2008 |
17 | EE | Angelos Stavrou,
Michael E. Locasto,
Angelos D. Keromytis:
Pushback for Overlay Networks: Protecting Against Malicious Insiders.
ACNS 2008: 39-54 |
16 | EE | Gabriela F. Cretu,
Angelos Stavrou,
Michael E. Locasto,
Salvatore J. Stolfo,
Angelos D. Keromytis:
Casting out Demons: Sanitizing Training Data for Anomaly Sensors.
IEEE Symposium on Security and Privacy 2008: 81-95 |
15 | EE | Michael E. Locasto,
Matthew Burnside,
Angelos D. Keromytis:
Online Network Forensics for Automatic Repair Validation.
IWSEC 2008: 136-151 |
14 | EE | Michael E. Locasto,
Angelos Stavrou,
Gabriela F. Cretu,
Angelos D. Keromytis,
Salvatore J. Stolfo:
Return Value Predictability Profiles for Self-healing.
IWSEC 2008: 152-166 |
13 | EE | Sergey Bratus,
Michael E. Locasto,
Ashwin Ramaswamy,
Sean W. Smith:
Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security.
VMSec 2008: 49-58 |
2007 |
12 | EE | Yingbo Song,
Michael E. Locasto,
Angelos Stavrou,
Angelos D. Keromytis,
Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode.
ACM Conference on Computer and Communications Security 2007: 541-551 |
11 | EE | Adam J. Aviv,
Michael E. Locasto,
Shaya Potter,
Angelos D. Keromytis:
SSARES: Secure Searchable Automated Remote Email Storage.
ACSAC 2007: 129-139 |
10 | EE | Weidong Cui,
Marcus Peinado,
Helen J. Wang,
Michael E. Locasto:
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing.
IEEE Symposium on Security and Privacy 2007: 252-266 |
9 | EE | Michael E. Locasto,
Angelos Stavrou,
Gabriela F. Cretu,
Angelos D. Keromytis:
From STEM to SEAD: Speculative Execution for Automated Defense.
USENIX Annual Technical Conference 2007: 219-232 |
2006 |
8 | EE | Angelos Stavrou,
Michael E. Locasto,
Angelos D. Keromytis:
W3Bcrypt: Encryption as a Stylesheet.
ACNS 2006: 349-364 |
7 | EE | Michael E. Locasto,
Stelios Sidiroglou,
Angelos D. Keromytis:
Software Self-Healing Using Collaborative Application Communities.
NDSS 2006 |
6 | EE | Michael E. Locasto,
Angelos Stavrou,
Angelos D. Keromytis:
Dark application communities.
NSPW 2006: 11-18 |
2005 |
5 | EE | Simon N. Foley,
Abe Singer,
Michael E. Locasto,
Stelios Sidiroglou,
Angelos D. Keromytis,
John McDermott,
Julie Thorpe,
Paul C. van Oorschot,
Anil Somayaji,
Richard Ford,
Mark Bush,
Alex Boulatov:
Highlights from the 2005 New Security Paradigms Workshop.
ACSAC 2005: 393-396 |
4 | EE | Michael E. Locasto,
Ke Wang,
Angelos D. Keromytis,
Salvatore J. Stolfo:
FLIPS: Hybrid Adaptive Intrusion Prevention.
RAID 2005: 82-101 |
3 | EE | Stelios Sidiroglou,
Michael E. Locasto,
Stephen W. Boyd,
Angelos D. Keromytis:
Building a Reactive Immune System for Software Services.
USENIX Annual Technical Conference, General Track 2005: 149-161 |
2 | EE | Stelios Sidiroglou,
Michael E. Locasto,
Angelos D. Keromytis:
Hardware support for self-healing software services.
SIGARCH Computer Architecture News 33(1): 42-47 (2005) |
2004 |
1 | EE | Michael E. Locasto,
Angelos D. Keromytis:
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap.
ACNS 2004: 1-15 |