Stelios Sidiroglou-Douskos

According to our database1, Stelios Sidiroglou-Douskos authored at least 37 papers between 2003 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
CodeCarbonCopy.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

2016
IEEE SecDev 2016: Prioritizing Secure Development.
IEEE Secur. Priv., 2016

AutoRand: Automatic Keyword Randomization to Prevent Injection Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
Missing the Point(er): On the Effectiveness of Code Pointer Integrity.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Automatic error elimination by horizontal code transfer across multiple applications.
Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015

Principled Sampling for Anomaly Detection.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Program fracture and recombination for efficient automatic code reuse.
Proceedings of the 2015 IEEE High Performance Extreme Computing Conference, 2015

Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

2014
Sound input filter generation for integer overflow errors.
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014

Automatic runtime error repair and containment via recovery shepherding.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014

2013
A source-to-source transformation tool for error fixing.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2013

2012
Dancing with uncertainty.
Proceedings of the 2012 ACM workshop on Relaxing synchronization for multicore and manycore scalability, 2012

Automatic input rectification.
Proceedings of the 34th International Conference on Software Engineering, 2012

2011
Managing performance vs. accuracy trade-offs with loop perforation.
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011

Dynamic knobs for responsive power-aware computing.
Proceedings of the 16th International Conference on Architectural Support for Programming Languages and Operating Systems, 2011

2010
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Patterns and statistical analysis for understanding reduced resource computing.
Proceedings of the 25th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2010

Quality of service profiling.
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

An Adversarial Evaluation of Network Signaling and Control Mechanisms.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

2009
Automatically patching errors in deployed software.
Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, 2009

ASSURE: automatic software self-healing using rescue points.
Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems, 2009

2007
Composite Hybrid Techniques For Defending Against Targeted Attacks.
Proceedings of the Malware Detection, 2007

Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Using Rescue Points to Navigate Software Recovery.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

2006
Execution transactions for defending against software failures: use and evaluation.
Int. J. Inf. Sec., 2006

Privacy as an Operating System Service.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006

Software Self-Healing Using Collaborative Application Communities.
Proceedings of the Network and Distributed System Security Symposium, 2006

2005
Hardware support for self-healing software services.
SIGARCH Comput. Archit. News, 2005

Countering Network Worms Through Automatic Patch Generation.
IEEE Secur. Priv., 2005

Detecting Targeted Attacks Using Shadow Honeypots.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Building a Reactive Immune System for Software Services.
Proceedings of the 2005 USENIX Annual Technical Conference, 2005

Speculative virtual verification: policy-constrained speculative execution.
Proceedings of the New Security Paradigms Workshop 2005, 2005

A Dynamic Mechanism for Recovering from Buffer Overflow Attacks.
Proceedings of the Information Security, 8th International Conference, 2005

An Email Worm Vaccine Architecture.
Proceedings of the Information Security Practice and Experience, 2005

Highlights from the 2005 New Security Paradigms Workshop.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2003
A Network Worm Vaccine Architecture.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003


  Loading...