|
Publications |
The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines |
Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, and Sotiris Ioannidis |
In Proceedings of the Network and Distributed System Security (NDSS) Symposium, February 2015. |
IntFlow: Improving the Accuracy of Arithmetic Error Detection Using Information Flow Tracking [PDF] |
Kangkook Jee, Theofilos Petsios, Marios Pomonis, Michalis Polychronakis, and Angelos D. Keromytis |
In Proceedings of the 30 th Annual Computer Security Applications Conference (ACSAC), December 2014. (Acceptance rate: 19.9%) |
Large-Scale Evaluation of a Vulnerability Analysis Framework [PDF] |
Nathan Evans, Azzedine Benameur, and Matthew Elder |
In Proceedings of the 7th Workshop on Cyber Security Experimentation and Test (CSET), August 2014. |
Dynamic Reconstruction of Relocation Information for Stripped Binaries [PDF] |
Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis |
In Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), September 2014. (Acceptance rate: 19.5%) |
Size Does Matter - Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard [PDF] |
Enes Goktas, Elias Athanasopoulos, Herbert Bos, Michalis Polychronakis, and Georgios Portokalidis |
In Proceedings of the 23rd USENIX Security Symposium, August 2014. (Acceptance rate: 19%) |
ret2dir: Rethinking Kernel Isolation [PDF] |
Vasileios P. Kemerlis, Michalis Polychronakis, and Angelos D. Keromytis |
In Proceedings of the 23rd USENIX Security Symposium, August 2014. |
Time Randomization to Thwart Concurrency Bug Exploitation [PDF] |
David Tagatac, Sal Stolfo |
In IEEE S&P Poster Reception, May 2014. |
Out Of Control: Overcoming Control-Flow Integrity [PDF] |
Enes Goktas, Elias Athanasopoulos, Herbert Bos, and Georgios Portokalidis |
In Proceedings of the 35th IEEE Symposium on Security and Privacy, May 2014. (Acceptance rate: 13.6%) |
The Best of Both Worlds. A Framework for the Synergistic Operation of Host and Cloud Anomaly-based IDS for Smartphones [PDF] |
Dimitrios Damopoulos, Georgios Kambourakis, and Georgios Portokalidis |
In Proceedings of the 2014 European Workshop on System Security (EUROSEC), April 2014. |
The Other Side of the Fence: How to Protect Against Code Injection Attacks |
Azzedine Benameur, Nathan Evans, Matthew Elder |
In PenTest Magazine, November 2013. |
ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking [PDF] |
Kangkook Jee, Vasileios P. Kemerlis, Angelos D. Keromytis, and Georgios Portokalidis |
In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS), November 2013. (Acceptance rate: 19.8%) |
Parrot: a Practical Runtime for Deterministic, Stable, and Reliable Threads [PDF] |
Heming Cui, Jiri Simsa, Yi-Hong Lin, Hao Li, Ben Blum, Xinan Xu, Junfeng Yang,
Garth A. Gibson, and Randal E. Bryant |
In Proceedings of the 24th ACM Symposium on Operating Systems Principles (SOSP), November 2013. |
An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables [PDF] |
Kapil Anand, Khaled Elwazeer, Aparna Kotha, Matthew Smithson, Rajeev
Barua and Angelos D. Keromytis |
In Proceedings of the 29th IEEE International Conference on Software Maintenance (ICSM), September 2013. |
Effective Dynamic Detection of Alias Analysis Errors [PDF] |
Jingyue Wu, Gang Hu, Yang Tang, Junfeng Yang |
In Proceedings of the Ninth joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC-FSE), August 2013. |
MINESTRONE: Testing the SOUP [PDF] |
Azzedine Benameur, Nathan S. Evans, and Matthew C. Elder |
In Proceedings of the 6th Workshop on Cyber Security Experimentation and Test (CSET), August 2013. |
Determinism Is Overrated: What Really Makes Multithreaded Programs Hard
to Get Right and What Can Be Done about It [PDF] |
Junfeng Yang, Heming Cui, and Jingyue Wu |
In Proceedings of the 5th USENIX Workshop on Hot Topics in Parallelism
(HOTPAR), June 2013. |
Redundant State Detection for Dynamic Symbolic Execution [PDF] |
Suhabe Bugrara and Dawson Engler |
In Proceedings of the USENIX Annual Technical Conference (ATC), June 2013. |
Transparent ROP Exploit Mitigation using Indirect Branch
Tracing [PDF] |
Vasilis Pappas, Michalis Polychronakis, and Angelos D.
Keromytis |
In Proceedings of the 22nd USENIX Security Symposium, August 2013. (Acceptance rate: 16.2%) |
Expression Reduction from Programs in a Symbolic Binary
Executor [PDF] |
Anthony Romano and Dawson Engler |
In Proceedings of the 19th International SPIN Symposium on
Model Checking of Software, July 2013. |
SPECTRE: A Dependable Introspection Framework via System Management Mode [PDF] |
Fengwei Zhang, Kevin Leach, Kun Sun, and Angelos Stavrou |
In Proceedings of 43 rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2013. |
Verifying Systems Rules Using Rule-Directed Symbolic
Execution [PDF] |
Heming Cui, Gang Hu, Jingyue Wu, and Junfeng Yang |
In Proceedings of the 18th International Conference on
Architecture Support for Programming Languages and Operating
Systems (ASPLOS), March 2013. |
When Firmware Modifications Attack: A Case Study of Embedded Exploitation [PDF] |
Ang Cui, Michael Costello, Salvatore J. Stolfo |
In Proceedings of NDSS, February 2013. |
kGuard: Lightweight Kernel Protection [PDF] |
Vasileios P. Kemerlis, Georgios Portokalidis, Elias Athanasopoulos, and Angelos D. Keromytis |
In USENIX ;login: Magazine, November 2012. |
Self-healing Multitier Architectures Using Cascading Rescue
Points [PDF] |
Angeliki Zavou, Georgios Portokalidis,
and Angelos D. Keromytis |
In Proceedings of the 2012 Annual Computer Security
Applications Conference (ACSAC), December 2012. (Acceptance rate: 19%) |
Adaptive Defenses for Commodity Software through Virtual
Application Partitioning [PDF] |
Dimitris Geneiatakis, Georgios Portokalidis,
Vasileios P. Kemerlis, and Angelos D. Keromytis |
In Proceedings of the 19th ACM Conference on Computer and
Communications Security (CCS), October 2012. (Acceptance rate: 18.9%) |
Practical Software Diversification Using In-Place Code Randomization
[PDF] |
Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis |
In Moving Target Defense II: Application of Game Theory and Adversarial Modeling,
Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, and X. Sean Wang (editors), July 2012. |
kGuard: Lightweight Kernel Protection against Return-to-user
Attacks [PDF] |
Vasileios P. Kemerlis, Georgios Portokalidis, and
Angelos D. Keromytis |
In Proceedings of the 21st USENIX Security Symposium, August 2012. (Acceptance rate: 19.4%) |
Concurrency Attacks [PDF] |
Junfeng Yang and Ang Cui and Salvatore J. Stolfo and Simha
Sethumadhavan |
In Proceedings of the 4th USENIX Workshop on Hot
Topics in Parallelism (HotPar), June 2012. |
A Dependability Analysis of Hardware-Assisted Polling Integrity Checking Systems [PDF] |
Jiang Wang, Kun Sun, Angelos Stavrou |
In Proceedings of the 42 nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN), June 2012. |
Sound and Precise Analysis of Multithreaded Programs through
Schedule Specialization [PDF] |
Jingyue Wu, Yang Tang, Gang Hu, Heming Cui, Junfeng
Yang |
In Proceedings of the 2012 ACM SIGPLAN Conference on
Programming Language Design and Implementation (PLDI), June 2012. |
Smashing the Gadgets: Hindering Return-Oriented Programming Using
In-Place Code Randomization [PDF] |
Vasilis Pappas, Michalis Polychronakis, and Angelos D.
Keromytis |
In Proceedings of the 33rd IEEE Symposium on Security &
Privacy (S&P), May 2012. (Acceptance rate: 13%) |
libdft: Practical Dynamic Data Flow Tracking for Commodity
Systems [PDF] |
Vasileios P. Kemerlis, Georgios Portokalidis, Kangkook Jee, and
Angelos D. Keromytis |
In Proceedings of the 8th ACM SIGPLAN/SIGOPS International
Conference on Virtual Execution Environments (VEE), March 2012. |
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted
and Untrusted Commodity OSes [PDF] |
Kun Sun, Jiang Wang, Fengwei Zhang and Angelos
Stavrou |
In Proceedings of the 19th Annual Network and
Distributed System Security Symposium, February 2012. (Acceptance rate: 17.9%) |
A General Approach for Efficiently Accelerating Software-based
Dynamic Data Flow Tracking on Commodity Hardware [PDF] |
Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis,
Soumyadeep Ghosh, David I. August and Angelos D. Keromytis |
In Proceedings of the 19th Annual Network and Distributed System
Security Symposium (NDSS), February 2012. (Acceptance rate: 17.8%) |
From Prey To Hunter: Transforming Legacy Embedded Devices Into
Exploitation Sensor Grids [PDF] |
Ang Cui, Jatin Kataria, and Salvatore J Stolfo |
In Proceedings of the Annual Computer Security Applications
Conference (ACSAC), December 2011. |
ROP Payload Detection Using Speculative Code Execution [PDF] |
Michalis Polychronakis and Angelos D. Keromytis |
In Proceedings of the 6th International Conference on
Malicious and Unwanted Software (MALWARE), October 2011. (Best Paper Award). |
Killing the Myth of Cisco IOS Diversity: Recent Advances in
Reliable Shellcode Design [PDF] |
Ang Cui, Jatin Kataria, and Salvatore J Stolfo |
In Proceedings of the USENIX Workshop on Offensive Technology
(WOOT), August 2011. (also presented at Black Hat 2011). |
Practical Software Model Checking via Dynamic Interface
Reduction [PDF] |
Huayang Guo, Ming Wu, Lidong Zhou, Gang Hu, Junfeng Yang,
Lintao Zhang |
In Proceedings of the 23rd ACM Symposium on Operating Systems
Principles (SOSP), October 2011. |
Efficient Deterministic Multithreading through Schedule
Relaxation [PDF] |
Heming Cui, Jingyue Wu, John Gallagher, Junfeng Yang |
In Proceedings of the 23rd ACM Symposium on Operating Systems
Principles (SOSP), October 2011. |
Pervasive Detection of Process Races in Deployed Systems [PDF] |
Oren Laadan, Chia-che Tsai, Nicolas Viennot, Chris Blinn, Peter
Senyao Du, Junfeng Yang, Jason Nieh |
In Proceedings of the 23rd ACM Symposium on Operating Systems
Principles (SOSP), October 2011. |
Taint-Exchange: a Generic System for Cross-process and Cross-host
Taint Tracking [PDF] |
Angeliki Zavou, Georgios Portokalidis, and Angelos D.
Keromytis |
In Proceedings 6th International Workshop on Security
(IWSEC2011), November 2011. |
REASSURE: A Self-contained Mechanism for Healing Software Using
Rescue Points [PDF] |
Georgios Portokalidis and Angelos D. Keromytis |
In Proceedings 6th International Workshop on Security
(IWSEC2011), November 2011. |
Defending Legacy Embedded Systems with Software Symbiotes
[PDF] |
Ang Cui, Salvatore J. Stolfo |
In Proceedings of the 14th International Symposium on Recent
Advances in Intrusion Detection (RAID), September 2011. |
DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
[PDF] |
Meixing Le, Angelos Stavrou, Brent ByungHoon Kang |
In IEEE Journal on Transactions on Dependable and Secure
Computing (TDSC), December 2011. |
Finding Concurrency Errors in Sequential Code---OS-level, In-vivo
Model Checking of Process Races [PDF] |
Oren Laadan, Chia-che Tsai, Nicolas Viennot, Chris Blinn, Peter
Senyao Du, Junfeng Yang, Jason Nieh |
In Proceedings of the 13th Workshop on Hot Topics in
Operating Systems (HotOS XIII), May 2011. |
The MINESTRONE Architecture: Combining Static and Dynamic
Analysis Techniques for Software Security (Research roadmap
paper) [PDF] |
Angelos D. Keromytis, Salvatore J. Stolfo, Junfeng Yang,
Angelos Stavrou, Anup Ghosh, Dawson Engler, Marc Dacier, Matthew Elder,
Darrell Kienzle |
In Proceedings of the 1st SysSec Workshop, July 2011. (co-located with DIMVA 2011). |
Practical, low-effort equivalence verification of real
code [PDF] |
David A. Ramos, Dawson Engler |
In Proceedings of the 23rd International Conference on
Computer Aided Verification (CAV), July 2011. |
Retrofitting Security in COTS Software with Binary
Rewriting [PDF] |
Padraig O'Sullivan, Kapil Anand, Aparna Kothan, Matthew
Smithson, Rajeev Barua, Angelos D. Keromytis |
In Proceedings of the 26th IFIP International Information
Security Conference (SEC), June 2011. |
Firmware-assisted Memory Acquisition and Analysis tools for
Digital Forensic (short paper) [PDF] |
Jiang Wang, Fengwei Zhang, Kun Sun, and Angelos
Stavrou |
In Proceedings of the 6th International Workshop on
Systematic Approaches to Digital Forensic Engineering (IEEE
SADFE 2011), May 2011. (held in conjunction with the IEEE Security and Privacy Symposium). |
Global ISR: Toward a Comprehensive Defense Against
Unauthorized Code Execution [PDF] |
Georgios Portokalidis, Angelos D. Keromytis |
In ARO Workshop on Moving Target Defense, October 2010. |
Stable Deterministic Multithreading through Schedule
Memoization [PDF] |
Heming Cui, Jingyue Wu, Chia-che Tsai, Junfeng Yang |
In Proceedings of the 9th USENIX Symposium on Operating
Systems Design and Implementation (OSDI), October 2010. |
Bypassing Races in Live Applications with Execution
Filters [PDF] |
Jingyue Wu, Heming Cui and Junfeng Yang |
In Proceedings of the 9th USENIX Symposium on Operating
Systems Design and Implementation (OSDI), October 2010. |
Fast and Practical Instruction-Set Randomization for Commodity
Systems [PDF] |
Georgios Portokalidis, Angelos D. Keromytis |
In Proceedings of the Annual Computer Security Applications
Conference (ACSAC), December 2010. (Acceptance rate: 17%) |
The MINESTRONE project was funded by the IARPA STONESOUP program, for the period
1 August 2010 through 30 November 2014. This research is based upon work
supported by the Office of the Director of National Intelligence (ODNI),
Intelligence Advanced Research Projects Activity (IARPA), via AFRL contract
number FA8650-10-C-7024. The views and conclusions contained herein are those of the
authors and should not be interpreted as necessarily representing the official
policies or endorsements, either expressed or implied, of ODNI, IARPA, or the
U.S. Government. The U.S. Government is authorized to reproduce and distribute
reprints for Governmental purpose notwithstanding any copyright annotation
thereon.
|
|
Latest News |
|
11/03/13 |
Our paper "ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking" is to appear in the 20th ACM Conference on Computer and Communications Security (CCS). |
11/03/13 |
Our paper "Parrot: a Practical Runtime for Deterministic, Stable, and Reliable Threads" is to appear in the 24th ACM Symposium on Operating Systems Principles (SOSP). |
09/22/13 |
Our paper "An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables" is to appear in the 29th IEEE International Conference on Software Maintenance (ICSM). |
08/27/13 |
Our paper "Transparent ROP Exploit Mitigation using Indirect Branch
Tracing" is to appear in the 22nd USENIX Security Symposium. |
08/12/13 |
Our paper "MINESTRONE: Testing the SOUP" is to appear in the 6th Workshop on Cyber Security Experimentation and Test (CSET). |
|