default search action
Angelos D. Keromytis
Angelos Dennis Keromytis
Person information
- affiliation: Columbia University, New York City, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c174]Georgios Kokolakis, Athanasios Moschos, Angelos D. Keromytis:
Harnessing the Power of General-Purpose LLMs in Hardware Trojan Design. ACNS Workshops (1) 2024: 176-194 - [c173]Athanasios Moschos, Fabian Monrose, Angelos D. Keromytis:
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans. HOST 2024: 254-259 - [c172]Hexuan Yu, Changlai Du, Yang Xiao, Angelos D. Keromytis, Chonggang Wang, Robert Gazda, Y. Thomas Hou, Wenjing Lou:
AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials. NDSS 2024 - [i16]Athanassios Moschos, Fabian Monrose, Angelos D. Keromytis:
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans. CoRR abs/2403.10659 (2024) - 2023
- [c171]Zane Ma, Aaron Faulkenberry, Thomas Papastergiou, Zakir Durumeric, Michael D. Bailey, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis:
Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys. IMC 2023: 222-235 - [c170]Changlai Du, Hexuan Yu, Yang Xiao, Y. Thomas Hou, Angelos D. Keromytis, Wenjing Lou:
UCBlocker: Unwanted Call Blocking Using Anonymous Authentication. USENIX Security Symposium 2023: 445-462 - [c169]Athanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, Charles Lever, Paul Burbage, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis:
Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators. USENIX Security Symposium 2023: 5307-5324 - 2022
- [c168]Aaron Faulkenberry, Athanasios Avgetidis, Zane Ma, Omar Alrawi, Charles Lever, Panagiotis Kintis, Fabian Monrose, Angelos D. Keromytis, Manos Antonakakis:
View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy. ACSAC 2022: 240-250 - [c167]Yaakov Cohen, Kevin Sam Tharayil, Arie Haenel, Daniel Genkin, Angelos D. Keromytis, Yossi Oren, Yuval Yarom:
HammerScope: Observing DRAM Power Consumption Using Rowhammer. CCS 2022: 547-561
2010 – 2019
- 2019
- [j46]Dimitris Mitropoulos, Panos Louridas, Michalis Polychronakis, Angelos Dennis Keromytis:
Defending Against Web Application Attacks: Approaches, Challenges and Implications. IEEE Trans. Dependable Secur. Comput. 16(2): 188-203 (2019) - [j45]Marios Pomonis, Theofilos Petsios, Angelos D. Keromytis, Michalis Polychronakis, Vasileios P. Kemerlis:
Kernel Protection Against Just-In-Time Code Reuse. ACM Trans. Priv. Secur. 22(1): 5:1-5:28 (2019) - [p8]Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodríguez, Moti Yung:
A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions. Advances in Cyber Security 2019: 143-183 - 2018
- [c166]Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodríguez, Moti Yung:
Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs. CSCML 2018: 206-226 - [i15]Georgios Kontaxis, Angelos D. Keromytis, Georgios Portokalidis:
Redirect2Own: Protecting the Intellectual Property of User-uploaded Content through Off-site Indirect Access. CoRR abs/1810.04779 (2018) - 2017
- [j44]George Argyros, Theofilos Petsios, Suphannee Sivakorn, Angelos D. Keromytis, Iasonas Polakis:
Evaluating the Privacy Guarantees of Location Proximity Services. ACM Trans. Priv. Secur. 19(4): 12:1-12:31 (2017) - [c165]Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, Suman Jana:
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities. CCS 2017: 2155-2168 - [c164]Marios Pomonis, Theofilos Petsios, Angelos D. Keromytis, Michalis Polychronakis, Vasileios P. Kemerlis:
kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse. EuroSys 2017: 420-436 - [c163]Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, Suman Jana:
HVLearn: Automated Black-Box Analysis of Hostname Verification in SSL/TLS Implementations. IEEE Symposium on Security and Privacy 2017: 521-538 - [c162]Theofilos Petsios, Adrian Tang, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana:
NEZHA: Efficient Domain-Independent Differential Testing. IEEE Symposium on Security and Privacy 2017: 615-632 - [i14]Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, Suman Jana:
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities. CoRR abs/1708.08437 (2017) - [i13]Theofilos Petsios, Adrian Tang, Dimitris Mitropoulos, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana:
Tug-of-War: Observations on Unified Content Handling. CoRR abs/1708.09334 (2017) - 2016
- [j43]Dimitris Mitropoulos, Konstantinos Stroggylos, Diomidis Spinellis, Angelos D. Keromytis:
How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints. ACM Trans. Priv. Secur. 19(1): 2:1-2:31 (2016) - [j42]Kapil Anand, Khaled Elwazeer, Aparna Kotha, Matthew Smithson, Rajeev Barua, Angelos D. Keromytis:
A Stack Memory Abstraction and Symbolic Analysis Framework for Executables. ACM Trans. Softw. Eng. Methodol. 25(2): 19:1-19:38 (2016) - [c161]Georgios Kontaxis, Angelos D. Keromytis:
Protecting Insecure Communications with Topology-aware Network Tunnels. CCS 2016: 1280-1291 - [c160]George Argyros, Ioannis Stais, Suman Jana, Angelos D. Keromytis, Aggelos Kiayias:
SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning. CCS 2016: 1690-1701 - [c159]Elias Athanasopoulos, Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis:
NaClDroid: Native Code Isolation for Android Applications. ESORICS (1) 2016: 422-439 - [c158]Suphannee Sivakorn, Iasonas Polakis, Angelos D. Keromytis:
I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs. EuroS&P 2016: 388-403 - [c157]George Argyros, Ioannis Stais, Aggelos Kiayias, Angelos D. Keromytis:
Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters. IEEE Symposium on Security and Privacy 2016: 91-109 - [c156]Suphannee Sivakorn, Iasonas Polakis, Angelos D. Keromytis:
The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information. IEEE Symposium on Security and Privacy 2016: 724-742 - [c155]Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, Evangelos P. Markatos:
Provable Network Activity for Protecting Users Against False Accusation. WISTP 2016: 254-261 - [c154]Suphannee Sivakorn, Angelos D. Keromytis, Jason Polakis:
That's the Way the Cookie Crumbles: Evaluating HTTPS Enforcing Mechanisms. WPES@CCS 2016: 71-81 - 2015
- [j41]Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Angelos D. Keromytis:
An efficient and easily deployable method for dealing with DoS in SIP services. Comput. Commun. 57: 50-63 (2015) - [j40]Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis:
Detection and analysis of eavesdropping in anonymous communication networks. Int. J. Inf. Sec. 14(3): 205-220 (2015) - [j39]Yossef Oren, Angelos D. Keromytis:
Attacking the Internet Using Broadcast Digital Television. ACM Trans. Inf. Syst. Secur. 17(4): 16:1-16:27 (2015) - [c153]Theofilos Petsios, Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis:
DynaGuard: Armoring Canary-based Protections against Brute-force Attacks. ACSAC 2015: 351-360 - [c152]Iasonas Polakis, George Argyros, Theofilos Petsios, Suphannee Sivakorn, Angelos D. Keromytis:
Where's Wally?: Precise User Discovery Attacks in Location Proximity Services. CCS 2015: 817-828 - [c151]Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis:
The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications. CCS 2015: 1406-1418 - [c150]Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco de Borja Rodríguez, Moti Yung:
Privacy Threats in E-Shopping (Position Paper). DPM/QASA@ESORICS 2015: 217-225 - [i12]Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis:
The Spy in the Sandbox - Practical Cache Attacks in Javascript. CoRR abs/1502.07373 (2015) - 2014
- [c149]Marios Pomonis, Theofilos Petsios, Kangkook Jee, Michalis Polychronakis, Angelos D. Keromytis:
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking. ACSAC 2014: 416-425 - [c148]Iasonas Polakis, Federico Maggi, Stefano Zanero, Angelos D. Keromytis:
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned. BADGERS@ESORICS 2014: 18-29 - [c147]Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, Angelos D. Keromytis:
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication. CCS 2014: 501-512 - [c146]Sambuddho Chakravarty, Marco Valerio Barbera, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis:
On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records. PAM 2014: 247-257 - [c145]Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis:
Dynamic Reconstruction of Relocation Information for Stripped Binaries. RAID 2014: 68-87 - [c144]Vasilis Pappas, Fernando Krell, Binh Vo, Vladimir Kolesnikov, Tal Malkin, Seung Geol Choi, Wesley George, Angelos D. Keromytis, Steven M. Bellovin:
Blind Seer: A Scalable Private DBMS. IEEE Symposium on Security and Privacy 2014: 359-374 - [c143]Yossef Oren, Angelos D. Keromytis:
From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television. USENIX Security Symposium 2014: 353-368 - [c142]Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis:
ret2dir: Rethinking Kernel Isolation. USENIX Security Symposium 2014: 957-972 - [p7]Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis:
Computational Decoys for Cloud Security. Secure Cloud Computing 2014: 261-270 - 2013
- [c141]Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Angelos D. Keromytis:
A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP. ARES 2013: 224-229 - [c140]Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, Angelos D. Keromytis:
SAuth: protecting user accounts from password database leaks. CCS 2013: 187-198 - [c139]Kangkook Jee, Vasileios P. Kemerlis, Angelos D. Keromytis, Georgios Portokalidis:
ShadowReplica: efficient parallelization of dynamic data flow tracking. CCS 2013: 235-246 - [c138]John Jong-Uk Choi, Soon Ae Chun, Dong Hwa Kim, Angelos D. Keromytis:
SecureGov: secure data sharing for government services. DG.O 2013: 127-135 - [c137]Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas, Angelos D. Keromytis:
CellFlood: Attacking Tor Onion Routers on the Cheap. ESORICS 2013: 664-681 - [c136]Angeliki Zavou, Vasilis Pappas, Vasileios P. Kemerlis, Michalis Polychronakis, Georgios Portokalidis, Angelos D. Keromytis:
Cloudopsy: An Autopsy of Data Flows in the Cloud. HCI (27) 2013: 366-375 - [c135]Kapil Anand, Khaled Elwazeer, Aparna Kotha, Matthew Smithson, Rajeev Barua, Angelos D. Keromytis:
An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables. ICSM 2013: 90-99 - [c134]Vasilis Pappas, Vasileios P. Kemerlis, Angeliki Zavou, Michalis Polychronakis, Angelos D. Keromytis:
CloudFence: Data Flow Tracking as a Cloud Service. RAID 2013: 411-431 - [c133]Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis:
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. USENIX Security Symposium 2013: 447-462 - [p6]Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis:
Practical Software Diversification Using In-Place Code Randomization. Moving Target Defense 2013: 175-202 - [e12]Angelos D. Keromytis, Roberto Di Pietro:
Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 106, Springer 2013, ISBN 978-3-642-36882-0 [contents] - 2012
- [j38]Angelos D. Keromytis:
A Comprehensive Survey of Voice over IP Security Research. IEEE Commun. Surv. Tutorials 14(2): 514-537 (2012) - [j37]Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo:
A system for generating and injecting indistinguishable network decoys. J. Comput. Secur. 20(2-3): 199-221 (2012) - [j36]Vasileios P. Kemerlis, Georgios Portokalidis, Elias Athanasopoulos, Angelos D. Keromytis:
kGuard: Lightweight Kernel Protection. login Usenix Mag. 37(6) (2012) - [c132]Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis:
Self-healing multitier architectures using cascading rescue points. ACSAC 2012: 379-388 - [c131]Iasonas Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, Sotiris Ioannidis, Angelos D. Keromytis, Stefano Zanero:
All your face are belong to us: breaking Facebook's social authentication. ACSAC 2012: 399-408 - [c130]Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis, Angelos D. Keromytis:
Exploiting split browsers for efficiently protecting user data. CCSW 2012: 37-42 - [c129]Dimitris Geneiatakis, Georgios Portokalidis, Vasileios P. Kemerlis, Angelos D. Keromytis:
Adaptive defenses for commodity software through virtual application partitioning. CCS 2012: 133-144 - [c128]Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle, Angelos Stavrou:
The MEERKATS Cloud Security Architecture. ICDCS Workshops 2012: 446-450 - [c127]Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August, Angelos D. Keromytis:
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware. NDSS 2012 - [c126]Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, Sotiris Ioannidis:
Towards a Universal Data Provenance Framework Using Dynamic Instrumentation. SEC 2012: 103-114 - [c125]Salvatore J. Stolfo, Malek Ben Salem, Angelos D. Keromytis:
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. IEEE Symposium on Security and Privacy Workshops 2012: 125-128 - [c124]Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis:
Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization. IEEE Symposium on Security and Privacy 2012: 601-615 - [c123]Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis:
kGuard: Lightweight Kernel Protection against Return-to-User Attacks. USENIX Security Symposium 2012: 459-474 - [c122]Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos:
Privacy-Preserving Social Plugins. USENIX Security Symposium 2012: 631-646 - [c121]Vasileios P. Kemerlis, Georgios Portokalidis, Kangkook Jee, Angelos D. Keromytis:
libdft: practical dynamic data flow tracking for commodity systems. VEE 2012: 121-132 - [e11]Angelos D. Keromytis:
Financial Cryptography and Data Security - 16th International Conference, FC 2012, Kralendijk, Bonaire, February 27 - March 2, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7397, Springer 2012, ISBN 978-3-642-32945-6 [contents] - 2011
- [b2]Angelos D. Keromytis:
Voice over IP Security - A Comprehensive Survey of Vulnerabilities and Academic Research. Springer Briefs in Computer Science 1, Springer 2011, ISBN 978-1-4419-9865-1, pp. i-xiii, 1-83 - [j35]Ted Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung:
The Efficient Dual Receiver Cryptosystem and Its Applications. Int. J. Netw. Secur. 13(3): 135-151 (2011) - [c120]Vasilis Pappas, Angelos D. Keromytis:
Measuring the Deployment Hiccups of DNSSEC. ACC (3) 2011: 44-53 - [c119]Mansoor Alicherry, Angelos D. Keromytis:
Misuse Detection in Consent-Based Networks. ACNS 2011: 38-56 - [c118]Dimitris Geneiatakis, Angelos D. Keromytis:
Towards a Forensic Analysis for Multimedia Communication Services. AINA Workshops 2011: 424-429 - [c117]Angelos D. Keromytis, Salvatore J. Stolfo, Junfeng Yang, Angelos Stavrou, Anup K. Ghosh, Dawson R. Engler, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle:
The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security. SysSec@DIMVA 2011: 53-56 - [c116]Simha Sethumadhavan, Salvatore J. Stolfo, Angelos D. Keromytis, Junfeng Yang, David I. August:
The SPARCHS Project: Hardware Support for Software Security. SysSec@DIMVA 2011: 119-122 - [c115]Maritza L. Johnson, Steven M. Bellovin, Angelos D. Keromytis:
Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent. Financial Cryptography Workshops 2011: 131-137 - [c114]Dimitris Geneiatakis, Georgios Portokalidis, Angelos D. Keromytis:
A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS. ICISS 2011: 322-336 - [c113]Georgios Portokalidis, Angelos D. Keromytis:
REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points. IWSEC 2011: 16-32 - [c112]Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis:
Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking. IWSEC 2011: 113-128 - [c111]Michalis Polychronakis, Angelos D. Keromytis:
ROP payload detection using speculative code execution. MALWARE 2011: 58-65 - [c110]Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis:
Detecting Traffic Snooping in Tor Using Decoys. RAID 2011: 222-241 - [c109]Pádraig O'Sullivan, Kapil Anand, Aparna Kotha, Matthew Smithson, Rajeev Barua, Angelos D. Keromytis:
Retrofitting Security in COTS Software with Binary Rewriting. SEC 2011: 154-172 - [p5]Georgios Portokalidis, Angelos D. Keromytis:
Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution. Moving Target Defense 2011: 49-76 - [r3]Angelos D. Keromytis:
Buffer Overflow Attacks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 174-177 - [r2]Angelos D. Keromytis:
Network Bandwidth Denial of Service (DoS). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 836-838 - 2010
- [j34]Andrea M. Matwyshyn, Ang Cui, Angelos D. Keromytis, Salvatore J. Stolfo:
Ethics in Security Vulnerability Research. IEEE Secur. Priv. 8(2): 67-72 (2010) - [j33]Angelos D. Keromytis:
Voice-over-IP Security: Research and Practice. IEEE Secur. Priv. 8(2): 76-78 (2010) - [j32]Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems. Mach. Learn. 81(2): 179-205 (2010) - [j31]Stephen W. Boyd, Gaurav S. Kc, Michael E. Locasto, Angelos D. Keromytis, Vassilis Prevelakis:
On the General Applicability of Instruction-Set Randomization. IEEE Trans. Dependable Secur. Comput. 7(3): 255-270 (2010) - [j30]David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis:
A market-based bandwidth charging framework. ACM Trans. Internet Techn. 10(1): 1:1-1:30 (2010) - [j29]Angelos D. Keromytis:
A Look at VoIP Vulnerabilities. login Usenix Mag. 35(1) (2010) - [c108]Georgios Portokalidis, Angelos D. Keromytis:
Fast and practical instruction-set randomization for commodity systems. ACSAC 2010: 41-48 - [c107]Sambuddho Chakravarty, Angelos Stavrou, Angelos D. Keromytis:
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. ESORICS 2010: 249-267 - [c106]Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis:
Evaluation of a Spyware Detection System Using Thin Client Computing. ICISC 2010: 222-232 - [c105]Kangkook Jee, Stelios Sidiroglou-Douskos, Angelos Stavrou, Angelos D. Keromytis:
An Adversarial Evaluation of Network Signaling and Control Mechanisms. ICISC 2010: 252-265 - [c104]Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis:
Crimeware Swindling without Virtual Machines. ISC 2010: 196-202 - [c103]Mansoor Alicherry, Angelos D. Keromytis:
Securing MANET Multicast Using DIPLOMA. IWSEC 2010: 232-250 - [c102]Mansoor Alicherry, Angelos D. Keromytis:
DIPLOMA: Distributed Policy Enforcement Architecture for MANETs. NSS 2010: 89-98 - [c101]Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo:
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. RAID 2010: 118-137 - [c100]Marco Cova, Corrado Leita, Olivier Thonnard, Angelos D. Keromytis, Marc Dacier:
An Analysis of Rogue AV Campaigns. RAID 2010: 442-463 - [c99]Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo:
Automating the injection of believable decoys to detect snooping. WISEC 2010: 81-86 - [p4]Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo:
Monitoring Technologies for Mitigating Insider Threats. Insider Threats in Cyber Security 2010: 197-217 - [e10]Ehab Al-Shaer, Angelos D. Keromytis, Vitaly Shmatikov:
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010. ACM 2010, ISBN 978-1-4503-0245-6 [contents] - [e9]Angelos D. Keromytis, Sean Peisert, Richard Ford, Carrie Gates:
Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010. ACM 2010, ISBN 978-1-4503-0415-3 [contents] - [i11]Angelos D. Keromytis:
X.509 Key and Signature Encoding for the KeyNote Trust Management System. RFC 5708: 1-6 (2010) - [i10]Angelos D. Keromytis:
Transport Layer Security (TLS) Authorization Using KeyNote. RFC 6042: 1-7 (2010)
2000 – 2009
- 2009
- [j28]Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee:
Dynamic Trust Management. Computer 42(2): 44-52 (2009) - [j27]