Elias Athanasopoulos
Elias Athanasopoulos
Associate Professor, University of Cyprus
Potvrđena adresa e-pošte na - Početna stranica
Out of control: Overcoming control-flow integrity
E Göktas, E Athanasopoulos, H Bos, G Portokalidis
2014 IEEE Symposium on Security and Privacy, 575-589, 2014
Rage against the virtual machine: hindering dynamic analysis of android malware
T Petsas, G Voyatzis, E Athanasopoulos, M Polychronakis, S Ioannidis
Proceedings of the seventh european workshop on system security, 1-6, 2014
A tough call: Mitigating advanced code-reuse attacks at the binary level
V Van Der Veen, E Göktas, M Contag, A Pawoloski, X Chen, S Rawat, ...
2016 IEEE Symposium on Security and Privacy (SP), 934-953, 2016
Size Does Matter: Why Using {Gadget-Chain} Length to Prevent {Code-Reuse} Attacks is Hard
E Göktaş, E Athanasopoulos, M Polychronakis, H Bos, G Portokalidis
23rd USENIX Security Symposium (USENIX Security 14), 417-432, 2014
Face/off: Preventing privacy leakage from photos in social networks
P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis
Proceedings of the 22nd ACM SIGSAC Conference on computer and communications …, 2015
Throwhammer: Rowhammer attacks over the network and defenses
A Tatar, RK Konoth, E Athanasopoulos, C Giuffrida, H Bos, K Razavi
2018 USENIX Annual Technical Conference (USENIX ATC 18), 213-226, 2018
No need to hide: Protecting safe regions on commodity hardware
K Koning, X Chen, H Bos, C Giuffrida, E Athanasopoulos
Proceedings of the Twelfth European Conference on Computer Systems, 437-452, 2017
Two-factor authentication: is the world ready? Quantifying 2FA adoption
T Petsas, G Tsirantonakis, E Athanasopoulos, S Ioannidis
Proceedings of the eighth european workshop on system security, 1-7, 2015
we. b: The web of short URLs
D Antoniades, I Polakis, G Kontaxis, E Athanasopoulos, S Ioannidis, ...
Proceedings of the 20th international conference on World Wide Web, 715-724, 2011
HCFI: Hardware-enforced control-flow integrity
N Christoulakis, G Christou, E Athanasopoulos, S Ioannidis
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
Antisocial networks: Turning a social network into a botnet
E Athanasopoulos, A Makridakis, S Antonatos, D Antoniades, S Ioannidis, ...
International Conference on Information Security, 146-160, 2008
Poking holes in information hiding
A Oikonomopoulos, E Athanasopoulos, H Bos, C Giuffrida
25th USENIX Security Symposium (USENIX Security 16), 121-138, 2016
Undermining information hiding (and what to do about it)
E Göktaş, R Gawlik, B Kollenda, E Athanasopoulos, G Portokalidis, ...
25th USENIX Security Symposium (USENIX Security 16), 105-119, 2016
AndRadar: fast discovery of android applications in alternative markets
M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ...
Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014
{CensMon}: A Web Censorship Monitor
E Athanasopoulos, S Ioannidis, A Sfakianakis
USENIX Workshop on Free and Open Communications on the Internet (FOCI 11), 2011
Enhanced captchas: Using animation to tell humans and computers apart
E Athanasopoulos, S Antonatos
Communications and Multimedia Security: 10th IFIP TC-6 TC-11 International …, 2006
PixelVault: Using GPUs for securing cryptographic operations
G Vasiliadis, E Athanasopoulos, M Polychronakis, S Ioannidis
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Sauth: Protecting user accounts from password database leaks
G Kontaxis, E Athanasopoulos, G Portokalidis, AD Keromytis
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Shrinkwrap: Vtable protection without loose ends
I Haller, E Göktaş, E Athanasopoulos, G Portokalidis, H Bos
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
Misusing unstructured p2p systems to perform dos attacks: The network that never forgets
E Athanasopoulos, KG Anagnostakis, EP Markatos
Applied Cryptography and Network Security: 4th International Conference …, 2006
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20