Elias Athanasopoulos

According to our database1, Elias Athanasopoulos authored at least 72 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SoK: Membership Inference is Harder Than Previously Thought.
Proc. Priv. Enhancing Technol., July, 2023

Exploring Model Inversion Attacks in the Black-box Setting.
Proc. Priv. Enhancing Technol., January, 2023

Been Here Already? Detecting Synchronized Browsers in the Wild.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Lethe: Practical Data Breach Detection with Zero Persistent Secret State.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2021
Exploiting Mixed Binaries.
ACM Trans. Priv. Secur., 2021

Hard Edges: Hardware-Based Control-Flow Integrity for Embedded Devices.
Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation, 2021

Integrating and Validating Maritime Transport Security Services: Initial results from the CS4EU demonstrator.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021

webFuzz: Grey-Box Fuzzing for Web Applications.
Proceedings of the Computer Security - ESORICS 2021, 2021

Unicode Evil: Evading NLP Systems Using Visual Similarities of Text Characters.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

HoneyGen: Generating Honeywords Using Representation Learning.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
SoK: Machine vs. machine - A systematic classification of automated machine learning-based CAPTCHA solvers.
Comput. Secur., 2020

APPS 2020: Second International Workshop on Adaptive and Personalized Privacy and Security.
Proceedings of the 28th ACM Conference on User Modeling, Adaptation and Personalization, 2020

Adaptive and Personalized Privacy and Security (APPS 2020): Workshop Chairs' Welcome.
Proceedings of the Adjunct Publication of the 28th ACM Conference on User Modeling, 2020

SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

auth.js: Advanced Authentication for the Web.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020

Evaluation of the Adoption and Privacy Risks of Google Prompts.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
Adaptive and Personalized Privacy and Security (APPS 2019): Workshop Chairs' Welcome and Organization.
Proceedings of the Adjunct Publication of the 27th Conference on User Modeling, 2019

Practical Password Hardening Based on TLS.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
FRAMER: A Cache-friendly Software-based Capability Model.
CoRR, 2018

Throwhammer: Rowhammer Attacks over the Network and Defenses.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

A Large-scale Analysis of Content Modification by Open HTTP Proxies.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

KAuth: A Strong Single Sign-On Service based on PKI.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Øpass: Zero-storage Password Management Based on Password Reminders.
Proceedings of the 11th European Workshop on Systems Security, 2018

Where's Wally?: How to Privately Discover your Friends on the Internet.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Evaluating control-flow restricting defenses.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

2017
<i>PROV</i><sub>2R</sub>: Practical Provenance Analysis of Unstructured Processes.
ACM Trans. Internet Techn., 2017

MARX: Uncovering Class Hierarchies in C++ Programs.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

No Need to Hide: Protecting Safe Regions on Commodity Hardware.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

2016
Exploiting abused trending topics to identify spam campaigns in Twitter.
Soc. Netw. Anal. Min., 2016

Provable Network Activity for Protecting Users Against False Accusation.
Proceedings of the Information Security Theory and Practice, 2016

Poking Holes in Information Hiding.
Proceedings of the 25th USENIX Security Symposium, 2016

Undermining Information Hiding (and What to Do about It).
Proceedings of the 25th USENIX Security Symposium, 2016

A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

GRIM: Leveraging GPUs for Kernel Integrity Monitoring.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

NaClDroid: Native Code Isolation for Android Applications.
Proceedings of the Computer Security - ESORICS 2016, 2016

HCFI: Hardware-enforced Control-Flow Integrity.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

VTPin: practical VTable hijacking protection for binaries.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Two-factor authentication: is the world ready?: quantifying 2FA adoption.
Proceedings of the Eighth European Workshop on System Security, 2015

Secure Hardware-Software Architectures for Robust Computing Systems.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

Face/Off: Preventing Privacy Leakage From Photos in Social Networks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

ShrinkWrap: VTable Protection without Loose Ends.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Out of Control: Overcoming Control-Flow Integrity.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Think Before RT: An Experimental Study of Abusing Twitter Trends.
Proceedings of the Social Informatics - SocInfo 2014 International Workshops, Barcelona, 2014

Flying Memcache: Lessons Learned from Different Acceleration Strategies.
Proceedings of the 26th IEEE International Symposium on Computer Architecture and High Performance Computing, 2014

Rage against the virtual machine: hindering dynamic analysis of Android malware.
Proceedings of the Seventh European Workshop on System Security, 2014

AndRadar: Fast Discovery of Android Applications in Alternative Markets.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

PixelVault: Using GPUs for Securing Cryptographic Operations.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Practical information flow for legacy web applications.
Proceedings of the 8th Workshop on Implementation, 2013

SAuth: protecting user accounts from password database leaks.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

The man who <i>was</i> there: validating check-ins in location-based services.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
kGuard: Lightweight Kernel Protection.
login Usenix Mag., 2012

Towards a Universal Data Provenance Framework Using Dynamic Instrumentation.
Proceedings of the Information Security and Privacy Research, 2012

Digging up social structures from documents on the web.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Exploiting split browsers for efficiently protecting user data.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Modern techniques for the detection and prevention of web2.0 attacks
PhD thesis, 2011

we.b: the web of short urls.
Proceedings of the 20th International Conference on World Wide Web, 2011

CensMon: A Web Censorship Monitor.
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet, 2011

2010
Understanding the behavior of malicious applications in social networks.
IEEE Netw., 2010

xJS: Practical XSS Prevention for Web Application Development.
Proceedings of the USENIX Conference on Web Application Development, 2010

An Architecture for Enforcing JavaScript Randomization in Web2.0 Applications.
Proceedings of the Information Security - 13th International Conference, 2010

D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks.
Proceedings of the Computer Security, 2010

2009
WISDOM: security-aware fibres.
Proceedings of the Second European Workshop on System Security, 2009

2008
Topnet: A Network-aware top(1).
Proceedings of the 22nd Large Installation System Administration Conference, 2008

Compromising Anonymity Using Packet Spinning.
Proceedings of the Information Security, 11th International Conference, 2008

Antisocial Networks: Turning a Social Network into a Botnet.
Proceedings of the Information Security, 11th International Conference, 2008

2007
GAS: Overloading a File Sharing Network as an Anonymizing System.
Proceedings of the Advances in Information and Computer Security, 2007

2006
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart.
Proceedings of the Communications and Multimedia Security, 2006

Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006


  Loading...