Konstantinos Markantonakis


I am a Professor of Information Security at the  Information Security Group at Royal Holloway, University of London and the Director of the Smart Card and IoT Security Centre. My main research areas include trusted execution environments, embedded devices and cyber physical system security, smart cards and RFIDs, avionics and drone security, automotive, payment and transport systems, mobile phone/NFC/secure element security, ambient sensors, Internet-of- Things (IoTs).

Active Research

  • Research #1
  • Research #2

Research

  • Another Research #1

Recent Work

Conference contribution

2017
CC105🔗Mtita, C, Laurent, M, Sauveron, D , Akram, RN , Markantonakis, K & Chaumette, S 2017, Serverless Protocols for Inventory and Tracking with a UAV. in Digital Avionics Systems Conference (DASC), 2017 IEEE/AIAA 36th. IEEE Computer Society Press, St. Petersburg, Florida, USA, pp. 1-11, The 36th IEEE/AIAA Digital Avionics Systems Conference , St. Petersburg, United States, 17-21 September. DOI: 10.1109/DASC.2017.8102113
CC104🔗Gurulian, I , Markantonakis, K , Shepherd, C, Frank, E & Akram, R 2017, Proximity Assurances Based on Natural and Artificial Ambient Environments. in 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers. Security and Cryptology, vol. 10543, Springer, 10th International Conference on Security for Information Technology and Communications, Bucharest, Romania, 8 July. DOI: 10.1007/978-3-319-69284-5
CC103🔗Shepherd, C , Akram, RN & Markantonakis, K 2017, EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. in 11th IFIP International Conference on Information Security Theory and Practice (WISTP’17). Springer.
CC102🔗Gurulian, I , Shepherd, C , Markantonakis, K, Frank, E , Akram, R & Mayes, K 2017, On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks. in Trustcom/BigDataSE/ICESS, 2017 IEEE. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Sydney, Australia, 1-4 August. DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.218
CC101🔗Gurulian, I , Markantonakis, K , Akram, R & Mayes, K 2017, Artificial Ambient Environments for Proximity Critical Applications. in ARES ’17: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM. DOI: 10.1145/3098954.3098964
CC100🔗Shepherd, C , Akram, R & Markantonakis, K 2017, Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments. in 12th International Conference on Availability, Reliability and Security (ARES ’17). ACM, pp. 1-10, 12th International Conference on Availability, Reliability and Security , Reggio Calabria, Italy, 29-31 August. DOI: 10.1145/3098954.3098971
CC99🔗Lee, R , Markantonakis, K & Akram, R 2017, Provisioning Software with Hardware-Software Binding. in FARES ’17 Proceedings of the 12th International Workshop on Frontiers in Availability, Reliability and Security. ACM. DOI: 10.1145/3098954.3103158
CC98🔗Kyrillidis, L , Cobourne, S , Mayes, K & Markantonakis, K 2017, A Smart Card Web Server in the Web of Things. in SAI Intelligent Systems Conference 2016 (IntelliSys 2016). Lecture Notes in Networks and Systems , vol. 16, Springer, pp. 769-784. DOI: 10.1007/978-3-319-56991-8_55
CC97🔗Shepherd, C, Petitcolas, F , Akram, R & Markantonakis, K 2017, An Exploratory Analysis of the Security Risks of the Internet of Things in Finance. in J Lopez, S Fischer-Hübner & C Lambrinoudakis (eds), Trust, Privacy and Security in Digital Business: 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10442, Springer-Verlag, pp. 164-179, 14th International Conference on Trust, Privacy & Security in Digital Business, Lyon, France, 28-31 August. DOI: 10.1007/978-3-319-64483-7_11
CC96🔗Jayasinghe, D , Markantonakis, K , Akram, R & Mayes, K 2017, Enhancing EMV Tokenisation with Dynamic Transaction Tokens. in G Hancke & K Markantonakis (eds), Radio Frequency Identification and IoT Security: RFIDSec 2016. Lecture Notes in Computer Science , vol. 10155, Springer, pp. 107-122. DOI: 10.1007/978-3-319-62024-4_8
CC95🔗Umar, A , Gurulian, I , Mayes, K & Markantonakis, K 2017, Tokenisation Blacklisting using Linkable Group Signatures. in Security and Privacy in Communication Networks: 12th EAI International Conference on Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. DOI: 10.1007/978-3-319-59608-2_10
CC94🔗Shepherd, C , Akram, R & Markantonakis, K 2017, Towards Trusted Execution of Multi-modal Continuous Authentication Schemes. in Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing (SAC ’17). ACM, Marrakech, Morocco, pp. 1444-1451. DOI: 10.1145/3019612.3019652
CC93🔗Haken, G , Markantonakis, K , Gurulian, I , Shepherd, C & Akram, R 2017, Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay. in Proceedings of the 3rd ACM International Workshop on Cyber-Physical System Security: CPSS ’17. ACM, New York, pp. 21-32 , 3rd ACM Cyber-Physical System Security Workshop (CPSS 2017), Abu Dhabi, United Arab Emirates, 2-2 April. DOI: 10.1145/3055186.3055201
CC92🔗Umar, A , Akram, RN , Mayes, K & Markantonakis, K 2017, Ecosystems of Trusted Execution Environment on Smartphones – A Potentially Bumpy Road. in P Urien & S Piramuthu (eds), Mobile and Secure Services (MobiSecServ), 2017 Third International Conference on. IEEE, 3rd International Conference on Mobile and Secure Services (MobiSecServ), Miami Beach, 11-12 February. DOI: 10.1109/MOBISECSERV.2017.7886559
CC91🔗Jayasinghe, D , Cobourne, S , Markantonakis, K , Akram, RN & Mayes, K 2017, Philanthropy On The Blockchain. in The 11th WISTP International Conference on Information Security Theory and Practice (WISTP’2017). Lecture Notes in Computer Science (LNCS), Springer.
CC90🔗Gurulian, I , Akram, R , Markantonakis, K & Mayes, K 2017, Preventing Relay Attacks in Mobile Transactions Using Infrared Light. in SAC ’17: Proceedings of the 32nd Annual ACM Symposium on Applied Computing. ACM, pp. 1724-1731, The 32nd ACM Symposium on Applied Computing, Marrakesh, Morocco, 3-6 April. DOI: 10.1145/3019612.3019794
CC89🔗Shepherd, C , Gurulian, I, Frank, E , Markantonakis, K , Akram, R , Mayes, K & Panaousis, E 2017, The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions. in Mobile Security Technologies (MoST ’17), IEEE Security & Privacy Workshops. IEEE, IEEE Mobile Security Technologies (MOST) 2017, San Jose, United States, 25-25 May.
CC88🔗Jayasinghe, D , Markantonakis, K , Gurulian, I , Akram, R & Mayes, K 2017, Extending EMV Tokenised Payments To Offline-Environments. in The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, pp. 1-8. DOI: 10.1109/TrustCom.2016.0095
CC87🔗Mansor, H , Markantonakis, K , Akram, R , Mayes, K & Gurulian, I 2017, Log your car: The non-invasive vehicle forensics. in Y Xiang, K Ren & D Feng (eds), he 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16)., TrustCom Paper 147, IEEE Computer Society, pp. 1-9. DOI: 10.1109/TrustCom.2016.0164
CC86🔗Shepherd, C, Arfaoui, G , Gurulian, I , Lee, R , Markantonakis, K , Akram, R, Sauveron, D & Conchon, E 2017, Secure and Trusted Execution: Past, Present and Future — A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems. in Y Xiang, K Ren & D Feng (eds), The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). ., TrustCom Paper 342, IEEE Computer Society, pp. 1-10. DOI: 10.1109/TrustCom.2016.0060
CC85🔗Akram, R, Bonnefoi, P-F, Chaumette, S , Markantonakis, K & Sauveron, D 2017, Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements. in Y Xiang, K Ren & D Feng (eds), the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16)., TrustCom Paper 297, IEEE Computer Society. DOI: 10.1109/TrustCom.2016.0116
CC84🔗Hassan, M , Markantonakis, K & Akram, R 2017, Can you call the software in your device firmware? in e-Business Engineering (ICEBE), 2016 IEEE 13th International Conference on. IEEE Computer Society Press, Macau, China, pp. 1-8, The 13th IEEE International Conference on e-Business Engineering (ICEBE 2016), Macau, China, 4-6 November. DOI: 10.1109/ICEBE.2016.040
CC83🔗Mansor, H , Markantonakis, K , Akram, R , Mayes, K & Gurulian, I 2017, Log Your Car: Reliable Maintenance Services Record. in Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers. vol. 10143, Lecture Notes in Computer Science , vol. 10143, Springer, pp. 484-504, 12th International Conference on Information Security and Cryptology (Inscrypt), Beijing, China, 4-6 November. DOI: 10.1007/978-3-319-54705-3_30

Chapter

2017
CH20🔗Markantonakis, K & Akram, RN 2017, Multi-Application Smart Card Platforms and Operating Systems. in K Mayes & K Markantonakis (eds), Smart Cards, Tokens, Security and Applications. Springer International Publishing, Cham, pp. 59-92. DOI: 10.1007/978-3-319-50500-8_3
CH19🔗Sauveron, D , Akram, RN & Markantonakis, K 2017, Smart Card Reader and Mobile APIs. in K Mayes & K Markantonakis (eds), Smart Cards, Tokens, Security and Applications. Springer International Publishing, Cham, pp. 305-349. DOI: 10.1007/978-3-319-50500-8_12

Paper

2017
PA12🔗Akram, RN , Markantonakis, K , Mayes, K, Habachi, O, Sauveron, D, Steyven, A & Chaumette, S 2017, ‘ Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones‘ Paper presented at The 36th IEEE/AIAA Digital Avionics Systems Conference , St. Petersburg, United States, 17/09/17 – 21/09/17, pp. 1-12. DOI: 10.1109/DASC.2017.8101984
PA11🔗Gurulian, I, Hancke, G , Markantonakis, K & Akram, RN 2017, ‘ May The Force Be With You: Force-Based Relay Attack Detection‘ Paper presented at 17th Smart Card Research and Advanced Application Conference, Lugano, Switzerland, 13/11/17 – 15/11/17, .
PA10🔗Ducray, B , Cobourne, S , Mayes, K & Markantonakis, K 2017, ‘ Comparison of Dynamic Biometric Security Characteristics against other Biometrics‘ Paper presented at IEEE International Conference on Communications, Paris, France, 21/05/17 – 25/05/17, . DOI: 10.1109/ICC.2017.7996938
PA9🔗Ducray, B , Cobourne, S , Mayes, K & Markantonakis, K 2017, ‘ Gesture Recognition Implemented on a Personal Limited Device.‘ Paper presented at International Conference on Information and Communication Systems, Irbid, Jordan, 4/04/17 – 6/04/17, . DOI: 10.1109/IACS.2017.7921966