Michalis Polychronakis

According to our database1, Michalis Polychronakis authored at least 92 papers between 2003 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Kernel Protection Against Just-In-Time Code Reuse.
ACM Trans. Priv. Secur., 2019

Defending Against Web Application Attacks: Approaches, Challenges and Implications.
IEEE Trans. Dependable Sec. Comput., 2019

Measuring I2P Censorship at a Global Scale.
CoRR, 2019

Measuring I2P Censorship at a Global Scale.
Proceedings of the 9th USENIX Workshop on Free and Open Communications on the Internet, 2019

SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Is Privacy possible without Anonymity?: The case for microblogging services.
Proceedings of the 12th European Workshop on Systems Security, 2019

Configuration-Driven Software Debloating.
Proceedings of the 12th European Workshop on Systems Security, 2019

The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation.
CoRR, 2018

An Empirical Study of the I2P Anonymity Network and its Censorship Resistance.
CoRR, 2018

Compiler-Assisted Code Randomization.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

A Large-scale Analysis of Content Modification by Open HTTP Proxies.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

An Empirical Study of the I2P Anonymity Network and its Censorship Resistance.
Proceedings of the Internet Measurement Conference 2018, 2018

Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Shredder: Breaking Exploits through API Specialization.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Design and Implementation of a Stateful Network Packet Processing Framework for GPUs.
IEEE/ACM Trans. Netw., 2017

Measurement, Modeling, and Analysis of the Mobile App Ecosystem.
TOMPECS, 2017

Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

Revisiting Browser Security in the Modern Era: New Data-Only Attacks and Defenses.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
TopoMan: Global Network Visibility in the Presence of Middleboxes (A Graybox Approach).
CoRR, 2016

PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks.
Computers & Security, 2016

Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

No-Execute-After-Read: Preventing Code Disclosure in Commodity Software.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Juggling the Gadgets: Binary-level Code Randomization using Instruction Displacement.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
GPU-assisted malware.
Int. J. Inf. Sec., 2015

Detection and analysis of eavesdropping in anonymous communication networks.
Int. J. Inf. Sec., 2015

The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

GPU-Disasm: A GPU-Based X86 Disassembler.
Proceedings of the Information Security - 18th International Conference, 2015

DynaGuard: Armoring Canary-based Protections against Brute-force Attacks.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks.
IEEE Journal on Selected Areas in Communications, 2014

RAPID: Traffic-agnostic intrusion detection for resource-constrained wireless mesh networks.
Computers & Security, 2014

ret2dir: Rethinking Kernel Isolation.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

GASPP: A GPU-Accelerated Stateful Packet Processing Framework.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

Dynamic Reconstruction of Relocation Information for Stripped Binaries.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Rage against the virtual machine: hindering dynamic analysis of Android malware.
Proceedings of the Seventh European Workshop on System Security, 2014

PixelVault: Using GPUs for Securing Cryptographic Operations.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

IntFlow: improving the accuracy of arithmetic error detection using information flow tracking.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

Computational Decoys for Cloud Security.
Proceedings of the Secure Cloud Computing, 2014

2013
Practical Software Diversification Using In-Place Code Randomization.
Proceedings of the Moving Target Defense II, 2013

Transparent ROP Exploit Mitigation Using Indirect Branch Tracing.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

CloudFence: Data Flow Tracking as a Cloud Service.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Server-Side Code Injection Attacks: A Historical Perspective.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Rise of the planet of the apps: a systematic study of the mobile app ecosystem.
Proceedings of the 2013 Internet Measurement Conference, 2013

Scap: stream-oriented network traffic capture and analysis for high-speed networks.
Proceedings of the 2013 Internet Measurement Conference, 2013

PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Cloudopsy: An Autopsy of Data Flows in the Cloud.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

k-subscription: privacy-preserving microblogging browsing through obfuscation.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Minimizing information disclosure to third parties in social login platforms.
Int. J. Inf. Sec., 2012

Improving the performance of passive network monitoring applications with memory locality enhancements.
Computer Communications, 2012

Privacy-Preserving Social Plugins.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Tolerating Overload Attacks Against Packet Capturing Systems.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Reverse Engineering of Malware Emulators.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Detecting Traffic Snooping in Tor Using Decoys.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

ROP payload detection using speculative code execution.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms.
Proceedings of the Information Security, 14th International Conference, 2011

Parallelization and characterization of pattern matching using GPUs.
Proceedings of the 2011 IEEE International Symposium on Workload Characterization, 2011

Combining static and dynamic analysis for the detection of malicious documents.
Proceedings of the Fourth European Workshop on System Security, 2011

dead.drop: URL-Based Stealthy Messaging.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011

MIDeA: a multi-parallel intrusion detection architecture.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage.
Proceedings of the MASCOTS 2010, 2010

GPU-assisted malware.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

Improving the accuracy of network intrusion detection systems under load using selective packet discarding.
Proceedings of the Third European Workshop on System Security, 2010

Comprehensive shellcode detection using runtime heuristics.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Real-world Detection of Polymorphic Attacks.
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009

Regular Expression Matching on Graphics Hardware for Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Realistic Passive Packet Loss Measurement for High-Speed Networks.
Proceedings of the Traffic Monitoring and Analysis, First International Workshop, 2009

An Empirical Study of Real-world Polymorphic Code Injection Attacks.
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009

Deep packet anonymization.
Proceedings of the Second European Workshop on System Security, 2009

2008
LOBSTER: a European platform for passive network traffic monitoring.
Proceedings of the 4th International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2008), 2008

Gnort: High Performance Network Intrusion Detection Using Graphics Processors.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

Topnet: A Network-aware top(1).
Proceedings of the 22nd Large Installation System Administration Conference, 2008

Prototype Implementation Of A Demand Driven Network Monitoring Architecture.
Proceedings of the Grid Computing, 2008

2007
Network-level polymorphic shellcode detection using emulation.
Journal in Computer Virology, 2007

Emulation-Based Detection of Non-self-contained Polymorphic Shellcode.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

Improving the Performance of Passive Network Monitoring Applications using Locality Buffering.
Proceedings of the 15th International Symposium on Modeling, 2007

2006
Architecture of a Network Monitoring Element.
Proceedings of the 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), 2006

DiMAPI: An Application Programming Interface for Distributed Network Monitoring.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Network-Level Polymorphic Shellcode Detection Using Emulation.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

2005
Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

2004
Performance Analysis of Content Matching Intrusion Detection Systems.
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004

Design of an application programming interface for IP network monitoring.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

2003
E2xB: A Domain-Specific String Matching Algorithm for Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003


  Loading...