2009 | ||
---|---|---|
95 | EE | Stelios Sidiroglou, Oren Laadan, Carlos Perez, Nicolas Viennot, Jason Nieh, Angelos D. Keromytis: ASSURE: automatic software self-healing using rescue points. ASPLOS 2009: 37-48 |
2008 | ||
94 | Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ACNS 2008 | |
93 | EE | Debra L. Cook, Moti Yung, Angelos D. Keromytis: Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. ACISP 2008: 187-202 |
92 | EE | Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis: Pushback for Overlay Networks: Protecting Against Malicious Insiders. ACNS 2008: 39-54 |
91 | EE | Matthew Burnside, Angelos D. Keromytis: Asynchronous policy evaluation and enforcement. CSAW 2008: 45-50 |
90 | EE | Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis: Casting out Demons: Sanitizing Training Data for Anomaly Sensors. IEEE Symposium on Security and Privacy 2008: 81-95 |
89 | EE | Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis: Behavior-Based Network Access Control: A Proof-of-Concept. ISC 2008: 175-190 |
88 | EE | Matthew Burnside, Angelos D. Keromytis: Path-Based Access Control for Enterprise Networks. ISC 2008: 191-203 |
87 | EE | Michael E. Locasto, Matthew Burnside, Angelos D. Keromytis: Online Network Forensics for Automatic Repair Validation. IWSEC 2008: 136-151 |
86 | EE | Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo: Return Value Predictability Profiles for Self-healing. IWSEC 2008: 152-166 |
85 | EE | Debra L. Cook, Moti Yung, Angelos D. Keromytis: Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. Inscrypt 2008: 157-180 |
84 | EE | Matthew Burnside, Mack Lu, Angelos D. Keromytis: Authentication on Untrusted Remote Hosts with Public-Key Sudo. LISA 2008: 103-107 |
83 | EE | Stefan Miltchev, Jonathan M. Smith, Vassilis Prevelakis, Angelos D. Keromytis, Sotiris Ioannidis: Decentralized access control in distributed file systems. ACM Comput. Surv. 40(3): (2008) |
2007 | ||
82 | EE | Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo: On the infeasibility of modeling polymorphic shellcode. ACM Conference on Computer and Communications Security 2007: 541-551 |
81 | EE | Adam J. Aviv, Michael E. Locasto, Shaya Potter, Angelos D. Keromytis: SSARES: Secure Searchable Automated Remote Email Storage. ACSAC 2007: 129-139 |
80 | EE | Debra L. Cook, Angelos D. Keromytis, Moti Yung: Elastic block ciphers: the basic design. ASIACCS 2007: 350-352 |
79 | EE | Angelos Stavrou, David Turner, Angelos D. Keromytis, Vassilis Prevelakis: Bridging the Network Reservation Gap Using Overlays. COMSWARE 2007 |
78 | EE | Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis: A Study of Malcode-Bearing Documents. DIMVA 2007: 231-250 |
77 | EE | Stelios Sidiroglou, Oren Laadan, Angelos D. Keromytis, Jason Nieh: Using Rescue Points to Navigate Software Recovery. IEEE Symposium on Security and Privacy 2007: 273-280 |
76 | EE | Debra L. Cook, Moti Yung, Angelos D. Keromytis: The Security of Elastic Block Ciphers Against Key-Recovery Attacks. ISC 2007: 89-103 |
75 | EE | Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis: From STEM to SEAD: Speculative Execution for Automated Defense. USENIX Annual Technical Conference 2007: 219-232 |
74 | EE | Angelos D. Keromytis, Jonathan M. Smith: Requirements for scalable access control and security management architectures. ACM Trans. Internet Techn. 7(2): (2007) |
73 | EE | Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis: COVERAGE: detecting and reacting to worm epidemics using cooperation and validation. Int. J. Inf. Sec. 6(6): 361-378 (2007) |
2006 | ||
72 | EE | Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis: W3Bcrypt: Encryption as a Stylesheet. ACNS 2006: 349-364 |
71 | EE | Matthew Burnside, Angelos D. Keromytis: Low Latency Anonymity with Mix Rings. ISC 2006: 32-45 |
70 | EE | Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald: Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. ISC 2006: 427-442 |
69 | EE | Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis: Software Self-Healing Using Collaborative Application Communities. NDSS 2006 |
68 | EE | Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis: Dark application communities. NSPW 2006: 11-18 |
67 | EE | Angelos D. Keromytis, Jason L. Wright, Theo de Raadt, Matthew Burnside: Cryptography as an operating system service: A case study. ACM Trans. Comput. Syst. 24(1): 1-38 (2006) |
66 | EE | Stelios Sidiroglou, Angelos D. Keromytis: Execution transactions for defending against software failures: use and evaluation. Int. J. Inf. Sec. 5(2): 77-91 (2006) |
2005 | ||
65 | Vijay Atluri, Angelos D. Keromytis: Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005 ACM Press 2005 | |
64 | John Ioannidis, Angelos D. Keromytis, Moti Yung: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings ACNS 2005 | |
63 | EE | Angelos Stavrou, Angelos D. Keromytis: Countering DoS attacks with stateless multipath overlays. ACM Conference on Computer and Communications Security 2005: 249-259 |
62 | EE | Gaurav S. Kc, Angelos D. Keromytis: e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing. ACSAC 2005: 286-302 |
61 | EE | Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov: Highlights from the 2005 New Security Paradigms Workshop. ACSAC 2005: 393-396 |
60 | EE | Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck: CryptoGraphics: Secret Key Cryptography Using Graphics Cards. CT-RSA 2005: 334-350 |
59 | EE | Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis: Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. ICICS 2005: 363-375 |
58 | EE | Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos D. Keromytis: The effect of DNS delays on worm propagation in an IPv6 Internet. INFOCOM 2005: 2405-2414 |
57 | EE | Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis: A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. ISC 2005: 1-15 |
56 | EE | Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis: gore: Routing-Assisted Defense Against DDoS Attacks. ISC 2005: 179-193 |
55 | EE | David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis: The Bandwidth Exchange Architecture. ISCC 2005: 939-944 |
54 | EE | Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo: An Email Worm Vaccine Architecture. ISPEC 2005: 97-108 |
53 | EE | Debra L. Cook, Angelos D. Keromytis: Conversion and Proxy Functions for Symmetric Key Ciphers. ITCC (1) 2005: 662-667 |
52 | EE | Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, Dan Rubenstein: MOVE: An End-to-End Solution to Network Denial of Service. NDSS 2005 |
51 | EE | Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo: FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101 |
50 | EE | Stelios Sidiroglou, Michael E. Locasto, Stephen W. Boyd, Angelos D. Keromytis: Building a Reactive Immune System for Software Services. USENIX Annual Technical Conference, General Track 2005: 149-161 |
49 | EE | David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis: The Bandwidth Exchange Architecture CoRR abs/cs/0504007: (2005) |
48 | EE | Angelos Stavrou, Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: WebSOS: an overlay-based system for protecting web servers from denial of service attacks. Computer Networks 48(5): 781-807 (2005) |
47 | EE | Stelios Sidiroglou, Angelos D. Keromytis: Countering Network Worms Through Automatic Patch Generation. IEEE Security & Privacy 3(6): 41-49 (2005) |
46 | EE | Stelios Sidiroglou, Michael E. Locasto, Angelos D. Keromytis: Hardware support for self-healing software services. SIGARCH Computer Architecture News 33(1): 42-47 (2005) |
45 | EE | Matthew Burnside, Angelos D. Keromytis: The case for crypto protocol awareness inside the OS kernel. SIGARCH Computer Architecture News 33(1): 58-64 (2005) |
2004 | ||
44 | EE | Theodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung: The dual receiver cryptosystem and its applications. ACM Conference on Computer and Communications Security 2004: 330-343 |
43 | EE | Michael E. Locasto, Angelos D. Keromytis: CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. ACNS 2004: 1-15 |
42 | EE | Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: A Pay-per-Use DoS Protection Mechanism for the Web. ACNS 2004: 120-134 |
41 | EE | Stephen W. Boyd, Angelos D. Keromytis: SQLrand: Preventing SQL Injection Attacks. ACNS 2004: 292-302 |
40 | EE | Rakan El-Khalil, Angelos D. Keromytis: Hydan: Hiding Information in Program Binaries. ICICS 2004: 187-199 |
39 | Aleksey Kurchuk, Angelos D. Keromytis: Recursive Sandboxes: Extending Systrace To Empower Applications. SEC 2004: 473-488 | |
38 | EE | William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Just fast keying: Key agreement in a hostile internet. ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004) |
37 | EE | Angelos D. Keromytis: "Patch on Demand" Saves Even More Time? IEEE Computer 37(8): 94-96 (2004) |
36 | EE | Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: SOS: an architecture for mitigating DDoS attacks. IEEE Journal on Selected Areas in Communications 22(1): 176-188 (2004) |
2003 | ||
35 | EE | Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis: Countering code-injection attacks with instruction-set randomization. ACM Conference on Computer and Communications Security 2003: 272-280 |
34 | EE | William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: Using graphic turing tests to counter automated DDoS attacks against web servers. ACM Conference on Computer and Communications Security 2003: 8-19 |
33 | EE | Angelos D. Keromytis: Tagging Data in the Network Stack: mbuf_tags. BSDCon 2003: 125-132 |
32 | EE | Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith: The STRONGMAN Architecture. DISCEX (1) 2003: 178-188 |
31 | EE | Mark C. Benvenuto, Angelos D. Keromytis: EasyVPN: IPsec Remote Access Made Easy. LISA 2003: 87-94 |
30 | EE | Matt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis: TAPI: Transactions for Accessing Public Infrastructure. PWC 2003: 90-100 |
29 | EE | Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin: WAR: Wireless Anonymous Routing. Security Protocols Workshop 2003: 218-232 |
28 | EE | Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Secure and Flexible Global File Sharing. USENIX Annual Technical Conference, FREENIX Track 2003: 165-178 |
27 | EE | Angelos D. Keromytis, Jason L. Wright, Theo de Raadt: The Design of the {OpenBSD} Cryptographic Framework. USENIX Annual Technical Conference, General Track 2003: 181-196 |
26 | EE | Stelios Sidiroglou, Angelos D. Keromytis: A Network Worm Vaccine Architecture. WETICE 2003: 220-225 |
25 | EE | Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Design and Implementation of Virtual Private Services. WETICE 2003: 269-274 |
24 | EE | Alexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis: WebDAVA: An Administrator-Free Approach To Web File-Sharing. WETICE 2003: 59-64 |
23 | EE | Matt Blaze, John Ioannidis, Angelos D. Keromytis: Experience with the KeyNote Trust Management System: Applications and Future Directions. iTrust 2003: 284-300 |
22 | Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith: A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C 33(3): 413-426 (2003) | |
2002 | ||
21 | EE | William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis: Efficient, DoS-resistant, secure key exchange for internet protocols. ACM Conference on Computer and Communications Security 2002: 48-58 |
20 | EE | Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith: A Secure PLAN. DANCE 2002: 224-237 |
19 | EE | John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Vassilis Prevelakis: Fileteller: Paying and Getting Paid for File Storage. Financial Cryptography 2002: 282-299 |
18 | EE | Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: SOS: secure overlay services. SIGCOMM 2002: 61-72 |
17 | EE | Stefan Miltchev, Sotiris Ioannidis, Angelos D. Keromytis: A Study of the Relative Costs of Network Security Protocols. USENIX Annual Technical Conference, FREENIX Track 2002: 41-48 |
16 | EE | Matt Blaze, John Ioannidis, Angelos D. Keromytis: Trust management for IPsec. ACM Trans. Inf. Syst. Secur. 5(2): 95-118 (2002) |
2001 | ||
15 | EE | Matt Blaze, John Ioannidis, Angelos D. Keromytis: Offline Micropayments without Trusted Hardware. Financial Cryptography 2001: 21-40 |
14 | EE | Matt Blaze, John Ioannidis, Angelos D. Keromytis: Trust Management for IPsec. NDSS 2001 |
13 | EE | William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. Security Protocols Workshop 2001: 27-39 |
2000 | ||
12 | EE | Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith: Implementing a distributed firewall. ACM Conference on Computer and Communications Security 2000: 190-199 |
11 | EE | John Ioannidis, Angelos D. Keromytis: Network security and IPsec (tutorial). ACM Conference on Computer and Communications Security 2000 |
10 | EE | Kostas G. Anagnostakis, Michael W. Hicks, Sotiris Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Scalable Resource Control in Active Networks. IWAN 2000: 343-357 |
9 | EE | Niklas Hallqvist, Angelos D. Keromytis: Implementing Internet Key Exchange (IKE). USENIX Annual Technical Conference, FREENIX Track 2000: 201-214 |
8 | EE | Angelos D. Keromytis, Jason L. Wright: Transparent Network Security Policy Enforcement. USENIX Annual Technical Conference, FREENIX Track 2000: 215-226 |
1999 | ||
7 | Michael W. Hicks, Angelos D. Keromytis: A Secure Plan. IWAN 1999: 307-314 | |
6 | Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis: The Role of Trust Management in Distributed Systems Security. Secure Internet Programming 1999: 185-210 | |
5 | D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith: Security in Active Networks. Secure Internet Programming 1999: 433-451 | |
4 | Matt Blaze, John Ioannidis, Angelos D. Keromytis: Trust Management and Network Layer Security Protocols. Security Protocols Workshop 1999: 103-118 | |
3 | EE | Theo de Raadt, Niklas Hallqvist, Artur Grabowski, Angelos D. Keromytis, Niels Provos: Cryptography in OpenBSD: An Overview. USENIX Annual Technical Conference, FREENIX Track 1999: 93-101 |
1998 | ||
2 | EE | William A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith: Automated Recovery in a Secure Bootstrap Process. NDSS 1998 |
1 | EE | Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis: KeyNote: Trust Management for Public-Key Infrastructures (Position Paper). Security Protocols Workshop 1998: 59-63 |