Follow
Vasilios Mavroudis
Vasilios Mavroudis
Principal Research Scientist, Alan Turing Institute
Verified email at cs.ucl.ac.uk - Homepage
Title
Cited by
Cited by
Year
On the Privacy and Security of the Ultrasound Ecosystem
V Mavroudis, S Hao, Y Fratantonio, F Maggi, G Vigna, C Kruegel
Proceedings on Privacy Enhancing Technologies 2017, 2017
662017
A touch of evil: High-assurance cryptographic hardware from untrusted components
V Mavroudis, A Cerulli, P Svenda, D Cvrcek, D Klinec, G Danezis
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
482017
Autonomous network defence using reinforcement learning
M Foley, C Hicks, K Highnam, V Mavroudis
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
322022
Libra: Fair order-matching for electronic financial exchanges
V Mavroudis, H Melton
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
322019
Snappy: Fast On-chain Payments with Practical Collaterals
V Mavroudis, K Wüst, A Dhar, K Kostiainen, S Capkun
27th Annual Network and Distributed System Security Symposium, NDSS 2020 …, 2020
282020
International Scientific Report on the Safety of Advanced AI
B Yohsua, P Daniel, B Tamay, B Rishi, C Stephen, C Yejin, G Danielle, ...
https://assets.publishing.service.gov.uk/media/6655982fdc15efdddf1a842f …, 2024
16*2024
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages
C Andrikos, L Batina, L Chmielewski, L Lerman, V Mavroudis, ...
IACR Cryptology ePrint Archive 2019, 2019
162019
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets
V Mavroudis, P Svenda
IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2020
152020
Market manipulation as a security problem: attacks and defenses
V Mavroudis
Proceedings of the 12th European Workshop on Systems Security, 1-6, 2019
152019
VAMS: Verifiable Auditing of Access to Confidential Data
A Hicks, V Mavroudis, M Al-Bassam, S Meiklejohn, SJ Murdoch
arXiv preprint arXiv:1805.04772, 2018
14*2018
Eavesdropping whilst you're shopping: Balancing personalisation and privacy in connected retail spaces
V Mavroudis, M Veale
Living in the Internet of Things: Cybersecurity of the IoT-2018, 1-10, 2018
142018
Reward Shaping for Happier Autonomous Cyber Security Agents
E Bates, V Mavroudis, C Hicks
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
122023
Inroads into Autonomous Network Defence using Explained Reinforcement Learning
M Foley, M Wang, C Hicks, V Mavroudis
Proceedings of the Conference on Applied Machine Learning for Information …, 2023
102023
Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning
C Hicks, V Mavroudis, M Foley, T Davies, K Highnam, T Watson
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security …, 2023
72023
Adaptive Webpage Fingerprinting from TLS Traces
V Mavroudis, J Hayes
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2023
7*2023
Towards low-level cryptographic primitives for JavaCards
V Mavroudis, P Svenda
arXiv preprint arXiv:1810.01662, 2018
62018
Bounded temporal fairness for FIFO financial markets
V Mavroudis
Cambridge International Workshop on Security Protocols, 104-112, 2019
5*2019
Computing small discrete logarithms using optimized lookup tables
V Mavroudis
32015
Visual Analytics for enhancing supervised attack attribution in mobile networks
S Papadopoulos, V Mavroudis, A Drosou, D Tzovaras
Information Sciences and Systems 2014: Proceedings of the 29th International …, 2014
32014
Dan Cvrcek, Dusan Klinec, and George Danezis,“A touch of evil: High-assurance cryptographic hardware from untrusted components,”
V Mavroudis, A Cerulli, P Svenda
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
22017
The system can't perform the operation now. Try again later.
Articles 1–20