Dimitris Mitropoulos

According to our database1, Dimitris Mitropoulos authored at least 37 papers between 2009 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
A model for detecting faults in build specifications.
Proc. ACM Program. Lang., 2020

PDGuard: an architecture for the control and secure processing of personal data.
Int. J. Inf. Sec., 2020

Identifying Bugs in Make and JVM-Oriented Builds.
CoRR, 2020

Practical fault detection in puppet programs.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
Defending Against Web Application Attacks: Approaches, Challenges and Implications.
IEEE Trans. Dependable Secur. Comput., 2019

Detecting Missing Dependencies and Notifiers in Puppet Programs.
CoRR, 2019

Time present and time past: analyzing the evolution of JavaScript code in the wild.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

Pythia: Identifying Dangerous Data-flows in Django-based Applications.
Proceedings of the 12th European Workshop on Systems Security, 2019

Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Aspects of the History of Computing in Modern Greece.
IEEE Ann. Hist. Comput., 2018

VulinOSS: a dataset of security vulnerabilities in open-source systems.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

2017
Fatal injection: a survey of modern code injection attack countermeasures.
PeerJ Comput. Sci., 2017

How 1 million app calls can tell you a bit about malware.
XRDS, 2017

Tug-of-War: Observations on Unified Content Handling.
CoRR, 2017

2016
POSIX Has Become Outdated.
login Usenix Mag., 2016

How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints.
ACM Trans. Priv. Secur., 2016

POSIX abstractions in modern operating systems: the old, the new, and the missing.
Proceedings of the Eleventh European Conference on Computer Systems, 2016

2015
Charting the API minefield using software telemetry data.
Empir. Softw. Eng., 2015

On the evolution of security bugs.
XRDS, 2015

A type-safe embedding of SQL into Java using the extensible compiler framework J%.
Comput. Lang. Syst. Struct., 2015

Generating the Blueprints of the Java Ecosystem.
Proceedings of the 12th IEEE/ACM Working Conference on Mining Software Repositories, 2015

2014
TRACER: A Platform for Securing Legacy Code.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Securing Legacy Code with the TRACER Platform.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

The bug catalog of the maven ecosystem.
Proceedings of the 11th Working Conference on Mining Software Repositories, 2014

The Vulnerability Dataset of a Large Software Ecosystem.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

2013
Security bugs in large software ecosystems.
XRDS, 2013

Data security in the cloud environment.
XRDS, 2013

Dismal Code: Studying the Evolution of Security Bugs.
Proceedings of the 2013 Workshop on Learning from Authoritative Security Experiment Results, 2013

Improving the quality of APIs through the analysis of software crash reports.
Proceedings of the 2013 Imperial College Computing Student Workshop, 2013

2012
Blogs.
XRDS, 2012

Better safe than sorry: backup your backups.
XRDS, 2012

Blogs.
XRDS, 2012

Measuring the Occurrence of Security-Related Bugs through Software Evolution.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

2011
Countering Code Injection Attacks: A Unified Approach.
Inf. Manag. Comput. Secur., 2011

2010
Cyberdiversity: Measures and Initial Results.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010

2009
SDriver: Location-specific signatures prevent SQL injection attacks.
Comput. Secur., 2009

Fortifying Applications Against Xpath Injection Attacks.
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009


  Loading...