Apostolis Zarras
Apostolis Zarras
Assistant Professor, Maastricht University
Email verificata su maastrichtuniversity.nl - Home page
TitoloCitata daAnno
Deep Learning for Classification of Malware System Call Sequences
B Kolosnjaji, A Zarras, G Webster, C Eckert
Australasian Joint Conference on Artificial Intelligence (AI), 137-149, 2016
1422016
Understanding Fraudulent Activities in Online Ad Exchanges
B Stone-Gross, R Stevens, A Zarras, R Kemmerer, C Kruegel, G Vigna
ACM Internet Measurement Conference (IMC), 279-294, 2011
1122011
The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements
A Zarras, A Kapravelos, G Stringhini, T Holz, C Kruegel, G Vigna
ACM Internet Measurement Conference (IMC), 373-380, 2014
922014
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
A Costin, A Zarras, A Francillon
ACM Asia Conference on Computer and Communications Security (ASIACCS), 437-448, 2016
702016
B@bel: Leveraging Email Delivery for Spam Mitigation
G Stringhini, M Egele, A Zarras, T Holz, C Kruegel, G Vigna
USENIX Security Symposium, 16-32, 2012
382012
Empowering Convolutional Networks for Malware Classification and Analysis
B Kolosnjaji, G Eraisha, G Webster, A Zarras, C Eckert
International Joint Conference on Neural Networks (IJCNN), 3838-3845, 2017
312017
Automated Generation of Models for Fast and Precise Detection of HTTP-Based Malware
A Zarras, A Papadogiannakis, R Gawlik, T Holz
Annual Conference on Privacy, Security and Trust (PST), 249-256, 2014
252014
Adaptive Semantics-Aware Malware Classification
B Kolosnjaji, A Zarras, T Lengyel, G Webster, C Eckert
International Conference on Detection of Intrusions and Malware …, 2016
142016
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
A Zarras, K Kohls, M Dürmuth, C Pöpper
ACM Conference on Data and Application Security and Privacy (CODASPY), 14-25, 2016
142016
k-subscription: Privacy-Preserving Microblogging Browsing Through Obfuscation
P Papadopoulos, A Papadogiannakis, M Polychronakis, A Zarras, T Holz, ...
Annual Computer Security Applications Conference (ACSAC), 49-58, 2013
142013
Towards Automated Classification of Firmware Images and Identification of Embedded Devices
A Costin, A Zarras, A Francillon
International Conference on ICT Systems Security and Privacy Protection …, 2017
132017
SKALD: A Scalable Architecture for Feature Extraction, Multi-user Analysis, and Real-Time Information Sharing
GD Webster, ZD Hanif, ALP Ludwig, TK Lengyel, A Zarras, C Eckert
Information Security Conference (ISC), 231-249, 2016
102016
The Art of False Alarms in the Game of Deception: Leveraging Fake Honeypots for Enhanced Security
A Zarras
IEEE International Carnahan Conference on Security Technology (ICCST), 1-6, 2014
92014
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage
GD Webster, B Kolosnjaji, C von Pentz, J Kirsch, ZD Hanif, A Zarras, ...
International Conference on Detection of Intrusions and Malware …, 2017
32017
Revealing the Relationship Network Behind Link Spam
A Zarras, A Papadogiannakis, S Ioannidis, T Holz
Annual Conference on Privacy, Security and Trust (PST), 101-108, 2015
32015
Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection
S Proskurin, T Lengyel, M Momeu, C Eckert, A Zarras
Annual Computer Security Applications Conference (ACSAC), 407-417, 2018
12018
Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection
S Proskurin, J Kirsch, A Zarras
International Conference on ICT Systems Security and Privacy Protection …, 2018
12018
Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks
A Zarras, F Maggi
Annual Conference on Privacy, Security and Trust (PST), 355-364, 2017
12017
Leveraging Internet Services to Evade Censorship
A Zarras
Information Security Conference (ISC), 253-270, 2016
12016
Can Today’s Machine Learning Pass Image-Based Turing Tests?
A Zarras, I Gerostathopoulos, DM Fernández
Information Security Conference (ISC), 129-148, 2019
2019
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20