Stylianos Sidiroglou, Ph.D. - Publications

Affiliations: 
2008 Columbia University, New York, NY 
Area:
Computer Science

15 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2010 Bowen BM, Prabhu P, Kemerlis VP, Sidiroglou S, Keromytis AD, Stolfo SJ. BotSwindler: Tamper resistant injection of believable decoys in VM-based hosts for crimeware detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 118-137. DOI: 10.1007/978-3-642-15512-3_7  0.438
2009 Perkins JH, Kim S, Larsen S, Amarasinghe S, Bachrach J, Carbin M, Pacheco C, Sherwood F, Sidiroglou S, Sullivan G, Wong WF, Zibin Y, Ernst MD, Rinard M. Automatically patching errors in deployed software Sosp'09 - Proceedings of the 22nd Acm Sigops Symposium On Operating Systems Principles. 87-102. DOI: 10.1145/1629575.1629585  0.309
2009 Sidiroglou S, Laadan O, Perez CR, Viennot N, Nieh J, Keromytis AD. ASSURE: Automatic software self-healing using REscue points Acm Sigplan Notices. 44: 37-48. DOI: 10.1145/1508244.1508250  0.477
2009 Antonatos S, Locasto M, Sidiroglou S, Keromytis AD, Markatos E. Defending against next generation through network/endpoint collaboration and interaction Lecture Notes in Electrical Engineering. 30: 131-141. DOI: 10.1007/978-0-387-85555-4_9  0.44
2009 Sidiroglou S, Laadan O, Perez CR, Viennot N, Nieh J, Keromytis AD. ASSURE: Automatic software self-healing using REscue points Acm Sigplan Notices. 44: 37-48.  0.55
2007 Sidiroglou S, Laadan O, Keromytis AD, Nieh J. Using rescue points to navigate software recovery (short paper) Proceedings - Ieee Symposium On Security and Privacy. 273-278. DOI: 10.1109/SP.2007.38  0.506
2007 Sidiroglou S, Stavrou A, Keromytis AD. Mediated overlay services (MOSES): Network security as a composable service 2007 Ieee Sarnoff Symposium, Sarnoff. DOI: 10.1109/SARNOF.2007.4567338  0.465
2007 Sidiroglou S, Keromytis AD. Composite Hybrid Techniques For Defending Against Targeted Attacks Advances in Information Security. 27: 213-229.  0.447
2006 Sidiroglou S, Keromytis AD. Execution transactions for defending against software failures: Use and evaluation International Journal of Information Security. 5: 77-91. DOI: 10.1007/S10207-006-0083-6  0.595
2006 Locasto ME, Sidiroglou S, Keromytis AD. Speculative virtual verification: Policy-constrained speculative execution Proceedings New Security Paradigms Workshop. 2006: 119-124.  0.645
2005 Sidiroglou S, Keromytis AD. Countering network worms through automatic patch generation Ieee Security and Privacy. 3: 41-49. DOI: 10.1109/MSP.2005.144  0.522
2005 Foley S, Singer A, Locasto ME, Sidiroglou S, Keromytis AD, McDermott J, Thorpe J, Van Oorschot P, Somayaji A, Ford R, Bush M, Boulatov A. Highlights from the 2005 new security paradigms workshop Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 393-394. DOI: 10.1109/CSAC.2005.29  0.625
2005 Sidiroglou S, Giovanidis G, Keromytis AD. A dynamic mechanism for recovering from buffer overflow attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3650: 1-15.  0.589
2005 Sidiroglou S, Ioannidis J, Keromytis AD, Stolfo SJ. An email worm vaccine architecture Lecture Notes in Computer Science. 3439: 97-108.  0.435
2003 Sidiroglou S, Keromytis AD. A network worm vaccine architecture Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2003: 220-225. DOI: 10.1109/ENABL.2003.1231411  0.567
Show low-probability matches.