Aron Laszka Projects
Publications
Teaching CV
Publications
Journal
“A Game-Theoretic Approach for Integrity Assurance in Resource-Bounded Systems”
Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
International Journal of Information Security, Springer [2015 Impact Factor: 1.28]
Accepted for Publication
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks”
Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
IEEE Transactions on Network Science and Engineering
Accepted for Publication
Paper in PDFPDF BibTeX entryBibTeX
“SURE: A Modeling and Simulation Integration Platform for Evaluation of SecUre and REsilient Cyber-Physical Systems”
Xenofon Koutsoukos, Gabor Karsai, Aron Laszka, Himanshu Neema, Bradley Potteiger, Peter Volgyesi, Yevgeniy Vorobeychik, Janos Sztipanovits
Proceedings of the IEEE [2016 Impact Factor: 9.24]
Accepted for Publication
“Devising Effective Policies for Bug-Bounty Platforms and Security Vulnerability Discovery”
Mingyi Zhao, Aron Laszka, Jens Grossklags
Journal of Information Policy, Penn State University Press
Volume 7, pp. 372 - 418, 2017
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Monitoring Stealthy Diffusions”
Nika Haghtalab, Aron Laszka, Ariel Procaccia, Yevgeniy Vorobeychik, Xenofon Koutsoukos
Knowledge and Information Systems, Springer [2015 Impact Factor: 1.7]
Volume 52, Issue 3, pp. 657 - 685, September 2017
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Scheduling Battery-Powered Sensor Networks for Minimizing Detection Delays”
Aron Laszka, Waseem Abbas, Xenofon Koutsoukos
IEEE Communications Letters [2015 Impact Factor: 1.29]
Volume 21, Issue 4, pp. 789 - 792, April 2017
Paper in PDFPDF BibTeX entryBibTeX
“Adaptive Steganography and Steganalysis with Fixed-Size Embedding”
Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme
Transactions on Data Hiding and Multimedia Security, Springer
Volume 10, pp. 69 - 91, April 2015
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Network Topology Vulnerability/Cost Tradeoff: Model, Application, and Computational Complexity”
Aron Laszka, Assane Gueye
Internet Mathematics, Taylor & Francis
Volume 11, Issue 6, pp. 588 - 626, February 2015
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Secure Team Composition to Thwart Insider Threats and Cyberespionage”
Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme
ACM Transactions on Internet Technology
Volume 14, Issue 2-3, pp. 19:1 - 19:22, October 2014
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“A Survey of Interdependent Information Security Games”
Aron Laszka, Mark Felegyhazi, Levente Buttyán
ACM Computing Surveys [2013 Impact Factor: 4.04]
Volume 47, Issue 2, pp. 23:1 - 23:38, August 2014
(see also CrySyS Lab Technical Report No. CRYSYS-TR-2012-11-15: A Survey of Interdependent Security Games)
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
“Modeling Content-Adaptive Steganography with Detection Costs as a Quasi-Zero-Sum Game”
Aron Laszka, Adam Foldes
Infocommunications Journal
Volume 5, Issue 4, pp. 33 - 43, December 2013
Paper in PDFPDF BibTeX entryBibTeX
“Designing Robust Network Topologies for Wireless Sensor Networks in Adversarial Environments”
Aron Laszka, Levente Buttyán, Dávid Szeszlér
Pervasive and Mobile Computing, Elsevier [2015 Impact Factor: 1.72]
Volume 9, Issue 4, pp. 546 - 563, August 2013
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
Book Chapter
“Resilient Wireless Sensor Networks for Cyber-Physical Systems”
Waseem Abbas, Aron Laszka, Xenofon Koutsoukos
in Cyber-Physical System Design with Sensor Networking Technologies, The Institution of Engineering and Technology
pp. 239 - 267, April 2016
Paper in PDFPDF Paper at publisherPublisher BibTeX entryBibTeX
Proceedings
2018
“Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach”
Anastasia Mavridou, Aron Laszka
22nd International Conference on Financial Cryptography and Data Security (FC) [acceptance rate: 26%], February 2018
Paper in PDFPDF BibTeX entryBibTeX
“The Rules of Engagement for Bug Bounty Programs”
Aron Laszka, Mingyi Zhao, Akash Malbari, Jens Grossklags
22nd International Conference on Financial Cryptography and Data Security (FC) [acceptance rate: 26%], February 2018
Paper in PDFPDF BibTeX entryBibTeX
“An Economic Study of the Effect of Android Platform Fragmentation on Security Updates”
Sadegh Farhang, Aron Laszka, Jens Grossklags
22nd International Conference on Financial Cryptography and Data Security (FC) [acceptance rate: 26%], February 2018
Paper in PDFPDF BibTeX entryBibTeX
2017
“PlaTIBART: A Platform for Transactive IoT Blockchain Applications with Repeatable Testing”
Michael Walker, Abhishek Dubey, Aron Laszka, Douglas Schmidt
4th Workshop on Middleware and Applications for the IoT (M4IoT), December 2017
Paper in PDFPDF BibTeX entryBibTeX
“On the Design of Communication and Transaction Anonymity in Blockchain-Based Transactive Microgrids”
Jonatan Bergquist, Aron Laszka, Monika Sturm, Abhishek Dubey
1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers (SERIAL), December 2017
Paper in PDFPDF BibTeX entryBibTeX
“Providing Privacy, Safety, and Security in IoT-Based Transactive Energy Systems using Distributed Ledgers”
Aron Laszka, Michael Walker, Abhishek Dubey, Douglas Schmidt
7th International Conference on the Internet of Things (IoT), October 2017
Paper in PDFPDF BibTeX entryBibTeX
“On the Economics of Ransomware”
Aron Laszka, Sadegh Farhang, Jens Grossklags
8th Conference on Decision and Game Theory for Security (GameSec), October 2017
Paper in PDFPDF BibTeX entryBibTeX
“Improving Network Connectivity Using Trusted Nodes and Edges”
Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
2017 American Control Conference (ACC), May 2017
Paper in PDFPDF BibTeX entryBibTeX
“Synergic Security for Smart Water Networks: Redundancy, Diversity, and Hardening”
Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos
3rd International Workshop on Cyber-Physical Systems for Smart Water Networks (CySWater), April 2017
Paper in PDFPDF BibTeX entryBibTeX
“Optimal Detection of Faulty Traffic Sensors Used in Route Planning”
Amin Ghafouri, Aron Laszka, Abhishek Dubey, Xenofon Koutsoukos
2nd International Workshop on Science of Smart City Operations and Platforms Engineering (SCOPE), April 2017
Paper in PDFPDF BibTeX entryBibTeX
“Graph-Theoretic Approach for Increasing Participation in Social Sensing”
Waseem Abbas, Aron Laszka, Xenofon Koutsoukos
2nd International Workshop on Social Sensing (SocialSens), April 2017
Paper in PDFPDF BibTeX entryBibTeX
“A Game-Theoretic Approach for Alert Prioritization”
Aron Laszka, Yevgeniy Vorobeychik, Daniel Fabbri, Chao Yan, Bradley Malin
AAAI-17 Workshop on Artificial Intelligence for Cyber Security (AICS), February 2017
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
2016
“Becoming Cybercriminals: Incentives in Networks with Interdependent Security”
Aron Laszka, Galina Schwartz
7th Conference on Decision and Game Theory for Security (GameSec), November 2016
Paper in PDFPDF BibTeX entryBibTeX
“Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments”
Amin Ghafouri, Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
7th Conference on Decision and Game Theory for Security (GameSec), November 2016
Paper in PDFPDF BibTeX entryBibTeX
“Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms”
Aron Laszka, Mingyi Zhao, Jens Grossklags
21st European Symposium on Research in Computer Security (ESORICS) [acceptance rate: 21%], September 2016
Paper in PDFPDF BibTeX entryBibTeX
“Vulnerability of Transportation Networks to Traffic-Signal Tampering”
Aron Laszka, Bradley Potteiger, Yevgeniy Vorobeychik, Saurabh Amin, Xenofon Koutsoukos
7th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), April 2016
Paper in PDFPDF Presentation in PDFPresentation Data for paperData BibTeX entryBibTeX
“Optimal Thresholds for Intrusion Detection Systems”
Aron Laszka, Waseem Abbas, S. Shankar Sastry, Yevgeniy Vorobeychik, Xenofon Koutsoukos
3rd Annual Symposium and Bootcamp on the Science of Security (HotSoS), April 2016
Paper in PDFPDF BibTeX entryBibTeX
“Multi-Defender Strategic Filtering Against Spear-Phishing Attacks”
Aron Laszka, Jian Lou, Yevgeniy Vorobeychik
30th AAAI Conference on Artificial Intelligence (AAAI), February 2016
Paper in PDFPDF BibTeX entryBibTeX
2015
“Resilient Observation Selection in Adversarial Settings”
Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
54th IEEE Conference on Decision and Control (CDC), December 2015
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“Games of Timing for Security in Dynamic Environments”
Benjamin Johnson, Aron Laszka, Jens Grossklags
6th Conference on Decision and Game Theory for Security (GameSec), November 2015
Paper in PDFPDF BibTeX entryBibTeX
“Monitoring Stealthy Diffusion”
Nika Haghtalab, Aron Laszka, Ariel Procaccia, Yevgeniy Vorobeychik, Xenofon Koutsoukos
15th IEEE International Conference on Data Mining (ICDM) [acceptance rate: 18.2%], November 2015
Paper in PDFPDF Data for paperData BibTeX entryBibTeX
“Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems”
Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
1st ACM Workshop on Cyber-Physical Systems Security and Privacy, in conjunction with ACM CCS 2015 (CPS-SPC), October 2015
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“Should Cyber-Insurance Providers Invest in Software Security?”
Aron Laszka, Jens Grossklags
20th European Symposium on Research in Computer Security (ESORICS) [acceptance rate: less than 20%], September 2015
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking”
Emmanouil Panaousis, Aron Laszka, Johannes Pohl, Andreas Noack, Tansu Alpcan
2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications, in conjunction with IEEE TrustCom 2015 (RATSP), August 2015
Paper in PDFPDF BibTeX entryBibTeX
“A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things”
George Rontidis, Emmanouil Panaousis, Aron Laszka, Tasos Dagiuklas, Pasquale Malacaria, Tansu Alpcan
1st IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems, in conjunction with IEEE ICC 2015 (IoT/CPS-Security), June 2015
Paper in PDFPDF BibTeX entryBibTeX
“Integrity Assurance in Resource-Bounded Systems through Stochastic Message Authentication”
Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
2nd Annual Symposium and Bootcamp on the Science of Security (HotSoS), April 2015
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“Optimal Personalized Filtering Against Spear-Phishing Attacks”
Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
29th AAAI Conference on Artificial Intelligence (AAAI), January 2015
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“When Bitcoin Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools”
Aron Laszka, Benjamin Johnson, Jens Grossklags
2nd Workshop on Bitcoin Research (BITCOIN), January 2015
Paper in PDFPDF BibTeX entryBibTeX
2014
“FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources”
Aron Laszka, Gabor Horvath, Mark Felegyhazi, Levente Buttyán
5th Conference on Decision and Game Theory for Security (GameSec), November 2014
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“The Complexity of Estimating Systematic Risk in Networks”
Benjamin Johnson, Aron Laszka, Jens Grossklags
27th IEEE Computer Security Foundations Symposium (CSF), July 2014
Paper in PDFPDF BibTeX entryBibTeX
“How Many Down? Toward Understanding Systematic Risk in Networks”
Benjamin Johnson, Aron Laszka, Jens Grossklags
9th ACM Symposium on Information, Computer and Communications Security (ASIACCS) [acceptance rate: 20%], June 2014
Paper in PDFPDF BibTeX entryBibTeX
“Estimating Systematic Risk in Real-World Networks”
Aron Laszka, Benjamin Johnson, Jens Grossklags, Mark Felegyhazi
18th International Conference on Financial Cryptography and Data Security (FC) [acceptance rate: 22.5%], March 2014
Paper in PDFPDF BibTeX entryBibTeX
“Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools”
Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, Tyler Moore
1st Workshop on Bitcoin Research, in association with FC 2014 (BITCOIN), March 2014
Paper in PDFPDF BibTeX entryBibTeX
2013
“Mitigating Covert Compromises: A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks”
Aron Laszka, Benjamin Johnson, Jens Grossklags
9th Conference on Web and Internet Economics (WINE) [acceptance rate: 24%], December 2013
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“Quantifying Network Topology Robustness Under Budget Constraints: General Model and Computational Complexity”
Aron Laszka, Assane Gueye
4th Conference on Decision and Game Theory for Security (GameSec), November 2013
Paper in PDFPDF BibTeX entryBibTeX
“Mitigation of Targeted and Non-Targeted Covert Attacks as a Timing Game”
Aron Laszka, Benjamin Johnson, Jens Grossklags
4th Conference on Decision and Game Theory for Security (GameSec), November 2013
Paper in PDFPDF BibTeX entryBibTeX
“Bitspotting: Detecting Optimal Adaptive Steganography”
Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme
12th International Workshop on Digital-Forensics and Watermarking (IWDW), October 2013
Paper in PDFPDF BibTeX entryBibTeX
“Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats”
Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme
18th European Symposium on Research in Computer Security (ESORICS) [acceptance rate: 17.8%], September 2013
Paper in PDFPDF Presentation in PDFPresentation BibTeX entryBibTeX
“A Game-Theoretic Analysis of Content-Adaptive Steganography with Independent Embedding”
Pascal Schöttle, Aron Laszka, Benjamin Johnson, Jens Grossklags, Rainer Böhme
21st European Signal Processing Conference (EUSIPCO), September 2013
Paper in PDFPDF BibTeX entryBibTeX
“Quantifying All-to-One Network Topology Robustness Under Budget Constraints”
Aron Laszka, Assane Gueye
Joint Workshop on Pricing and Incentives in Networks and Systems, in conjunction with ACM SIGMETRICS 2013 (W-PIN+NetEcon 2013), June 2013
published in ACM SIGMETRICS Performance Evaluation Review, Volume 41 Issue 4, March 2014
Paper in PDFPDF BibTeX entryBibTeX
2012 and before
“Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality”
Aron Laszka, Dávid Szeszlér, Levente Buttyán
3rd Conference on Decision and Game Theory for Security (GameSec), November 2012
Paper in PDFPDF BibTeX entryBibTeX
“Game-theoretic Robustness of Many-to-one Networks”
Aron Laszka, Dávid Szeszlér, Levente Buttyán
3rd International Conference on Game Theory for Networks (GameNets), May 2012
Paper in PDFPDF BibTeX entryBibTeX
“Optimal Selection of Sink Nodes in Wireless Sensor Networks in Adversarial Environments”
Aron Laszka, Levente Buttyán, Dávid Szeszlér
2nd IEEE International Workshop on Data Security and Privacy in Wireless Networks, in conjunction with IEEE WoWMoM 2011 (D-SPAN), June 2011
Paper in PDFPDF BibTeX entryBibTeX
“Universal Autonomous Robot Navigation Using Quasi Optimal Path Generation”
Aron Laszka, Annamaria R. Varkonyi-Koczy, Gábor Pék, Peter Varlaki
4th IEEE International Conference on Autonomous Robots and Agents (ICARA), February 2009
“An Improved Hybrid Navigation Method”
Gábor Pék, Aron Laszka, Annamaria R. Varkonyi-Koczy
7th International Conference On Global Research and Education in Intelligent Systems (Inter-Akademia), September 2008
Workshop without Proceedings
“Optimal Detection of Faulty Traffic Sensors Used in Route Planning”
Amin Ghafouri, Aron Laszka, Abhishek Dubey, Xenofon Koutsoukos
AAAI 2017 Spring Symposium on AI for Social Good (AISOC), March 2017
“Crowdsourced Security Vulnerability Discovery: Modeling and Organizing Bug-Bounty Programs”
Mingyi Zhao, Aron Laszka, Thomas Maillart, Jens Grossklags
HCOMP Workshop on Mathematical Foundations of Human Computation, November 2016
Paper in PDFPDF BibTeX entryBibTeX
Technical Report
“Robustness Against Strategic Attacks”
Aron Laszka
Thesis, 2014
Paper in PDFPDF
“A Survey of Interdependent Security Games”
Aron Laszka, Mark Felegyhazi, Levente Buttyán
CrySyS Lab Technical Report No. CRYSYS-TR-2012-11-15, November 2012
Paper in PDFPDF