Georgios Portokalidis
Orcid: 0000-0002-1665-803XAffiliations:
- Stevens Institute of Technology, NJ, USA
According to our database1,
Georgios Portokalidis
authored at least 54 papers
between 2004 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
2021
CoRR, 2021
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the Programming Languages and Systems - 19th Asian Symposium, 2021
2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Redirect2Own: Protecting the Intellectual Property of User-uploaded Content through Off-site Indirect Access.
CoRR, 2018
CoRR, 2018
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018
2017
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Location-enhanced authentication using the IoT: because you cannot be in two places at once.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Int. J. Inf. Sec., 2015
Comput. Commun., 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 16th Annual Middleware Conference, Vancouver, BC, Canada, December 07, 2015
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014
The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones.
Proceedings of the Seventh European Workshop on System Security, 2014
2013
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the Moving Target Defense, 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the Advances in Information and Computer Security, 2011
Proceedings of the Advances in Information and Computer Security, 2011
A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS.
Proceedings of the Information Systems Security - 7th International Conference, 2011
2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2008
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008
2007
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots.
Comput. Networks, 2007
2006
Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation.
Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006, 2006
2004
Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004), 2004