dblp.uni-trier.dewww.uni-trier.de

Angelos D. Keromytis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
95EEStelios Sidiroglou, Oren Laadan, Carlos Perez, Nicolas Viennot, Jason Nieh, Angelos D. Keromytis: ASSURE: automatic software self-healing using rescue points. ASPLOS 2009: 37-48
2008
94 Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ACNS 2008
93EEDebra L. Cook, Moti Yung, Angelos D. Keromytis: Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. ACISP 2008: 187-202
92EEAngelos Stavrou, Michael E. Locasto, Angelos D. Keromytis: Pushback for Overlay Networks: Protecting Against Malicious Insiders. ACNS 2008: 39-54
91EEMatthew Burnside, Angelos D. Keromytis: Asynchronous policy evaluation and enforcement. CSAW 2008: 45-50
90EEGabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis: Casting out Demons: Sanitizing Training Data for Anomaly Sensors. IEEE Symposium on Security and Privacy 2008: 81-95
89EEVanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis: Behavior-Based Network Access Control: A Proof-of-Concept. ISC 2008: 175-190
88EEMatthew Burnside, Angelos D. Keromytis: Path-Based Access Control for Enterprise Networks. ISC 2008: 191-203
87EEMichael E. Locasto, Matthew Burnside, Angelos D. Keromytis: Online Network Forensics for Automatic Repair Validation. IWSEC 2008: 136-151
86EEMichael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo: Return Value Predictability Profiles for Self-healing. IWSEC 2008: 152-166
85EEDebra L. Cook, Moti Yung, Angelos D. Keromytis: Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. Inscrypt 2008: 157-180
84EEMatthew Burnside, Mack Lu, Angelos D. Keromytis: Authentication on Untrusted Remote Hosts with Public-Key Sudo. LISA 2008: 103-107
83EEStefan Miltchev, Jonathan M. Smith, Vassilis Prevelakis, Angelos D. Keromytis, Sotiris Ioannidis: Decentralized access control in distributed file systems. ACM Comput. Surv. 40(3): (2008)
2007
82EEYingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo: On the infeasibility of modeling polymorphic shellcode. ACM Conference on Computer and Communications Security 2007: 541-551
81EEAdam J. Aviv, Michael E. Locasto, Shaya Potter, Angelos D. Keromytis: SSARES: Secure Searchable Automated Remote Email Storage. ACSAC 2007: 129-139
80EEDebra L. Cook, Angelos D. Keromytis, Moti Yung: Elastic block ciphers: the basic design. ASIACCS 2007: 350-352
79EEAngelos Stavrou, David Turner, Angelos D. Keromytis, Vassilis Prevelakis: Bridging the Network Reservation Gap Using Overlays. COMSWARE 2007
78EEWei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis: A Study of Malcode-Bearing Documents. DIMVA 2007: 231-250
77EEStelios Sidiroglou, Oren Laadan, Angelos D. Keromytis, Jason Nieh: Using Rescue Points to Navigate Software Recovery. IEEE Symposium on Security and Privacy 2007: 273-280
76EEDebra L. Cook, Moti Yung, Angelos D. Keromytis: The Security of Elastic Block Ciphers Against Key-Recovery Attacks. ISC 2007: 89-103
75EEMichael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis: From STEM to SEAD: Speculative Execution for Automated Defense. USENIX Annual Technical Conference 2007: 219-232
74EEAngelos D. Keromytis, Jonathan M. Smith: Requirements for scalable access control and security management architectures. ACM Trans. Internet Techn. 7(2): (2007)
73EEKostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis: COVERAGE: detecting and reacting to worm epidemics using cooperation and validation. Int. J. Inf. Sec. 6(6): 361-378 (2007)
2006
72EEAngelos Stavrou, Michael E. Locasto, Angelos D. Keromytis: W3Bcrypt: Encryption as a Stylesheet. ACNS 2006: 349-364
71EEMatthew Burnside, Angelos D. Keromytis: Low Latency Anonymity with Mix Rings. ISC 2006: 32-45
70EEKostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald: Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. ISC 2006: 427-442
69EEMichael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis: Software Self-Healing Using Collaborative Application Communities. NDSS 2006
68EEMichael E. Locasto, Angelos Stavrou, Angelos D. Keromytis: Dark application communities. NSPW 2006: 11-18
67EEAngelos D. Keromytis, Jason L. Wright, Theo de Raadt, Matthew Burnside: Cryptography as an operating system service: A case study. ACM Trans. Comput. Syst. 24(1): 1-38 (2006)
66EEStelios Sidiroglou, Angelos D. Keromytis: Execution transactions for defending against software failures: use and evaluation. Int. J. Inf. Sec. 5(2): 77-91 (2006)
2005
65 Vijay Atluri, Angelos D. Keromytis: Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005 ACM Press 2005
64 John Ioannidis, Angelos D. Keromytis, Moti Yung: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings ACNS 2005
63EEAngelos Stavrou, Angelos D. Keromytis: Countering DoS attacks with stateless multipath overlays. ACM Conference on Computer and Communications Security 2005: 249-259
62EEGaurav S. Kc, Angelos D. Keromytis: e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing. ACSAC 2005: 286-302
61EESimon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov: Highlights from the 2005 New Security Paradigms Workshop. ACSAC 2005: 393-396
60EEDebra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck: CryptoGraphics: Secret Key Cryptography Using Graphics Cards. CT-RSA 2005: 334-350
59EEDebra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis: Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. ICICS 2005: 363-375
58EEAbhinav Kamra, Hanhua Feng, Vishal Misra, Angelos D. Keromytis: The effect of DNS delays on worm propagation in an IPv6 Internet. INFOCOM 2005: 2405-2414
57EEStelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis: A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. ISC 2005: 1-15
56EEStephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis: gore: Routing-Assisted Defense Against DDoS Attacks. ISC 2005: 179-193
55EEDavid Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis: The Bandwidth Exchange Architecture. ISCC 2005: 939-944
54EEStelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo: An Email Worm Vaccine Architecture. ISPEC 2005: 97-108
53EEDebra L. Cook, Angelos D. Keromytis: Conversion and Proxy Functions for Symmetric Key Ciphers. ITCC (1) 2005: 662-667
52EEAngelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, Dan Rubenstein: MOVE: An End-to-End Solution to Network Denial of Service. NDSS 2005
51EEMichael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo: FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101
50EEStelios Sidiroglou, Michael E. Locasto, Stephen W. Boyd, Angelos D. Keromytis: Building a Reactive Immune System for Software Services. USENIX Annual Technical Conference, General Track 2005: 149-161
49EEDavid Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis: The Bandwidth Exchange Architecture CoRR abs/cs/0504007: (2005)
48EEAngelos Stavrou, Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: WebSOS: an overlay-based system for protecting web servers from denial of service attacks. Computer Networks 48(5): 781-807 (2005)
47EEStelios Sidiroglou, Angelos D. Keromytis: Countering Network Worms Through Automatic Patch Generation. IEEE Security & Privacy 3(6): 41-49 (2005)
46EEStelios Sidiroglou, Michael E. Locasto, Angelos D. Keromytis: Hardware support for self-healing software services. SIGARCH Computer Architecture News 33(1): 42-47 (2005)
45EEMatthew Burnside, Angelos D. Keromytis: The case for crypto protocol awareness inside the OS kernel. SIGARCH Computer Architecture News 33(1): 58-64 (2005)
2004
44EETheodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung: The dual receiver cryptosystem and its applications. ACM Conference on Computer and Communications Security 2004: 330-343
43EEMichael E. Locasto, Angelos D. Keromytis: CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. ACNS 2004: 1-15
42EEAngelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: A Pay-per-Use DoS Protection Mechanism for the Web. ACNS 2004: 120-134
41EEStephen W. Boyd, Angelos D. Keromytis: SQLrand: Preventing SQL Injection Attacks. ACNS 2004: 292-302
40EERakan El-Khalil, Angelos D. Keromytis: Hydan: Hiding Information in Program Binaries. ICICS 2004: 187-199
39 Aleksey Kurchuk, Angelos D. Keromytis: Recursive Sandboxes: Extending Systrace To Empower Applications. SEC 2004: 473-488
38EEWilliam Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Just fast keying: Key agreement in a hostile internet. ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004)
37EEAngelos D. Keromytis: "Patch on Demand" Saves Even More Time? IEEE Computer 37(8): 94-96 (2004)
36EEAngelos D. Keromytis, Vishal Misra, Dan Rubenstein: SOS: an architecture for mitigating DDoS attacks. IEEE Journal on Selected Areas in Communications 22(1): 176-188 (2004)
2003
35EEGaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis: Countering code-injection attacks with instruction-set randomization. ACM Conference on Computer and Communications Security 2003: 272-280
34EEWilliam G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: Using graphic turing tests to counter automated DDoS attacks against web servers. ACM Conference on Computer and Communications Security 2003: 8-19
33EEAngelos D. Keromytis: Tagging Data in the Network Stack: mbuf_tags. BSDCon 2003: 125-132
32EEAngelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith: The STRONGMAN Architecture. DISCEX (1) 2003: 178-188
31EEMark C. Benvenuto, Angelos D. Keromytis: EasyVPN: IPsec Remote Access Made Easy. LISA 2003: 87-94
30EEMatt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis: TAPI: Transactions for Accessing Public Infrastructure. PWC 2003: 90-100
29EEMatt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin: WAR: Wireless Anonymous Routing. Security Protocols Workshop 2003: 218-232
28EEStefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Secure and Flexible Global File Sharing. USENIX Annual Technical Conference, FREENIX Track 2003: 165-178
27EEAngelos D. Keromytis, Jason L. Wright, Theo de Raadt: The Design of the {OpenBSD} Cryptographic Framework. USENIX Annual Technical Conference, General Track 2003: 181-196
26EEStelios Sidiroglou, Angelos D. Keromytis: A Network Worm Vaccine Architecture. WETICE 2003: 220-225
25EESotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Design and Implementation of Virtual Private Services. WETICE 2003: 269-274
24EEAlexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis: WebDAVA: An Administrator-Free Approach To Web File-Sharing. WETICE 2003: 59-64
23EEMatt Blaze, John Ioannidis, Angelos D. Keromytis: Experience with the KeyNote Trust Management System: Applications and Future Directions. iTrust 2003: 284-300
22 Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith: A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C 33(3): 413-426 (2003)
2002
21EEWilliam Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis: Efficient, DoS-resistant, secure key exchange for internet protocols. ACM Conference on Computer and Communications Security 2002: 48-58
20EEMichael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith: A Secure PLAN. DANCE 2002: 224-237
19EEJohn Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Vassilis Prevelakis: Fileteller: Paying and Getting Paid for File Storage. Financial Cryptography 2002: 282-299
18EEAngelos D. Keromytis, Vishal Misra, Dan Rubenstein: SOS: secure overlay services. SIGCOMM 2002: 61-72
17EEStefan Miltchev, Sotiris Ioannidis, Angelos D. Keromytis: A Study of the Relative Costs of Network Security Protocols. USENIX Annual Technical Conference, FREENIX Track 2002: 41-48
16EEMatt Blaze, John Ioannidis, Angelos D. Keromytis: Trust management for IPsec. ACM Trans. Inf. Syst. Secur. 5(2): 95-118 (2002)
2001
15EEMatt Blaze, John Ioannidis, Angelos D. Keromytis: Offline Micropayments without Trusted Hardware. Financial Cryptography 2001: 21-40
14EEMatt Blaze, John Ioannidis, Angelos D. Keromytis: Trust Management for IPsec. NDSS 2001
13EEWilliam Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. Security Protocols Workshop 2001: 27-39
2000
12EESotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith: Implementing a distributed firewall. ACM Conference on Computer and Communications Security 2000: 190-199
11EEJohn Ioannidis, Angelos D. Keromytis: Network security and IPsec (tutorial). ACM Conference on Computer and Communications Security 2000
10EEKostas G. Anagnostakis, Michael W. Hicks, Sotiris Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Scalable Resource Control in Active Networks. IWAN 2000: 343-357
9EENiklas Hallqvist, Angelos D. Keromytis: Implementing Internet Key Exchange (IKE). USENIX Annual Technical Conference, FREENIX Track 2000: 201-214
8EEAngelos D. Keromytis, Jason L. Wright: Transparent Network Security Policy Enforcement. USENIX Annual Technical Conference, FREENIX Track 2000: 215-226
1999
7 Michael W. Hicks, Angelos D. Keromytis: A Secure Plan. IWAN 1999: 307-314
6 Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis: The Role of Trust Management in Distributed Systems Security. Secure Internet Programming 1999: 185-210
5 D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith: Security in Active Networks. Secure Internet Programming 1999: 433-451
4 Matt Blaze, John Ioannidis, Angelos D. Keromytis: Trust Management and Network Layer Security Protocols. Security Protocols Workshop 1999: 103-118
3EETheo de Raadt, Niklas Hallqvist, Artur Grabowski, Angelos D. Keromytis, Niels Provos: Cryptography in OpenBSD: An Overview. USENIX Annual Technical Conference, FREENIX Track 1999: 93-101
1998
2EEWilliam A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith: Automated Recovery in a Secure Bootstrap Process. NDSS 1998
1EEMatt Blaze, Joan Feigenbaum, Angelos D. Keromytis: KeyNote: Trust Management for Public-Key Infrastructures (Position Paper). Security Protocols Workshop 1998: 59-63

Coauthor Index

1William Aiello [13] [21] [38]
2D. Scott Alexander [5]
3Kostas G. Anagnostakis [10] [70] [73]
4Elli Androulaki [78]
5William A. Arbaugh [2] [5]
6Vijayalakshmi Atluri (Vijay Atluri) [65]
7Adam J. Aviv [81]
8Ricardo A. Baratto [59]
9Steven M. Bellovin [12] [13] [21] [25] [38] [94]
10Mark C. Benvenuto [31]
11Matt Blaze [1] [4] [6] [13] [14] [15] [16] [21] [23] [29] [30] [38]
12Alex Boulatov [61]
13Stephen W. Boyd [41] [50]
14Matthew Burnside (Matt Burnside) [45] [67] [71] [84] [87] [88] [91]
15Mark Bush [61]
16Ran Canetti [13] [21] [38]
17Stephen T. Chou [56]
18Debra L. Cook [34] [48] [53] [59] [60] [76] [80] [85] [93]
19Gabriela F. Cretu [75] [86] [90]
20Theodore Diament [44]
21Rakan El-Khalil [40]
22David J. Farber [2]
23Joan Feigenbaum [1] [6]
24Hanhua Feng [58]
25Simon N. Foley [61]
26Richard Ford [61]
27Vanessa Frías-Martínez [89]
28Rosario Gennaro [94]
29Giannis Giovanidis [57]
30Artur Grabowski [3]
31Michael B. Greenwald (Michael Greenwald) [32] [70] [73]
32Niklas Hallqvist [3] [9]
33Michael W. Hicks (Michael Hicks) [7] [10] [20] [22]
34John Ioannidis [4] [11] [13] [14] [15] [16] [19] [21] [23] [24] [25] [28] [29] [30] [38] [42] [54] [56] [60] [64]
35Sotiris Ioannidis [10] [12] [17] [19] [24] [25] [28] [30] [32] [70] [73] [83]
36Abhinav Kamra [58]
37Gaurav S. Kc [35] [62]
38Aleksey Kurchuk [39]
39Oren Laadan [77] [95]
40Homin K. Lee [44]
41Alexander Levine [24]
42Wei-Jen Li [78]
43Michael E. Locasto [43] [46] [50] [51] [61] [68] [69] [72] [75] [81] [82] [86] [87] [90] [92]
44Mack Lu [84]
45Jake Luck [60]
46Tal Malkin [29]
47John McDermott [61]
48Stefan Miltchev [17] [28] [83]
49Vishal Misra [18] [34] [36] [42] [48] [52] [58]
50William G. Morein [34] [48]
51Jason Nieh [52] [77] [95]
52Pekka Nikander [30]
53Paul C. van Oorschot [61]
54Carlos Perez [95]
55Shaya Potter [81]
56Vassilis Prevelakis [19] [24] [28] [30] [35] [49] [55] [79] [83]
57Niels Provos [3]
58Theo de Raadt [3] [27] [67]
59Omer Reingold [13] [21] [38]
60Dan Rubenstein [18] [34] [36] [42] [48] [52]
61Aviel D. Rubin [29]
62Stelios Sidiroglou [26] [46] [47] [50] [54] [57] [61] [66] [69] [77] [95]
63Abe Singer [61]
64Jonathan M. Smith [2] [5] [10] [12] [20] [22] [25] [28] [32] [74] [83]
65Anil Somayaji [61]
66Yingbo Song [82]
67Angelos Stavrou [34] [42] [48] [52] [56] [63] [68] [72] [75] [78] [79] [82] [86] [90] [92]
68Salvatore J. Stolfo [51] [54] [78] [82] [86] [89] [90]
69Julie Thorpe [61]
70David Turner [79]
71David Michael Turner [49] [55]
72Nicolas Viennot [95]
73Ke Wang [51]
74Jason L. Wright [8] [27] [67]
75Moti Yung (Mordechai M. Yung) [44] [64] [76] [80] [85] [93] [94]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)