default search action
Georgios Portokalidis
Person information
- affiliation: Stevens Institute of Technology, NJ, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c44]Mohamad Mansouri, Jun Xu, Georgios Portokalidis:
Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs. AsiaCCS 2023: 259-273 - [c43]Vidya Lakshmi Rajagopalan, Konstantinos Kleftogiorgos, Enes Göktas, Jun Xu, Georgios Portokalidis:
SysPart: Automated Temporal System Call Filtering for Binaries. CCS 2023: 1979-1993 - [c42]Yuchen Zhang, Ashish Kundu, Georgios Portokalidis, Jun Xu:
On the Dual Nature of Necessity in Use of Rust Unsafe Code. ESEC/SIGSOFT FSE 2023: 2032-2037 - [i7]Vidya Lakshmi Rajagopalan, Konstantinos Kleftogiorgos, Enes Göktas, Jun Xu, Georgios Portokalidis:
SYSPART: Automated Temporal System Call Filtering for Binaries. CoRR abs/2309.05169 (2023) - 2022
- [c41]Yuchen Zhang, Yunhang Zhang, Georgios Portokalidis, Jun Xu:
Towards Understanding the Runtime Performance of Rust. ASE 2022: 140:1-140:6 - [c40]Ruotong Yu, Francesca Del Nin, Yuchen Zhang, Shan Huang, Pallavi Kaliyar, Sarah Zakto, Mauro Conti, Georgios Portokalidis, Jun Xu:
Building Embedded Systems Like It's 1996. NDSS 2022 - [c39]Yuchen Zhang, Chengbin Pang, Georgios Portokalidis, Nikos Triandopoulos, Jun Xu:
Debloating Address Sanitizer. USENIX Security Symposium 2022: 4345-4363 - [i6]Ruotong Yu, Francesca Del Nin, Yuchen Zhang, Shan Huang, Pallavi Kaliyar, Sarah Zakto, Mauro Conti, Georgios Portokalidis, Jun Xu:
Building Embedded Systems Like It's 1996. CoRR abs/2203.06834 (2022) - 2021
- [c38]Yuandong Cyrus Liu, Chengbin Pang, Daniel Dietsch, Eric Koskinen, Ton-Chanh Le, Georgios Portokalidis, Jun Xu:
Proving LTL Properties of Bitvector Programs and Decompiled Binaries. APLAS 2021: 285-304 - [c37]Chengbin Pang, Ruotong Yu, Dongpeng Xu, Eric Koskinen, Georgios Portokalidis, Jun Xu:
Towards Optimal Use of Exception Handling Information for Function Detection. DSN 2021: 338-349 - [c36]Chengbin Pang, Ruotong Yu, Yaohui Chen, Eric Koskinen, Georgios Portokalidis, Bing Mao, Jun Xu:
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask. SP 2021: 833-851 - [i5]Chengbin Pang, Ruotong Yu, Dongpeng Xu, Eric Koskinen, Georgios Portokalidis, Jun Xu:
Towards Optimal Use of Exception Handling Information for Function Detection. CoRR abs/2104.03168 (2021) - [i4]Yuandong Cyrus Liu, Chengbin Pang, Daniel Dietsch, Eric Koskinen, Ton-Chanh Le, Georgios Portokalidis, Jun Xu:
Source-Level Bitwise Branching for Temporal Verification of Lifted Binaries. CoRR abs/2105.05159 (2021) - 2020
- [c35]Enes Göktas, Kaveh Razavi, Georgios Portokalidis, Herbert Bos, Cristiano Giuffrida:
Speculative Probing: Hacking Blind in the Spectre Era. CCS 2020: 1871-1885 - [e2]Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - [i3]Chengbin Pang, Ruotong Yu, Yaohui Chen, Eric Koskinen, Georgios Portokalidis, Bing Mao, Jun Xu:
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask. CoRR abs/2007.14266 (2020)
2010 – 2019
- 2019
- [c34]Ioannis Agadakos, Di Jin, David Williams-King, Vasileios P. Kemerlis, Georgios Portokalidis:
Nibbler: debloating binary shared libraries. ACSAC 2019: 70-83 - 2018
- [c33]Enes Göktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, Cristiano Giuffrida:
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. EuroS&P 2018: 227-242 - [p2]Enes Göktas, Elias Athanasopoulos, Herbert Bos, Georgios Portokalidis:
Evaluating control-flow restricting defenses. The Continuing Arms Race 2018: 117-137 - [i2]Dimitrios Damopoulos, Georgios Portokalidis:
Hands-Free One-Time and Continuous Authentication Using Glass Wearable Devices. CoRR abs/1810.02496 (2018) - [i1]Georgios Kontaxis, Angelos D. Keromytis, Georgios Portokalidis:
Redirect2Own: Protecting the Intellectual Property of User-uploaded Content through Off-site Indirect Access. CoRR abs/1810.04779 (2018) - 2017
- [c32]Ioannis Agadakos, Jason Polakis, Georgios Portokalidis:
Techu: Open and Privacy-Preserving Crowdsourced GPS for the Masses. MobiSys 2017: 475-487 - 2016
- [c31]Ioannis Agadakos, Per A. Hallgren, Dimitrios Damopoulos, Andrei Sabelfeld, Georgios Portokalidis:
Location-enhanced authentication using the IoT: because you cannot be in two places at once. ACSAC 2016: 251-264 - [c30]Elias Athanasopoulos, Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis:
NaClDroid: Native Code Isolation for Android Applications. ESORICS (1) 2016: 422-439 - [c29]Enes Göktas, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos:
Undermining Information Hiding (and What to Do about It). USENIX Security Symposium 2016: 105-119 - 2015
- [j4]Georgios Karopoulos, Georgios Portokalidis, Josep Domingo-Ferrer, Ying-Dar Lin, Dimitris Geneiatakis, Georgios Kambourakis:
Security and privacy in unified communications: Challenges and solutions. Comput. Commun. 68: 1-3 (2015) - [j3]Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis:
Detection and analysis of eavesdropping in anonymous communication networks. Int. J. Inf. Sec. 14(3): 205-220 (2015) - [c28]István Haller, Enes Göktas, Elias Athanasopoulos, Georgios Portokalidis, Herbert Bos:
ShrinkWrap: VTable Protection without Loose Ends. ACSAC 2015: 341-350 - [c27]Evangelos Ladakis, Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis, Georgios Portokalidis:
GPU-Disasm: A GPU-Based X86 Disassembler. ISC 2015: 472-489 - [c26]Dirk Vogt, Armando Miraglia, Georgios Portokalidis, Herbert Bos, Andy Tanenbaum, Cristiano Giuffrida:
Speculative Memory Checkpointing. Middleware 2015: 197-209 - [c25]Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, Sotiris Ioannidis:
The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines. NDSS 2015 - [c24]Qilang Yang, Dimitrios Damopoulos, Georgios Portokalidis:
WYSISNWIV: What You Scan Is Not What I Visit. RAID 2015: 317-338 - 2014
- [c23]Dimitrios Damopoulos, Georgios Kambourakis, Georgios Portokalidis:
The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones. EUROSEC 2014: 6:1-6:6 - [c22]Sambuddho Chakravarty, Marco Valerio Barbera, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis:
On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records. PAM 2014: 247-257 - [c21]Enes Göktas, Elias Athanasopoulos, Herbert Bos, Georgios Portokalidis:
Out of Control: Overcoming Control-Flow Integrity. IEEE Symposium on Security and Privacy 2014: 575-589 - [c20]Enes Göktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis:
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard. USENIX Security Symposium 2014: 417-432 - [e1]Angelos Stavrou, Herbert Bos, Georgios Portokalidis:
Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings. Lecture Notes in Computer Science 8688, Springer 2014, ISBN 978-3-319-11378-4 [contents] - 2013
- [c19]Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, Angelos D. Keromytis:
SAuth: protecting user accounts from password database leaks. CCS 2013: 187-198 - [c18]Kangkook Jee, Vasileios P. Kemerlis, Angelos D. Keromytis, Georgios Portokalidis:
ShadowReplica: efficient parallelization of dynamic data flow tracking. CCS 2013: 235-246 - [c17]Angeliki Zavou, Vasilis Pappas, Vasileios P. Kemerlis, Michalis Polychronakis, Georgios Portokalidis, Angelos D. Keromytis:
Cloudopsy: An Autopsy of Data Flows in the Cloud. HCI (27) 2013: 366-375 - 2012
- [j2]Vasileios P. Kemerlis, Georgios Portokalidis, Elias Athanasopoulos, Angelos D. Keromytis:
kGuard: Lightweight Kernel Protection. login Usenix Mag. 37(6) (2012) - [c16]Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis:
Self-healing multitier architectures using cascading rescue points. ACSAC 2012: 379-388 - [c15]Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis, Angelos D. Keromytis:
Exploiting split browsers for efficiently protecting user data. CCSW 2012: 37-42 - [c14]Dimitris Geneiatakis, Georgios Portokalidis, Vasileios P. Kemerlis, Angelos D. Keromytis:
Adaptive defenses for commodity software through virtual application partitioning. CCS 2012: 133-144 - [c13]Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August, Angelos D. Keromytis:
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware. NDSS 2012 - [c12]Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis:
kGuard: Lightweight Kernel Protection against Return-to-User Attacks. USENIX Security Symposium 2012: 459-474 - [c11]Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos:
Privacy-Preserving Social Plugins. USENIX Security Symposium 2012: 631-646 - [c10]Vasileios P. Kemerlis, Georgios Portokalidis, Kangkook Jee, Angelos D. Keromytis:
libdft: practical dynamic data flow tracking for commodity systems. VEE 2012: 121-132 - 2011
- [c9]Dimitris Geneiatakis, Georgios Portokalidis, Angelos D. Keromytis:
A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS. ICISS 2011: 322-336 - [c8]Georgios Portokalidis, Angelos D. Keromytis:
REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points. IWSEC 2011: 16-32 - [c7]Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis:
Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking. IWSEC 2011: 113-128 - [c6]Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis:
Detecting Traffic Snooping in Tor Using Decoys. RAID 2011: 222-241 - [p1]Georgios Portokalidis, Angelos D. Keromytis:
Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution. Moving Target Defense 2011: 49-76 - 2010
- [c5]Georgios Portokalidis, Angelos D. Keromytis:
Fast and practical instruction-set randomization for commodity systems. ACSAC 2010: 41-48 - [c4]Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, Herbert Bos:
Paranoid Android: versatile protection for smartphones. ACSAC 2010: 347-356
2000 – 2009
- 2008
- [c3]Georgios Portokalidis, Herbert Bos:
Eudaemon: involuntary and on-demand emulation against zero-day exploits. EuroSys 2008: 287-299 - 2007
- [j1]Georgios Portokalidis, Herbert Bos:
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots. Comput. Networks 51(5): 1256-1274 (2007) - 2006
- [c2]Georgios Portokalidis, Asia Slowinska, Herbert Bos:
Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. EuroSys 2006: 15-27 - 2004
- [c1]Herbert Bos, Willem de Bruijn, Mihai-Lucian Cristea, Trung Nguyen, Georgios Portokalidis:
FFPF: Fairly Fast Packet Filters. OSDI 2004: 347-363
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-18 01:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint