is key researcher at SBA Research working on mathematical aspects of information security and an adjunct lecturer at TU Wien. He is currently leading the combinatorial security testing research team of SBA Research.
- Phone: +43 (1) 505 36 88
- Fax: +43 (1) 505 88 88
Research Interests
Dimitris has a keen interest on combinatorial designs and error-correcting codes, where he studied construction methods and algorithms for the generation of the latter objects.
His research interests extend to the application of combinatorial designs to software testing, combinatorial testing in particular, error-correcting codes and their applications to post-quantum cryptography, optimization algorithms, symbolic computation and in general all mathematical aspects of information security.
Bio
He received his bachelor’s degree in Mathematics (2006) from the University of Athens. He holds a master’s degree in Applied Mathematical Sciences (2007) and a Ph.D. in Discrete Mathematics and Combinatorics (2011), both obtained from the National Technical University of Athens. He also held the status of a Marie Curie Fellow within a 3-year ERCIM grant (2012-2015) awarded by the European Commission. In particular, after his Ph.D. and before joining SBA Research, he was an ERCIM/Marie Curie Post-Doctoral Fellow within Project-Team SECRET of INRIA Paris-Rocquencourt research center working on the design and analysis of cryptographic algorithms, especially through the study of the involved discrete structures. He is the author of around sixty papers in discrete mathematics and their applications to computer science and a Fellow of the Institute of Combinatorics and its Applications (FTICA), an achievement awarded on the basis of the quality of his scientific publications. He is a member of the editorial board of three international peer-reviewed journals and has served as a program committee (PC) member for various international conferences, ESORICS 2015, BalkanCryptSec 2014, 2015, ARES 2012, 2013, 2014, 2015, IWCT 2015 among others. He was also MoCrySEn 2012, 2013, Program Chair and he will serve in the organizing committee of IWCT 2016. He is also a member of IEEE, ICA, ERCIM expert group on security and privacy, various COST actions and MIR Labs.
Top Publications:
-
Multidisciplinary Research and Practice for Information Systems, IFIP International Cross Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2013 (2013)
- Lecture Notes in Computer Science (LNCS)
@INPROCEEDINGS{Angelopoulos_Multidisciplinary_Research_and_2013,
author = {P. Angelopoulos and Christos Koukouvinos and Dimitris Simos and A. Skountzou},
title = {Multidisciplinary Research and Practice for Information Systems,
IFIP International Cross Domain Conference and Workshop on Availability,
Reliability and Security,
CD-ARES 2013},
booktitle = {Lecture Notes in Computer Science (LNCS)},
year = {2013},
} -
Retaining consistency for knowledge-based security testing (2014)
- 27th International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems
@INPROCEEDINGS{Bernauer2014Retaining,
author = {Andreas Bernauer and Josip Bozic and Dimitris Simos and Severin Winkler and Franz Wotawa},
title = {Retaining consistency for knowledge-based security testing},
booktitle = {27th International Conference on Industrial,
Engineering & Other Applications of Applied Intelligent Systems},
year = {2014},
month = {6},
pdf = {https://www.sba-research.org/wp-content/uploads/publications/ieaaie2014_kb.pdf},
} -
Attack pattern-based combinatorial testing (2014)
- 9th International Workshop on Automation of Software Test (AST 2014)
@INPROCEEDINGS{Bozic2014Attack,
author = {Josip Bozic and Dimitris Simos and Franz Wotawa},
title = {Attack pattern-based combinatorial testing},
booktitle = { 9th International Workshop on Automation of Software Test (AST 2014)},
year = {2014},
month = {5},
pdf = {https://www.sba-research.org/wp-content/uploads/publications/AST2014.pdf},
} -
Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing (2015)
- IEEE International Conference on Software Quality, Reliability and Security 2015
@INPROCEEDINGS{Bozic2015Attack,
author = {Josip Bozic and Bernhard Garn and Ioannis Kapsalis and Dimitris Simos and Severin Winkler and Franz Wotawa},
authorhotlist = {true},
title = {Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing},
booktitle = {IEEE International Conference on Software Quality,
Reliability and Security 2015},
year = {2015},
month = {8},
pdf = {http://ieeexplore.ieee.org/document/7272934/},
} -
Evaluation of the IPO-Family algorithms for test case generation in web security testing (2015)
- IEEE 8th International Conference on Software Testing, Verification and Validation
@INPROCEEDINGS{Bozic2015Evaluation,
author = {Josip Bozic and Bernhard Garn and Dimitris Simos and Franz Wotawa},
title = {Evaluation of the IPO-Family algorithms for test case generation in web security testing},
booktitle = {IEEE 8th International Conference on Software Testing,
Verification and Validation},
year = {2015},
month = {4},
pdf = {http://ieeexplore.ieee.org/document/7107436/},
} -
Planning-based Security Testing of the SSL/TLS Protocol (2017)
- Workshop on Advances in Model Based Testing (A-MOST)
@INPROCEEDINGS{Bozic2017Planningbased,
author = {Josip Bozic and K. Kleine and Dimitris Simos and Franz Wotawa},
title = {Planning-based Security Testing of the SSL/TLS Protocol},
booktitle = {Workshop on Advances in Model Based Testing (A-MOST)},
year = {2017},
month = {3},
} -
Availability, Reliability, and Security in Information Systems and HCI, IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013 (2013)
- Lecture Notes in Computer Science
@INPROCEEDINGS{Cuzzocrea2013Availability,
author = {A. Cuzzocrea and C. Kittl and Dimitris Simos and {Edgar R.} Weippl and L. Xu},
title = {Availability,
Reliability,
and Security in Information Systems and HCI,
IFIP WG 8.4,
8.9,
TC 5 International Cross-Domain Conference,
CD-ARES 2013},
booktitle = {Lecture Notes in Computer Science},
year = {2013},
} -
Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops: MoCrySEn and SeCIHD (2013)
- Lecture Notes in Computer Science
@INPROCEEDINGS{Cuzzocrea2013Security,
author = {A. Cuzzocrea and C. Kittl and Dimitris Simos and {Edgar R.} Weippl and L. Xu},
title = {Security Engineering and Intelligence Informatics,
CD-ARES 2013 Workshops: MoCrySEn and SeCIHD},
booktitle = {Lecture Notes in Computer Science},
year = {2013},
} -
E-voting authentication with QR-codes (2014)
- 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust
@INPROCEEDINGS{Falkner2014Evoting,
author = {Stefanie Falkner and Peter Kieseberg and Dimitris Simos and Christina Traxler and {Edgar R.} Weippl},
title = {E-voting authentication with QR-codes},
booktitle = {2nd International Conference on Human Aspects of Information Security,
Privacy,
and Trust},
year = {2014},
pdf = {https://www.sba-research.org/wp-content/uploads/publications/evoting_final_HCI_2014.pdf},
} -
On the applicability of combinatorial testing to web application security testing: A case study (2014)
- 2014 Workshop on Joining AcadeMiA and Industry Contributions to Test Automation and Model-Based Testing
@INPROCEEDINGS{Garn2014applicability,
author = {Bernhard Garn and Ioannis Kapsalis and Dimitris Simos and Severin Winkler},
title = {On the applicability of combinatorial testing to web application security testing: A case study},
booktitle = { 2014 Workshop on Joining AcadeMiA and Industry Contributions to Test Automation and Model-Based Testing},
year = {2014},
month = {7},
pdf = {https://www.sba-research.org/wp-content/uploads/publications/combinatorial testing 4pentesteval_jamaica_2014.pdf},
} -
Eris: A tool for combinatorial testing of the linux system call interface (2014)
- 2014 IEEE International Conference on Software Testing, Verification, and Validation Workshops
@INPROCEEDINGS{Garn2014Eris,
author = {Bernhard Garn and Dimitris Simos},
authorhotlist = {true},
title = {Eris: A tool for combinatorial testing of the linux system call interface},
booktitle = {2014 IEEE International Conference on Software Testing,
Verification,
and Validation Workshops},
year = {2014},
month = {3},
pdf = {https://www.sba-research.org/wp-content/uploads/publications/CT-Eris_ICSTW_2014.pdf},
} -
Weighted t-way Sequences (2018)
- Electronic Notes in Discrete Mathematics
@ARTICLE{Garn2018Weighted,
author = {Bernhard Garn and Dimitris Simos},
title = {Weighted t-way Sequences},
journal = {Electronic Notes in Discrete Mathematics},
year = {2018},
month = {12},
pdf = {https://www.sciencedirect.com/science/article/pii/S1571065318302026?via%3Dihub},
} -
Browser fingerprinting using combinatorial sequence testing (2019)
- 6th Annual Symposium on Hot Topics in the Science of Security (HotSoS)
@INPROCEEDINGS{Garn2019Browser,
author = {Bernhard Garn and Dimitris Simos and Stefan Zauner and R. Kuhn and R. Kacker},
title = {Browser fingerprinting using combinatorial sequence testing},
booktitle = {6th Annual Symposium on Hot Topics in the Science of Security (HotSoS)},
year = {2019},
month = {4},
pdf = {https://dl.acm.org/citation.cfm?doid=3314058.3314062},
} -
A Fault-Driven Combinatorial Process for Model Evolution in XSS Vulnerability Detection (2019)
- International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA AIE)
@INPROCEEDINGS{Garn2019FaultDriven,
author = {Bernhard Garn and Marco Radavelli and Angelo Gargantini and Manuel Leithner and Dimitris Simos},
sbahotlist = {true},
title = {A Fault-Driven Combinatorial Process for Model Evolution in XSS Vulnerability Detection},
booktitle = {International Conference on Industrial,
Engineering and Other Applications of Applied Intelligent Systems (IEA AIE)},
year = {2019},
month = {6},
pdf = {https://link.springer.com/chapter/10.1007%2F978-3-030-22999-3_19},
} -
Weighted Combinatorial Sequence Testing for the TLS Protocol (2019)
- IEEE International Conference on Software Testing, Verification and Validation Workshops, (ICSTW)
@INPROCEEDINGS{Garn2019Weighted,
author = {Bernhard Garn and Dimitris Simos and Feng Duan and Yu Lei and Josip Bozic and Franz Wotawa},
authorhotlist = {true},
sbahotlist = {true},
title = {Weighted Combinatorial Sequence Testing for the TLS Protocol},
booktitle = {IEEE International Conference on Software Testing,
Verification and Validation Workshops,
(ICSTW)},
year = {2019},
month = {4},
pdf = {https://ieeexplore.ieee.org/document/8728911},
} -
A Generation Method of Cryptographic Keys for Enterprise Communication Systems (2013)
- Proceedings of the 8th International Workshop on Frontiers in Availability, Reliability, and Security (FARES 2013), held in conjuction with ARES 2013: 8th International Conference on Availability, Reliability and Security
@INPROCEEDINGS{Hudic2013Generation,
author = {Aleksandar Hudic and E. Revell and Dimitris Simos},
title = {A Generation Method of Cryptographic Keys for Enterprise Communication Systems},
booktitle = {Proceedings of the 8th International Workshop on Frontiers in Availability,
Reliability,
and Security (FARES 2013),
held in conjuction with ARES 2013: 8th International Conference on Availability,
Reliability and Security},
year = {2013},
month = {9},
} -
Set-based algorithms for combinatorial test set generation (2016)
- International Conference on Testing Software and Systems (ICTSS)
@INPROCEEDINGS{Kampel2016Setbased,
author = {Ludwig Kampel and Dimitris Simos},
title = {Set-based algorithms for combinatorial test set generation},
booktitle = {International Conference on Testing Software and Systems (ICTSS)},
year = {2016},
month = {10},
pdf = {http://link.springer.com/chapter/10.1007/978-3-319-47443-4_16},
} -
Combinatorial Methods for Modelling Composed Software Systems (2017)
- 6th International Workshop on Combinatorial Testing (IWCT 2017)
@INPROCEEDINGS{Kampel2017Combinatorial,
author = {Ludwig Kampel and Bernhard Garn and Dimitris Simos},
title = {Combinatorial Methods for Modelling Composed Software Systems},
booktitle = {6th International Workshop on Combinatorial Testing (IWCT 2017)},
year = {2017},
month = {3},
link_slides = {http://iwct2017.sba-research.org/slides/session4-talk2-simos.pdf},
} -
Covering arrays as set covers (2018)
- Electronic Notes in Discrete Mathematics
@ARTICLE{Kampel2018Covering,
author = {Ludwig Kampel and Bernhard Garn and Dimitris Simos},
sbahotlist = {true},
title = {Covering arrays as set covers},
journal = {Electronic Notes in Discrete Mathematics},
year = {2018},
} -
Algebraic Models for Arbitrary Strength Covering Arrays over v-ary Alphabets (2019)
- 8th International Conference on Algebraic Informatics
@INPROCEEDINGS{Kampel2019Algebraic,
author = {Ludwig Kampel and Dimitris Simos and Bernhard Garn and Ilias Kotsireas and Evgeny Zhereshchin},
title = {Algebraic Models for Arbitrary Strength Covering Arrays over v-ary Alphabets},
booktitle = {8th International Conference on Algebraic Informatics},
year = {2019},
month = {6},
pdf = {https://link.springer.com/chapter/10.1007%2F978-3-030-21363-3_15},
} -
Exciting FPGA Cryptographic Trojans using Combinatorial Testing (2015)
- 26th IEEE International Symposium on Software Reliability Engineering (ISSRE 2015)
@INPROCEEDINGS{Kitsos2015Exciting,
author = {Paris Kitsos and Dimitris Simos and Jose Torres-Jimenez and {Artemios G.} Voyiatzis},
authorhotlist = {true},
sbahotlist = {true},
title = {Exciting FPGA Cryptographic Trojans using Combinatorial Testing},
booktitle = {26th IEEE International Symposium on Software Reliability Engineering (ISSRE 2015)},
year = {2015},
month = {11},
pdf = {http://ieeexplore.ieee.org/abstract/document/7381800/?section=abstract},
} -
Malicious hardware logic detection based on combinatorial testing (2016)
- DATE 2016 TRUDEVICE Workshop
@INPROCEEDINGS{Kitsos2016Malicious,
author = {Paris Kitsos and Dimitris Simos and {Kyriakos G.} Stefanidis and {Artemios G.} Voyiatzis},
sbahotlist = {true},
title = {Malicious hardware logic detection based on combinatorial testing},
booktitle = {DATE 2016 TRUDEVICE Workshop},
year = {2016},
month = {3},
link_slides = {http://www.artemiosv.info/hosted/TRUDEVICE2016.pdf},
} -
Coveringcerts: Combinatorial Methods for X.509 Certificate Testing (2017)
- International Conference on Software Testing, Verification and Validation (ICST)
@INPROCEEDINGS{Kleine2017Coveringcerts,
author = {K. Kleine and Dimitris Simos},
title = {Coveringcerts: Combinatorial Methods for X.509 Certificate Testing},
booktitle = {International Conference on Software Testing,
Verification and Validation (ICST)},
year = {2017},
month = {3},
} -
An Efficient Design and Implementation of the in-parameter-order-algorithm (2017)
- Mathematics in Computer Science
@ARTICLE{Kleine2017Efficient,
author = {K. Kleine and Dimitris Simos},
sbahotlist = {true},
title = {An Efficient Design and Implementation of the in-parameter-order-algorithm},
journal = {Mathematics in Computer Science},
year = {2017},
month = {12},
pdf = {https://link.springer.com/article/10.1007/s11786-017-0326-0},
} -
Genetic Algorithm and Data Mining Techniques for Design Selection in Databases (2013)
- RAMSS 13 Proceedings of the 1st International Workshop on Statistical Methods in Reliability Assessment of Complex Industrial Multi state Systems, to be held in conjuction with ARES 13 8th International Conference on Availability, Reliability and Secur
@INPROCEEDINGS{Koukouvinos_Genetic_Algorithm_and_Data_Min_2013,
author = {Christos Koukouvinos and C. Parpoul and Dimitris Simos},
title = {Genetic Algorithm and Data Mining Techniques for Design Selection in Databases},
booktitle = {RAMSS 13 Proceedings of the 1st International Workshop on Statistical Methods in Reliability Assessment of Complex Industrial Multi state Systems,
to be held in conjuction with ARES 13 8th International Conference on Availability,
Reliability and Secur},
year = {2013},
} -
Mixed-level Response Surface Designs via a Hybrid Genetic Algorithm (2013)
- to appear in J. Stat. Appl. Prob.
@ARTICLE{Koukouvinos_Mixed_level_Response_Surface_D_2013,
author = {Christos Koukouvinos and C. Parpoul and Dimitris Simos},
title = {Mixed-level Response Surface Designs via a Hybrid Genetic Algorithm},
journal = {to appear in J. Stat. Appl. Prob.},
year = {2013},
} -
A Grobner Bases Method for Complementary Sequences (2013)
- Proceedings of the 19th Conference on Applications of Computer Algebra
@INPROCEEDINGS{KSZ2013ACA,
author = {Christos Koukouvinos and Dimitris Simos and Zafeirakis Zafeirakopoulos},
title = {A Grobner Bases Method for Complementary Sequences},
booktitle = {Proceedings of the 19th Conference on Applications of Computer Algebra},
year = {2013},
month = {7},
pages = {255--259},
} -
Weight Distribution of the Syndrome of Linear Codes and Connections to Combinatorial Designs (2016)
- 2016 IEEE International Symposium on Information Theory
@INPROCEEDINGS{Pacher2016Weight,
author = {Christoph Pacher and Philipp Grabenweger and Dimitris Simos},
title = {Weight Distribution of the Syndrome of Linear Codes and Connections to Combinatorial Designs},
booktitle = {2016 IEEE International Symposium on Information Theory},
year = {2016},
pdf = {https://www.sba-research.org/wp-content/uploads/publications/ExactVariance.pdf},
} -
Supersaturated plans for variable selection in large databases (2014)
- Statistics, Optimization and Information Computing
@ARTICLE{Parpoul2014Supersaturated,
author = {Christina Parpoula and Christos Koukouvinos and Dimitris Simos and Stella Stylianou},
title = {Supersaturated plans for variable selection in large databases},
journal = {Statistics,
Optimization and Information Computing},
year = {2014},
pdf = {https://www.sba-research.org/wp-content/uploads/publications/SupersaturatedPlans.SOIC.2014.pdf},
} -
Constructing Orthogonal Designs in Powers of Two: Groebner Bases Meet Equational Unification (2015)
- 26th International Conference on Rewriting Techniques and Applications (RTA 2015)
@INPROCEEDINGS{Simos2015Constructing,
author = {Ilias Kotsireas and Temur Kutsia and Dimitris Simos},
authorhotlist = {true},
title = {Constructing Orthogonal Designs in Powers of Two: Groebner Bases Meet Equational Unification},
booktitle = {26th International Conference on Rewriting Techniques and Applications (RTA 2015)},
year = {2015},
month = {6},
pdf = {http://drops.dagstuhl.de/opus/volltexte/2015/5200/pdf/20.pdf},
} -
Genetic Algorithms for the Construction of {2^2} and {2^3}-Level Response Surface Designs (2015)
- -
@INBOOK{Simos2015Genetic,
author = {Dimitris Simos},
title = {Genetic Algorithms for the Construction of {2^2} and {2^3}-Level Response Surface Designs},
booktitle = {Engineering and Applied Sciences Optimization,
Computational Methods in Applied Sciences},
year = {2015},
pdf = {http://link.springer.com/chapter/10.1007/978-3-319-18320-6_11},
volume = {38},
} -
TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach (2016)
- 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS 2016)
@INPROCEEDINGS{Simos2016Cipher,
author = {Dimitris Simos and K. Kleine and {Artemios G.} Voyiatzis and R. Kuhn and R. Kacker},
title = {TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach},
booktitle = {2016 IEEE International Conference on Software Quality,
Reliability and Security (QRS 2016)},
year = {2016},
month = {8},
pdf = {https://www.sba-research.org/wp-content/uploads/publications/TLS-CCM-QRS2016.pdf},
} -
A Combinatorial Approach to Analyzing Cross-Site Scripting (XSS) Vulnerabilities in Web Application Security Testing (2016)
- International Conference on Testing Software and Systems (ICTSS)
@INPROCEEDINGS{Simos2016Combinatorial,
author = {Dimitris Simos and K. Kleine and {Laleh Shikh Gholamhossein} Ghandehari and Bernhard Garn and Yu Lei},
title = {A Combinatorial Approach to Analyzing Cross-Site Scripting (XSS) Vulnerabilities in Web Application Security Testing},
booktitle = {International Conference on Testing Software and Systems (ICTSS)},
year = {2016},
month = {10},
pdf = {http://link.springer.com/chapter/10.1007/978-3-319-47443-4_5},
} -
Split: Security protocol interaction testing in practice (2016)
- ERCIM News
@ARTICLE{Simos2016Split,
author = {Dimitris Simos},
title = {Split: Security protocol interaction testing in practice},
journal = {ERCIM News},
year = {2016},
pdf = {https://ercim-news.ercim.eu/en106/special/split-security-protocol-interaction-testing-in-practice},
} -
Automated combinatorial testing for detecting SQL vulnerabilities in web applications (2019)
- 14th International Workshop on Automation of Software Test (AST)
@INPROCEEDINGS{Simos2019Automated,
author = {Dimitris Simos and Jovan Zivanovic and Manuel Leithner},
title = {Automated combinatorial testing for detecting SQL vulnerabilities in web applications},
booktitle = { 14th International Workshop on Automation of Software Test (AST)},
year = {2019},
month = {5},
pdf = {https://dl.acm.org/citation.cfm?id=3338670},
} -
Practical Combinatorial Testing for XSS Detection using Locally Optimized Attack Models (2019)
- IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
@INPROCEEDINGS{Simos2019Practical,
author = {Dimitris Simos and Bernhard Garn and Jovan Zivanovic and Manuel Leithner},
sbahotlist = {true},
title = {Practical Combinatorial Testing for XSS Detection using Locally Optimized Attack Models},
booktitle = {IEEE International Conference on Software Testing,
Verification and Validation Workshops (ICSTW)},
year = {2019},
month = {4},
pdf = {https://ieeexplore.ieee.org/document/8728914},
} -
Testing TLS using planning-based combinatorial methods and execution framework (2019)
- Software Quality Journal
@ARTICLE{Simos2019Testing,
author = {Dimitris Simos and Josip Bozic and Bernhard Garn and Manuel Leithner and Feng Duan and K. Kleine and Yu Lei and Franz Wotawa},
title = {Testing TLS using planning-based combinatorial methods and execution framework},
journal = {Software Quality Journal},
year = {2019},
month = {6},
pdf = {https://link.springer.com/article/10.1007%2Fs11219-018-9412-z},
} -
An Approach to Penetration Testing via Combinational Designs (2013)
- ASQT 13 Proceedings of the 11th User Conference for Software Quality, Test and Innovation, Austrian Computer Society (OCG)
@INPROCEEDINGS{Simos_An_Approach_to_Penetration_Tes_2013,
author = {Dimitris Simos and Severin Winkler},
title = {An Approach to Penetration Testing via Combinational Designs},
booktitle = {ASQT 13 Proceedings of the 11th User Conference for Software Quality,
Test and Innovation,
Austrian Computer Society (OCG)},
year = {2013},
} -
Applying Combinatorial Testing to Large-Scale Data Processing at Adobe (2019)
- IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
@INPROCEEDINGS{Smith2019Applying,
author = {Riley Smith and {Darryl C.} Jarman and R. Kacker and R. Kuhn and Dimitris Simos and Ludwig Kampel and Manuel Leithner and Gabe Gosney},
sbahotlist = {true},
title = {Applying Combinatorial Testing to Large-Scale Data Processing at Adobe},
booktitle = {IEEE International Conference on Software Testing,
Verification and Validation Workshops (ICSTW)},
year = {2019},
month = {4},
pdf = {https://ieeexplore.ieee.org/document/8728962},
} -
Measuring Combinatorial Coverage at Adobe (2019)
- IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
@INPROCEEDINGS{Smith2019Measuring,
author = {Riley Smith and {Darryl C.} Jarman and Jared Bellows and R. Kuhn and R. Kacker and Dimitris Simos},
sbahotlist = {true},
title = {Measuring Combinatorial Coverage at Adobe},
booktitle = {IEEE International Conference on Software Testing,
Verification and Validation Workshops (ICSTW)},
year = {2019},
month = {4},
pdf = {https://ieeexplore.ieee.org/document/8728951},
} -
How easy is code equivalence over Fq (2013)
- Proceedings of the 8th International Workshop on Coding Theory and Cryptography WCC 2013
@INPROCEEDINGS{_How_easy_is_code_equivalence_o_2013,
author = {Nicolas Sendrier and Dimitris Simos},
title = {How easy is code equivalence over Fq},
booktitle = {Proceedings of the 8th International Workshop on Coding Theory and Cryptography WCC 2013},
year = {2013},
month = {4},
pdf = {https://www.sba-research.org/wp-content/uploads/publications/codeq3_wccfin.pdf},
pages = {80--92},
} -
The Hardness of Code Equivalence over Fq and its Application to Code-based Cryptography (2013)
- Post quantum cryptography PQCrypto
@INPROCEEDINGS{_The_Hardness_of_Code_Equivalen_2013,
author = {Nicolas Sendrier and Dimitris Simos},
authorhotlist = {true},
title = {The Hardness of Code Equivalence over Fq and its Application to Code-based Cryptography},
booktitle = {Post quantum cryptography PQCrypto},
year = {2013},
month = {6},
pdf = {https://www.sba-research.org/wp-content/uploads/publications/codeqapp3_pqcrypto_fin.pdf},
}