Georgios Portokalidis
Georgios Portokalidis
Email verificata su stevens.edu - Home page
TitoloCitata daAnno
Paranoid Android: versatile protection for smartphones
G Portokalidis, P Homburg, K Anagnostakis, H Bos
Proceedings of the 26th annual computer security applications conference …, 2010
4582010
Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation
G Portokalidis, A Slowinska, H Bos
ACM SIGOPS Operating Systems Review 40 (4), 15-27, 2006
3902006
Out of control: Overcoming control-flow integrity
E Göktas, E Athanasopoulos, H Bos, G Portokalidis
2014 ieee symposium on security and privacy, 575-589, 2014
3452014
libdft: Practical dynamic data flow tracking for commodity systems
VP Kemerlis, G Portokalidis, K Jee, AD Keromytis
Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012
1702012
Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard
E Göktaş, E Athanasopoulos, M Polychronakis, H Bos, G Portokalidis
23rd {USENIX} Security Symposium ({USENIX} Security 14), 417-432, 2014
1572014
FFPF: Fairly Fast Packet Filters.
H Bos, W De Bruijn, ML Cristea, T Nguyen, G Portokalidis
OSDI 4, 24-24, 2004
1182004
kGuard: lightweight kernel protection against return-to-user attacks
VP Kemerlis, G Portokalidis, AD Keromytis
21st {USENIX} Security Symposium ({USENIX} Security 12), 459-474, 2012
962012
SweetBait: Zero-hour worm detection and containment using low-and high-interaction honeypots
G Portokalidis, H Bos
Computer Networks 51 (5), 1256-1274, 2007
802007
Fast and practical instruction-set randomization for commodity systems
G Portokalidis, AD Keromytis
Proceedings of the 26th Annual Computer Security Applications Conference, 41-48, 2010
772010
On the effectiveness of traffic analysis against anonymity networks using flow records
S Chakravarty, MV Barbera, G Portokalidis, M Polychronakis, ...
International conference on passive and active network measurement, 247-257, 2014
722014
Undermining information hiding (and what to do about it)
E Göktaş, R Gawlik, B Kollenda, E Athanasopoulos, G Portokalidis, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 105-119, 2016
622016
ShadowReplica: efficient parallelization of dynamic data flow tracking
K Jee, VP Kemerlis, AD Keromytis, G Portokalidis
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
532013
Sauth: Protecting user accounts from password database leaks
G Kontaxis, E Athanasopoulos, G Portokalidis, AD Keromytis
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
512013
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.
K Jee, G Portokalidis, VP Kemerlis, S Ghosh, DI August, AD Keromytis
NDSS, 2012
492012
Privacy-preserving social plugins
G Kontaxis, M Polychronakis, AD Keromytis, EP Markatos
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
482012
Shrinkwrap: Vtable protection without loose ends
I Haller, E Göktaş, E Athanasopoulos, G Portokalidis, H Bos
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
422015
The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones
D Damopoulos, G Kambourakis, G Portokalidis
Proceedings of the seventh european workshop on system security, 1-6, 2014
402014
The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines.
M Athanasakis, E Athanasopoulos, M Polychronakis, G Portokalidis, ...
NDSS, 2015
392015
Taint-exchange: a generic system for cross-process and cross-host taint tracking
A Zavou, G Portokalidis, AD Keromytis
International Workshop on Security, 113-128, 2011
362011
Detecting traffic snooping in tor using decoys
S Chakravarty, G Portokalidis, M Polychronakis, AD Keromytis
International Workshop on Recent Advances in Intrusion Detection, 222-241, 2011
312011
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20