Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Innovations in Detecting and Disrupting Crime-as-a-Service Operations

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Publications

Digital drug trading ecologies in context: Technological, geographic, and linguistic variation across darknet platforms (opens in new window)

Author(s): Piotr Siuda, Mikko Aaltonen, Ari Haasio, Angus Bancroft, Juha Nurmi, Haitao Shi, J․Tuomas Harviainen
Published in: International Journal of Drug Policy, Issue 145, 2025, ISSN 0955-3959
Publisher: Elsevier BV
DOI: 10.1016/J.DRUGPO.2025.104984

Measuring the impact of post quantum cryptography in Industrial IoT scenarios (opens in new window)

Author(s): Luis Cruz-Piris, Andrés Marín-López, Manuel Álvarez-Campana, Mario Sanz, José Ignacio Moreno, David Arroyo
Published in: Internet of Things, 2025, ISSN 2542-6605
Publisher: Elsevier BV
DOI: 10.1016/J.IOT.2025.101793

Your PIN is Mine: Uncovering Users' PINs at Point of Sale Machines (opens in new window)

Author(s): Stefano Cecconello, Matteo Cardaioli, Luca Pasa, Stjepan Picek, Georgios Smaragdakis
Published in: IEEE Transactions on Dependable and Secure Computing, 2025, ISSN 1545-5971
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/TDSC.2025.3594630

Beyond the sandbox: Leveraging symbolic execution for evasive malware classification (opens in new window)

Author(s): Vasilis Vouvoutsis, Fran Casino, Constantinos Patsakis
Published in: Computers & Security, Issue 149, 2024, ISSN 0167-4048
Publisher: Elsevier BV
DOI: 10.1016/j.cose.2024.104193

Beyond the sandbox: Leveraging symbolic execution for evasive malware classification (opens in new window)

Author(s): Vasilis Vouvoutsis, Fran Casino, Constantinos Patsakis
Published in: Computers & Security, Issue 149, 2024, ISSN 0167-4048
Publisher: Elsevier BV
DOI: 10.1016/j.cose.2024.104193

Investigating the disparities among child sexual abuse material users: Anonymous self-reports from both charged and uncharged individuals (opens in new window)

Author(s): Hanna-Mari Lahtinen, Kirsi Honkalampi, Tegan Insoll, Juha Nurmi, Ethel Quayle, Anna Katariina Ovaska, Nina Vaaranen-Valkonen
Published in: Child Abuse & Neglect, Issue 161, 2025, ISSN 0145-2134
Publisher: Elsevier BV
DOI: 10.1016/J.CHIABU.2025.107299

Cloud continuum testbeds and next-generation ICTs: Trends, challenges, and perspectives (opens in new window)

Author(s): Fran Casino, Peio Lopez-Iturri, Constantinos Patsakis
Published in: Computer Science Review, Issue 56, 2024, ISSN 1574-0137
Publisher: Elsevier BV
DOI: 10.1016/j.cosrev.2024.100696

A Digital Twin Threat Survey (opens in new window)

Author(s): Manuel Suárez-Román, Mario Sanz-Rodrigo, Andrés Marín-López, David Arroyo
Published in: Big Data and Cognitive Computing, Issue 9, 2025, ISSN 2504-2289
Publisher: MDPI AG
DOI: 10.3390/BDCC9100252

Poster: The State of Malware Loaders (opens in new window)

Author(s): Cristian Munteanu, Georgios Smaragdakis, Anja Feldmann
Published in: Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
Publisher: ACM
DOI: 10.1145/3646547.3689659

EMOBAF: Multi-objective Stealthy and Robust Black-box Backdoor Attack in Dual Domains via Evolutionary Algorithm (opens in new window)

Author(s): Dazhuang Liu, Yanqi Qiao, Rui Wang, Kaitai Liang, Georgios Smaragdakis
Published in: Proceedings 2025 Network and Distributed System Security Symposium, 2025
Publisher: Internet Society
DOI: 10.14722/ndss.2025.241061

Trust but Verify: An Assessment of Vulnerability Tagging Services

Author(s): Szu-Chun Huang, Harm Griffioen, Max van der Horst, Georgios Smaragdakis, Michel van Eeten, and Yury Zhauniarovich
Published in: USENIX Security Symposium 2025, 2025
Publisher: USENIX Association

Endless Subscriptions: Open RAN is Open to RIC E2 Subscription Denial of Service Attacks (opens in new window)

Author(s): Felix Klement, Alessandro Brighente, Anup Kiran Bhattacharjee, Stefano Cecconello, Fernando Kuipers, Georgios Smaragdakis, Mauro Conti, Stefan Katzenbeisser
Published in: 2025 IEEE 10th European Symposium on Security and Privacy (EuroS&P), 2025
Publisher: IEEE
DOI: 10.1109/EUROSP63326.2025.00048

Characterizing and Mitigating Phishing Attacks at ccTLD Scale (opens in new window)

Author(s): Giovane C. M. Moura, Thomas Daniels, Maarten Bosteels, Sebastian Castro, Moritz Müller, Thymen Wabeke, Thijs van den Hout, Maciej Korczyński, Georgios Smaragdakis
Published in: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Publisher: ACM
DOI: 10.1145/3658644.3690192

Coding Malware in Fancy Programming Languages for Fun and Profit (opens in new window)

Author(s): Theodoros Apostolopoulos, Vasilios Koutsokostas, Nikolaos Totosis, Constantinos Patsakis, Georgios Smaragdakis
Published in: Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, 2025
Publisher: ACM
DOI: 10.1145/3714393.3726506

All that Glitters is not Gold: Uncovering Exposed Industrial Control Systems and Honeypots in the Wild (opens in new window)

Author(s): Martin Mladenov, László Erdődi, Georgios Smaragdakis
Published in: 2025 IEEE 10th European Symposium on Security and Privacy (EuroS&P), 2025
Publisher: IEEE
DOI: 10.1109/EUROSP63326.2025.00017

Bitcoin Battle: Burning Bitcoin for Geopolitical Fun and Profit (opens in new window)

Author(s): Kris Oosthoek, Kelvin Lubbertsen, Georgios Smaragdakis
Published in: 2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2025
Publisher: IEEE
DOI: 10.1109/ICBC64466.2025.11114529

Catch-22: Uncovering Compromised Hosts using SSH Public Keys

Author(s): Cristian Munteanu, Max Planck Institute for Informatics, Georgios Smaragdakis⁩, Anja Feldmann and Tobias Fiebig
Published in: USENIX Security Symposium 2025, 2025
Publisher: USENIX Association

Provable Co-Owned Data Deletion with Zero-Residuals and Verifiability in Multi-Cloud Environment (opens in new window)

Author(s): Marwan Adnan Darwish, Evangelia Anna Markatou, Georgios Smaragdakis
Published in: Proceedings of the 18th European Workshop on Systems Security, 2025
Publisher: ACM
DOI: 10.1145/3722041.3723104

The Malware as a Service Ecosystem (opens in new window)

Author(s): Constantinos Patsakis, David Arroyo, Fran Casino
Published in: Advances in Information Security, Malware, 2024, ISBN 978-3-031-66245-4
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-66245-4_16

Dataset: Drug trade messages on Tor in Finnish, English and Polish (opens in new window)

Author(s): Juha Nurmi
Published in: Dataset, 2025
Publisher: Zenodo
DOI: 10.5281/ZENODO.15300502

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0