


Остановите войну!
for scientists:
Angelos Stavrou
Person information

- affiliation: Virginia Tech, VA, USA
- affiliation (former): George Mason University, Fairfax, Virginia, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j32]Xing Gao, Jidong Xiao, Haining Wang, Angelos Stavrou
:
Understanding the Security Implication of Aborting Virtual Machine Live Migration. IEEE Trans. Cloud Comput. 10(2): 1275-1286 (2022) - [c114]Sunanda Roy, Angelos Stavrou, Brian L. Mark, Kai Zeng, Sai Manoj P. D., Khaled N. Khasawneh:
Characterization of AES Implementations on Microprocessor-based IoT Devices. WCNC 2022: 55-60 - [c113]Tolga O. Atalay, Dragoslav Stojadinovic, Angelos Stavrou, Haining Wang:
Scaling Network Slices with a 5G Testbed: A Resource Consumption Study. WCNC 2022: 2649-2654 - [i9]Alireza Famili, Angelos Stavrou, Haining Wang, Jung-Min Jerry Park:
PILOT: High-Precision Indoor Localization for Autonomous Drones. CoRR abs/2201.10488 (2022) - [i8]Alireza Famili, Angelos Stavrou, Haining Wang, Jung-Min Park:
OPTILOD: Optimal Beacon Placement for High-Accuracy Indoor Localization of Drones. CoRR abs/2201.10691 (2022) - 2021
- [j31]Emily Stark, Joe DeBlasio, Devon O'Brien, Davide Balzarotti, William Enck, Samuel King, Angelos Stavrou:
Certificate Transparency in Google Chrome: Past, Present, and Future. IEEE Secur. Priv. 19(6): 112-118 (2021) - [c112]Joseph Connelly, Taylor Roberts, Xing Gao, Jidong Xiao, Haining Wang, Angelos Stavrou
:
CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection. DSN 2021: 350-362 - [c111]Panagiotis Chatzigiannis, Foteini Baldimtsi, Constantinos Kolias, Angelos Stavrou:
Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors. IoTDI 2021: 1-14 - [c110]Yuede Ji, Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou:
DEFInit: An Analysis of Exposed Android Init Routines. USENIX Security Symposium 2021: 3685-3702 - [i7]Panagiotis Chatzigiannis
, Foteini Baldimtsi, Constantinos Kolias, Angelos Stavrou:
Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors. CoRR abs/2103.04028 (2021) - 2020
- [j30]Eric Osterweil
, Angelos Stavrou
, Lixia Zhang:
21 Years of Distributed Denial-of Service: Current State of Affairs. Computer 53(7): 88-92 (2020) - [j29]Eric Osterweil
, Angelos Stavrou
, Lixia Zhang:
21 Years of Distributed Denial-of-Service: A Call to Action. Computer 53(8): 94-99 (2020) - [j28]Fred Douglis, Angelos Stavrou:
Distributed Ledger Technologies. IEEE Internet Comput. 24(3): 5-6 (2020) - [j27]Yong Yuan, Shouyang Wang, David L. Olson, James H. Lambert, Fei-Yue Wang, Chunming Rong
, Angelos Stavrou, Jun Zhang, Qiang Tang, Foteini Baldimtsi, Laurence T. Yang, Desheng Wu:
Guest Editorial Special Issue on Blockchain and Economic Knowledge Automation. IEEE Trans. Syst. Man Cybern. Syst. 50(1): 2-8 (2020) - [c109]Ataollah Fatahi Baarzi, George Kesidis, Dan Fleck, Angelos Stavrou
:
Microservices made attack-resilient using unsupervised service fissioning. EuroSec@EuroSys 2020: 31-36 - [c108]Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou
, Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin
:
FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware. USENIX Security Symposium 2020: 2379-2396 - [i6]Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky, Mohamed Elsabagh, Nikolaos Kiourtis, Brian Schulte, Angelos Stavrou:
Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing. CoRR abs/2012.13053 (2020) - [i5]Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky, Mohamed Elsabagh, Nikolaos Kiourtis, Brian Schulte, Angelos Stavrou:
Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing. IACR Cryptol. ePrint Arch. 2020: 1599 (2020)
2010 – 2019
- 2019
- [i4]Eric Osterweil, Angelos Stavrou, Lixia Zhang:
20 Years of DDoS: a Call to Action. CoRR abs/1904.02739 (2019) - 2018
- [j26]Jeffrey M. Voas, Rick Kuhn, Constantinos Kolias, Angelos Stavrou, Georgios Kambourakis:
Cybertrust in the IoT Age. Computer 51(7): 12-15 (2018) - [j25]Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou
:
On early detection of application-level resource exhaustion and starvation. J. Syst. Softw. 137: 430-447 (2018) - [j24]Fengwei Zhang
, Kevin Leach, Angelos Stavrou
, Haining Wang:
Towards Transparent Debugging. IEEE Trans. Dependable Secur. Comput. 15(2): 321-335 (2018) - [c107]Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou
, Jeff Offutt:
Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities. AsiaCCS 2018: 777-791 - [c106]Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou
:
Resilient and Scalable Cloned App Detection Using Forced Execution and Compression Trees. DSC 2018: 1-8 - [c105]Daniel Fleck, Angelos Stavrou
, George Kesidis, Neda Nasiriani, Yuquan Shan, Takis Konstantopoulos:
Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model. DSC 2018: 1-8 - [c104]Haitao Xu, Zhao Li
, Chen Chu, Yuanmi Chen, Yifan Yang, Haifeng Lu, Haining Wang, Angelos Stavrou:
Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace. ESORICS (2) 2018: 143-163 - [c103]George Kesidis, Yuquan Shan, Daniel Fleck, Angelos Stavrou, Takis Konstantopoulos:
An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*. MALWARE 2018: 61-67 - [c102]Shuai Hao, Yubao Zhang, Haining Wang, Angelos Stavrou
:
End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks. USENIX Security Symposium 2018: 1129-1145 - [e9]Angelos Stavrou, Konrad Rieck:
Proceedings of the 11th European Workshop on Systems Security, EuroSec@EuroSys 2018, Porto, Portugal, April 23, 2018. ACM 2018 [contents] - 2017
- [j23]Angelos Stavrou, Jeffrey M. Voas:
Verified Time. Computer 50(3): 78-82 (2017) - [j22]Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou
, Jeffrey M. Voas:
DDoS in the IoT: Mirai and Other Botnets. Computer 50(7): 80-84 (2017) - [j21]Jean-Pierre Auffret, Jane L. Snowdon, Angelos Stavrou, Jeffrey S. Katz, Diana Kelley, Rasheq S. Rahman, Frank Stein, Lisa Sokol, Peter Allor, Peng Warweg:
Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems. J. Interconnect. Networks 17(1): 1740001:1-1740001:20 (2017) - [j20]Haitao Xu, Daiping Liu, Haining Wang, Angelos Stavrou:
An Empirical Investigation of Ecommerce-Reputation-Escalation-as-a-Service. ACM Trans. Web 11(2): 13:1-13:35 (2017) - [c101]Avinash Srinivasan, Hunter Dong, Angelos Stavrou:
FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance. ARES 2017: 82:1-82:8 - [c100]Mohamed Elsabagh, Dan Fleck, Angelos Stavrou:
Strict Virtual Call Integrity Checking for C++ Binaries. AsiaCCS 2017: 140-154 - [c99]Ghassan O. Karame, Angelos Stavrou:
CCSW'17: 2017 ACM Cloud Computing Security. CCS 2017: 2627-2628 - [c98]Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou:
Detecting ROP with Statistical Learning of Program Characteristics. CODASPY 2017: 219-226 - [c97]Daiping Liu, Xing Gao, Mingwei Zhang, Haining Wang, Angelos Stavrou:
Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency. DSN 2017: 615-626 - [c96]Constantinos Kolias, Lucas Copi, Fengwei Zhang, Angelos Stavrou:
Breaking BLE Beacons For Fun But Mostly Profit. EUROSEC 2017: 4:1-4:6 - [c95]Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang, Angelos Stavrou:
E-Android: A New Energy Profiling Tool for Smartphones. ICDCS 2017: 492-502 - [c94]Jonathan Bell, Thomas D. LaToza, Foteini Baldimtsi, Angelos Stavrou:
Advancing Open Science with Version Control and Blockchains. SE4Science@ICSE 2017: 13-14 - [c93]Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems. MALWARE 2017: 67-74 - [c92]Georgios Kambourakis, Constantinos Kolias, Angelos Stavrou:
The Mirai botnet and the IoT Zombie Armies. MILCOM 2017: 267-272 - [c91]Ryan Johnson, Rahul Murmuria, Angelos Stavrou, Vincent Sritapan:
Pairing continuous authentication with proactive platform hardening. PerCom Workshops 2017: 88-90 - [c90]Rahul Murmuria, Angelos Stavrou, Daniel Barbará, Vincent Sritapan:
Your data in your hands: Privacy-preserving user behavior models for context computation. PerCom Workshops 2017: 170-175 - [c89]Mohamed Elsabagh, Dan Fleck, Angelos Stavrou, Michael Kaplan, Thomas Bowen:
Practical and Accurate Runtime Application Protection Against DoS Attacks. RAID 2017: 450-471 - [e8]Bhavani M. Thuraisingham, Ghassan Karame, Angelos Stavrou:
Proceedings of the 9th Cloud Computing Security Workshop, CCSW@CCS 2017, Dallas, TX, USA, November 3, 2017. ACM 2017, ISBN 978-1-4503-5204-8 [contents] - [e7]Cristiano Giuffrida, Angelos Stavrou:
Proceedings of the 10th European Workshop on Systems Security, EUROSEC 2017, Belgrade, Serbia, April 23, 2017. ACM 2017, ISBN 978-1-4503-4935-2 [contents] - [i3]Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems. CoRR abs/1704.06794 (2017) - [i2]Neda Nasiriani, Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks. CoRR abs/1712.01102 (2017) - 2016
- [j19]Angelos Stavrou
, Daniel Fleck, Constantinos Kolias:
On the Move: Evading Distributed Denial-of-Service Attacks. Computer 49(3): 104-107 (2016) - [j18]Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou
, Stefanos Gritzalis
:
Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset. IEEE Commun. Surv. Tutorials 18(1): 184-208 (2016) - [j17]Constantinos Kolias, Angelos Stavrou
, Jeffrey M. Voas, Irena Bojanova, D. Richard Kuhn:
Learning Internet-of-Things Security "Hands-On". IEEE Secur. Priv. 14(1): 37-46 (2016) - [c88]Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou
:
Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms. ACNS 2016: 193-211 - [c87]Charles Smutz, Angelos Stavrou:
When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors. NDSS 2016 - [c86]Rahul Murmuria, Angelos Stavrou:
Authentication Feature and Model Selection using Penalty Algorithms. WAY@SOUPS 2016 - 2015
- [j16]Constantinos Kolias, Angelos Stavrou
, Jeffrey M. Voas:
Securely Making "Things" Right. Computer 48(9): 84-88 (2015) - [c85]Fengwei Zhang, Kevin Leach, Haining Wang, Angelos Stavrou
:
TrustLogin: Securing Password-Login on Commodity Operating Systems. AsiaCCS 2015: 333-344 - [c84]Ryan Johnson, Nikolaos Kiourtis, Angelos Stavrou
, Vincent Sritapan:
Analysis of content copyright infringement in mobile application markets. eCrime 2015: 43-52 - [c83]Shuai Hao, Haining Wang, Angelos Stavrou
, Evgenia Smirni:
On the DNS Deployment of Modern Web Services. ICNP 2015: 100-110 - [c82]Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou
, Vincent Sritapan:
Targeted DoS on android: how to disable android in 10 seconds or less. MALWARE 2015: 136-143 - [c81]Charles Smutz, Angelos Stavrou
:
Preventing Exploits in Microsoft Office Documents Through Content Randomization. RAID 2015: 225-246 - [c80]Rahul Murmuria, Angelos Stavrou
, Daniel Barbará, Dan Fleck:
Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users. RAID 2015: 405-424 - [c79]Haitao Xu, Haining Wang, Angelos Stavrou
:
Privacy Risk Assessment on Online Photos. RAID 2015: 427-447 - [c78]Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou
:
Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks. RAID 2015: 515-537 - [c77]Fengwei Zhang, Kevin Leach, Angelos Stavrou
, Haining Wang, Kun Sun
:
Using Hardware Features for Increased Debugging Transparency. IEEE Symposium on Security and Privacy 2015: 55-69 - [c76]Haitao Xu, Daiping Liu, Haining Wang, Angelos Stavrou
:
E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service. WWW 2015: 1296-1306 - 2014
- [j15]Huangxin Wang, Quan Jia, Dan Fleck, Walter Powell, Fei Li, Angelos Stavrou
:
A moving target DDoS defense mechanism. Comput. Commun. 46: 10-21 (2014) - [j14]Fengwei Zhang, Jiang Wang, Kun Sun, Angelos Stavrou
:
HyperCheck: A Hardware-AssistedIntegrity Monitor. IEEE Trans. Dependable Secur. Comput. 11(4): 332-344 (2014) - [c75]Brett Cooley, Haining Wang, Angelos Stavrou
:
Activity Spoofing and Its Defense in Android Smartphones. ACNS 2014: 494-512 - [c74]Daiping Liu, Haining Wang, Angelos Stavrou
:
Detecting Malicious Javascript in PDF through Document Instrumentation. DSN 2014: 100-111 - [c73]Quan Jia, Huangxin Wang, Dan Fleck, Fei Li, Angelos Stavrou
, Walter Powell:
Catch Me If You Can: A Cloud-Enabled DDoS Defense. DSN 2014: 264-275 - [c72]Fengwei Zhang, Haining Wang, Kevin Leach, Angelos Stavrou
:
A Framework to Secure Peripherals at Runtime. ESORICS (1) 2014: 219-238 - [c71]Haitao Xu, Daiping Liu, Aaron Koehl, Haining Wang, Angelos Stavrou
:
Click Fraud Detection on the Advertiser Side. ESORICS (2) 2014: 419-438 - [c70]Sharath Hiremagalore, Daniel Barbará, Dan Fleck, Walter Powell, Angelos Stavrou
:
transAD: An Anomaly Detection Network Intrusion Sensor for the Web. ISC 2014: 477-489 - [e6]Angelos Stavrou
, Herbert Bos, Georgios Portokalidis:
Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings. Lecture Notes in Computer Science 8688, Springer 2014, ISBN 978-3-319-11378-4 [contents] - 2013
- [j13]Sharath Hiremagalore, Chen Liang, Angelos Stavrou
, Huzefa Rangwala:
Improving network response times using social information. Soc. Netw. Anal. Min. 3(2): 209-220 (2013) - [j12]Claudio A. Ardagna
, Sushil Jajodia
, Pierangela Samarati
, Angelos Stavrou
:
Providing Users' Anonymity in Mobile Hybrid Networks. ACM Trans. Internet Techn. 12(3): 7:1-7:33 (2013) - [j11]Quan Jia, Kun Sun, Angelos Stavrou
:
Capability-Based Defenses Against DoS Attacks in Multi-path MANET Communications. Wirel. Pers. Commun. 73(1): 127-148 (2013) - [c69]Dan Fleck, Arnur G. Tokhtabayev, Alex Alarif, Angelos Stavrou
, Tomas Nykodym:
PyTrigger: A System to Trigger & Extract User-Activated Malware Behavior. ARES 2013: 92-101 - [c68]Scott D. Applegate, Angelos Stavrou:
Towards a Cyber Conflict Taxonomy. CyCon 2013: 1-18 - [c67]Fengwei Zhang, Kevin Leach, Kun Sun
, Angelos Stavrou
:
SPECTRE: A dependable introspection framework via System Management Mode. DSN 2013: 1-12 - [c66]Quan Jia, Kun Sun, Angelos Stavrou
:
MOTAG: Moving Target Defense against Internet Denial of Service Attacks. ICCCN 2013: 1-9 - [c65]Avinash Srinivasan, Srinath Thirthahalli Nazaraj, Angelos Stavrou
:
HIDEINSIDE - A novel randomized & encrypted antiforensic information hiding. ICNC 2013: 626-631 - [c64]Angelos Stavrou
:
Programming on Android: Best Practices for Security and Reliability. SERE 2013: 1-2 - [c63]Mohammad Karami, Mohamed Elsabagh, Parnian Najafiborazjani, Angelos Stavrou
:
Behavioral Analysis of Android Applications Using Automated Instrumentation. SERE (Companion) 2013: 182-187 - [c62]Ryan Johnson, Angelos Stavrou
:
Forced-Path Execution for Android Applications on x86 Platforms. SERE (Companion) 2013: 188-197 - [e5]Salvatore J. Stolfo, Angelos Stavrou
, Charles V. Wright:
Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings. Lecture Notes in Computer Science 8145, Springer 2013, ISBN 978-3-642-41283-7 [contents] - 2012
- [j10]Angelos Stavrou
, Jeffrey M. Voas, Tom Karygiannis, Steve Quirolgico:
Building Security into Off-the-Shelf Smartphones. Computer 45(2): 82-84 (2012) - [j9]Meixing Le, Angelos Stavrou
, Brent ByungHoon Kang:
DoubleGuard: Detecting Intrusions in Multitier Web Applications. IEEE Trans. Dependable Secur. Comput. 9(4): 512-525 (2012) - [c61]Charles Smutz, Angelos Stavrou
:
Malicious PDF detection using metadata and structural features. ACSAC 2012: 239-248 - [c60]Brian Schulte, Haris Andrianakis, Kun Sun, Angelos Stavrou
:
NetGator: Malware Detection Using Program Interactive Challenges. DIMVA 2012: 164-183 - [c59]Jiang Wang, Kun Sun, Angelos Stavrou
:
A dependability analysis of hardware-assisted polling integrity checking systems. DSN 2012: 1-12 - [c58]Jiang Wang, Kun Sun, Angelos Stavrou
:
Hardware-Assisted Application Integrity Monitor. HICSS 2012: 5375-5383 - [c57]Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier
, Matthew C. Elder, Darrell M. Kienzle, Angelos Stavrou
:
The MEERKATS Cloud Security Architecture. ICDCS Workshops 2012: 446-450 - [c56]Riyadh Mahmood, Naeem Esfahani, Thabet Kacem, Nariman Mirzaei, Sam Malek, Angelos Stavrou
:
A whitebox approach for automated security testing of Android applications on the cloud. AST 2012: 22-28 - [c55]Zhaohui Wang, Rahul Murmuria, Angelos Stavrou
:
Implementing and Optimizing an Encryption Filesystem on Android. MDM 2012: 52-62 - [c54]Zhaohui Wang, Ryan Johnson, Rahul Murmuria, Angelos Stavrou
:
Exposing Security Risks for Commercial Mobile Devices. MMM-ACNS 2012: 3-21 - [c53]Chaitanya Yavvari, Arnur G. Tokhtabayev, Huzefa Rangwala, Angelos Stavrou
:
Malware Characterization Using Behavioral Components. MMM-ACNS 2012: 226-239 - [c52]Kun Sun, Jiang Wang, Fengwei Zhang, Angelos Stavrou:
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes. NDSS 2012 - [c51]Sam Malek, Naeem Esfahani, Thabet Kacem, Riyadh Mahmood, Nariman Mirzaei, Angelos Stavrou
:
A Framework for Automated Security Testing of Android Applications on the Cloud. SERE (Companion) 2012: 35-36 - [c50]Zhaohui Wang, Angelos Stavrou
:
Attestation & Authentication for USB Communications. SERE (Companion) 2012: 43-44 - [c49]Ryan Johnson, Zhaohui Wang, Corey Gagnon, Angelos Stavrou
:
Analysis of Android Applications' Permissions. SERE (Companion) 2012: 45-46 - [c48]Rahul Murmuria, Jeffrey Medsger, Angelos Stavrou
, Jeffrey M. Voas:
Mobile Application and Device Power Usage Measurements. SERE 2012: 147-156 - [c47]Nelson Nazzicari, Javier Almillategui, Angelos Stavrou
, Sushil Jajodia
:
Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification. STM 2012: 161-176 - 2011
- [j8]Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia
, Angelos Stavrou
:
The ephemeral legion: producing an expert cyber-security work force from thin air. Commun. ACM 54(1): 129-131 (2011) - [c46]Chen Liang, Sharath Hiremagalore, Angelos Stavrou
, Huzefa Rangwala:
Predicting Network Response Times Using Social Information. ASONAM 2011: 527-531 - [c45]Bo Yu, J. Varga, Duminda Wijesekera, Angelos Stavrou
, Anoop Singhal:
Specifying Time-Out Points in Surgical EMRs-Work in Progress. CENTERIS (3) 2011: 165-174 - [c44]Angelos D. Keromytis, Salvatore J. Stolfo, Junfeng Yang, Angelos Stavrou
, Anup K. Ghosh, Dawson R. Engler, Marc Dacier
, Matthew C. Elder, Darrell M. Kienzle:
The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security. SysSec@DIMVA 2011: 53-56 - [c43]Erin Kenneally, Angelos Stavrou
, John McHugh, Nicolas Christin:
Moving Forward, Building an Ethics Community (Panel Statements). Financial Cryptography Workshops 2011: 178-183 - [c42]Quan Jia, Kun Sun, Angelos Stavrou
:
CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET. ICCCN 2011: 1-6 - [c41]Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou
, Salvatore J. Stolfo:
Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close. RAID 2011: 142-160 - [c40]Jiang Wang, Fengwei Zhang, Kun Sun, Angelos Stavrou
:
Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics. SADFE 2011: 1-5 - [c39]Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou
, Anup K. Ghosh, Sushil Jajodia
:
Trading Elephants for Ants: Efficient Post-attack Reconstitution. SecureComm 2011: 460-469 - [r2]Angelos Stavrou:
Overlay-Based DoS Defenses. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 891-897 - [r1]Angelos Stavrou:
TCP Modulation Attacks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1279-1281 - [i1]DaeHun Nyang, Abedelaziz Mohaisen, Taekyoung Kwon, Brent ByungHoon Kang, Angelos Stavrou:
Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface. CoRR abs/1112.2245 (2011) - 2010
- [j7]Yingbo Song, Michael E. Locasto, Angelos Stavrou
, Angelos D. Keromytis, Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems. Mach. Learn. 81(2): 179-205 (2010) - [c38]Zhaohui Wang, Angelos Stavrou
:
Exploiting smart-phone USB connectivity for fun and profit. ACSAC 2010: 357-366 - [c37]Sambuddho Chakravarty, Angelos Stavrou
, Angelos D. Keromytis:
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. ESORICS 2010: 249-267 - [c36]Claudio A. Ardagna
, Sushil Jajodia
, Pierangela Samarati
, Angelos Stavrou
:
Providing Mobile Users' Anonymity in Hybrid Networks. ESORICS 2010: 540-557 - [c35]