Cloud computing and smart networks

Obliczenia_chmurowe_i_inteligentne_sieci

We carry out national and international research and development projects related to secure quantum communications and the creation and enhancement of distributed systems security.

The proliferation of data-collecting devices in the world around us creates new opportunities in the area of Big Data system development, alongside new security challenges At NASK SCIENCE, we are building large-scale data collection systems (e.g., telemetry and honeypot data) and developing cloud based solutions to process this information efficiently. Our research and development efforts also focus on enhancing the security of distributed systems, including the Internet of Things (IoT), the Industrial Internet of Things (IIoT), and mobile devices.

We are focused on developing lightweight threat detectors using machine learning, a field in which we have successfully applied our expertise. For instance, we contributed to the international GUARD project and integrated our solutions into the BotSense system within SKAM  project, providing enhanced security for e-banking clients of multiple Polish banks.

 

Our work emphasizes the resilience of systems against attacks that attempt to exploit machine learning vulnerabilities. As part of the LaVA project, in collaboration with the Warsaw University of Technology, we are developing pioneering methods to attack machine learning models, enabling a more comprehensive evaluation of cyber-physical system vulnerabilities.

 

As part of the Optokrypt project, we are advancing cutting-edge optical quantum cryptography technologies to safeguard data exchanges within communication networks, contributing to national security and defence

Selected Publications

Articles

Jan Wolski, Mirosław Kutyłowski, "Kleptographic Fountain - Leakage via a Binary Erasure Channel", Data Security and Privacy Protection: Third International Conference, DSPP 2025, Xi'an, China, October 16–18, 2025, Proceedings, Part I, 2025, 394-411.
Mirosław Kutyłowski, Gabriel Wechta, "Pseudonymization and reporters’ protection by design in the EU whistleblower directive", Journal of Cybersecurity, 11(1), 2025, .
Adrian Cinal, Przemysław Kubiak, Mirosław Kutyłowski, Gabriel Wechta, "Anamorphic Monero Transactions: The Threat of Bypassing Anti-money Laundering Laws", Computer Security – ESORICS 2025: 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II, 2025, 103-123.
Mirosław Kutyłowski, Przemysław Kubiak, Paweł Kostkiewicz, "CPace Protocol—From the Perspective of Malicious Cryptography", Electronics, 14(17), 2025, 3382.
Jan Bormet, Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej, Marcin Mielniczuk, "Strong Secret Sharing with Snitching", Advances in Cryptology – CRYPTO 2025 , , 2025, 295-327.
Mateusz Leśniak, Michał Wroński, Ewa Syta, Mirosław Kutyłowski, "Unveiling Privacy Risks in Quantum Optimization Services", ASIA CCS '25: Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, , 2025, 665-681.
Dominik Bojko, Jacek Cichoń, Mirosław Kutyłowski, Oliwer Sobolewski, "Rejection Sampling for Covert Information Channel: Symmetric Power-Of-2-Choices", ASIA CCS '25: Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, , 2025, 198-214.
Łukasz Krzywiecki, Gabriel Wechta, "Proof of Training: Obtaining Verifiable ML Models by Delegating Training to a Blockchain Network", Computational Science - ICCS 2025, Proceedings, Part II, 2025, 207-221.
Adrian Cinal, Oliwer Sobolewski, "On Cofactored Verification of EdDSA Signatures", International Journal of Electronics and Telecommunications, 71(2), 2025, 453-461.
Mirosław Kutyłowski, Anna Lauks-Dutka, Przemysław Błaśkiewicz, "Darknet signatures: public ledgers and a threat of illegal betting platforms", International Journal of Information Security, 24(3), 2025, .
Michał Wroński, Mateusz Leśniak, "Transformation of the discrete logarithm problem over F2n to the QUBO problem using normal bases", International Journal of Electronics and Telecommunications, 71(1), 2025, 47-53.
Mirosław Kutyłowski, Oliwer Sobolewski, "Privacy Illusion: Subliminal Channels in Schnorr-like Blind-Signature Schemes", Applied Sciences, 15(5), 2025, 2864.
Dun Li, Noel Crespi, Roberto Minerva, Wei Liang, Kuan-Ching Li, Joanna Kołodziej, "DPS-IIoT: Non-interactive zero-knowledge proof-inspired access control towards information-centric Industrial Internet of Things", Computer Communications, 233, 2025, 108065.
Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej, Marcin Mielniczuk, "Secret Sharing with Snitching", Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS '24), , 2024, 840-853.
Zeta Avarikioti, Paweł Kędzior, Tomasz Lizurej, Tomasz Michalak, "Bribe & Fork: Cheap PCN Bribing Attacks via Forking Threat", 6th Conference on Advances in Financial Technologies (AFT 2024), , 2024, 11:1-11:22.
Marek Amanowicz, "A Methodology for Online Situational Awareness Provision in a Business Entity", Electronics, 14(3), 2025, 470.
Przemysław Kubiak, Oliwer Sobolewski, "HBSS+: Simple Hash-Based Stateless Signatures Revisited", Cyber Security, Cryptology, and Machine Learning; 8th International Symposium, CSCML 2024, 2025, 368-379.
Giuseppe Stragapede et al., "KVC-onGoing: Keystroke Verification Challenge", Pattern Recognition, , 2024, 111287.
Oliwer Sobolewski, Konrad Wrona, Adrian Cinal, Gabriel Wechta, Joanna Śliwa, Mateusz Leśniak, Michał Wroński, Mirosław Kutyłowski, Przemysław Kubiak, "Quantum-Resistant Key Management for Underwater Acoustic Multicast Communication", MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM), , 2024, 196-201.
Konrad Wrona, Oliwer Sobolewski, Joanna Śliwa, Mirosław Kutyłowski, Przemysław Kubiak, Gabriel Wechta, Adrian Cinal, Mateusz Leśniak, Michał Wroński, "Quantum-Resistant One-to-One Communication for Underwater Acoustic Networks", MILCOM 2024 - 2024 IEEE Military Communications Conference, , 2024, 190-195.
Mirosław Kutyłowski, Anna Lauks-Dutka, Przemysław Kubiak, Marcin Zawada, "FIDO2 Facing Kleptographic Threats By-Design", Applied Sciences, 14(23), 2024, 11371.
Łukasz Dzierzkowski, Michał Wroński, "Solving Elliptic Curve Discrete Logarithm Problem on Twisted Edwards Curves Using Quantum Annealing and Index Calculus Method", Tatra Mountains Mathematical Publications, , 2024,
George-Mircea Grosu, Silvia-Elena Nistor, Radu-Ioan Ciobanu, Joanna Kołodziej, Florin Pop, "Computation Augmentation Techniques for Computing Continuum", 2024 IEEE 24th International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW), CCGridW 2024, 2024, 136-143.
Mateusz Krzysztoń, Bartosz Bok, Paweł Żakieta, Joanna Kołodziej, "Evasion attacks on ML in domains with nonlinear constraints", 2024 IEEE 24th International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW), CCGridW 2024, 2024, 112-119.
Bartłomiej Marek, Kacper Pieniążek, Filip Ratajczak, Wojciech Adamczyk, Bartosz Bok, Mateusz Krzysztoń, "Securing ML-based Android Malware Detectors: A Defensive Feature Selection Approach against Backdoor Attacks", 2024 IEEE 24th International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW), CCGridW 2024, 2024, 128-135.
Piotr Nawrocki, Bartłomiej Śnieżyński, Joanna Kołodziej, Paweł Szynkiewicz, "Adaptive context-aware service optimization in Mobile Cloud Computing accounting for security aspects", Concurrency and Computation Practice and Experience, 33, 2021, e6070.
Giuseppe Stragapede et al., "IEEE BigData 2023 Keystroke Verification Challenge (KVC)", IEEE International Conference on Big Data (BigData), Sorrento, Italy, 2023, 6092-6100.
Piotr Szuster, Joanna Kołodziej, "Convective cells algorithm for storm data tracking", Communications of the ECMS, ECMS 2023, 37th Proceedings, 37(1), 2023,
Joanna Kołodziej, Mateusz Krzysztoń, Paweł Szynkiewicz, "Anomaly Detection in TCP/IP Networks", Communications of the ECMS, ECMS 2023, 37th Proceedings, Volume 37, Issue 1, 2023,
Piotr Arabas, Andrzej Sikora, Wojciech Szynkiewicz, "Energy-Aware Activity Control for Wireless Sensing Infrastructure Using Periodic Communication and Mixed-Integer Programming", Energies, 14(16), 2021, 4828.
Piotr Arabas, "Modeling and simulation of hierarchical task allocation system for energy-aware HPC clouds", Simulation Modelling Practice and Theory, Volume 107, 201, 102221.

Books

Ewa Niewiadomska-Szynkiewicz, Michał Marks, Piotr Arabas, Andrzej Sikora, "Bezprzewodowe sieci czujników w internecie rzeczy. Modele – Algorytmy – Protokoły", Modele – Algorytmy – Protokoły, Vol. I, Warszawa: Wydawnictwo PWN, 2022, 292.