Angelos Stavrou

According to our database1, Angelos Stavrou authored at least 139 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
20 Years of DDoS: a Call to Action.
CoRR, 2019

2018
Towards Transparent Debugging.
IEEE Trans. Dependable Sec. Comput., 2018

On early detection of application-level resource exhaustion and starvation.
Journal of Systems and Software, 2018

Cybertrust in the IoT Age.
IEEE Computer, 2018

End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks.
Proceedings of the 27th USENIX Security Symposium, 2018

An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace.
Proceedings of the Computer Security, 2018

Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Resilient and Scalable Cloned App Detection Using Forced Execution and Compression Trees.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
An Empirical Investigation of Ecommerce-Reputation-Escalation-as-a-Service.
TWEB, 2017

Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems.
Journal of Interconnection Networks, 2017

Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks.
CoRR, 2017

Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems.
CoRR, 2017

Verified Time.
IEEE Computer, 2017

DDoS in the IoT: Mirai and Other Botnets.
IEEE Computer, 2017

Practical and Accurate Runtime Application Protection Against DoS Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Your data in your hands: Privacy-preserving user behavior models for context computation.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Pairing continuous authentication with proactive platform hardening.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

The Mirai botnet and the IoT Zombie Armies.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Advancing Open Science with Version Control and Blockchains.
Proceedings of the 12th IEEE/ACM International Workshop on Software Engineering for Science, 2017

E-Android: A New Energy Profiling Tool for Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Breaking BLE Beacons For Fun But Mostly Profit.
Proceedings of the 10th European Workshop on Systems Security, 2017

Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Detecting ROP with Statistical Learning of Program Characteristics.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

CCSW'17: 2017 ACM Cloud Computing Security.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Strict Virtual Call Integrity Checking for C++ Binaries.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Learning Internet-of-Things Security "Hands-On".
IEEE Security & Privacy, 2016

Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset.
IEEE Communications Surveys and Tutorials, 2016

On the Move: Evading Distributed Denial-of-Service Attacks.
IEEE Computer, 2016

Authentication Feature and Model Selection using Penalty Algorithms.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Securely Making "Things" Right.
IEEE Computer, 2015

E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service.
Proceedings of the 24th International Conference on World Wide Web, 2015

Using Hardware Features for Increased Debugging Transparency.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Privacy Risk Assessment on Online Photos.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Preventing Exploits in Microsoft Office Documents Through Content Randomization.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Targeted DoS on android: how to disable android in 10 seconds or less.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

On the DNS Deployment of Modern Web Services.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Analysis of content copyright infringement in mobile application markets.
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015

TrustLogin: Securing Password-Login on Commodity Operating Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
HyperCheck: A Hardware-AssistedIntegrity Monitor.
IEEE Trans. Dependable Sec. Comput., 2014

A moving target DDoS defense mechanism.
Computer Communications, 2014

transAD: An Anomaly Detection Network Intrusion Sensor for the Web.
Proceedings of the Information Security - 17th International Conference, 2014

A Framework to Secure Peripherals at Runtime.
Proceedings of the Computer Security - ESORICS 2014, 2014

Click Fraud Detection on the Advertiser Side.
Proceedings of the Computer Security - ESORICS 2014, 2014

Detecting Malicious Javascript in PDF through Document Instrumentation.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Catch Me If You Can: A Cloud-Enabled DDoS Defense.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Activity Spoofing and Its Defense in Android Smartphones.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Capability-Based Defenses Against DoS Attacks in Multi-path MANET Communications.
Wireless Personal Communications, 2013

Providing Users' Anonymity in Mobile Hybrid Networks.
ACM Trans. Internet Techn., 2013

Improving network response times using social information.
Social Netw. Analys. Mining, 2013

Programming on Android: Best Practices for Security and Reliability.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Behavioral Analysis of Android Applications Using Automated Instrumentation.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Forced-Path Execution for Android Applications on x86 Platforms.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

HIDEINSIDE - A novel randomized & encrypted antiforensic information hiding.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

MOTAG: Moving Target Defense against Internet Denial of Service Attacks.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

SPECTRE: A dependable introspection framework via System Management Mode.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Towards a Cyber Conflict Taxonomy.
Proceedings of the 5th International Conference on Cyber Conflict, 2013

PyTrigger: A System to Trigger & Extract User-Activated Malware Behavior.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
DoubleGuard: Detecting Intrusions in Multitier Web Applications.
IEEE Trans. Dependable Sec. Comput., 2012

Building Security into Off-the-Shelf Smartphones.
IEEE Computer, 2012

Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Attestation & Authentication for USB Communications.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Mobile Application and Device Power Usage Measurements.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

A Framework for Automated Security Testing of Android Applications on the Cloud.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Analysis of Android Applications' Permissions.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Malware Characterization Using Behavioral Components.
Proceedings of the Computer Network Security, 2012

Exposing Security Risks for Commercial Mobile Devices.
Proceedings of the Computer Network Security, 2012

Implementing and Optimizing an Encryption Filesystem on Android.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

A whitebox approach for automated security testing of Android applications on the cloud.
Proceedings of the 7th International Workshop on Automation of Software Test, 2012

The MEERKATS Cloud Security Architecture.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Hardware-Assisted Application Integrity Monitor.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

A dependability analysis of hardware-assisted polling integrity checking systems.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

NetGator: Malware Detection Using Program Interactive Challenges.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

Malicious PDF detection using metadata and structural features.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
TCP Modulation Attacks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Overlay-Based DoS Defenses.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface
CoRR, 2011

The ephemeral legion: producing an expert cyber-security work force from thin air.
Commun. ACM, 2011

Trading Elephants for Ants: Efficient Post-attack Reconstitution.
Proceedings of the Security and Privacy in Communication Networks, 2011

Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Moving Forward, Building an Ethics Community (Panel Statements).
Proceedings of the Financial Cryptography and Data Security, 2011

The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security.
Proceedings of the First SysSec Workshop 2011, 2011

Specifying Time-Out Points in Surgical EMRs-Work in Progress.
Proceedings of the ENTERprise Information Systems - International Conference, 2011

Predicting Network Response Times Using Social Information.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

2010
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems.
Machine Learning, 2010

Fine-grained Sharing of Health Records using XSPA Profile for XACML - An Extended Abstract.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Scalable Web Object Inspection and Malfease Collection.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

HyperCheck: A Hardware-Assisted Integrity Monitor.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

QoP and QoS Policy Cognizant Module Composition.
Proceedings of the POLICY 2010, 2010

Small World VoIP.
Proceedings of the Mobile Computing, Applications, and Services, 2010

An Adversarial Evaluation of Network Signaling and Control Mechanisms.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

A Virtualization Architecture for In-Depth Kernel Isolation.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation.
Proceedings of the Computer Security, 2010

Providing Mobile Users' Anonymity in Hybrid Networks.
Proceedings of the Computer Security, 2010

Exploiting smart-phone USB connectivity for fun and profit.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
The dynamic community of interest and its realization in ZODIAC.
IEEE Communications Magazine, 2009

The Heisenberg Measuring Uncertainty in Lightweight Virtualization Testbeds.
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009

Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks.
Proceedings of the Security and Privacy in Communication Networks, 2009

SQLProb: a proxy-based architecture towards preventing SQL injection attacks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Adaptive Anomaly Detection via Self-calibration and Dynamic Updating.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

A2M: Access-Assured Mobile Desktop Computing.
Proceedings of the Information Security, 12th International Conference, 2009

Adding Trust to P2P Distribution of Paid Content.
Proceedings of the Information Security, 12th International Conference, 2009

Privacy Preservation over Untrusted Mobile Networks.
Proceedings of the Privacy in Location-Based Applications, 2009

Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009

2008
The Hidden Difficulties of Watching and Rebuilding Networks.
IEEE Security & Privacy, 2008

Casting out Demons: Sanitizing Training Data for Anomaly Sensors.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008), 2008

Universal Multi-Factor Authentication Using Graphical Passwords.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Identifying Proxy Nodes in a Tor Anonymization Circuit.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

PAR: Payment for Anonymous Routing.
Proceedings of the Privacy Enhancing Technologies, 2008

Return Value Predictability Profiles for Self-healing.
Proceedings of the Advances in Information and Computer Security, 2008

A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

Efficiently tracking application interactions using lightweight virtualization.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008

Pushback for Overlay Networks: Protecting Against Malicious Insiders.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
From STEM to SEAD: Speculative Execution for Automated Defense.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

A Study of Malcode-Bearing Documents.
Proceedings of the Detection of Intrusions and Malware, 2007

Bridging the Network Reservation Gap Using Overlays.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

On the infeasibility of modeling polymorphic shellcode.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Dark application communities.
Proceedings of the New Security Paradigms Workshop 2006, 2006

W3Bcrypt: Encryption as a Stylesheet.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
WebSOS: an overlay-based system for protecting web servers from denial of service attacks.
Computer Networks, 2005

MOVE: An End-to-End Solution to Network Denial of Service.
Proceedings of the Network and Distributed System Security Symposium, 2005

gore: Routing-Assisted Defense Against DDoS Attacks.
Proceedings of the Information Security, 8th International Conference, 2005

Countering DoS attacks with stateless multipath overlays.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Content distribution for seamless transmission.
SIGMETRICS Performance Evaluation Review, 2004

A lightweight, robust P2P system to handle flash crowds.
IEEE Journal on Selected Areas in Communications, 2004

A Pay-per-Use DoS Protection Mechanism for the Web.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Using graphic turing tests to counter automated DDoS attacks against web servers.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
A lightweight, robust P2P system to handle flash crowds.
Computer Communication Review, 2002

A Lightweight, Robust P2P System to Handle Flash Crowds.
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP 2002), 2002


  Loading...