Angelos D. Keromytis, Ph.D. - Publications

Affiliations: 
Computer Science Columbia University, New York, NY 
 2001 University of Pennsylvania, Philadelphia, PA, United States 
Area:
Security, Cryptography, Networks, Operating Systems, Distributed Systems.

128 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Mitropoulos D, Louridas P, Polychronakis M, Keromytis AD. Defending Against Web Application Attacks: Approaches, Challenges and Implications Ieee Transactions On Dependable and Secure Computing. 16: 188-203. DOI: 10.1109/Tdsc.2017.2665620  0.462
2015 Petsios T, Kemerlis VP, Polychronakis M, Keromytis AD. DynaGuard: Armoring canary-based protections against brute-force attacks Acm International Conference Proceeding Series. 7: 351-360. DOI: 10.1145/2818000.2818031  0.352
2015 Oren Y, Kemerlis VP, Sethumadhavan S, Keromytis AD. The spy in the sandbox: Practical cache attacks in JavaScript and their implications Proceedings of the Acm Conference On Computer and Communications Security. 2015: 1406-1418. DOI: 10.1145/2810103.2813708  0.324
2015 Oren Y, Keromytis AD. Attacking the internet using broadcast digital television Acm Transactions On Information and System Security. 17. DOI: 10.1145/2723159  0.451
2015 Tsiatsikas Z, Geneiatakis D, Kambourakis G, Keromytis AD. An efficient and easily deployable method for dealing with DoS in SIP services Computer Communications. 57: 50-63. DOI: 10.1016/J.Comcom.2014.11.002  0.451
2015 Chakravarty S, Portokalidis G, Polychronakis M, Keromytis AD. Detection and analysis of eavesdropping in anonymous communication networks International Journal of Information Security. 14: 205-220. DOI: 10.1007/S10207-014-0256-7  0.619
2014 Polakis I, Ilia P, Maggi F, Lancini M, Kontaxis G, Zanero S, Ioannidis S, Keromytis AD. Faces in the distorting mirror: Revisiting photo-based social authentication Proceedings of the Acm Conference On Computer and Communications Security. 501-512. DOI: 10.1145/2660267.2660317  0.558
2014 Pappas V, Krell F, Vo B, Kolesnikov V, Malkin T, Choi SG, George W, Keromytis A, Bellovin S. Blind seer: A scalable private DBMS Proceedings - Ieee Symposium On Security and Privacy. 359-374. DOI: 10.1109/SP.2014.30  0.568
2014 Pappas V, Polychronakis M, Keromytis AD. Dynamic reconstruction of relocation information for stripped binaries Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8688: 68-87. DOI: 10.1007/978-3-319-11379-1_4  0.61
2014 Chakravarty S, Barbera MV, Portokalidis G, Polychronakis M, Keromytis AD. On the effectiveness of traffic analysis against anonymity networks using flow records Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8362: 247-257. DOI: 10.1007/978-3-319-04918-2_24  0.305
2014 Kontaxis G, Polychronakis M, Keromytis AD. Computational decoys for cloud security Secure Cloud Computing. 2147483647: 261-270. DOI: 10.1007/978-1-4614-9278-8_12  0.319
2013 Chun SA, Warner J, Keromytis AD. Privacy policy-driven mashups International Journal of Business Continuity and Risk Management. 4: 344-370. DOI: 10.1504/Ijbcrm.2013.058989  0.393
2013 Tsiatsikas Z, Geneiatakis D, Kambourakis G, Keromytis AD. A privacy-preserving entropy-driven framework for tracing DoS attacks in VoIP Proceedings - 2013 International Conference On Availability, Reliability and Security, Ares 2013. 224-229. DOI: 10.1109/ARES.2013.30  0.363
2013 Pappas V, Kemerlis VP, Zavou A, Polychronakis M, Keromytis AD. CloudFence: Data flow tracking as a cloud service Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8145: 411-431. DOI: 10.1007/978-3-642-41284-4_21  0.798
2013 Barbera MV, Kemerlis VP, Pappas V, Keromytis AD. CellFlood: Attacking tor onion routers on the cheap Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8134: 664-681. DOI: 10.1007/978-3-642-40203-6_37  0.671
2013 Zavou A, Pappas V, Kemerlis VP, Polychronakis M, Portokalidis G, Keromytis AD. Cloudopsy: An autopsy of data flows in the cloud Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8030: 366-375. DOI: 10.1007/978-3-642-39345-7-39  0.797
2012 Bowen BM, Kemerlis VP, Prabhu P, Keromytis AD, Stolfo SJ. A system for generating and injecting indistinguishable network decoys Journal of Computer Security. 20: 199-221. DOI: 10.3233/Jcs-2011-0439  0.432
2012 Polakis I, Lancini M, Kontaxis G, Maggi F, Ioannidis S, Keromytis AD, Zanero S. All your face are belong to us: Breaking Facebook's social authentication Acm International Conference Proceeding Series. 399-408. DOI: 10.1145/2420950.2421008  0.565
2012 Zavou A, Portokalidis G, Keromytis AD. Self-healing multitier architectures using cascading rescue points Acm International Conference Proceeding Series. 379-388. DOI: 10.1145/2420950.2421005  0.811
2012 Geneiatakis D, Portokalidis G, Kemerlis VP, Keromytis AD. Adaptive defenses for commodity software through virtual application partitioning Proceedings of the Acm Conference On Computer and Communications Security. 133-144. DOI: 10.1145/2382196.2382214  0.381
2012 Zavou A, Athanasopoulos E, Portokalidis G, Keromytis AD. Exploiting split browsers for efficiently protecting user data Proceedings of the Acm Conference On Computer and Communications Security. 37-42. DOI: 10.1145/2381913.2381921  0.802
2012 Keromytis AD. A comprehensive survey of voice over IP security research Ieee Communications Surveys and Tutorials. 14: 514-537. DOI: 10.1109/Surv.2011.031611.00112  0.416
2012 Stolfo SJ, Salem MB, Keromytis AD. Fog computing: Mitigating insider data theft attacks in the cloud Proceedings - Ieee Cs Security and Privacy Workshops, Spw 2012. 125-128. DOI: 10.1109/SPW.2012.19  0.34
2012 Pappas V, Polychronakis M, Keromytis AD. Smashing the gadgets: Hindering return-oriented programming using in-place code randomization Proceedings - Ieee Symposium On Security and Privacy. 601-615. DOI: 10.1109/SP.2012.41  0.593
2012 Keromytis AD, Geambasu R, Sethumadhavan S, Stolfo SJ, Yang J, Benameur A, Dacier M, Elder M, Kienzle D, Stavrou A. The MEERKATS cloud security architecture Proceedings - 32nd Ieee International Conference On Distributed Computing Systems Workshops, Icdcsw 2012. 446-450. DOI: 10.1109/ICDCSW.2012.42  0.303
2012 Gessiou E, Pappas V, Athanasopoulos E, Keromytis AD, Ioannidis S. Towards a universal data provenance framework using dynamic instrumentation Ifip Advances in Information and Communication Technology. 376: 103-114. DOI: 10.1007/978-3-642-30436-1_9  0.724
2011 Diament T, Lee HK, Keromytis AD, Yung M. The efficient dual receiver cryptosystem and its applications International Journal of Network Security. 13: 135-151. DOI: 10.7916/D81R7100  0.441
2011 Keromytis AD, Stolfo SJ, Yang J, Stavrou A, Ghosh A, Engler D, Dacier M, Elder M, Kienzle D. The MINESTRONE architecture combining static and dynamic analysis techniques for software security Proceedings - 1st Syssec Workshop, Syssec 2011. 53-56. DOI: 10.1109/SysSec.2011.33  0.305
2011 Geneiatakis D, Portokalidis G, Keromytis AD. A multilayer overlay network architecture for enhancing IP services availability against DoS Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7093: 322-336. DOI: 10.1007/978-3-642-25560-1_22  0.377
2011 Zavou A, Portokalidis G, Keromytis AD. Taint-exchange: A generic system for cross-process and cross-host taint tracking Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7038: 113-128. DOI: 10.1007/978-3-642-25141-2_8  0.785
2011 Jee K, Sidiroglou-Douskos S, Stavrou A, Keromytis A. An adversarial evaluation of network signaling and control mechanisms Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6829: 252-265. DOI: 10.1007/978-3-642-24209-0_17  0.306
2011 Pappas V, Bowen BM, Keromytis AD. Evaluation of a spyware detection system using thin client computing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6829: 222-232. DOI: 10.1007/978-3-642-24209-0_15  0.556
2011 Chakravarty S, Portokalidis G, Polychronakis M, Keromytis AD. Detecting traffic snooping in tor using decoys Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6961: 222-241. DOI: 10.1007/978-3-642-23644-0_12  0.334
2011 Pappas V, Keromytis AD. Measuring the deployment hiccups of DNSSEC Communications in Computer and Information Science. 192: 44-53. DOI: 10.1007/978-3-642-22720-2_5  0.638
2011 Alicherry M, Keromytis AD. Misuse detection in consent-based networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6715: 38-56. DOI: 10.1007/978-3-642-21554-4_3  0.747
2011 O'Sullivan P, Anand K, Kotha A, Smithson M, Barua R, Keromytis AD. Retrofitting security in COTS software with binary rewriting Ifip Advances in Information and Communication Technology. 354: 154-172. DOI: 10.1007/978-3-642-21424-0_13  0.333
2011 Pappas V, Bowen BM, Keromytis AD. Crimeware swindling without virtual machines Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6531: 196-202. DOI: 10.1007/978-3-642-18178-8-17  0.517
2010 Keromytis AD. A Look at VoIP Vulnerabilities Log In. 35: 41-50. DOI: 10.7916/D8G73Q86  0.409
2010 Turner DM, Prevelakis V, Keromytis AD. A market-based bandwidth charging framework Acm Transactions On Internet Technology. 10. DOI: 10.1145/1667067.1667068  0.337
2010 Boyd SW, Kc GS, Locasto ME, Keromytis AD, Prevelakis V. On the general applicability of instruction-set randomization Ieee Transactions On Dependable and Secure Computing. 7: 255-270. DOI: 10.1109/Tdsc.2008.58  0.728
2010 Alicherry M, Keromytis AD. DIPLOMA: Distributed policy enforcement architecture for MANETs Proceedings - 2010 4th International Conference On Network and System Security, Nss 2010. 89-98. DOI: 10.1109/NSS.2010.27  0.759
2010 Keromytis AD. Voice-over-IP scurity: Research and practice Ieee Security and Privacy. 8: 76-78. DOI: 10.1109/MSP.2010.87  0.306
2010 Kemerlis VP, Pappas V, Portokalidis G, Keromytis AD. iLeak: A lightweight system for detecting inadvertent information leaks Proceedings - European Conference On Computer Network Defense, Ec2nd 2010. 21-28. DOI: 10.1109/EC2ND.2010.13  0.64
2010 Cova M, Leita C, Thonnard O, Keromytis A, Dacier M. Gone rogue: An analysis of rogue security software campaigns Ec2nd 2009 - European Conference On Computer Network Defense. 1-3. DOI: 10.1109/EC2ND.2009.8  0.315
2010 Song Y, Locasto ME, Stavrou A, Keromytis AD, Stolfo SJ. On the infeasibility of modeling polymorphic shellcode : Re-thinking the role of learning in intrusion detection systems Machine Learning. 81: 179-205. DOI: 10.1007/S10994-009-5143-5  0.703
2010 Alicherry M, Keromytis AD. Securing MANET multicast using DIPLOMA Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6434: 232-250. DOI: 10.1007/978-3-642-16825-3_16  0.767
2010 Bowen BM, Prabhu P, Kemerlis VP, Sidiroglou S, Keromytis AD, Stolfo SJ. BotSwindler: Tamper resistant injection of believable decoys in VM-based hosts for crimeware detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 118-137. DOI: 10.1007/978-3-642-15512-3_7  0.698
2009 Blaze M, Ioannidis J, Keromytis AD, Malkin T, Rubin A. Anonymity in wireless broadcast networks International Journal of Network Security. 8: 37-51. DOI: 10.7916/D8183H1W  0.42
2009 Kim HC, Keromytis A. On the deployment of dynamic taint analysis for application communities Ieice Transactions On Information and Systems. 548-551. DOI: 10.1587/Transinf.E92.D.548  0.34
2009 Sidiroglou S, Laadan O, Perez CR, Viennot N, Nieh J, Keromytis AD. ASSURE: Automatic software self-healing using REscue points Acm Sigplan Notices. 44: 37-48. DOI: 10.1145/1508244.1508250  0.704
2009 Keromytis AD. Randomized instruction sets and runtime environments past research and future directions Ieee Security and Privacy. 7: 18-25. DOI: 10.1109/MSP.2009.15  0.315
2009 Blaze M, Kannan S, Lee I, Sokolsky O, Smith JM, Keromytis AD, Lee W. Dynamic trust management Computer. 42: 44-52. DOI: 10.1109/Mc.2009.51  0.54
2009 Alicherry M, Keromytis AD. Double check: Multi-path verification against man-in-the-middle attacks Proceedings - Ieee Symposium On Computers and Communications. 557-563. DOI: 10.1109/ISCC.2009.5202224  0.757
2009 Alicherry M, Keromytis AD, Stavrou A. Evaluating a collaborative defense architecture for MANETs 2009 Ieee International Conference On Internet Multimedia Services Architecture and Applications, Imsaa 2009. DOI: 10.1109/IMSAA.2009.5439498  0.764
2009 Cook DL, Yung M, Keromytis AD. Elastic block ciphers: Method, security and instantiations International Journal of Information Security. 8: 211-231. DOI: 10.1007/S10207-008-0075-9  0.62
2009 Alicherry M, Keromytis AD, Stavrou A. Deny-by-default distributed security policy enforcement in mobile ad hoc networks Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 19: 41-50. DOI: 10.1007/978-3-642-05284-2_3  0.746
2009 Burnside M, Keromytis AD. F3ildCrypt: End-to-end protection of sensitive information in web services Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5735: 491-506. DOI: 10.1007/978-3-642-04474-8_38  0.364
2009 Cook DL, Yung M, Keromytis A. Constructing variable-Length PRPs and SPRPs from fixed-length PRPs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5487: 157-180. DOI: 10.1007/978-3-642-01440-6_14  0.487
2009 Antonatos S, Locasto M, Sidiroglou S, Keromytis AD, Markatos E. Defending against next generation through network/endpoint collaboration and interaction Lecture Notes in Electrical Engineering. 30: 131-141. DOI: 10.1007/978-0-387-85555-4_9  0.712
2009 Cook DL, Yung M, Keromytis AD. Elastic block ciphers in practice: Constructions and modes of encryption Lecture Notes in Electrical Engineering. 30: 69-91. DOI: 10.1007/978-0-387-85555-4_5  0.51
2009 Sidiroglou S, Laadan O, Perez CR, Viennot N, Nieh J, Keromytis AD. ASSURE: Automatic software self-healing using REscue points Acm Sigplan Notices. 44: 37-48.  0.742
2008 Miltchev S, Smith JM, Prevelakis V, Keromytis A, Ioannidis S. Decentralized access control in distributed file systems Acm Computing Surveys. 40. DOI: 10.1145/1380584.1380588  0.68
2008 Cretu GF, Stavrou A, Locasto ME, Stolfo SJ, Keromytis AD. Casting out demons: Sanitizing training data for anomaly sensors Proceedings - Ieee Symposium On Security and Privacy. 81-95. DOI: 10.1109/SP.2008.11  0.612
2008 Locasto ME, Burnside M, Keromytis AD. Online network forensics for automatic repair validation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5312: 136-151. DOI: 10.1007/978-3-540-89598-5-9  0.701
2008 Locasto ME, Stavrou A, Cretu GF, Keromytis AD, Stolfo SJ. Return value predictability profiles for self-healing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5312: 152-166. DOI: 10.1007/978-3-540-89598-5-10  0.671
2008 Burnside M, Keromytis AD. Path-based access control for enterprise networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5222: 191-203. DOI: 10.1007/978-3-540-85886-7_13  0.316
2008 Cook DL, Yung M, Keromytis AD. Methods for linear and differential cryptanalysis of elastic block ciphers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5107: 187-202. DOI: 10.1007/978-3-540-70500-0-14  0.543
2008 Stavrou A, Locasto ME, Keromytis AD. Pushback for overlay networks: Protecting against malicious insiders Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5037: 39-54. DOI: 10.1007/978-3-540-68914-0_3  0.723
2007 Ioannidis S, Bellovin SM, Ioannidis J, Keromytis AD, Anagnostakis K, Smith JM. Virtual private services: Coordinated policy enforcement for distributed applications International Journal of Network Security. 4: 69-80. DOI: 10.6633/Ijns.200701.4(1).08  0.703
2007 Locasto ME, Stavrou A, Keromytis AD. Dark application communities Proceedings New Security Paradigms Workshop. 11-18. DOI: 10.1145/1278940.1278943  0.629
2007 Keromytis AD, Smith JM. Requirements for scalable access control and security management architectures Acm Transactions On Internet Technology. 7. DOI: 10.1145/1239971.1239972  0.615
2007 Sidiroglou S, Laadan O, Keromytis AD, Nieh J. Using rescue points to navigate software recovery (short paper) Proceedings - Ieee Symposium On Security and Privacy. 273-278. DOI: 10.1109/SP.2007.38  0.716
2007 Sidiroglou S, Stavrou A, Keromytis AD. Mediated overlay services (MOSES): Network security as a composable service 2007 Ieee Sarnoff Symposium, Sarnoff. DOI: 10.1109/SARNOF.2007.4567338  0.748
2007 Aviv AJ, Locasto ME, Potter S, Keromytis AD. SSARES: Secure Searchable Automated Remote Email Storage Proceedings - Annual Computer Security Applications Conference, Acsac. 129-138. DOI: 10.1109/ACSAC.2007.30  0.815
2007 Anagnostakis KG, Greenwald MB, Ioannidis S, Keromytis AD. COVERAGE: Detecting and reacting to worm epidemics using cooperation and validation International Journal of Information Security. 6: 361-378. DOI: 10.1007/S10207-007-0032-Z  0.602
2007 Cook DL, Yung M, Keromytis AD. The security of elastic block ciphers against key-recovery attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4779: 89-103.  0.59
2007 Sidiroglou S, Keromytis AD. Composite Hybrid Techniques For Defending Against Targeted Attacks Advances in Information Security. 27: 213-229.  0.695
2007 Li WJ, Stolfo S, Stavrou A, Androulaki E, Keromytis AD. A study of malcode-bearing documents Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4579: 231-250.  0.323
2006 Keromytis AD, Wright JL, De Raadt T, Burnside M. Cryptography as an operating system service: A case study Acm Transactions On Computer Systems. 24: 1-38. DOI: 10.1145/1124153.1124154  0.428
2006 Sidiroglou S, Keromytis AD. Execution transactions for defending against software failures: Use and evaluation International Journal of Information Security. 5: 77-91. DOI: 10.1007/S10207-006-0083-6  0.791
2006 Locasto ME, Wang K, Keromytis AD, Stolfo SJ. FLIPS: Hybrid adaptive intrusion prevention Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3858: 82-101. DOI: 10.1007/11663812_5  0.72
2006 Benny W, Locasto ME, Keromytis AD. PalProtect: A collaborative security approach to comment spam Proceedings of the 2006 Ieee Workshop On Information Assurance. 2006: 170-175.  0.719
2006 Cook DL, Keromytis AD. CryptoGraphics: Exploiting graphics cards for security Advances in Information Security. 20: 1-136.  0.582
2006 Locasto ME, Sidiroglou S, Keromytis AD. Speculative virtual verification: Policy-constrained speculative execution Proceedings New Security Paradigms Workshop. 2006: 119-124.  0.808
2006 Anagnostakis K, Ioannidis S, Keromytis AD, Greenwald MB. Robust reactions to potential day-zero worms through cooperation and validation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4176: 427-442.  0.56
2005 Burnside M, Keromytis AD. The case for crypto protocol awareness inside the OS kernel Acm Sigarch Computer Architecture News. 33: 58-64. DOI: 10.1145/1055626.1055635  0.467
2005 Sidiroglou S, Locasto ME, Keromytis AD. Hardware support for self-healing software services Acm Sigarch Computer Architecture News. 33: 42-47. DOI: 10.1145/1055626.1055633  0.718
2005 Sidiroglou S, Keromytis AD. Countering network worms through automatic patch generation Ieee Security and Privacy. 3: 41-49. DOI: 10.1109/MSP.2005.144  0.739
2005 Kamra A, Feng H, Misra V, Keromytis AD. The effect of DNS delays on worm propagation in an IPv6 Internet Proceedings - Ieee Infocom. 4: 2405-2414. DOI: 10.1109/INFCOM.2005.1498526  0.31
2005 Locasto ME, Parekh JJ, Keromytis AD, Stolfo SJ. Towards collaborative security and P2P intrusion detection Proceedings From the 6th Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc 2005. 2005: 333-339. DOI: 10.1109/IAW.2005.1495971  0.693
2005 Foley S, Singer A, Locasto ME, Sidiroglou S, Keromytis AD, McDermott J, Thorpe J, Van Oorschot P, Somayaji A, Ford R, Bush M, Boulatov A. Highlights from the 2005 new security paradigms workshop Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 393-394. DOI: 10.1109/CSAC.2005.29  0.784
2005 Kc GS, Keromytis AD. e-NeXSh: Achieving an effectively non-executable stack and heap via system-call policing Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 286-300. DOI: 10.1109/CSAC.2005.22  0.302
2005 Stavrou A, Cook DL, Morein WG, Keromytis AD, Misra V, Rubenstein D. WebSOS: An overlay-based system for protecting web servers from denial of service attacks Computer Networks. 48: 781-807. DOI: 10.1016/J.Comnet.2005.01.005  0.666
2005 Chou ST, Stavrou A, Ioannidis J, Keromytis AD. gore: Routing-assisted defense against DDoS attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3650: 179-193.  0.388
2005 Sidiroglou S, Giovanidis G, Keromytis AD. A dynamic mechanism for recovering from buffer overflow attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3650: 1-15.  0.777
2005 Cook DL, Baratto R, Keromytis AD. Remotely keyed cryptographics secure remote display access using (mostly) untrusted hardware Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3783: 363-375.  0.649
2005 Cook DL, Keromytis AD. Conversion and proxy functions for symmetric key ciphers International Conference On Information Technology: Coding and Computing, Itcc. 1: 662-667.  0.58
2005 Sidiroglou S, Ioannidis J, Keromytis AD, Stolfo SJ. An email worm vaccine architecture Lecture Notes in Computer Science. 3439: 97-108.  0.685
2005 Cook DL, Ioannidis J, Keromytis AD, Luck J. CryptoGraphics: Secret key cryptography using graphics cards Lecture Notes in Computer Science. 3376: 334-350.  0.581
2004 Aiello W, Bellovin SM, Blaze M, Canetti R, Ioannidis J, Keromytis AD, Reingold O. Just fast keying: Key agreement in a hostile internet Acm Transactions On Information and System Security. 7: 242-273. DOI: 10.1145/996943.996946  0.451
2004 Keromytis AD. "Patch on demand" Saves even more time? Computer. 37: 94-96. DOI: 10.1109/Mc.2004.71  0.399
2004 Keromytis AD, Misra V, Rubenstein D. SOS: An architecture for mitigating DDoS attacks Ieee Journal On Selected Areas in Communications. 22: 176-188. DOI: 10.1109/Jsac.2003.818807  0.49
2004 Locasto ME, Keromytis AD. CamouflageFS: Increasing the effective key length in cryptographic filesystems on the cheap Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3089: 1-15.  0.724
2004 Stavrou A, Ioannidis J, Keromytis AD, Misra V, Rubenstein D. A pay-per-use DoS protection mechanism for the web Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3089: 120-134.  0.359
2003 Ioannidis S, Bellovin SM, Ioannidis J, Keromytis AD, Smith JM. Design and implementation of virtual private services Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2003: 269-274. DOI: 10.1109/ENABL.2003.1231419  0.697
2003 Sidiroglou S, Keromytis AD. A network worm vaccine architecture Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2003: 220-225. DOI: 10.1109/ENABL.2003.1231411  0.758
2003 Levine A, Prevelakis V, Ioannidis J, Ioannidis S, Keromytis AD. WebDAVA: An administrator-free approach to Web file-sharing Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2003: 59-64. DOI: 10.1109/ENABL.2003.1231383  0.616
2003 Keromytis AD, Ioannidis S, Greenwald MB, Smith JM. The STRONGMAN architecture Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 1: 178-188. DOI: 10.1109/DISCEX.2003.1194883  0.634
2003 Prevelakis V, Keromytis AD. Drop‐in security for distributed and portable computing elements Internet Research. 13: 107-115. DOI: 10.1108/10662240310469763  0.494
2003 Hicks M, Keromytis AD, Smith JM. A secure PLAN Ieee Transactions On Systems, Man and Cybernetics Part C: Applications and Reviews. 33: 413-426. DOI: 10.1007/978-3-540-48507-0_28  0.633
2003 Blaze M, Ioannidis J, Ioannidis S, Keromytis AD, Nikander P, Prevelakis V. TAPI: Transactions for accessing public infrastructure Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2775: 90-100. DOI: 10.1007/978-3-540-39867-7_8  0.625
2003 Anagnostakis KG, Greenwald MB, Ioannidis S, Keromytis AD, Li D. A cooperative immunization system for an untrusting internet Ieee International Conference On Networks, Icon. 403-408.  0.563
2003 Burnside M, Keromytis AD. Accelerating application-level security protocols Ieee International Conference On Networks, Icon. 313-318.  0.325
2003 Loannidis J, Loannidis S, Keromytis AD, Prevelakis V. Fileteller: Paying and getting paid for file storage Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2357: 282-299.  0.359
2003 Cook DL, Morein WG, Keromytis AD, Misra V, Rubenstein D. WebSOS: Protecting web servers from DDoS attacks Ieee International Conference On Networks, Icon. 461-466.  0.637
2002 Keromytis AD, Misra V, Rubenstein D. SOS: Secure overlay services Computer Communication Review. 32: 61-72. DOI: 10.1145/964725.633032  0.382
2002 Keromytis AD, Misra V, Rubenstein D. Using overlays to improve network security Proceedings of Spie - the International Society For Optical Engineering. 4868: 245-254. DOI: 10.1117/12.475275  0.344
2002 Ioannidis S, Anagnostakis KG, Ioannidis J, Keromytis AD. XPF: Packet filtering for low-cost network monitoring Ieee International Conference On High Performance Switching and Routing, Hpsr. 116-120. DOI: 10.1109/HPSR.2002.1024219  0.584
2002 Hicks M, Keromytis AD, Smith JM. A secure PLAN (extended version) Proceedings - Darpa Active Networks Conference and Exposition, Dance 2002. 224-237. DOI: 10.1109/DANCE.2002.1003496  0.595
2002 Aiello W, Bellovin SM, Blaze M, Canetti R, Ioannidis J, Keromytis AD, Reingold O. Efficient, DoS-resistant, secure key exchange for internet protocols Proceedings of the Acm Conference On Computer and Communications Security. 48-58. DOI: 10.1007/3-540-45807-7_5  0.333
2002 Aiello W, Bellovin SM, Blaze M, Canetti R, Ioannidis J, Keromytis AD, Reingold O. Efficient, DoS-resistant, secure key exchange for internet protocols Proceedings of the Acm Conference On Computer and Communications Security. 48-58.  0.333
2001 Alexander DS, Menage PB, Keromytis AD, Arbaugh WA, Anagnostakis KG, Smith JM. The price of safety in an active network Journal of Communications and Networks. 3: 4-18. DOI: 10.1109/Jcn.2001.6596875  0.615
2000 Alexander DS, Arbaugh WA, Keromytis AD, Muir S, Smith JM. Secure quality of service handling: SQoSH Ieee Communications Magazine. 38: 106-112. DOI: 10.1109/35.833566  0.632
2000 Anagnostakis KG, Hicks MW, Ioannidis S, Keromytis AD, Smith JM. Scalable resource control in active networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1942: 343-357. DOI: 10.1007/3-540-40057-5_25  0.679
2000 Ioannidis S, Keromytis AD, Bellovin SM, Smith JM. Implementing a distributed firewall Proceedings of the Acm Conference On Computer and Communications Security. 190-199.  0.611
1998 Alexander DS, Arbaugh WA, Keromytis AD, Smith JM. A secure active network environment architecture: Realization in SwitchWare Ieee Network. 12: 37-45. DOI: 10.1109/65.690960  0.595
1998 Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM. The switchware active network architecture Ieee Network. 12: 29-36. DOI: 10.1109/65.690959  0.605
1998 Alexander DS, Arbaugh WA, Keromytis AD, Smith JM. Safety and security of programmable network infrastructures Ieee Communications Magazine. 36: 84-92. DOI: 10.1109/35.722141  0.644
Show low-probability matches.