dr.• DELERUE ARRIAGA, Afonso, Dr.• DEMISSE, Girum Getachew, Dr• DENTLER, Jan Erik, Dr.• DERR, Erik, Dr.• FALK, Eric, Dr• FUHRER, Detlef• GADYATSKAYA, Olga, Dr.• GHATPANDE, Sankalp• GHORBEL, Enjie, Dr.• GIURGIU, Andra, Dr.• GOKNIL, Arda, Dr.• GONZALEZ, Carlos A., Dr.• HAMMERSCHMIDT, Christian, Dr• HARTMANN, Thomas, Dr.• HOCHGESWENDER, Nico, Dr.• HOMMES, Stefan, Dr.• IOVINO, Vincenzo, Dr.• JOROUGHI, Vahid, Dr.• JUKSS, Maris, Dr.• KAISER, Daniel, Dr.• KANNAN, Somasundar, Dr.• KAYHAN, Farbod, Dr.• KEN IANNILLO, Antonio, Dr.• KHOVRATOVICH, Dmitry, Dr.• KIBRIA, Mirza Golam, Dr.• KIM, Dongsun, Dr.• KINTIS, Marinos, Dr.• KISSELEFF, Steven, Dr.• KOZHAYA David, Dr. • KUSHNIAROU, Artsiom• LAGRAA, Sofiane, Dr.• LADID, Latif, Dr.• LEI, Lei, Dr.• LI, Li, Dr.• LI, Daoyuan, Dr.• LIU Zhe, Dr.• MACHALEK, Aurel, Dr.• MALEKI, Sina, Dr.• MATURO, Nicola, Dr.• MAZZALI, Nicolò, Dr.• MEIRA, Jorge, Dr.• MENGHI, Claudio, Dr.• MERLANDO DUNCAN, Juan Carlos, Dr.• MESTEL, David, Dr.• MONTERO, Leandro, Dr.• MSADEK, Nizar, Dr.• NAVEH, David, Dr.• OSTREV, Dimiter Valentinov, Dr.• OSVIK, Dag Arne, Dr.• PANICHELLA, Annibale, Dr.• PAUL Soumya, Dr. • QUEROL, Jorge, Dr.• RAHLI, Vincent, Dr.• RAMIREZ-CRUZ, Yunior, Dr.• RIAL DURAN, Alfredo, Dr.• ROBALDO, Livio, Dr.• ROBERT, Jérémy, Dr.• ROENNE, Peter, Dr.• ROSALIE, Martin, Dr.• ROSIE, Razvan, Dr.• SAHIN GEBIZLI, Ceren, Dr.• SAJADI ALAMDARI, Amin, Dr.• SANCHEZ LOPEZ, Jose Luis, Dr.• SANNIER, Nicolas, Dr.• SASSIOUI, Redouane • SCHIFFNER, Stefan, Dr.

• SCHMITZ, Sandra, Dr.• SHABAYEK, Abd EI Rahman, Dr.• SHBAIR Wazen, Dr.• SHIN, Donghwan, Dr• SHIN, Seung Yeob, Dr.• SKROBOT Marjan, Dr.• SOLTANA, Ghanem, Dr• SOUA Ridha, Dr.• SPANO, Danilo, Dr.• SYMEONIDIS, Iraklis, Dr.• TASSAN-ZANIN- CASER, Virgil• THOME, Julian, Dr.• TORRE, Damiano, Dr.• TRUJILLO, RASUA Rolando, Dr.• TSAKMALIS Anestis, Dr• TSINOS, Christos, Dr.• TURCANU, Ion• VARISTEAS, Georgios, Dr.• VU, Xuan Thankg, Dr.• VUPPALA, Satyanaryana, Dr.• WANG, Chunhui, Dr• WANG, Jun, Dr.• WANG, Qingju, Dr.• XIANG, Lin, Dr.• YAKUBOV, Alexander• YANG, Yang, Dr.• YU, Jiangshan, Dr.

PhD Candidates• AHMED, Eman • AMIN, Sleimi• ANNAIYAN, Arun• ANTONIADIS, Nikolaos• ARORA, Aakash• ATASHPENDAR, Arash• BADAWY, Haythem Kamel • BANDI, Ashok • BAPTISTA, Renato• BELLESI, Melissa• BEN ABDESSALEM, Raja• BENEDICK, Paul-Lou• BETTAIEB, Seifeddine• BHADAURIA, Anshuman• BOMMARAVENI, Shrikanth• BOUFAIED, Chaima• CAMINO, Ramiro• CAO, Tong• CARETTE, Antonin• CARVALHO OTA, Fernando Kaway • CASTILLO LOPEZ, Manuel• CHAOUCH, Karim• CHARLIER, Jérémy• CHERENKOVA, Kseniya• CIMARELLI, Claudio• CORNELIUS, Gary• DAMODARAN, Aditya• DANEGGER, Christian• DE LA CADENA, Wladimir• DERRMANN, Thierry• DI MAIO, Antonio• DILMAGHANI, Saharnaz Esmaielzadeh• DOKHANCHI, Sayed Hossein• DOMOUCHTSIDIS, Stavros• DU, Manxing• EZZINI, Saad• FEHÉR, Dániel• FERNANDES, Maria• FERREIRA TORRES, Christof• FIZ PONTIVEROS, Borja Beltran• FU, Shange• GAALOUL, Khouloud

• GAO, Jun• GAUTAM, Sumit• GENÇ, Ziya Alper• GINI, Agnese• GLAUNER, Patrick• HAJRI, Ines• HAMMES, Christian• HAQIQATNEJAD, Alireza• HURIER, Médéric• JAFARNEJAD, Sasan• JIMENEZ, Matthieu• KAIAFAS, Georgios• KHAN, Nida• KIEFFER, Emmanuel• KISUB, Kim• KODHELI, Oltjon• KOLBE, Niklas• KONG, Pingfun• KORRAI, Praveenkumar• KOYUNCU, Anil• KREMER, Paul• KREUTZ, Diego• KRIVOCHIZA, Jevgenij• KUI, Liu• LAMBERT, Christoph• LAMHAR, Salima• LEE, Jaekwon• LESAGE Laurent• LIU, Chao• LOPEZ BECERRA, José Miguel• LUDIVIG, Philippe• MAI, Xuan Phu• MANUKYAN, Anush• MAYOUCHE, Abderrahmane• MEHRIZI RAHMAT ABADI, Sajad• MENGALI, Alberto• MESSAOUDI, Salma• MIRTO, Cristian• MOSTAANI, Arsham• MOULINE, Ludovic• MULLER, Steve• NORVILL, Robert• OYEDOTUN, Oyaebade• PANDI PERUMAL, Raja • PAPADOPOULOS, Konstantinos• PARRY GOWHER, Majeed• PASCOAL, Tulio• PEJO, Balazs• PIERINA BRUSTOLIN SPAGNUELO, Dayana• PILGUN, Alexandre• PINTO GOUVEIA, Ines• POLGE, Julien• POLITIS, Christos• QADEER, Rizwan• QUINTANAR GUZMAN, Serket• RAEI DEHAGHI, Ehsan• RIOM, Timothée• RIVERA, Sean• ROBINET, François• RWEMALIKA, Renaud• SAINT, Alexandre• SAMIR LABIB, Nader• SANCHEZ GUINEA, Alejandro• SCHMITT, Xavier• SEDIGHI, Saeid• SHAFT, Brian• SIGNORELLO, Salvatore• SOROUSH, Najmeh• SPIGNOLI, Lorenzo• STEICHEN, Mathis• STOJKOVSKI Borce

• SU, Cui• TESSARO LUNARDI, Willian• TIKHOMIROV, Sergei• TITCHEU CHEKAM, Thierry• UDOVENKO, Aleksei• VAN WIER, Jeroen• VARMAZYAR, Mojtaba• VÁZQUEZ SANDOVAL, Itzel• VEIZAGA CAMPERO, Alvaro Mario• VITTO, Giuseppe• VUKOTIC, Ivana• WANG, Anyue• WANG, Jun • WANG, Min• WASIM Muhammad Umer• WEI, Ma• YUAN, Ya Xiong

Research Fellows• ADEDJOUMA, Morayo, Dr.• ARCURI, Andrea, Dr.• ARORA, Chetan, Dr.• BRORSSON, Mats, Dr.• CASTIGNANI, German• DE WACHTER, Hannes• DUNLOP, Dominic• FRANCOIS, Jérôme, Dr.• GHARANJIK Ahmad, Dr. • HANS, Dirk• LEHMANN, Martin• LI, Li, Dr.• MISHRA, Kumar, Dr.• MUND, Sandro• NAZARIKHORRAM, Aida, Dr.• ORMAZABAL, Gaston, Dr.• PAPAZAFEIROPOULOS, Anastasios, Dr • SASNAUSKAS, Raimondas, Dr.• SCHILTZ, Jean-Louis, (Honorary Professor) • SCHMIT, Georges• SCHWEITZER, Jean, Dr.• SMYTH, Benjamin, Dr.• VON SCHEFFER, Guido• WAGNER, Cynthia, Dr.• ZIAFATI, Pouyan, Dr.• ZURAD, Maciej

Staff• ANNET, Stéphanie, Communications and Events Assistant

• BELKACEM, Nadjia, Administrative Assistant• BÖSL, Sabine, Financial Controller• BRANCO SOARES, Jose, Business Development Officer

• CHESNAY, Isabelle, Project Coordinator – Acting Head of Administration and Support

• EDWARDSDOTTIR, Helga, Administrative Assistant

• FUHRER, Pierre, Project Coordinator• GELAO, Anthony (Interim)• GREGOIRE Valerie, Administrative Assistant• GUGAN, Daniel, Project Coordinator• HARAND Aurore, Legal Advisor• HOMOLKO Christine, Communications Advisor• KINDER, Margaux, Administrative Assistant• KINET, Christine, Administrative Assistant • KIRF, Natalie, Administrative Assistant• LAGROST, Céline, Project Coordinator• LAROCHE, Corinne, Administrative Assistant • LEMMER, Marc, Dr., Head of Technology Transfer Office

• MARTIN, Magali, Administrative Assistant• MERZOUGUI, Alban, Junior Legal Advisor• OCHSENBEIN, Anne, Dr., Project Coordinator• ÖSTLUND, Stefanie, Project Coordinator• PETIT, Cécile, Dr., Project Coordinator• PLUCINSKI, Jacek, Technology Transfer Officer• THUER, Claudia, Administrative Assistant• TZIMAPITI, Anna, Administrative Assistant with HR focus

• UPTON William, Communications and Events Assistant

• VARROY, Elena, Project Coordinator• VIAU-COURVILLE Mathieu, Project Coordinator• VINCENS, Solène, Administrative Assistant

Technical Staff• EDDS, Liam• GIOTTI, Domenico• KHRAMTSOVA, Ekaterina

Visitors• ADENSTEDT, Victoria, University of Duisburg Essen, Germany

• AJAVON, Charlène, Université Ouaga I PrJoseph Ki-Zerbo, Burkina Faso

• CAILAC, Maxime, INRIA NANCY, France• CASIMIRO F. Costa, Antonio, Faculdade de Ciências da Universidade de Lisboa, Portugal

• CASSANO, Valentin, Universidad Nacional de Córdoba, Argentina

• CHEN, Yuxing, UC, Berkeley• COHEN, Andrea, Universidad Nacional del Sur, Argentina

• CORDY, Maxime, University of Namur, Belgium• DAOUDAGH, Said, University of Pisa, Italy• DE FARIA, Haroldo, Federal University of ABC, Brazil

• ESTEVEZ, Elsa, Universidad Nacional del Sur, Argentina

• GOETZ, Detlev, Ville de Luxembourg, Luxembourg

• GOOSS, Anica, University of Duisburg Essen, Germany

• GUIDOTTI, Alessandro, University of Bologna, Italy

• HOANG Hong-Nhât Quoc, Hanoi University of Science and Technology,Vietnam

• KABORE, Abdoul Kader, Université Ouaga I PrJoseph Ki-Zerbo, Burkina Faso

• KAUSHIK, Aryan, University of Edinburgh, Scotland

• MARTINEZ POSSE, Maria Vanina, Universidad Nacional del Sur, Argentina

• MUSIAL, Jedrej, Poznan Polytechnic University, Poland

• POLISHARLA, Guru Vamsi, IIT Bombay, India• SAWADOGO, Delwende Donald Arthur, Uni- versité du Québec à Montréal (UQAM), Canada

• SINAK, Jarek, Poznan University of Technology, Poland

• TATO ARIAS, Anxo, University of Catalunya, Spain

• TOHME, Fernando, Universidad Nacional del Sur, Argentina

• UGOLINI Alessandro, University of Parma, Italy• WANGSOM, Peerasak, KMUTT University, Bangkok, Thailand

People

Alexandre Saint, Dr. Djamila Aouada, Dr. Abd El Rahman Shabayek48 49back to table of contents48 49

About us About us

48 back to table of contents

Page 26: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

What first drew you to cryptography?I discovered cryptography when I was still in middle school: I used to read a lot of books by Jules Verne, and in one of them the decryption of an encrypted message is a key plot point – that got me curious.

I also consider strong cryptography crucial for society to work. When we exchange messages, we want to ensure that nobody can read them but their recipient, that they have been written by the right person, and that they have not been modified along the way. Cryptography is the science that ensures that these three properties are present.

This interest for cryptography, my love for mathematics, and a sense of purpose nudged me toward research in this field. Plus, I find cryptogra-phy fun!

Can you tell us about your PhD thesis?The first of my two main topics was “lightweight cryptography”. With the advent of the Internet of Things, we are going to have a myriad of tiny devices with very little computing power but which still need to commu-nicate securely.

To meet this need for “lightweight algorithms”, I co-designed a block ci-pher (a type of cryptographic algorithm) called SPARX. Block ciphers use one of two types of subfunction: “S-boxes”, which allow security proofs,

or modular additions, which are lighter weight. For SPARX, I invented a new design approach that bridges the gap between the good perfor-mance of modular additions and the security guarantees of S-boxes. This opened a new avenue for designing the algorithms to secure the IoT.

The second axis of my PhD was on “S-box reverse-engineering”. The security of a cipher using an S-box hinges on its mathematical proper-ties, so cipher designers always describe the design process for their S-box in great detail, except when they don’t… Russian and American secret services have designed algorithms without describing them, and these have gone on to be used widely, without anyone knowing if they contain hidden flaws.

I co-invented techniques that can recover the structure or the design process of such S-boxes using very limited information. In fact, we found a hidden structure in the S-box used by the last Russian standards!

What are you working on now?In Paris, I’m continuing my work on S-box reverse-engineering, while with my former colleagues from Luxembourg we’re submitting an algorithm, based on my design strategy for SPARX, to a National Institute of Standards and Technology (USA) competition for choosing a new standard.

BEST PAPER AWARDS

Flexible Feedback System for Posture Monitor- ing and CorrectionRenato Baptista, Dr. Michel Antunes, Dr. Abd El Rahman Shabayek, Dr. Djamila Aouada and Prof. Dr. Björn Ottersten IEEE Fourth International Conference on Image Information Processing (ICIIP 2017)21-23 December 2017, Shimla, India

Detecting Malicious Authentication Events TrustfullyGeorgios Kaiafas, Dr. Georgios Varisteas, Dr. Sofiane Lagraa and Dr. Radu StateThird IEEE/IFIP International Workshop on Analytics for Network and Service Manage-ment (AnNet 2018)23 April 2018, Taipei, Taiwan

FaCoY: A Code-to-Code Search EngineKisub Kim, Dongsun Kim, Dr. Tegawendé F. Bissyandé, Eunjong Choi, Li Li, Dr. Jacques Klein and Prof. Dr. Yves Le TraonIPSJ SIG SE Excellent Research Award by the Information Processing Society of Japan, SIG Software Engineering, 40th International Con-ference on Software Engineering (ICSE 2018)27 May-3 June 2018, Gothenburg, Sweden

Characterising Deprecated Android APIsLi Li, Jun Gao, Dr. Tegawendé F. Bissyandé, Lei Ma, Xin Xia and Dr. Jacques KleinFOSS Impact Paper Award, 15th International Conference on Mining Software Repositories (MSR 2018)28-29 May 2018, Gothenburg, Sweden

A Model for Regulating of Ethical Preferences in Machine EthicsDr. Zohreh Baniasadi, Dr. Xavier Parent, Prof. Dr. Charles Max and Marcos CramerHuman-Computer Interaction International Conference (HCI 2018)15-20 July 2018, Las Vegas, Navada, USA

On the Reduction of Biases in Big Data Sets for the Detection of Irregular Power UsagePatrick Glauner, Dr. Radu State, Petko Vultcher and Diogo DuarteInternational FLINS Conference on Data Sci-ence and Knowledge Engineering for Sensing Decision Support (FLINS 2018)21-24 August 2018, Belfast, Northern Ireland

Interference Alignment for Spectral Coexist- ence of Heterogeneous NetworksDr. Shree Krishna Sharma, Dr. Symeon Chatzi-notas and Prof. Dr. Björn OtterstenEuropean Association for Signal Processing (EURASIP) 2018 Best Paper AwardPresented during the 26th European Signal Processing Conference (EUSIPCO 2018)3-7 September 2018, Rome, Italy

Code Design for Non-Coherent Detection of Frame Headers in Precoded Satellite SystemsDr. Farbod Kayhan and Prof. Guido Montorsi9th Advanced Satellite Multimedia Systems Conference (ASMS) and Signal Processing for Space Communications Workshop (SPSC)10-12 September 2018, Berlin, Germany

Enabling Model Testing of Cyber-Physical SystemsDr. Carlos A. González, Mojtaba Varmazyar, Dr. Shiva Nejati, Prof. Dr. Lionel C. Briand and Yago IsasiACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS 2018)14-19 October 2018, Copenhagen, Denmark

Live Search of Fix Ingredients for Automated Program RepairKui Liu, Anil Koyuncu, Kisub Kim, Dongsun Kim and Dr. Tegawendé F. BissyandéBest ERA Paper Award, 25th Asia-Pacific Soft-ware Engineering Conference (APSEC 2018)4-7 December 2018, Nara, Japan

INDIVIDUAL AWARDS

Prof. Dr. Pascal Bouvry and Dr. Grégoir Danoy received a US Navy Office of Naval Research three-year grant in recognition of their re-search into drone swarming.The US Navy funded project will allow them to combine their work on three distinct areas of swarm mobility — chaos theory, clustering techniques and nature-inspired approaches — to optimise the behaviour of autonomous vehicles in a completely distributed way.

Prof. Dr. Jean-Sébastien Coron received the European Research Council’s prestigious Advanced Grant. Coron and his team will receive up to € 2.5

million over a period of five years to make cryptographic tasks usable in practice, so that citizens do not have to compromise on the privacy and security of their data. Coron is the third researcher at SnT (and in Luxembourg) to receive an ERC Advanced Grant.

Dr. Rig Das received the European Association for Biometrics Research Award 2018.The prestigious award recognises individuals who have made a significant contribution to the field of biometrics research in Europe; in this case, Dag’s work on facial recognition and finger vein-based identification.

Dr. Shiva Nejati was named a Distinguished Reviewer at the 40th International Conference on Software Engineering (ICSE 2018), 27 May-3 June, Gothenburg, Sweden.

Prof. Dr. Björn Ottersten, Director of SnT, is the 2018 recipient of the prestigious European Association for Signal Processing (EURASIP) Group Technical Achievement Award.The award recognises Ottersten’s scientific leadership in building research groups, most recently as head of SnT’s Signal Processing and Communications Research Group (SIG-COM) at SnT.

Dr. Léo Perrin won the Amis de l‘Université association’s 2018 Rolf Tarrach Award. His doctoral thesis, ‘Cryptanalysis, Reverse- Engineering and Design of Symmetric Crypto-graphic Algorithms’, was selected as the best across all disciplines at the University.

Dr. Radu State received a three-year grant as part of Ripple’s University Blockchain Research Initiative (UBRI). The programme supports academic research, technical development and innovation in blockchain, cryptocurrency and digital payments.

Awards

On 5 July 2018, the Amis de l’Université du Luxembourg awarded their annual best thesis award – the Rolf Tarrach Prize – to SnT’s Léo Perrin. Dr. Perrin completed his thesis, “Cryptanalysis, Reverse-Engineering and Design of Symmetric Cryptographic Algorithms”, under the supervision of Prof. Dr. Alex Biryukov, and is now a postdoctoral researcher at Inria, Paris. We caught up with him to learn more about his pioneering work in cryptography.

Dr. Leo Perrin gives the keynote speech at the graduation ceremony of the University of Luxembourg held in December 2018.

50 51back to table of contents 51

About us

50

About us

Page 27: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

OUROUTPUT

52 53back to table of contents

Page 28: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

Projects

Project Phd Student Supervisor Partner

Secure and Compliant Data Management

Automated Extraction of Metadata and Compliance Rules from Legal Texts

Amin Sleimi Dr. Mehrdad Sabetzadeh

Service Central de Législation (Public2)

Implementation of Securely Proved Protocols for Private Communications

Itzel Vázquez Sandoval Dr. Gabriele Lenzini pEp Security

Protocols for Privacy Security Analysis Ziya Alper Genç Dr. Gabriele Lenzini pEp Security

Personalized Insurance with Data Analytics Laurent Lesage Dr. Radu State Foyer

Fintech

Automated Decision Support for Security Requirements Analysis Seifeddine Bettaieb Prof. Dr. Lionel Briand

BGL BNP Paribas

Anti-Money Laundering with Big Data Analytics Ramiro Camino Dr. Radu State LOGOS (AFR)

Data Analytics for Personal Finance Jérémy Charlier Dr. Radu State BCEE

Security of Smart Contracts Cristof Ferreira Torres Dr. Radu State BCEE (IF)

Data Analytics and Smart Contracts for Traceability in Finance Nida Khan Dr. Radu State Eethiq (AFR)

Smart Testing in a Devops and Continuous Integration Process Renaud Rwemalika Prof. Dr. Yves Le Traon

BGL BNP Paribas (AFR)

Distributed Ledger Prototype and Data Analytics for KYC Robert Norvill Dr. Radu State ABBL

Machine Learning for Client Segmentation Anshuman Bhadauria Prof. Dr. Yves Le Traon

BGL BNP Paribas

A Model-based Framework for Requirements Engineering in the Financial Domain

Alvaro Mario Veizaga Campero Prof. Dr. Lionel Briand

Clearstream-Escent

Cybersecurity

Software Defined Network Service Chaining through Network Analytics

Beltran Borja Fiz Pontiveros Dr. Radu State Telindus

Smart Grid Deep Search Nikolaos Antoniadis Prof. Dr. Yves Le Traon

CREOS

Hardware/Software Architectures for Deep Packet Inspection and Security Monitoring at GigaByte Speed

Mathis Steichen Dr. Radu State Telindus

Self-learning Predictive Algorithms: from Design to Scalable Implementation

Manxing Du Dr. Radu State Olamobile (AFR)

Data Analytics for Network Security Giorgios Kaiafas Dr. Radu State CHOICE (AFR)

Big Data Analytics against Electricity Theft Patrick Glauner Dr. Radu State CHOICE (AFR)

Risk Monitoring with Intrusion Detection for Industrial control systems

Steve Muller (graduated in 2018)

Prof. Dr. Yves Le Traon

Itrust (AFR)

Space Systems and Resources

Model-driven Trace Checking Chaima Boufaid Prof. Dr. Lionel Briand

LuxSpace (IRP)

Satellite Sensor Networks for Spectrum Monitoring Christos Politis (graduated in 2018)

Dr. Symeon Chatzinotas

SES (CORE)

Advanced Signal Processing Techniques for Satellite Communications

Alberto Mengali (graduated in 2018)

Prof. Dr. Björn Ottersten

SES (AFR)

Broadband/Broadcast Convergence through Intelligent Caching in 5G Satellite Networks

Danilo Spano (graduated in 2018)

Dr. Symeon Chatzinotas

SES (AFR)

Project Phd Student Supervisor Partner

End-to-end Signal Processing Algorithms for Precoded Satellite Communications

Jevgeny Krivochiza Dr. Symeon Chatzinotas

SES (AFR)

Log-based Automated Testing of Satellite Ground Control Systems Salma Messaoudi Prof. Dr. Lionel Briand

SES (CORE-PPP)

Online Learning for Edge-caching in Hybrid Satellite-Terrestrial Networks LISTEN

Sajad Mehrizi Prof. Dr. Björn Ottersten

SES (AFR)

Optimized Digitized Payload Processing for Satellite Communications

Ashok Bandi Prof. Dr. Björn Ottersten

SES (CORE)

Power Efficient Sparse Signal Processing for Digital Wideband on-Board Techniques

Akash Arora Prof. Dr. Björn Ottersten

SES (AFR)

Automated and Model-based Simulation of Large-scale Satellite Systems

Karim Chaouch Dr. Shiva Nejati SES (CORE-PPP)

Development of a Support Framework for the Model-based Engineering of Microsatellites

Raja Pandi Perumal Prof. Dr. Holger Voos

LuxSpace (IF)

Communications Algorithms for End-to-End Satellite IoT Oltjon Kodheli Dr. Symeon Chatzinotas

SES (IF)

Autonomous Vehicles

Multimodal Transport Optimization Thierry Derrmann (graduated in 2018)

Prof. Dr. Thomas Engel

POST (CORE)

Scene flow from RGB-D: Applications in Human Motion Sensing Konstantinos Papadopoulos Dr. Djamila Aouada POST (CORE)

Accurate 3D Human Body Shape Modelling and Fitting under Clothing- BODYFIT

Alexandre Saint Dr. Djamila Aouada ARTEC (AFR)

Deep Learning Based 3D Shape Analysis with Application to Face Recognition

Eman Ahmed Dr. Djamila Aouada ARTEC (CORE-PPP)

Automated CAD Re-engineering Kseniya Cherenkova Dr. Djamila Aouada ARTEC

Automating Regression Test Selection for Requirements-based Testing in Embedded Systems

Ines Hajri Prof. Dr. Lionel Briand

IEE (AFR)

Traceability from Requirements to Design to Support Context- driven Testing of Embedded Software Systems

Raja Ben Abdessalem Prof. Dr. Lionel Briand

IEE

Increased Mission Autonomy for small UAVs Manuel Castillo Lopez Prof. Dr. Holger Voos

Lux Army

Radar Waveform Design for Automotive Applications Christian Hammes Dr. Bhavani Shankar IEE (AFR)

Coherent Radar Waveform Design for Automotive Applications Sayed Dokhanchi Prof. Dr. Björn Ottersten

IEE (AFR)

Future Developments for Flexible Production Processes Lunardi Willian Tessaro Prof. Dr. Holger Voos

ROGLER

VICO - Vision-based Control of Small Unmanned Aerial Vehicles Arun Annaiyan (graduated in 2018)

Prof. Dr. Holger Voos

Lux Army (AFR)

Learning of Control Behaviors in Flying Manipulation Anush Anukyan Prof. Dr. Holger Voos

Lux Army

Design and Control of a Flying Gripper and Manipulator Paul Kremer Prof. Dr. Holger Voos

Lux Army

Security in ROS Base Systems Sean Rivera Dr. Radu State Lux Army

Hybrid Verification of CPS Behavioral Design Models Khouloud Gaaloul Dr. Shiva Nejati QRA

5454 55

Projects Projects

back to table of contents

Page 29: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

Project Phd Student Supervisor Partner

Using Artificial Intelligence to Support Automated Requirements Quality Assurance

Saad Ezzini Dr. Mehrdad Sabetzadeh

QRA

Highly Automated Surveillance of Data Centers with Multi-UAV Systems

Claudio Cimarelli Prof. Dr. Holger Voos

Luxconnect

Privacy Preserving Risk Assessment of Human & Automated Driving using Multi-Fusion Sensor Analytics

Francois Robinet Dr. Raphaël Frank Foyer (IF)

mmWave Cognitive Radar: Adaptive Waveform Design and Implementation

Ehsan Raei Dehaghi Dr. Bhavani Shankar IEE (CORE-PPP)

Compressive Sensing for Ranging and Detection in Automotive Applications

Saeid Sedighi Prof. Dr. Björn Ottersten

FNR Bilateral

Handling Uncertainties in Design and Analysis of Cyber Physical Systems

Jaekwon Lee Prof. Dr. Lionel Briand

LuxSpace

Internet of Things

Omniscient Fault Localization in Home Automation System Using Model-driven Data Analytics

Ludovic Mouline Prof. Dr. Yves Le Traon

POST

Software Engineering and Data Analytics in the Context of Smart Buildings

Daoyuan Li (graduated in 2018)

Prof. Dr. Yves Le Traon

Paul Wurth

Continuous Development, Deployment, and Testing for Self- adaptive Software Systems; A New Engineering Process Applied to Smart Home

Alejandro Sanchez Guinea (graduated in 2018)

Prof. Dr. Yves Le Traon

POST

Normalisation and IoT Nader Samir Labib Dr. Grégoire Danoy ILNAS

Normalisation and Cloudcomputing Service Price Models for Optimisation

Chao Liu Prof. Dr. Pascal Bouvry

ILNAS

Biotechnological Big Data: Security, Privacy, and Standardization Saharnaz Esmaielzadeh Dilmaghani

Dr. Matthias Brust ILNAS

Connectivity Framework for the Industry 4.0 Paul-Lou Benedick Prof. Dr. Yves Le Traon

Cebi

Security Framework for the Industry 4.0 Julien Polge Prof. Dr. Yves Le Traon

Cebi

EU AND ESA PROJECTS IN 2018

Project Principal Investigator Programme

Awarded

FCD4ITS - Floating Car Data Collection for Intelligent Transportation Systems

Prof. Dr. Thomas Engel H2020

CONCORDIA - Cyber security cOmpeteNce fOr Research anD Innovation

Dr. Radu State H2020

FlexPreDem - Demonstrator of Precoding Techniques for Flexible Broadband Systems

Dr. Symeon Chatzinotas ESA

SPARTA - Special projects for advanced research and technology in Europe

Prof. Dr. Paulo Esteves-Veríssimo H2020

FIN-TECH - A FINancial supervision and TECHnology compliance training programme

Dr. Radu State H2020

5G-DRIVE - 5G HarmoniseD Research and TrIals for serVice Evolution between EU and China

Prof. Dr. Thomas Engel H2020

5G-MOBIX - 5G for cooperative & connected automated MOBIlity on X-border corridors

Prof. Dr. Thomas Engel H2020

NG-HDR - Next Generation High Data Rate Trunking Systems Dr. Bhavani Shankar ESA

CyberSec4Europe - Cyber Security Network of Competence Centres for Europe

Prof. Dr. Paulo Esteves-Veríssimo H2020

HiEdTec - Modernisation of Higher Education in Central Asia through new Technologies

Prof. Dr. Thomas Engel Erasmus plus

VHTSMODEM - User Terminal Wideband Modem for Very High Throughput Satellite (VHTS)

Dr. Symeon Chatzinotas ESA

CLOUDMAP - Cloud Computing via Homomorphic Encryption and Multilinear Maps

Prof. Dr. Jean-Sébastien Coron ERC

TERMINAL - Minibus électriques automatisés dans les navetteurs transfrontaliers

Dr. Raphaël Frank Interreg V A

LAST-JD-RIoE - Law, Science and Technology Joint Doctorate: Rights of the Internet of Everything

Prof. Dr. Leon Van Der Torre MCSA-ITN

Ongoing

LiveSatPreDem - Live Satellite Demonstration of Advanced Interference Management Techniques

Dr. Symeon Chatzinotas ESA

GRoNE - Grande Région rObotique aérienNE Prof. Dr. Holger Voos Interreg V A

MIREL - Mining and Reasoning with Legal Test Prof. Dr. Leon Van Der Torre MCSA-RISE

ATENA - Advanced Tools to Assess and Mitigate the Criticality of ICT Components and their Dependencies over Critical Infrastructures

Prof. Dr. Thomas Engel H2020

AGNOSTIC - Actively Enhanced Cognition based Framework for Design of Complex Systems

Prof. Dr. Björn Ottersten ERC

SAINT - Systemic Analyzer In Network Threats Prof. Dr. Thomas Engel H2020

STARR - Decision SupporT and self-mAnagement system for stRoke survivoRs

Dr. Djamila Aouada H2020

HTS-DBS - High Throughput Digital Broadcasting Satellite Systems Dr. Symeon Chatzinotas ESA

FutureTPM - Future Proofing the Connected World: A Quantum-Re-sistant Trusted Platform Module

Prof. Dr. Peter Y. A. Ryan H2020

5656 57

Projects Projects

back to table of contents

Page 30: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

Project Principal Investigator Programme

CADSAT - Carrier Aggregation in Satellite Communication Networks

Dr. Symeon Chatzinotas ESA

TUNE - Testing the Untestable: Model Testing of Complex Software-intensive Systems

Prof. Dr. Lionel Briand ERC

Completed

F-INTEROP - FIRE+ Online Interoperability and Performance Test Tools to Support Emerging Technologies from Research to Standardization and Market Launch: An Accelerator to Develop Standards and Innovations

Prof. Dr. Thomas Engel H2020

Flysec - FLY faster through an innovative and robust risk-based SECurity tunnel

Prof. Dr. Thomas Engel H2020

SATNEX-IV - Satellite Network Of Experts CCN2 W14 Dr. Symeon Chatzinotas ESA

SATNEX-IV - Satellite Network Of Experts CCN2 W11 Dr. Symeon Chatzinotas ESA

SATNEX-IV - Satellite Network Of Experts CCN2 W12 Dr. Bhavani Shankar ESA

Privacy Flag - Enabling Crowd-sourcing based Privacy Protection for Smartphone Applications, Websites and Internet of Things Deployments

Prof. Dr. Thomas Engel H2020

M2MSAT - Demonstrator of Light-weight Application and Transport Protocols for Future M2M Applications

Prof. Dr. Thomas Engel ESA

TARGET - Training Augmented Reality Generalized Environment Toolkit

Prof. Dr. Thomas Engel H2020

ONSET - Optical Feeder Study for Satellite Networks Prof. Dr. Björn Ottersten ESA

SANSA - Shared Access Terrestrial-Satellite Backhaul Network enabled by Smart Antennas

Prof. Dr. Björn Ottersten H2020

PreDem - Precoding Demonstrator for broadband system forward links

Dr. Symeon Chatzinotas ESA

bIoTope - Backbone of future Internet of Thing Open Ecosystems Prof. Dr. Yves Le Traon H2020

GHOST - On-Ground EnHanced Non-Intrusive IOT System Proto-typing and Testing for Efficient Monitoring Of Wideband Satellite Transponders

Dr. Symeon Chatzinotas ESA

Project Principal Investigator Funding Instrument

Awarded

EnCaVIBS - The EU NIS Directive: Enhancing Cybersecurity across Vital Business Sectors

Prof. Dr. Mark Cole CORE

Onniva - Automatic Detection and Prevention of Deserialization Vulnerabilities

Dr. Alexandre Bartel CORE

SPRINGER - Signal Processing for Next Generation Radar Prof. Dr. Björn Ottersten CORE

STV - Socio-Technical Verification of Information Security and Trust in Voting Systems

Prof. Dr. Peter Y. A. Ryan CORE International

HyLIT - Architectural Support for Intrusion Tolerant Operating- System Kernels

Dr. Marcus Völp CORE Junior

STELLAR - teSTing sELf-LeARning systems Prof. Dr. Yves Le Traon CORE

ThreatAdapt - Adaptive Byzantine Fault and Intrusion Tolerance Prof. Dr. Paulo Esteves-Veríssimo CORE International

Ongoing

SSh - Security in the Shell Prof. Dr. Jan Lagerwall (co-PI Dr. Gabriele Lenzini)

CORE

PrivDA - Privacy-preserving Publication of Dynamic Social Network Data in the Presence of Active Adversaries

Dr. Yunior Ramirez-Cruz CORE Junior

Q-CoDe - Quantum Communication with Deniability Prof. Dr. Peter Y. A. Ryan CORE

FESS - Functional Encrypted Secure Systems Dr. Vincenzo Iovino CORE Junior

DAPRECO - DAta Protection REgulation Compliance Dr. Gabriele Lenzini CORE

BEST-RPAS - Robust Emergency Sense-and-Avoid Capability for Small Remotely Piloted Aerial Systems

Prof. Dr. Holger Voos CORE

3D-ACT - 3D Action Recognition Using Refinement and Invariance Strategies for Reliable Surveillance

Prof. Dr. Björn Ottersten CORE

ESSTIMS - Enhanced Signal Space opTImization for satellite comMunication Systems

Dr. Farbod Kayhan CORE Junior

ROSETTA - Resource Optimization for Integrated Satellite-5G Networks with Non-Orthogonal Multiple Access

Dr. Lei Lei CORE Junior

COHESAT - Cognitive Cohesive Networks of Distributed Units for Active and Passive Space Applications

Dr. Juan Merlano Duncan CORE Junior

FinCrypt - Security, Scalability, and Privacy in Blockchain Applications and Smart Contracts

Prof. Dr. Alex Biryukov CORE

ECLECTIC - Energy and Complexity Efficient Millimiter-wave Large-Array Communications

Dr. Tsinos Christos CORE Junior

CODEMATES - COntinuous DEvelopment with Mutation Analysis and TESting

Dr. Michail Papadakis CORE Junior

PROCAST - Proactive Edge Caching for Content Delivery Networks powered by Hybrid Satellite/Terrestrial Backhauling

Prof. Dr. Björn Ottersten CORE

RECOMMEND - Automatic Bug Fix Recommendation: Improving Software Repair and Reducing Time-to-Fix Delays in Software Development Projects

Dr. Tegawendé Bissyande CORE Junior

VoteVerif - Verification of Voter-Verifiable Voting Protocols Prof. Dr. Peter Y. A. Ryan CORE

CHARACTERIZE - Characterization of Malicious Code in Mobile Apps: Towards Accurate and Explainable Malware Detection

Dr. Jacques Klein CORE

FNR CORE

5858 59

Projects Projects

back to table of contents

Page 31: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

FNR AFR GRANTS AND INDUSTRIAL FELLOWSHIPS

FNR CORE PPP, BRIDGES AND PUBLIC2

Project Principal Investigator Funding Instrument

SZK - Stateful Zero-Knowledge Dr. Alfredo Rial CORE Junior

COMMA - Combating Context-sensitive Mobile Malware Dr. Olga Gadyatskaya CORE Junior

PETIT - Privacy Enhancing Techniques for Future Internet Dr. Andriy Panchenko CORE Junior

Completed

SATSENT - SATellite SEnsor NeTworks for spectrum monitoring Dr. Symeon Chatzinotas CORE Junior

MAMBA - MultimodAl MoBility Assistance Prof. Dr. Thomas Engel CORE

DIST - Distance Bounding: A Graph Theoretical and Formal Approach

Dr. Rolando Trujillo CORE Junior

aToMS - a Theory of Matching Sessions Prof. Dr. Peter Y. A. Ryan CORE

FIXPATTERN (AUTOFIX) - Automated Program Repair using Fix patterns Learned from Human-written Patches

Dr. Dongsun Kim CORE Junior

Project Principal Investigator Programme

Awarded

IMoReF - Improved Model-based Requirements for Financial Applications

Prof. Dr. Lionel Briand BRIDGES

CAFFE PF - Cost-aware Active Feedback & Feature Extraction for Profiling Financial Transcations

Dr. Radu State BRIDGES

TESTFAST - Software testing in a Fast, Clever and Effective Way Prof. Dr. Yves Le Traon BRIDGES

EQUACS - Early QUality Assurance of Critical Systems Dr. Mehrdad Sabetzadeh BRIDGES

Ongoing

MOSIS - Model-Based Simulation of Integrated Software Systems Prof. Dr. Lionel Briand CORE PPP

IDFORM - Face Identification Under Deformations Dr. Djamila Aouada CORE PPP

SCARLET - Semantic Metadata and Compliance Rule Extraction from Legal Texts

Prof. Dr. Lionel Briand PUBLIC2

LISTENER - Log-drIven, Search-based TEst geNERation for Ground Control Systems

Prof. Dr. Lionel Briand CORE PPP

PROSAT - On-board processing techniques for high throughput satellites

Prof. Dr. Björn Ottersten CORE PPP

AWARDS - Adaptive mmWave Radar Platform for enhanced Situational Awareness: Design and Implementation

Prof. Dr. Björn Ottersten CORE PPP

Project Applicant Supervisor Programme

Awarded

MASSIVE - Machine Learning for Risk Assessment in Semi- autonomous Vehicles

François Robinet Dr. Raphaël Frank Industrial Fellowship (Foyer)

Blockchain for Finance - Secure Blockchain Technologies for Finance

Christof Ferreira Torres Dr. Radu State Industrial Fellowship (BCEE)

CL2ML - Continuously Learning to Meta Learn Using Ensemble and Reinforcement Learning

Dr. Thomas Hartmann Prof. Dr. Yves Le Traon

Industrial Fellowship (DataThings)

DESSIRA - Development of a Decision Support System for Incorporating Risk Assessments during the System Design of Microsatellites

Raja Pandi Perumal Prof. Dr. Holger Voos

Industrial Fellowship (LuxSpace)

LACLOCCN - Learning -Assisted Cross-Layer Optimizaation of Cognitive Communication Networks

Praveen Kumar Korrai Dr. Symeon Chatzinotas

AFR-PhD

AutoGEM - Automatic Generation and Maintenance of functional tests in agile environment

Renaud Rwemalika Prof. Dr. Yves Le Traon

AFR-PhD

SATIOT - Communication Algorithms for End-to-End Satellite-IoT Oltjon Kodheli Dr. Symeon Chatzinotas

Industrial Fellowship (SES)

Ongoing

LISTEN - online Learning for edge-caching In hybrid Satellite- Terrestrial Networks

Sajad Mehrizi Rahmat Abadi Prof. Dr. Björn Ottersten

AFR-PPP PhD (SES)

SPA - Self-learning Predictive Algorithms: From Design to Acalable Implementation

Manxing Du Dr. Radu State AFR-PPP PhD (Olamobile)

SigProSat - End-to-end Signal Processing Algorithms for Precoded Satellite Communications

Jevgenij Krivochiza Prof. Dr. Björn Ottersten

AFR-PPP PhD (SES)

AREG - Automating Regression Test Selection for Require-ments-based Testing in Embedded Systems

Ines Hajri Prof. Dr. Lionel Briand

AFR-PPP PhD (IEE)

DGAP - Real Time Prediction and Detection of Malicious Activities Georgios Kaiafas Dr. Radu State AFR-PPP PhD (POST)

BODYFIT - Accurate 3D Human Body Shape Modelling and Fitting under Clothing

Alexandre Saint Dr. Djamila Aouada AFR-PPP PhD (Artec)

LARGOS - Learning-Assisted Optimization for Resource and Security Management in Slicing-Based 5G Networks

Yaxiong Yuan / S. Bommeraveni Dr. Symeon Chatzinotas

AFR Bilateral Grant

DroidMod - Systematically Exploring Semantic App Models for Android

Alexandre Pilgun Prof. Dr. Sjouke Mauw

AFR-PhD

DYNAMO - Enhancing Angular Resolution in Radar Through Dynamic Beam Steering and MIMO

Christian Hammes Dr. Bhavani Shankar AFR-PPP PhD (IEE)

AVR - Automatic Feature Selection for Visual Recognition Oyaebade Oyedotun Prof. Dr. Björn Ottersten

AFR-PhD

NavSys - Navigation System for a Small Lunar Exploration Rover Philippe Ludivig Prof. Dr. Holger Voos

AFR-PPP PhD (iSpace)

SCASE21 - “Space“ as a Catalyst of a Sustainable Smart School Environment Systemic Conceiving and achieving of Conviviality for the School of the 21st Century

Melissa Bellesi Prof. Dr. Charles Max

AFR-PhD

Digital Payload Processing for Next Generation Satellite Systems Dr. Vahid Joroughi Prof. Dr. Björn Ottersten

AFR-PPP PDR (SES)

SemClose - Source Code Search for Semantically Similar Functionalities

Kisub Kim Dr. Tegawendé Bissyande

AFR-PhD

6060 61

Projects Projects

back to table of contents

Page 32: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

FNR INTER

Project Applicant Supervisor Programme

SPASAT - Power Efficient Sparse Signal Processing for Digital Wideband On-board Techniques

Arora Aakash Prof. Dr. Björn Ottersten

AFR-PPP PhD (SES)

DASCF - Data Analytics and Smart Contracts for Traceability in Finance

Nida Khan Dr. Radu State AFR-PPP PhD (EETHIQ)

STEPIT - Spatio-Temporal Processes for Electricity Theft Detection Patrick Glauner Dr. Radu State AFR-PPP PhD (CHOICE)

OSPPAP - Optimal Scalability and Performance in Programmatic Advertising Platforms

Georgios Varisteas Dr. Radu State AFR-PPP PDR (Olamobile)

AMADA - Advanced Market Abuse Detection with Big Data Ramiro Camino Dr. Radu State AFR-PPP PhD (LOGOS)

UTEMA - Unbiased Temporal Machine for General-purpose Times Series-based Fraud Detection

Dr. Eric Antonelo Dr. Radu State AFR-PPP PDR (CHOICE)

TASTRA - Tailoring Automated Software Techniques for Real World and Large Scale Software Applications

Thierry Titcheu Chekam Prof. Dr. Yves Le Traon

AFR-PhD

ACCORDION - Compressive Sensing for Ranging and Detection in Automotive Applications

Saeid Sedighi Prof. Dr. Björn Ottersten

AFR Bilateral Grant

CatchMe - Android Malicious Code Localisation: Catch Me if You Can!

Pingfun Kong Dr. Jacques Klein AFR-PhD

RECONCIS - Reconciling Natural-Language Requirements and Model-based Specification for Effective Development of Critical Infrastructure Systems

Dr. Chetan Arora Prof. Dr. Lionel Briand

AFR-PPP PDR (SES)

GRAMMAF - Graph Anti-Money laundering and Market Abuse Framework

Dr. Leandro Montero Dr. Radu State AFR-PPP PDR (LOGOS)

LSBT - Large-Scale Blockchain Testbed Dr. Wazen Shbair Dr. Radu State AFR-PPP PDR (EETHIQ)

CARBON - CoevolutionAry HybRid Bi-level OptimizatioN Emmanuel Kieffer Prof. Dr. Pascal Bouvry

AFR-PhD

Completed

SMPC - Stochastic Model Predictive Control for Eco-Driving Assis-tance Systems in Electric Vehicles

Seyed Amin Sajadi Alamdari Prof. Dr. Holger Voos

AFR-PhD

BroadSat - Multibeam Joint Processing for Broadband/Broad-cast Convergence in Next Generation High Throughput Satellite Communications

Danilo Spano Prof. Dr. Björn Ottersten

AFR-PPP PhD (SES)

RIMIDI - Risk Monitoring with Intrusion Detection for Industrial control systems

Steve Muller Prof. Dr. Yves Le Traon

AFR-PPP PhD (itrust)

HyVAn - A Scalable Symbolic Execution Framework for Detecting Vulnerabilities

Julian Thome Prof. Dr. Lionel Briand

AFR-PhD

RUCON - Rule Compilation for Software-defined Networks (SDN) Stefan Hommes Dr. Radu State AFR-PPP PDR (Telindus)

MOSER - Model-driven Software Engineering for Social Robots Gary Cornelius Prof. Dr. Holger Voos

AFR-PhD

CoNav - Collision-free Navigation of Small UAVs in Complex Urban Environments Using Predictive Control

Arun Annaiyan Prof. Dr. Holger Voos

AFR-PhD (Lux Army)

FLYMAN - Controller Design for Cooperative Flying Manipulation Using Small Quadrotors UAVs

Jan Erik Dentler Prof. Dr. Holger Voos

AFR-PhD

TYPAMED - Transparent yet Private Access to Medical Data Dayana Spagnuelo Prof. Dr. Peter Y. A. Ryan

AFR-PhD

RECONTRE - Reliable Communication Techniques for Future Gene-ration Satellite Systems

Alberto Mengali Prof. Dr. Björn Ottersten

AFR-PPP PhD (SES)

Project Principal Investigator Programme

Awarded

SATOCROSS - Support of Advanced Test cOverage Criteria for RObust and Secure Software

Dr. Michail Papadakis INTER (with ANR)

SURCVS - Secure, Usable, Robust Cryptographic Voting Systems Prof. Dr. Peter Y. A. Ryan and Prof. Dr. Sjouke Mauw

INTER (with RCN)

Ongoing

CRC 1223 - Methods and Tools for Holistic, Agile Privacy Prof. Dr. Lionel Briand INTER (with DFG)

SEQUOIA - Security Properties, Process Equivalences, and Automa-ted Verification

Prof. Dr. Peter Y. A. Ryan INTER (with ANR)

SIERRA - Spectral Efficient Receivers and Resource Allocation for Satellite Cognitive Systems

Dr. Symeon Chatzinotas INTER (with ANR)

CI-PHY - Exploiting Interference for Physical Layer Security in 5G Networks

Dr. Symeon Chatzinotas INTER (with RCUK)

EDLAH2 - Enhanced Daily Living and Health 2 - an incentive based service

Prof. Dr. Lionel Briand INTER (with AAL)

InWIPNET - Integrated Wireless Information and Power Networks Prof. Dr. Björn Ottersten INTER (with FNRS)

CONTACT - CONtext and conTent Aware CommunicaTions for QoS support in VANETs

Prof. Dr. Thomas Engel INTER (with SNF)

Completed

MaDSAV - MAintaining Driving Skills in Semi-Autonomous Vehicles

Prof. Dr. Thomas Engel INTER (with FWF)

6262 63

Projects Projects

back to table of contents

Page 33: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

OTHER PROJECTS

Project Principal Investigator Programme

Awarded

Building an In-car Ethernet Testbed System Prof. Dr. Thomas Engel Honda Initiation Grant Europe

HUNTED - Heterogeneous multi-swarms of UNmanned auTono-mous systEms for mission Deployment

Prof. Dr. Pascal Bouvry (Co-PI Dr. Grégoire Danoy)

US NAVAL Research Office

Ongoing

MIRI - L‘Interaction mobile au service de l’intégration Prof. Dr. Charles Max Fond Asile Migra-tion integration

MOVIDA - Model-driven Trace Checking of Quantitative Properties Using Big Data Technologies

Dr. Mehrdad Sabetzadeh IRP

FDISC - Future Directions in Symmetric Cryptography Prof. Dr. Alex Biryukov IRP

ReACP - Context and Business Aware Reverse-engineering and Testing for Access Control Policies

Prof. Dr. Lionel Briand IRP

CritiX-CARS - Architectural Support for Efficient Domain-specific Byzantine Fault and Intrusion Tolerance

Prof. Dr. Paulo Esteves-Veríssimo Intel Grant

SEC-PBN - Scalable External Control of Probabilistic Boolean Networks

Dr. Jun Pang (co-PI Prof. Dr. Thomas Sauter)

IRP

HitDroid - Hinting at Malicious Code in Android Apps Identifying Malicious Payloads in Malware at Market Scale with Graph and Data Clustering Techniques

Dr. Jacques Klein IRP

VulFix - Automated Fixing of Program Vulnerabilities in the Android Ecosystem

Prof. Dr. Yves Le Traon IRP

Completed

Cyber-Net - Cyber-Security of Networked Control Systems Using an Event-based Control Approach

Prof. Dr. Holger Voos IRP

REQUISITE - Reconciling the Uneasy Relationship between the Economics of Personal Data and Privacy

Prof. Dr. Peter Y. A. Ryan IRP

HONDA - Securing Smart Entry Systems Prof. Dr. Thomas Engel Honda Initiative Grant Europe Program

UNIQUE - Unclonable Networks for Identification using Cholesteric Emulsions

Dr. Gabriele Lenzini (co-PI Prof. Dr. Jan Lagerwall)

IRP

OTHER PROJECTS FUNDED BY FNR

Project Principal Investigator Programme

Awarded

SIMMS - Swarm Intelligent Mission systeMS Dr. Grégoire Danoy POC

PreMaas - Predictive Maintenance as a Service Dr. Jorge Augusto Meira POC

NoCry PoC - No More Cryptographic Ransomware, Proof of Concept

Dr. Gabriele Lenzini POC

GenoMask-POC - Early Stage Read Filtering and Masking of Genomic Information

Dr. Marcus Völp POC

LuxLogAI 2018 - Luxembourg Logic for AI Summit (LuxLogAI) Prof. Dr. Leon Van Der Torre RESCOM

AURORA - unpredictAble Uav swaRms fOr suRveillAnce Dr. Grégoire Danoy PATHFINDER

Smart Schoul 2025 - Smart Schoul 2025: The Future Luxembourg Smart School

Dr. Djamila Aouada PSP

PREMA - PREdictive MAintenance Analysis Dr. Jorge Augusto Meira PATHFINDER

QOE-WiC - Distributed optimization and dynamic programming for wireless edge caching to maximize quality of experience

Dr. Symeon Chatzinotas INTER MOBILITY

DAPROSELF - Data Protection Self-assessment Method For SMEs Dr. Andra Giurgiu PATHFINDER

SIGMMA - Secure, Interoperable and Global Mobile Money in Sub-Saharan Africa

Dr. Tegawendé Bissyande PATHFINDER

Autonomous Driving Demo Dr. Raphaël Frank RESEARCHERS NIGHT/DAY

NoCry - No More Cryptographic Ransomware Dr. Gabriele Lenzini PATHFINDER

GenoMask - Early Stage Read Filtering and Masking of Genomic Information

Dr. Marcus Völp PATHFINDER

Ongoing

TTO2.0-Leader Prof. Dr. Björn Ottersten KITS

IISD - Strategic RTnD Program on Information Infrastructure Securi-ty and Dependability

Prof. Dr. Paulo Esteves-Veríssimo PEARL

IndusPartnership2.0 Dr. Marc Lemmer KITS

Completed

ARMLET - Automated Retrieval of Metadata from Legal Texts Dr. Mehrdad Sabetzadeh POC

ProCRob3 - PROgramming Cognitive ROBots 3 Prof. Dr. Leon Van Der Torre POC

SERENADE - Satellite Precoding Hardware Demonstrator Dr. Symeon Chatzinotas POC

RAFAEL - RainFall Estimation Using Signalling Data of Satellite Communication Network

Dr. Bhavani Shankar POC

AFI - Air Frame Inspection Dr. Miguel Angel Olivares-Mendez POC

V&V Lab - Verification and Validation Laboratory Prof. Dr. Lionel Briand PEARL

We would like to thank the following organisations for their support:

6464 65

Projects Projects

back to table of contents

Page 34: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

Articles in Academic Journals

1. Abu Shaban, Z., Mehrpouyan, H., Shankar, B., & Ottersten, B. (2018). Reduced Complexity Satellite Broadcast Receiver with Interference Mitigation in Correlated Noise. International Journal of Satellite Communications and Networking, 36(5)

2. Adamsky, F., Aubigny, M., Battisti, F., Carli, M., Cimorelli, F., Cruz, T., Di Giorgio, A., Foglietta, C., Galli, A., Giuseppi, A., Liberati, F., Neri, A., Panzieri, S., Pascucci, F., Proenca, J., Pucci, P., Rosa, L., & Soua, R. (2018). Integrated Protection of Industrial Control Systems from Cyber-attacks: the ATENA Approach. Elsevier International Journal of Critical Infrastructure Protection

3. Afzal, H., Aouada, D., Mirbach, B., & Ottersten, B. (2018, January). Full 3D Reconstruction of Non-rigidly Deforming Objects. ACM Trans-actions on Multimedia Computing, Communi-cations, & Applications

4. Alferez, M., Acher, M., Galindo, J., Baudry, B., & Benavides, D. (2018, March). Modeling Variability in the Video Domain: Language and Experience Report. Software Quality Journal

5. Alodeh, M., Spano, D., Kalantari, A., Tsinos, C., Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2018, April). Symbol-level and Multicast Precoding for Multiuser Multiantenna Down-link: A State-of-the-art, Classification and Challenges. IEEE Communications Surveys and Tutorials

6. An, K., Liang, T., Zheng, G., Yan, X., Li, Y., & Chatzinotas, S. (2018). Performance Limits of Cognitive Uplink FSS and Terrestrial FS for Ka-Band. IEEE Transactions on Aerospace and Electronic Systems

7. Appelt, D., Nguyen, C. D., Panichella, A., & Briand, L. (2018). A Machine Learning-driven Evolutionary Approach for Testing Web Application Firewalls. IEEE Transactions on Reliability, 67(3), 733-757

14. Spano, D. (2018). Advanced Symbol-level Precoding Schemes for Interference Exploi-tation in Multi-antenna Multi-user Wireless Communications. Unpublished doctoral thesis, University of Luxembourg, Luxembourg

15. Symeonidis, I. (2018). Analysis and Design of Privacy-enhancing Information Sharing Sys-tems. Unpublished doctoral thesis, University of Luxembourg, Luxembourg

16. Thome, J. (2018). A Scalable and Accurate Hybrid Vulnerability Analysis Framework. Unpublished doctoral thesis, University of Luxembourg, Luxembourg

17. Wang, J. (2018). Privacy-preserving Recom-mender Systems Facilitated by The Machine Learning Approach. Unpublished doctoral thesis, University of Luxembourg, Luxembourg

Doctoral Theses

1. Annaiyan, A. (2018). Collision-free Navigation of Small UAVs in Complex Urban Environ-ments. Unpublished doctoral thesis, University of Luxembourg, Luxembourg

2. Dentler, J. E. (2018). Real-time Model Predic-tive Control for Aerial Manipulation. Unpublis-hed doctoral thesis, University of Luxembourg, Luxembourg

3. Derrmann, T. (2018). Mobile Network Data Analytics for Intelligent Transportation Sys-tems. Unpublished doctoral thesis, University of Luxembourg, Luxembourg

4. Jimenez, M. (2018). Evaluating Vulnerability Prediction Models. Unpublished doctoral thesis, University of Luxembourg, Luxembourg

5. Li, D. (2018). Transforming Time Series for Efficient and Accurate Classification. Unpublis-hed doctoral thesis, University of Luxembourg, Luxembourg

6. Mengali, A. (2018). Link Optimization in Future Generation Satellite Systems. Unpublished doctoral thesis, University of Luxembourg, Luxembourg

7. Muller, S. (2018). Risk Monitoring and Intru-sion Detection for Industrial Control Systems. Unpublished doctoral thesis, University of Luxembourg, Luxembourg

8. Perrin, L. (2018). Cryptanalysis, Reverse-engi-neering and Design of Symmetric Cryptogra-phic Algorithms. Unpublished doctoral thesis, University of Luxembourg, Luxembourg

9. Politis, C. (2018). Spectrum Monitoring Algo-rithms for Wireless and Satellite Communica-tions. Unpublished doctoral thesis, University of Luxembourg, Luxembourg

10. Sajadi Alamdari, S. A. (2018). Stochastic Mo-del Predictive Control for Eco-Driving Assistan-ce Systems in Electric Vehicles. Unpublished doctoral thesis, University of Luxembourg, Luxembourg

11. Sanchez Guinea, A. (2018). Engineering Smart Software Services for Intelligent Pervasive Systems. Unpublished doctoral thesis, Uni-versity of Luxembourg, Luxembourg

12. Signorello, S. (2018). A Multifold Approach to Address the Security Issues of Stateful Forwarding Mechanisms in Information-cen-tric Networks. Unpublished doctoral thesis, Unpublished doctoral thesis, University of Luxembourg, Luxembourg

13. Spagnuelo, D. P. B. (2018). Defining, Measu-ring, and Enabling Transparency for Electronic Medical Systems. Unpublished doctoral thesis, University of Luxembourg, Luxembourg

8. Arcuri, A. (2018). An Experience Report On Applying Software Testing Academic Results in Industry: We Need Usable Automated Test Generation. Empirical Software Engineering, 23(4)

9. Arcuri, A. (2018). Test Suite Generation with the Many Independent Objective (MIO) Algo-rithm. Information and Software Technology, 104(December), 195-206

10. Artiga, X., Pérez-Neira, Baranda, Lagunas, E., Chatzinotas, S., Zetik, R., Gorski, P., Ntougias, K., Pérez, D., & Ziaragkas, G. (2018, October). Shared Access Satellite-terrestrial Reconfi-gurable Backhaul Network Enabled by Smart Antennas at MmWave Band. IEEE Network

11. Bartolini, C., Santos, C., & Ullrich, C. (2018). Property and the Cloud. Computer Law & Security Report

12. Basili, V., Briand, L., Bianculli, D., Nejati, S., Pastore, F., & Sabetzadeh, M. (2018). Soft-ware Engineering Research and Industry: A Symbiotic Relationship to Foster Impact. IEEE Software, 35(5), 44-49

13. Bavle, H., Sanchez Lopez, J. L., de la Puente, P., Rodriguez-Ramos, A., Sampedro, C., & Campoy, P. (2018). Fast and Robust Flight Alti-tude Estimation of Multirotor UAVs in Dynamic Unstructured Environments Using 3D Point Cloud Sensors. Aerospace, 5(3)

14. Beierle, C., Canteaut, A., & Leander, G. (2018). Nonlinear Approximations in Cryptanalysis Revisited. IACR Transactions on Symmetric Cryptology, 2018(4), 80-101

15. Blanchet, B., & Smyth, B. (2018). Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers. Journal of Computer Security, 26(3), 367-422

16. Cazzato, D., Dominio, F., Manduchi, R., & Castro, S. (2018, February 07). Real-time Gaze Estimation via Pupil Center Tracking. Paladyn. Journal of Behavioral Robotics

17. Cazzato, D., Leo, M., Distante, C., Crifaci, G., Bernava, G. M., Ruta, L., Pioggia, G., & Castro, S. (2018). An Ecological Visual Exploration Tool to Support the Analysis of Visual Processing Pathways in Children with Autism Spectrum Disorders. Journal of Imaging

18. Chang, Z., Lei, L., Zhang, H., Ristaniemi, T., Chatzinotas, S., Ottersten, B., & Han, Z. (2018). Energy-efficient and Secure Resource Allocation for Multiple-antenna NOMA with Wireless Power Transfer. IEEE Transactions on Green Communications and Networking

19. Chang, Z., Lei, L., Zhou, Z., Mao, S., & Ristanie-mi, T. (2018, June). Learn to Cache: Machine Learning for Network Edge Caching in the Big Data Era. IEEE Wireless Communications

20. Charlier, J. H. J., & State, R. (2018). Non-Nega-tive Paratuck2 Tensor Decomposition Com-bined to LSTM Network for Smart Contracts Profiling. International Journal of Computer & Software Engineering, 3(1)

21. Cui, Y., Wang, Z., Yang, Y., Yang, F., Ding, L., & Qian, L. (2018). Joint and Competitive Caching Designs in Large-scale Multi-tier Wireless Multicasting Networks. IEEE Transactions on Communications, 66(6), 3108-3121

22. Dashevskyi, S., Brucker, A. D., & Massacci, F. (2018). A Screening Test for Disclosed Vulnerabilities in FOSS Components. IEEE Transactions on Software Engineering, 1-1

23. Decouchant, J., Fernandes, M., Volp, M., Couto, F. M., & Verissimo, P. (2018). Accurate Filtering of Privacy-Sensitive Information In Raw Genomic Data. Journal Of Biomedical Informatics

24. Demisse, G., Aouada, D., & Ottersten, B. (2018). Deformation Based 3D Facial Expres-sion Representation. ACM Transactions on Multimedia Computing, Communications, & Applications

25. Dentler, J. E., Kannan, S., Bezzaoucha, S., Olivares-Mendez, M. A., & Voos, H. (2018). Model Predictive Cooperative Localization Control of Multiple Uavs Using Potential Function Sensor Constraints. Autonomous Robots, 1-26

26. Dentler, J. E., Rosalie, M., Danoy, G., Bouvry, P., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2018, April 20). Collision Avoidance Effects on the Mobility of a UAV Swarm Using Chaotic Ant Colony with Model Predictive Control. Journal of Intelligent & Robotic Systems, 1-17

27. Devroey, X., Perrouin, G., Papadakis, M., Legay, A., Schobbens, P.-Y., & Heymans, P. (2018). Model-based Mutant Equivalence Detection Using Automata Language Equivalence and Simulations. Journal of Systems and Software

28. Dinu, D.-D., Le Corre, Y., Khovratovich, D., Per-rin, L. P., Groszschädl, J., & Biryukov, A. (2018). Triathlon of Lightweight Block Ciphers for the Internet of Things. Journal of Cryptographic Engineering

29. Domouchtsidis, S., Tsinos, C., Chatzinotas, S., & Ottersten, B. (2018, December 13). Sym-bol-level Precoding for Low Complexity Trans-mitter Architectures in Large-scale Antenna Array Systems. IEEE Transactions on Wireless Communications (Early Access), 1-1

30. Fletcher, S., De Vries, M., & Max, C. (2018). Die technische Mündigkeit von Schüler/-in-nen zum Ende der Sek. I im internationalen Vergleich – Entwicklung eines Testwerk-instruments und erste Ergebnisse. Journal of Technical Education, 6(4)

31. Fröhlich, A. A., Scheffel, M. R., Kozhaya, D., & Verissimo, P. (2018, September 19). Byzantine Resilient Protocol for the IoT. IEEE Internet of Things Journal

32. Garousi, V., Felderer, M., Karapıçak, Ç. M., & Yılmaz, U. (2018). What we Know about Testing Embedded Software. IEEE Software, 35(4), 62-69

33. Gautam, S., Vu, T. X., Chatzinotas, S., & Ot-tersten, B. (2018). Cache-aided Simultaneous Wireless Information and Power Transfer (SWIPT) with Relay Selection. IEEE Journal on Selected Areas In Communications

34. Giudotti, A., Vanelli-Coralli, A., Conti, M., Andrenacci, S., Chatzinotas, S., Maturo, N., Evans, B., Awoseyila, A., Ugolini, T., Foggi, L., Gaudio, N., Alagha, N., & Cioni, S. (2018). Architectures and Key Technical Challenges for 5G Systems Incorporating Satellites. IEEE Transactions on Vehicular Technology

35. Hajri, I., Göknil, A., Briand, L., & Stephany, T. (2018). Change Impact Analysis for Evolving Configuration Decisions in Product Line Use Case Models. Journal of Systems and Soft-ware, 139, 211-237

36. Hajri, I., Göknil, A., Briand, L., & Stephany, T. (2018). Configuring Use Case Models in Pro-duct Families. Software & Systems Modeling, 17(3), 939-971

37. Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2018). Constructive Interference for Generic Constellations. IEEE Signal Processing Letters, 25(4), 586-590

38. Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2018). PowerMinimizer Symbol-Level Precoding: A Closed-Form Sub-Optimal Solu-tion. IEEE Signal Processing Letters, 25(11), 1730-1734

39. Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2018). Symbol-Level Precoding Design Based on Distance Preserving Constructive Interfe-rence Regions. IEEE Transactions on Signal Processing, 66(22), 5817-5832

40. Hooshiary, A., Azmi, P., Mokari, N., & Maleki, S. (2018). Optimal Channel Selection for Simultaneous RF Energy Harvesting and Data Transmission in Cognitive Radio Networks. Transactions on Emerging Telecommunications Technologies

41. Ibrahim, A. A. Z. A., Wasim, M. U., Varrette, S., & Bouvry, P. (2018). PRESENCE: Monitoring and Modelling the Performance Metrics of Mobile Cloud SaaS Web Services. Mobile Information Systems, 2018(1351386)

42. Jordanou, J. P., Camponogara, E., Antonelo, E. A., & S. de Aguiar, M. A. (2018). Nonlinear Model Predictive Control of an Oil Well with Echo State Networks. IFAC-PapersOnLine, 51, 13-18

43. Karpenko, A., Kinnunen, T., Madhikermi, M., Robert, J., Främling, K., Dave, B., & Nurminen, A. (2018, December 13). Data Exchange Inter-operability in IoT Ecosystem for Smart Parking and EV Charging. Sensors

44. Kintis, M., Papadakis, M., Papadopoulos, A., Valvis, E., Malevris, N., & Le Traon, Y. (2018). How Effective are Mutation Testing Tools? An Empirical Analysis of Java Mutation Testing Tools with Manual Analysis and Real Faults. Empirical Software Engineering

45. Kong, P., Li, L., Gao, J., Liu, K., Bissyande, T. F. D. A., & Klein, J. (2018, September 03). Automated Testing of Android Apps: A Sys-tematic Literature Review. IEEE Transactions on Reliability, 1-22

46. Kozhaya, D., Decouchant, J., & Verissimo, P. (2018). RT-ByzCast: Byzantine-resilient Real-ti-me Reliable Broadcast. IEEE Transactions on Computers

47. Krivochiza, J., Merlano Duncan, J. C., Andren-acci, S., Chatzinotas, S., & Ottersten, B. (2018). Computationally and Energy Efficient Sym-bol-level Precoding Communications Demonst-rator. Physical Communication, 28, 108-115

48. Krüger, K., Volp, M., & Fohler, G. (2018). Vul-nerability Analysis and Mitigation of Directed Timing Inference Based Attacks on Time-Trig-gered Systems. LIPIcs-Leibniz International Proceedings in Informatics, 106, 22:1-22:17

49. Kubler, S., Derigent, W., Voisin, A., Robert, J., Le Traon, Y., & Herrera Viedma, E. (2018, September 27). Measuring Inconsistency and Deriving Priorities from Fuzzy Pairwise Com-parison Matrices using the Knowledge-Based Consistency Index. Knowledge-based Systems

50. Kubler, S., Robert, J., Neumaier, S., Umbrich, J., & Le Traon, Y. (2018, January 01). Compari-son of Metadata Quality in Open Data Portals Using the Analytic Hierarchy Process. Govern-ment Information Quarterly

51. Lei, L., Lagunas, E., Chatzinotas, S., & Ot-tersten, B. (2018). NOMA Aided Interference Management for Full-Duplex Self-Backhauling HetNets. IEEE Communications Letters, 22(8), 1696-1699

52. Li, Y., Duan, K., Jansen, D., Pang, J., Zhang, L., Lv, Y., & Cai, S. (2018). An Automatic Proving Approach to Parameterized Verification. ACM Transactions on Computational Logic, 19(4), 1-27

53. Lin, Z., Lin, M., Ouyang, J., Zhu, W.-P., & Chat-zinotas, S. (2018). Beamforming for Secure Wireless Information and Power Transfer in Terrestrial Networks Coexisting With Satellite Networks. IEEE Signal Processing Letters

54. Liu, B., Nejati, S., Lucia, L., & Briand, L. (2018). Effective Fault Localization of Automotive Simulink Models: Achieving the Trade-off bet-

Publications

6666 67

Publications Publications

back to table of contents

Page 35: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

78. Shaat, M., Lagunas, E., Pérez-Neira, A., & Chatzinotas, S. (2018). Integrated Terrestri-al-satellite Wireless Backhauling: Resource Management and Benefits for 5G. IEEE Vehicular Technology Magazine

79. Shamshiri, Rojas, Gazzola, Fraser, McMinn, Mariani, & Arcuri, A. (2018). Random or Evolu-tionary Search for Object-oriented Test Suite Generation? Software Testing, Verification & Reliability, 28(4), 1660

80. Sharma, S. K., Bogale, T. E., le, L. B., Chatzi-notas, S., Wang, X., & Ottersten, B. (2018). Dynamic Spectrum Sharing in 5G Wireless Networks with Full-Duplex Technology: Recent Advances and Research Challenges. IEEE Communications Surveys & Tutorials, 20(1), 674-707

81. Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (2018). Augmenting and Structuring User Queries to Support Efficient Free-form Code Search. Empirical Software Engineering, 90, 27-39

82. Soltana, G., Sannier, N., Sabetzadeh, M., & Briand, L. (2018). Model-based Simulation of Legal Policies: Framework, Tool Support, and Validation. Software & Systems Modeling, 17(3), 851-883

83. Spano, D., Alodeh, M., Chatzinotas, S., & Ottersten, B. (2018). Faster-than-Nyquist Signaling through Spatio-temporal Symbol-le-vel Precoding for the Multiuser MISO Down-link Channel. IEEE Transactions on Wireless Communications

84. Spano, D., Alodeh, M., Chatzinotas, S., & Ottersten, B. (2018). Symbol-level Precoding for the Nonlinear Multiuser MISO Downlink Channel. IEEE Transactions on Signal Proces-sing, 66(5), 1331-1345

85. Spano, D., Chatzinotas, S., Andrenacci, S., Krause, J., & Ottersten, B. (2018, March). Per-antenna Power Minimization in Symbol-le-vel Precoding for the Multi-beam Satellite Downlink. International Journal of Satellite Communications and Networking

86. Symeonidis, I., Biczók, G., Shirazi, F., Pé-rez-Solà, C., Schroers, J., & Preneel, B. (2018). Collateral Damage of Facebook Third-party Applications: a Comprehensive Study. Compu-ters & Security, 77, 179-208

87. Szalay, Z., Tettamanti, T., Esztergár-Kiss, D., Varga, I., & Bartolini, C. (2018). Development of a Test Track For Driverless Cars: Vehicle Design, Track Configuration, And Liability Considerations. Periodica Polytechnica Trans-portation Engineering, 46(1), 29-35

88. Tervo, O., Tran, L.-N., Pennanen, H., Chatzino-tas, S., Ottersten, B., & Juntti, M. (2018). Ener-gy-Efficient Multicell Multigroup Multicasting with Joint Beamforming and Antenna Selec-tion. IEEE Transactions on Signal Processing

Textual and Structural Smells. IEEE Trans-actions on Software Engineering, 44(10), 977-1000

67. Panichella, A., Kifetew, F., & Tonella, P. (2018). Automated Test Case Generation as a Ma-ny-Objective Optimisation Problem with Dyna-mic Selection of the Targets. IEEE Transactions on Software Engineering, 44(2), 122-158

68. Papazafeiropoulos, A., Sharma, S., Ratnarajah, T., & Chatzinotas, S. (2018). ‘Impact of Residu-al Additive Transceiver Hardware Impairments on RayleighProduct MIMO Channels with Line-ar Receivers: Exact and Asymptotic Analyses. IEEE Transactions on Communications

69. Perera, T. D. P., Jayakody, D. N., Sharma, S. K., Chatzinotas, S., & Li, J. (2018). Simultaneous Wireless Information and Power Trans-fer (SWIPT): Recent Advances and Future Challenges. IEEE Communications Surveys and Tutorials, 20(1), 264-302

70. Politis, C., Maleki, S., Merlano Duncan, J. C., Krivochiza, J., Chatzinotas, S., & Ottersten, B. (2018). SDR Implementation of a Testbed for Real-time Interference Detection with Signal Cancellation. IEEE Access

71. Quaglia, E. A., & Smyth, B. (2018). Secret, Verifiable Auctions from Elections. Theoretical Computer Science, 730, 44-92

72. Rosalie, M., Danoy, G., Chaumette, S., & Bouv-ry, P. (2018). Chaos-enhanced Mobility Models for Multilevel Swarms of UAVs. Swarm and Evolutionary Computation

73. Ruan, M., Titcheu Chekam, T., Zhai, E., Li, Z., Liu, Y., E, J., Cui, Y., & Xu, H. (2018). On the Synchronization Bottleneck of OpenStack Swift-like Cloud Storage Systems. IEEE Trans-actions on Parallel and Distributed Systems, PP(99), 1-1

74. Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2018, November 27). Ecological Advanced Driver Assistance System for Optimal Energy Management in Electric Vehicles. IEEE Intelli-gent Transportation Systems Magazine

75. Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2018, December 03). Nonlinear Model Pre-dictive Control for Ecological Driver Assistance Systems in Electric Vehicles. Robotics and Autonomous Systems

76. Sanchez Lopez, J. L., Wang, M., Olivares Men-dez, M. A., Molina, M., & Voos, H. (2018, April 07). A Real-Time 3D Path Planning Solution for Collision-free Navigation of Multirotor Aerial Robots in Dynamic Environments. Journal of Intelligent and Robotic Systems

77. Schwartz, M., Lenzini, G., Geng, Y., Roenne, P., Ryan, P., & Lagerwall, J. (2018, May 14). Cholesteric Liquid Crystal Shells as Enabling Material for Information-rich Design and Architecture. Advanced Materials, 1707382

ween Test Oracle Effort and Fault Localization Accuracy. Empirical Software Engineering, 47

55. Liu, Z., Choo, K.-K. R., & Groszschädl, J. (2018). Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-based Crypto-graphy. IEEE Communications Magazine, 56(2), 158-162

56. Mai, X. P., Göknil, A., Shar, L. K., Pastore, F., Briand, L., & Shaame, S. (2018). Modeling Security and Privacy Requirements: a Use Ca-se-driven Approach. Information and Software Technology, 100, 165-182

57. Martinez, J., Ziadi, T., Papadakis, M., Bissyan-de, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Feature Location Benchmark for Extractive Software Product Line Adoption Research Using Realistic and Synthetic Eclipse Variants. Information and Software Technology

58. Matinnejad, R., Nejati, S., Briand, L., & Bruckmann, T. (2018). Test Generation and Test Prioritization for Simulink Models with Dyna-mic Behavior. IEEE Transactions on Software Engineering, 25

59. Mauw, S., Ramirez Cruz, Y., & Trujillo Rasua, R. (2018). Anonymising Social Graphs in the Presence of Active Attackers. Transactions on Data Privacy, 11(2), 169-198

60. Mazzali, N., Boumard, S., Kinnunen, J., Shan-kar, B., Kiviranta, M., & Alagha, N. (2018, July 10). Enhancing Mobile Services with DVB-S2X Superframing. International Journal of Satelli-te Communications and Networking, 1-25

61. Mizera, A., Pang, J., Su, C., & Yuan, Q. (2018). ASSA-PBN: A Toolbox for Probabilistic Boolean Networks. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 15(4), 1203-1216

62. Mizera, A., Pang, J., & Yuan, Q. (2018). Revi-ving the two-state Markov chain approach. IEEE/ACM Transactions on Computational Biology and Bioinformatics

63. Neveu, E., Popov, P., Hoffmann, A., Migliosi, A., Besseron, X., Danoy, G., Bouvry, P., & Grudinin, S. (2018). RapidRMSD: Rapid Determination of RMSDs Corresponding to Motions of Flexible Molecules. Bioinformatics

64. Ostaszewski, M., Kieffer, E., Danoy, G., Schneider, R., & Bouvry, P. (2018). Clustering Approaches for Visual Knowledge Exploration in Molecular Interaction Networks. BMC bioinformatics, 19(1), 308

65. Ostrev, D., & Vidick, T. (2018). Entanglement of Approximate Quantum Strategies in XOR Games. Quantum Information and Computa-tion, 18(7&8), 0617–0631

66. Palomba, F., Panichella, A., Zaidman, A., Oliveto, R., & De Lucia, A. (2018). The Scent of a Smell: An Extensive Comparison between

89. Tessaro Lunardi, W., & Voos, H. (2018). An Extended Flexible Job Shop Scheduling Pro-blem with Parallel Operations. ACM SIGAPP Applied Computing Review, 18(2), 46-56

90. Thome, J., Shar, L. K., Bianculli, D., & Briand, L. (2018). Security Slicing for Auditing Common Injection Vulnerabilities. Journal of Systems and Software, 137(March, 2018), 766-783

91. Tsinos, C., & Ottersten, B. (2018). An Effi-cient Algorithm for Unit-modulus Quadratic Programs with Application in Beamforming for Wireless Sensor Networks. IEEE Signal Processing Letters

92. Vazquez, M.-A., Shankar, B., Kourogiorgas, C., Arapoglou, P.-D., Icolari, V., Chatzinotas, S., Panagopoulos, A., & Perez-Neira, A. (2018). Precoding, Scheduling and Link Adaptation in Mobile Interactive Multibeam Satellite Systems. IEEE Journal on Selected Areas In Communications, 36(5), 971-980

93. Vu, T. X., Chatzinotas, S., & Ottersten, B. (2018, February). Edge-caching Wireless Networks: Performance Analysis and Optimization. IEEE Transactions on Wireless Communications

94. Vu, T. X., Chatzinotas, S., Ottersten, B., & Duong, T. Q. (2018). Energy Minimization for Cache-Assisted Content Delivery Networks With Wireless Backhaul. IEEE Wireless Communications Letters, 7(3), 332-335

95. Vuppala, S., Vu, T. X., Gautam, S., Chatzinotas, S., & Ottersten, B. (2018, March 25). Cache-ai-ded Millimeter Wave Ad-Hoc Networks with Contention-based Content Delivery. IEEE Transactions on Communications

96. Wang, J., Sun, J., Yuan, Q., & Pang, J. (2018). Learning Probabilistic Models for Model Checking: An Evolutionary Approach and an Empirical Study. International Journal on Software Tools for Technology Transfer, 20(6), 689-704

97. Xue, J., Biswas, S., Cirik, A. C., Du, H., Yang, Y., Ratnarajah, T., & Sellathurai, M. (2018). Transceiver Design of Optimum Wirelessly Powered Full-Duplex MIMO IoT Devices. IEEE Transactions on Communications, 66(5), 1955-1969

98. Yang, Y., Pesavento, M., Chatzinotas, S., & Ottersten, B. (2018). Successive Convex Approximation Algorithms for Sparse Signal Estimation with Nonconvex Regularizations. IEEE Journal of Selected Topics in Signal Processing, 12(6), 1-19

99. You, L., Yuan, D., Lei, L., Sun, S., Chatzinotas, S., & Ottersten, B. (2018, July). Resource Optimization with Load Coupling in Multi-Cell NOMA. IEEE Transactions on Wireless Communications

Books

Written in Collaboration

1. Andrenacci, S., Duncan, J. C. M., Krivochiza, J., & Chatzinotas, S. (2018). Satellite Mul-ti-Beam Precoding Hardware Demonstrator, Satellite Communications in the 5G Era. IET

2. Politis, C., Kalantari, A., Maleki, S., & Chatzi-notas, S. (2018). On-Board Interference Detec-tion and Localization for SATCOM, Satellite Communications in the 5G Era. IET

Editor of Collective Works

1. Bianculli, D., Medvidovi , N., & Rosenblum, D. R. (Eds.). (2018). 40 Editions of ICSE: the Ruby Anniversary Celebration. self-published

2. Pang, J., Zhang, C., He, J., & Weng, J. (Eds.). (2018). Proceedings of the 12th International Symposium on Theoretical Aspects of Soft-ware Engineering. IEEE Computer Society

3. Sharma, S. K., Chatzinotas, S., & Arapoglou, P.-D. (Eds.). (2018). Satellite Communications in the 5G Era. IET

Chapters of Collective Works

1. Bouvry, P., Varrette, S., Wasim, M. U., Ibrahim, A. A. Z. A., Besseron, X., & Trinh, T. A. (2018). Security, Reliability and Regulation Compli-ance in Ultrascale Computing Systems. In J., Carretero & E., Jeannot (Eds.), Ultrascale Computing Systems. IET

2. Glauner, P. (2018). Künstliche Intelligenz-die nächste Revolution (The Artificial Intelligence Revolution). In P., Plugmann, Innovationsum-gebungen gestalten: Impulse für Start-ups und etablierte Unternehmen im globalen Wett-bewerb. Springer

3. Max, C. (2018). An Activity Theoretical Re-search Lens on Inquiry-based Learning. In M. J., de Vries, S., Fletcher, S., Kruse, P., Labudde, M., Lang, I., Mammes, C., Max, D., Münk, B., Nicholl, J., Strobel, & M., Winterbottom, Re-search in Technology Education: International Approaches (pp. 147-168). Münster, Germany: Waxmann

Scientific Congresses, Symposiums and Conference Proceedings: Paper Published in a Book

1. Adamsky, F ., Retunskaia, T., Schiffner, S., & Engel, T. (2018). WLAN Device Fingerprinting Using Channel State Information (CSI). 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec)

2. Alaee-Kerahroodi, M., Modarres-Hashemi, M., Naghsh, M. M. N., Shankar, B., & Ottersten, B. (2018). Binary Sequences Set with Small ISL for MIMO Radar Systems. 2018 26th European Signal Processing Conference (EUSIPCO). IEEE

3. Alodeh, M., Chatzinotas, S., & Ottersten, B. (2018). User Selection for Symbol-level Multig-roup Multicasting Precoding in the Downlink of MISO Channels. 2018 IEEE International Conference on Communications (ICC). IEEE

4. Arcuri, A. (2018). Evaluating Search-Based Techniques with Statistical Tests. The Se-arch-Based Software Testing (SBST) Workshop

5. Arcuri, A. (2018). EvoMaster: Evolutionary Multi-context Automated System Test Gene-ration. IEEE Conference on Software Testing, Validation and Verification

6. Arora, A., Maleki, S., Shankar, B., Grotz, J., & Ottersten, B. (2018). Interference Localization On-board the Satellite Using Drift Induced Vir-tual Array. Proc. 2018 International Conference on Signal Processing and Communications (SPCOM)

7. Atashpendar, A., Policharla, G. V., Roenne, P., & Ryan, P. (2018). Revisiting Deniability in Quantum Key Exchange via Covert Communi-cation and Entanglement Distillation. Secure IT Systems, 23rd Nordic Conference, NordSec 2018. Lecture Notes in Computer Science, vol 11252. Springer, Cham (pp. 104-120). Springer

8. Bana, G., Chadha, R., & Eeralla, A. (2018). For-mal Analysis of Vote Privacy Using Computa-tionally Complete Symbolic Attacker. ESORICS 2018, 23rd European Symposium on Research in Computer Security (pp. 350–372)

9. Bandi, A. (2018). A Novel Approach to Joint User Selection and Precoding for Multiuser MISO Downlink Channels. In A., Bandi, B., Shankar, S., maleki, S., Chatzinotas, & B., Ot-tersten, 6th IEEE Global Conference on Signal and Information Processing

10. Bandi, A. (2018). Sparsity-Aided Low-Imple-mentation cost based On-Board beamforming Design for High Throughput Satellite Systems. In A., Bandi, V., Joroughi, B., Shankar, J., grotz, & B., Ottersten, 9th Advanced Satellite Multi-media Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC) (pp. 1-6)

11. Baniasadi, Z., Parent, X., Max, C., & Creamer, M. (2018). A Model for Regulating of Ethical Preferences in Machine Ethics. Proceedings of International Conference on Human-Computer Interaction, (pp. 481-506)

12. Baptista, R., Antunes, M., Aouada, D., & Ottersten, B. (2018). Anticipating Suspicious Actions using a Small Dataset of Action Tem-plates. 13th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP)

13. Baptista, R., Demisse, G., Aouada, D., & Ottersten, B. (2018). Deformation-based Ab-normal Motion Detection using 3D Skeletons. IEEE International Conference on Image Pro-cessing Theory, Tools and Applications (IPTA)

6868 69

Publications Publications

back to table of contents

Page 36: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

35. Dominico, S., Almeida, E. C., Meira, J. A., & Alves, M. A. Z. (2018). An Elastic Multi-Core Allocation Mechanism for Database Systems. International Conference on Data Engineering (ICDE)

36. Domouchtsidis, S., Tsinos, C., Chatzinotas, S., & Ottersten, B. (2018). Antenna Selection Symbol-level Precoding for Low Complexity Large-scale Antenna Array Systems. 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE

37. Dong, F., Wang, H., Li, L., Guo, Y., Bissyande, T. F. D. A., Liu, T., Xu, G., & Klein, J. (2018). Fraud Droid: Automated Ad Fraud Detection for Android Apps. ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018) (pp. 257-268)

38. Dou, W., Bianculli, D., & Briand, L. (2018). Mo-del-driven Trace Diagnostics for Pattern-based Temporal Specifications. Proceedings of the 2018 ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS 2018) (pp. 277-288). New York, USA: ACM

39. Erata, F., Göknil, A., Kurtev, I., & Tekinerdogan, B. (2018). AlloyInEcore: Embedding of First-Or-der Relational Logic into Meta-object Facility for Automated Model Reasoning. 26th ACM Joint European Software Engineering Confe-rence and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018)

40. Ferreira Torres, C., & Jonker, H. (2018). Investi-gating Fingerprinters and Fingerprinting-alike Behaviour of Android Applications. 23rd European Symposium on Research in Compu-ter Security, Barcelona, Spain, September 3-7, 2018

41. Ferreira Torres, C., Schütte, J., & State, R. (2018). Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts. 34th Annual Computer Security Applications Conference (ACSAC ’18)

42. Fiz Pontiveros, B., Norvill, R., & State, R. (2018). Monitoring the Transaction Selection Policy of Bitcoin Mining Pools. NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium

43. Fiz Pontiveros, B., Norvill, R., & State, R. (2018, February). Recycling Smart Contracts: Com-pression of the Ethereum Blockchain. Pro-ceedings of 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

44. Fouquet, F., Hartmann, T., Mosser, S., & Cordy, M. (2018). Enabling Lock-free Concurrent Workers over Temporal Graphs Composed of Multiple Time-series. 33rd Annual ACM Symposium on Applied Computing (SAC’18)

45. Fraser, G., Rojas, J., & Arcuri, A. (2018). EvoSuite at the SBST 2018 Tool Competition. 2018 ACM/IEEE 11th International Workshop on Search-based Software Testing

46. Gadyatskaya, O., & Trujillo Rasua, R. (2018). New Directions in Attack Tree Research: Cat-ching up with Industrial Needs. In S., Mauw, Proceedings of the 4th International Workshop on Graphical Models for Security. Springer

47. Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Next Generation Cryptographic Ransomware. Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Procedings (1st ed, pp. 385-401). Cham, Switzerland: Springer Internatio-nal Publishing

48. Genç, Z. A., Lenzini, G., & Ryan, P. (2018). No Random, No Ransom: A Key to Stop Cryp-tographic Ransomware. In C., Giuffrida, S., Bardin, & G., Blanc (Eds.), Proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2018) (pp. 234-255). Springer International Publishing

49. Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. Advan-ces in Cybersecurity 2018

50. Genç, Z. A., Lenzini, G., Ryan, P., & Vazquez Sandoval, I. (2018). A Security Analysis, and a Fix, of a Code-corrupted Honeywords System. Proceedings of the 4th International Conference on Information Systems Security and Privacy

51. Gerard, B., Bezzaoucha, S., Voos, H., & Darou-ach, M. (2018, June 27). Cyber Security and Vulnerability Analysis of Networked Control System Subject to False-Data injection. Proceedings of the 2018 American Control Conference

52. Gerard, B., Bezzaoucha, S., Voos, H., & Darou-ach, M. (2018). Vulnerability Analysis of Cyber Physical Systems under False-data Injection and Disturbance Attacks. 2018 IEEE 23rd Inter-national Conference on Emerging Technologies and Factory Automation (ETFA 2018)

53. Gharanjik, A., Mishra, K. V., Shankar, B., & Ottersten, B. (2018). Learning-based rainfall Estimation via Communication Satellite Links. 2018 IEEE Statistical Signal Processing Work-shop (SSP). IEEE

54. Giotti, D., Lamorte, L., Soua, R., Palattella, M. R., & Engel, T. (2018). Performance Analysis of CoAP under Satellite Link Disruption. 25th International Conference on Telecommunica-tions (ICT)

55. Glauner, P., State, R., Valtchev, P., & Duarte, D. (2018). On the Reduction of Biases in Big Data Sets for the Detection of Irregular Power Usage. Proceedings 13th International FLINS Conference on Data Science and Knowledge

IEEE International Conference on Automated Software Engineering (pp. 892-895). ACM

25. Castillo Lopez, M., Sajadi Alamdari, S. A., Sanchez Lopez, J. L., Olivares Mendez, M. A., & Voos, H. (2018). Model Predictive Control for Aerial Collision Avoidance in Dynamic Environments. 26th Mediterranean Conference on Control and Automation (MED)

26. Charlier, J. H. J., Falk, E., State, R., & Hilger, J. (2018, November). User-Device Authentication in Mobile Banking using APHEN for Paratuck2 Tensor Decomposition. 2018 IEEE Internatio-nal Conference on Data Mining Workshops (ICDMW)

27. Charlier, J. H. J., State, R., & Hilger, J. (2018). Non-negative Paratuck2 Tensor Decomposi-tion Combined to LSTM Network For Smart Contracts Profiling. In J., Charlier, R., State, & J., Hilger, 2018 IEEE International Conference on Big Data and Smart Computing Proceedings (pp. 74-81). IEEE Computer Society Conference Publishing Services (CPS)

28. Chothia, T., Ruiter, J. D., & Smyth, B. (2018). Modelling and Analysis of a Hierarchy of Dis-tance Bounding Attacks. 27th USENIX Security Symposium

29. Costa, A. P., Charpiot, L., Rodriguez Lera, F. J., Ziafati, P., Nazarikhorram, A., van der Torre, L., & Steffgen, G. (2018). More Attention and Less Repetitive and Stereotyped Behaviors Using a Robot with Children with Autism. 27th IEEE International Symposium on Robot and Human Interactive Communication, RO-MAN 2018

30. Delavernhe, F., Saber, T., Papadakis, M., & Ventresque, A. (2018). A Hybrid Algorithm for Multi-objective Test Case Selection in Regres-sion Testing. IEEE Congress on Evolutionary Computation

31. Demisse, G., Papadopoulos, K., Aouada, D., & Ottersten, B. (2018). Pose Encoding for Robust Skeleton-based Action Recognition. 2018 IEEE International Conference on Computer Vision and Pattern Recognition Workshop

32. Di Maio, A., Soua, R., Palattella, M. R., & Engel, T. (2018). ROADNET: Fairness- and Throughput-enhanced Scheduling for Content Dissemination in VANETs. IEEE International Conference on Communications (ICC)

33. Dokhanchi, S. H., Shankar, B., Stifter, T., & Ottersten, B. (2018). OFDM-based Automotive Joint Radar-communication System. 2018 IEEE Radar Conference (RadarConf18). IEEE

34. Dokhanchi, S. H., Shankar, B., Stifter, T. S., & Ottersten, B. (2018). Multicarrier Phase Modulated Continuous Waveform for Automo-tive Joint Radar-communication System. 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communica-tions (SPAWC). IEEE

14. Baptista, R., Ghorbel, E., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2018). Key-skele-ton Based Feedback Tool for Assisting Physical Activity. 2018 Zooming Innovation in Consumer Electronics International Conference (ZINC)

15. Ben Abdessalem (helali), R., Nejati, S., Briand, L., & Stifter, T. (2018). Testing Vision-Based Control Systems Using Learnable Evolutionary Algorithms. Proceedings of the 40th Internatio-nal Conference on Software Engineering (ICSE 2018). ACM

16. Ben Abdessalem (helali), R., Panichella, A., Nejati, S., Briand, L., & Stifter, T. (2018). Testing Autonomous Cars for Feature Inter-action Failures using Many-Objective Search. Proceedings of the 33rd IEEE/ACM Inter-national Conference on Automated Software Engineering (ASE 2018)

17. Ben Fadhel, A., Bianculli, D., & Briand, L. (2018). Model-driven Run-time Enforcement of Complex Role-based Access Control Policies. Proceeding of the 2018 33rd ACM/IEEE Inter-national Conference on Automated Software Engineering (ASE ’18) (pp. 248-258). New York, USA: ACM

18. Benedick, P.-L., Robert, J., Le Traon, Y., & Kubler, S. (2018). O-MI/O-DF vs. MQTT: a Performance Analysis. 1st IEEE International Conference on Industrial Cyber-Physical Systems (ICPS 2018)

19. Bezzaoucha, S., & Voos, H. (2018, August 29). A Contribution to Cyber-physical Systems Security: an Event-based Attack-tolerant Control Approach. Proceedings of 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPRO-CESS 2018

20. Bezzaoucha, S., Voos, H., Davila, J., & Bejara-no, J. (2018, June 27). A Decoupling Approach to Design Observers for Polytopic Takagi-Su-geno Models Subject to Unknown Inputs. Proceedings of the 2018 American Control Conference

21. Bickford, M., Cohen, L., Constable, R., & Rahli, V. (2018). Computability Beyond Church-Turing via Choice Sequences. IEEE Symposium on Logic in Computer Science, LICS 2018

22. Biryukov, A., Dinu, D.-D., Le Corre, Y., & Udo-venko, A. (2018). Optimal First-Order Boolean Masking for Embedded IoT Devices. CARDIS 2017: Smart Card Research and Advanced Applications (pp. 22-41). Springer, Cham

23. Biryukov, A., & Udovenko, A. (2018). Attacks and Countermeasures for White-box Designs. In T., Peyrin & S., Galbraith (Eds.), Advances in Cryptology – ASIACRYPT 2018 (pp. 373-402). Springer International Publishing

24. Cao, J., Li, Y., & Pang, J. (2018). L-CMP: an Automatic Learning-based Parameterized Ve-rification Tool. Proceedings of the 33rd ACM/

Engineering for Sensing Decision Support (FLINS 2018)

56. Glauner, P., Valtchev, P., & State, R. (2018). Impact of Biases in Big Data. Proceedings of the 26th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2018)

57. Gonzalez Perez, C. A., Varmazyar, M., Nejati, S., Briand, L., & isasi, Y. (2018). Enabling Model Testing of Cyber-Physical Systems. Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18)

58. Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2018). Symbol-level Precoding Design for Max-Min SINR in Multiuser MISO Broadcast Channels. International Workshop on Signal Processing Advances in Wireless Communica-tions (SPAWC)

59. Hochgeschwender, N., Biggs, G., & Voos, H. (2018). A Reference Architecture for Deploying Component-based Robot Software and Com-parison with Existing Tools. Proceedings of the IEEE International Conference on Robotic Computing. IEEE

60. Jafarnejad, S., Castignani, G., & Engel, T. (2018). Non-intrusive Distracted Driving Detection Based on Driving Sensing Data. 4th International Conference on Vehicle Techno-logy and Intelligent Transport Systems (VEHITS 2018)

61. Jafarnejad, S., Castignani, G., & Engel, T. (2018). Revisiting Gaussian Mixture Models for Driver Identification. Proceedings of IEEE International Conference on Vehicular Electro-nics and Safety (ICVES) (ICVES 2018)

62. Jhawar, R., Lounis, K., Mauw, S., & Ramirez Cruz, Y. (2018). Semi-automatically Augmen-ting Attack Trees using an Annotated Attack Tree Library. In S., Katsikas & C., Alcaraz (Eds.), Security and Trust Management. STM 2018 (pp. 85-101). Springer

63. Jimenez, M., Cordy, M., Le Traon, Y., & Papadakis, M. (2018). TUNA: TUning Natural-ness-based Analysis. 34th IEEE International Conference on Software Maintenance and Evolution

64. Jimenez, M., Le Traon, Y., & Papadakis, M. (2018). Enabling the Continous Analysis of Security Vulnerabilities with VulData7. IEEE International Working Conference on Source Code Analysis and Manipulation

65. Jimenez, M., Titcheu Chekam, T., Cordy, M., Papadakis, M., Kintis, M., Le Traon, Y., & Harman, M. (2018, October 11). Are Mutants Really Natural? A Study on how “Naturalness” Helps Mutant Selection. 12th International Symposium on Empirical Software Engineering and Measurement (ESEM’18)

66. Joroughi, V., Lagunas, E., Andrenacci, S., Matu-ro, N., Chatzinotas, S., Grotz, J., & Ottersten, B. (2018). Deploying Joint Beamforming and Pre-coding in Multibeam Satellite Networks with Time Variant Traffic. IEEE Global Conference on Signal and Information Processing (GlobalSIP)

67. Joroughi, V., Shankar, B., Maleki, S., Chatzino-tas, S., & Grotz, J. (2018). Precoder Design for Multibeam Mobile Satellite Systems. Procee-dings of IEEE Asilomar Conference on Signals, Systems and Computers

68. Joroughi, V., Shankar, B., Maleki, S., Chat-zinotas, S., Grotz, J., & Ottersten, B. (2018). Designing Joint Precoding and Beamforming in a Multiple Gateway Multibeam Satellite System. IEEE WCNC 2018

69. Joroughi, V., Shankar, B., Maleki, S., Chat-zinotas, S., Grotz, J., & Ottersten, B. (2018). On-board Precoding in a Multiple Gateway Multibeam Satellite System. Proceedings of IEEE VTC Fall 2018

70. Joroughi, V., Shankar, B., Maleki, S., Chatzino-tas, S., Grotz, J., & Ottersten, B. (2018). Robust Precoding and Beamforming in a Multiple Gate-way Multibeam Satellite System. IEEE Global Telecommunications Conference

71. Kaiafas, G., Varisteas, G., Lagraa, S., & State, R. (2018). Detecting Malicious Authentication Events Trustfully. In G., Kaiafas, G., Varisteas, S., Lagraa, & R., State, IEEE/IFIP Network Operations and Management Symposium, Cognitive Management in a Cyber World

72. Khan, N. (2018). FAST: A MapReduce Con-sensus for High Performance Blockchains. ACM BlockSys ‘18 Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems. New York, USA: ACM

73. Khan, N., Lahmadi, A., Francois, J., & State, R. (2018). Towards a Management Plane for Smart Contracts: Ethereum Case Study. NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium

74. Kim, K., Kim, D., Bissyande, T. F. D. A., Choi, E., Li, L., Klein, J., & Le Traon, Y. (2018). FaCoY-A Code-to-Code Search Engine. International Con-ference on Software Engineering (ICSE 2018)

75. Kodheli, O., Andrenacci, S., Maturo, N., Chatzinotas, S., & Zimmer, F. (2018). Resource Allocation Approach for Differential Doppler Reduction in NB-IoT over LEO Satellite. 9th Advanced Satellite Multimedia Systems Con-ference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC)

76. Lagunas, E., Andrenacci, S., Chatzinotas, S., & Ottersten, B. (2018). Cross-layer Forward Packet Scheduling for Emerging Precoded Broadband Multibeam Satellite System. 9th Advanced Satellite Multimedia Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC)

7070 71

Publications Publications

back to table of contents

Page 37: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

77. Lagunas, E., Chatzinotas, S., & Ottersten, B. (2018). Fair Carrier Allocation for 5G Integrated Satellite-Terrestrial Backhaul Networks. Inter-national Conference on Communications (ICT)

78. Lagunas, E., Marques, A. G., Chatzinotas, S., & Ottersten, B. (2018). Graph Similarity based on Graph Fourier Distances. European Signal Processing Conference (EUSIPCO)

79. Lauvås, P., & Arcuri, A. (2018). Recent Trends in Software Testing Education: A Systematic Literature Review. UDIT (The Norwegian Conference on Didactics in IT education)

80. Le Corre, Y., Groszschädl, J., & Dinu, D.-D. (2018). Micro-architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors. In J., Fan & B., Gierlichs, Constructive Side-Channel Analysis and Secure Design-9th International Workshop, COSADE 2018, Proceedings (pp. 82-98). Springer Verlag

81. Lei, L., Chang, Z., Hu, Y., Ristaniemi, T., Yuan, Y., & Chatzinotas, S. (2018). Energy-efficient Resource Optimization with Wireless Power Transfer for Secure NOMA Systems. IEEE/CIC International Conference on Communications in China (ICCC 2018)

82. Lei, L., Vu, T. X., You, L., Fowler, S., & Yuan, D. (2018). Efficient Minimum-energy Scheduling with Machine-learning based Predictions for Multiuser MISO Systems. 2018 IEEE Interna-tional Conference on Communications (ICC)

83. Lei, L., You, L., Yang, Y., Yuan, D., Chatzinotas, S., & Ottersten, B. (2018). Power and Load Op-timization in Interference-coupled Non-ortho-gonal Multiple Access Networks. IEEE Global Communications Conference (GLOBECOM) 2018

84. Lei, L., You, L., Yuan, D., Chatzinotas, S., & Ottersten, B. (2018). Efficient Resource Optimi-zation in Wireless Networks: A Deep-learning Assisted Approach. 2018 INFORMS Telecom-munications Conference

85. Li, D., Lin, J., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification. 21st International Conference on Extending Database Technology

86. Li, L., Bissyande, T. F. D. A., & Klein, J. (2018). MoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsisten-cies. 29th IEEE International Symposium on Software Reliability Engineering (ISSRE) (pp. 212-223)

87. Li, L., Bissyande, T. F. D. A., Wang, H., & Klein, J. (2018). CiD: Automating the Detection of API-related Compatibility Issues in Android Apps. International Symposium on Software Testing and Analysis (ISSTA) (pp. 153-163). ACM

88. Li, L., Gao, J., Bissyande, T. F. D. A., Ma, L., Xia, X., & Klein, J. (2018). Characterising Deprecated Android APIs. 15th International Conference on Mining Software Repositories (MSR 2018) (pp. 254-264). ACM

89. Lopez Becerra, J. M., Ostrev, D., & Skrobot, M. (2018). Forward Secrecy for SPAKE2. In J., Baek & S., Willy (Eds.), The 12th International Conference on Provable Security (pp. 366-384). Springer International Publishing

90. Lopez Becerra, J. M., Roenne, P., Ryan, P., & Sala, P. (2018). HoneyPAKEs. Security Protocols XXVI: Lecture Notes in Computer Science (pp. 63-77). Springer International Publishing

91. Lopez Perez, R., Adamsky, F., Soua, R., & Engel, T. (2018). Machine Learning for Reliable Network Attack Detection in SCADA Sys-tems. 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18)

92. Mai, X. P., Pastore, F., Göknil, A., & Briand, L. (2018). A Natural Language Programming Approach for Requirements-based Security Testing. 29th IEEE International Symposium on Software Reliability Engineering (ISSRE 2018). IEEE

93. Martinez, J., Sottet, J.-S., Garcia-Frey, A., Biss-yande, T. F. D. A., Ziadi, T., Klein, J., Temple, P., Mathieu, A., & Le Traon, Y. (2018). Towards Estimating and Predicting User Perception on Software Product Variants. 17th International Conference on Software Reuse (ICSR) (pp. 23-40). Springer, LNCS

94. Matthiesen, B., Yang, Y., & Jorswieck, E. (2018). Optimization of Weighted Individual Energy Efficiencies in Interference Networks. Proc. IEEE Wireless Communications and Net-working Conference

95. Mauw, S., Smith, Z. D., Toro Pozo, J. L., & Trujillo Rasua, R. (2018). Automated Identifica-tion of Desynchronisation Attacks on Shared Secrets. European Symposium on Research in Computer Security. Springer

96. Mauw, S., Smith, Z. D., Toro Pozo, J. L., & Trujillo Rasua, R. (2018). Distance-bounding Protocols: Verification without Time and Location. NY: IEEE Computer Society

97. Messaoudi, S., Panichella, A., Bianculli, D., Briand, L., & Sasnauskas, R. (2018). A Se-arch-based Approach for Accurate Identifica-tion of Log Message Formats. Proceedings of the 26th IEEE/ACM International Conference on Program Comprehension (ICPC ’18) (pp. 167-177). ACM

98. Meyer, M., Quaglia, E. A., & Smyth, B. (2018). Attacks against GSMA’s M2M Remote Provi-sioning. FC’18: 22nd International Conference on Financial Cryptography and Data Security. Springer

99. Mizera, A., Pang, J., Qu, H., & Yuan, Q. (2018). ASSA-PBN 3.0: Analysing Context-Sensitive Probabilistic Boolean Networks. Proceedings of the 16th International Conference on Computational Methods in Systems Biology (pp. 277-284). Springer Science & Business Media B.V

100. Mouline, L., Benelallam, A., Fouquet, F., Bour-cier, J., & Barais, O. (2018). A Temporal Model for Interactive Diagnosis of Adaptive Systems. In L., Mouline, A., Benelallam, F., Fouquet, J., Bourcier, & O., Barais, 2018 IEEE International Conference on Autonomic Computing (ICAC)

101. Mouline, L., Benelallam, A., Hartmann, T., Fouquet, F., Bourcier, J., Morin, B., & Barais, O. (2018, April 09). Enabling Temporal-aware Contexts for Adaptative Distributed Systems. SAC 2018: SAC 2018: Symposium on Applied Computing

102. Msadek, M. N., Soua, R., Ladid, L., & Engel, T. (2018). Advancing the Security of Trustworthy Self-IoT (Position Paper). International Confe-rence on Smart Applications, Communications and Networking (SmartNets)

103. Mund, S., Frank, R., Varisteas, G., & State, R. (2018). Visualizing the Learning Progress of Self-Driving Cars. 21st International Confe-rence on Intelligent Transportation Systems (pp. 2358-2363). IEEE

104. Norvill, R., Fiz Pontiveros, B., State, R., & Cullen, A. (2018, July 09). Visual Emulation for Ethereum’s Virtual Machine. NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium

105. Olszewski, M. A., Meder, J. A. A., Kieffer, E., Bleuse, R., Rosalie, M., Danoy, G., & Bouvry, P. (2018). Visualizing the Template of a Chaotic Attractor. 26th International Symposium on Graph Drawing and Network Visualization (GD 2018)

106. Oyedotun, O., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2018). Highway Network Block with Gates Constraints for Training Very Deep Networks. 2018 IEEE International Conference on Computer Vision and Pattern Recognition Workshop

107. Oyedotun, O., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2018). Improving the Capacity of very Deep Networks With Maxout Units. 2018 IEEE International Conference on Acous-tics, Speech and Signal Processing

108. Palmirani, M., Bartolini, C., Martoni, M., Ro-baldo, L., & Rossi, A. (2018). Legal Ontology for Modelling GDPR Concepts and Norms. JURIX 2018 proceedings

109. Palmirani, M., Martoni, M., Rossi, A., Bart-olini, C., & Robaldo, L. (2018). PrOnto: Privacy Ontology for Legal Reasoning. International Conference on Electronic Government and the Information Systems Perspective

110. Papadakis, M., Titcheu Chekam, T., & Le Traon, Y. (2018). Mutant Quality Indicators. 13th International Workshop on Mutation Analysis (MUTATION’18)

111. Papadopoulos, K., Antunes, M., Aouada, D., & Ottersten, B. (2018). A Revisit of Action Detection using Improved Trajectories. IEEE International Conference on Acoustics, Speech and Signal Processing

112. Paul, S., Pang, J., & Su, C. (2018). On the Full Control of Boolean Networks. Proceedings of the 16th International Conference on Computational Methods in Systems Biology (pp. 313-317). Springer Science & Business Media B.V

113. Paul, S., Pang, J., & Su, C. (2018). Towards the Existential Control of Boolean Networks: a Preliminary Report. Proceedings of the 4th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications (pp. 142-149). Springer Science & Business Media B.V

114. Paul, S., Su, C., Pang, J., & Mizera, A. (2018). A Decomposition-based Approach towards the Control of Boolean Networks. Proceedings of the 2018 ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics. ACM

115. Quaglia, E. A., & Smyth, B. (2018). Authentica-tion with Weaker Trust Assumptions for Voting Systems. AFRICACRYPT’18: 10th International Conference on Cryptology in Africa. Springer

116. Quintanar Guzman, S., Kannan, S., Voos, H., Darouach, M., & Alma, M. (2018). Adaptive Control for a Lightweight Robotic Arm Ac-tuated by a Shape Memory Allow wire. 16th International Conference on New Actuators

117. Quintanar Guzman, S., Kannan, S., Voos, H., Darouach, M., & Alma, M. (2018). Experimen-tal Validation of Adaptive Control For a Shape Memory Alloy Actuated Lightweight Robotic Arm. ASME 2018 Conferences on Smart Materials, Adaptive Structures and Intelligent Systems

118. Rahli, V., Cohen, L., & Bickford, M. (2018). A Verified Theorem Prover Backend Supported by a Monotonic Library. LPAR 2018

119. Rahli, V., Vukotic, I., Volp, M., & Verissimo, P. (2018). Velisarios: Byzantine Fault-tolerant Protocols Powered by Coq. ESOP 2018

120. Saint, A. F. A., Ahmed, E., Shabayek, A. E. R., Cherenkova, K., Gusev, G., Aouada, D., & Ottersten, B. (2018). 3DBodyTex: Textured 3D Body Dataset. 2018 Sixth International Conference on 3D Vision (3DV 2018)

121. Sajadi Alamdari, S. A., Voos, H., & Darou-ach, M. (2018). Stochastic Optimum Energy Management for Advanced Transportation Network. 15th IFAC Symposium on Control in

Transportation Systems CTS 2018 (pp. 317-322). Savona, Italy: Elsevier

122. Sanchez Lopez, J. L., Olivares Mendez, M. A., Castillo Lopez, M., & Voos, H. (2018). Towards Trajectory Planning from a Given Path for Multirotor Aerial Robots Trajectory Tracking. 2018 International Conference on Unmanned Aircraft Systems (ICUAS), Dallas 12-15 June 2018. Dallas, USA

123. Schiffner, S., Berendt, B., Siil, T., Degeling, M., Riemann, R., Schaub, F., Wuyts, K., Attoresi, M., Gürses, S., Klabunde, A., Polonetsky, J., Sadeh, N., & Zanfir-Fortuna, G. (2018). Towards a Roadmap for Privacy Technologies and the General Data Protection Regulation: a Transatlantic Initiative. In N., Tsouroulas, K., Rannenberg, & M., Medina (Ed.), proceedings of the Annual Privacy Forum 2018

124. Shbair, W., Steichen, M., François, J., & State, R. (2018). Blockchain Orchestration and Expe-rimentation Framework: A Case Study of KYC. The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man-2Block) colocated with IEEE/IFIP NOMS 2018

125. Shin, S. Y., Chaouch, K., Nejati, S., Sabet-zadeh, M., Briand, L., & Zimmer, F. (2018). HITECS: A UML Profile and Analysis Frame-work for Hardware-in-the-Loop Testing of Cyber Physical Systems. Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18)

126. Shin, S. Y., Nejati, S., Sabetzadeh, M., Briand, L., & Zimmer, F. (2018). Test Case Prioritization for Acceptance Testing of Cyber Physical Systems: a Multi-Objective Search-based Approach. Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA’18). New York, USA: ACM

127. Sleimi, A., Sannier, N., Sabetzadeh, M., Briand, L., & Dann, J. (2018). Automated Extraction of Semantic Legal Metadata Using Natural Language Processing. the 26th IEEE International Requirements Engineering Confe-rence, Banff, Alberta

128. Smyth, B. (2018). Verifiability of Helios Mixnet. Voting’18: 3rd Workshop on Advances in Secure Electronic Voting. Springer

129. Soua, R., Palattella, M. R., & Engel, T. (2018). IoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks. Global Information Infrastructure and Networ-king Symposium (GIIS)

130. Soua, R., Turcanu, I., Adamsky, F., Führer, D., & Engel, T. (2018). Multi-access Edge Computing for Vehicular Networks: a Position Paper. 2018 IEEE Global Communications Conference: Workshops: Vehicular Networking and Intelli-gent Transportation Systems

131. Spano, D., Alodeh, M., Chatzinotas, S., & Ot-tersten, B. (2018). PAPR Minimization through Spatio-temporal Symbol-level Precoding for the Non-linear Multi-user MISO Channel. 2018 International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2018)

132. Spano, D., Chatzinotas, S., & Ottersten, B. (2018). Sequential Spatio-temporal Symbol-le-vel Precoding Enabling Faster-than-Nyquist Signaling for Multi-user MISO Systems. 2018 26th European Signal Processing Conference (EUSIPCO) (pp. 827-831). IEEE

133. Steichen, M., Fiz Pontiveros, B., Norvill, R., Shbair, W., & State, R. (2018). Blockchain-ba-sed, Decentralized Access Control for IPFS. The 2018 IEEE International Conference on Blockchain (Blockchain-2018) (pp. 1499-1506). Halifax, Canada: IEEE

134. Tato, A., Andrenacci, S., Chatzinotas, S., & Mosquera, C. (2018). Link Adaptation and CSI Detection Errors in Multibeam Satellite Systems with Linear Precoding. 2018 9th Advanced Satellite Multimedia Systems Conference and the 15th Signal Processing for Space Communications Workshop (ASMS/SPSC). IEEE

135. Tervo, O., Trant, L.-N., Chatzinotas, S., Otters-ten, B., & Juntti, M. (2018). Multigroup Mul-ticast Beamforming and Antenna Selection with Rate-Splitting in Multicell Systems. 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communica-tions (SPAWC). IEEE

136. Tessaro Lunardi, W., Cherri, L. H., & Voos, H. (2018). A Mathematical Model and a Firefly Algorithm for an Extended Flexible Job Shop Problem with Availability Constraints. 17th International Conference on Artificial Intelli-gence and Soft Computing

137. Tessaro Lunardi, W., & Voos, H. (2018). Com-parative Study of Genetic and Discrete Firefly Algorithm for Combinatorial Optimization. 33rd ACM/SIGAPP Symposium On Applied Computing

138. Tessaro Lunardi, W., Voos, H., & Cherri, L. H. (2018). An Imperialist Competitive Algorithm for a Real-World Flexible Job Shop Scheduling Problem. 23rd IEEE International Conference on Emerging Technologies and Factory Auto-mation (pp. 8)

139. Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., & Le Traon, Y. (2018). Predicting the Fault Revelation Utility of Mutants. 40th Inter-national Conference on Software Engineering

140. Toader, B., Moawad, A., Fouquet, F., Hartmann, T., Popescu, M., & Viti, F. (2018). A New Mo-delling Framework over Temporal Graphs for Collaborative Mobility Recommendation Sys-tems. 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC)

7272 73

Publications Publications

back to table of contents

Page 38: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How

141. Tsakmalis, A., Chatzinotas, S., & Ottersten, B. (2018). Constrained Bayesian Active Learning of Linear Classifier. 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE

142. Tsinos, C., Chatzinotas, S., & Ottersten, B. (2018). Hybrid Analog-digital Transceiver Designs for mmwave Amplify-and-forward Relaying Systems. 2018 41st International Conference on Telecommunications and Signal Processing (TSP). IEEE

143. Tsinos, C., Kalantari, A., Chatzinotas, S., & Ottersten, B. (2018). Symbol-level Precoding with Low Resolution DACs for Large-scale Array MU-MIMO systems. 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE

144. Varisteas, G., Avanesov, T., & State, R. (2018). Distributed C++-Python Embedding for Fast Predictions and Fast Prototyping. Proceedings of the Second Workshop on Distributed Infrastructures for Deep Learning

145. Vazquez Sandoval, I., & Lenzini, G. (2018). Experience Report: How to Extract Security Protocols’ Specifications from C Libraries. 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). IEEE

146. Vazquez Sandoval, I., Lenzini, G., & Stoj-kovski, B. (2018). A Protocol to Strengthen Password-based Authentication. Emerging Technologies for Authorization and Authenti-cation-ESORICS 2018 International Workshops

147. Volp, M., & Verissimo, P. (2018, May 29). Intru-sion-tolerant Autonomous Driving. 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC)

148. Vu, T. X., Lei, L., Vuppala, S., Chatzinotas, S., & Ottersten, B. (2018). Energy-efficient Design for Latency-tolerant Content Delivery Net-works. 2018 IEEE Wireless Communications and Networking Conference (WCNC)

149. Vu, T. X., Lei, L., Vuppala, S., Kalantari, A., Chatzinotas, S., & Ottersten, B. (2018). Latency

Minimization for Content Delivery Networks with Wireless Edge Caching. 2018 IEEE Inter-national Conference on Communications (ICC)

150. Vuppala, S., Sellathurai, M., & Chatzinotas, S. (2018). Optimal Deployment of Base Stations in Cognitive Satellite Terrestrial Networks. 2018 9th Advanced Satellite Multimedia Systems Conference and the 15th Signal Pro-cessing for Space Communications Workshop (ASMS/SPSC). IEEE

151. Wang, C., Pastore, F., & Briand, L. (2018). Automated Generation of Constraints from Use Case Specifications to Support System Testing. Proceedings of the 11th IEEE Con-ference on Software Testing, Validation and Verification

152. Wang, M., Voos, H., & Su, D. (2018). Robust Online Obstacle Detection and Tracking for Collision-free Navigation of Multirotor UAVs in Complex Environments. 15th International Conference on Control, Automation, Robotics and Vision (ICARCV) (pp. 1228-1234)

153. Wang, Q., Grassi, L., & Rechberger, C. (2018). Zero-sum Partitions of PHOTON Permutations. In N. P., Smart (Ed.), Topics in Cryptolo-gy-CT-RSA 2018-The Cryptographers’ Track at the RSA Conference 2018, Proceedings (pp. 279-299). Springer

154. Wang, Q., Hao, Y., Todo, Y., Li, C., Isobe, T., & Meier, W. (2018). Improved Division Property Based Cube Attacks Exploiting Algebraic Pro-perties of Superpoly. 38th Annual International Cryptology Conference (pp. 275-305). Springer

155. Yakubov, A., Shbair, W., & State, R. (2018). BlockPGP: A Blockchain-based Framework for PGP Key Servers. The Sixth International Symposium on Computing and Networking. Hida Takayama, Japan: IEEE Xplore

156. Yakubov, A., Shbair, W., Wallbom, A., Sanda, D., & State, R. (2018). A Blockchain-based PKI Management Framework. The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) coloca-ted with IEEE/IFIP NOMS 2018

157. Yang, Y., & Pesavento, M. (2018). Energy Effi-ciency in MIMO Interference Channels: Social Optimality and Max-Min Fairness. Proc. 2018 IEEE International Conference on Acoustics, Speech and Signal

158. Yang, Y., & Pesavento, M. (2018). A Parallel Best-Response Algorithm with Exact Line Search for Nonconvex Sparsity-regularized Rank Minimization. Proc. 2018 IEEE Inter-national Conference on Acoustics, Speech and Signal

159. Yang, Y., Pesavento, M., Chatzinotas, S., & Ottersten, B. (2018). Parallel and Hybrid Soft-thresholding Algorithms with Line Search for Sparse Nonlinear Regression. Proc. 26th European Signal Processing Conference

160. Yang, Y., Pesavento, M., Chatzinotas, S., & Ottersten, B. (2018). Successive Convex Approximation Algorithms for Sparse Signal Estimation with Nonconvex Regularizations. Proc. The 10th IEEE Sensor Array and Multi-channel Signal Processing Workshop

161. Zhang, Y., Humbert, M., Rahman, T., Li, C.-T., Pang, J., & Backes, M. (2018). Tagvisor: a Privacy Advisor for Sharing Hashtags. Procee-dings of the Web Conference 2018 (WWW’18) (pp. 287-296). ACM Press

162. Zhu, Panichella, A., & Zaidman, A. (2018). An Investigation of Compression Techniques to Speed up Mutation Testing. Proceedings of 11th IEEE Conference on Software Testing, Validation and Verification, 2018

Published by: SnTEditorial and creative direction: Christine Homolko and William Upton – SnT communications maestros.Artwork: Laura Leyes – www.behance.net/lauraleyesCopy: Sara Messelar Hammerschmidt – alatus.tech/communicationsLayout: Dipl. Des. Isabel Zurowetz, www.just-my-types.dePhotography: all Kary Barthelmey, www.kary-photography.com (except p. 49: Sophie Margue)

University of Luxembourg – Interdisciplinary Centre for Security, Reliability and Trust (SnT)29, Avenue John F. Kennedy • L-1855 Luxembourg • Tel: + 352 46 66 44 5010 • snt @ uni.lu

7474

Publications

Page 39: WELCOME [] · Internet of Things..... 27 Secure and Compliant Data Management ... Patents on the Radar for Automotive Applications.....15 CYBERSECURITY How to Stop ... FINTECH How