Petros Efstathopoulos

According to our database1, Petros Efstathopoulos authored at least 19 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages.
Proceedings of the 32nd USENIX Security Symposium, 2023

2019
The Case of Adversarial Inputs for Secure Similarity Approximation Protocols.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
Utility-Driven Graph Summarization.
Proc. VLDB Endow., 2018

2017
Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs.
IACR Cryptol. ePrint Arch., 2017

Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Efficient Routing for Cost Effective Scale-Out Data Architectures.
Proceedings of the 24th IEEE International Symposium on Modeling, 2016

2015
TrackAdvisor: Taking Back Browsing Privacy from Third-Party Trackers.
Proceedings of the Passive and Active Measurement - 16th International Conference, 2015

Soothsayer: Predicting Capacity Usage in Backup Storage Systems.
Proceedings of the 23rd IEEE International Symposium on Modeling, 2015

Harbormaster: Policy Enforcement for Containers.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

2014
Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

2012
Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

File routing middleware for cloud deduplication.
Proceedings of the 2nd International Workshop on Cloud Computing Platforms, 2012

The Provenance of WINE.
Proceedings of the 2012 Ninth European Dependable Computing Conference, 2012

2011
Building a High-performance Deduplication System.
Proceedings of the 2011 USENIX Annual Technical Conference, 2011

2010
Rethinking Deduplication Scalability.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Storage and File Systems, 2010

2009
Practical study of a defense against low-rate TCP-targeted DoS attack.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

2008
Manageable fine-grained information flow.
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008

2007
Labels and event processes in the Asbestos operating system.
ACM Trans. Comput. Syst., 2007

2005
Make Least Privilege a Right (Not a Privilege).
Proceedings of HotOS'05: 10th Workshop on Hot Topics in Operating Systems, 2005


  Loading...