Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters
Argyros, George, Stais, Ioannis, Kiayias, Aggelos, Keromytis, Angelos D.
Published in 2016 IEEE Symposium on Security and Privacy (SP) (01.05.2016)
Published in 2016 IEEE Symposium on Security and Privacy (SP) (01.05.2016)
Get full text
Conference Proceeding
Journal Article
The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information
Sivakorn, Suphannee, Polakis, Iasonas, Keromytis, Angelos D.
Published in 2016 IEEE Symposium on Security and Privacy (SP) (01.05.2016)
Published in 2016 IEEE Symposium on Security and Privacy (SP) (01.05.2016)
Get full text
Conference Proceeding
Journal Article
Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization
Pappas, V., Polychronakis, M., Keromytis, A. D.
Published in 2012 IEEE Symposium on Security and Privacy (01.05.2012)
Published in 2012 IEEE Symposium on Security and Privacy (01.05.2012)
Get full text
Conference Proceeding
An efficient and easily deployable method for dealing with DoS in SIP services
Tsiatsikas, Zisis, Geneiatakis, Dimitris, Kambourakis, Georgios, Keromytis, Angelos D.
Published in Computer communications (15.02.2015)
Published in Computer communications (15.02.2015)
Get full text
Journal Article
I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs
Sivakorn, Suphannee, Polakis, Iasonas, Keromytis, Angelos D.
Published in 2016 IEEE European Symposium on Security and Privacy (EuroS and P) (01.03.2016)
Published in 2016 IEEE European Symposium on Security and Privacy (EuroS and P) (01.03.2016)
Get full text
Conference Proceeding
Journal Article
Dynamic Trust Management
Blaze, M., Kannan, S., Lee, I., Sokolsky, O., Smith, J.M., Keromytis, A.D., Lee, W.
Published in Computer (Long Beach, Calif.) (01.02.2009)
Published in Computer (Long Beach, Calif.) (01.02.2009)
Get full text
Journal Article
On the General Applicability of Instruction-Set Randomization
Boyd, S W, Kc, G S, Locasto, M E, Keromytis, A D, Prevelakis, V
Published in IEEE transactions on dependable and secure computing (01.07.2010)
Published in IEEE transactions on dependable and secure computing (01.07.2010)
Get full text
Journal Article
On the Feasibility of Remotely Triggered Automotive Hardware Trojans
Moschos, Athanasios, Valakuzhy, Kevin, Keromytis, Angelos D.
Published in 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) (16.11.2022)
Published in 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) (16.11.2022)
Get full text
Conference Proceeding
WebSOS: an overlay-based system for protecting web servers from denial of service attacks
Stavrou, Angelos, Cook, Debra L., Morein, William G., Keromytis, Angelos D., Misra, Vishal, Rubenstein, Dan
Published in Computer networks (Amsterdam, Netherlands : 1999) (05.08.2005)
Published in Computer networks (Amsterdam, Netherlands : 1999) (05.08.2005)
Get full text
Journal Article
A system for generating and injecting indistinguishable network decoys
Bowen, Brian M., Kemerlis, Vasileios P., Prabhu, Pratap, Keromytis, Angelos D., Stolfo, Salvatore J.
Published in Journal of computer security (01.01.2012)
Published in Journal of computer security (01.01.2012)
Get full text
Journal Article