Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Angelos D. Keromytis
2010 – today
- 2013
[c124]John Jong-Uk Choi, Soon Ae Chun, Dong Hwa Kim, Angelos D. Keromytis: SecureGov: secure data sharing for government services. DG.O 2013: 127-135
[c123]Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas, Angelos D. Keromytis: CellFlood: Attacking Tor Onion Routers on the Cheap. ESORICS 2013: 664-681
[c122]Angeliki Zavou, Vasilis Pappas, Vasileios P. Kemerlis, Michalis Polychronakis, Georgios Portokalidis, Angelos D. Keromytis: Cloudopsy: An Autopsy of Data Flows in the Cloud. HCI (27) 2013: 366-375
[p6]Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis: Practical Software Diversification Using In-Place Code Randomization. Moving Target Defense 2013: 175-202
[e11]Angelos D. Keromytis, Roberto Di Pietro (Eds.): Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 106, Springer 2013, ISBN 978-3-642-36882-0- 2012
[j31]Angelos D. Keromytis: A Comprehensive Survey of Voice over IP Security Research. IEEE Communications Surveys and Tutorials 14(2): 514-537 (2012)
[j30]Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo: A system for generating and injecting indistinguishable network decoys. Journal of Computer Security 20(2-3): 199-221 (2012)
[c121]Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis: Self-healing multitier architectures using cascading rescue points. ACSAC 2012: 379-388
[c120]Iasonas Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, Sotiris Ioannidis, Angelos D. Keromytis, Stefano Zanero: All your face are belong to us: breaking Facebook's social authentication. ACSAC 2012: 399-408
[c119]Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis, Angelos D. Keromytis: Exploiting split browsers for efficiently protecting user data. CCSW 2012: 37-42
[c118]Dimitris Geneiatakis, Georgios Portokalidis, Vasileios P. Kemerlis, Angelos D. Keromytis: Adaptive defenses for commodity software through virtual application partitioning. ACM Conference on Computer and Communications Security 2012: 133-144
[c117]Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle, Angelos Stavrou: The MEERKATS Cloud Security Architecture. ICDCS Workshops 2012: 446-450
[c116]Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August, Angelos D. Keromytis: A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware. NDSS 2012
[c115]Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, Sotiris Ioannidis: Towards a Universal Data Provenance Framework Using Dynamic Instrumentation. SEC 2012: 103-114
[c114]Salvatore J. Stolfo, Malek Ben Salem, Angelos D. Keromytis: Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. IEEE Symposium on Security and Privacy Workshops 2012: 125-128
[c113]Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis: Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization. IEEE Symposium on Security and Privacy 2012: 601-615
[c112]Vasileios P. Kemerlis, Georgios Portokalidis, Kangkook Jee, Angelos D. Keromytis: libdft: practical dynamic data flow tracking for commodity systems. VEE 2012: 121-132
[e10]Angelos D. Keromytis (Ed.): Financial Cryptography and Data Security - 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7397, Springer 2012, ISBN 978-3-642-32945-6- 2011
[j29]Ted Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung: The Efficient Dual Receiver Cryptosystem and Its Applications. I. J. Network Security 13(3): 135-151 (2011)
[c111]Vasilis Pappas, Angelos D. Keromytis: Measuring the Deployment Hiccups of DNSSEC. ACC (3) 2011: 44-53
[c110]Mansoor Alicherry, Angelos D. Keromytis: Misuse Detection in Consent-Based Networks. ACNS 2011: 38-56
[c109]Dimitris Geneiatakis, Angelos D. Keromytis: Towards a Forensic Analysis for Multimedia Communication Services. AINA Workshops 2011: 424-429
[c108]Maritza L. Johnson, Steven M. Bellovin, Angelos D. Keromytis: Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent. Financial Cryptography Workshops 2011: 131-137
[c107]Dimitris Geneiatakis, Georgios Portokalidis, Angelos D. Keromytis: A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS. ICISS 2011: 322-336
[c106]Georgios Portokalidis, Angelos D. Keromytis: REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points. IWSEC 2011: 16-32
[c105]Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis: Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking. IWSEC 2011: 113-128
[c104]Michalis Polychronakis, Angelos D. Keromytis: ROP payload detection using speculative code execution. MALWARE 2011: 58-65
[c103]Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis: Detecting Traffic Snooping in Tor Using Decoys. RAID 2011: 222-241
[c102]Pádraig O'Sullivan, Kapil Anand, Aparna Kotha, Matthew Smithson, Rajeev Barua, Angelos D. Keromytis: Retrofitting Security in COTS Software with Binary Rewriting. SEC 2011: 154-172
[p5]Georgios Portokalidis, Angelos D. Keromytis: Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution. Moving Target Defense 2011: 49-76
[r2]Angelos D. Keromytis: Buffer Overflow Attacks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 174-177
[r1]Angelos D. Keromytis: Network Bandwidth Denial of Service (DoS). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 836-838- 2010
[j28]Andrea M. Matwyshyn, Ang Cui, Angelos D. Keromytis, Salvatore J. Stolfo: Ethics in Security Vulnerability Research. IEEE Security & Privacy 8(2): 67-72 (2010)
[j27]Angelos D. Keromytis: Voice-over-IP Security: Research and Practice. IEEE Security & Privacy 8(2): 76-78 (2010)
[j26]Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo: On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems. Machine Learning 81(2): 179-205 (2010)
[j25]Stephen W. Boyd, Gaurav S. Kc, Michael E. Locasto, Angelos D. Keromytis, Vassilis Prevelakis: On the General Applicability of Instruction-Set Randomization. IEEE Trans. Dependable Sec. Comput. 7(3): 255-270 (2010)
[j24]David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis: A market-based bandwidth charging framework. ACM Trans. Internet Techn. 10(1) (2010)
[c101]Georgios Portokalidis, Angelos D. Keromytis: Fast and practical instruction-set randomization for commodity systems. ACSAC 2010: 41-48
[c100]Sambuddho Chakravarty, Angelos Stavrou, Angelos D. Keromytis: Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. ESORICS 2010: 249-267
[c99]Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis: Evaluation of a Spyware Detection System Using Thin Client Computing. ICISC 2010: 222-232
[c98]Kangkook Jee, Stelios Sidiroglou-Douskos, Angelos Stavrou, Angelos D. Keromytis: An Adversarial Evaluation of Network Signaling and Control Mechanisms. ICISC 2010: 252-265
[c97]Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis: Crimeware Swindling without Virtual Machines. ISC 2010: 196-202
[c96]Mansoor Alicherry, Angelos D. Keromytis: Securing MANET Multicast Using DIPLOMA. IWSEC 2010: 232-250
[c95]Mansoor Alicherry, Angelos D. Keromytis: DIPLOMA: Distributed Policy Enforcement Architecture for MANETs. NSS 2010: 89-98
[c94]Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo: BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. RAID 2010: 118-137
[c93]Marco Cova, Corrado Leita, Olivier Thonnard, Angelos D. Keromytis, Marc Dacier: An Analysis of Rogue AV Campaigns. RAID 2010: 442-463
[c92]Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo: Automating the injection of believable decoys to detect snooping. WISEC 2010: 81-86
[p4]Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo: Monitoring Technologies for Mitigating Insider Threats. Insider Threats in Cyber Security 2010: 197-217
[e9]Ehab Al-Shaer, Angelos D. Keromytis, Vitaly Shmatikov (Eds.): Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010. ACM 2010, ISBN 978-1-4503-0245-6
[e8]Angelos D. Keromytis, Sean Peisert, Richard Ford, Carrie Gates (Eds.): Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010. ACM 2010, ISBN 978-1-4503-0415-3
2000 – 2009
- 2009
[j23]Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee: Dynamic Trust Management. IEEE Computer 42(2): 44-52 (2009)
[j22]Angelos D. Keromytis: Randomized Instruction Sets and Runtime Environments Past Research and Future Directions. IEEE Security & Privacy 7(1): 18-25 (2009)
[j21]Brian M. Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo: Designing Host and Network Sensors to Mitigate the Insider Threat. IEEE Security & Privacy 7(6): 22-29 (2009)
[j20]Hyung Chan Kim, Angelos D. Keromytis: On the Deployment of Dynamic Taint Analysis for Application Communities. IEICE Transactions 92-D(3): 548-551 (2009)
[j19]Debra L. Cook, Moti Yung, Angelos D. Keromytis: Elastic block ciphers: method, security and instantiations. Int. J. Inf. Sec. 8(3): 211-231 (2009)
[j18]Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin: Anonymity in Wireless Broadcast Networks. I. J. Network Security 8(1): 37-51 (2009)
[c91]Hyung Chan Kim, Angelos D. Keromytis, Michael Covington, Ravi Sahita: Capturing Information Flow with Concatenated Dynamic Taint Analysis. ARES 2009: 355-362
[c90]Vanessa Frías-Martínez, Joseph Sherrick, Salvatore J. Stolfo, Angelos D. Keromytis: A Network Access Control Mechanism Based on Behavior Profiles. ACSAC 2009: 3-12
[c89]Stelios Sidiroglou, Oren Laadan, Carlos Perez, Nicolas Viennot, Jason Nieh, Angelos D. Keromytis: ASSURE: automatic software self-healing using rescue points. ASPLOS 2009: 37-48
[c88]
[c87]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis: BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. ICISS 2009: 193-207
[c86]Mansoor Alicherry, Angelos D. Keromytis: DoubleCheck: Multi-path verification against man-in-the-middle attacks. ISCC 2009: 557-563
[c85]Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh: A2M: Access-Assured Mobile Desktop Computing. ISC 2009: 186-201
[c84]Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis, Clifford Stein: Adding Trust to P2P Distribution of Paid Content. ISC 2009: 459-474
[c83]Matthew Burnside, Angelos D. Keromytis: F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services. ISC 2009: 491-506
[c82]Yingbo Song, Angelos D. Keromytis, Salvatore J. Stolfo: Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. NDSS 2009
[c81]Mansoor Alicherry, Angelos D. Keromytis, Angelos Stavrou: Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks. SecureComm 2009: 41-50
[c80]Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo: Baiting Inside Attackers Using Decoy Documents. SecureComm 2009: 51-70
[e7]Ehab Al-Shaer, Somesh Jha, Angelos D. Keromytis (Eds.): Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM 2009, ISBN 978-1-60558-894-0- 2008
[j17]Stefan Miltchev, Jonathan M. Smith, Vassilis Prevelakis, Angelos D. Keromytis, Sotiris Ioannidis: Decentralized access control in distributed file systems. ACM Comput. Surv. 40(3) (2008)
[c79]Debra L. Cook, Moti Yung, Angelos D. Keromytis: Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. ACISP 2008: 187-202
[c78]Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis: Pushback for Overlay Networks: Protecting Against Malicious Insiders. ACNS 2008: 39-54
[c77]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis: Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. ACSAC 2008: 367-376
[c76]Matthew Burnside, Angelos D. Keromytis: Asynchronous policy evaluation and enforcement. CSAW 2008: 45-50
[c75]Debra L. Cook, Moti Yung, Angelos D. Keromytis: Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. Inscrypt 2008: 157-180
[c74]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis: Behavior-Based Network Access Control: A Proof-of-Concept. ISC 2008: 175-190
[c73]Matthew Burnside, Angelos D. Keromytis: Path-Based Access Control for Enterprise Networks. ISC 2008: 191-203
[c72]Michael E. Locasto, Matthew Burnside, Angelos D. Keromytis: Online Network Forensics for Automatic Repair Validation. IWSEC 2008: 136-151
[c71]Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo: Return Value Predictability Profiles for Self-healing. IWSEC 2008: 152-166
[c70]Matthew Burnside, Mack Lu, Angelos D. Keromytis: Authentication on Untrusted Remote Hosts with Public-Key Sudo. LISA 2008: 103-107
[c69]Scott E. Coull, Charles V. Wright, Angelos D. Keromytis, Fabian Monrose, Michael K. Reiter: Taming the Devil: Techniques for Evaluating Anonymized Network Data. NDSS 2008
[c68]Sambuddho Chakravarty, Angelos Stavrou, Angelos D. Keromytis: Identifying Proxy Nodes in a Tor Anonymization Circuit. SITIS 2008: 633-639
[c67]Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis: Casting out Demons: Sanitizing Training Data for Anomaly Sensors. IEEE Symposium on Security and Privacy 2008: 81-95
[p3]Angelos D. Keromytis: Hard Problems and Research Challenges. Insider Attack and Cyber Security 2008: 215-218
[p2]Angelos D. Keromytis: Hard Problems and Research Challenges Concluding Remarks. Insider Attack and Cyber Security 2008: 219-222
[e6]Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung (Eds.): Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings. Lecture Notes in Computer Science 5037, 2008, ISBN 978-3-540-68913-3
[e5]Matt Bishop, Christian W. Probst, Angelos D. Keromytis, Anil Somayaji (Eds.): Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008. ACM 2008, ISBN 978-1-60558-341-9
[e4]Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair (Eds.): Insider Attack and Cyber Security - Beyond the Hacker. Advances in Information Security 39, Springer 2008, ISBN 978-0-387-77321-6
[i4]Debra L. Cook, Moti Yung, Angelos D. Keromytis: Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. IACR Cryptology ePrint Archive 2008: 496 (2008)- 2007
[j16]Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis: COVERAGE: detecting and reacting to worm epidemics using cooperation and validation. Int. J. Inf. Sec. 6(6): 361-378 (2007)
[j15]Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Kostas G. Anagnostakis, Jonathan M. Smith: Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications. I. J. Network Security 4(1): 69-80 (2007)
[j14]Angelos D. Keromytis, Jonathan M. Smith: Requirements for scalable access control and security management architectures. ACM Trans. Internet Techn. 7(2) (2007)
[c66]Adam J. Aviv, Michael E. Locasto, Shaya Potter, Angelos D. Keromytis: SSARES: Secure Searchable Automated Remote Email Storage. ACSAC 2007: 129-139
[c65]Debra L. Cook, Angelos D. Keromytis, Moti Yung: Elastic block ciphers: the basic design. ASIACCS 2007: 350-352
[c64]Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo: On the infeasibility of modeling polymorphic shellcode. ACM Conference on Computer and Communications Security 2007: 541-551
[c63]Angelos Stavrou, David Turner, Angelos D. Keromytis, Vassilis Prevelakis: Bridging the Network Reservation Gap Using Overlays. COMSWARE 2007
[c62]Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis: A Study of Malcode-Bearing Documents. DIMVA 2007: 231-250
[c61]Debra L. Cook, Moti Yung, Angelos D. Keromytis: The Security of Elastic Block Ciphers Against Key-Recovery Attacks. ISC 2007: 89-103
[c60]Stelios Sidiroglou, Oren Laadan, Angelos D. Keromytis, Jason Nieh: Using Rescue Points to Navigate Software Recovery. IEEE Symposium on Security and Privacy 2007: 273-280
[c59]Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis: From STEM to SEAD: Speculative Execution for Automated Defense. USENIX Annual Technical Conference 2007: 219-232
[p1]Stelios Sidiroglou, Angelos D. Keromytis: Composite Hybrid Techniques For Defending Against Targeted Attacks. Malware Detection 2007: 213-229
[e3]Konstantin Beznosov, Angelos D. Keromytis (Eds.): Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA - September 18-21, 2007. ACM 2007, ISBN 978-1-60558-080-7- 2006
[b1]Debra L. Cook, Angelos D. Keromytis: CryptoGraphics - Exploiting Graphics Cards for Security. Advances in Information Security 20, Springer 2006, ISBN 978-0-387-29015-7, pp. 1-139
[j13]Stelios Sidiroglou, Angelos D. Keromytis: Execution transactions for defending against software failures: use and evaluation. Int. J. Inf. Sec. 5(2): 77-91 (2006)
[j12]Angelos D. Keromytis, Jason L. Wright, Theo de Raadt, Matthew Burnside: Cryptography as an operating system service: A case study. ACM Trans. Comput. Syst. 24(1): 1-38 (2006)
[c58]Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis: W3Bcrypt: Encryption as a Stylesheet. ACNS 2006: 349-364
[c57]
[c56]Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald: Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. ISC 2006: 427-442
[c55]Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis: Software Self-Healing Using Collaborative Application Communities. NDSS 2006
[c54]Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis: Dark application communities. NSPW 2006: 11-18- 2005
[j11]Angelos Stavrou, Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: WebSOS: an overlay-based system for protecting web servers from denial of service attacks. Computer Networks 48(5): 781-807 (2005)
[j10]Stelios Sidiroglou, Angelos D. Keromytis: Countering Network Worms Through Automatic Patch Generation. IEEE Security & Privacy 3(6): 41-49 (2005)
[j9]Stelios Sidiroglou, Michael E. Locasto, Angelos D. Keromytis: Hardware support for self-healing software services. SIGARCH Computer Architecture News 33(1): 42-47 (2005)
[j8]Matthew Burnside, Angelos D. Keromytis: The case for crypto protocol awareness inside the OS kernel. SIGARCH Computer Architecture News 33(1): 58-64 (2005)
[c53]Gaurav S. Kc, Angelos D. Keromytis: e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing. ACSAC 2005: 286-302
[c52]Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John P. McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov: Highlights from the 2005 New Security Paradigms Workshop. ACSAC 2005: 393-396
[c51]Angelos Stavrou, Angelos D. Keromytis: Countering DoS attacks with stateless multipath overlays. ACM Conference on Computer and Communications Security 2005: 249-259
[c50]Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck: CryptoGraphics: Secret Key Cryptography Using Graphics Cards. CT-RSA 2005: 334-350
[c49]Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis: Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. ICICS 2005: 363-375
[c48]Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos D. Keromytis: The effect of DNS delays on worm propagation in an IPv6 Internet. INFOCOM 2005: 2405-2414
[c47]David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis: The Bandwidth Exchange Architecture. ISCC 2005: 939-944
[c46]Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo: An Email Worm Vaccine Architecture. ISPEC 2005: 97-108
[c45]Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis: A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. ISC 2005: 1-15
[c44]Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis: gore: Routing-Assisted Defense Against DDoS Attacks. ISC 2005: 179-193
[c43]Debra L. Cook, Angelos D. Keromytis: Conversion and Proxy Functions for Symmetric Key Ciphers. ITCC (1) 2005: 662-667
[c42]Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, Dan Rubenstein: MOVE: An End-to-End Solution to Network Denial of Service. NDSS 2005
[c41]Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo: FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101
[c40]Stelios Sidiroglou, Michael E. Locasto, Stephen W. Boyd, Angelos D. Keromytis: Building a Reactive Immune System for Software Services. USENIX Annual Technical Conference, General Track 2005: 149-161
[e2]John Ioannidis, Angelos D. Keromytis, Moti Yung (Eds.): Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings. Lecture Notes in Computer Science 3531, 2005, ISBN 3-540-26223-7
[e1]Vijay Atluri, Angelos D. Keromytis (Eds.): Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005. ACM Press 2005, ISBN 1-59593-229-1
[i3]David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis: The Bandwidth Exchange Architecture. CoRR abs/cs/0504007 (2005)- 2004
[j7]
[j6]Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: SOS: an architecture for mitigating DDoS attacks. IEEE Journal on Selected Areas in Communications 22(1): 176-188 (2004)
[j5]William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Just fast keying: Key agreement in a hostile internet. ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004)
[c39]Michael E. Locasto, Angelos D. Keromytis: CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. ACNS 2004: 1-15
[c38]Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: A Pay-per-Use DoS Protection Mechanism for the Web. ACNS 2004: 120-134
[c37]Stephen W. Boyd, Angelos D. Keromytis: SQLrand: Preventing SQL Injection Attacks. ACNS 2004: 292-302
[c36]Theodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung: The dual receiver cryptosystem and its applications. ACM Conference on Computer and Communications Security 2004: 330-343
[c35]Rakan El-Khalil, Angelos D. Keromytis: Hydan: Hiding Information in Program Binaries. ICICS 2004: 187-199
[c34]Aleksey Kurchuk, Angelos D. Keromytis: Recursive Sandboxes: Extending Systrace To Empower Applications. SEC 2004: 473-488
[i2]Debra L. Cook, Moti Yung, Angelos D. Keromytis: Elastic Block Ciphers. IACR Cryptology ePrint Archive 2004: 128 (2004)
[i1]Debra L. Cook, Moti Yung, Angelos D. Keromytis: Elastic AES. IACR Cryptology ePrint Archive 2004: 141 (2004)- 2003
[j4]Vassilis Prevelakis, Angelos D. Keromytis: Drop-in security for distributed and portable computing elements. Internet Research 13(2): 107-115 (2003)
[j3]Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith: A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C 33(3): 413-426 (2003)
[c33]
[c32]William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: Using graphic turing tests to counter automated DDoS attacks against web servers. ACM Conference on Computer and Communications Security 2003: 8-19
[c31]Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis: Countering code-injection attacks with instruction-set randomization. ACM Conference on Computer and Communications Security 2003: 272-280
[c30]Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith: The STRONGMAN Architecture. DISCEX (1) 2003: 178-188
[c29]Matt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis: TAPI: Transactions for Accessing Public Infrastructure. PWC 2003: 90-100
[c28]Matt Blaze, John Ioannidis, Angelos D. Keromytis: Experience with the KeyNote Trust Management System: Applications and Future Directions. iTrust 2003: 284-300
[c27]
[c26]Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin: WAR: Wireless Anonymous Routing. Security Protocols Workshop 2003: 218-232
[c25]Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Secure and Flexible Global File Sharing. USENIX Annual Technical Conference, FREENIX Track 2003: 165-178
[c24]Angelos D. Keromytis, Jason L. Wright, Theo de Raadt: The Design of the {OpenBSD} Cryptographic Framework. USENIX Annual Technical Conference, General Track 2003: 181-196
[c23]Alexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis: WebDAVA: An Administrator-Free Approach To Web File-Sharing. WETICE 2003: 59-64
[c22]
[c21]Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Design and Implementation of Virtual Private Services. WETICE 2003: 269-274- 2002
[j2]Matt Blaze, John Ioannidis, Angelos D. Keromytis: Trust management for IPsec. ACM Trans. Inf. Syst. Secur. 5(2): 95-118 (2002)
[c20]William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis: Efficient, DoS-resistant, secure key exchange for internet protocols. ACM Conference on Computer and Communications Security 2002: 48-58
[c19]
[c18]John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Vassilis Prevelakis: Fileteller: Paying and Getting Paid for File Storage. Financial Cryptography 2002: 282-299
[c17]Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: SOS: secure overlay services. SIGCOMM 2002: 61-72
[c16]Stefan Miltchev, Sotiris Ioannidis, Angelos D. Keromytis: A Study of the Relative Costs of Network Security Protocols. USENIX Annual Technical Conference, FREENIX Track 2002: 41-48- 2001
[j1]D. Scott Alexander, Paul Menage, Angelos D. Keromytis, William A. Arbaugh, Kostas G. Anagnostakis, Jonathan M. Smith: The price of safety in an active network. Journal of Communications and Networks 3(1): 4-18 (2001)
[c15]Matt Blaze, John Ioannidis, Angelos D. Keromytis: Offline Micropayments without Trusted Hardware. Financial Cryptography 2001: 21-40
[c14]
[c13]William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. Security Protocols Workshop 2001: 27-39- 2000
[c12]John Ioannidis, Angelos D. Keromytis: Network security and IPsec (tutorial). ACM Conference on Computer and Communications Security 2000
[c11]Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith: Implementing a distributed firewall. ACM Conference on Computer and Communications Security 2000: 190-199
[c10]Kostas G. Anagnostakis, Michael W. Hicks, Sotiris Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Scalable Resource Control in Active Networks. IWAN 2000: 343-357
[c9]Niklas Hallqvist, Angelos D. Keromytis: Implementing Internet Key Exchange (IKE). USENIX Annual Technical Conference, FREENIX Track 2000: 201-214
[c8]Angelos D. Keromytis, Jason L. Wright: Transparent Network Security Policy Enforcement. USENIX Annual Technical Conference, FREENIX Track 2000: 215-226
1990 – 1999
- 1999
[c7]Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis: The Role of Trust Management in Distributed Systems Security. Secure Internet Programming 1999: 185-210
[c6]D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith: Security in Active Networks. Secure Internet Programming 1999: 433-451
[c5]
[c4]Matt Blaze, John Ioannidis, Angelos D. Keromytis: Trust Management and Network Layer Security Protocols. Security Protocols Workshop 1999: 103-118
[c3]Theo de Raadt, Niklas Hallqvist, Artur Grabowski, Angelos D. Keromytis, Niels Provos: Cryptography in OpenBSD: An Overview. USENIX Annual Technical Conference, FREENIX Track 1999: 93-101- 1998
[c2]William A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith: Automated Recovery in a Secure Bootstrap Process. NDSS 1998
[c1]Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis: KeyNote: Trust Management for Public-Key Infrastructures (Position Paper). Security Protocols Workshop 1998: 59-63
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:02 CEST by the dblp team



