Vasilis Pappas

According to our database1, Vasilis Pappas authored at least 18 papers between 2008 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Geoinformation Technologies in Support of Environmental Hazards Monitoring under Climate Change: An Extensive Review.
ISPRS Int. J. Geo Inf., 2021

2015
Defending against Return-Oriented Programming.
PhD thesis, 2015

Experiences Deploying a Transparent Split TCP Middlebox and the Implications for NFV.
Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization, 2015

2014
Blind Seer: A Scalable Private DBMS.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Dynamic Reconstruction of Relocation Information for Stripped Binaries.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

2013
Practical Software Diversification Using In-Place Code Randomization.
Proceedings of the Moving Target Defense II, 2013

Transparent ROP Exploit Mitigation Using Indirect Branch Tracing.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

CloudFence: Data Flow Tracking as a Cloud Service.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Cloudopsy: An Autopsy of Data Flows in the Cloud.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

CellFlood: Attacking Tor Onion Routers on the Cheap.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Towards a Universal Data Provenance Framework Using Dynamic Instrumentation.
Proceedings of the Information Security and Privacy Research, 2012

2011
Private search in the real world.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

Measuring the Deployment Hiccups of DNSSEC.
Proceedings of the Advances in Computing and Communications, 2011

2010
xJS: Practical XSS Prevention for Web Application Development.
Proceedings of the USENIX Conference on Web Application Development, 2010

Crimeware Swindling without Virtual Machines.
Proceedings of the Information Security - 13th International Conference, 2010

Evaluation of a Spyware Detection System Using Thin Client Computing.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

2008
Compromising Anonymity Using Packet Spinning.
Proceedings of the Information Security, 11th International Conference, 2008


  Loading...