Follow
Vasilis Pappas
Vasilis Pappas
Verified email at cs.columbia.edu - Homepage
Title
Cited by
Cited by
Year
Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
V Pappas, M Polychronakis, AD Keromytis
Security and Privacy (SP), 2012 IEEE Symposium on, 601-615, 2012
5072012
Transparent ROP exploit mitigation using indirect branch tracing
V Pappas, M Polychronakis, AD Keromytis
Proceedings of the 22nd USENIX conference on Security, 447-462, 2013
4812013
Blind seer: A scalable private dbms
V Pappas, F Krell, B Vo, V Kolesnikov, T Malkin, SG Choi, W George, ...
Security and Privacy (SP), 2014 IEEE Symposium on, 359-374, 2014
3342014
kBouncer: Efficient and Transparent ROP Mitigation
V Pappas
852012
CloudFence: Data flow tracking as a cloud service
V Pappas, VP Kemerlis, A Zavou, M Polychronakis, AD Keromytis
International Workshop on Recent Advances in Intrusion Detection, 411-431, 2013
672013
CellFlood: Attacking Tor onion routers on the cheap
MV Barbera, VP Kemerlis, V Pappas, AD Keromytis
European Symposium on Research in Computer Security, 664-681, 2013
532013
Compromising anonymity using packet spinning
V Pappas, E Athanasopoulos, S Ioannidis, EP Markatos
International Conference on Information Security, 161-174, 2008
532008
xJS: practical XSS prevention for web application development
E Athanasopoulos, V Pappas, A Krithinakis, S Ligouras, EP Markatos, ...
Proceedings of the 2010 USENIX conference on Web application development …, 2010
492010
Private search in the real world
V Pappas, M Raykova, B Vo, SM Bellovin, T Malkin
Proceedings of the 27th Annual Computer Security Applications Conference, 83-92, 2011
352011
Towards a universal data provenance framework using dynamic instrumentation
E Gessiou, V Pappas, E Athanasopoulos, AD Keromytis, S Ioannidis
IFIP International Information Security Conference, 103-114, 2012
312012
Cloudopsy: an Autopsy of Data Flows in the Cloud
A Zavou, V Pappas, VP Kemerlis, M Polychronakis, G Portokalidis, ...
Proc. of HCII, 2013
252013
Practical Software Diversification Using In-Place Code Randomization
V Pappas, M Polychronakis, AD Keromytis
Moving Target Defense II, 175-202, 2012
222012
Code-Injection Attacks in Browsers Supporting Policies
E Athanasopoulos, V Pappas, E Markatos
Proceedings of the 2nd Workshop on Web 2.0 Security & Privacy (W2SP), 2009
222009
Evaluation of a spyware detection system using thin client computing
V Pappas, BM Bowen, AD Keromytis
International Conference on Information Security and Cryptology, 222-232, 2010
152010
Diversified instruction set processing to enhance security
L Sethumadhavan, K Sinha, A Keromytis, V Pappas, V Kemerlis
US Patent App. 14/946,961, 2015
14*2015
Dynamic reconstruction of relocation information for stripped binaries
V Pappas, M Polychronakis, AD Keromytis
International Workshop on Recent Advances in Intrusion Detection, 68-87, 2014
142014
iLeak: A lightweight system for detecting inadvertent information leaks
VP Kemerlis, V Pappas, G Portokalidis, AD Keromytis
Proceedings of the 6th European Conference on Computer Network Defense …, 2010
142010
Cloud-Fence: Enabling Users to Audit the Use of their Cloud-Resident Data
V Pappas, V Kemerlis, A Zavou, M Polychronakis, AD Keromytis
Columbia University Computer Science Technical Reports, 2012
112012
Crimeware swindling without virtual machines
V Pappas, BM Bowen, AD Keromytis
International Conference on Information Security, 196-202, 2010
112010
Measuring the deployment hiccups of DNSSEC
V Pappas, AD Keromytis
Advances in Computing and Communications, 44-53, 2011
12011
The system can't perform the operation now. Try again later.
Articles 1–20