|
Publications |
Model Aggregation for Distributed Content Anomaly Detection |
Sean Whalen, Nathaniel Boggs, Salvatore J. Stolfo |
In the Proceedings of the 7th ACM Workshop on Artificial Intelligence and Security (AISec), November 2014. |
Pebbles: Fine-Grained Data Management Abstractions for Modern Operating Systems |
Riley Spahn, Jonathan Bell, Michael Lee, Sravan Bhamidipati, Roxana Geambasu, Gail Kaiser |
In the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI), October 2014. |
Unsupervised Anomaly-based Malware Detection using Hardware Features |
Adrian Tang, Simha Sethumadhavan, Salvatore Stolfo |
In the Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), September 2014. |
Synthetic Data Generation and Defense in Depth Measurement of Web Applications |
Nathaniel Boggs, Hang Zhao, Senyao Du, Salvatore J. Stolfo |
In the Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), September 2014. |
XRay: Increasing the Web's Transparency with Differential Correlation |
Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Chaintreau, and Roxana Geambasu |
In the Proceedings of the 23rd USENIX Security Symposium, August 2014. |
SAuth: Protecting User Accounts from Password Database Leaks |
George Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis |
In the Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS), November 2013. |
Parrot: a Practical Runtime for Deterministic, Stable, and Reliable Threads |
Heming Cui, Jiri Simsa, Yi-Hong Lin, Hao Li, Ben Blum, Junfeng Yang,
Garth A. Gibson, and Randal E. Bryant |
In the Proceedings of the 24th ACM Symposium on Operating Systems Principles (SOSP), November 2013. |
vTube: Efficient Streaming of Virtual Appliances Over Last-Mile Networks |
Yoshihisa Abe, Roxana Geambasu, Kaustubh Joshi, H. Andres Lagar-Cavilla, and Mahadev Satyanarayanan. |
In the Proceedings of the ACM Symposium on Cloud Computing (SOCC), October 2013. |
CloudFence: Data Flow Tracking as a Cloud Service |
Vasilis Pappas, Vasileios P. Kemerlis, Angeliki Zavou, Michalis Polychronakis,
and Angelos D. Keromytis |
In the Proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), October 2013. |
CellFlood: Attacking Tor Onion Routers on the Cheap |
Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas, and Angelos D. Keromytis |
In the Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS), September 2013. |
Determinism Is Not Enough: Making Parallel Programs Reliable with
Stable Multithreading |
Junfeng Yang, Heming Cui, Jingyue Wu, Yang Tang, Gang Hu |
To appear in the Communications of the ACM, 2013. |
Effective Dynamic Detection of Alias Analysis Errors |
Jingyue Wu, Gang Hu, Yang Tang, Junfeng Yang |
In the Proceedings of the 9th joint meeting of the European Software
Engineering Conference and the ACM SIGSOFT International Symposium on
Foundations of Software Engineering (ESEC-FSE), August 2013. |
Cloud resiliency and security via diversified replica execution and monitoring |
Azzedine Benameur, Nathan S. Evans, and Matthew C. Elder |
In the Proceedings of the 6th International Symposium on Resilient Control Systems (ISRCS), August 2013. |
MOTAG: Moving Target Defense Against Internet Denial of Service Attacks |
Quan Jia, Kun Sun, and Angelos Stavou |
In the Proceedings of the 22nd International Conference on Computer Communications and Networks (ICCCN), July 2013. |
Cloudopsy: an Autopsy of Data Flows in the Cloud |
Angeliki Zavou, Vasilis Pappas, Vasileios P. Kemerlis, Michalis Polychronakis,
Georgios Portokalidis, and Angelos D. Keromytis |
In the Proceedings of the Human Computer Interaction International 2013 (HCI), July 2013. |
On the Feasibility of Online Malware Detection with Performance Counters |
John Demme, Matthew Maycock, Jared Schmitz, Adrian Tang, Simha Sethumadhavan,
and Sal Stolfo |
In the Proceedings of the 40th International Symposium on Computer Architecture (ISCA), June 2013. |
Sound and Precise Analysis of Parallel Programs through Schedule
Specialization |
Jingyue Wu, Yang Tang, Gang Hu, Heming Cui, Junfeng
Yang |
In the Proceedings of the 33rd ACM SIGPLAN Conference on
Programming Language Design and Implementation (PLDI), June 2012. |
Concurrency Attacks |
Junfeng Yang, Ang Cui, Sal Stolfo, and Simha
Sethumadhavan |
In the Proceedings of the 4th USENIX Workshop on Hot Topics in
Parallelism (HOTPAR), June 2012. |
CleanOS: Limiting Mobile Data Exposure with Idle Eviction |
Yang Tang, Phillip Ames, Sravan Bhamidipati, Ashish Bijlani,
Roxana Geambasu, and Nikhil Sarda |
In the Proceedings of the 10th USENIX Symposium on Operating
Systems Design and Implementation (OSDI), October 2012. |
Self-healing Multitier Architectures Using Cascading Rescue
Points |
Angeliki Zavou, Georgios Portokalidis,
and Angelos D. Keromytis |
In the Proceedings of the 2012 Annual Computer Security
Applications Conference (ACSAC), December 2012. |
Exploiting Split Browsers for Efficiently Protecting User
Data |
Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis,
and Angelos D. Keromytis |
In the Proceedings of CCSW 2012: The ACM Cloud Computing Security
Workshop, October 2012. |
Adaptive Defenses for Commodity Software through Virtual
Application Partitioning |
Dimitris Geneiatakis, Georgios Portokalidis,
Vasileios P. Kemerlis, and Angelos D. Keromytis |
In the Proceedings of the 19th ACM Conference on Computer and
Communications Security (CCS), October 2012. |
Lost in Translation: Improving Decoy Documents via Automated
Translation |
Jonathan Voris, Nathaniel Boggs, and Salvatore J.
Stolfo |
In the Proceedings of the Workshop on Research for Insider Threat
(WRIT), May 2012. |
Fog Computing: Mitigating Insider Data Theft Attacks in the
Cloud |
Salvatore J. Stolfo, Malek Ben Salem, and Angelos D.
Keromytis |
In the Proceedings of the Workshop on Research for Insider Threat
(WRIT), May 2012. |
Position Paper: The MEERKATS Cloud Security Architecture |
Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan,
Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier,
Matthew Elder, Darrell Kienzle, and Angelos Stavrou |
In the Proceedings of the 3rd International Workshop on Security
and Privacy in Cloud Computing (ICDCS-SPCC), June 2012. |
Towards a Universal Data Provenance Framework using Dynamic
Instrumentation |
Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos,
Angelos D. Keromytis, and Sotiris Ioannidis |
In the Proceedings of the 27th IFIP International Information
Security and Privacy Conference (SEC), June 2012. (Acceptance rate: 25%) |
|
|
Latest News |
|
09/19/14 |
New York Times Technology Blog coverage of XRay project:
"XRay: A New Tool for Tracking the Use of Personal Data on the Web,"
Steve Lohr, August 2014.
|
09/03/14 |
Our paper "Model Aggregation for Distributed Content Anomaly Detection" is to appear in the 7th ACM Workshop on Artificial Intelligence and Security (AISec). |
07/24/14 |
Our paper "Pebbles: Fine-Grained Data Management Abstractions for Modern Operating Systems" is to appear in the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI). |
05/27/14 |
Our paper "Unsupervised Anomaly-based Malware Detection using Hardware Features" is to appear in the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). |
05/27/14 |
Our paper "Synthetic Data Generation and Defense in Depth Measurement of Web Applications" is to appear in the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). |
|