Aron Laszka Projects
Publications
RNS Lab Teaching CV
Publications
Journal
“Graph-Theoretic Approach for Increasing Participation in Networks with Assorted Resources”
Waseem Abbas, Aron Laszka, Mudassir Shabbir, Xenofon Koutsoukos
IEEE Transactions on Network Science and Engineering, Accepted for Publication
Paper in PDFPDF BibTeX entryBibTeX
“Safe and Private Forward-Trading Platform for Transactive Microgrids”
Scott Eisele, Taha Eghtesad, Keegan Campanelli, Prakhar Agrawal, Aron Laszka, Abhishek Dubey
ACM Transactions on Cyber-Physical Systems, Accepted for Publication
Paper in PDFPDF BibTeX entryBibTeX
“Blockchains for Transactive Energy Systems: Opportunities, Challenges, and Approaches”
Scott Eisele, Carlos Barreto, Abhishek Dubey, Xenofon Koutsoukos, Taha Eghtesad, Aron Laszka, Anastasia Mavridou
IEEE Computer, Accepted for Publication
Paper in PDFPDF BibTeX entryBibTeX
“Integrating Redundancy, Diversity, and Hardening to Improve Security of Industrial Internet of Things”
Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos
Cyber-Physical Systems, Volume 6, Issue 1, pp. 1 - 32, 2020
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game”
Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos
Computers & Security [Impact Factor: 3.06 (2018)], Volume 87, pp. 101576, November 2019
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Post-Incident Audits on Cyber Insurance Discounts”
Sakshyam Panda, Daniel W. Woods, Aron Laszka, Andrew Fielder, Emmanouil Panaousis
Computers & Security [Impact Factor: 3.06 (2018)], Volume 87, pp. 101593, November 2019
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“A Game-Theoretic Approach for Selecting Optimal Time-Dependent Thresholds for Anomaly Detection”
Amin Ghafouri, Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos
Autonomous Agents and Multi-Agent Systems, Volume 33, Issue 4, pp. 430 - 456, July 2019
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Database Audit Workload Prioritization via Game Theory”
Chao Yan, Bo Li, Yevgeniy Vorobeychik, Aron Laszka, Daniel Fabbri, Bradley Malin
ACM Transactions on Privacy and Security, Volume 22, Issue 3, pp. 17:1 - 17:21, June 2019
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“A Game-Theoretic Approach for Integrity Assurance in Resource-Bounded Systems”
Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
International Journal of Information Security, Volume 17, Issue 2, pp. 221 - 242, 2018
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks”
Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
IEEE Transactions on Network Science and Engineering, Volume 5, Issue 1, pp. 65 - 78, 2018
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Improving Network Connectivity and Robustness Using Trusted Nodes with Application to Resilient Consensus”
Waseem Abbas, Aron Laszka, Xenofon Koutsoukos
IEEE Transactions on Control of Network Systems, Volume 5, Issue 4, pp. 2036 - 2048, December 2018
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Application-Aware Anomaly Detection of Sensor Measurements in Cyber-Physical Systems”
Amin Ghafouri, Aron Laszka, Xenofon Koutsoukos
Sensors [5-Year Impact Factor: 3.014 (2017)], Volume 18, Issue 8, pp. 2448:1 - 2448:21, 2018
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“On the Assessment of Systematic Risk in Networked Systems”
Aron Laszka, Benjamin Johnson, Jens Grossklags
ACM Transactions on Internet Technology, Volume 18, Issue 4, pp. 48:1 - 48:28, November 2018
Paper in PDFPDF BibTeX entryBibTeX
“SURE: A Modeling and Simulation Integration Platform for Evaluation of SecUre and REsilient Cyber-Physical Systems”
Xenofon Koutsoukos, Gabor Karsai, Aron Laszka, Himanshu Neema, Bradley Potteiger, Peter Volgyesi, Yevgeniy Vorobeychik, Janos Sztipanovits
Proceedings of the IEEE [Impact Factor: 9.11 (2016)], Volume 106, Issue 1, pp. 93 - 112, January 2018
Paper at publisherPublisher
“Devising Effective Policies for Bug-Bounty Platforms and Security Vulnerability Discovery”
Mingyi Zhao, Aron Laszka, Jens Grossklags
Journal of Information Policy, Volume 7, pp. 372 - 418, 2017
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Monitoring Stealthy Diffusions”
Nika Haghtalab, Aron Laszka, Ariel Procaccia, Yevgeniy Vorobeychik, Xenofon Koutsoukos
Knowledge and Information Systems [Impact Factor: 2.25 (2017)], Volume 52, Issue 3, pp. 657 - 685, September 2017
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Scheduling Battery-Powered Sensor Networks for Minimizing Detection Delays”
Aron Laszka, Waseem Abbas, Xenofon Koutsoukos
IEEE Communications Letters [Impact Factor: 2.72], Volume 21, Issue 4, pp. 789 - 792, April 2017
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Adaptive Steganography and Steganalysis with Fixed-Size Embedding”
Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme
Transactions on Data Hiding and Multimedia Security, Volume 10, pp. 69 - 91, April 2015
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Network Topology Vulnerability/Cost Tradeoff: Model, Application, and Computational Complexity”
Aron Laszka, Assane Gueye
Internet Mathematics, Volume 11, Issue 6, pp. 588 - 626, February 2015
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Secure Team Composition to Thwart Insider Threats and Cyberespionage”
Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme
ACM Transactions on Internet Technology, Volume 14, Issue 2-3, pp. 19:1 - 19:22, October 2014
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“A Survey of Interdependent Information Security Games”
Aron Laszka, Mark Felegyhazi, Levente Buttyán
ACM Computing Surveys [Impact Factor: 6.75], Volume 47, Issue 2, pp. 23:1 - 23:38, August 2014
(see also CrySyS Lab Technical Report No. CRYSYS-TR-2012-11-15: A Survey of Interdependent Security Games)
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Modeling Content-Adaptive Steganography with Detection Costs as a Quasi-Zero-Sum Game”
Aron Laszka, Adam Foldes
Infocommunications Journal, Volume 5, Issue 4, pp. 33 - 43, December 2013
Paper in PDFPDF BibTeX entryBibTeX
“Designing Robust Network Topologies for Wireless Sensor Networks in Adversarial Environments”
Aron Laszka, Levente Buttyán, Dávid Szeszlér
Pervasive and Mobile Computing [Impact Factor: 2.35], Volume 9, Issue 4, pp. 546 - 563, August 2013
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
Book Chapter
“Towards High-Resolution Multi-Stage Security Games”
Aron Laszka, Xenofon Koutsoukos, Yevgeniy Vorobeychik
in Proactive and Dynamic Network Defense, Springer
pp. 139 - 161, 2019
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Resilient Wireless Sensor Networks for Cyber-Physical Systems”
Waseem Abbas, Aron Laszka, Xenofon Koutsoukos
in Cyber-Physical System Design with Sensor Networking Technologies, The Institution of Engineering and Technology
pp. 239 - 267, April 2016
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
Proceedings
2020
“Data-Driven Prediction of Route-Level Energy Use for Mixed-Vehicle Transit Fleets”
Afiya Ayman, Michael Wilbur, Amutheezan Sivagnanam, Philip Pugliese, Abhishek Dubey, Aron Laszka
6th IEEE International Conference on Smart Computing (SMARTCOMP), September 2020
Paper in PDFPDF BibTeX entryBibTeX
“Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities”
Mudabbir Kaleem, Anastasia Mavridou, Aron Laszka
2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), September 2020
Paper in PDFPDF BibTeX entryBibTeX
“Equilibrium of Blockchain Miners \with Dynamic Asset Allocation”
Go Yamamoto, Aron Laszka, Fuhito Kojima
2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), September 2020
Paper in PDFPDF BibTeX entryBibTeX
“Mechanisms for Outsourcing Computation via a Decentralized Market”
Scott Eisele, Taha Eghtesad, Nicholas Troutman, Aron Laszka, Abhishek Dubey
14th ACM International Conference on Distributed and Event-Based Systems (DEBS), July 2020
Paper in PDFPDF BibTeX entryBibTeX
“Cyber-Attacks and Mitigation in Blockchain Based Transactive Energy Systems”
Carlos Barreto, Taha Eghtesad, Scott Eisele, Aron Laszka, Abhishek Dubey, Xenofon Koutsoukos
3rd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS), June 2020
Paper in PDFPDF BibTeX entryBibTeX
“Verified Development and Deployment of Multiple Interacting Smart Contracts with VeriSolid”
Keerthi Nelaturu, Anastasia Mavridou, Andreas Veneris, Aron Laszka
2nd IEEE International Conference on Blockchain and Cryptocurrency (ICBC) [acceptance rate: 22%], May 2020
Paper in PDFPDF BibTeX entryBibTeX
“An Empirical Study of Android Security Bulletins in Different Vendors”
Sadegh Farhang, Mehmet Bahadir Kirdan, Aron Laszka, Jens Grossklags
The Web Conference (WWW), April 2020
Paper in PDFPDF BibTeX entryBibTeX
“Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning”
Liang Tong, Aron Laszka, Chao Yan, Ning Zhang, Yevgeniy Vorobeychik
34th AAAI Conference on Artificial Intelligence (AAAI) [acceptance rate: 20.6%], February 2020
Paper in PDFPDF BibTeX entryBibTeX
“Smart Contract Development from the Perspective of Developers: Topics and Issues Discussed on Social Media”
Afiya Ayman, Shanto Roy, Amin Alipour, Aron Laszka
4th Workshop on Trusted Smart Contracts (WTSC), February 2020
Paper in PDFPDF BibTeX entryBibTeX
2019
“Data-Driven Detection of Anomalies and Cascading Failures in Traffic Networks”
Sanchita Basak, Afiya Ayman, Aron Laszka, Abhishek Dubey, Bruno Leao
11th Annual Conference of the Prognostics and Health Management Society (PHM), September 2019
Paper in PDFPDF BibTeX entryBibTeX
“Diversity and Trust to Increase Structural Robustness in Networks”
Waseem Abbas, Aron Laszka, Xenofon Koutsoukos
2019 American Control Conference (ACC), July 2019
Paper in PDFPDF BibTeX entryBibTeX
“Augmenting Learning Components for Safety in Resource Constrained Autonomous Robots”
Shreyas Ramakrishna, Abhishek Dubey, Matthew P. Burruss, Charles Hartsell, Nagabhushan Mahadevan, Saideep Nannapaneni, Aron Laszka, Gabor Karsai
22nd IEEE International Symposium on Real-Time Computing (ISORC), May 2019
Paper in PDFPDF BibTeX entryBibTeX
“Cyber-Physical Simulation Platform for Security Assessment of the Transactive Energy Systems”
Yue Zhang, Scott Eisele, Abhishek Dubey, Aron Laszka, Anurag Srivastava
7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES), April 2019
Paper in PDFPDF BibTeX entryBibTeX
“VeriSolid: Correct-by-Design Smart Contracts for Ethereum”
Anastasia Mavridou, Aron Laszka, Emmanouela Stachtiari, Abhishek Dubey
23rd International Conference on Financial Cryptography and Data Security (FC) [acceptance rate: 22%], February 2019
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
2018
“TRANSAX: A Blockchain-based Decentralized Forward-Trading Energy Exchange for Transactive Microgrids”
Aron Laszka, Scott Eisele, Abhishek Dubey, Gabor Karsai, Karla Kvaternik
24th IEEE International Conference on Parallel and Distributed Systems (ICPADS), December 2018
Paper in PDFPDF BibTeX entryBibTeX
“Cyber-Insurance as a Signaling Game: Self-Reporting and External Security Audits”
Aron Laszka, Emmanouil Panaousis, Jens Grossklags
9th Conference on Decision and Game Theory for Security (GameSec), October 2018
Paper in PDFPDF BibTeX entryBibTeX
“Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening”
Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos
2018 IEEE International Conference on Industrial Internet (ICII), October 2018
Paper in PDFPDF BibTeX entryBibTeX
“SolidWorx: A Resilient and Trustworthy Transactive Platform for Smart and Connected Communities”
Scott Eisele, Aron Laszka, Anastasia Mavridou, Abhishek Dubey
2018 IEEE International Conference on Blockchain (Blockchain-2018) [acceptance rate: 15.3%], July 2018
Paper in PDFPDF BibTeX entryBibTeX
“Economic Analyses of Security Investments on Cryptocurrency Exchanges”
Benjamin Johnson, Aron Laszka, Jens Grossklags, Tyler Moore
2018 IEEE International Conference on Blockchain (Blockchain-2018) [acceptance rate: 15.3%], July 2018
Paper in PDFPDF BibTeX entryBibTeX
“Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing”
Chao Yan, Bo Li, Yevgeniy Vorobeychik, Aron Laszka, Daniel Fabbri, Bradley Malin
34th IEEE International Conference on Data Engineering (ICDE), April 2018
“Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts”
Anastasia Mavridou, Aron Laszka
7th International Conference on Principles of Security and Trust (POST), April 2018
Paper in PDFPDF BibTeX entryBibTeX
“Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach”
Anastasia Mavridou, Aron Laszka
22nd International Conference on Financial Cryptography and Data Security (FC) [acceptance rate: 26%], February 2018
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“The Rules of Engagement for Bug Bounty Programs”
Aron Laszka, Mingyi Zhao, Akash Malbari, Jens Grossklags
22nd International Conference on Financial Cryptography and Data Security (FC) [acceptance rate: 26%], February 2018
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“An Economic Study of the Effect of Android Platform Fragmentation on Security Updates”
Sadegh Farhang, Aron Laszka, Jens Grossklags
22nd International Conference on Financial Cryptography and Data Security (FC) [acceptance rate: 26%], February 2018
Paper in PDFPDF BibTeX entryBibTeX
2017
“PlaTIBART: A Platform for Transactive IoT Blockchain Applications with Repeatable Testing”
Michael Walker, Abhishek Dubey, Aron Laszka, Douglas Schmidt
4th Workshop on Middleware and Applications for the IoT (M4IoT), December 2017
Paper in PDFPDF BibTeX entryBibTeX
“On the Design of Communication and Transaction Anonymity in Blockchain-Based Transactive Microgrids”
Jonatan Bergquist, Aron Laszka, Monika Sturm, Abhishek Dubey
1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers (SERIAL), December 2017
Paper in PDFPDF BibTeX entryBibTeX
“Providing Privacy, Safety, and Security in IoT-Based Transactive Energy Systems using Distributed Ledgers”
Aron Laszka, Abhishek Dubey, Michael Walker, Douglas Schmidt
7th International Conference on the Internet of Things (IoT), October 2017
Paper in PDFPDF BibTeX entryBibTeX
“On the Economics of Ransomware”
Aron Laszka, Sadegh Farhang, Jens Grossklags
8th Conference on Decision and Game Theory for Security (GameSec), October 2017
Paper in PDFPDF BibTeX entryBibTeX
“Improving Network Connectivity Using Trusted Nodes and Edges”
Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
2017 American Control Conference (ACC), May 2017
Paper in PDFPDF BibTeX entryBibTeX
“Synergic Security for Smart Water Networks: Redundancy, Diversity, and Hardening”
Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos
3rd International Workshop on Cyber-Physical Systems for Smart Water Networks (CySWater), April 2017
Paper in PDFPDF BibTeX entryBibTeX
“Optimal Detection of Faulty Traffic Sensors Used in Route Planning”
Amin Ghafouri, Aron Laszka, Abhishek Dubey, Xenofon Koutsoukos
2nd International Workshop on Science of Smart City Operations and Platforms Engineering (SCOPE), April 2017
Paper in PDFPDF BibTeX entryBibTeX
“Graph-Theoretic Approach for Increasing Participation in Social Sensing”
Waseem Abbas, Aron Laszka, Xenofon Koutsoukos
2nd International Workshop on Social Sensing (SocialSens), April 2017
Paper in PDFPDF BibTeX entryBibTeX
“A Game-Theoretic Approach for Alert Prioritization”
Aron Laszka, Yevgeniy Vorobeychik, Daniel Fabbri, Chao Yan, Bradley Malin
AAAI-17 Workshop on Artificial Intelligence for Cyber Security (AICS), February 2017
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
2016
“Becoming Cybercriminals: Incentives in Networks with Interdependent Security”
Aron Laszka, Galina Schwartz
7th Conference on Decision and Game Theory for Security (GameSec), November 2016
Paper in PDFPDF BibTeX entryBibTeX
“Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments”
Amin Ghafouri, Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
7th Conference on Decision and Game Theory for Security (GameSec), November 2016
Paper in PDFPDF BibTeX entryBibTeX
“Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms”
Aron Laszka, Mingyi Zhao, Jens Grossklags
21st European Symposium on Research in Computer Security (ESORICS) [acceptance rate: 21%], September 2016
Paper in PDFPDF BibTeX entryBibTeX
“Vulnerability of Transportation Networks to Traffic-Signal Tampering”
Aron Laszka, Bradley Potteiger, Yevgeniy Vorobeychik, Saurabh Amin, Xenofon Koutsoukos
7th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), April 2016
Paper in PDFPDF Presentation in PDFPresentation Data for paperData BibTeX entryBibTeX
“Optimal Thresholds for Intrusion Detection Systems”
Aron Laszka, Waseem Abbas, S. Shankar Sastry, Yevgeniy Vorobeychik, Xenofon Koutsoukos
3rd Annual Symposium and Bootcamp on the Science of Security (HotSoS), April 2016
Paper in PDFPDF BibTeX entryBibTeX
“Multi-Defender Strategic Filtering Against Spear-Phishing Attacks”
Aron Laszka, Jian Lou, Yevgeniy Vorobeychik
30th AAAI Conference on Artificial Intelligence (AAAI), February 2016
Paper in PDFPDF BibTeX entryBibTeX
2015
“Resilient Observation Selection in Adversarial Settings”
Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
54th IEEE Conference on Decision and Control (CDC), December 2015
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“Games of Timing for Security in Dynamic Environments”
Benjamin Johnson, Aron Laszka, Jens Grossklags
6th Conference on Decision and Game Theory for Security (GameSec), November 2015
Paper in PDFPDF BibTeX entryBibTeX
“Monitoring Stealthy Diffusion”
Nika Haghtalab, Aron Laszka, Ariel Procaccia, Yevgeniy Vorobeychik, Xenofon Koutsoukos
15th IEEE International Conference on Data Mining (ICDM) [acceptance rate: 18.2%], November 2015
Paper in PDFPDF Data for paperData BibTeX entryBibTeX
“Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems”
Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
1st ACM Workshop on Cyber-Physical Systems Security and Privacy, in conjunction with ACM CCS 2015 (CPS-SPC), October 2015
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“Should Cyber-Insurance Providers Invest in Software Security?”
Aron Laszka, Jens Grossklags
20th European Symposium on Research in Computer Security (ESORICS) [acceptance rate: less than 20%], September 2015
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking”
Emmanouil Panaousis, Aron Laszka, Johannes Pohl, Andreas Noack, Tansu Alpcan
2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications, in conjunction with IEEE TrustCom 2015 (RATSP), August 2015
Paper in PDFPDF BibTeX entryBibTeX
“A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things”
George Rontidis, Emmanouil Panaousis, Aron Laszka, Tasos Dagiuklas, Pasquale Malacaria, Tansu Alpcan
1st IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems, in conjunction with IEEE ICC 2015 (IoT/CPS-Security), June 2015
Paper in PDFPDF BibTeX entryBibTeX
“Integrity Assurance in Resource-Bounded Systems through Stochastic Message Authentication”
Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
2nd Annual Symposium and Bootcamp on the Science of Security (HotSoS), April 2015
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“Optimal Personalized Filtering Against Spear-Phishing Attacks”
Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
29th AAAI Conference on Artificial Intelligence (AAAI), January 2015
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“When Bitcoin Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools”
Aron Laszka, Benjamin Johnson, Jens Grossklags
2nd Workshop on Bitcoin Research (BITCOIN), January 2015
Paper in PDFPDF BibTeX entryBibTeX
2014
“FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources”
Aron Laszka, Gabor Horvath, Mark Felegyhazi, Levente Buttyán
5th Conference on Decision and Game Theory for Security (GameSec), November 2014
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“The Complexity of Estimating Systematic Risk in Networks”
Benjamin Johnson, Aron Laszka, Jens Grossklags
27th IEEE Computer Security Foundations Symposium (CSF), July 2014
Paper in PDFPDF BibTeX entryBibTeX
“How Many Down? Toward Understanding Systematic Risk in Networks”
Benjamin Johnson, Aron Laszka, Jens Grossklags
9th ACM Symposium on Information, Computer and Communications Security (ASIACCS) [acceptance rate: 20%], June 2014
Paper in PDFPDF BibTeX entryBibTeX
“Estimating Systematic Risk in Real-World Networks”
Aron Laszka, Benjamin Johnson, Jens Grossklags, Mark Felegyhazi
18th International Conference on Financial Cryptography and Data Security (FC) [acceptance rate: 22.5%], March 2014
Paper in PDFPDF BibTeX entryBibTeX
“Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools”
Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, Tyler Moore
1st Workshop on Bitcoin Research, in association with FC 2014 (BITCOIN), March 2014
Paper in PDFPDF BibTeX entryBibTeX
2013
“Mitigating Covert Compromises: A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks”
Aron Laszka, Benjamin Johnson, Jens Grossklags
9th Conference on Web and Internet Economics (WINE) [acceptance rate: 24%], December 2013
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“Quantifying Network Topology Robustness Under Budget Constraints: General Model and Computational Complexity”
Aron Laszka, Assane Gueye
4th Conference on Decision and Game Theory for Security (GameSec), November 2013
Paper in PDFPDF BibTeX entryBibTeX
“Mitigation of Targeted and Non-Targeted Covert Attacks as a Timing Game”
Aron Laszka, Benjamin Johnson, Jens Grossklags
4th Conference on Decision and Game Theory for Security (GameSec), November 2013
Paper in PDFPDF BibTeX entryBibTeX
“Bitspotting: Detecting Optimal Adaptive Steganography”
Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme
12th International Workshop on Digital-Forensics and Watermarking (IWDW), October 2013
Paper in PDFPDF BibTeX entryBibTeX
“Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats”
Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme
18th European Symposium on Research in Computer Security (ESORICS) [acceptance rate: 17.8%], September 2013
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“A Game-Theoretic Analysis of Content-Adaptive Steganography with Independent Embedding”
Pascal Schöttle, Aron Laszka, Benjamin Johnson, Jens Grossklags, Rainer Böhme
21st European Signal Processing Conference (EUSIPCO), September 2013
Paper in PDFPDF BibTeX entryBibTeX
“Quantifying All-to-One Network Topology Robustness Under Budget Constraints”
Aron Laszka, Assane Gueye
Joint Workshop on Pricing and Incentives in Networks and Systems, in conjunction with ACM SIGMETRICS 2013 (W-PIN+NetEcon 2013), June 2013
published in ACM SIGMETRICS Performance Evaluation Review, Volume 41 Issue 4, March 2014
Paper in PDFPDF BibTeX entryBibTeX
2012 and before
“Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality”
Aron Laszka, Dávid Szeszlér, Levente Buttyán
3rd Conference on Decision and Game Theory for Security (GameSec), November 2012
Paper in PDFPDF BibTeX entryBibTeX
“Game-theoretic Robustness of Many-to-one Networks”
Aron Laszka, Dávid Szeszlér, Levente Buttyán
3rd International Conference on Game Theory for Networks (GameNets), May 2012
Paper in PDFPDF BibTeX entryBibTeX
“Optimal Selection of Sink Nodes in Wireless Sensor Networks in Adversarial Environments”
Aron Laszka, Levente Buttyán, Dávid Szeszlér
2nd IEEE International Workshop on Data Security and Privacy in Wireless Networks, in conjunction with IEEE WoWMoM 2011 (D-SPAN), June 2011
Paper in PDFPDF BibTeX entryBibTeX
“Universal Autonomous Robot Navigation Using Quasi Optimal Path Generation”
Aron Laszka, Annamaria R. Varkonyi-Koczy, Gábor Pék, Peter Varlaki
4th IEEE International Conference on Autonomous Robots and Agents (ICARA), February 2009
“An Improved Hybrid Navigation Method”
Gábor Pék, Aron Laszka, Annamaria R. Varkonyi-Koczy
7th International Conference On Global Research and Education in Intelligent Systems (Inter-Akademia), September 2008
Workshop without Proceedings
“Hey Google, What Exactly Do Your Security Patches Tell Us? A Large-Scale Empirical Study on Android Patched Vulnerabilities”
Sadegh Farhang, Mehmet Bahadir Kirdan, Aron Laszka, Jens Grossklags
18th Annual Workshop on the Economics of Information Security (WEIS), June 2019
Paper in PDFPDF BibTeX entryBibTeX
“Optimal Detection of Faulty Traffic Sensors Used in Route Planning”
Amin Ghafouri, Aron Laszka, Abhishek Dubey, Xenofon Koutsoukos
AAAI 2017 Spring Symposium on AI for Social Good (AISOC), March 2017
“Crowdsourced Security Vulnerability Discovery: Modeling and Organizing Bug-Bounty Programs”
Mingyi Zhao, Aron Laszka, Thomas Maillart, Jens Grossklags
HCOMP Workshop on Mathematical Foundations of Human Computation, November 2016
Paper in PDFPDF BibTeX entryBibTeX
Technical Report
“Robustness Against Strategic Attacks”
Aron Laszka
Thesis, 2014
Paper in PDFPDF
“A Survey of Interdependent Security Games”
Aron Laszka, Mark Felegyhazi, Levente Buttyán
CrySyS Lab Technical Report No. CRYSYS-TR-2012-11-15, November 2012
Paper in PDFPDF