Elias Athanasopoulos
Elias Athanasopoulos
Assistant Professor, University of Cyprus
Email verificata su cs.ucy.ac.cy - Home page
TitoloCitata daAnno
Out of control: Overcoming control-flow integrity
E G÷ktas, E Athanasopoulos, H Bos, G Portokalidis
2014 IEEE Symposium on Security and Privacy, 575-589, 2014
3032014
Rage against the virtual machine: hindering dynamic analysis of android malware
T Petsas, G Voyatzis, E Athanasopoulos, M Polychronakis, S Ioannidis
Proceedings of the Seventh European Workshop on System Security, 5, 2014
1682014
Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard
E G÷ktaş, E Athanasopoulos, M Polychronakis, H Bos, G Portokalidis
23rd {USENIX} Security Symposium ({USENIX} Security 14), 417-432, 2014
1392014
we. b: The web of short URLs
D Antoniades, I Polakis, G Kontaxis, E Athanasopoulos, S Ioannidis, ...
Proceedings of the 20th international conference on World Wide Web, 715-724, 2011
1162011
Antisocial networks: Turning a social network into a botnet
E Athanasopoulos, A Makridakis, S Antonatos, D Antoniades, S Ioannidis, ...
International Conference on Information Security, 146-160, 2008
962008
A tough call: Mitigating advanced code-reuse attacks at the binary level
V Van Der Veen, E G÷ktas, M Contag, A Pawoloski, X Chen, S Rawat, ...
2016 IEEE Symposium on Security and Privacy (SP), 934-953, 2016
872016
Face/off: Preventing privacy leakage from photos in social networks
P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communicationsá…, 2015
742015
Censmon: A web censorship monitor
A Sfakianakis, E Athanasopoulos, S Ioannidis
Free and Open Communications on the Internet. USENIX, 113, 2011
612011
Enhanced captchas: Using animation to tell humans and computers apart
E Athanasopoulos, S Antonatos
IFIP International Conference on Communications and Multimedia Security, 97-108, 2006
582006
Misusing unstructured p2p systems to perform dos attacks: The network that never forgets
E Athanasopoulos, KG Anagnostakis, EP Markatos
International Conference on Applied Cryptography and Network Security, 130-145, 2006
562006
AndRadar: fast discovery of android applications in alternative markets
M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ...
International Conference on Detection of Intrusions and Malware, andá…, 2014
542014
Two-factor authentication: is the world ready?: quantifying 2FA adoption
T Petsas, G Tsirantonakis, E Athanasopoulos, S Ioannidis
Proceedings of the eighth european workshop on system security, 4, 2015
472015
PixelVault: Using GPUs for securing cryptographic operations
G Vasiliadis, E Athanasopoulos, M Polychronakis, S Ioannidis
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communicationsá…, 2014
472014
Sauth: Protecting user accounts from password database leaks
G Kontaxis, E Athanasopoulos, G Portokalidis, AD Keromytis
Proceedings of the 2013 ACM SIGSAC conference on Computer & communicationsá…, 2013
472013
Poking holes in information hiding
A Oikonomopoulos, E Athanasopoulos, H Bos, C Giuffrida
25th {USENIX} Security Symposium ({USENIX} Security 16), 121-138, 2016
462016
Compromising anonymity using packet spinning
V Pappas, E Athanasopoulos, S Ioannidis, EP Markatos
International Conference on Information Security, 161-174, 2008
442008
Undermining information hiding (and what to do about it)
E G÷ktaş, R Gawlik, B Kollenda, E Athanasopoulos, G Portokalidis, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 105-119, 2016
422016
xJS: practical XSS prevention for web application development
E Athanasopoulos, V Pappas, A Krithinakis, S Ligouras, EP Markatos, ...
Proceedings of the 2010 USENIX conference on Web application development, 13-13, 2010
392010
Hcfi: Hardware-enforced control-flow integrity
N Christoulakis, G Christou, E Athanasopoulos, S Ioannidis
Proceedings of the Sixth ACM Conference on Data and Application Security andá…, 2016
382016
Shrinkwrap: Vtable protection without loose ends
I Haller, E G÷ktaş, E Athanasopoulos, G Portokalidis, H Bos
Proceedings of the 31st Annual Computer Security Applications Conferenceá…, 2015
372015
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20