Biblio

Export 13 results:
Filters: Author is Michalis Polychronakis  [Clear All Filters]
2020
Ghavamnia S, Palit T, Benameur A, Polychronakis M.  2020.  Confine: Automated System Call Policy Generation for Container Attack Surface Reduction. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :443--458.
Ghavamnia S, Palit T, Mishra S, Polychronakis M.  2020.  Temporal System Call Specialization for Attack Surface Reduction. 29th USENIX Security Symposium (USENIX Security 20). :1749--1766.
2019
Hoang NPhong, Doreen S, Polychronakis M.  2019.  Measuring I2P Censorship at a Global Scale. 9th USENIX Workshop on Free and Open Communications on the Internet (FOCI 19).
2014
Vasiliadis G, Koromilas L, Polychronakis M, Ioannidis S.  2014.  GASPP: A GPU-Accelerated Stateful Packet Processing Framework. 2014 USENIX Annual Technical Conference (USENIX ATC 14). :321--332.
Kemerlis VP, Polychronakis M, Keromytis AD.  2014.  ret2dir: Rethinking Kernel Isolation. 23rd USENIX Security Symposium (USENIX Security 14). :957--972.
Göktaş E, Athanasopoulos E, Polychronakis M, Bos H, Portokalidis G.  2014.  Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard. 23rd USENIX Security Symposium (USENIX Security 14). :417--432.
2013
Pappas V, Polychronakis M, Keromytis AD.  2013.  Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. 22nd USENIX Security Symposium (USENIX Security 13). :447--462.
2012
Kontaxis G, Polychronakis M, Keromytis AD, Markatos EP.  2012.  Privacy-Preserving Social Plugins. 21st USENIX Security Symposium (USENIX Security 12). :631--646.
Papadogiannakis A, Polychronakis M, Markatos EP.  2012.  Tolerating Overload Attacks Against Packet Capturing Systems. 2012 USENIX Annual Technical Conference (USENIX ATC 12). :197--202.
2009
Polychronakis M, Anagnostakis KG.  2009.  An Empirical Study of Real-world Polymorphic Code Injection Attacks. 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 09).
2008
Polychronakis M, Mavrommatis P.  2008.  Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08).
Theocharides A, Antoniades D, Polychronakis M, Athanasopoulos E, Markatos EP.  2008.  Topnet: A Network-aware top(1). 22nd Large Installation System Administration Conference (LISA 08).