Ivan Homoliak

Profile

I'm an associate professor in system security at Brno University of Technology and Slovak Technical University, currently working on blockchain-based authentication schemes, consensus protocols, electronic voting, decentralized identity, and central bank digital currency (CBDC). I previously did research at SUTD as a postdoctoral research fellow working with colleagues on blockchain security testing and insider threat detection using machine learning approaches. My work focuses on designing, implementing, and optimizing novel security systems and solutions.

I earned my Ph.D. in adversarial intrusion detection in network traffic from Brno University of Technology in 2016, and obtained my associate professorship at the same university with a habilitation aimed at secure decentralized applications and consensus protocols in blockchains. My research spans multiple areas, including cryptography and security, distributed computing, and machine learning applications in security. I'm particularly interested in the intersection of traditional security mechanisms with emerging blockchain technologies.

I am the main author of SmartOTPs - the first OTP scheme designed specifically for smart contract wallets, which represents my broader interest in making cryptocurrency systems more secure and usable. My current research portfolio includes work on privacy-preserving consensus mechanisms, scalable electronic voting systems, and the security challenges of decentralized applications. I focus on both theoretical contributions and practical implementations that can be deployed in real-world systems.

Publications

VoteMate: A Decentralized Application for Scalable Electronic Voting on EVM-Based Blockchain

I. Homoliak, T. Svondr

Proof-of-Social-Capital: Privacy-Preserving Consensus Protocol Replacing Stake for Social Capital

Juraj Mariani, Ivan Homoliak

arXiv.org 2025

SoK: A Survey of Mixing Techniques and Mixers for Cryptocurrencies

Juraj Mariani, I. Homoliak

arXiv.org 2025

FeatherWallet: A Lightweight Mobile Cryptocurrency Wallet Using zk-SNARKs

Martin Peresíni, I. Homoliak, Samuel Oleksák, Samuel Sl'avka

arXiv.org 2025

Enhancing Security of AI-Based Code Synthesis with GitHub Copilot via Cheap and Efficient Prompt-Engineering

Jakub Res, I. Homoliak, Martin Peresíni, A. Smrčka, K. Malinka, P. Hanáček

arXiv.org 2024

SoK: Cryptocurrency Wallets – A Security Review and Classification based on Authentication Factors

I. Homoliak, Martin Peresíni

International Conference on Blockchain 2024

Mitigating Undercutting Attacks: Fee-Redistribution Smart Contracts for Transaction-Fee-Based Regime of Blockchains with the Longest Chain Rule

Rastislav Budinský, Ivana Stančíková, I. Homoliak

International Congress on Blockchain and Applications 2023

DAG-Sword: A Simulator of Large-Scale Network Topologies for DAG-Oriented Proof-of-Work Blockchains

Martin Peresíni, Tomás Hladký, K. Malinka, I. Homoliak

arXiv.org 2023

Incentive Attacks on DAG-Based Blockchains with Random Transaction Selection

Martin Peresíni, I. Homoliak, Federico Matteo Bencic, M. Hrubý, K. Malinka

International Congress on Blockchain and Applications 2023

CBDC-AquaSphere: Interoperable Central Bank Digital Currency Built on Trusted Computing and Blockchain

I. Homoliak, Martin Peresíni, Patrik Holop, Jakub Handzus, Fran Casino

arXiv.org 2023

Fee-Redistribution Smart Contracts for Transaction-Fee-Based Regime of Blockchains with the Longest Chain Rule

Rastislav Budinský, I. Homoliak, Ivana Stančíková

arXiv.org 2023

Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management

Jozef Drga, I. Homoliak, Juraj Vanco, Martin Peresíni, P. Hanáček

International Conference on Blockchain 2022

HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version)

Dominik Breitenbacher, I. Homoliak, Y. Aung, Y. Elovici, Nils Ole Tippenhauer

IEEE Internet of Things Journal 2022

SBvote: Scalable Self-Tallying Blockchain-Based Voting

Ivana Stančíková, I. Homoliak

ACM Symposium on Applied Computing 2022

IEEE International Conference on Blockchain and Cryptocurrency

Monday May, Tuesday May, Wednesday May, Thursday May, May Friday, Bruno Casella, Lorenzo Paletto, Toshiko Matsui, Keigo Kimura, Mitsuyoshi Imamura, Kazumasa Omote, Kyungchan Ko, Taeyeol Jeong, Jongsoo Woo, James Won-Ki Hong POSTECH, Jozef Drga, I. Homoliak, Martin Peresíni, P. Hanáček, Jan Lauinger, Jens Ernstberger, Sebastian Steinhorst, F. J. F. Peñuela, F. D. Muñoz-Escoí, 􏍁, Artem Barger, Karl Seidenfad, Jan Biermann, Kiarash Shamsi, Koosha Esmaeilzadeh, Sara Khorasani, Rouhani Cuneyt, Akcora, Xinxin Fan, Zhi Zhong, Dong Guo, Qi Chai, Simone Romano, Kazuyuki Shudo, Tsuyoshi Hasegawa, Robert Muth, Florian Tschorsch

2022 IEEE Crosschain Workshop (ICBC-CROSS) 2022

DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy

Martin Peresíni, Federico Matteo Bencic, K. Malinka, I. Homoliak

arXiv.org 2021

Always on Voting: A Framework for Repetitive Voting on the Blockchain

Sarad Venugopalan, Ivana Stančíková, I. Homoliak

IEEE Transactions on Emerging Topics in Computing 2021

BBB-Voting: Self-Tallying End-to-End Verifiable 1-out-of-k Blockchain-Based Boardroom Voting

I. Homoliak, Zengpeng Li, Pawel Szalachowski

International Congress on Blockchain and Applications 2020

BBB-Voting: 1-out-of-k Blockchain-Based Boardroom Voting

Sarad Venugopalan, I. Homoliak, Zengpeng Li, Pawel Szalachowski

arXiv.org 2020

Intercepting Hail Hydra: Real-Time Detection of Algorithmically Generated Domains

Fran Casino, Nikolaos Lykousas, I. Homoliak, C. Patsakis, J. Castro

Journal of Network and Computer Applications 2020

CoinWatch: A Clone-Based Approach For Detecting Vulnerabilities in Cryptocurrencies

Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, I. Homoliak, Yun Lin, Jun Sun

International Congress on Blockchain and Applications 2020

Aquareum: A Centralized Ledger Enhanced with Blockchain and Trusted Computing

I. Homoliak, Pawel Szalachowski

arXiv.org 2020

Security and Encryption at Modern Databases

Martin Očenáš, I. Homoliak, P. Hanáček, K. Malinka

International Conference on Cryptography, Security and Privacy 2020

ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors

I. Homoliak, P. Hanáček

arXiv.org 2019

The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses

I. Homoliak, Sarad Venugopalan, Daniël Reijsbergen, Qingze Hum, Richard Schumi, Pawel Szalachowski

IEEE Communications Surveys and Tutorials 2019

SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets.

I. Homoliak, Dominik Breitenbacher, Alexander Binder, Pawel Szalachowski

An Empirical Study Into the Success of Listed Smart Contracts in Ethereum

P. Hartel, I. Homoliak, Daniël Reijsbergen

IEEE Access 2019

Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics

Y. Tan, Alfonso Iacovazzi, I. Homoliak, Y. Elovici, A. Binder

IEEE International Joint Conference on Neural Network 2019

Increasing Trust in Tor Node List Using Blockchain

Lukás Hellebrandt, I. Homoliak, K. Malinka, P. Hanáček

International Conference on Blockchain 2019

HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices

Dominik Breitenbacher, I. Homoliak, Y. Aung, Nils Ole Tippenhauer, Y. Elovici

ACM Asia Conference on Computer and Communications Security 2019

StrongChain: Transparent and Collaborative Proof-of-Work Consensus

Pawel Szalachowski, Daniël Reijsbergen, I. Homoliak, Siwei Sun

USENIX Security Symposium 2019

A Security Reference Architecture for Blockchains

I. Homoliak, Sarad Venugopalan, Qingze Hum, Pawel Szalachowski

International Congress on Blockchain and Applications 2019

SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets

I. Homoliak, Dominik Breitenbacher, Alexander Binder, Pawel Szalachowski

Conference on Advances in Financial Technologies 2018

Detection of Masqueraders Based on Graph Partitioning of File System Access Events

Flavio Toffalini, I. Homoliak, A. Harilal, Alexander Binder, Martín Ochoa

2018 IEEE Security and Privacy Workshops (SPW) 2018

Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach

I. Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, P. Hanáček

EAI Endorsed Trans. Security Safety 2018

Insight Into Insiders and IT

I. Homoliak, Flavio Toffalini, J. Guarnizo, Y. Elovici, Martín Ochoa

ACM Computing Surveys 2018

Survey of Privacy Enabling Strategies in IoT Networks

Lukás Hellebrandt, Ondřej Hujňák, P. Hanáček, I. Homoliak

TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition

A. Harilal, Flavio Toffalini, J. H. Castellanos, J. Guarnizo, I. Homoliak, Martín Ochoa

MIST@CCS 2017

Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection

I. Homoliak, Martin Teknos, M. Barabas, P. Hanáček

Security and Privacy in Communication Networks 2016

On the application of symbolic regression and genetic programming for cryptanalysis of symmetric encryption algorithm

Tomas Smetka, I. Homoliak, P. Hanáček

International Carnahan Conference on Security Technology 2016

Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks

I. Homoliak, L. Sulak, P. Hanáček

Web Information System and Application Conference 2016

NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic

I. Homoliak, Daniel Ovsonka, M. Grégr, P. Hanáček

International Conference for Internet Technology and Secured Transactions 2014

Characteristics of buffer overflow attacks tunneled in HTTP traffic

I. Homoliak, Daniel Ovsonka, Karel Koranda, P. Hanáček

International Carnahan Conference on Security Technology 2014

A concept of behavioral reputation system in wireless networks

Matej Kacic, P. Hanáček, Martin Henzl, I. Homoliak

International Carnahan Conference on Security Technology 2013

DAG-Sword: A Simulator of Large-Scale Network Topologies for DAG-Oriented Proof-of-Work Blockchains

Martin Peresíni, Tomás Hladký, K. Malinka, I. Homoliak

Hawaii International Conference on System Sciences 2024

Resilience of Voice Assistants to Synthetic Speech

K. Malinka, Anton Firc, Petr Kaska, Tomás Lapsanský, Oskar Sandor, I. Homoliak

European Symposium on Research in Computer Security 2024

Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers

Lenka Turonová, L. Holík, I. Homoliak, Ondřej Lengál, Margus Veanes, Tomáš Vojnar

USENIX Security Symposium 2022

ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors

I. Homoliak, K. Malinka, P. Hanáček

IEEE Access 2020

2 Background and Problem Definition 2 . 1 Nakamoto Consensus and Bitcoin

Pawel Szalachowski, Daniël Reijsbergen, I. Homoliak, Siwei Sun

Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures

I. Homoliak, Flavio Toffalini, J. Guarnizo, Y. Elovici, Martín Ochoa

arXiv.org 2018

Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset

I. Homoliak, Dominik Breitenbacher, P. Hanáček

Journal of Computers 2017

Advanced Security Network Metrics

I. Homoliak, M. Barabas, P. Chmelar, M. Drozd, P. Hanáček

Automated Malware Detection Based on Novel Network Behavioral Signatures

M. Barabas, I. Homoliak, M. Drozd, P. Hanáček

ASNM: Advanced Security Network Metrics for Attack Vector Description

I. Homoliak, M. Barabas, P. Chmelar, M. Drozd, P. Hanáček

Detection of network buffer overflow attacks: A case study

M. Barabas, I. Homoliak, Matej Kacic, P. Hanáček

International Carnahan Conference on Security Technology 2013