Smashing the gadgets: Hindering return-oriented programming using in-place code randomization V Pappas, M Polychronakis, AD Keromytis Security and Privacy (SP), 2012 IEEE Symposium on, 601-615, 2012 | 507 | 2012 |
Transparent ROP exploit mitigation using indirect branch tracing V Pappas, M Polychronakis, AD Keromytis Proceedings of the 22nd USENIX conference on Security, 447-462, 2013 | 481 | 2013 |
Blind seer: A scalable private dbms V Pappas, F Krell, B Vo, V Kolesnikov, T Malkin, SG Choi, W George, ... Security and Privacy (SP), 2014 IEEE Symposium on, 359-374, 2014 | 334 | 2014 |
kBouncer: Efficient and Transparent ROP Mitigation V Pappas | 85 | 2012 |
CloudFence: Data flow tracking as a cloud service V Pappas, VP Kemerlis, A Zavou, M Polychronakis, AD Keromytis International Workshop on Recent Advances in Intrusion Detection, 411-431, 2013 | 67 | 2013 |
CellFlood: Attacking Tor onion routers on the cheap MV Barbera, VP Kemerlis, V Pappas, AD Keromytis European Symposium on Research in Computer Security, 664-681, 2013 | 53 | 2013 |
Compromising anonymity using packet spinning V Pappas, E Athanasopoulos, S Ioannidis, EP Markatos International Conference on Information Security, 161-174, 2008 | 53 | 2008 |
xJS: practical XSS prevention for web application development E Athanasopoulos, V Pappas, A Krithinakis, S Ligouras, EP Markatos, ... Proceedings of the 2010 USENIX conference on Web application development …, 2010 | 49 | 2010 |
Private search in the real world V Pappas, M Raykova, B Vo, SM Bellovin, T Malkin Proceedings of the 27th Annual Computer Security Applications Conference, 83-92, 2011 | 35 | 2011 |
Towards a universal data provenance framework using dynamic instrumentation E Gessiou, V Pappas, E Athanasopoulos, AD Keromytis, S Ioannidis IFIP International Information Security Conference, 103-114, 2012 | 31 | 2012 |
Cloudopsy: an Autopsy of Data Flows in the Cloud A Zavou, V Pappas, VP Kemerlis, M Polychronakis, G Portokalidis, ... Proc. of HCII, 2013 | 25 | 2013 |
Practical Software Diversification Using In-Place Code Randomization V Pappas, M Polychronakis, AD Keromytis Moving Target Defense II, 175-202, 2012 | 22 | 2012 |
Code-Injection Attacks in Browsers Supporting Policies E Athanasopoulos, V Pappas, E Markatos Proceedings of the 2nd Workshop on Web 2.0 Security & Privacy (W2SP), 2009 | 22 | 2009 |
Evaluation of a spyware detection system using thin client computing V Pappas, BM Bowen, AD Keromytis International Conference on Information Security and Cryptology, 222-232, 2010 | 15 | 2010 |
Diversified instruction set processing to enhance security L Sethumadhavan, K Sinha, A Keromytis, V Pappas, V Kemerlis US Patent App. 14/946,961, 2015 | 14* | 2015 |
Dynamic reconstruction of relocation information for stripped binaries V Pappas, M Polychronakis, AD Keromytis International Workshop on Recent Advances in Intrusion Detection, 68-87, 2014 | 14 | 2014 |
iLeak: A lightweight system for detecting inadvertent information leaks VP Kemerlis, V Pappas, G Portokalidis, AD Keromytis Proceedings of the 6th European Conference on Computer Network Defense …, 2010 | 14 | 2010 |
Cloud-Fence: Enabling Users to Audit the Use of their Cloud-Resident Data V Pappas, V Kemerlis, A Zavou, M Polychronakis, AD Keromytis Columbia University Computer Science Technical Reports, 2012 | 11 | 2012 |
Crimeware swindling without virtual machines V Pappas, BM Bowen, AD Keromytis International Conference on Information Security, 196-202, 2010 | 11 | 2010 |
Measuring the deployment hiccups of DNSSEC V Pappas, AD Keromytis Advances in Computing and Communications, 44-53, 2011 | 1 | 2011 |