Using Virtualisation to Protect Against Zero-Day Attacks

G. Portokalidis
Amsterdam: Vrije Universiteit

2
2010
Lightweight Kernel Protection

Vasileios P Kemerlis , GeorGios PortoKalidis

Detecting Traffic Snooping in Anonymity Networks Using Decoys

Michalis Polychronakis , Georgios Portokalidis , Angelos D. Keromytis , Sambuddho Chakravarty
Department of Computer Science, Columbia University

2
2011
kGuard: lightweight kernel protection against return-to-user attacks

Georgios Portokalidis , Angelos D. Keromytis , Vasileios P. Kemerlis
usenix security symposium 39 -39

72
2012
Size does matter: why using gadget-chain length to prevent code-reuse attacks is hard

Michalis Polychronakis , Georgios Portokalidis , Enes Göktaş , Elias Athanasopoulos
usenix security symposium 417 -432

2014
On Effectiveness of Traffic Analysis Against Anonymity Networks Using Netflow

Michalis Polychronakis , Georgios Portokalidis , Angelos D. Keromytis , Sambuddho Chakravarty
Department of Computer Science, Columbia University

2013
Undermining Information Hiding (and What to Do about It)

Georgios Portokalidis , Enes Göktas , Robert Gawlik , Cristiano Giuffrida
usenix security symposium 105 -119

51
2016
Towards Optimal Use of Exception Handling Information for Function Detection.

Georgios Portokalidis , Eric Koskinen , Dongpeng Xu , Jun Xu
arXiv: Cryptography and Security

4
2021
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly but Were Afraid to Ask

Georgios Portokalidis , Eric Koskinen , Bing Mao , Jun Xu
ieee symposium on security and privacy

37
2021
Security and privacy in unified communications: Challenges and solutions

Georgios Karopoulos , Georgios Portokalidis , Josep Domingo-Ferrer , Ying-Dar Lin
Computer Communications 68 1 -3

3
2015
On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records

Sambuddho Chakravarty , Marco V. Barbera , Georgios Portokalidis , Michalis Polychronakis
passive and active network measurement 247 -257

42
2014
ShadowReplica: efficient parallelization of dynamic data flow tracking

Kangkook Jee , Vasileios P. Kemerlis , Angelos D. Keromytis , Georgios Portokalidis
computer and communications security 235 -246

41
2013
SAuth: protecting user accounts from password database leaks

Georgios Kontaxis , Elias Athanasopoulos , Georgios Portokalidis , Angelos D. Keromytis
computer and communications security 187 -198

66
2013
Evaluating control-flow restricting defenses

Enes Goktas , Elias Athanasopoulos , Herbert Bos , Georgios Portokalidis
The Continuing Arms Race 117 -137

2018
Large-scale Debloating of Binary Shared Libraries

Ioannis Agadakos , Nicholas Demarinis , Di Jin , Kent Williams-King
Digital Threats: Research and Practice 1 ( 4) 1 -28

7
2020
Self-healing multitier architectures using cascading rescue points

Angeliki Zavou , Georgios Portokalidis , Angelos D. Keromytis
Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12 379 -388

9
2012
The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines

Michalis Athanasakis , Elias Athanasopoulos , Michalis Polychronakis , Georgios Portokalidis
network and distributed system security symposium

26
2015
Fast and practical instruction-set randomization for commodity systems

Georgios Portokalidis , Angelos D. Keromytis
annual computer security applications conference 41 -48

59
2010
Paranoid Android: versatile protection for smartphones

Georgios Portokalidis , Philip Homburg , Kostas Anagnostakis , Herbert Bos
annual computer security applications conference 347 -356

538
2010