Search Results for author: Vasilios Mavroudis

Found 12 papers, 2 papers with code

Fusion Encoder Networks

no code implementations24 Feb 2024 Stephen Pasteris, Chris Hicks, Vasilios Mavroudis

In this paper we present fusion encoder networks (FENs): a class of algorithms for creating neural networks that map sequences to outputs.

Reward Shaping for Happier Autonomous Cyber Security Agents

no code implementations20 Oct 2023 Elizabeth Bates, Vasilios Mavroudis, Chris Hicks

We first show that deep reinforcement learning algorithms are sensitive to the magnitude of the penalties and their relative size.

reinforcement-learning

Nearest Neighbour with Bandit Feedback

no code implementations NeurIPS 2023 Stephen Pasteris, Chris Hicks, Vasilios Mavroudis

In this paper we adapt the nearest neighbour rule to the contextual bandit problem.

Adaptive Webpage Fingerprinting from TLS Traces

no code implementations19 Oct 2020 Vasilios Mavroudis, Jamie Hayes

In webpage fingerprinting, an on-path adversary infers the specific webpage loaded by a victim user by analysing the patterns in the encrypted TLS traffic exchanged between the user's browser and the website's servers.

Snappy: Fast On-chain Payments with Practical Collaterals

no code implementations5 Jan 2020 Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun

Snappy overcomes the main problems of previous solutions: a single customer collateral can be used to shop with many merchants; merchant collaterals are independent of the number of customers; and validators do not have to be trusted.

Cryptography and Security Distributed, Parallel, and Cluster Computing

Bounded Temporal Fairness for FIFO Financial Markets

no code implementations20 Nov 2019 Vasilios Mavroudis

Financial exchange operators cater to the needs of their users while simultaneously ensuring compliance with the financial regulations.

Fairness

Towards Low-level Cryptographic Primitives for JavaCards

1 code implementation3 Oct 2018 Vasilios Mavroudis, Petr Svenda

While the underlying hardware has those capabilities, the JavaCard API does not provide calls for the corresponding functionality.

Cryptography and Security Software Engineering

VAMS: Verifiable Auditing of Access to Confidential Data

no code implementations12 May 2018 Alexander Hicks, Vasilios Mavroudis, Mustafa Al-Bassam, Sarah Meiklejohn, Steven J. Murdoch

We propose VAMS, a system that enables transparency for audits of access to data requests without compromising the privacy of parties in the system.

Cryptography and Security

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components

1 code implementation12 Sep 2017 Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis

To evaluate our design, we build a Hardware Security Module that provides the highest level of assurance possible with COTS components.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.