default search action
Angelos D. Keromytis
Person information
- affiliation: Columbia University, New York City, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2011
- [b2]Angelos D. Keromytis:
Voice over IP Security - A Comprehensive Survey of Vulnerabilities and Academic Research. Springer Briefs in Computer Science 1, Springer 2011, ISBN 978-1-4419-9865-1, pp. i-xiii, 1-83 - 2006
- [b1]Debra L. Cook, Angelos D. Keromytis:
CryptoGraphics - Exploiting Graphics Cards for Security. Advances in Information Security 20, Springer 2006, ISBN 978-0-387-29015-7, pp. 1-139
Journal Articles
- 2019
- [j46]Dimitris Mitropoulos, Panos Louridas, Michalis Polychronakis, Angelos Dennis Keromytis:
Defending Against Web Application Attacks: Approaches, Challenges and Implications. IEEE Trans. Dependable Secur. Comput. 16(2): 188-203 (2019) - [j45]Marios Pomonis, Theofilos Petsios, Angelos D. Keromytis, Michalis Polychronakis, Vasileios P. Kemerlis:
Kernel Protection Against Just-In-Time Code Reuse. ACM Trans. Priv. Secur. 22(1): 5:1-5:28 (2019) - 2017
- [j44]George Argyros, Theofilos Petsios, Suphannee Sivakorn, Angelos D. Keromytis, Iasonas Polakis:
Evaluating the Privacy Guarantees of Location Proximity Services. ACM Trans. Priv. Secur. 19(4): 12:1-12:31 (2017) - 2016
- [j43]Dimitris Mitropoulos, Konstantinos Stroggylos, Diomidis Spinellis, Angelos D. Keromytis:
How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints. ACM Trans. Priv. Secur. 19(1): 2:1-2:31 (2016) - [j42]Kapil Anand, Khaled Elwazeer, Aparna Kotha, Matthew Smithson, Rajeev Barua, Angelos D. Keromytis:
A Stack Memory Abstraction and Symbolic Analysis Framework for Executables. ACM Trans. Softw. Eng. Methodol. 25(2): 19:1-19:38 (2016) - 2015
- [j41]Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Angelos D. Keromytis:
An efficient and easily deployable method for dealing with DoS in SIP services. Comput. Commun. 57: 50-63 (2015) - [j40]Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis:
Detection and analysis of eavesdropping in anonymous communication networks. Int. J. Inf. Sec. 14(3): 205-220 (2015) - [j39]Yossef Oren, Angelos D. Keromytis:
Attacking the Internet Using Broadcast Digital Television. ACM Trans. Inf. Syst. Secur. 17(4): 16:1-16:27 (2015) - 2012
- [j38]Angelos D. Keromytis:
A Comprehensive Survey of Voice over IP Security Research. IEEE Commun. Surv. Tutorials 14(2): 514-537 (2012) - [j37]Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo:
A system for generating and injecting indistinguishable network decoys. J. Comput. Secur. 20(2-3): 199-221 (2012) - [j36]Vasileios P. Kemerlis, Georgios Portokalidis, Elias Athanasopoulos, Angelos D. Keromytis:
kGuard: Lightweight Kernel Protection. login Usenix Mag. 37(6) (2012) - 2011
- [j35]Ted Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung:
The Efficient Dual Receiver Cryptosystem and Its Applications. Int. J. Netw. Secur. 13(3): 135-151 (2011) - 2010
- [j34]Andrea M. Matwyshyn, Ang Cui, Angelos D. Keromytis, Salvatore J. Stolfo:
Ethics in Security Vulnerability Research. IEEE Secur. Priv. 8(2): 67-72 (2010) - [j33]Angelos D. Keromytis:
Voice-over-IP Security: Research and Practice. IEEE Secur. Priv. 8(2): 76-78 (2010) - [j32]Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems. Mach. Learn. 81(2): 179-205 (2010) - [j31]Stephen W. Boyd, Gaurav S. Kc, Michael E. Locasto, Angelos D. Keromytis, Vassilis Prevelakis:
On the General Applicability of Instruction-Set Randomization. IEEE Trans. Dependable Secur. Comput. 7(3): 255-270 (2010) - [j30]David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis:
A market-based bandwidth charging framework. ACM Trans. Internet Techn. 10(1): 1:1-1:30 (2010) - [j29]Angelos D. Keromytis:
A Look at VoIP Vulnerabilities. login Usenix Mag. 35(1) (2010) - 2009
- [j28]Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee:
Dynamic Trust Management. Computer 42(2): 44-52 (2009) - [j27]Angelos D. Keromytis:
Randomized Instruction Sets and Runtime Environments Past Research and Future Directions. IEEE Secur. Priv. 7(1): 18-25 (2009) - [j26]Brian M. Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo:
Designing Host and Network Sensors to Mitigate the Insider Threat. IEEE Secur. Priv. 7(6): 22-29 (2009) - [j25]Hyung Chan Kim, Angelos D. Keromytis:
On the Deployment of Dynamic Taint Analysis for Application Communities. IEICE Trans. Inf. Syst. 92-D(3): 548-551 (2009) - [j24]Debra L. Cook, Moti Yung, Angelos D. Keromytis:
Elastic block ciphers: method, security and instantiations. Int. J. Inf. Sec. 8(3): 211-231 (2009) - [j23]Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin:
Anonymity in Wireless Broadcast Networks. Int. J. Netw. Secur. 8(1): 37-51 (2009) - 2008
- [j22]Stefan Miltchev, Jonathan M. Smith, Vassilis Prevelakis, Angelos D. Keromytis, Sotiris Ioannidis:
Decentralized access control in distributed file systems. ACM Comput. Surv. 40(3): 10:1-10:30 (2008) - 2007
- [j21]Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis:
COVERAGE: detecting and reacting to worm epidemics using cooperation and validation. Int. J. Inf. Sec. 6(6): 361-378 (2007) - [j20]Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Kostas G. Anagnostakis, Jonathan M. Smith:
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications. Int. J. Netw. Secur. 4(1): 69-80 (2007) - [j19]Angelos D. Keromytis, Jonathan M. Smith:
Requirements for scalable access control and security management architectures. ACM Trans. Internet Techn. 7(2): 8 (2007) - 2006
- [j18]Stelios Sidiroglou, Angelos D. Keromytis:
Execution transactions for defending against software failures: use and evaluation. Int. J. Inf. Sec. 5(2): 77-91 (2006) - [j17]Angelos D. Keromytis, Jason L. Wright, Theo de Raadt, Matthew Burnside:
Cryptography as an operating system service: A case study. ACM Trans. Comput. Syst. 24(1): 1-38 (2006) - [j16]Steven M. Bellovin, Bill Cheswick, Angelos D. Keromytis:
Worm Propagation Strategies in an IPv6 Internet. login Usenix Mag. 31(1) (2006) - 2005
- [j15]Angelos Stavrou, Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
WebSOS: an overlay-based system for protecting web servers from denial of service attacks. Comput. Networks 48(5): 781-807 (2005) - [j14]Stelios Sidiroglou, Angelos D. Keromytis:
Countering Network Worms Through Automatic Patch Generation. IEEE Secur. Priv. 3(6): 41-49 (2005) - [j13]Stelios Sidiroglou, Michael E. Locasto, Angelos D. Keromytis:
Hardware support for self-healing software services. SIGARCH Comput. Archit. News 33(1): 42-47 (2005) - [j12]Matthew Burnside, Angelos D. Keromytis:
The case for crypto protocol awareness inside the OS kernel. SIGARCH Comput. Archit. News 33(1): 58-64 (2005) - 2004
- [j11]Angelos D. Keromytis:
"Patch on Demand" Saves Even More Time? Computer 37(8): 94-96 (2004) - [j10]Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
SOS: an architecture for mitigating DDoS attacks. IEEE J. Sel. Areas Commun. 22(1): 176-188 (2004) - [j9]William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold:
Just fast keying: Key agreement in a hostile internet. ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004) - 2003
- [j8]Vassilis Prevelakis, Angelos D. Keromytis:
Drop-in security for distributed and portable computing elements. Internet Res. 13(2): 107-115 (2003) - [j7]Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith:
A secure PLAN. IEEE Trans. Syst. Man Cybern. Part C 33(3): 413-426 (2003) - 2002
- [j6]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
Trust management for IPsec. ACM Trans. Inf. Syst. Secur. 5(2): 95-118 (2002) - 2001
- [j5]D. Scott Alexander, Paul Menage, Angelos D. Keromytis, William A. Arbaugh, Kostas G. Anagnostakis, Jonathan M. Smith:
The price of safety in an active network. J. Commun. Networks 3(1): 4-18 (2001) - 2000
- [j4]D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Steve Muir, Jonathan M. Smith:
Secure quality of service handling: SQoSH. IEEE Commun. Mag. 38(4): 106-112 (2000) - 1998
- [j3]D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith:
Safety and security of programmable network infrastructures. IEEE Commun. Mag. 36(10): 84-92 (1998) - [j2]D. Scott Alexander, William Arbaugh, Michael Hicks, Pankaj Kakkar, Angelos Dennis Keromytis, Jonathan T. Moore, Carl A. Gunter, Scott Nettles, Jonathan M. Smith:
The SwitchWare active network architecture. IEEE Netw. 12(3): 29-36 (1998) - [j1]D. Scott Alexander, William Arbaugh, Angelos Dennis Keromytis, Jonathan M. Smith:
A secure active network environment architecture: realization in SwitchWare. IEEE Netw. 12(3): 37-45 (1998)
Conference and Workshop Papers
- 2024
- [c174]Georgios Kokolakis, Athanasios Moschos, Angelos D. Keromytis:
Harnessing the Power of General-Purpose LLMs in Hardware Trojan Design. ACNS Workshops (1) 2024: 176-194 - [c173]Athanasios Moschos, Fabian Monrose, Angelos D. Keromytis:
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans. HOST 2024: 254-259 - [c172]Hexuan Yu, Changlai Du, Yang Xiao, Angelos D. Keromytis, Chonggang Wang, Robert Gazda, Y. Thomas Hou, Wenjing Lou:
AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials. NDSS 2024 - 2023
- [c171]Zane Ma, Aaron Faulkenberry, Thomas Papastergiou, Zakir Durumeric, Michael D. Bailey, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis:
Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys. IMC 2023: 222-235 - [c170]Changlai Du, Hexuan Yu, Yang Xiao, Y. Thomas Hou, Angelos D. Keromytis, Wenjing Lou:
UCBlocker: Unwanted Call Blocking Using Anonymous Authentication. USENIX Security Symposium 2023: 445-462 - [c169]Athanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, Charles Lever, Paul Burbage, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis:
Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators. USENIX Security Symposium 2023: 5307-5324 - 2022
- [c168]Aaron Faulkenberry, Athanasios Avgetidis, Zane Ma, Omar Alrawi, Charles Lever, Panagiotis Kintis, Fabian Monrose, Angelos D. Keromytis, Manos Antonakakis:
View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy. ACSAC 2022: 240-250 - [c167]Yaakov Cohen, Kevin Sam Tharayil, Arie Haenel, Daniel Genkin, Angelos D. Keromytis, Yossi Oren, Yuval Yarom:
HammerScope: Observing DRAM Power Consumption Using Rowhammer. CCS 2022: 547-561 - 2018
- [c166]Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodríguez, Moti Yung:
Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs. CSCML 2018: 206-226 - 2017
- [c165]Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, Suman Jana:
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities. CCS 2017: 2155-2168 - [c164]Marios Pomonis, Theofilos Petsios, Angelos D. Keromytis, Michalis Polychronakis, Vasileios P. Kemerlis:
kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse. EuroSys 2017: 420-436 - [c163]Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, Suman Jana:
HVLearn: Automated Black-Box Analysis of Hostname Verification in SSL/TLS Implementations. IEEE Symposium on Security and Privacy 2017: 521-538 - [c162]Theofilos Petsios, Adrian Tang, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana:
NEZHA: Efficient Domain-Independent Differential Testing. IEEE Symposium on Security and Privacy 2017: 615-632 - 2016
- [c161]Georgios Kontaxis, Angelos D. Keromytis:
Protecting Insecure Communications with Topology-aware Network Tunnels. CCS 2016: 1280-1291 - [c160]George Argyros, Ioannis Stais, Suman Jana, Angelos D. Keromytis, Aggelos Kiayias:
SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning. CCS 2016: 1690-1701 - [c159]Elias Athanasopoulos, Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis:
NaClDroid: Native Code Isolation for Android Applications. ESORICS (1) 2016: 422-439 - [c158]Suphannee Sivakorn, Iasonas Polakis, Angelos D. Keromytis:
I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs. EuroS&P 2016: 388-403 - [c157]George Argyros, Ioannis Stais, Aggelos Kiayias, Angelos D. Keromytis:
Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters. IEEE Symposium on Security and Privacy 2016: 91-109 - [c156]Suphannee Sivakorn, Iasonas Polakis, Angelos D. Keromytis:
The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information. IEEE Symposium on Security and Privacy 2016: 724-742 - [c155]Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, Evangelos P. Markatos:
Provable Network Activity for Protecting Users Against False Accusation. WISTP 2016: 254-261 - [c154]Suphannee Sivakorn, Angelos D. Keromytis, Jason Polakis:
That's the Way the Cookie Crumbles: Evaluating HTTPS Enforcing Mechanisms. WPES@CCS 2016: 71-81 - 2015
- [c153]Theofilos Petsios, Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis:
DynaGuard: Armoring Canary-based Protections against Brute-force Attacks. ACSAC 2015: 351-360 - [c152]Iasonas Polakis, George Argyros, Theofilos Petsios, Suphannee Sivakorn, Angelos D. Keromytis:
Where's Wally?: Precise User Discovery Attacks in Location Proximity Services. CCS 2015: 817-828 - [c151]Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis:
The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications. CCS 2015: 1406-1418 - [c150]Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco de Borja Rodríguez, Moti Yung:
Privacy Threats in E-Shopping (Position Paper). DPM/QASA@ESORICS 2015: 217-225 - 2014
- [c149]Marios Pomonis, Theofilos Petsios, Kangkook Jee, Michalis Polychronakis, Angelos D. Keromytis:
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking. ACSAC 2014: 416-425 - [c148]Iasonas Polakis, Federico Maggi, Stefano Zanero, Angelos D. Keromytis:
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned. BADGERS@ESORICS 2014: 18-29 - [c147]Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, Angelos D. Keromytis:
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication. CCS 2014: 501-512 - [c146]Sambuddho Chakravarty, Marco Valerio Barbera, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis:
On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records. PAM 2014: 247-257 - [c145]Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis:
Dynamic Reconstruction of Relocation Information for Stripped Binaries. RAID 2014: 68-87 - [c144]Vasilis Pappas, Fernando Krell, Binh Vo, Vladimir Kolesnikov, Tal Malkin, Seung Geol Choi, Wesley George, Angelos D. Keromytis, Steven M. Bellovin:
Blind Seer: A Scalable Private DBMS. IEEE Symposium on Security and Privacy 2014: 359-374 - [c143]Yossef Oren, Angelos D. Keromytis:
From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television. USENIX Security Symposium 2014: 353-368 - [c142]Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis:
ret2dir: Rethinking Kernel Isolation. USENIX Security Symposium 2014: 957-972 - 2013
- [c141]Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Angelos D. Keromytis:
A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP. ARES 2013: 224-229 - [c140]Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, Angelos D. Keromytis:
SAuth: protecting user accounts from password database leaks. CCS 2013: 187-198 - [c139]Kangkook Jee, Vasileios P. Kemerlis, Angelos D. Keromytis, Georgios Portokalidis:
ShadowReplica: efficient parallelization of dynamic data flow tracking. CCS 2013: 235-246 - [c138]John Jong-Uk Choi, Soon Ae Chun, Dong Hwa Kim, Angelos D. Keromytis:
SecureGov: secure data sharing for government services. DG.O 2013: 127-135 - [c137]Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas, Angelos D. Keromytis:
CellFlood: Attacking Tor Onion Routers on the Cheap. ESORICS 2013: 664-681 - [c136]Angeliki Zavou, Vasilis Pappas, Vasileios P. Kemerlis, Michalis Polychronakis, Georgios Portokalidis, Angelos D. Keromytis:
Cloudopsy: An Autopsy of Data Flows in the Cloud. HCI (27) 2013: 366-375 - [c135]Kapil Anand, Khaled Elwazeer, Aparna Kotha, Matthew Smithson, Rajeev Barua, Angelos D. Keromytis:
An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables. ICSM 2013: 90-99 - [c134]Vasilis Pappas, Vasileios P. Kemerlis, Angeliki Zavou, Michalis Polychronakis, Angelos D. Keromytis:
CloudFence: Data Flow Tracking as a Cloud Service. RAID 2013: 411-431 - [c133]Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis:
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. USENIX Security Symposium 2013: 447-462 - 2012
- [c132]Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis:
Self-healing multitier architectures using cascading rescue points. ACSAC 2012: 379-388 - [c131]Iasonas Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, Sotiris Ioannidis, Angelos D. Keromytis, Stefano Zanero:
All your face are belong to us: breaking Facebook's social authentication. ACSAC 2012: 399-408 - [c130]Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis, Angelos D. Keromytis:
Exploiting split browsers for efficiently protecting user data. CCSW 2012: 37-42 - [c129]Dimitris Geneiatakis, Georgios Portokalidis, Vasileios P. Kemerlis, Angelos D. Keromytis:
Adaptive defenses for commodity software through virtual application partitioning. CCS 2012: 133-144 - [c128]Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle, Angelos Stavrou:
The MEERKATS Cloud Security Architecture. ICDCS Workshops 2012: 446-450 - [c127]Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August, Angelos D. Keromytis:
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware. NDSS 2012 - [c126]Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, Sotiris Ioannidis:
Towards a Universal Data Provenance Framework Using Dynamic Instrumentation. SEC 2012: 103-114 - [c125]Salvatore J. Stolfo, Malek Ben Salem, Angelos D. Keromytis:
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. IEEE Symposium on Security and Privacy Workshops 2012: 125-128 - [c124]Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis:
Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization. IEEE Symposium on Security and Privacy 2012: 601-615 - [c123]Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis:
kGuard: Lightweight Kernel Protection against Return-to-User Attacks. USENIX Security Symposium 2012: 459-474 - [c122]Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos:
Privacy-Preserving Social Plugins. USENIX Security Symposium 2012: 631-646 - [c121]Vasileios P. Kemerlis, Georgios Portokalidis, Kangkook Jee, Angelos D. Keromytis:
libdft: practical dynamic data flow tracking for commodity systems. VEE 2012: 121-132 - 2011
- [c120]Vasilis Pappas, Angelos D. Keromytis:
Measuring the Deployment Hiccups of DNSSEC. ACC (3) 2011: 44-53 - [c119]Mansoor Alicherry, Angelos D. Keromytis:
Misuse Detection in Consent-Based Networks. ACNS 2011: 38-56 - [c118]Dimitris Geneiatakis, Angelos D. Keromytis:
Towards a Forensic Analysis for Multimedia Communication Services. AINA Workshops 2011: 424-429 - [c117]Angelos D. Keromytis, Salvatore J. Stolfo, Junfeng Yang, Angelos Stavrou, Anup K. Ghosh, Dawson R. Engler, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle:
The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security. SysSec@DIMVA 2011: 53-56 - [c116]Simha Sethumadhavan, Salvatore J. Stolfo, Angelos D. Keromytis, Junfeng Yang, David I. August:
The SPARCHS Project: Hardware Support for Software Security. SysSec@DIMVA 2011: 119-122 - [c115]Maritza L. Johnson, Steven M. Bellovin, Angelos D. Keromytis:
Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent. Financial Cryptography Workshops 2011: 131-137 - [c114]Dimitris Geneiatakis, Georgios Portokalidis, Angelos D. Keromytis:
A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS. ICISS 2011: 322-336 - [c113]Georgios Portokalidis, Angelos D. Keromytis:
REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points. IWSEC 2011: 16-32 - [c112]Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis:
Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking. IWSEC 2011: 113-128 - [c111]Michalis Polychronakis, Angelos D. Keromytis:
ROP payload detection using speculative code execution. MALWARE 2011: 58-65 - [c110]Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis:
Detecting Traffic Snooping in Tor Using Decoys. RAID 2011: 222-241 - [c109]Pádraig O'Sullivan, Kapil Anand, Aparna Kotha, Matthew Smithson, Rajeev Barua, Angelos D. Keromytis:
Retrofitting Security in COTS Software with Binary Rewriting. SEC 2011: 154-172 - 2010
- [c108]Georgios Portokalidis, Angelos D. Keromytis:
Fast and practical instruction-set randomization for commodity systems. ACSAC 2010: 41-48 - [c107]Sambuddho Chakravarty, Angelos Stavrou, Angelos D. Keromytis:
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. ESORICS 2010: 249-267 - [c106]Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis:
Evaluation of a Spyware Detection System Using Thin Client Computing. ICISC 2010: 222-232 - [c105]Kangkook Jee, Stelios Sidiroglou-Douskos, Angelos Stavrou, Angelos D. Keromytis:
An Adversarial Evaluation of Network Signaling and Control Mechanisms. ICISC 2010: 252-265 - [c104]Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis:
Crimeware Swindling without Virtual Machines. ISC 2010: 196-202 - [c103]Mansoor Alicherry, Angelos D. Keromytis:
Securing MANET Multicast Using DIPLOMA. IWSEC 2010: 232-250 - [c102]Mansoor Alicherry, Angelos D. Keromytis:
DIPLOMA: Distributed Policy Enforcement Architecture for MANETs. NSS 2010: 89-98 - [c101]Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo:
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. RAID 2010: 118-137 - [c100]Marco Cova, Corrado Leita, Olivier Thonnard, Angelos D. Keromytis, Marc Dacier:
An Analysis of Rogue AV Campaigns. RAID 2010: 442-463 - [c99]Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo:
Automating the injection of believable decoys to detect snooping. WISEC 2010: 81-86 - 2009
- [c98]Hyung Chan Kim, Angelos D. Keromytis, Michael Covington, Ravi Sahita:
Capturing Information Flow with Concatenated Dynamic Taint Analysis. ARES 2009: 355-362 - [c97]Vanessa Frías-Martínez, Joseph Sherrick, Salvatore J. Stolfo, Angelos D. Keromytis:
A Network Access Control Mechanism Based on Behavior Profiles. ACSAC 2009: 3-12 - [c96]Stelios Sidiroglou, Oren Laadan, Carlos Perez, Nicolas Viennot, Jason Nieh, Angelos D. Keromytis:
ASSURE: automatic software self-healing using rescue points. ASPLOS 2009: 37-48 - [c95]Angelos D. Keromytis:
A Survey of Voice over IP Security Research. ICISS 2009: 1-17 - [c94]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis:
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. ICISS 2009: 193-207 - [c93]Mansoor Alicherry, Angelos D. Keromytis:
DoubleCheck: Multi-path verification against man-in-the-middle attacks. ISCC 2009: 557-563 - [c92]Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh:
A2M: Access-Assured Mobile Desktop Computing. ISC 2009: 186-201 - [c91]Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis, Clifford Stein:
Adding Trust to P2P Distribution of Paid Content. ISC 2009: 459-474 - [c90]Matthew Burnside, Angelos D. Keromytis:
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services. ISC 2009: 491-506 - [c89]Yingbo Song, Angelos D. Keromytis, Salvatore J. Stolfo:
Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. NDSS 2009 - [c88]Mansoor Alicherry, Angelos D. Keromytis, Angelos Stavrou:
Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks. SecureComm 2009: 41-50 - [c87]Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo:
Baiting Inside Attackers Using Decoy Documents. SecureComm 2009: 51-70 - 2008
- [c86]Debra L. Cook, Moti Yung, Angelos D. Keromytis:
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. ACISP 2008: 187-202 - [c85]Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis:
Pushback for Overlay Networks: Protecting Against Malicious Insiders. ACNS 2008: 39-54 - [c84]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis:
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. ACSAC 2008: 367-376 - [c83]Matthew Burnside, Angelos D. Keromytis:
Asynchronous policy evaluation and enforcement. CSAW 2008: 45-50 - [c82]Debra L. Cook, Moti Yung, Angelos D. Keromytis:
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. Inscrypt 2008: 157-180 - [c81]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis:
Behavior-Based Network Access Control: A Proof-of-Concept. ISC 2008: 175-190 - [c80]Matthew Burnside, Angelos D. Keromytis:
Path-Based Access Control for Enterprise Networks. ISC 2008: 191-203 - [c79]Michael E. Locasto, Matthew Burnside, Angelos D. Keromytis:
Online Network Forensics for Automatic Repair Validation. IWSEC 2008: 136-151 - [c78]Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo:
Return Value Predictability Profiles for Self-healing. IWSEC 2008: 152-166 - [c77]Matthew Burnside, Mack Lu, Angelos D. Keromytis:
Authentication on Untrusted Remote Hosts with Public-Key Sudo. LISA 2008: 103-107 - [c76]Scott E. Coull, Charles V. Wright, Angelos D. Keromytis, Fabian Monrose, Michael K. Reiter:
Taming the Devil: Techniques for Evaluating Anonymized Network Data. NDSS 2008 - [c75]Sambuddho Chakravarty, Angelos Stavrou, Angelos D. Keromytis:
Identifying Proxy Nodes in a Tor Anonymization Circuit. SITIS 2008: 633-639 - [c74]Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis:
Casting out Demons: Sanitizing Training Data for Anomaly Sensors. SP 2008: 81-95 - 2007
- [c73]Adam J. Aviv, Michael E. Locasto, Shaya Potter, Angelos D. Keromytis:
SSARES: Secure Searchable Automated Remote Email Storage. ACSAC 2007: 129-139 - [c72]Debra L. Cook, Angelos D. Keromytis, Moti Yung:
Elastic block ciphers: the basic design. AsiaCCS 2007: 350-352 - [c71]Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode. CCS 2007: 541-551 - [c70]Angelos Stavrou, David Turner, Angelos D. Keromytis, Vassilis Prevelakis:
Bridging the Network Reservation Gap Using Overlays. COMSWARE 2007 - [c69]Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis:
A Study of Malcode-Bearing Documents. DIMVA 2007: 231-250 - [c68]Debra L. Cook, Moti Yung, Angelos D. Keromytis:
The Security of Elastic Block Ciphers Against Key-Recovery Attacks. ISC 2007: 89-103 - [c67]Stelios Sidiroglou, Oren Laadan, Angelos D. Keromytis, Jason Nieh:
Using Rescue Points to Navigate Software Recovery. S&P 2007: 273-280 - [c66]Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis:
From STEM to SEAD: Speculative Execution for Automated Defense. USENIX ATC 2007: 219-232 - 2006
- [c65]Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis:
W3Bcrypt: Encryption as a Stylesheet. ACNS 2006: 349-364 - [c64]Matthew Burnside, Angelos D. Keromytis:
Low Latency Anonymity with Mix Rings. ISC 2006: 32-45 - [c63]Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald:
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. ISC 2006: 427-442 - [c62]Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis:
Software Self-Healing Using Collaborative Application Communities. NDSS 2006 - [c61]Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis:
Dark application communities. NSPW 2006: 11-18 - [c60]Sotiris Ioannidis, Stelios Sidiroglou, Angelos D. Keromytis:
Privacy as an Operating System Service. HotSec 2006 - 2005
- [c59]Gaurav S. Kc, Angelos D. Keromytis:
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing. ACSAC 2005: 286-302 - [c58]Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John P. McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov:
Highlights from the 2005 New Security Paradigms Workshop. ACSAC 2005: 393-396 - [c57]Angelos Stavrou, Angelos D. Keromytis:
Countering DoS attacks with stateless multipath overlays. CCS 2005: 249-259 - [c56]Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck:
CryptoGraphics: Secret Key Cryptography Using Graphics Cards. CT-RSA 2005: 334-350 - [c55]Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis:
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. ICICS 2005: 363-375 - [c54]Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos D. Keromytis:
The effect of DNS delays on worm propagation in an IPv6 Internet. INFOCOM 2005: 2405-2414 - [c53]David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis:
The Bandwidth Exchange Architecture. ISCC 2005: 939-944 - [c52]Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo:
An Email Worm Vaccine Architecture. ISPEC 2005: 97-108 - [c51]Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis:
A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. ISC 2005: 1-15 - [c50]Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis:
gore: Routing-Assisted Defense Against DDoS Attacks. ISC 2005: 179-193 - [c49]Debra L. Cook, Angelos D. Keromytis:
Conversion and Proxy Functions for Symmetric Key Ciphers. ITCC (1) 2005: 662-667 - [c48]Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, Dan Rubenstein:
MOVE: An End-to-End Solution to Network Denial of Service. NDSS 2005 - [c47]Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis:
Speculative virtual verification: policy-constrained speculative execution. NSPW 2005: 119-124 - [c46]Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo:
FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101 - [c45]Stelios Sidiroglou, Michael E. Locasto, Stephen W. Boyd, Angelos D. Keromytis:
Building a Reactive Immune System for Software Services. USENIX ATC, General Track 2005: 149-161 - [c44]Kostas G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Konstantinos Xinidis, Evangelos P. Markatos, Angelos D. Keromytis:
Detecting Targeted Attacks Using Shadow Honeypots. USENIX Security Symposium 2005 - 2004
- [c43]Michael E. Locasto, Angelos D. Keromytis:
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. ACNS 2004: 1-15 - [c42]Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
A Pay-per-Use DoS Protection Mechanism for the Web. ACNS 2004: 120-134 - [c41]Stephen W. Boyd, Angelos D. Keromytis:
SQLrand: Preventing SQL Injection Attacks. ACNS 2004: 292-302 - [c40]Theodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung:
The dual receiver cryptosystem and its applications. CCS 2004: 330-343 - [c39]Rakan El-Khalil, Angelos D. Keromytis:
Hydan: Hiding Information in Program Binaries. ICICS 2004: 187-199 - [c38]Aleksey Kurchuk, Angelos D. Keromytis:
Recursive Sandboxes: Extending Systrace To Empower Applications. SEC 2004: 473-488 - 2003
- [c37]Angelos D. Keromytis:
Tagging Data in the Network Stack: mbuf_tags. BSDCon 2003: 125-132 - [c36]William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
Using graphic turing tests to counter automated DDoS attacks against web servers. CCS 2003: 8-19 - [c35]Angelos D. Keromytis, Janak J. Parekh, Philip Gross, Gail E. Kaiser, Vishal Misra, Jason Nieh, Dan Rubenstein, Salvatore J. Stolfo:
A holistic approach to service survivability. SSRS@CCS 2003: 11-22 - [c34]Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis:
Countering code-injection attacks with instruction-set randomization. CCS 2003: 272-280 - [c33]Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith:
The STRONGMAN Architecture. DISCEX (1) 2003: 178-188 - [c32]Matthew Burnside, Angelos D. Keromytis:
Accelerating application-level security protocols. ICON 2003: 313-318 - [c31]Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis, Dekai Li:
A cooperative immunization system for an untrusting Internet. ICON 2003: 403-408 - [c30]Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
WebSOS: protecting web servers from DDoS attacks. ICON 2003: 461-466 - [c29]Matt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis:
TAPI: Transactions for Accessing Public Infrastructure. PWC 2003: 90-100 - [c28]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
Experience with the KeyNote Trust Management System: Applications and Future Directions. iTrust 2003: 284-300 - [c27]Mark C. Benvenuto, Angelos D. Keromytis:
EasyVPN: IPsec Remote Access Made Easy. LISA 2003: 87-94 - [c26]Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin:
WAR: Wireless Anonymous Routing. Security Protocols Workshop 2003: 218-232 - [c25]Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith:
Secure and Flexible Global File Sharing. USENIX ATC, FREENIX Track 2003: 165-178 - [c24]Angelos D. Keromytis, Jason L. Wright, Theo de Raadt:
The Design of the {OpenBSD} Cryptographic Framework. USENIX ATC, General Track 2003: 181-196 - [c23]Alexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis:
WebDAVA: An Administrator-Free Approach To Web File-Sharing. WETICE 2003: 59-64 - [c22]Stelios Sidiroglou, Angelos D. Keromytis:
A Network Worm Vaccine Architecture. WETICE 2003: 220-225 - [c21]Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith:
Design and Implementation of Virtual Private Services. WETICE 2003: 269-274 - 2002
- [c20]William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis:
Efficient, DoS-resistant, secure key exchange for internet protocols. CCS 2002: 48-58 - [c19]Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith:
A Secure PLAN. DANCE 2002: 224-237 - [c18]John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Vassilis Prevelakis:
Fileteller: Paying and Getting Paid for File Storage. Financial Cryptography 2002: 282-299 - [c17]Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
SOS: secure overlay services. SIGCOMM 2002: 61-72 - [c16]Stefan Miltchev, Sotiris Ioannidis, Angelos D. Keromytis:
A Study of the Relative Costs of Network Security Protocols. USENIX ATC, FREENIX Track 2002: 41-48 - 2001
- [c15]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
Offline Micropayments without Trusted Hardware. Financial Cryptography 2001: 21-40 - [c14]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
Trust Management for IPsec. NDSS 2001 - [c13]William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold:
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. Security Protocols Workshop 2001: 27-39 - 2000
- [c12]John Ioannidis, Angelos D. Keromytis:
Network security and IPsec (tutorial). CCS 2000 - [c11]Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith:
Implementing a distributed firewall. CCS 2000: 190-199 - [c10]Kostas G. Anagnostakis, Michael W. Hicks, Sotiris Ioannidis, Angelos D. Keromytis, Jonathan M. Smith:
Scalable Resource Control in Active Networks. IWAN 2000: 343-357 - [c9]Niklas Hallqvist, Angelos D. Keromytis:
Implementing Internet Key Exchange (IKE). USENIX ATC, FREENIX Track 2000: 201-214 - [c8]Angelos D. Keromytis, Jason L. Wright:
Transparent Network Security Policy Enforcement. USENIX ATC, FREENIX Track 2000: 215-226 - 1999
- [c7]Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis:
The Role of Trust Management in Distributed Systems Security. Secure Internet Programming 1999: 185-210 - [c6]D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith:
Security in Active Networks. Secure Internet Programming 1999: 433-451 - [c5]Michael W. Hicks, Angelos D. Keromytis:
A Secure Plan. IWAN 1999: 307-314 - [c4]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
Trust Management and Network Layer Security Protocols. Security Protocols Workshop 1999: 103-118 - [c3]Theo de Raadt, Niklas Hallqvist, Artur Grabowski, Angelos D. Keromytis, Niels Provos:
Cryptography in OpenBSD: An Overview. USENIX ATC, FREENIX Track 1999: 93-101 - 1998
- [c2]William A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith:
Automated Recovery in a Secure Bootstrap Process. NDSS 1998 - [c1]Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis:
KeyNote: Trust Management for Public-Key Infrastructures (Position Paper). Security Protocols Workshop 1998: 59-63
Parts in Books or Collections
- 2019
- [p8]Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodríguez, Moti Yung:
A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions. Advances in Cyber Security 2019: 143-183 - 2014
- [p7]Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis:
Computational Decoys for Cloud Security. Secure Cloud Computing 2014: 261-270 - 2013
- [p6]Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis:
Practical Software Diversification Using In-Place Code Randomization. Moving Target Defense 2013: 175-202 - 2011
- [p5]Georgios Portokalidis, Angelos D. Keromytis:
Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution. Moving Target Defense 2011: 49-76 - 2010
- [p4]Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo:
Monitoring Technologies for Mitigating Insider Threats. Insider Threats in Cyber Security 2010: 197-217 - 2008
- [p3]Angelos D. Keromytis:
Hard Problems and Research Challenges. Insider Attack and Cyber Security 2008: 215-218 - [p2]Angelos D. Keromytis:
Hard Problems and Research Challenges Concluding Remarks. Insider Attack and Cyber Security 2008: 219-222 - 2007
- [p1]Stelios Sidiroglou, Angelos D. Keromytis:
Composite Hybrid Techniques For Defending Against Targeted Attacks. Malware Detection 2007: 213-229
Editorship
- 2013
- [e12]Angelos D. Keromytis, Roberto Di Pietro:
Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 106, Springer 2013, ISBN 978-3-642-36882-0 [contents] - 2012
- [e11]Angelos D. Keromytis:
Financial Cryptography and Data Security - 16th International Conference, FC 2012, Kralendijk, Bonaire, February 27 - March 2, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7397, Springer 2012, ISBN 978-3-642-32945-6 [contents] - 2010
- [e10]Ehab Al-Shaer, Angelos D. Keromytis, Vitaly Shmatikov:
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010. ACM 2010, ISBN 978-1-4503-0245-6 [contents] - [e9]Angelos D. Keromytis, Sean Peisert, Richard Ford, Carrie Gates:
Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010. ACM 2010, ISBN 978-1-4503-0415-3 [contents] - 2009
- [e8]Ehab Al-Shaer, Somesh Jha, Angelos D. Keromytis:
Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM 2009, ISBN 978-1-60558-894-0 [contents] - 2008
- [e7]Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung:
Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings. Lecture Notes in Computer Science 5037, 2008, ISBN 978-3-540-68913-3 [contents] - [e6]Matt Bishop, Christian W. Probst, Angelos D. Keromytis, Anil Somayaji:
Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008. ACM 2008, ISBN 978-1-60558-341-9 [contents] - [e5]Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair:
Insider Attack and Cyber Security - Beyond the Hacker. Advances in Information Security 39, Springer 2008, ISBN 978-0-387-77321-6 [contents] - 2007
- [e4]Konstantin Beznosov, Angelos D. Keromytis:
Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA - September 18-21, 2007. ACM 2007, ISBN 978-1-60558-080-7 [contents] - 2006
- [e3]Angelos D. Keromytis:
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31 - August 4, 2006. USENIX Association 2006 [contents] - 2005
- [e2]John Ioannidis, Angelos D. Keromytis, Moti Yung:
Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings. Lecture Notes in Computer Science 3531, 2005, ISBN 3-540-26223-7 [contents] - [e1]Vijay Atluri, Angelos D. Keromytis:
Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005. ACM Press 2005, ISBN 1-59593-229-1 [contents]
Reference Works
- 2011
- [r3]Angelos D. Keromytis:
Buffer Overflow Attacks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 174-177 - [r2]Angelos D. Keromytis:
Network Bandwidth Denial of Service (DoS). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 836-838 - 2004
- [r1]John Ioannidis, Angelos D. Keromytis:
Distributed Trust. The Practical Handbook of Internet Computing 2004
Informal and Other Publications
- 2024
- [i16]Athanassios Moschos, Fabian Monrose, Angelos D. Keromytis:
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans. CoRR abs/2403.10659 (2024) - 2018
- [i15]Georgios Kontaxis, Angelos D. Keromytis, Georgios Portokalidis:
Redirect2Own: Protecting the Intellectual Property of User-uploaded Content through Off-site Indirect Access. CoRR abs/1810.04779 (2018) - 2017
- [i14]Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, Suman Jana:
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities. CoRR abs/1708.08437 (2017) - [i13]Theofilos Petsios, Adrian Tang, Dimitris Mitropoulos, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana:
Tug-of-War: Observations on Unified Content Handling. CoRR abs/1708.09334 (2017) - 2015
- [i12]Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis:
The Spy in the Sandbox - Practical Cache Attacks in Javascript. CoRR abs/1502.07373 (2015) - 2010
- [i11]Angelos D. Keromytis:
X.509 Key and Signature Encoding for the KeyNote Trust Management System. RFC 5708: 1-6 (2010) - [i10]Angelos D. Keromytis:
Transport Layer Security (TLS) Authorization Using KeyNote. RFC 6042: 1-7 (2010) - 2008
- [i9]Debra L. Cook, Moti Yung, Angelos D. Keromytis:
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. IACR Cryptol. ePrint Arch. 2008: 496 (2008) - 2005
- [i8]David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis:
The Bandwidth Exchange Architecture. CoRR abs/cs/0504007 (2005) - 2004
- [i7]Debra L. Cook, Moti Yung, Angelos D. Keromytis:
Elastic Block Ciphers. IACR Cryptol. ePrint Arch. 2004: 128 (2004) - [i6]Debra L. Cook, Moti Yung, Angelos D. Keromytis:
Elastic AES. IACR Cryptol. ePrint Arch. 2004: 141 (2004) - 2003
- [i5]Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Randall R. Stewart:
On the Use of Stream Control Transmission Protocol (SCTP) with IPsec. RFC 3554: 1-9 (2003) - [i4]Matt Blaze, Angelos D. Keromytis, Michael C. Richardson, Luis A. Sanchez:
IP Security Policy (IPSP) Requirements. RFC 3586: 1-10 (2003) - 2000
- [i3]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System. RFC 2792: 1-7 (2000) - [i2]Angelos D. Keromytis, Niels Provos:
The Use of HMAC-RIPEMD-160-96 within ESP and AH. RFC 2857: 1-7 (2000) - 1999
- [i1]Matt Blaze, Joan Feigenbaum, John Ioannidis, Angelos D. Keromytis:
The KeyNote Trust-Management System Version 2. RFC 2704: 1-37 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint