2009 |
95 | EE | Stelios Sidiroglou,
Oren Laadan,
Carlos Perez,
Nicolas Viennot,
Jason Nieh,
Angelos D. Keromytis:
ASSURE: automatic software self-healing using rescue points.
ASPLOS 2009: 37-48 |
2008 |
94 | | Steven M. Bellovin,
Rosario Gennaro,
Angelos D. Keromytis,
Moti Yung:
Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings
ACNS 2008 |
93 | EE | Debra L. Cook,
Moti Yung,
Angelos D. Keromytis:
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers.
ACISP 2008: 187-202 |
92 | EE | Angelos Stavrou,
Michael E. Locasto,
Angelos D. Keromytis:
Pushback for Overlay Networks: Protecting Against Malicious Insiders.
ACNS 2008: 39-54 |
91 | EE | Matthew Burnside,
Angelos D. Keromytis:
Asynchronous policy evaluation and enforcement.
CSAW 2008: 45-50 |
90 | EE | Gabriela F. Cretu,
Angelos Stavrou,
Michael E. Locasto,
Salvatore J. Stolfo,
Angelos D. Keromytis:
Casting out Demons: Sanitizing Training Data for Anomaly Sensors.
IEEE Symposium on Security and Privacy 2008: 81-95 |
89 | EE | Vanessa Frías-Martínez,
Salvatore J. Stolfo,
Angelos D. Keromytis:
Behavior-Based Network Access Control: A Proof-of-Concept.
ISC 2008: 175-190 |
88 | EE | Matthew Burnside,
Angelos D. Keromytis:
Path-Based Access Control for Enterprise Networks.
ISC 2008: 191-203 |
87 | EE | Michael E. Locasto,
Matthew Burnside,
Angelos D. Keromytis:
Online Network Forensics for Automatic Repair Validation.
IWSEC 2008: 136-151 |
86 | EE | Michael E. Locasto,
Angelos Stavrou,
Gabriela F. Cretu,
Angelos D. Keromytis,
Salvatore J. Stolfo:
Return Value Predictability Profiles for Self-healing.
IWSEC 2008: 152-166 |
85 | EE | Debra L. Cook,
Moti Yung,
Angelos D. Keromytis:
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs.
Inscrypt 2008: 157-180 |
84 | EE | Matthew Burnside,
Mack Lu,
Angelos D. Keromytis:
Authentication on Untrusted Remote Hosts with Public-Key Sudo.
LISA 2008: 103-107 |
83 | EE | Stefan Miltchev,
Jonathan M. Smith,
Vassilis Prevelakis,
Angelos D. Keromytis,
Sotiris Ioannidis:
Decentralized access control in distributed file systems.
ACM Comput. Surv. 40(3): (2008) |
2007 |
82 | EE | Yingbo Song,
Michael E. Locasto,
Angelos Stavrou,
Angelos D. Keromytis,
Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode.
ACM Conference on Computer and Communications Security 2007: 541-551 |
81 | EE | Adam J. Aviv,
Michael E. Locasto,
Shaya Potter,
Angelos D. Keromytis:
SSARES: Secure Searchable Automated Remote Email Storage.
ACSAC 2007: 129-139 |
80 | EE | Debra L. Cook,
Angelos D. Keromytis,
Moti Yung:
Elastic block ciphers: the basic design.
ASIACCS 2007: 350-352 |
79 | EE | Angelos Stavrou,
David Turner,
Angelos D. Keromytis,
Vassilis Prevelakis:
Bridging the Network Reservation Gap Using Overlays.
COMSWARE 2007 |
78 | EE | Wei-Jen Li,
Salvatore J. Stolfo,
Angelos Stavrou,
Elli Androulaki,
Angelos D. Keromytis:
A Study of Malcode-Bearing Documents.
DIMVA 2007: 231-250 |
77 | EE | Stelios Sidiroglou,
Oren Laadan,
Angelos D. Keromytis,
Jason Nieh:
Using Rescue Points to Navigate Software Recovery.
IEEE Symposium on Security and Privacy 2007: 273-280 |
76 | EE | Debra L. Cook,
Moti Yung,
Angelos D. Keromytis:
The Security of Elastic Block Ciphers Against Key-Recovery Attacks.
ISC 2007: 89-103 |
75 | EE | Michael E. Locasto,
Angelos Stavrou,
Gabriela F. Cretu,
Angelos D. Keromytis:
From STEM to SEAD: Speculative Execution for Automated Defense.
USENIX Annual Technical Conference 2007: 219-232 |
74 | EE | Angelos D. Keromytis,
Jonathan M. Smith:
Requirements for scalable access control and security management architectures.
ACM Trans. Internet Techn. 7(2): (2007) |
73 | EE | Kostas G. Anagnostakis,
Michael B. Greenwald,
Sotiris Ioannidis,
Angelos D. Keromytis:
COVERAGE: detecting and reacting to worm epidemics using cooperation and validation.
Int. J. Inf. Sec. 6(6): 361-378 (2007) |
2006 |
72 | EE | Angelos Stavrou,
Michael E. Locasto,
Angelos D. Keromytis:
W3Bcrypt: Encryption as a Stylesheet.
ACNS 2006: 349-364 |
71 | EE | Matthew Burnside,
Angelos D. Keromytis:
Low Latency Anonymity with Mix Rings.
ISC 2006: 32-45 |
70 | EE | Kostas G. Anagnostakis,
Sotiris Ioannidis,
Angelos D. Keromytis,
Michael B. Greenwald:
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation.
ISC 2006: 427-442 |
69 | EE | Michael E. Locasto,
Stelios Sidiroglou,
Angelos D. Keromytis:
Software Self-Healing Using Collaborative Application Communities.
NDSS 2006 |
68 | EE | Michael E. Locasto,
Angelos Stavrou,
Angelos D. Keromytis:
Dark application communities.
NSPW 2006: 11-18 |
67 | EE | Angelos D. Keromytis,
Jason L. Wright,
Theo de Raadt,
Matthew Burnside:
Cryptography as an operating system service: A case study.
ACM Trans. Comput. Syst. 24(1): 1-38 (2006) |
66 | EE | Stelios Sidiroglou,
Angelos D. Keromytis:
Execution transactions for defending against software failures: use and evaluation.
Int. J. Inf. Sec. 5(2): 77-91 (2006) |
2005 |
65 | | Vijay Atluri,
Angelos D. Keromytis:
Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005
ACM Press 2005 |
64 | | John Ioannidis,
Angelos D. Keromytis,
Moti Yung:
Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings
ACNS 2005 |
63 | EE | Angelos Stavrou,
Angelos D. Keromytis:
Countering DoS attacks with stateless multipath overlays.
ACM Conference on Computer and Communications Security 2005: 249-259 |
62 | EE | Gaurav S. Kc,
Angelos D. Keromytis:
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing.
ACSAC 2005: 286-302 |
61 | EE | Simon N. Foley,
Abe Singer,
Michael E. Locasto,
Stelios Sidiroglou,
Angelos D. Keromytis,
John McDermott,
Julie Thorpe,
Paul C. van Oorschot,
Anil Somayaji,
Richard Ford,
Mark Bush,
Alex Boulatov:
Highlights from the 2005 New Security Paradigms Workshop.
ACSAC 2005: 393-396 |
60 | EE | Debra L. Cook,
John Ioannidis,
Angelos D. Keromytis,
Jake Luck:
CryptoGraphics: Secret Key Cryptography Using Graphics Cards.
CT-RSA 2005: 334-350 |
59 | EE | Debra L. Cook,
Ricardo A. Baratto,
Angelos D. Keromytis:
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware.
ICICS 2005: 363-375 |
58 | EE | Abhinav Kamra,
Hanhua Feng,
Vishal Misra,
Angelos D. Keromytis:
The effect of DNS delays on worm propagation in an IPv6 Internet.
INFOCOM 2005: 2405-2414 |
57 | EE | Stelios Sidiroglou,
Giannis Giovanidis,
Angelos D. Keromytis:
A Dynamic Mechanism for Recovering from Buffer Overflow Attacks.
ISC 2005: 1-15 |
56 | EE | Stephen T. Chou,
Angelos Stavrou,
John Ioannidis,
Angelos D. Keromytis:
gore: Routing-Assisted Defense Against DDoS Attacks.
ISC 2005: 179-193 |
55 | EE | David Michael Turner,
Vassilis Prevelakis,
Angelos D. Keromytis:
The Bandwidth Exchange Architecture.
ISCC 2005: 939-944 |
54 | EE | Stelios Sidiroglou,
John Ioannidis,
Angelos D. Keromytis,
Salvatore J. Stolfo:
An Email Worm Vaccine Architecture.
ISPEC 2005: 97-108 |
53 | EE | Debra L. Cook,
Angelos D. Keromytis:
Conversion and Proxy Functions for Symmetric Key Ciphers.
ITCC (1) 2005: 662-667 |
52 | EE | Angelos Stavrou,
Angelos D. Keromytis,
Jason Nieh,
Vishal Misra,
Dan Rubenstein:
MOVE: An End-to-End Solution to Network Denial of Service.
NDSS 2005 |
51 | EE | Michael E. Locasto,
Ke Wang,
Angelos D. Keromytis,
Salvatore J. Stolfo:
FLIPS: Hybrid Adaptive Intrusion Prevention.
RAID 2005: 82-101 |
50 | EE | Stelios Sidiroglou,
Michael E. Locasto,
Stephen W. Boyd,
Angelos D. Keromytis:
Building a Reactive Immune System for Software Services.
USENIX Annual Technical Conference, General Track 2005: 149-161 |
49 | EE | David Michael Turner,
Vassilis Prevelakis,
Angelos D. Keromytis:
The Bandwidth Exchange Architecture
CoRR abs/cs/0504007: (2005) |
48 | EE | Angelos Stavrou,
Debra L. Cook,
William G. Morein,
Angelos D. Keromytis,
Vishal Misra,
Dan Rubenstein:
WebSOS: an overlay-based system for protecting web servers from denial of service attacks.
Computer Networks 48(5): 781-807 (2005) |
47 | EE | Stelios Sidiroglou,
Angelos D. Keromytis:
Countering Network Worms Through Automatic Patch Generation.
IEEE Security & Privacy 3(6): 41-49 (2005) |
46 | EE | Stelios Sidiroglou,
Michael E. Locasto,
Angelos D. Keromytis:
Hardware support for self-healing software services.
SIGARCH Computer Architecture News 33(1): 42-47 (2005) |
45 | EE | Matthew Burnside,
Angelos D. Keromytis:
The case for crypto protocol awareness inside the OS kernel.
SIGARCH Computer Architecture News 33(1): 58-64 (2005) |
2004 |
44 | EE | Theodore Diament,
Homin K. Lee,
Angelos D. Keromytis,
Moti Yung:
The dual receiver cryptosystem and its applications.
ACM Conference on Computer and Communications Security 2004: 330-343 |
43 | EE | Michael E. Locasto,
Angelos D. Keromytis:
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap.
ACNS 2004: 1-15 |
42 | EE | Angelos Stavrou,
John Ioannidis,
Angelos D. Keromytis,
Vishal Misra,
Dan Rubenstein:
A Pay-per-Use DoS Protection Mechanism for the Web.
ACNS 2004: 120-134 |
41 | EE | Stephen W. Boyd,
Angelos D. Keromytis:
SQLrand: Preventing SQL Injection Attacks.
ACNS 2004: 292-302 |
40 | EE | Rakan El-Khalil,
Angelos D. Keromytis:
Hydan: Hiding Information in Program Binaries.
ICICS 2004: 187-199 |
39 | | Aleksey Kurchuk,
Angelos D. Keromytis:
Recursive Sandboxes: Extending Systrace To Empower Applications.
SEC 2004: 473-488 |
38 | EE | William Aiello,
Steven M. Bellovin,
Matt Blaze,
Ran Canetti,
John Ioannidis,
Angelos D. Keromytis,
Omer Reingold:
Just fast keying: Key agreement in a hostile internet.
ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004) |
37 | EE | Angelos D. Keromytis:
"Patch on Demand" Saves Even More Time?
IEEE Computer 37(8): 94-96 (2004) |
36 | EE | Angelos D. Keromytis,
Vishal Misra,
Dan Rubenstein:
SOS: an architecture for mitigating DDoS attacks.
IEEE Journal on Selected Areas in Communications 22(1): 176-188 (2004) |
2003 |
35 | EE | Gaurav S. Kc,
Angelos D. Keromytis,
Vassilis Prevelakis:
Countering code-injection attacks with instruction-set randomization.
ACM Conference on Computer and Communications Security 2003: 272-280 |
34 | EE | William G. Morein,
Angelos Stavrou,
Debra L. Cook,
Angelos D. Keromytis,
Vishal Misra,
Dan Rubenstein:
Using graphic turing tests to counter automated DDoS attacks against web servers.
ACM Conference on Computer and Communications Security 2003: 8-19 |
33 | EE | Angelos D. Keromytis:
Tagging Data in the Network Stack: mbuf_tags.
BSDCon 2003: 125-132 |
32 | EE | Angelos D. Keromytis,
Sotiris Ioannidis,
Michael B. Greenwald,
Jonathan M. Smith:
The STRONGMAN Architecture.
DISCEX (1) 2003: 178-188 |
31 | EE | Mark C. Benvenuto,
Angelos D. Keromytis:
EasyVPN: IPsec Remote Access Made Easy.
LISA 2003: 87-94 |
30 | EE | Matt Blaze,
John Ioannidis,
Sotiris Ioannidis,
Angelos D. Keromytis,
Pekka Nikander,
Vassilis Prevelakis:
TAPI: Transactions for Accessing Public Infrastructure.
PWC 2003: 90-100 |
29 | EE | Matt Blaze,
John Ioannidis,
Angelos D. Keromytis,
Tal Malkin,
Aviel D. Rubin:
WAR: Wireless Anonymous Routing.
Security Protocols Workshop 2003: 218-232 |
28 | EE | Stefan Miltchev,
Vassilis Prevelakis,
Sotiris Ioannidis,
John Ioannidis,
Angelos D. Keromytis,
Jonathan M. Smith:
Secure and Flexible Global File Sharing.
USENIX Annual Technical Conference, FREENIX Track 2003: 165-178 |
27 | EE | Angelos D. Keromytis,
Jason L. Wright,
Theo de Raadt:
The Design of the {OpenBSD} Cryptographic Framework.
USENIX Annual Technical Conference, General Track 2003: 181-196 |
26 | EE | Stelios Sidiroglou,
Angelos D. Keromytis:
A Network Worm Vaccine Architecture.
WETICE 2003: 220-225 |
25 | EE | Sotiris Ioannidis,
Steven M. Bellovin,
John Ioannidis,
Angelos D. Keromytis,
Jonathan M. Smith:
Design and Implementation of Virtual Private Services.
WETICE 2003: 269-274 |
24 | EE | Alexander Levine,
Vassilis Prevelakis,
John Ioannidis,
Sotiris Ioannidis,
Angelos D. Keromytis:
WebDAVA: An Administrator-Free Approach To Web File-Sharing.
WETICE 2003: 59-64 |
23 | EE | Matt Blaze,
John Ioannidis,
Angelos D. Keromytis:
Experience with the KeyNote Trust Management System: Applications and Future Directions.
iTrust 2003: 284-300 |
22 | | Michael W. Hicks,
Angelos D. Keromytis,
Jonathan M. Smith:
A secure PLAN.
IEEE Transactions on Systems, Man, and Cybernetics, Part C 33(3): 413-426 (2003) |
2002 |
21 | EE | William Aiello,
Steven M. Bellovin,
Matt Blaze,
John Ioannidis,
Omer Reingold,
Ran Canetti,
Angelos D. Keromytis:
Efficient, DoS-resistant, secure key exchange for internet protocols.
ACM Conference on Computer and Communications Security 2002: 48-58 |
20 | EE | Michael W. Hicks,
Angelos D. Keromytis,
Jonathan M. Smith:
A Secure PLAN.
DANCE 2002: 224-237 |
19 | EE | John Ioannidis,
Sotiris Ioannidis,
Angelos D. Keromytis,
Vassilis Prevelakis:
Fileteller: Paying and Getting Paid for File Storage.
Financial Cryptography 2002: 282-299 |
18 | EE | Angelos D. Keromytis,
Vishal Misra,
Dan Rubenstein:
SOS: secure overlay services.
SIGCOMM 2002: 61-72 |
17 | EE | Stefan Miltchev,
Sotiris Ioannidis,
Angelos D. Keromytis:
A Study of the Relative Costs of Network Security Protocols.
USENIX Annual Technical Conference, FREENIX Track 2002: 41-48 |
16 | EE | Matt Blaze,
John Ioannidis,
Angelos D. Keromytis:
Trust management for IPsec.
ACM Trans. Inf. Syst. Secur. 5(2): 95-118 (2002) |
2001 |
15 | EE | Matt Blaze,
John Ioannidis,
Angelos D. Keromytis:
Offline Micropayments without Trusted Hardware.
Financial Cryptography 2001: 21-40 |
14 | EE | Matt Blaze,
John Ioannidis,
Angelos D. Keromytis:
Trust Management for IPsec.
NDSS 2001 |
13 | EE | William Aiello,
Steven M. Bellovin,
Matt Blaze,
Ran Canetti,
John Ioannidis,
Angelos D. Keromytis,
Omer Reingold:
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols.
Security Protocols Workshop 2001: 27-39 |
2000 |
12 | EE | Sotiris Ioannidis,
Angelos D. Keromytis,
Steven M. Bellovin,
Jonathan M. Smith:
Implementing a distributed firewall.
ACM Conference on Computer and Communications Security 2000: 190-199 |
11 | EE | John Ioannidis,
Angelos D. Keromytis:
Network security and IPsec (tutorial).
ACM Conference on Computer and Communications Security 2000 |
10 | EE | Kostas G. Anagnostakis,
Michael W. Hicks,
Sotiris Ioannidis,
Angelos D. Keromytis,
Jonathan M. Smith:
Scalable Resource Control in Active Networks.
IWAN 2000: 343-357 |
9 | EE | Niklas Hallqvist,
Angelos D. Keromytis:
Implementing Internet Key Exchange (IKE).
USENIX Annual Technical Conference, FREENIX Track 2000: 201-214 |
8 | EE | Angelos D. Keromytis,
Jason L. Wright:
Transparent Network Security Policy Enforcement.
USENIX Annual Technical Conference, FREENIX Track 2000: 215-226 |
1999 |
7 | | Michael W. Hicks,
Angelos D. Keromytis:
A Secure Plan.
IWAN 1999: 307-314 |
6 | | Matt Blaze,
Joan Feigenbaum,
Angelos D. Keromytis:
The Role of Trust Management in Distributed Systems Security.
Secure Internet Programming 1999: 185-210 |
5 | | D. Scott Alexander,
William A. Arbaugh,
Angelos D. Keromytis,
Jonathan M. Smith:
Security in Active Networks.
Secure Internet Programming 1999: 433-451 |
4 | | Matt Blaze,
John Ioannidis,
Angelos D. Keromytis:
Trust Management and Network Layer Security Protocols.
Security Protocols Workshop 1999: 103-118 |
3 | EE | Theo de Raadt,
Niklas Hallqvist,
Artur Grabowski,
Angelos D. Keromytis,
Niels Provos:
Cryptography in OpenBSD: An Overview.
USENIX Annual Technical Conference, FREENIX Track 1999: 93-101 |
1998 |
2 | EE | William A. Arbaugh,
Angelos D. Keromytis,
David J. Farber,
Jonathan M. Smith:
Automated Recovery in a Secure Bootstrap Process.
NDSS 1998 |
1 | EE | Matt Blaze,
Joan Feigenbaum,
Angelos D. Keromytis:
KeyNote: Trust Management for Public-Key Infrastructures (Position Paper).
Security Protocols Workshop 1998: 59-63 |