The Red Book

Stefano Zanero , Michalis Polychronakis , Asia Slowinska , Davide Balzarotti

4
2013
Size does matter: why using gadget-chain length to prevent code-reuse attacks is hard

Michalis Polychronakis , Georgios Portokalidis , Enes Göktaş , Elias Athanasopoulos
usenix security symposium 417 -432

2014
xJS: practical XSS prevention for web application development

Antonis Krithinakis , Spyros Ligouras , Evangelos P. Markatos , Thomas Karagiannis
usenix conference on web application development 13 -13

34
2010
Undermining Information Hiding (and What to Do about It)

Georgios Portokalidis , Enes Göktas , Robert Gawlik , Cristiano Giuffrida
usenix security symposium 105 -119

51
2016
Poking Holes in Information Hiding

Cristiano Giuffrida , Elias Athanasopoulos , Herbert Bos , Angelos Oikonomopoulos
usenix security symposium 121 -138

46
2016
Throwhammer: Rowhammer Attacks over the Network and Defenses

Kaveh Razavi , Cristiano Giuffrida , Elias Athanasopoulos , Herbert Bos
usenix annual technical conference 213 -225

57
2018
HoneyGen: Generating Honeywords Using Representation Learning

Elias Athanasopoulos , Antreas Dionysiou , Vassilis Vassiliades
computer and communications security

2021
Practical information flow for legacy web applications

Georgios Chinis , Polyvios Pratikakis , Sotiris Ioannidis , Elias Athanasopoulos
implementation, compilation, optimization of object-oriented languages, programs and systems 17 -28

6
2013
Flying Memcache: Lessons Learned from Different Acceleration Strategies

Dimitris Deyannis , Lazaros Koromilas , Giorgos Vasiliadis , Elias Athanasopoulos
symposium on computer architecture and high performance computing 25 -32

2
2014
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches

Elias Athanasopoulos , Vasileios P. Kemerlis , Michalis Polychronakis , Evangelos P. Markatos
Applied Cryptography and Network Security 400 -417

2012
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks

Alexandros Kapravelos , Iasonas Polakis , Elias Athanasopoulos , Sotiris Ioannidis
european symposium on research in computer security 663 -678

6
2010
we.b

Demetris Antoniades , Iasonas Polakis , Georgios Kontaxis , Elias Athanasopoulos
Proceedings of the 20th international conference on World wide web - WWW '11 715 -724

101
2011
AndRadar: Fast Discovery of Android Applications in Alternative Markets

Martina Lindorfer , Stamatis Volanis , Alessandro Sisto , Matthias Neugschwandtner
international conference on detection of intrusions and malware, and vulnerability assessment 51 -71

49
2014
Practical Password Hardening Based on TLS

Constantinos Diomedous , Elias Athanasopoulos
international conference on detection of intrusions and malware, and vulnerability assessment 441 -460

2
2019
PROV2R: Practical Provenance Analysis of Unstructured Processes

Manolis Stamatogiannakis , Elias Athanasopoulos , Herbert Bos , Paul Groth
ACM Transactions on Internet Technology 17 ( 4) 37

5
2017
No Need to Hide: Protecting Safe Regions on Commodity Hardware

Koen Koning , Xi Chen , Herbert Bos , Cristiano Giuffrida
european conference on computer systems 437 -452

128
2017
WSIM: A Software Platform to Simulate All-Optical Security Operations

Antonis Krithinakis , Lubomir Stroetmann , Elias Athanasopoulos , Georgios Kopidakis
2008 European Conference on Computer Network Defense 41 -47

2
2008
GAS: Overloading a File Sharing Network as an Anonymizing System

Elias Athanasopoulos , Mema Roussopoulos , Kostas G. Anagnostakis , Evangelos P. Markatos
Advances in Information and Computer Security 365 -379

1
2007
SAuth: protecting user accounts from password database leaks

Georgios Kontaxis , Elias Athanasopoulos , Georgios Portokalidis , Angelos D. Keromytis
computer and communications security 187 -198

66
2013