Year |
Citation |
Score |
2010 |
Bowen BM, Prabhu P, Kemerlis VP, Sidiroglou S, Keromytis AD, Stolfo SJ. BotSwindler: Tamper resistant injection of believable decoys in VM-based hosts for crimeware detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 118-137. DOI: 10.1007/978-3-642-15512-3_7 |
0.438 |
|
2009 |
Perkins JH, Kim S, Larsen S, Amarasinghe S, Bachrach J, Carbin M, Pacheco C, Sherwood F, Sidiroglou S, Sullivan G, Wong WF, Zibin Y, Ernst MD, Rinard M. Automatically patching errors in deployed software Sosp'09 - Proceedings of the 22nd Acm Sigops Symposium On Operating Systems Principles. 87-102. DOI: 10.1145/1629575.1629585 |
0.309 |
|
2009 |
Sidiroglou S, Laadan O, Perez CR, Viennot N, Nieh J, Keromytis AD. ASSURE: Automatic software self-healing using REscue points Acm Sigplan Notices. 44: 37-48. DOI: 10.1145/1508244.1508250 |
0.477 |
|
2009 |
Antonatos S, Locasto M, Sidiroglou S, Keromytis AD, Markatos E. Defending against next generation through network/endpoint collaboration and interaction Lecture Notes in Electrical Engineering. 30: 131-141. DOI: 10.1007/978-0-387-85555-4_9 |
0.44 |
|
2009 |
Sidiroglou S, Laadan O, Perez CR, Viennot N, Nieh J, Keromytis AD. ASSURE: Automatic software self-healing using REscue points Acm Sigplan Notices. 44: 37-48. |
0.55 |
|
2007 |
Sidiroglou S, Laadan O, Keromytis AD, Nieh J. Using rescue points to navigate software recovery (short paper) Proceedings - Ieee Symposium On Security and Privacy. 273-278. DOI: 10.1109/SP.2007.38 |
0.506 |
|
2007 |
Sidiroglou S, Stavrou A, Keromytis AD. Mediated overlay services (MOSES): Network security as a composable service 2007 Ieee Sarnoff Symposium, Sarnoff. DOI: 10.1109/SARNOF.2007.4567338 |
0.465 |
|
2007 |
Sidiroglou S, Keromytis AD. Composite Hybrid Techniques For Defending Against Targeted Attacks Advances in Information Security. 27: 213-229. |
0.447 |
|
2006 |
Sidiroglou S, Keromytis AD. Execution transactions for defending against software failures: Use and evaluation International Journal of Information Security. 5: 77-91. DOI: 10.1007/S10207-006-0083-6 |
0.595 |
|
2006 |
Locasto ME, Sidiroglou S, Keromytis AD. Speculative virtual verification: Policy-constrained speculative execution Proceedings New Security Paradigms Workshop. 2006: 119-124. |
0.645 |
|
2005 |
Sidiroglou S, Keromytis AD. Countering network worms through automatic patch generation Ieee Security and Privacy. 3: 41-49. DOI: 10.1109/MSP.2005.144 |
0.522 |
|
2005 |
Foley S, Singer A, Locasto ME, Sidiroglou S, Keromytis AD, McDermott J, Thorpe J, Van Oorschot P, Somayaji A, Ford R, Bush M, Boulatov A. Highlights from the 2005 new security paradigms workshop Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 393-394. DOI: 10.1109/CSAC.2005.29 |
0.625 |
|
2005 |
Sidiroglou S, Giovanidis G, Keromytis AD. A dynamic mechanism for recovering from buffer overflow attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3650: 1-15. |
0.589 |
|
2005 |
Sidiroglou S, Ioannidis J, Keromytis AD, Stolfo SJ. An email worm vaccine architecture Lecture Notes in Computer Science. 3439: 97-108. |
0.435 |
|
2003 |
Sidiroglou S, Keromytis AD. A network worm vaccine architecture Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2003: 220-225. DOI: 10.1109/ENABL.2003.1231411 |
0.567 |
|
Show low-probability matches. |