Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Vasileios P. Kemerlis
@inproceedings{DBLP:conf/asiaccs/ChristouNLIKV23, author = {George Christou and Grigoris Ntousakis and Eric Lahtinen and Sotiris Ioannidis and Vasileios P. Kemerlis and Nikos Vasilakis}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {BinWrap: Hybrid Protection against Native Node.js Add-ons}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {429--442}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3590330}, doi = {10.1145/3579856.3590330}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/ChristouNLIKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GaidisAK23, author = {Alexander J. Gaidis and Vaggelis Atlidakis and Vasileios P. Kemerlis}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {SysXCHG: Refining Privilege with Adaptive System Call Filters}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {1964--1978}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623137}, doi = {10.1145/3576915.3623137}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GaidisAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GaidisMSMAK23, author = {Alexander J. Gaidis and Joao Moreira and Ke Sun and Alyssa Milburn and Vaggelis Atlidakis and Vasileios P. Kemerlis}, title = {FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {527--546}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607219}, doi = {10.1145/3607199.3607219}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GaidisMSMAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/JinAK23, author = {Di Jin and Vaggelis Atlidakis and Vasileios P. Kemerlis}, editor = {Julia Lawall and Dan Williams}, title = {{EPF:} Evil Packet Filter}, booktitle = {2023 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2023, Boston, MA, USA, July 10-12, 2023}, pages = {735--751}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/atc23/presentation/jin}, timestamp = {Sat, 15 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/usenix/JinAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChristouJARK23, author = {Neophytos Christou and Di Jin and Vaggelis Atlidakis and Baishakhi Ray and Vasileios P. Kemerlis}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {2383--2400}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/christou}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChristouJARK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-16353, author = {Alexander J. Gaidis and Joao Moreira and Ke Sun and Alyssa Milburn and Vaggelis Atlidakis and Vasileios P. Kemerlis}, title = {FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking}, journal = {CoRR}, volume = {abs/2303.16353}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.16353}, doi = {10.48550/ARXIV.2303.16353}, eprinttype = {arXiv}, eprint = {2303.16353}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-16353.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-06131, author = {Meghna Pancholi and Andreas D. Kellas and Vasileios P. Kemerlis and Simha Sethumadhavan}, title = {Timeloops: System Call Policy Learning for Containerized Microservices}, journal = {CoRR}, volume = {abs/2204.06131}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.06131}, doi = {10.48550/ARXIV.2204.06131}, eprinttype = {arXiv}, eprint = {2204.06131}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-06131.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-14921, author = {Neophytos Christou and Di Jin and Vaggelis Atlidakis and Baishakhi Ray and Vasileios P. Kemerlis}, title = {IvySyn: Automated Vulnerability Discovery for Deep Learning Frameworks}, journal = {CoRR}, volume = {abs/2209.14921}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.14921}, doi = {10.48550/ARXIV.2209.14921}, eprinttype = {arXiv}, eprint = {2209.14921}, timestamp = {Thu, 06 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-14921.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RoesslerAPMPKPB21, author = {Nick Roessler and Lucas Atayde and Imani Palmer and Derrick Paul McKee and Jai Pandey and Vasileios P. Kemerlis and Mathias Payer and Adam Bates and Jonathan M. Smith and Andr{\'{e}} DeHon and Nathan Dautenhahn}, editor = {Leyla Bilge and Tudor Dumitras}, title = {{\(\mu\)}SCOPE: {A} Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {296--311}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471839}, doi = {10.1145/3471621.3471839}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/RoesslerAPMPKPB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seed/ZiadAMKS21, author = {Mohamed Tarek Ibn Ziad and Miguel A. Arroyo and Evgeny Manzhosov and Vasileios P. Kemerlis and Simha Sethumadhavan}, title = {{EPI:} Efficient Pointer Integrity For Securing Embedded Systems}, booktitle = {2021 International Symposium on Secure and Private Execution Environment Design (SEED), Washington, DC, USA, September 20-21, 2021}, pages = {163--175}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SEED51797.2021.00028}, doi = {10.1109/SEED51797.2021.00028}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/seed/ZiadAMKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/Williams-KingKW20, author = {David Williams{-}King and Hidenori Kobayashi and Kent Williams{-}King and Graham Patterson and Frank Spano and Yu Jian Wu and Junfeng Yang and Vasileios P. Kemerlis}, editor = {James R. Larus and Luis Ceze and Karin Strauss}, title = {Egalito: Layout-Agnostic Binary Recompilation}, booktitle = {{ASPLOS} '20: Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, March 16-20, 2020}, pages = {133--147}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3373376.3378470}, doi = {10.1145/3373376.3378470}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asplos/Williams-KingKW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DeMarinisWJFK20, author = {Nicholas DeMarinis and Kent Williams{-}King and Di Jin and Rodrigo Fonseca and Vasileios P. Kemerlis}, editor = {Manuel Egele and Leyla Bilge}, title = {sysfilter: Automated System Call Filtering for Commodity Software}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {459--474}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/demarinis}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/raid/DeMarinisWJFK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ProskurinMGKP20, author = {Sergej Proskurin and Marius Momeu and Seyedhamed Ghavamnia and Vasileios P. Kemerlis and Michalis Polychronakis}, title = {xMP: Selective Memory Protection for Kernel and User Space}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {563--577}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00041}, doi = {10.1109/SP40000.2020.00041}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ProskurinMGKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PomonisPKPK18, author = {Marios Pomonis and Theofilos Petsios and Angelos D. Keromytis and Michalis Polychronakis and Vasileios P. Kemerlis}, title = {Kernel Protection Against Just-In-Time Code Reuse}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {1}, pages = {5:1--5:28}, year = {2019}, url = {https://doi.org/10.1145/3277592}, doi = {10.1145/3277592}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/PomonisPKPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AgadakosJWKP19, author = {Ioannis Agadakos and Di Jin and David Williams{-}King and Vasileios P. Kemerlis and Georgios Portokalidis}, editor = {David Balenson}, title = {Nibbler: debloating binary shared libraries}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {70--83}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359823}, doi = {10.1145/3359789.3359823}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AgadakosJWKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icra/DeMarinisTKKF19, author = {Nicholas DeMarinis and Stefanie Tellex and Vasileios P. Kemerlis and George Dimitri Konidaris and Rodrigo Fonseca}, title = {Scanning the Internet for {ROS:} {A} View of Security in Robotics Research}, booktitle = {International Conference on Robotics and Automation, {ICRA} 2019, Montreal, QC, Canada, May 20-24, 2019}, pages = {8514--8521}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICRA.2019.8794451}, doi = {10.1109/ICRA.2019.8794451}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icra/DeMarinisTKKF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-02038, author = {Mohamed Tarek Ibn Ziad and Miguel A. Arroyo and Evgeny Manzhosov and Vasileios P. Kemerlis and Simha Sethumadhavan}, title = {{PAIRS:} Control Flow Protection using Phantom Addressed Instructions}, journal = {CoRR}, volume = {abs/1911.02038}, year = {2019}, url = {http://arxiv.org/abs/1911.02038}, eprinttype = {arXiv}, eprint = {1911.02038}, timestamp = {Mon, 11 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-02038.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KooCLKP18, author = {Hyungjoon Koo and Yaohui Chen and Long Lu and Vasileios P. Kemerlis and Michalis Polychronakis}, title = {Compiler-Assisted Code Randomization}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {461--477}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00029}, doi = {10.1109/SP.2018.00029}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KooCLKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-03322, author = {Nicholas DeMarinis and Stefanie Tellex and Vasileios P. Kemerlis and George Dimitri Konidaris and Rodrigo Fonseca}, title = {Scanning the Internet for {ROS:} {A} View of Security in Robotics Research}, journal = {CoRR}, volume = {abs/1808.03322}, year = {2018}, url = {http://arxiv.org/abs/1808.03322}, eprinttype = {arXiv}, eprint = {1808.03322}, timestamp = {Tue, 19 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-03322.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/PomonisPKPK17, author = {Marios Pomonis and Theofilos Petsios and Angelos D. Keromytis and Michalis Polychronakis and Vasileios P. Kemerlis}, editor = {Gustavo Alonso and Ricardo Bianchini and Marko Vukolic}, title = {kR{\^{}}X: Comprehensive Kernel Protection against Just-In-Time Code Reuse}, booktitle = {Proceedings of the Twelfth European Conference on Computer Systems, EuroSys 2017, Belgrade, Serbia, April 23-26, 2017}, pages = {420--436}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3064176.3064216}, doi = {10.1145/3064176.3064216}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/PomonisPKPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/SinhaKS17, author = {Kanad Sinha and Vasileios P. Kemerlis and Simha Sethumadhavan}, title = {Reviving instruction set randomization}, booktitle = {2017 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2017, McLean, VA, USA, May 1-5, 2017}, pages = {21--28}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/HST.2017.7951732}, doi = {10.1109/HST.2017.7951732}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/SinhaKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SarbinowskiKGA16, author = {Pawel Sarbinowski and Vasileios P. Kemerlis and Cristiano Giuffrida and Elias Athanasopoulos}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {VTPin: practical VTable hijacking protection for binaries}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {448--459}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991121}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SarbinowskiKGA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AthanasopoulosK16, author = {Elias Athanasopoulos and Vasileios P. Kemerlis and Georgios Portokalidis and Angelos D. Keromytis}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {NaClDroid: Native Code Isolation for Android Applications}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9878}, pages = {422--439}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45744-4\_21}, doi = {10.1007/978-3-319-45744-4\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AthanasopoulosK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/CuiPCFK16, author = {Weidong Cui and Marcus Peinado and Sang Kil Cha and Yanick Fratantonio and Vasileios P. Kemerlis}, editor = {Laura K. Dillon and Willem Visser and Laurie A. Williams}, title = {RETracer: triaging crashes by reverse execution from partial memory dumps}, booktitle = {Proceedings of the 38th International Conference on Software Engineering, {ICSE} 2016, Austin, TX, USA, May 14-22, 2016}, pages = {820--831}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2884781.2884844}, doi = {10.1145/2884781.2884844}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/CuiPCFK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/osdi/Williams-KingGW16, author = {David Williams{-}King and Graham Gobieski and Kent Williams{-}King and James P. Blake and Xinhao Yuan and Patrick Colp and Michelle Zheng and Vasileios P. Kemerlis and Junfeng Yang and William Aiello}, editor = {Kimberly Keeton and Timothy Roscoe}, title = {Shuffler: Fast and Deployable Continuous Code Re-Randomization}, booktitle = {12th {USENIX} Symposium on Operating Systems Design and Implementation, {OSDI} 2016, Savannah, GA, USA, November 2-4, 2016}, pages = {367--382}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/osdi16/technical-sessions/presentation/williams-king}, timestamp = {Tue, 02 Feb 2021 08:06:02 +0100}, biburl = {https://dblp.org/rec/conf/osdi/Williams-KingGW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Kemerlis15, author = {Vasileios P. Kemerlis}, title = {Protecting Commodity Operating Systems through Strong Kernel Isolation}, school = {Columbia University, {USA}}, year = {2015}, url = {https://doi.org/10.7916/D89C6WZ6}, doi = {10.7916/D89C6WZ6}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Kemerlis15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PetsiosKPK15, author = {Theofilos Petsios and Vasileios P. Kemerlis and Michalis Polychronakis and Angelos D. Keromytis}, title = {DynaGuard: Armoring Canary-based Protections against Brute-force Attacks}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {351--360}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818031}, doi = {10.1145/2818000.2818031}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PetsiosKPK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OrenKSK15, author = {Yossef Oren and Vasileios P. Kemerlis and Simha Sethumadhavan and Angelos D. Keromytis}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1406--1418}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813708}, doi = {10.1145/2810103.2813708}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OrenKSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LuLKWLZQLJ15, author = {Kangjie Lu and Zhichun Li and Vasileios P. Kemerlis and Zhenyu Wu and Long Lu and Cong Zheng and Zhiyun Qian and Wenke Lee and Guofei Jiang}, title = {Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/checking-more-and-alerting-less-detecting-privacy-leakages-enhanced-data-flow-analysis-and-peer}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LuLKWLZQLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/OrenKSK15, author = {Yossef Oren and Vasileios P. Kemerlis and Simha Sethumadhavan and Angelos D. Keromytis}, title = {The Spy in the Sandbox - Practical Cache Attacks in Javascript}, journal = {CoRR}, volume = {abs/1502.07373}, year = {2015}, url = {http://arxiv.org/abs/1502.07373}, eprinttype = {arXiv}, eprint = {1502.07373}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/OrenKSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KemerlisPK14, author = {Vasileios P. Kemerlis and Michalis Polychronakis and Angelos D. Keromytis}, editor = {Kevin Fu and Jaeyeon Jung}, title = {ret2dir: Rethinking Kernel Isolation}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {957--972}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/kemerlis}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/KemerlisPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JeeKKP13, author = {Kangkook Jee and Vasileios P. Kemerlis and Angelos D. Keromytis and Georgios Portokalidis}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {ShadowReplica: efficient parallelization of dynamic data flow tracking}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {235--246}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516704}, doi = {10.1145/2508859.2516704}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JeeKKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BarberaKPK13, author = {Marco Valerio Barbera and Vasileios P. Kemerlis and Vasilis Pappas and Angelos D. Keromytis}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {CellFlood: Attacking Tor Onion Routers on the Cheap}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {664--681}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_37}, doi = {10.1007/978-3-642-40203-6\_37}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BarberaKPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/ZavouPKPPK13, author = {Angeliki Zavou and Vasilis Pappas and Vasileios P. Kemerlis and Michalis Polychronakis and Georgios Portokalidis and Angelos D. Keromytis}, editor = {Louis Marinos and Ioannis G. Askoxylakis}, title = {Cloudopsy: An Autopsy of Data Flows in the Cloud}, booktitle = {Human Aspects of Information Security, Privacy, and Trust - First International Conference, {HAS} 2013, Held as Part of {HCI} International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8030}, pages = {366--375}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39345-7\_39}, doi = {10.1007/978-3-642-39345-7\_39}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hci/ZavouPKPPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/PappasKZPK13, author = {Vasilis Pappas and Vasileios P. Kemerlis and Angeliki Zavou and Michalis Polychronakis and Angelos D. Keromytis}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {CloudFence: Data Flow Tracking as a Cloud Service}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {411--431}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_21}, doi = {10.1007/978-3-642-41284-4\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/PappasKZPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BowenKPKS12, author = {Brian M. Bowen and Vasileios P. Kemerlis and Pratap V. Prabhu and Angelos D. Keromytis and Salvatore J. Stolfo}, title = {A system for generating and injecting indistinguishable network decoys}, journal = {J. Comput. Secur.}, volume = {20}, number = {2-3}, pages = {199--221}, year = {2012}, url = {https://doi.org/10.3233/JCS-2011-0439}, doi = {10.3233/JCS-2011-0439}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/BowenKPKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/KemerlisPAK12, author = {Vasileios P. Kemerlis and Georgios Portokalidis and Elias Athanasopoulos and Angelos D. Keromytis}, title = {kGuard: Lightweight Kernel Protection}, journal = {login Usenix Mag.}, volume = {37}, number = {6}, year = {2012}, url = {https://www.usenix.org/publications/login/december-2012-volume-37-number-6/kguard-lightweight-kernel-protection}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/KemerlisPAK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AthanasopoulosKPM12, author = {Elias Athanasopoulos and Vasileios P. Kemerlis and Michalis Polychronakis and Evangelos P. Markatos}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {{ARC:} Protecting against {HTTP} Parameter Pollution Attacks Using Application Request Caches}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {400--417}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_24}, doi = {10.1007/978-3-642-31284-7\_24}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/AthanasopoulosKPM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GeneiatakisPKK12, author = {Dimitris Geneiatakis and Georgios Portokalidis and Vasileios P. Kemerlis and Angelos D. Keromytis}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Adaptive defenses for commodity software through virtual application partitioning}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {133--144}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382214}, doi = {10.1145/2382196.2382214}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GeneiatakisPKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/JeePKGAK12, author = {Kangkook Jee and Georgios Portokalidis and Vasileios P. Kemerlis and Soumyadeep Ghosh and David I. August and Angelos D. Keromytis}, title = {A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/general-approach-efficiently-accelerating-software-based-dynamic-data-flow-tracking-commodity}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/JeePKGAK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KemerlisPK12, author = {Vasileios P. Kemerlis and Georgios Portokalidis and Angelos D. Keromytis}, editor = {Tadayoshi Kohno}, title = {kGuard: Lightweight Kernel Protection against Return-to-User Attacks}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {459--474}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/kemerlis}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KemerlisPK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vee/KemerlisPJK12, author = {Vasileios P. Kemerlis and Georgios Portokalidis and Kangkook Jee and Angelos D. Keromytis}, editor = {Steven Hand and Dilma Da Silva}, title = {libdft: practical dynamic data flow tracking for commodity systems}, booktitle = {Proceedings of the 8th International Conference on Virtual Execution Environments, {VEE} 2012, London, UK, March 3-4, 2012 (co-located with {ASPLOS} 2012)}, pages = {121--132}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2151024.2151042}, doi = {10.1145/2151024.2151042}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vee/KemerlisPJK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/FrangoudisPK11, author = {Pantelis A. Frangoudis and George C. Polyzos and Vasileios P. Kemerlis}, title = {Wireless community networks: an alternative approach for nomadic broadband network access}, journal = {{IEEE} Commun. Mag.}, volume = {49}, number = {5}, pages = {206--213}, year = {2011}, url = {https://doi.org/10.1109/MCOM.2011.5762819}, doi = {10.1109/MCOM.2011.5762819}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cm/FrangoudisPK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BowenPKSKS10, author = {Brian M. Bowen and Pratap V. Prabhu and Vasileios P. Kemerlis and Stelios Sidiroglou and Angelos D. Keromytis and Salvatore J. Stolfo}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {118--137}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_7}, doi = {10.1007/978-3-642-15512-3\_7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/BowenPKSKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BowenKPKS10, author = {Brian M. Bowen and Vasileios P. Kemerlis and Pratap V. Prabhu and Angelos D. Keromytis and Salvatore J. Stolfo}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Automating the injection of believable decoys to detect snooping}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {81--86}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741880}, doi = {10.1145/1741866.1741880}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/BowenKPKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/KatsarosKSX09, author = {Konstantinos V. Katsaros and Vasileios P. Kemerlis and Charilaos Stais and George Xylomenos}, title = {A BitTorrent module for the OMNeT++ simulator}, booktitle = {17th Annual Meeting of the {IEEE/ACM} International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems, {MASCOTS} 2009, September 21-23, 2009, South Kensington Campus, Imperial College, London, {UK}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MASCOT.2009.5366131}, doi = {10.1109/MASCOT.2009.5366131}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mascots/KatsarosKSX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbms/GiannopoulouKPPVV07, author = {Eugenia G. Giannopoulou and Vasileios P. Kemerlis and Michalis Polemis and Joseph Papaparaskevas and Alkiviadis C. Vatopoulos and Michalis Vazirgiannis}, title = {A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance}, booktitle = {20th {IEEE} International Symposium on Computer-Based Medical Systems {(CBMS} 2007), 20-22 June 2007, Maribor, Slovenia}, pages = {439--444}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CBMS.2007.8}, doi = {10.1109/CBMS.2007.8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cbms/GiannopoulouKPPVV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobimedia/FrangoudisKPEP07, author = {Pantelis A. Frangoudis and Vasileios P. Kemerlis and Dimitrios C. Paraskevaidis and Elias C. Efstathiou and George C. Polyzos}, editor = {Tasos Dagiuklas and Nicolas Sklavos}, title = {Experimental evaluation of community-based {WLAN} voice and data services}, booktitle = {Proceedings of the 3rd International Conference on Mobile Multimedia Communications, MobiMedia 2007, Nafpaktos, Greece, August 27-29, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {329}, pages = {16}, publisher = {{ICST}}, year = {2007}, url = {https://doi.org/10.4108/ICST.MOBIMEDIA2007.1772}, doi = {10.4108/ICST.MOBIMEDIA2007.1772}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobimedia/FrangoudisKPEP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/KosmopoulosKKP07, author = {Aris Kosmopoulos and Ifigeneia Karamichali and Vasileios P. Kemerlis and George C. Polyzos}, title = {Fueling Game Development in Mobile {P2P} Environments}, booktitle = {Proceedings of the {IEEE} 18th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September 2007, Athens, Greece}, pages = {1--5}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/PIMRC.2007.4394201}, doi = {10.1109/PIMRC.2007.4394201}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pimrc/KosmopoulosKKP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/accessnets/EfstathiouEFKPS06, author = {Elias C. Efstathiou and Fotios A. Elianos and Pantelis A. Frangoudis and Vasileios P. Kemerlis and Dimitrios C. Paraskevaidis and Eleftherios C. Stefanis and George C. Polyzos}, editor = {Ioannis Tomkos}, title = {Public infrastructures for internet access in metropolitan areas}, booktitle = {1st International {ICST} Conference on Access Networks, {ACCESSNETS} 2006, Athens, Greece, September 4-6, 2006}, pages = {19}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1189355.1189374}, doi = {10.1145/1189355.1189374}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/accessnets/EfstathiouEFKPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.