Publications by year

2023

  1. Famili, Alireza, Stavrou, Angelos, Wang, Haining, and Park, Jung-Min. idrop: Robust localization for indoor navigation of drones with optimized beacon placement. IEEE Internet of Things Journal, 2023. IEEE. Link to this entry
    BibTeX Entry
    @article{famili2023idrop, author = {Famili, Alireza and Stavrou, Angelos and Wang, Haining and Park, Jung-Min}, title = {idrop: Robust localization for indoor navigation of drones with optimized beacon placement}, journal = {IEEE Internet of Things Journal}, year = {2023}, publisher = {IEEE}, }
  2. Robie, John, Famili, Alireza, and Stavrou, Angelos. Revisiting the Spaceborne Illuminators of Opportunity for Airborne Object Tracking. Computer, 56(1):82-92, 2023. IEEE. Link to this entry
    BibTeX Entry
    @article{robie2023revisiting, author = {Robie, John and Famili, Alireza and Stavrou, Angelos}, title = {Revisiting the Spaceborne Illuminators of Opportunity for Airborne Object Tracking}, journal = {Computer}, volume = {56}, number = {1}, pages = {82--92}, year = {2023}, publisher = {IEEE}, }
  3. Zhang, Zhiyi, Xiao, Guorui, Song, Sichen, Aygun, R, Stavrou, Angelos, Zhang, Lixia, and Osterweil, Eric. Revealing the Architectural Design Patterns in the Volumetric DDoS Defense Design Space. 2023. TechRxiv. Link to this entry
    BibTeX Entry
    @article{zhang2023revealing, author = {Zhang, Zhiyi and Xiao, Guorui and Song, Sichen and Aygun, R and Stavrou, Angelos and Zhang, Lixia and Osterweil, Eric}, title = {Revealing the Architectural Design Patterns in the Volumetric DDoS Defense Design Space}, year = {2023}, publisher = {TechRxiv}, }
  4. Atalay, Tolga O, Maitra, Sudip, Stojadinovic, Dragoslav, Stavrou, Angelos, and Wang, Haining. Securing 5G OpenRAN with a Scalable Authorization Framework for xApps. In IEEE INFOCOM 2023-IEEE Conference on Computer Communications, pages 1-10, 2023. Link to this entry
    BibTeX Entry
    @inproceedings{atalay2023securing, author = {Atalay, Tolga O and Maitra, Sudip and Stojadinovic, Dragoslav and Stavrou, Angelos and Wang, Haining}, title = {Securing 5G OpenRAN with a Scalable Authorization Framework for xApps}, booktitle = {IEEE INFOCOM 2023-IEEE Conference on Computer Communications}, pages = {1--10}, year = {2023}, organization = {IEEE}, }
  5. Himona, Georgia, Famili, Alireza, Stavrou, Angelos, Kovanis, Vassilios, and Kominis, Yannis. Isochrons in tunable photonic oscillators and applications in precise positioning. In Physics and Simulation of Optoelectronic Devices XXXI, pages 82-86, 2023. Link to this entry
    BibTeX Entry
    @inproceedings{himona2023isochrons, author = {Himona, Georgia and Famili, Alireza and Stavrou, Angelos and Kovanis, Vassilios and Kominis, Yannis}, title = {Isochrons in tunable photonic oscillators and applications in precise positioning}, booktitle = {Physics and Simulation of Optoelectronic Devices XXXI}, volume = {12415}, pages = {82--86}, year = {2023}, organization = {SPIE}, }
  6. Famili, Alireza, Stavrou, Angelos, Wang, Haining, and Park, Jung-Min Jerry. EGO-6: Enhancing Geofencing Security Systems with Optimal Deployment of 6G TRPs. In 2023 Silicon Valley Cybersecurity Conference (SVCC), pages 1-8, 2023. Link to this entry
    BibTeX Entry
    @inproceedings{famili2023ego, author = {Famili, Alireza and Stavrou, Angelos and Wang, Haining and Park, Jung-Min Jerry}, title = {EGO-6: Enhancing Geofencing Security Systems with Optimal Deployment of 6G TRPs}, booktitle = {2023 Silicon Valley Cybersecurity Conference (SVCC)}, pages = {1--8}, year = {2023}, organization = {IEEE}, }
  7. Famili, Alireza, Atalay, Tolga, Stavrou, Angelos, and Wang, Haining. Wi-Five: Optimal Placement of Wi-Fi Routers in 5G Networks for Indoor Drone Navigation. In 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), pages 1-7, 2023. Link to this entry
    BibTeX Entry
    @inproceedings{famili2023wi, author = {Famili, Alireza and Atalay, Tolga and Stavrou, Angelos and Wang, Haining}, title = {Wi-Five: Optimal Placement of Wi-Fi Routers in 5G Networks for Indoor Drone Navigation}, booktitle = {2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring)}, pages = {1--7}, year = {2023}, organization = {IEEE}, }

2022

  1. Famili, Alireza, Stavrou, Angelos, Wang, Haining, and Park, Jung-Min Jerry. Pilot: High-precision indoor localization for autonomous drones. IEEE Transactions on Vehicular Technology, 2022. IEEE. Link to this entry
    BibTeX Entry
    @article{famili2022pilot, author = {Famili, Alireza and Stavrou, Angelos and Wang, Haining and Park, Jung-Min Jerry}, title = {Pilot: High-precision indoor localization for autonomous drones}, journal = {IEEE Transactions on Vehicular Technology}, year = {2022}, publisher = {IEEE}, }
  2. Famili, Alireza, Stavrou, Angelos, Wang, Haining, and others. Optilod: Optimal beacon placement for high-accuracy indoor localization of drones. arXiv preprint arXiv:2201.10691, 2022. Link to this entry
    BibTeX Entry
    @article{famili2022optilod, author = {Famili, Alireza and Stavrou, Angelos and Wang, Haining and others}, title = {Optilod: Optimal beacon placement for high-accuracy indoor localization of drones}, journal = {arXiv preprint arXiv:2201.10691}, year = {2022}, }
  3. Famili, Alireza, Stavrou, Angelos, Wang, Haining, and Park, Jung-Min Jerry. Rail: Robust acoustic indoor localization for drones. In 2022 IEEE 95th Vehicular Technology Conference:(VTC2022-Spring), pages 1-6, 2022. Link to this entry
    BibTeX Entry
    @inproceedings{famili2022rail, author = {Famili, Alireza and Stavrou, Angelos and Wang, Haining and Park, Jung-Min Jerry}, title = {Rail: Robust acoustic indoor localization for drones}, booktitle = {2022 IEEE 95th Vehicular Technology Conference:(VTC2022-Spring)}, pages = {1--6}, year = {2022}, organization = {IEEE}, }
  4. Atalay, Tolga O, Stojadinovic, Dragoslav, Stavrou, Angelos, and Wang, Haining. Scaling Network Slices with a 5G Testbed: A Resource Consumption Study. In 2022 IEEE Wireless Communications and Networking Conference (WCNC), pages 2649-2654, 2022. Link to this entry
    BibTeX Entry
    @inproceedings{atalay2022scaling, author = {Atalay, Tolga O and Stojadinovic, Dragoslav and Stavrou, Angelos and Wang, Haining}, title = {Scaling Network Slices with a 5G Testbed: A Resource Consumption Study}, booktitle = {2022 IEEE Wireless Communications and Networking Conference (WCNC)}, pages = {2649--2654}, year = {2022}, organization = {IEEE}, }
  5. Roy, Sunanda, Stavrou, Angelos, Mark, Brian L, Zeng, Kai, PD, Sai Manoj, and Khasawneh, Khaled N. Characterization of AES Implementations on Microprocessor-based IoT Devices. In 2022 IEEE Wireless Communications and Networking Conference (WCNC), pages 55-60, 2022. Link to this entry
    BibTeX Entry
    @inproceedings{roy2022characterization, author = {Roy, Sunanda and Stavrou, Angelos and Mark, Brian L and Zeng, Kai and PD, Sai Manoj and Khasawneh, Khaled N}, title = {Characterization of AES Implementations on Microprocessor-based IoT Devices}, booktitle = {2022 IEEE Wireless Communications and Networking Conference (WCNC)}, pages = {55--60}, year = {2022}, organization = {IEEE}, }
  6. Dittmer, Samuel, Ishai, Yuval, Lu, Steve, Ostrovsky, Rafail, Elsabagh, Mohamed, Kiourtis, Nikolaos, Schulte, Brian, and Stavrou, Angelos. Streaming and Unbalanced PSI from Function Secret Sharing. In International Conference on Security and Cryptography for Networks, pages 564-587, 2022. Link to this entry
    BibTeX Entry
    @inproceedings{dittmer2022streaming, author = {Dittmer, Samuel and Ishai, Yuval and Lu, Steve and Ostrovsky, Rafail and Elsabagh, Mohamed and Kiourtis, Nikolaos and Schulte, Brian and Stavrou, Angelos}, title = {Streaming and Unbalanced PSI from Function Secret Sharing}, booktitle = {International Conference on Security and Cryptography for Networks}, pages = {564--587}, year = {2022}, organization = {Springer International Publishing Cham}, }
  7. Famili, Alireza and Stavrou, Angelos. Eternal flying: Optimal placement of wireless chargers for nonstop drone flights. In 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET), pages 1-6, 2022. Link to this entry
    BibTeX Entry
    @inproceedings{famili2022eternal, author = {Famili, Alireza and Stavrou, Angelos}, title = {Eternal flying: Optimal placement of wireless chargers for nonstop drone flights}, booktitle = {2022 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, pages = {1--6}, year = {2022}, organization = {IEEE}, }
  8. Robie, John, Famili, Alireza, and Stavrou, Angelos. Receiver density analysis for high probability detection of forward scattered airborne signals. In 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET), pages 1-6, 2022. Link to this entry
    BibTeX Entry
    @inproceedings{robie2022receiver, author = {Robie, John and Famili, Alireza and Stavrou, Angelos}, title = {Receiver density analysis for high probability detection of forward scattered airborne signals}, booktitle = {2022 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, pages = {1--6}, year = {2022}, organization = {IEEE}, }
  9. Yang, Yuqing, Elsabagh, Mohamed, Zuo, Chaoshun, Johnson, Ryan, Stavrou, Angelos, and Lin, Zhiqiang. Detecting and Measuring Misconfigured Manifests in Android Apps. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pages 3063-3077, 2022. Link to this entry
    BibTeX Entry
    @inproceedings{yang2022detecting, author = {Yang, Yuqing and Elsabagh, Mohamed and Zuo, Chaoshun and Johnson, Ryan and Stavrou, Angelos and Lin, Zhiqiang}, title = {Detecting and Measuring Misconfigured Manifests in Android Apps}, booktitle = {Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security}, pages = {3063--3077}, year = {2022}, }
  10. Famili, Alireza, Stavrou, Angelos, Wang, Haining, and Park, Jung-Min Jerry. SPIN: Sensor Placement for Indoor Navigation of Drones. In 2022 IEEE Latin-American Conference on Communications (LATINCOM), pages 1-6, 2022. Link to this entry
    BibTeX Entry
    @inproceedings{famili2022spin, author = {Famili, Alireza and Stavrou, Angelos and Wang, Haining and Park, Jung-Min Jerry}, title = {SPIN: Sensor Placement for Indoor Navigation of Drones}, booktitle = {2022 IEEE Latin-American Conference on Communications (LATINCOM)}, pages = {1--6}, year = {2022}, organization = {IEEE}, }
  11. Famili, Alireza, Foruhandeh, Mahsa, Atalay, Tolga, Stavrou, Angelos, and Wang, Haining. GPS Spoofing Detection by Leveraging 5G Positioning Capabilities. In 2022 IEEE Latin-American Conference on Communications (LATINCOM), pages 1-6, 2022. Link to this entry
    BibTeX Entry
    @inproceedings{famili2022gps, author = {Famili, Alireza and Foruhandeh, Mahsa and Atalay, Tolga and Stavrou, Angelos and Wang, Haining}, title = {GPS Spoofing Detection by Leveraging 5G Positioning Capabilities}, booktitle = {2022 IEEE Latin-American Conference on Communications (LATINCOM)}, pages = {1--6}, year = {2022}, organization = {IEEE}, }
  12. Atalay, Tolga O, Stojadinovic, Dragoslav, Famili, Alireza, Stavrou, Angelos, and Wang, Haining. Network-Slice-as-a-Service Deployment Cost Assessment in an End-to-End 5G Testbed. In GLOBECOM 2022-2022 IEEE Global Communications Conference, pages 2056-2061, 2022. Link to this entry
    BibTeX Entry
    @inproceedings{atalay2022network, author = {Atalay, Tolga O and Stojadinovic, Dragoslav and Famili, Alireza and Stavrou, Angelos and Wang, Haining}, title = {Network-Slice-as-a-Service Deployment Cost Assessment in an End-to-End 5G Testbed}, booktitle = {GLOBECOM 2022-2022 IEEE Global Communications Conference}, pages = {2056--2061}, year = {2022}, organization = {IEEE}, }
  13. Stavrou, Angelos, Jajodia, Sushil, Ghosh, Anup K, Martin, Rhandi, and Andrianakis, Charalampos. Malware detector. May~10 2022. Link to this entry US Patent 11,330,000
    BibTeX Entry
    @misc{stavrou2022malware, author = {Stavrou, Angelos and Jajodia, Sushil and Ghosh, Anup K and Martin, Rhandi and Andrianakis, Charalampos}, title = {Malware detector}, year = {2022}, month = {May~10}, note = {US Patent 11,330,000}, }
  14. Ghosh, Anup, Huang, Yih, Wang, Jiang, and Stavrou, Angelos. Methods and apparatus for application isolation. April~19 2022. Link to this entry US Patent 11,310,252
    BibTeX Entry
    @misc{ghosh2022methods, author = {Ghosh, Anup and Huang, Yih and Wang, Jiang and Stavrou, Angelos}, title = {Methods and apparatus for application isolation}, year = {2022}, month = {April~19}, note = {US Patent 11,310,252}, }
  15. Stavrou, Angelos, Jajodia, Sushil, Ghosh, Anup K, Martin, Rhandi, and Andrianakis, Charalampos. Malware detector. September~1 2022. Link to this entry US Patent App. 17/736,507
    BibTeX Entry
    @misc{stavrou2022malware, author = {Stavrou, Angelos and Jajodia, Sushil and Ghosh, Anup K and Martin, Rhandi and Andrianakis, Charalampos}, title = {Malware detector}, year = {2022}, month = {September~1}, note = {US Patent App. 17/736,507}, }

2021

  1. Famili, Alireza, Stavrou, Angelos, Wang, Haining, Gerdes, Ryan, and others. Securing your airspace: Detection of drones trespassing protected areas. arXiv preprint arXiv:2111.03760, 2021. Link to this entry
    BibTeX Entry
    @article{famili2021securing, author = {Famili, Alireza and Stavrou, Angelos and Wang, Haining and Gerdes, Ryan and others}, title = {Securing your airspace: Detection of drones trespassing protected areas}, journal = {arXiv preprint arXiv:2111.03760}, year = {2021}, }
  2. Stavrou, Angelos and Kryptowire LLC. DARPA WASH (Warfighter Analytics Using Smartphones for Heath) Site Visit. 2021. Link to this entry
    BibTeX Entry
    @article{stavrou2021darpa, author = {Stavrou, Angelos and Kryptowire LLC}, title = {DARPA WASH (Warfighter Analytics Using Smartphones for Heath) Site Visit}, year = {2021}, }
  3. Chatzigiannis, Panagiotis, Baldimtsi, Foteini, Kolias, Constantinos, and Stavrou, Angelos. Black-box iot: Authentication and distributed storage of iot data from constrained sensors. In Proceedings of the International Conference on Internet-of-Things Design and Implementation, pages 1-14, 2021. Link to this entry
    BibTeX Entry
    @inproceedings{chatzigiannis2021black, author = {Chatzigiannis, Panagiotis and Baldimtsi, Foteini and Kolias, Constantinos and Stavrou, Angelos}, title = {Black-box iot: Authentication and distributed storage of iot data from constrained sensors}, booktitle = {Proceedings of the International Conference on Internet-of-Things Design and Implementation}, pages = {1--14}, year = {2021}, }
  4. Connelly, Joseph, Roberts, Taylor, Gao, Xing, Xiao, Jidong, Wang, Haining, and Stavrou, Angelos. Cloudskulk: A nested virtual machine based rootkit and its detection. In 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pages 350-362, 2021. Link to this entry
    BibTeX Entry
    @inproceedings{connelly2021cloudskulk, author = {Connelly, Joseph and Roberts, Taylor and Gao, Xing and Xiao, Jidong and Wang, Haining and Stavrou, Angelos}, title = {Cloudskulk: A nested virtual machine based rootkit and its detection}, booktitle = {2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)}, pages = {350--362}, year = {2021}, organization = {IEEE}, }
  5. Ji, Yuede, Elsabagh, Mohamed, Johnson, Ryan, and Stavrou, Angelos. : An Analysis of Exposed Android Init Routines. In 30th USENIX Security Symposium (USENIX Security 21), pages 3685-3702, 2021. Link to this entry
    BibTeX Entry
    @inproceedings{ji2021definit, author = {Ji, Yuede and Elsabagh, Mohamed and Johnson, Ryan and Stavrou, Angelos}, title = {$\{$DEFInit$\}$: An Analysis of Exposed Android Init Routines}, booktitle = {30th USENIX Security Symposium (USENIX Security 21)}, pages = {3685--3702}, year = {2021}, }

2020

  1. Gao, Xing, Xiao, Jidong, Wang, Haining, and Stavrou, Angelos. Understanding the Security Implication of Aborting Virtual Machine Live Migration. IEEE Transactions on Cloud Computing, 10(2):1275-1286, 2020. IEEE. Link to this entry
    BibTeX Entry
    @article{gao2020understanding, author = {Gao, Xing and Xiao, Jidong and Wang, Haining and Stavrou, Angelos}, title = {Understanding the Security Implication of Aborting Virtual Machine Live Migration}, journal = {IEEE Transactions on Cloud Computing}, volume = {10}, number = {2}, pages = {1275--1286}, year = {2020}, publisher = {IEEE}, }
  2. Osterweil, Eric, Stavrou, Angelos, and Zhang, Lixia. 21 years of distributed denial-of service: Current state of affairs. Computer, 53(7):88-92, 2020. IEEE. Link to this entry
    BibTeX Entry
    @article{osterweil202021, author = {Osterweil, Eric and Stavrou, Angelos and Zhang, Lixia}, title = {21 years of distributed denial-of service: Current state of affairs}, journal = {Computer}, volume = {53}, number = {7}, pages = {88--92}, year = {2020}, publisher = {IEEE}, }
  3. Douglis, Fred and Stavrou, Angelos. Distributed ledger technologies. IEEE Internet Computing, 24(3):5-6, 2020. IEEE. Link to this entry
    BibTeX Entry
    @article{douglis2020distributed, author = {Douglis, Fred and Stavrou, Angelos}, title = {Distributed ledger technologies}, journal = {IEEE Internet Computing}, volume = {24}, number = {3}, pages = {5--6}, year = {2020}, publisher = {IEEE}, }
  4. Osterweil, Eric, Stavrou, Angelos, and Zhang, Lixia. 21 years of distributed denial-of-service: A call to action. Computer, 53(08):94-99, 2020. IEEE Computer Society. Link to this entry
    BibTeX Entry
    @article{osterweil202021, author = {Osterweil, Eric and Stavrou, Angelos and Zhang, Lixia}, title = {21 years of distributed denial-of-service: A call to action}, journal = {Computer}, volume = {53}, number = {08}, pages = {94--99}, year = {2020}, publisher = {IEEE Computer Society}, }
  5. Dittmer, Samuel, Ishai, Yuval, Lu, Steve, Ostrovsky, Rafail, Elsabagh, Mohamed, Kiourtis, Nikolaos, Schulte, Brian, and Stavrou, Angelos. Function secret sharing for psi-ca: With applications to private contact tracing. arXiv preprint arXiv:2012.13053, 2020. Link to this entry
    BibTeX Entry
    @article{dittmer2020function, author = {Dittmer, Samuel and Ishai, Yuval and Lu, Steve and Ostrovsky, Rafail and Elsabagh, Mohamed and Kiourtis, Nikolaos and Schulte, Brian and Stavrou, Angelos}, title = {Function secret sharing for psi-ca: With applications to private contact tracing}, journal = {arXiv preprint arXiv:2012.13053}, year = {2020}, }
  6. Elsabagh, Mohamed, Johnson, Ryan, Stavrou, Angelos, Zuo, Chaoshun, Zhao, Qingchuan, and Lin, Zhiqiang. : Automatic uncovering of vulnerabilities in apps in android firmware. In 29th USENIX security symposium (USENIX Security 20), pages 2379-2396, 2020. Link to this entry
    BibTeX Entry
    @inproceedings{elsabagh2020firmscope, author = {Elsabagh, Mohamed and Johnson, Ryan and Stavrou, Angelos and Zuo, Chaoshun and Zhao, Qingchuan and Lin, Zhiqiang}, title = {$\{$FIRMSCOPE$\}$: Automatic uncovering of $\{$Privilege-Escalation$\}$ vulnerabilities in $\{$Pre-Installed$\}$ apps in android firmware}, booktitle = {29th USENIX security symposium (USENIX Security 20)}, pages = {2379--2396}, year = {2020}, }
  7. Baarzi, Ataollah Fatahi, Kesidis, George, Fleck, Dan, and Stavrou, Angelos. Microservices made attack-resilient using unsupervised service fissioning. In Proceedings of the 13th European workshop on Systems Security, pages 31-36, 2020. Link to this entry
    BibTeX Entry
    @inproceedings{baarzi2020microservices, author = {Baarzi, Ataollah Fatahi and Kesidis, George and Fleck, Dan and Stavrou, Angelos}, title = {Microservices made attack-resilient using unsupervised service fissioning}, booktitle = {Proceedings of the 13th European workshop on Systems Security}, pages = {31--36}, year = {2020}, }
  8. Ghosh, Anup, Huang, Yih, Wang, Jiang, and Stavrou, Angelos. Methods and apparatus for application isolation. February~18 2020. Link to this entry US Patent 10,567,414
    BibTeX Entry
    @misc{ghosh2020methods, author = {Ghosh, Anup and Huang, Yih and Wang, Jiang and Stavrou, Angelos}, title = {Methods and apparatus for application isolation}, year = {2020}, month = {February~18}, note = {US Patent 10,567,414}, }
  9. Stavrou, Angelos, Murmuria, Rahul, Johnson, Ryan, and Barbara, Daniel. Active authentication of users. September~15 2020. Link to this entry US Patent 10,776,463
    BibTeX Entry
    @misc{stavrou2020active, author = {Stavrou, Angelos and Murmuria, Rahul and Johnson, Ryan and Barbara, Daniel}, title = {Active authentication of users}, year = {2020}, month = {September~15}, note = {US Patent 10,776,463}, }

2019

  1. Osterweil, Eric, Stavrou, Angelos, and Zhang, Lixia. 20 years of DDoS: A call to action. arXiv preprint arXiv:1904.02739, 2019. Link to this entry
    BibTeX Entry
    @article{osterweil201920, author = {Osterweil, Eric and Stavrou, Angelos and Zhang, Lixia}, title = {20 years of DDoS: A call to action}, journal = {arXiv preprint arXiv:1904.02739}, year = {2019}, }
  2. Kolias, Constantinos, Borrelli, R, Barbara, Daniel, and Stavrou, Angelos. Malware detection in critical infrastructures using the electromagnetic emissions of plcs. Transactions, 121(1):519-522, 2019. Link to this entry
    BibTeX Entry
    @article{kolias2019malware, author = {Kolias, Constantinos and Borrelli, R and Barbara, Daniel and Stavrou, Angelos}, title = {Malware detection in critical infrastructures using the electromagnetic emissions of plcs}, journal = {Transactions}, volume = {121}, number = {1}, pages = {519--522}, year = {2019}, }
  3. Yuan, Yong, Wang, Fei-Yue, Rong, Chunming, Stavrou, Angelos, Zhang, Jun, Tang, Qiang, Baldimtsi, Foteini, Yang, Laurence T, Wu, Desheng, Wang, Shouyang, and others. Guest editorial special issue on blockchain and economic knowledge automation. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50(1):2-8, 2019. IEEE. Link to this entry
    BibTeX Entry
    @article{yuan2019guest, author = {Yuan, Yong and Wang, Fei-Yue and Rong, Chunming and Stavrou, Angelos and Zhang, Jun and Tang, Qiang and Baldimtsi, Foteini and Yang, Laurence T and Wu, Desheng and Wang, Shouyang and others}, title = {Guest editorial special issue on blockchain and economic knowledge automation}, journal = {IEEE Transactions on Systems, Man, and Cybernetics: Systems}, volume = {50}, number = {1}, pages = {2--8}, year = {2019}, publisher = {IEEE}, }
  4. Zhang, Zhiyi, Vasavada, Vishrant, Kakarla, Siva Kesava Reddy, Stavrou, Angelos, Osterweil, Eric, and Zhang, Lixia. Expect more from the networking: Ddos mitigation by fitt in named data networking. arXiv preprint arXiv:1902.09033, 2019. Link to this entry
    BibTeX Entry
    @article{zhang2019expect, author = {Zhang, Zhiyi and Vasavada, Vishrant and Kakarla, Siva Kesava Reddy and Stavrou, Angelos and Osterweil, Eric and Zhang, Lixia}, title = {Expect more from the networking: Ddos mitigation by fitt in named data networking}, journal = {arXiv preprint arXiv:1902.09033}, year = {2019}, }
  5. Ciocarlie, Gabriela F, Stavrou, Angelos, Stolfo, Salvatore J, and Keromytis, Angelos D. Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models. January~8 2019. Link to this entry US Patent 10,178,113
    BibTeX Entry
    @misc{ciocarlie2019systems, author = {Ciocarlie, Gabriela F and Stavrou, Angelos and Stolfo, Salvatore J and Keromytis, Angelos D}, title = {Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models}, year = {2019}, month = {January~8}, note = {US Patent 10,178,113}, }
  6. Johnson, Ryan, Kiourtis, Nikolaos, and Stavrou, Angelos. Systems and methods for analyzing software. August~20 2019. Link to this entry US Patent 10,387,627
    BibTeX Entry
    @misc{johnson2019systems, author = {Johnson, Ryan and Kiourtis, Nikolaos and Stavrou, Angelos}, title = {Systems and methods for analyzing software}, year = {2019}, month = {August~20}, note = {US Patent 10,387,627}, }
  7. Stavrou, Angelos, Murmuria, Rahul, Johnson, Ryan, and Barbara, Daniel. Active authentication of users. May~14 2019. Link to this entry US Patent 10,289,819
    BibTeX Entry
    @misc{stavrou2019active, author = {Stavrou, Angelos and Murmuria, Rahul and Johnson, Ryan and Barbara, Daniel}, title = {Active authentication of users}, year = {2019}, month = {May~14}, note = {US Patent 10,289,819}, }
  8. Stavrou, Angelos, Jajodia, Sushil, Ghosh, Anup K, Martin, Rhandi, and Andrianakis, Charalampos. Malware detector. March~26 2019. Link to this entry US Patent 10,243,975
    BibTeX Entry
    @misc{stavrou2019malware, author = {Stavrou, Angelos and Jajodia, Sushil and Ghosh, Anup K and Martin, Rhandi and Andrianakis, Charalampos}, title = {Malware detector}, year = {2019}, month = {March~26}, note = {US Patent 10,243,975}, }
  9. Ghosh, Anup, Huang, Yih, Wang, Jiang, and Stavrou, Angelos. Methods and apparatus for application isolation. January~22 2019. Link to this entry US Patent 10,187,417
    BibTeX Entry
    @misc{ghosh2019methods, author = {Ghosh, Anup and Huang, Yih and Wang, Jiang and Stavrou, Angelos}, title = {Methods and apparatus for application isolation}, year = {2019}, month = {January~22}, note = {US Patent 10,187,417}, }

2018

  1. Elsabagh, Mohamed, Barbará, Daniel, Fleck, Dan, and Stavrou, Angelos. On early detection of application-level resource exhaustion and starvation. Journal of Systems and Software, 137:430-447, 2018. Elsevier. Link to this entry
    BibTeX Entry
    @article{elsabagh2018early, author = {Elsabagh, Mohamed and Barbar{\'a}, Daniel and Fleck, Dan and Stavrou, Angelos}, title = {On early detection of application-level resource exhaustion and starvation}, journal = {Journal of Systems and Software}, volume = {137}, pages = {430--447}, year = {2018}, publisher = {Elsevier}, }
  2. Voas, Jeffrey, Kuhn, Rick, Kolias, Constantinos, Stavrou, Angelos, and Kambourakis, Georgios. Cybertrust in the IoT age. Computer, 51(7):12-15, 2018. IEEE. Link to this entry
    BibTeX Entry
    @article{voas2018cybertrust, author = {Voas, Jeffrey and Kuhn, Rick and Kolias, Constantinos and Stavrou, Angelos and Kambourakis, Georgios}, title = {Cybertrust in the IoT age}, journal = {Computer}, volume = {51}, number = {7}, pages = {12--15}, year = {2018}, publisher = {IEEE}, }
  3. Hao, Shuai, Zhang, Yubao, Wang, Haining, and Stavrou, Angelos. get maneuvered: Empirical analysis of redirection hijacking in content delivery networks. In 27th USENIX Security Symposium (USENIX Security 18), pages 1129-1145, 2018. Link to this entry
    BibTeX Entry
    @inproceedings{hao2018end, author = {Hao, Shuai and Zhang, Yubao and Wang, Haining and Stavrou, Angelos}, title = {$\{$End-Users$\}$ get maneuvered: Empirical analysis of redirection hijacking in content delivery networks}, booktitle = {27th USENIX Security Symposium (USENIX Security 18)}, pages = {1129--1145}, year = {2018}, }
  4. Johnson, Ryan, Elsabagh, Mohamed, Stavrou, Angelos, and Offutt, Jeff. Dazed droids: A longitudinal study of android inter-app vulnerabilities. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pages 777-791, 2018. Link to this entry
    BibTeX Entry
    @inproceedings{johnson2018dazed, author = {Johnson, Ryan and Elsabagh, Mohamed and Stavrou, Angelos and Offutt, Jeff}, title = {Dazed droids: A longitudinal study of android inter-app vulnerabilities}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security}, pages = {777--791}, year = {2018}, }
  5. Xu, Haitao, Li, Zhao, Chu, Chen, Chen, Yuanmi, Yang, Yifan, Lu, Haifeng, Wang, Haining, and Stavrou, Angelos. Detecting and characterizing web bot traffic in a large e-commerce marketplace. In Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II 23, pages 143-163, 2018. Link to this entry
    BibTeX Entry
    @inproceedings{xu2018detecting, author = {Xu, Haitao and Li, Zhao and Chu, Chen and Chen, Yuanmi and Yang, Yifan and Lu, Haifeng and Wang, Haining and Stavrou, Angelos}, title = {Detecting and characterizing web bot traffic in a large e-commerce marketplace}, booktitle = {Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II 23}, pages = {143--163}, year = {2018}, organization = {Springer International Publishing}, }
  6. Fleck, Daniel, Stavrou, Angelos, Kesidis, George, Nasiriani, Neda, Shan, Yuquan, and Konstantopoulos, Takis. Moving-target Defense against Botnet Reconnaissance and an Adversarial Coupon-Collection Model. In 2018 IEEE Conference on Dependable and Secure Computing (DSC), pages 1-8, 2018. Link to this entry
    BibTeX Entry
    @inproceedings{fleck2018moving, author = {Fleck, Daniel and Stavrou, Angelos and Kesidis, George and Nasiriani, Neda and Shan, Yuquan and Konstantopoulos, Takis}, title = {Moving-target Defense against Botnet Reconnaissance and an Adversarial Coupon-Collection Model}, booktitle = {2018 IEEE Conference on Dependable and Secure Computing (DSC)}, pages = {1--8}, year = {2018}, organization = {IEEE}, }
  7. Elsabagh, Mohamed, Johnson, Ryan, and Stavrou, Angelos. Resilient and scalable cloned app detection using forced execution and compression trees. In 2018 IEEE Conference on Dependable and Secure Computing (DSC), pages 1-8, 2018. Link to this entry
    BibTeX Entry
    @inproceedings{elsabagh2018resilient, author = {Elsabagh, Mohamed and Johnson, Ryan and Stavrou, Angelos}, title = {Resilient and scalable cloned app detection using forced execution and compression trees}, booktitle = {2018 IEEE Conference on Dependable and Secure Computing (DSC)}, pages = {1--8}, year = {2018}, organization = {IEEE}, }
  8. Kesidis, George, Shan, Yuquan, Fleck, Daniel, Stavrou, Angelos, and Konstantopoulos, Takis. An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance. In 2018 13th International Conference on Malicious and Unwanted Software (MALWARE), pages 61-67, 2018. Link to this entry
    BibTeX Entry
    @inproceedings{kesidis2018adversarial, author = {Kesidis, George and Shan, Yuquan and Fleck, Daniel and Stavrou, Angelos and Konstantopoulos, Takis}, title = {An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance}, booktitle = {2018 13th International Conference on Malicious and Unwanted Software (MALWARE)}, pages = {61--67}, year = {2018}, organization = {IEEE}, }
  9. Zhang, Fengwei, Leach, Kevin, Stavrou, Angelos, and Wang, Haining. Methods and systems for increased debugging transparency. November~13 2018. Link to this entry US Patent 10,127,137
    BibTeX Entry
    @misc{zhang2018methods, author = {Zhang, Fengwei and Leach, Kevin and Stavrou, Angelos and Wang, Haining}, title = {Methods and systems for increased debugging transparency}, year = {2018}, month = {November~13}, note = {US Patent 10,127,137}, }
  10. Ghosh, Anup, Huang, Yih, Wang, Jiang, and Stavrou, Angelos. Methods and apparatus for application isolation. January~16 2018. Link to this entry US Patent 9,871,812
    BibTeX Entry
    @misc{ghosh2018methods, author = {Ghosh, Anup and Huang, Yih and Wang, Jiang and Stavrou, Angelos}, title = {Methods and apparatus for application isolation}, year = {2018}, month = {January~16}, note = {US Patent 9,871,812}, }
  11. Stavrou, Angelos and Keromytis, Angelos D. Systems and methods for inhibiting attacks with a network. June~5 2018. Link to this entry US Patent 9,992,222
    BibTeX Entry
    @misc{stavrou2018systems, author = {Stavrou, Angelos and Keromytis, Angelos D}, title = {Systems and methods for inhibiting attacks with a network}, year = {2018}, month = {June~5}, note = {US Patent 9,992,222}, }

2017

  1. Stavrou, Angelos and Voas, Jeffrey. Verified time. Computer, 50(3):78-82, 2017. IEEE. Link to this entry
    BibTeX Entry
    @article{stavrou2017verified, author = {Stavrou, Angelos and Voas, Jeffrey}, title = {Verified time}, journal = {Computer}, volume = {50}, number = {3}, pages = {78--82}, year = {2017}, publisher = {IEEE}, }
  2. Auffret, Jean-Pierre, Snowdon, Jane L, Stavrou, Angelos, Katz, Jeffrey S, Kelley, Diana, Rahman, Rasheq S, Stein, Frank, Sokol, Lisa, Allor, Peter, and Warweg, Peng. Cybersecurity leadership: Competencies, governance, and technologies for industrial control systems. Journal of Interconnection Networks, 17(01):1740001, 2017. World Scientific Publishing Company. Link to this entry
    BibTeX Entry
    @article{auffret2017cybersecurity, author = {Auffret, Jean-Pierre and Snowdon, Jane L and Stavrou, Angelos and Katz, Jeffrey S and Kelley, Diana and Rahman, Rasheq S and Stein, Frank and Sokol, Lisa and Allor, Peter and Warweg, Peng}, title = {Cybersecurity leadership: Competencies, governance, and technologies for industrial control systems}, journal = {Journal of Interconnection Networks}, volume = {17}, number = {01}, pages = {1740001}, year = {2017}, publisher = {World Scientific Publishing Company}, }
  3. Shan, Yuquan, Kesidis, George, Fleck, Daniel, and Stavrou, Angelos. Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems. arXiv preprint arXiv:1704.06794, 2017. Link to this entry
    BibTeX Entry
    @article{shan2017numerical, author = {Shan, Yuquan and Kesidis, George and Fleck, Daniel and Stavrou, Angelos}, title = {Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems}, journal = {arXiv preprint arXiv:1704.06794}, year = {2017}, }
  4. Xu, Haitao, Liu, Daiping, Wang, Haining, and Stavrou, Angelos. An empirical investigation of ecommerce-reputation-escalation-as-a-service. ACM Transactions on the Web (TWEB), 11(2):1-35, 2017. ACM New York, NY, USA. Link to this entry
    BibTeX Entry
    @article{xu2017empirical, author = {Xu, Haitao and Liu, Daiping and Wang, Haining and Stavrou, Angelos}, title = {An empirical investigation of ecommerce-reputation-escalation-as-a-service}, journal = {ACM Transactions on the Web (TWEB)}, volume = {11}, number = {2}, pages = {1--35}, year = {2017}, publisher = {ACM New York, NY, USA}, }
  5. Kolias, Constantinos, Kambourakis, Georgios, Stavrou, Angelos, and Voas, Jeffrey. DDoS in the IoT: Mirai and other botnets. Computer, 50(7):80-84, 2017. IEEE. Link to this entry
    BibTeX Entry
    @article{kolias2017ddos, author = {Kolias, Constantinos and Kambourakis, Georgios and Stavrou, Angelos and Voas, Jeffrey}, title = {DDoS in the IoT: Mirai and other botnets}, journal = {Computer}, volume = {50}, number = {7}, pages = {80--84}, year = {2017}, publisher = {IEEE}, }
  6. Nasiriani, Neda, Shan, Yuquan, Kesidis, George, Fleck, Daniel, and Stavrou, Angelos. Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks. arXiv preprint arXiv:1712.01102, 2017. Link to this entry
    BibTeX Entry
    @article{nasiriani2017changing, author = {Nasiriani, Neda and Shan, Yuquan and Kesidis, George and Fleck, Daniel and Stavrou, Angelos}, title = {Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks}, journal = {arXiv preprint arXiv:1712.01102}, year = {2017}, }
  7. Elsabagh, Mohamed, Barbara, Daniel, Fleck, Dan, and Stavrou, Angelos. Detecting ROP with statistical learning of program characteristics. In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, pages 219-226, 2017. Link to this entry
    BibTeX Entry
    @inproceedings{elsabagh2017detecting, author = {Elsabagh, Mohamed and Barbara, Daniel and Fleck, Dan and Stavrou, Angelos}, title = {Detecting ROP with statistical learning of program characteristics}, booktitle = {Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy}, pages = {219--226}, year = {2017}, }
  8. Elsabagh, Mohamed, Fleck, Dan, and Stavrou, Angelos. Strict virtual call integrity checking for c++ binaries. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pages 140-154, 2017. Link to this entry
    BibTeX Entry
    @inproceedings{elsabagh2017strict, author = {Elsabagh, Mohamed and Fleck, Dan and Stavrou, Angelos}, title = {Strict virtual call integrity checking for c++ binaries}, booktitle = {Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security}, pages = {140--154}, year = {2017}, }
  9. Murmuria, Rahul, Stavrou, Angelos, Barbara, Daniel, and Sritapan, Vincent. Your data in your hands: Privacy-preserving user behavior models for context computation. In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pages 170-175, 2017. Link to this entry
    BibTeX Entry
    @inproceedings{murmuria2017your, author = {Murmuria, Rahul and Stavrou, Angelos and Barbara, Daniel and Sritapan, Vincent}, title = {Your data in your hands: Privacy-preserving user behavior models for context computation}, booktitle = {2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)}, pages = {170--175}, year = {2017}, organization = {IEEE}, }
  10. Kolias, Constantinos, Copi, Lucas, Zhang, Fengwei, and Stavrou, Angelos. Breaking BLE beacons for fun but mostly profit. In Proceedings of the 10th European Workshop on Systems Security, pages 1-6, 2017. Link to this entry
    BibTeX Entry
    @inproceedings{kolias2017breaking, author = {Kolias, Constantinos and Copi, Lucas and Zhang, Fengwei and Stavrou, Angelos}, title = {Breaking BLE beacons for fun but mostly profit}, booktitle = {Proceedings of the 10th European Workshop on Systems Security}, pages = {1--6}, year = {2017}, }
  11. Johnson, Ryan, Murmuria, Rahul, Stavrou, Angelos, and Sritapan, Vincent. Pairing continuous authentication with proactive platform hardening. In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pages 88-90, 2017. Link to this entry
    BibTeX Entry
    @inproceedings{johnson2017pairing, author = {Johnson, Ryan and Murmuria, Rahul and Stavrou, Angelos and Sritapan, Vincent}, title = {Pairing continuous authentication with proactive platform hardening}, booktitle = {2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)}, pages = {88--90}, year = {2017}, organization = {IEEE}, }
  12. Bell, Jonathan, LaToza, Thomas D, Baldmitsi, Foteini, and Stavrou, Angelos. Advancing open science with version control and blockchains. In 2017 IEEE/ACM 12th International Workshop on Software Engineering for Science (SE4Science), pages 13-14, 2017. Link to this entry
    BibTeX Entry
    @inproceedings{bell2017advancing, author = {Bell, Jonathan and LaToza, Thomas D and Baldmitsi, Foteini and Stavrou, Angelos}, title = {Advancing open science with version control and blockchains}, booktitle = {2017 IEEE/ACM 12th International Workshop on Software Engineering for Science (SE4Science)}, pages = {13--14}, year = {2017}, organization = {IEEE}, }
  13. Shan, Yuquan, Kesidis, George, Fleck, Daniel, and Stavrou, Angelos. Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems. In 2017 12th International Conference on Malicious and Unwanted Software (MALWARE), pages 67-74, 2017. Link to this entry
    BibTeX Entry
    @inproceedings{shan2017preliminary, author = {Shan, Yuquan and Kesidis, George and Fleck, Daniel and Stavrou, Angelos}, title = {Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems}, booktitle = {2017 12th International Conference on Malicious and Unwanted Software (MALWARE)}, pages = {67--74}, year = {2017}, organization = {IEEE}, }
  14. Liu, Daiping, Gao, Xing, Zhang, Mingwei, Wang, Haining, and Stavrou, Angelos. Detecting passive cheats in online games via performance-skillfulness inconsistency. In 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pages 615-626, 2017. Link to this entry
    BibTeX Entry
    @inproceedings{liu2017detecting, author = {Liu, Daiping and Gao, Xing and Zhang, Mingwei and Wang, Haining and Stavrou, Angelos}, title = {Detecting passive cheats in online games via performance-skillfulness inconsistency}, booktitle = {2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)}, pages = {615--626}, year = {2017}, organization = {IEEE}, }
  15. Gao, Xing, Liu, Dachuan, Liu, Daiping, Wang, Haining, and Stavrou, Angelos. E-android: A new energy profiling tool for smartphones. In 2017 IEEE 37th international conference on distributed computing systems (ICDCS), pages 492-502, 2017. Link to this entry
    BibTeX Entry
    @inproceedings{gao2017android, author = {Gao, Xing and Liu, Dachuan and Liu, Daiping and Wang, Haining and Stavrou, Angelos}, title = {E-android: A new energy profiling tool for smartphones}, booktitle = {2017 IEEE 37th international conference on distributed computing systems (ICDCS)}, pages = {492--502}, year = {2017}, organization = {IEEE}, }
  16. Srinivasan, Avinash, Dong, Hunter, and Stavrou, Angelos. FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance. In Proceedings of the 12th International Conference on Availability, Reliability and Security, pages 1-8, 2017. Link to this entry
    BibTeX Entry
    @inproceedings{srinivasan2017frost, author = {Srinivasan, Avinash and Dong, Hunter and Stavrou, Angelos}, title = {FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection \& Data Loss with Fault tolerance}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security}, pages = {1--8}, year = {2017}, }
  17. Elsabagh, Mohamed, Fleck, Dan, Stavrou, Angelos, Kaplan, Michael, and Bowen, Thomas. Practical and accurate runtime application protection against dos attacks. In International Symposium on Research in Attacks, Intrusions, and Defenses, pages 450-471, 2017. Link to this entry
    BibTeX Entry
    @inproceedings{elsabagh2017practical, author = {Elsabagh, Mohamed and Fleck, Dan and Stavrou, Angelos and Kaplan, Michael and Bowen, Thomas}, title = {Practical and accurate runtime application protection against dos attacks}, booktitle = {International Symposium on Research in Attacks, Intrusions, and Defenses}, pages = {450--471}, year = {2017}, organization = {Springer International Publishing Cham}, }
  18. Karame, Ghassan O and Stavrou, Angelos. CCSW'17: 2017 ACM Cloud Computing Security. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 2627-2628, 2017. Link to this entry
    BibTeX Entry
    @inproceedings{karame2017ccsw, author = {Karame, Ghassan O and Stavrou, Angelos}, title = {CCSW'17: 2017 ACM Cloud Computing Security}, booktitle = {Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}, pages = {2627--2628}, year = {2017}, }
  19. Kambourakis, Georgios, Kolias, Constantinos, and Stavrou, Angelos. The mirai botnet and the iot zombie armies. In MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), pages 267-272, 2017. Link to this entry
    BibTeX Entry
    @inproceedings{kambourakis2017mirai, author = {Kambourakis, Georgios and Kolias, Constantinos and Stavrou, Angelos}, title = {The mirai botnet and the iot zombie armies}, booktitle = {MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM)}, pages = {267--272}, year = {2017}, organization = {IEEE}, }
  20. Ghosh, Anup, Huang, Yih, Wang, Jiang, and Stavrou, Angelos. Methods and apparatus for application isolation. March~21 2017. Link to this entry US Patent 9,602,524
    BibTeX Entry
    @misc{ghosh2017methods, author = {Ghosh, Anup and Huang, Yih and Wang, Jiang and Stavrou, Angelos}, title = {Methods and apparatus for application isolation}, year = {2017}, month = {March~21}, note = {US Patent 9,602,524}, }

2016

  1. Kolias, Constantinos, Stavrou, Angelos, Voas, Jeffrey, Bojanova, Irena, and Kuhn, Richard. Learning Internet-of-Things security" hands-on". IEEE Security & Privacy, 14(1):37-46, 2016. IEEE. Link to this entry
    BibTeX Entry
    @article{kolias2016learning, author = {Kolias, Constantinos and Stavrou, Angelos and Voas, Jeffrey and Bojanova, Irena and Kuhn, Richard}, title = {Learning Internet-of-Things security" hands-on"}, journal = {IEEE Security \& Privacy}, volume = {14}, number = {1}, pages = {37--46}, year = {2016}, publisher = {IEEE}, }
  2. Stavrou, Angelos, Fleck, Daniel, and Kolias, Constantinos. On the Move: Evading Distributed Denial-of-Service Attacks. Computer, 49(03):104-107, 2016. IEEE Computer Society. Link to this entry
    BibTeX Entry
    @article{stavrou2016move, author = {Stavrou, Angelos and Fleck, Daniel and Kolias, Constantinos}, title = {On the Move: Evading Distributed Denial-of-Service Attacks}, journal = {Computer}, volume = {49}, number = {03}, pages = {104--107}, year = {2016}, publisher = {IEEE Computer Society}, }
  3. Zhang, Fengwei, Leach, Kevin, Stavrou, Angelos, and Wang, Haining. Towards transparent debugging. IEEE Transactions on Dependable and Secure Computing, 15(2):321-335, 2016. IEEE. Link to this entry
    BibTeX Entry
    @article{zhang2016towards, author = {Zhang, Fengwei and Leach, Kevin and Stavrou, Angelos and Wang, Haining}, title = {Towards transparent debugging}, journal = {IEEE Transactions on Dependable and Secure Computing}, volume = {15}, number = {2}, pages = {321--335}, year = {2016}, publisher = {IEEE}, }
  4. Johnson, Ryan and Stavrou, Angelos. Factory Resets and Obtaining Notifications on Samsung Android Devices. 2016. Link to this entry
    BibTeX Entry
    @article{johnson2016factory, author = {Johnson, Ryan and Stavrou, Angelos}, title = {Factory Resets and Obtaining Notifications on Samsung Android Devices}, year = {2016}, }
  5. Kesidis, George, Shan, Yuquan, Stavrou, Angelos, Fleck, D, and Konstantopoulos, T. A moving target and shuffle-decimation quarantine strategy to combat persistent DDoS attacks on a distributed, indirection server system in the cloud. CSE Dept, PSU, Technical Report CSE-16-012, 2016. Link to this entry
    BibTeX Entry
    @article{kesidis2016moving, author = {Kesidis, George and Shan, Yuquan and Stavrou, Angelos and Fleck, D and Konstantopoulos, T}, title = {A moving target and shuffle-decimation quarantine strategy to combat persistent DDoS attacks on a distributed, indirection server system in the cloud}, journal = {CSE Dept, PSU, Technical Report CSE-16-012}, year = {2016}, }
  6. Kolias, Konstantinos, Stavrou, Angelos, Bojanova, Irena, Voas, Jeff, and Grance, Tim. Leveraging Blockchain-based protocols in IoT systems. National Institute of Standard and Technology (NIST) and George Mason University, http://csrc. nist. gov/groups/SMA/ispab/documents/minutes/2016-06/1_iot_stavrous. pdf, 2016. Link to this entry
    BibTeX Entry
    @article{kolias2016leveraging, author = {Kolias, Konstantinos and Stavrou, Angelos and Bojanova, Irena and Voas, Jeff and Grance, Tim}, title = {Leveraging Blockchain-based protocols in IoT systems}, journal = {National Institute of Standard and Technology (NIST) and George Mason University, http://csrc. nist. gov/groups/SMA/ispab/documents/minutes/2016-06/1\_iot\_stavrous. pdf}, year = {2016}, }
  7. Sritapan, Vincent and Stavrou, Angelos. Mobile App Testing for the Enterprise.. ISSA Journal, 14(3), 2016. Link to this entry
    BibTeX Entry
    @article{sritapan2016mobile, author = {Sritapan, Vincent and Stavrou, Angelos}, title = {Mobile App Testing for the Enterprise.}, journal = {ISSA Journal}, volume = {14}, number = {3}, year = {2016}, }
  8. Smutz, Charles and Stavrou, Angelos. When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors.. In NDSS, 2016. Link to this entry
    BibTeX Entry
    @inproceedings{smutz2016tree, author = {Smutz, Charles and Stavrou, Angelos}, title = {When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors.}, booktitle = {NDSS}, year = {2016}, }
  9. Johnson, Ryan, Elsabagh, Mohamed, and Stavrou, Angelos. Why software dos is hard to fix: Denying access in embedded android platforms. In Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings 14, pages 193-211, 2016. Link to this entry
    BibTeX Entry
    @inproceedings{johnson2016software, author = {Johnson, Ryan and Elsabagh, Mohamed and Stavrou, Angelos}, title = {Why software dos is hard to fix: Denying access in embedded android platforms}, booktitle = {Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings 14}, pages = {193--211}, year = {2016}, organization = {Springer International Publishing}, }
  10. Murmuria, Rahul and Stavrou, Angelos. Authentication feature and model selection using penalty algorithms. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016. Link to this entry
    BibTeX Entry
    @inproceedings{murmuria2016authentication, author = {Murmuria, Rahul and Stavrou, Angelos}, title = {Authentication feature and model selection using penalty algorithms}, booktitle = {Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)}, year = {2016}, }
  11. Johnson, Ryan, Stavrou, Angelos, and Sritapan, Vincent. Improving traditional android mdms with non-traditional means. In 2016 IEEE Symposium on Technologies for Homeland Security (HST), pages 1-6, 2016. Link to this entry
    BibTeX Entry
    @inproceedings{johnson2016improving, author = {Johnson, Ryan and Stavrou, Angelos and Sritapan, Vincent}, title = {Improving traditional android mdms with non-traditional means}, booktitle = {2016 IEEE Symposium on Technologies for Homeland Security (HST)}, pages = {1--6}, year = {2016}, organization = {IEEE}, }
  12. Stavrou, Angelos and Keromytis, Angelos D. Systems and methods for inhibiting attacks with a network. May~17 2016. Link to this entry US Patent 9,344,418
    BibTeX Entry
    @misc{stavrou2016systems, author = {Stavrou, Angelos and Keromytis, Angelos D}, title = {Systems and methods for inhibiting attacks with a network}, year = {2016}, month = {May~17}, note = {US Patent 9,344,418}, }
  13. Stavrou, Angelos, Jajodia, Sushil, Ghosh, Anup K, Martin, Rhandi, and Andrianakis, Charalampos. Malware detector. December~27 2016. Link to this entry US Patent 9,531,747
    BibTeX Entry
    @misc{stavrou2016malware, author = {Stavrou, Angelos and Jajodia, Sushil and Ghosh, Anup K and Martin, Rhandi and Andrianakis, Charalampos}, title = {Malware detector}, year = {2016}, month = {December~27}, note = {US Patent 9,531,747}, }

2015

  1. Kolias, Constantinos, Kambourakis, Georgios, Stavrou, Angelos, and Gritzalis, Stefanos. Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset. IEEE Communications Surveys & Tutorials, 18(1):184-208, 2015. IEEE. Link to this entry
    BibTeX Entry
    @article{kolias2015intrusion, author = {Kolias, Constantinos and Kambourakis, Georgios and Stavrou, Angelos and Gritzalis, Stefanos}, title = {Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset}, journal = {IEEE Communications Surveys \& Tutorials}, volume = {18}, number = {1}, pages = {184--208}, year = {2015}, publisher = {IEEE}, }
  2. Smutz, Charles and Stavrou, Angelos. Discerning machine learning degradation via ensemble classifier mutual agreement analysis. George Mason University Technical Report, 2015. Link to this entry
    BibTeX Entry
    @article{smutz2015discerning, author = {Smutz, Charles and Stavrou, Angelos}, title = {Discerning machine learning degradation via ensemble classifier mutual agreement analysis}, journal = {George Mason University Technical Report}, year = {2015}, }
  3. Kolias, Constantinos, Stavrou, Angelos, and Voas, Jeffrey. Securely making" things" right. Computer, 48(9):84-88, 2015. IEEE. Link to this entry
    BibTeX Entry
    @article{kolias2015securely, author = {Kolias, Constantinos and Stavrou, Angelos and Voas, Jeffrey}, title = {Securely making" things" right}, journal = {Computer}, volume = {48}, number = {9}, pages = {84--88}, year = {2015}, publisher = {IEEE}, }
  4. Zhang, Fengwei, Leach, Kevin, Stavrou, Angelos, Wang, Haining, and Sun, Kun. Using hardware features for increased debugging transparency. In 2015 IEEE Symposium on Security and Privacy, pages 55-69, 2015. Link to this entry
    BibTeX Entry
    @inproceedings{zhang2015using, author = {Zhang, Fengwei and Leach, Kevin and Stavrou, Angelos and Wang, Haining and Sun, Kun}, title = {Using hardware features for increased debugging transparency}, booktitle = {2015 IEEE Symposium on Security and Privacy}, pages = {55--69}, year = {2015}, organization = {IEEE}, }
  5. Zhang, Fengwei, Leach, Kevin, Wang, Haining, and Stavrou, Angelos. Trustlogin: Securing password-login on commodity operating systems. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pages 333-344, 2015. Link to this entry
    BibTeX Entry
    @inproceedings{zhang2015trustlogin, author = {Zhang, Fengwei and Leach, Kevin and Wang, Haining and Stavrou, Angelos}, title = {Trustlogin: Securing password-login on commodity operating systems}, booktitle = {Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security}, pages = {333--344}, year = {2015}, }
  6. Xu, Haitao, Liu, Daiping, Wang, Haining, and Stavrou, Angelos. E-commerce reputation manipulation: The emergence of reputation-escalation-as-a-service. In Proceedings of the 24th International Conference on World Wide Web, pages 1296-1306, 2015. Link to this entry
    BibTeX Entry
    @inproceedings{xu2015commerce, author = {Xu, Haitao and Liu, Daiping and Wang, Haining and Stavrou, Angelos}, title = {E-commerce reputation manipulation: The emergence of reputation-escalation-as-a-service}, booktitle = {Proceedings of the 24th International Conference on World Wide Web}, pages = {1296--1306}, year = {2015}, }
  7. Johnson, Ryan, Kiourtis, Nikolaos, Stavrou, Angelos, and Sritapan, Vincent. Analysis of content copyright infringement in mobile application markets. In 2015 APWG Symposium on Electronic Crime Research (eCrime), pages 1-10, 2015. Link to this entry
    BibTeX Entry
    @inproceedings{johnson2015analysis, author = {Johnson, Ryan and Kiourtis, Nikolaos and Stavrou, Angelos and Sritapan, Vincent}, title = {Analysis of content copyright infringement in mobile application markets}, booktitle = {2015 APWG Symposium on Electronic Crime Research (eCrime)}, pages = {1--10}, year = {2015}, organization = {IEEE}, }
  8. Xu, Haitao, Wang, Haining, and Stavrou, Angelos. Privacy risk assessment on online photos. In Research in Attacks, Intrusions, and Defenses: 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015. Proceedings 18, pages 427-447, 2015. Link to this entry
    BibTeX Entry
    @inproceedings{xu2015privacy, author = {Xu, Haitao and Wang, Haining and Stavrou, Angelos}, title = {Privacy risk assessment on online photos}, booktitle = {Research in Attacks, Intrusions, and Defenses: 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015. Proceedings 18}, pages = {427--447}, year = {2015}, organization = {Springer International Publishing}, }
  9. Murmuria, Rahul, Stavrou, Angelos, Barbará, Daniel, and Fleck, Dan. Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users. In Research in Attacks, Intrusions, and Defenses: 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015. Proceedings 18, pages 405-424, 2015. Link to this entry
    BibTeX Entry
    @inproceedings{murmuria2015continuous, author = {Murmuria, Rahul and Stavrou, Angelos and Barbar{\'a}, Daniel and Fleck, Dan}, title = {Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users}, booktitle = {Research in Attacks, Intrusions, and Defenses: 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015. Proceedings 18}, pages = {405--424}, year = {2015}, organization = {Springer International Publishing}, }
  10. Smutz, Charles and Stavrou, Angelos. Preventing exploits in microsoft office documents through content randomization. In Research in Attacks, Intrusions, and Defenses: 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015. Proceedings 18, pages 225-246, 2015. Link to this entry
    BibTeX Entry
    @inproceedings{smutz2015preventing, author = {Smutz, Charles and Stavrou, Angelos}, title = {Preventing exploits in microsoft office documents through content randomization}, booktitle = {Research in Attacks, Intrusions, and Defenses: 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015. Proceedings 18}, pages = {225--246}, year = {2015}, organization = {Springer International Publishing}, }
  11. Elsabagh, Mohamed, Barbará, Daniel, Fleck, Dan, and Stavrou, Angelos. Radmin: early detection of application-level resource exhaustion and starvation attacks. In Research in Attacks, Intrusions, and Defenses: 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015. Proceedings 18, pages 515-537, 2015. Link to this entry
    BibTeX Entry
    @inproceedings{elsabagh2015radmin, author = {Elsabagh, Mohamed and Barbar{\'a}, Daniel and Fleck, Dan and Stavrou, Angelos}, title = {Radmin: early detection of application-level resource exhaustion and starvation attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses: 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015. Proceedings 18}, pages = {515--537}, year = {2015}, organization = {Springer International Publishing}, }
  12. Hao, Shuai, Wang, Haining, Stavrou, Angelos, and Smirni, Evgenia. On the DNS deployment of modern web services. In 2015 IEEE 23rd International Conference on Network Protocols (ICNP), pages 100-110, 2015. Link to this entry
    BibTeX Entry
    @inproceedings{hao2015dns, author = {Hao, Shuai and Wang, Haining and Stavrou, Angelos and Smirni, Evgenia}, title = {On the DNS deployment of modern web services}, booktitle = {2015 IEEE 23rd International Conference on Network Protocols (ICNP)}, pages = {100--110}, year = {2015}, organization = {IEEE}, }
  13. Johnson, Ryan, Elsabagh, Mohamed, Stavrou, Angelos, and Sritapan, Vincent. Targeted DoS on android: how to disable android in 10 seconds or less. In 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), pages 136-143, 2015. Link to this entry
    BibTeX Entry
    @inproceedings{johnson2015targeted, author = {Johnson, Ryan and Elsabagh, Mohamed and Stavrou, Angelos and Sritapan, Vincent}, title = {Targeted DoS on android: how to disable android in 10 seconds or less}, booktitle = {2015 10th International Conference on Malicious and Unwanted Software (MALWARE)}, pages = {136--143}, year = {2015}, organization = {IEEE}, }
  14. Stolfo, Salvatore, Keromytis, Angelos D, Yang, Junfeng, Geneiatakis, Dimitris, Polychronakis, Michalis, Portokalidis, Georgios, Jee, Kangkook, Kemerlis, Vasileios P, Stavrou, Angelos, Fleck, Dan, and others. MINESTRONE. 2015. Link to this entry
    BibTeX Entry
    @techreport{stolfo2015minestrone, author = {Stolfo, Salvatore and Keromytis, Angelos D and Yang, Junfeng and Geneiatakis, Dimitris and Polychronakis, Michalis and Portokalidis, Georgios and Jee, Kangkook and Kemerlis, Vasileios P and Stavrou, Angelos and Fleck, Dan and others}, title = {MINESTRONE}, year = {2015}, }
  15. Ciocarlie, Gabriela F, Stavrou, Angelos, Stolfo, Salvatore J, and Keromytis, Angelos D. Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models. July~21 2015. Link to this entry US Patent 9,088,596
    BibTeX Entry
    @misc{ciocarlie2015systems, author = {Ciocarlie, Gabriela F and Stavrou, Angelos and Stolfo, Salvatore J and Keromytis, Angelos D}, title = {Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models}, year = {2015}, month = {July~21}, note = {US Patent 9,088,596}, }
  16. Stavrou, Angelos and Perry-Flippin, Margaret Lee. Adaptive feedback loop based on a sensor for streaming static and interactive media content to animals. May~26 2015. Link to this entry US Patent 9,043,818
    BibTeX Entry
    @misc{stavrou2015adaptive, author = {Stavrou, Angelos and Perry-Flippin, Margaret Lee}, title = {Adaptive feedback loop based on a sensor for streaming static and interactive media content to animals}, year = {2015}, month = {May~26}, note = {US Patent 9,043,818}, }
  17. Stavrou, Angelos, Jajodia, Sushil, Ghosh, Anup, Martin, Rhandi, and Andrianakis, Charalampos. Malware detector. January~13 2015. Link to this entry US Patent 8,935,773
    BibTeX Entry
    @misc{stavrou2015malware, author = {Stavrou, Angelos and Jajodia, Sushil and Ghosh, Anup and Martin, Rhandi and Andrianakis, Charalampos}, title = {Malware detector}, year = {2015}, month = {January~13}, note = {US Patent 8,935,773}, }
  18. Locasto, Michael E, Keromytis, Angelos D, Stavrou, Angelos, and Ciocarlie, Gabriela F. Systems, methods, and media for recovering an application from a fault or attack. December~22 2015. Link to this entry US Patent 9,218,254
    BibTeX Entry
    @misc{locasto2015systems, author = {Locasto, Michael E and Keromytis, Angelos D and Stavrou, Angelos and Ciocarlie, Gabriela F}, title = {Systems, methods, and media for recovering an application from a fault or attack}, year = {2015}, month = {December~22}, note = {US Patent 9,218,254}, }

2014

  1. Wang, Huangxin, Jia, Quan, Fleck, Dan, Powell, Walter, Li, Fei, and Stavrou, Angelos. A moving target DDoS defense mechanism. Computer Communications, 46:10-21, 2014. Elsevier. Link to this entry
    BibTeX Entry
    @article{wang2014moving, author = {Wang, Huangxin and Jia, Quan and Fleck, Dan and Powell, Walter and Li, Fei and Stavrou, Angelos}, title = {A moving target DDoS defense mechanism}, journal = {Computer Communications}, volume = {46}, pages = {10--21}, year = {2014}, publisher = {Elsevier}, }
  2. Smutz, Charles and Stavrou, Angelos. Document Content Layout Based Exploit Protections. 2014. Link to this entry
    BibTeX Entry
    @article{smutz2014document, author = {Smutz, Charles and Stavrou, Angelos}, title = {Document Content Layout Based Exploit Protections}, year = {2014}, }
  3. Router, MX48. Copyright Notice. 2014. Link to this entry
    BibTeX Entry
    @article{router2014copyright, author = {Router, MX48}, title = {Copyright Notice}, year = {2014}, }
  4. Cooley, Brett, Wang, Haining, and Stavrou, Angelos. Activity spoofing and its defense in Android smartphones. In Applied Cryptography and Network Security: 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings 12, pages 494-512, 2014. Link to this entry
    BibTeX Entry
    @inproceedings{cooley2014activity, author = {Cooley, Brett and Wang, Haining and Stavrou, Angelos}, title = {Activity spoofing and its defense in Android smartphones}, booktitle = {Applied Cryptography and Network Security: 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings 12}, pages = {494--512}, year = {2014}, organization = {Springer International Publishing}, }
  5. Zhang, Fengwei, Wang, Haining, Leach, Kevin, and Stavrou, Angelos. A framework to secure peripherals at runtime. In Computer Security-ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I 19, pages 219-238, 2014. Link to this entry
    BibTeX Entry
    @inproceedings{zhang2014framework, author = {Zhang, Fengwei and Wang, Haining and Leach, Kevin and Stavrou, Angelos}, title = {A framework to secure peripherals at runtime}, booktitle = {Computer Security-ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I 19}, pages = {219--238}, year = {2014}, organization = {Springer International Publishing}, }
  6. Xu, Haitao, Liu, Daiping, Koehl, Aaron, Wang, Haining, and Stavrou, Angelos. Click fraud detection on the advertiser side. In Computer Security-ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II 19, pages 419-438, 2014. Link to this entry
    BibTeX Entry
    @inproceedings{xu2014click, author = {Xu, Haitao and Liu, Daiping and Koehl, Aaron and Wang, Haining and Stavrou, Angelos}, title = {Click fraud detection on the advertiser side}, booktitle = {Computer Security-ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II 19}, pages = {419--438}, year = {2014}, organization = {Springer International Publishing}, }
  7. Jia, Quan, Wang, Huangxin, Fleck, Dan, Li, Fei, Stavrou, Angelos, and Powell, Walter. Catch me if you can: A cloud-enabled DDoS defense. In 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pages 264-275, 2014. Link to this entry
    BibTeX Entry
    @inproceedings{jia2014catch, author = {Jia, Quan and Wang, Huangxin and Fleck, Dan and Li, Fei and Stavrou, Angelos and Powell, Walter}, title = {Catch me if you can: A cloud-enabled DDoS defense}, booktitle = {2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks}, pages = {264--275}, year = {2014}, organization = {IEEE}, }
  8. Liu, Daiping, Wang, Haining, and Stavrou, Angelos. Detecting malicious javascript in pdf through document instrumentation. In 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pages 100-111, 2014. Link to this entry
    BibTeX Entry
    @inproceedings{liu2014detecting, author = {Liu, Daiping and Wang, Haining and Stavrou, Angelos}, title = {Detecting malicious javascript in pdf through document instrumentation}, booktitle = {2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks}, pages = {100--111}, year = {2014}, organization = {IEEE}, }
  9. Hiremagalore, Sharath, Barbará, Daniel, Fleck, Dan, Powell, Walter, and Stavrou, Angelos. transAD: An Anomaly Detection Network Intrusion Sensor for the Web. In Information Security: 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings 17, pages 477-489, 2014. Link to this entry
    BibTeX Entry
    @inproceedings{hiremagalore2014transad, author = {Hiremagalore, Sharath and Barbar{\'a}, Daniel and Fleck, Dan and Powell, Walter and Stavrou, Angelos}, title = {transAD: An Anomaly Detection Network Intrusion Sensor for the Web}, booktitle = {Information Security: 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings 17}, pages = {477--489}, year = {2014}, organization = {Springer International Publishing}, }
  10. Locasto, Michael E, Keromytis, Angelos D, Stavrou, Angelos, and Ciocarlie, Gabriela F. Systems, methods, and media for recovering an application from a fault or attack. December~30 2014. Link to this entry US Patent 8,924,782
    BibTeX Entry
    @misc{locasto2014systems, author = {Locasto, Michael E and Keromytis, Angelos D and Stavrou, Angelos and Ciocarlie, Gabriela F}, title = {Systems, methods, and media for recovering an application from a fault or attack}, year = {2014}, month = {December~30}, note = {US Patent 8,924,782}, }
  11. Stavrou, Angelos and Keromytis, Angelos D. Systems and methods for inhibiting attacks with a network. January~14 2014. Link to this entry US Patent 8,631,484
    BibTeX Entry
    @misc{stavrou2014systems, author = {Stavrou, Angelos and Keromytis, Angelos D}, title = {Systems and methods for inhibiting attacks with a network}, year = {2014}, month = {January~14}, note = {US Patent 8,631,484}, }
  12. Wang, Jiang, Stavrou, Angelos, Ghosh, Anup, and Sun, Kun. Hardware-assisted integrity monitor. August~26 2014. Link to this entry US Patent 8,819,225
    BibTeX Entry
    @misc{wang2014hardware, author = {Wang, Jiang and Stavrou, Angelos and Ghosh, Anup and Sun, Kun}, title = {Hardware-assisted integrity monitor}, year = {2014}, month = {August~26}, note = {US Patent 8,819,225}, }
  13. Stavrou, Angelos, Bos, Herbert, and Portokalidis, Georgios. Research in Attacks, Intrusions and Defenses. 2014. Springer International Publishing. Link to this entry
    BibTeX Entry
    @misc{stavrou2014research, author = {Stavrou, Angelos and Bos, Herbert and Portokalidis, Georgios}, title = {Research in Attacks, Intrusions and Defenses}, year = {2014}, publisher = {Springer International Publishing}, }
  14. Stavrou, Angelos, Alhussein, Mohammed A, and Sanders, Brian. Website matching based on network traffic. May~13 2014. Link to this entry US Patent 8,726,005
    BibTeX Entry
    @misc{stavrou2014website, author = {Stavrou, Angelos and Alhussein, Mohammed A and Sanders, Brian}, title = {Website matching based on network traffic}, year = {2014}, month = {May~13}, note = {US Patent 8,726,005}, }

2013

  1. Zhang, Fengwei, Wang, Jiang, Sun, Kun, and Stavrou, Angelos. Hypercheck: A hardware-assistedintegrity monitor. IEEE Transactions on Dependable and Secure Computing, 11(4):332-344, 2013. IEEE. Link to this entry
    BibTeX Entry
    @article{zhang2013hypercheck, author = {Zhang, Fengwei and Wang, Jiang and Sun, Kun and Stavrou, Angelos}, title = {Hypercheck: A hardware-assistedintegrity monitor}, journal = {IEEE Transactions on Dependable and Secure Computing}, volume = {11}, number = {4}, pages = {332--344}, year = {2013}, publisher = {IEEE}, }
  2. Hiremagalore, Sharath, Liang, Chen, Stavrou, Angelos, and Rangwala, Huzefa. Improving network response times using social information. Social Network Analysis and Mining, 3:209-220, 2013. Springer Vienna. Link to this entry
    BibTeX Entry
    @article{hiremagalore2013improving, author = {Hiremagalore, Sharath and Liang, Chen and Stavrou, Angelos and Rangwala, Huzefa}, title = {Improving network response times using social information}, journal = {Social Network Analysis and Mining}, volume = {3}, pages = {209--220}, year = {2013}, publisher = {Springer Vienna}, }
  3. Ardagna, Claudio A, Jajodia, Sushil, Samarati, Pierangela, and Stavrou, Angelos. Providing users’ anonymity in mobile hybrid networks. ACM Transactions on Internet Technology (TOIT), 12(3):1-33, 2013. ACM New York, NY, USA. Link to this entry
    BibTeX Entry
    @article{ardagna2013providing, author = {Ardagna, Claudio A and Jajodia, Sushil and Samarati, Pierangela and Stavrou, Angelos}, title = {Providing users’ anonymity in mobile hybrid networks}, journal = {ACM Transactions on Internet Technology (TOIT)}, volume = {12}, number = {3}, pages = {1--33}, year = {2013}, publisher = {ACM New York, NY, USA}, }
  4. Jia, Quan, Sun, Kun, and Stavrou, Angelos. Capability-based defenses against DoS attacks in multi-path MANET communications. Wireless personal communications, 73:127-148, 2013. Springer US. Link to this entry
    BibTeX Entry
    @article{jia2013capability, author = {Jia, Quan and Sun, Kun and Stavrou, Angelos}, title = {Capability-based defenses against DoS attacks in multi-path MANET communications}, journal = {Wireless personal communications}, volume = {73}, pages = {127--148}, year = {2013}, publisher = {Springer US}, }
  5. Stolfo, S, Stavrou, Angelos, and Wright, Charles V. Research in Attacks, Intrusions, and Defenses. New York: Portland State University. p204-223, 2013. Link to this entry
    BibTeX Entry
    @article{stolfo2013research, author = {Stolfo, S and Stavrou, Angelos and Wright, Charles V}, title = {Research in Attacks, Intrusions, and Defenses}, journal = {New York: Portland State University. p204-223}, year = {2013}, }
  6. Schulte, Brian, Andrianakis, Haris, Sun, Kun, and Stavrou, Angelos. Netgator: Malware detection using program interactive challenges. In Detection of Intrusions and Malware, and Vulnerability Assessment: 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers 9, pages 164-183, 2013. Link to this entry
    BibTeX Entry
    @inproceedings{schulte2013netgator, author = {Schulte, Brian and Andrianakis, Haris and Sun, Kun and Stavrou, Angelos}, title = {Netgator: Malware detection using program interactive challenges}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment: 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers 9}, pages = {164--183}, year = {2013}, organization = {Springer Berlin Heidelberg}, }
  7. Zhang, Fengwei, Leach, Kevin, Sun, Kun, and Stavrou, Angelos. Spectre: A dependable introspection framework via system management mode. In 2013 43rd Annual IEEE/IFIP international conference on dependable systems and networks (DSN), pages 1-12, 2013. Link to this entry
    BibTeX Entry
    @inproceedings{zhang2013spectre, author = {Zhang, Fengwei and Leach, Kevin and Sun, Kun and Stavrou, Angelos}, title = {Spectre: A dependable introspection framework via system management mode}, booktitle = {2013 43rd Annual IEEE/IFIP international conference on dependable systems and networks (DSN)}, pages = {1--12}, year = {2013}, organization = {IEEE}, }
  8. Srinivasan, Avinash, Nazaraj, Srinath Thirthahalli, and Stavrou, Angelos. HIDEINSIDE—A novel randomized & encrypted antiforensic information hiding. In 2013 International Conference on Computing, Networking and Communications (ICNC), pages 626-631, 2013. Link to this entry
    BibTeX Entry
    @inproceedings{srinivasan2013hideinside, author = {Srinivasan, Avinash and Nazaraj, Srinath Thirthahalli and Stavrou, Angelos}, title = {HIDEINSIDE—A novel randomized \& encrypted antiforensic information hiding}, booktitle = {2013 International Conference on Computing, Networking and Communications (ICNC)}, pages = {626--631}, year = {2013}, organization = {IEEE}, }
  9. Nazzicari, Nelson, Almillategui, Javier, Stavrou, Angelos, and Jajodia, Sushil. Switchwall: automated topology fingerprinting and behavior deviation identification. In Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers 8, pages 161-176, 2013. Link to this entry
    BibTeX Entry
    @inproceedings{nazzicari2013switchwall, author = {Nazzicari, Nelson and Almillategui, Javier and Stavrou, Angelos and Jajodia, Sushil}, title = {Switchwall: automated topology fingerprinting and behavior deviation identification}, booktitle = {Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers 8}, pages = {161--176}, year = {2013}, organization = {Springer Berlin Heidelberg}, }
  10. Johnson, Ryan, Wang, Zhaohui, Stavrou, Angelos, and Voas, Jeff. Exposing software security and availability risks for commercial mobile devices. In 2013 Proceedings Annual Reliability and Maintainability Symposium (RAMS), pages 1-7, 2013. Link to this entry
    BibTeX Entry
    @inproceedings{johnson2013exposing, author = {Johnson, Ryan and Wang, Zhaohui and Stavrou, Angelos and Voas, Jeff}, title = {Exposing software security and availability risks for commercial mobile devices}, booktitle = {2013 Proceedings Annual Reliability and Maintainability Symposium (RAMS)}, pages = {1--7}, year = {2013}, organization = {IEEE}, }
  11. Johnson, Ryan and Stavrou, Angelos. Forced-path execution for android applications on x86 platforms. In 2013 IEEE Seventh International Conference on Software Security and Reliability Companion, pages 188-197, 2013. Link to this entry
    BibTeX Entry
    @inproceedings{johnson2013forced, author = {Johnson, Ryan and Stavrou, Angelos}, title = {Forced-path execution for android applications on x86 platforms}, booktitle = {2013 IEEE Seventh International Conference on Software Security and Reliability Companion}, pages = {188--197}, year = {2013}, organization = {IEEE}, }
  12. Jia, Quan, Sun, Kun, and Stavrou, Angelos. Motag: Moving target defense against internet denial of service attacks. In 2013 22nd International Conference on Computer Communication and Networks (ICCCN), pages 1-9, 2013. Link to this entry
    BibTeX Entry
    @inproceedings{jia2013motag, author = {Jia, Quan and Sun, Kun and Stavrou, Angelos}, title = {Motag: Moving target defense against internet denial of service attacks}, booktitle = {2013 22nd International Conference on Computer Communication and Networks (ICCCN)}, pages = {1--9}, year = {2013}, organization = {IEEE}, }
  13. Fleck, Dan, Tokhtabayev, Arnur, Alarif, Alex, Stavrou, Angelos, and Nykodym, Tomas. Pytrigger: A system to trigger & extract user-activated malware behavior. In 2013 International Conference on Availability, Reliability and Security, pages 92-101, 2013. Link to this entry
    BibTeX Entry
    @inproceedings{fleck2013pytrigger, author = {Fleck, Dan and Tokhtabayev, Arnur and Alarif, Alex and Stavrou, Angelos and Nykodym, Tomas}, title = {Pytrigger: A system to trigger \& extract user-activated malware behavior}, booktitle = {2013 International Conference on Availability, Reliability and Security}, pages = {92--101}, year = {2013}, organization = {IEEE}, }
  14. Karami, Mohammad, Elsabagh, Mohamed, Najafiborazjani, Parnian, and Stavrou, Angelos. Behavioral analysis of android applications using automated instrumentation. In 2013 IEEE Seventh International Conference on Software Security and Reliability Companion, pages 182-187, 2013. Link to this entry
    BibTeX Entry
    @inproceedings{karami2013behavioral, author = {Karami, Mohammad and Elsabagh, Mohamed and Najafiborazjani, Parnian and Stavrou, Angelos}, title = {Behavioral analysis of android applications using automated instrumentation}, booktitle = {2013 IEEE Seventh International Conference on Software Security and Reliability Companion}, pages = {182--187}, year = {2013}, organization = {IEEE}, }
  15. Stavrou, Angelos. Programming on Android: Best Practices for Security and Reliability. In 2013 IEEE 7th International Conference on Software Security and Reliability, pages 1-2, 2013. Link to this entry
    BibTeX Entry
    @inproceedings{stavrou2013programming, author = {Stavrou, Angelos}, title = {Programming on Android: Best Practices for Security and Reliability}, booktitle = {2013 IEEE 7th International Conference on Software Security and Reliability}, pages = {1--2}, year = {2013}, organization = {IEEE}, }
  16. Applegate, Scott D and Stavrou, Angelos. Towards a cyber conflict taxonomy. In 2013 5th International Conference on Cyber Conflict (CYCON 2013), pages 1-18, 2013. Link to this entry
    BibTeX Entry
    @inproceedings{applegate2013towards, author = {Applegate, Scott D and Stavrou, Angelos}, title = {Towards a cyber conflict taxonomy}, booktitle = {2013 5th International Conference on Cyber Conflict (CYCON 2013)}, pages = {1--18}, year = {2013}, organization = {IEEE}, }
  17. Claiborne, Cynthia, Fazeen, Mohamed, Dantu, Ram, Stolfo, SJ, Stavrou, A, and Wright, CV. Android sensor data anonymization. In RAID, pages 469-471, 2013. Link to this entry
    BibTeX Entry
    @inproceedings{claiborne2013android, author = {Claiborne, Cynthia and Fazeen, Mohamed and Dantu, Ram and Stolfo, SJ and Stavrou, A and Wright, CV}, title = {Android sensor data anonymization}, booktitle = {RAID}, pages = {469--471}, year = {2013}, }
  18. Stavrou, Angelos, Keromytis, Angelos D, Nieh, Jason, Misra, Vishal, and Rubenstein, Daniel. Methods, media and systems for responding to a denial of service attack. October~1 2013. Link to this entry US Patent 8,549,646
    BibTeX Entry
    @misc{stavrou2013methods, author = {Stavrou, Angelos and Keromytis, Angelos D and Nieh, Jason and Misra, Vishal and Rubenstein, Daniel}, title = {Methods, media and systems for responding to a denial of service attack}, year = {2013}, month = {October~1}, note = {US Patent 8,549,646}, }
  19. Cretu, Gabriela, Stavrou, Angelos, Stolfo, Salvatore J, Keromytis, Angelos D, and Locasto, Michael E. Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models. March~26 2013. Link to this entry US Patent 8,407,160
    BibTeX Entry
    @misc{cretu2013systems, author = {Cretu, Gabriela and Stavrou, Angelos and Stolfo, Salvatore J and Keromytis, Angelos D and Locasto, Michael E}, title = {Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models}, year = {2013}, month = {March~26}, note = {US Patent 8,407,160}, }
  20. Stolfo, Salvatore, Stavrou, Angelos, and Wright, Charles. Proceedings of the 16th International Symposium on Research in Attacks, Intrusions, and Defenses-Volume 8145. 2013. Springer-Verlag. Link to this entry
    BibTeX Entry
    @misc{stolfo2013proceedings, author = {Stolfo, Salvatore and Stavrou, Angelos and Wright, Charles}, title = {Proceedings of the 16th International Symposium on Research in Attacks, Intrusions, and Defenses-Volume 8145}, year = {2013}, publisher = {Springer-Verlag}, }

2012

  1. Stavrou, Angelos, Voas, Jeffrey, Karygiannis, Tom, and Quirolgico, Steve. Building security into off-the-shelf smartphones. Computer, 45(02):82-84, 2012. IEEE Computer Society. Link to this entry
    BibTeX Entry
    @article{stavrou2012building, author = {Stavrou, Angelos and Voas, Jeffrey and Karygiannis, Tom and Quirolgico, Steve}, title = {Building security into off-the-shelf smartphones}, journal = {Computer}, volume = {45}, number = {02}, pages = {82--84}, year = {2012}, publisher = {IEEE Computer Society}, }
  2. Dimitrakakis, C, Karygiannis, T, Mitrokotsa, A, Nix, R, Kantarcioglu, M, Pathak, MA, Raj, B, Zhu, Y, Lu, Y, Vikram, A, and others. DEPENDABLE AND SECURE COMPUTING. 2012. Link to this entry
    BibTeX Entry
    @article{dimitrakakis2012dependable, author = {Dimitrakakis, C and Karygiannis, T and Mitrokotsa, A and Nix, R and Kantarcioglu, M and Pathak, MA and Raj, B and Zhu, Y and Lu, Y and Vikram, A and others}, title = {DEPENDABLE AND SECURE COMPUTING}, year = {2012}, }
  3. Leach, Kevin and Stavrou, Angelos. Heaps of Heap-based Memory Attacks. Center for Secure Information Systems, 2012. Link to this entry
    BibTeX Entry
    @article{leach2012heaps, author = {Leach, Kevin and Stavrou, Angelos}, title = {Heaps of Heap-based Memory Attacks}, journal = {Center for Secure Information Systems}, year = {2012}, }
  4. Sun, Kun, Wang, Jiang, Zhang, Fengwei, and Stavrou, Angelos. SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.. In NDSS, 2012. Link to this entry
    BibTeX Entry
    @inproceedings{sun2012secureswitch, author = {Sun, Kun and Wang, Jiang and Zhang, Fengwei and Stavrou, Angelos}, title = {SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.}, booktitle = {NDSS}, year = {2012}, }
  5. Murmuria, Rahul, Medsger, Jeffrey, Stavrou, Angelos, and Voas, Jeffrey M. Mobile application and device power usage measurements. In 2012 IEEE Sixth International Conference on Software Security and Reliability, pages 147-156, 2012. Link to this entry
    BibTeX Entry
    @inproceedings{murmuria2012mobile, author = {Murmuria, Rahul and Medsger, Jeffrey and Stavrou, Angelos and Voas, Jeffrey M}, title = {Mobile application and device power usage measurements}, booktitle = {2012 IEEE Sixth International Conference on Software Security and Reliability}, pages = {147--156}, year = {2012}, organization = {IEEE}, }
  6. Wang, Zhaohui, Murmuria, Rahul, and Stavrou, Angelos. Implementing and optimizing an encryption filesystem on android. In 2012 IEEE 13th International Conference on Mobile Data Management, pages 52-62, 2012. Link to this entry
    BibTeX Entry
    @inproceedings{wang2012implementing, author = {Wang, Zhaohui and Murmuria, Rahul and Stavrou, Angelos}, title = {Implementing and optimizing an encryption filesystem on android}, booktitle = {2012 IEEE 13th International Conference on Mobile Data Management}, pages = {52--62}, year = {2012}, organization = {IEEE}, }
  7. Mahmood, Riyadh, Esfahani, Naeem, Kacem, Thabet, Mirzaei, Nariman, Malek, Sam, and Stavrou, Angelos. A whitebox approach for automated security testing of Android applications on the cloud. In 2012 7th International Workshop on Automation of Software Test (AST), pages 22-28, 2012. Link to this entry
    BibTeX Entry
    @inproceedings{mahmood2012whitebox, author = {Mahmood, Riyadh and Esfahani, Naeem and Kacem, Thabet and Mirzaei, Nariman and Malek, Sam and Stavrou, Angelos}, title = {A whitebox approach for automated security testing of Android applications on the cloud}, booktitle = {2012 7th International Workshop on Automation of Software Test (AST)}, pages = {22--28}, year = {2012}, organization = {IEEE}, }
  8. Wang, Zhaohui, Johnson, Ryan, and Stavrou, Angelos. Attestation & authentication for usb communications. In 2012 IEEE Sixth International Conference on Software Security and Reliability Companion, pages 43-44, 2012. Link to this entry
    BibTeX Entry
    @inproceedings{wang2012attestation, author = {Wang, Zhaohui and Johnson, Ryan and Stavrou, Angelos}, title = {Attestation \& authentication for usb communications}, booktitle = {2012 IEEE Sixth International Conference on Software Security and Reliability Companion}, pages = {43--44}, year = {2012}, organization = {IEEE}, }
  9. Smutz, Charles and Stavrou, Angelos. Malicious PDF detection using metadata and structural features. In Proceedings of the 28th annual computer security applications conference, pages 239-248, 2012. Link to this entry
    BibTeX Entry
    @inproceedings{smutz2012malicious, author = {Smutz, Charles and Stavrou, Angelos}, title = {Malicious PDF detection using metadata and structural features}, booktitle = {Proceedings of the 28th annual computer security applications conference}, pages = {239--248}, year = {2012}, }
  10. Wang, Jiang, Sun, Kun, and Stavrou, Angelos. A dependability analysis of hardware-assisted polling integrity checking systems. In IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), pages 1-12, 2012. Link to this entry
    BibTeX Entry
    @inproceedings{wang2012dependability, author = {Wang, Jiang and Sun, Kun and Stavrou, Angelos}, title = {A dependability analysis of hardware-assisted polling integrity checking systems}, booktitle = {IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012)}, pages = {1--12}, year = {2012}, organization = {IEEE}, }
  11. Wang, Jiang, Sun, Kun, and Stavrou, Angelos. Hardware-assisted application integrity monitor. In 2012 45th Hawaii International Conference on System Sciences, pages 5375-5383, 2012. Link to this entry
    BibTeX Entry
    @inproceedings{wang2012hardware, author = {Wang, Jiang and Sun, Kun and Stavrou, Angelos}, title = {Hardware-assisted application integrity monitor}, booktitle = {2012 45th Hawaii International Conference on System Sciences}, pages = {5375--5383}, year = {2012}, organization = {IEEE}, }
  12. Yang, Xiaohui, Stavrou, Angelos, Dantu, Ram, and Wijesekera, Duminda. Small World VoIP. In Mobile Computing, Applications, and Services: Second International ICST Conference, MobiCASE 2010, Santa Clara, CA, USA, October 25-28, 2010, Revised Selected Papers 2, pages 137-155, 2012. Link to this entry
    BibTeX Entry
    @inproceedings{yang2012small, author = {Yang, Xiaohui and Stavrou, Angelos and Dantu, Ram and Wijesekera, Duminda}, title = {Small World VoIP}, booktitle = {Mobile Computing, Applications, and Services: Second International ICST Conference, MobiCASE 2010, Santa Clara, CA, USA, October 25-28, 2010, Revised Selected Papers 2}, pages = {137--155}, year = {2012}, organization = {Springer Berlin Heidelberg}, }
  13. Malek, Sam, Esfahani, Naeem, Kacem, Thabet, Mahmood, Riyadh, Mirzaei, Nariman, and Stavrou, Angelos. A framework for automated security testing of android applications on the cloud. In 2012 IEEE Sixth International Conference on Software Security and Reliability Companion, pages 35-36, 2012. Link to this entry
    BibTeX Entry
    @inproceedings{malek2012framework, author = {Malek, Sam and Esfahani, Naeem and Kacem, Thabet and Mahmood, Riyadh and Mirzaei, Nariman and Stavrou, Angelos}, title = {A framework for automated security testing of android applications on the cloud}, booktitle = {2012 IEEE Sixth International Conference on Software Security and Reliability Companion}, pages = {35--36}, year = {2012}, organization = {IEEE}, }
  14. Le, Meixing, Wang, Zhaohui, Jia, Quan, Stavrou, Angelos, Ghosh, Anup K, and Jajodia, Sushil. Trading Elephants for Ants: Efficient Post-attack Reconstitution. In Security and Privacy in Communication Networks: 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers 7, pages 460-469, 2012. Link to this entry
    BibTeX Entry
    @inproceedings{le2012trading, author = {Le, Meixing and Wang, Zhaohui and Jia, Quan and Stavrou, Angelos and Ghosh, Anup K and Jajodia, Sushil}, title = {Trading Elephants for Ants: Efficient Post-attack Reconstitution}, booktitle = {Security and Privacy in Communication Networks: 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers 7}, pages = {460--469}, year = {2012}, organization = {Springer Berlin Heidelberg}, }
  15. Johnson, Ryan, Wang, Zhaohui, Gagnon, Corey, and Stavrou, Angelos. Analysis of android applications' permissions. In 2012 IEEE Sixth International Conference on Software Security and Reliability Companion, pages 45-46, 2012. Link to this entry
    BibTeX Entry
    @inproceedings{johnson2012analysis, author = {Johnson, Ryan and Wang, Zhaohui and Gagnon, Corey and Stavrou, Angelos}, title = {Analysis of android applications' permissions}, booktitle = {2012 IEEE Sixth International Conference on Software Security and Reliability Companion}, pages = {45--46}, year = {2012}, organization = {IEEE}, }
  16. Keromytis, Angelos D, Geambasu, Roxana, Sethumadhavan, Simha, Stolfo, Salvatore J, Yang, Junfeng, Benameur, Azzedine, Dacier, Marc, Elder, Matthew, Kienzle, Darrell, and Stavrou, Angelos. The meerkats cloud security architecture. In 2012 32nd International Conference on Distributed Computing Systems Workshops, pages 446-450, 2012. Link to this entry
    BibTeX Entry
    @inproceedings{keromytis2012meerkats, author = {Keromytis, Angelos D and Geambasu, Roxana and Sethumadhavan, Simha and Stolfo, Salvatore J and Yang, Junfeng and Benameur, Azzedine and Dacier, Marc and Elder, Matthew and Kienzle, Darrell and Stavrou, Angelos}, title = {The meerkats cloud security architecture}, booktitle = {2012 32nd International Conference on Distributed Computing Systems Workshops}, pages = {446--450}, year = {2012}, organization = {IEEE}, }
  17. Yavvari, Chaitanya, Tokhtabayev, Arnur, Rangwala, Huzefa, and Stavrou, Angelos. Malware characterization using behavioral components. In Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings 6, pages 226-239, 2012. Link to this entry
    BibTeX Entry
    @inproceedings{yavvari2012malware, author = {Yavvari, Chaitanya and Tokhtabayev, Arnur and Rangwala, Huzefa and Stavrou, Angelos}, title = {Malware characterization using behavioral components}, booktitle = {Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings 6}, pages = {226--239}, year = {2012}, organization = {Springer Berlin Heidelberg}, }
  18. Wang, Zhaohui, Johnson, Ryan, Murmuria, Rahul, and Stavrou, Angelos. Exposing security risks for commercial mobile devices. In Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings 6, pages 3-21, 2012. Link to this entry
    BibTeX Entry
    @inproceedings{wang2012exposing, author = {Wang, Zhaohui and Johnson, Ryan and Murmuria, Rahul and Stavrou, Angelos}, title = {Exposing security risks for commercial mobile devices}, booktitle = {Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings 6}, pages = {3--21}, year = {2012}, organization = {Springer Berlin Heidelberg}, }
  19. Ghosh, Anup, Stavrou, Angelos, Greamo, Christopher, and SECURE COMMAND LLC CENTREVILLE VA. Automatic Identification & Mitigation of Unauthorized Information Leaking from Enterprise Networks. 2012. Link to this entry
    BibTeX Entry
    @techreport{ghosh2012automatic, author = {Ghosh, Anup and Stavrou, Angelos and Greamo, Christopher and SECURE COMMAND LLC CENTREVILLE VA}, title = {Automatic Identification \& Mitigation of Unauthorized Information Leaking from Enterprise Networks}, year = {2012}, }
  20. Keromytis, Angelos D, Chakravarty, Sambuddho, and Stavrou, Angelos. Systems and methods for computing data transmission characteristics of a network path based on single-ended measurements. July~24 2012. Link to this entry US Patent 8,228,815
    BibTeX Entry
    @misc{keromytis2012systems, author = {Keromytis, Angelos D and Chakravarty, Sambuddho and Stavrou, Angelos}, title = {Systems and methods for computing data transmission characteristics of a network path based on single-ended measurements}, year = {2012}, month = {July~24}, note = {US Patent 8,228,815}, }
  21. Schulte, Brian, Stavrou, Angelos, Ghosh, Anup K, Martin, Rhandi, and Andrianakis, Charalampos. Interactive Malware Detector. November~22 2012. Link to this entry US Patent App. 13/296,319
    BibTeX Entry
    @misc{schulte2012interactive, author = {Schulte, Brian and Stavrou, Angelos and Ghosh, Anup K and Martin, Rhandi and Andrianakis, Charalampos}, title = {Interactive Malware Detector}, year = {2012}, month = {November~22}, note = {US Patent App. 13/296,319}, }
  22. Ghosh, Anup K, Sun, Kun, Wang, Jiang, and Stavrou, Angelos. Hardware Assisted Operating System Switch. November~22 2012. Link to this entry US Patent App. 13/296,303
    BibTeX Entry
    @misc{ghosh2012hardware, author = {Ghosh, Anup K and Sun, Kun and Wang, Jiang and Stavrou, Angelos}, title = {Hardware Assisted Operating System Switch}, year = {2012}, month = {November~22}, note = {US Patent App. 13/296,303}, }

2011

  1. Le, Meixing, Stavrou, Angelos, and Kang, Brent ByungHoon. DoubleGuard: Detecting intrusions in multitier web applications. IEEE Transactions on dependable and secure computing, 9(4):512-525, 2011. IEEE. Link to this entry
    BibTeX Entry
    @article{le2011doubleguard, author = {Le, Meixing and Stavrou, Angelos and Kang, Brent ByungHoon}, title = {DoubleGuard: Detecting intrusions in multitier web applications}, journal = {IEEE Transactions on dependable and secure computing}, volume = {9}, number = {4}, pages = {512--525}, year = {2011}, publisher = {IEEE}, }
  2. Locasto, Michael E, Ghosh, Anup K, Jajodia, Sushil, and Stavrou, Angelos. The ephemeral legion: producing an expert cyber-security work force from thin air. Communications of the ACM, 54(1):129-131, 2011. ACM. Link to this entry
    BibTeX Entry
    @article{locasto2011ephemeral, author = {Locasto, Michael E and Ghosh, Anup K and Jajodia, Sushil and Stavrou, Angelos}, title = {The ephemeral legion: producing an expert cyber-security work force from thin air}, journal = {Communications of the ACM}, volume = {54}, number = {1}, pages = {129--131}, year = {2011}, publisher = {ACM}, }
  3. Nyang, DaeHun, Mohaisen, Abedelaziz, Kwon, Taekyoung, Kang, Brent, and Stavrou, Angelos. Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface. arXiv preprint arXiv:1112.2245, 2011. Link to this entry
    BibTeX Entry
    @article{nyang2011decryptable, author = {Nyang, DaeHun and Mohaisen, Abedelaziz and Kwon, Taekyoung and Kang, Brent and Stavrou, Angelos}, title = {Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface}, journal = {arXiv preprint arXiv:1112.2245}, year = {2011}, }
  4. Wang, Jiang, Sun, Kun, and Stavrou, Angelos. An analysis of system management mode (SMM)-based integrity checking systems and evasion attacks. George Mason University Department of Computer Science Technical Report, 2011. Link to this entry
    BibTeX Entry
    @article{wang2011analysis, author = {Wang, Jiang and Sun, Kun and Stavrou, Angelos}, title = {An analysis of system management mode (SMM)-based integrity checking systems and evasion attacks}, journal = {George Mason University Department of Computer Science Technical Report}, year = {2011}, }
  5. Stavrou, Angelos and Wang, Zhaohui. Exploiting smart-phone USB connectivity for fun and profit. BlackHat DC, 2011. Link to this entry
    BibTeX Entry
    @article{stavrou2011exploiting, author = {Stavrou, Angelos and Wang, Zhaohui}, title = {Exploiting smart-phone USB connectivity for fun and profit}, journal = {BlackHat DC}, year = {2011}, }
  6. Jia, Quan, Sun, Kun, and Stavrou, Angelos. Capman: capability-based defense against multi-path denial of service (dos) attacks in manet. In 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), pages 1-6, 2011. Link to this entry
    BibTeX Entry
    @inproceedings{jia2011capman, author = {Jia, Quan and Sun, Kun and Stavrou, Angelos}, title = {Capman: capability-based defense against multi-path denial of service (dos) attacks in manet}, booktitle = {2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)}, pages = {1--6}, year = {2011}, organization = {IEEE}, }
  7. Clark, Jason W and Stavrou, Angelos. Breaching & protecting an anonymizing network system. In Proceedings of the 6th Annual Symposium on Information Assurance, pages 32-44, 2011. Link to this entry
    BibTeX Entry
    @inproceedings{clark2011breaching, author = {Clark, Jason W and Stavrou, Angelos}, title = {Breaching \& protecting an anonymizing network system}, booktitle = {Proceedings of the 6th Annual Symposium on Information Assurance}, pages = {32--44}, year = {2011}, }
  8. Liang, Chen, Hiremagalore, Sharath, Stavrou, Angelos, and Rangwala, Huzefa. Predicting network response times using social information. In 2011 International Conference on Advances in Social Networks Analysis and Mining, pages 527-531, 2011. Link to this entry
    BibTeX Entry
    @inproceedings{liang2011predicting, author = {Liang, Chen and Hiremagalore, Sharath and Stavrou, Angelos and Rangwala, Huzefa}, title = {Predicting network response times using social information}, booktitle = {2011 International Conference on Advances in Social Networks Analysis and Mining}, pages = {527--531}, year = {2011}, organization = {IEEE}, }
  9. Nelson, Erik T and Stavrou, Angelos. Advantages and disadvantages of remote asynchronous usability testing using Amazon mechanical turk. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, pages 1080-1084, 2011. Link to this entry
    BibTeX Entry
    @inproceedings{nelson2011advantages, author = {Nelson, Erik T and Stavrou, Angelos}, title = {Advantages and disadvantages of remote asynchronous usability testing using Amazon mechanical turk}, booktitle = {Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, volume = {55}, number = {1}, pages = {1080--1084}, year = {2011}, organization = {Sage Publications Sage CA: Los Angeles, CA}, }
  10. Reznik, Leon, Buccigrossi III, Vincent J, Lewis, Justin, Dipon, Asif, Milstead, Stefanie, LaFontaine, Nathan, Beck, Kenneth, and Silva, Holden. Security of computer use practice: The case of ordinary users survey. In Proceedings of the 5th Annual Symposium on Information Assurance (ASIA’11), pages 167-168, 2011. Link to this entry
    BibTeX Entry
    @inproceedings{reznik2011security, author = {Reznik, Leon and Buccigrossi III, Vincent J and Lewis, Justin and Dipon, Asif and Milstead, Stefanie and LaFontaine, Nathan and Beck, Kenneth and Silva, Holden}, title = {Security of computer use practice: The case of ordinary users survey}, booktitle = {Proceedings of the 5th Annual Symposium on Information Assurance (ASIA’11)}, pages = {167--168}, year = {2011}, }
  11. Wang, Jiang, Zhang, Fengwei, Sun, Kun, and Stavrou, Angelos. Firmware-assisted memory acquisition and analysis tools for digital forensics. In 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pages 1-5, 2011. Link to this entry
    BibTeX Entry
    @inproceedings{wang2011firmware, author = {Wang, Jiang and Zhang, Fengwei and Sun, Kun and Stavrou, Angelos}, title = {Firmware-assisted memory acquisition and analysis tools for digital forensics}, booktitle = {2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering}, pages = {1--5}, year = {2011}, organization = {IEEE}, }
  12. Kenneally, Erin, Stavrou, Angelos, McHugh, John, and Christin, Nicolas. Moving forward, building an ethics community (panel statements). In International Conference on Financial Cryptography and Data Security, pages 178-183, 2011. Link to this entry
    BibTeX Entry
    @inproceedings{kenneally2011moving, author = {Kenneally, Erin and Stavrou, Angelos and McHugh, John and Christin, Nicolas}, title = {Moving forward, building an ethics community (panel statements)}, booktitle = {International Conference on Financial Cryptography and Data Security}, pages = {178--183}, year = {2011}, organization = {Springer Berlin Heidelberg Berlin, Heidelberg}, }
  13. Boggs, Nathaniel, Hiremagalore, Sharath, Stavrou, Angelos, and Stolfo, Salvatore J. Cross-domain collaborative anomaly detection: So far yet so close. In International Workshop on Recent Advances in Intrusion Detection, pages 142-160, 2011. Link to this entry
    BibTeX Entry
    @inproceedings{boggs2011cross, author = {Boggs, Nathaniel and Hiremagalore, Sharath and Stavrou, Angelos and Stolfo, Salvatore J}, title = {Cross-domain collaborative anomaly detection: So far yet so close}, booktitle = {International Workshop on Recent Advances in Intrusion Detection}, pages = {142--160}, year = {2011}, organization = {Springer Berlin Heidelberg Berlin, Heidelberg}, }
  14. Yu, Bo, Varga, J, Wijesekera, Duminda, Stavrou, Angelos, and Singhal, Anoop. Specifying Time-Out Points in Surgical EMRs-Work in Progress. In ENTERprise Information Systems: International Conference, CENTERIS 2011, Vilamoura, Portugal, October 5-7, 2011, Proceedings, Part III, pages 165-174, 2011. Link to this entry
    BibTeX Entry
    @inproceedings{yu2011specifying, author = {Yu, Bo and Varga, J and Wijesekera, Duminda and Stavrou, Angelos and Singhal, Anoop}, title = {Specifying Time-Out Points in Surgical EMRs--Work in Progress}, booktitle = {ENTERprise Information Systems: International Conference, CENTERIS 2011, Vilamoura, Portugal, October 5-7, 2011, Proceedings, Part III}, pages = {165--174}, year = {2011}, organization = {Springer Berlin Heidelberg}, }
  15. Keromytis, Angelos D, Stolfo, Salvatore J, Yang, Junfeng, Stavrou, Angelos, Ghosh, Anup, Engler, Dawson, Dacier, Marc, Elder, Matthew, and Kienzle, Darrell. The minestrone architecture combining static and dynamic analysis techniques for software security. In 2011 First SysSec Workshop, pages 53-56, 2011. Link to this entry
    BibTeX Entry
    @inproceedings{keromytis2011minestrone, author = {Keromytis, Angelos D and Stolfo, Salvatore J and Yang, Junfeng and Stavrou, Angelos and Ghosh, Anup and Engler, Dawson and Dacier, Marc and Elder, Matthew and Kienzle, Darrell}, title = {The minestrone architecture combining static and dynamic analysis techniques for software security}, booktitle = {2011 First SysSec Workshop}, pages = {53--56}, year = {2011}, organization = {IEEE}, }
  16. Jee, Kangkook, Sidiroglou-Douskos, Stelios, Stavrou, Angelos, and Keromytis, Angelos. An adversarial evaluation of network signaling and control mechanisms. In Information Security and Cryptology-ICISC 2010: 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers 13, pages 252-265, 2011. Link to this entry
    BibTeX Entry
    @inproceedings{jee2011adversarial, author = {Jee, Kangkook and Sidiroglou-Douskos, Stelios and Stavrou, Angelos and Keromytis, Angelos}, title = {An adversarial evaluation of network signaling and control mechanisms}, booktitle = {Information Security and Cryptology-ICISC 2010: 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers 13}, pages = {252--265}, year = {2011}, organization = {Springer Berlin Heidelberg}, }
  17. Wang, Zhaohui and Stavrou, A. Usbsec: A defense to the ghost in your pocket. In Kaspersky Security IT Conference, 2011. Link to this entry
    BibTeX Entry
    @inproceedings{wang2011usbsec, author = {Wang, Zhaohui and Stavrou, A}, title = {Usbsec: A defense to the ghost in your pocket}, booktitle = {Kaspersky Security IT Conference}, year = {2011}, }
  18. Schulte, Brian, Martin, Rhandi, Andrianakis, Haris, and Stavrou, Angelos. NetGator: Malware Detection Through Program Interactive Proofs. Technical Report GMU-CS-TR, 2011. Link to this entry
    BibTeX Entry
    @techreport{schulte2011netgator, author = {Schulte, Brian and Martin, Rhandi and Andrianakis, Haris and Stavrou, Angelos}, title = {NetGator: Malware Detection Through Program Interactive Proofs}, year = {2011}, institution = {Technical Report GMU-CS-TR}, }
  19. Locasto, Michael E, Keromytis, Angelos D, Stolfo, Salvatore J, Stavrou, Angelos, Cretu, Gabriela, Sidiroglou, Stylianos, Nieh, Jason, and Laadan, Oren. Methods, systems and media for software self-healing. June~14 2011. Link to this entry US Patent 7,962,798
    BibTeX Entry
    @misc{locasto2011methods, author = {Locasto, Michael E and Keromytis, Angelos D and Stolfo, Salvatore J and Stavrou, Angelos and Cretu, Gabriela and Sidiroglou, Stylianos and Nieh, Jason and Laadan, Oren}, title = {Methods, systems and media for software self-healing}, year = {2011}, month = {June~14}, note = {US Patent 7,962,798}, }
  20. Stavrou, Angelos, Jajodia, Sushil, and Andrianakis, Charalampos. Inferring Packet Management Rules. July~7 2011. Link to this entry US Patent App. 12/835,228
    BibTeX Entry
    @misc{stavrou2011inferring, author = {Stavrou, Angelos and Jajodia, Sushil and Andrianakis, Charalampos}, title = {Inferring Packet Management Rules}, year = {2011}, month = {July~7}, note = {US Patent App. 12/835,228}, }
  21. Stavrou, Angelos. TCP Modulation Attacks.. 2011. Link to this entry
    BibTeX Entry
    @misc{stavrou2011tcp, author = {Stavrou, Angelos}, title = {TCP Modulation Attacks.}, year = {2011}, }
  22. Stavrou, Angelos. Overlay-Based DoS Defenses.. 2011. Link to this entry
    BibTeX Entry
    @misc{stavrou2011overlay, author = {Stavrou, Angelos}, title = {Overlay-Based DoS Defenses.}, year = {2011}, }

2010

  1. Seymer, Paul, Stavrou, Angelos, Wijesekera, Duminda, and Jajodia, Sushil. Security policy cognizant module composition. Department of Computer Science, George Mason University, Tech. Rep. GMU-CS-TR-2010--1, 2010. Link to this entry
    BibTeX Entry
    @article{seymer2010security, author = {Seymer, Paul and Stavrou, Angelos and Wijesekera, Duminda and Jajodia, Sushil}, title = {Security policy cognizant module composition}, journal = {Department of Computer Science, George Mason University, Tech. Rep. GMU-CS-TR-2010--1}, year = {2010}, }
  2. Wang, Zhaohui and Stavrou, Angelos. Exploiting smart-phone usb connectivity for fun and profit. In Proceedings of the 26th Annual Computer Security Applications Conference, pages 357-366, 2010. Link to this entry
    BibTeX Entry
    @inproceedings{wang2010exploiting, author = {Wang, Zhaohui and Stavrou, Angelos}, title = {Exploiting smart-phone usb connectivity for fun and profit}, booktitle = {Proceedings of the 26th Annual Computer Security Applications Conference}, pages = {357--366}, year = {2010}, }
  3. Chakravarty, Sambuddho, Stavrou, Angelos, and Keromytis, Angelos D. Traffic analysis against low-latency anonymity networks using available bandwidth estimation. In European symposium on research in computer security, pages 249-267, 2010. Link to this entry
    BibTeX Entry
    @inproceedings{chakravarty2010traffic, author = {Chakravarty, Sambuddho and Stavrou, Angelos and Keromytis, Angelos D}, title = {Traffic analysis against low-latency anonymity networks using available bandwidth estimation}, booktitle = {European symposium on research in computer security}, pages = {249--267}, year = {2010}, organization = {Springer Berlin Heidelberg Berlin, Heidelberg}, }
  4. Boggs, Nathaniel, Hiremagalore, Sharath, Stavrou, Angelos, and Stolfo, Salvatore J. Experimental results of cross-site exchange of web content anomaly detector alerts. In 2010 IEEE International Conference on Technologies for Homeland Security (HST), pages 8-14, 2010. Link to this entry
    BibTeX Entry
    @inproceedings{boggs2010experimental, author = {Boggs, Nathaniel and Hiremagalore, Sharath and Stavrou, Angelos and Stolfo, Salvatore J}, title = {Experimental results of cross-site exchange of web content anomaly detector alerts}, booktitle = {2010 IEEE International Conference on Technologies for Homeland Security (HST)}, pages = {8--14}, year = {2010}, organization = {IEEE}, }
  5. Andrianakis, Charalampos, Seymer, Paul, and Stavrou, Angelos. Scalable web object inspection and malfease collection. In 5th USENIX Workshop on Hot Topics in Security (HotSec 10), 2010. Link to this entry
    BibTeX Entry
    @inproceedings{andrianakis2010scalable, author = {Andrianakis, Charalampos and Seymer, Paul and Stavrou, Angelos}, title = {Scalable web object inspection and malfease collection}, booktitle = {5th USENIX Workshop on Hot Topics in Security (HotSec 10)}, year = {2010}, }
  6. Ardagna, Claudio A, Jajodia, Sushil, Samarati, Pierangela, and Stavrou, Angelos. Providing mobile users’ anonymity in hybrid networks. In European Symposium on Research in Computer Security, pages 540-557, 2010. Link to this entry
    BibTeX Entry
    @inproceedings{ardagna2010providing, author = {Ardagna, Claudio A and Jajodia, Sushil and Samarati, Pierangela and Stavrou, Angelos}, title = {Providing mobile users’ anonymity in hybrid networks}, booktitle = {European Symposium on Research in Computer Security}, pages = {540--557}, year = {2010}, organization = {Springer Berlin Heidelberg Berlin, Heidelberg}, }
  7. Wang, Jiang, Niphadkar, Sameer, Stavrou, Angelos, and Ghosh, Anup K. A virtualization architecture for in-depth Kernel isolation. In 2010 43rd Hawaii International Conference on System Sciences, pages 1-10, 2010. Link to this entry
    BibTeX Entry
    @inproceedings{wang2010virtualization, author = {Wang, Jiang and Niphadkar, Sameer and Stavrou, Angelos and Ghosh, Anup K}, title = {A virtualization architecture for in-depth Kernel isolation}, booktitle = {2010 43rd Hawaii International Conference on System Sciences}, pages = {1--10}, year = {2010}, organization = {IEEE}, }
  8. Al-Faresi, A, Yu, B, Moidu, K, Stavrou, A, Wijesekera, D, Singhal, A, and others. Fine-grained Sharing of Health Records using XSPA Profile for XACML-An Extended Abstract. In 1st USENIX Workshop on Health Security and Privacy (HealthSec 10), 2010. Link to this entry
    BibTeX Entry
    @inproceedings{al2010fine, author = {Al-Faresi, A and Yu, B and Moidu, K and Stavrou, A and Wijesekera, D and Singhal, A and others}, title = {Fine-grained Sharing of Health Records using XSPA Profile for XACML--An Extended Abstract}, booktitle = {1st USENIX Workshop on Health Security and Privacy (HealthSec 10)}, year = {2010}, }
  9. Seymer, Paul, Stavrou, Angelos, Wijesekera, Duminda, and Jajodia, Sushil. Qop and qos policy cognizant module composition. In 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, pages 77-86, 2010. Link to this entry
    BibTeX Entry
    @inproceedings{seymer2010qop, author = {Seymer, Paul and Stavrou, Angelos and Wijesekera, Duminda and Jajodia, Sushil}, title = {Qop and qos policy cognizant module composition}, booktitle = {2010 IEEE International Symposium on Policies for Distributed Systems and Networks}, pages = {77--86}, year = {2010}, organization = {IEEE}, }
  10. Ghosh, Anup, Huang, Yih, Wang, Jiang, and Stavrou, Angelos. Distributed Sensor for Detecting Malicious Software. May~13 2010. Link to this entry US Patent App. 12/558,841
    BibTeX Entry
    @misc{ghosh2010distributed, author = {Ghosh, Anup and Huang, Yih and Wang, Jiang and Stavrou, Angelos}, title = {Distributed Sensor for Detecting Malicious Software}, year = {2010}, month = {May~13}, note = {US Patent App. 12/558,841}, }
  11. Keromytis, Angelos D, Chakravarty, Sambuddho, and Stavrou, Angelos. Systems and methods for computing data transmission characteristics of a network path based on single-ended measurements. February~9 2010. Link to this entry US Patent 7,660,261
    BibTeX Entry
    @misc{keromytis2010systems, author = {Keromytis, Angelos D and Chakravarty, Sambuddho and Stavrou, Angelos}, title = {Systems and methods for computing data transmission characteristics of a network path based on single-ended measurements}, year = {2010}, month = {February~9}, note = {US Patent 7,660,261}, }
  12. Stavrou, Angelos, Jajodia, Sushil, and Zhang, Lei. Event Driven Email Revocation. March~4 2010. Link to this entry US Patent App. 12/548,175
    BibTeX Entry
    @misc{stavrou2010event, author = {Stavrou, Angelos and Jajodia, Sushil and Zhang, Lei}, title = {Event Driven Email Revocation}, year = {2010}, month = {March~4}, note = {US Patent App. 12/548,175}, }
  13. Stavrou, Angelos and Sabzevar, Alireza P. Authentication Using Graphical Passwords. July~22 2010. Link to this entry US Patent App. 12/688,037
    BibTeX Entry
    @misc{stavrou2010authentication, author = {Stavrou, Angelos and Sabzevar, Alireza P}, title = {Authentication Using Graphical Passwords}, year = {2010}, month = {July~22}, note = {US Patent App. 12/688,037}, }
  14. Ghosh, Anup K, Stavrou, Angelos, and GEORGE MASON UNIV FAIRFAX VA. Darpa Mobivisor: An Architecture for High Assurance for Untrusted Applications on Wireless Handheld Devices Via Lightweight Virtualization. 2010. Nov. Link to this entry
    BibTeX Entry
    @misc{ghosh2010darpa, author = {Ghosh, Anup K and Stavrou, Angelos and GEORGE MASON UNIV FAIRFAX VA}, title = {Darpa Mobivisor: An Architecture for High Assurance for Untrusted Applications on Wireless Handheld Devices Via Lightweight Virtualization}, year = {2010}, publisher = {Nov}, }

2009

  1. Ardagna, Claudio A, Jajodia, Sushil, Samarati, Pierangela, and Stavrou, Angelos. Privacy preservation over untrusted mobile networks. Privacy in Location-Based Applications: Research Issues and Emerging Trends:84-105, 2009. Springer Berlin Heidelberg. Link to this entry
    BibTeX Entry
    @article{ardagna2009privacy, author = {Ardagna, Claudio A and Jajodia, Sushil and Samarati, Pierangela and Stavrou, Angelos}, title = {Privacy preservation over untrusted mobile networks}, journal = {Privacy in Location-Based Applications: Research Issues and Emerging Trends}, pages = {84--105}, year = {2009}, publisher = {Springer Berlin Heidelberg}, }
  2. Alexander, Scott, Cheng, Yuu-Heng, Coan, Brian, Ghetie, Andrei, Kaul, Vikram, Siegell, Bruce, Bellovin, Steve, Maxemchuk, Nicholas F, Schulzrinne, Henning, Schwab, Stephen, and others. The dynamic community of interest and its realization in ZODIAC. IEEE Communications Magazine, 47(10):40-47, 2009. IEEE. Link to this entry
    BibTeX Entry
    @article{alexander2009dynamic, author = {Alexander, Scott and Cheng, Yuu-Heng and Coan, Brian and Ghetie, Andrei and Kaul, Vikram and Siegell, Bruce and Bellovin, Steve and Maxemchuk, Nicholas F and Schulzrinne, Henning and Schwab, Stephen and others}, title = {The dynamic community of interest and its realization in ZODIAC}, journal = {IEEE Communications Magazine}, volume = {47}, number = {10}, pages = {40--47}, year = {2009}, publisher = {IEEE}, }
  3. Samarati, CA Ardagna1 S Jajodia2 P, Stavrou, A, and Bramante, Via. Privacy Preservation over Untrusted Mobile Networks. Privacy in location-based applications: research issues and emerging trends:84-105, 2009. Springer. Link to this entry
    BibTeX Entry
    @article{samarati2009privacy, author = {Samarati, CA Ardagna1 S Jajodia2 P and Stavrou, A and Bramante, Via}, title = {Privacy Preservation over Untrusted Mobile Networks}, journal = {Privacy in location-based applications: research issues and emerging trends}, pages = {84--105}, year = {2009}, publisher = {Springer}, }
  4. Liu, Anyi, Yuan, Yi, Wijesekera, Duminda, and Stavrou, Angelos. SQLProb: a proxy-based architecture towards preventing SQL injection attacks. In Proceedings of the 2009 ACM symposium on Applied Computing, pages 2054-2061, 2009. Link to this entry
    BibTeX Entry
    @inproceedings{liu2009sqlprob, author = {Liu, Anyi and Yuan, Yi and Wijesekera, Duminda and Stavrou, Angelos}, title = {SQLProb: a proxy-based architecture towards preventing SQL injection attacks}, booktitle = {Proceedings of the 2009 ACM symposium on Applied Computing}, pages = {2054--2061}, year = {2009}, }
  5. Cretu-Ciocarlie, Gabriela F, Stavrou, Angelos, Locasto, Michael E, and Stolfo, Salvatore J. Adaptive anomaly detection via self-calibration and dynamic updating. In Recent Advances in Intrusion Detection: 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings 12, pages 41-60, 2009. Link to this entry
    BibTeX Entry
    @inproceedings{cretu2009adaptive, author = {Cretu-Ciocarlie, Gabriela F and Stavrou, Angelos and Locasto, Michael E and Stolfo, Salvatore J}, title = {Adaptive anomaly detection via self-calibration and dynamic updating}, booktitle = {Recent Advances in Intrusion Detection: 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings 12}, pages = {41--60}, year = {2009}, organization = {Springer Berlin Heidelberg}, }
  6. Alicherry, Mansoor, Keromytis, Angelos D, and Stavrou, Angelos. Deny-by-default distributed security policy enforcement in mobile ad hoc networks. In Security and Privacy in Communication Networks: 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers 5, pages 41-50, 2009. Link to this entry
    BibTeX Entry
    @inproceedings{alicherry2009deny, author = {Alicherry, Mansoor and Keromytis, Angelos D and Stavrou, Angelos}, title = {Deny-by-default distributed security policy enforcement in mobile ad hoc networks}, booktitle = {Security and Privacy in Communication Networks: 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers 5}, pages = {41--50}, year = {2009}, organization = {Springer Berlin Heidelberg}, }
  7. Alicherry, Mansoor, Keromytis, Angelos D, and Stavrou, Angelos. Evaluating a collaborative defense architecture for manets. In 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA), pages 1-6, 2009. Link to this entry
    BibTeX Entry
    @inproceedings{alicherry2009evaluating, author = {Alicherry, Mansoor and Keromytis, Angelos D and Stavrou, Angelos}, title = {Evaluating a collaborative defense architecture for manets}, booktitle = {2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA)}, pages = {1--6}, year = {2009}, organization = {IEEE}, }
  8. Stavrou, Angelos, Cretu-Ciocarlie, Gabriela F, Locasto, Michael E, and Stolfo, Salvatore J. Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. In Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, pages 39-46, 2009. Link to this entry
    BibTeX Entry
    @inproceedings{stavrou2009keep, author = {Stavrou, Angelos and Cretu-Ciocarlie, Gabriela F and Locasto, Michael E and Stolfo, Salvatore J}, title = {Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes}, booktitle = {Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence}, pages = {39--46}, year = {2009}, }
  9. Sherman, Alex, Stavrou, Angelos, Nieh, Jason, Keromytis, Angelos D, and Stein, Cliff. Adding trust to P2P distribution of paid content. In Information Security: 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings 12, pages 459-474, 2009. Link to this entry
    BibTeX Entry
    @inproceedings{sherman2009adding, author = {Sherman, Alex and Stavrou, Angelos and Nieh, Jason and Keromytis, Angelos D and Stein, Cliff}, title = {Adding trust to P2P distribution of paid content}, booktitle = {Information Security: 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings 12}, pages = {459--474}, year = {2009}, organization = {Springer Berlin Heidelberg}, }
  10. Jia, Quan, Wang, Zhaohui, and Stavrou, Angelos. The Heisenberg Measuring Uncertainty in Lightweight Virtualization Testbeds.. In CSET, 2009. Link to this entry
    BibTeX Entry
    @inproceedings{jia2009heisenberg, author = {Jia, Quan and Wang, Zhaohui and Stavrou, Angelos}, title = {The Heisenberg Measuring Uncertainty in Lightweight Virtualization Testbeds.}, booktitle = {CSET}, year = {2009}, }
  11. Stavrou, Angelos, Barrato, Ricardo A, Keromytis, Angelos D, and Nieh, Jason. A 2 M: Access-Assured Mobile Desktop Computing. In Information Security: 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings 12, pages 186-201, 2009. Link to this entry
    BibTeX Entry
    @inproceedings{stavrou20092, author = {Stavrou, Angelos and Barrato, Ricardo A and Keromytis, Angelos D and Nieh, Jason}, title = {A 2 M: Access-Assured Mobile Desktop Computing}, booktitle = {Information Security: 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings 12}, pages = {186--201}, year = {2009}, organization = {Springer Berlin Heidelberg}, }
  12. Stavrou, Angelos. Network Availability of Internet Services: Threats and Defenses. 2009. Springer Publishing Company, Incorporated. Link to this entry
    BibTeX Entry
    @misc{stavrou2009network, author = {Stavrou, Angelos}, title = {Network Availability of Internet Services: Threats and Defenses}, year = {2009}, publisher = {Springer Publishing Company, Incorporated}, }

2008

  1. Chakravarty, Sambuddho, Stavrou, Angelos, and Keromytis, Angelos D. LinkWidth: A method to measure link capacity and available bandwidth using single-end probes. 2008. Link to this entry
    BibTeX Entry
    @article{chakravarty2008linkwidth, author = {Chakravarty, Sambuddho and Stavrou, Angelos and Keromytis, Angelos D}, title = {LinkWidth: A method to measure link capacity and available bandwidth using single-end probes}, year = {2008}, }
  2. Locasto, Michael E and Stavrou, Angelos. The hidden difficulties of watching and rebuilding networks. IEEE Security & Privacy, 6(2):79-82, 2008. IEEE. Link to this entry
    BibTeX Entry
    @article{locasto2008hidden, author = {Locasto, Michael E and Stavrou, Angelos}, title = {The hidden difficulties of watching and rebuilding networks}, journal = {IEEE Security \& Privacy}, volume = {6}, number = {2}, pages = {79--82}, year = {2008}, publisher = {IEEE}, }
  3. Chakravarty, Sambuddho, Stavrou, Angelos, and Keromytis, Angelos D. Approximating a Global Passive Adversary Against Tor. 2008. Link to this entry
    BibTeX Entry
    @article{chakravarty2008approximating, author = {Chakravarty, Sambuddho and Stavrou, Angelos and Keromytis, Angelos D}, title = {Approximating a Global Passive Adversary Against Tor}, year = {2008}, }
  4. Alicherry, Mansoor, Keromytis, Angelos D, and Stavrou, Angelos. Distributed firewall for MANETs. 2008. Link to this entry
    BibTeX Entry
    @article{alicherry2008distributed, author = {Alicherry, Mansoor and Keromytis, Angelos D and Stavrou, Angelos}, title = {Distributed firewall for MANETs}, year = {2008}, }
  5. Sherman, Alex, Stavrou, Angelos, Nieh, Jason, and Stein, Clifford S. Mitigating the effect of free-riders in bittorrent using trusted agents. 2008. Link to this entry
    BibTeX Entry
    @article{sherman2008mitigating, author = {Sherman, Alex and Stavrou, Angelos and Nieh, Jason and Stein, Clifford S}, title = {Mitigating the effect of free-riders in bittorrent using trusted agents}, year = {2008}, }
  6. Cretu, Gabriela F, Stavrou, Angelos, Locasto, Michael E, Stolfo, Salvatore J, and Keromytis, Angelos D. Casting out demons: Sanitizing training data for anomaly sensors. In 2008 IEEE Symposium on Security and Privacy (sp 2008), pages 81-95, 2008. Link to this entry
    BibTeX Entry
    @inproceedings{cretu2008casting, author = {Cretu, Gabriela F and Stavrou, Angelos and Locasto, Michael E and Stolfo, Salvatore J and Keromytis, Angelos D}, title = {Casting out demons: Sanitizing training data for anomaly sensors}, booktitle = {2008 IEEE Symposium on Security and Privacy (sp 2008)}, pages = {81--95}, year = {2008}, organization = {IEEE}, }
  7. Androulaki, Elli, Raykova, Mariana, Srivatsan, Shreyas, Stavrou, Angelos, and Bellovin, Steven M. PAR: Payment for anonymous routing. In Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings 8, pages 219-236, 2008. Link to this entry
    BibTeX Entry
    @inproceedings{androulaki2008payment, author = {Androulaki, Elli and Raykova, Mariana and Srivatsan, Shreyas and Stavrou, Angelos and Bellovin, Steven M}, title = {PAR: Payment for anonymous routing}, booktitle = {Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings 8}, pages = {219--236}, year = {2008}, organization = {Springer Berlin Heidelberg}, }
  8. Huang, Yih, Stavrou, Angelos, Ghosh, Anup K, and Jajodia, Sushil. Efficiently tracking application interactions using lightweight virtualization. In Proceedings of the 1st ACM workshop on Virtual machine security, pages 19-28, 2008. Link to this entry
    BibTeX Entry
    @inproceedings{huang2008efficiently, author = {Huang, Yih and Stavrou, Angelos and Ghosh, Anup K and Jajodia, Sushil}, title = {Efficiently tracking application interactions using lightweight virtualization}, booktitle = {Proceedings of the 1st ACM workshop on Virtual machine security}, pages = {19--28}, year = {2008}, }
  9. Chakravarty, Sambuddho, Stavrou, Angelos, and Keromytis, Angelos D. Identifying proxy nodes in a Tor anonymization circuit. In 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems, pages 633-639, 2008. Link to this entry
    BibTeX Entry
    @inproceedings{chakravarty2008identifying, author = {Chakravarty, Sambuddho and Stavrou, Angelos and Keromytis, Angelos D}, title = {Identifying proxy nodes in a Tor anonymization circuit}, booktitle = {2008 IEEE International Conference on Signal Image Technology and Internet Based Systems}, pages = {633--639}, year = {2008}, organization = {IEEE}, }
  10. Sabzevar, Alireza Pirayesh and Stavrou, Angelos. Universal multi-factor authentication using graphical passwords. In 2008 IEEE international conference on signal image technology and internet based systems, pages 625-632, 2008. Link to this entry
    BibTeX Entry
    @inproceedings{sabzevar2008universal, author = {Sabzevar, Alireza Pirayesh and Stavrou, Angelos}, title = {Universal multi-factor authentication using graphical passwords}, booktitle = {2008 IEEE international conference on signal image technology and internet based systems}, pages = {625--632}, year = {2008}, organization = {IEEE}, }
  11. Stavrou, Angelos, Locasto, Michael E, and Keromytis, Angelos D. Pushback for Overlay Networks: Protecting against Malicious Insiders. In Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings 6, pages 39-54, 2008. Link to this entry
    BibTeX Entry
    @inproceedings{stavrou2008pushback, author = {Stavrou, Angelos and Locasto, Michael E and Keromytis, Angelos D}, title = {Pushback for Overlay Networks: Protecting against Malicious Insiders}, booktitle = {Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings 6}, pages = {39--54}, year = {2008}, organization = {Springer Berlin Heidelberg}, }
  12. Locasto, Michael E, Stavrou, Angelos, Cretu, Gabriela F, Keromytis, Angelos D, and Stolfo, Salvatore J. Return Value Predictability Profiles for Self-Healing. In Advances in Information and Computer Security: Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings 3, pages 152-166, 2008. Link to this entry
    BibTeX Entry
    @inproceedings{locasto2008return, author = {Locasto, Michael E and Stavrou, Angelos and Cretu, Gabriela F and Keromytis, Angelos D and Stolfo, Salvatore J}, title = {Return Value Predictability Profiles for Self--Healing}, booktitle = {Advances in Information and Computer Security: Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings 3}, pages = {152--166}, year = {2008}, organization = {Springer Berlin Heidelberg}, }
  13. Stavrou, Angelos and Ghosh, Anup K. A security architecture for information assurance and availability in MANETs. In MILCOM 2008-2008 IEEE Military Communications Conference, pages 1-8, 2008. Link to this entry
    BibTeX Entry
    @inproceedings{stavrou2008security, author = {Stavrou, Angelos and Ghosh, Anup K}, title = {A security architecture for information assurance and availability in MANETs}, booktitle = {MILCOM 2008-2008 IEEE Military Communications Conference}, pages = {1--8}, year = {2008}, organization = {IEEE}, }
  14. Ardagna, Claudio A, Stavrou, Angelos, Jajodia, Sushil, Samarati, Pierangela, Martin, Rhandi, and others. A multi-path approach for k-anonymity in mobile hybrid networks. In PILBA'08: privacy in location-based applications: workshop co-located with ESORICS 2008: Malaga, Spain, october 9, 2008: proceedings, pages 82-101, 2008. Link to this entry
    BibTeX Entry
    @inproceedings{ardagna2008multi, author = {Ardagna, Claudio A and Stavrou, Angelos and Jajodia, Sushil and Samarati, Pierangela and Martin, Rhandi and others}, title = {A multi-path approach for k-anonymity in mobile hybrid networks}, booktitle = {PILBA'08: privacy in location-based applications: workshop co-located with ESORICS 2008: Malaga, Spain, october 9, 2008: proceedings}, volume = {397}, pages = {82--101}, year = {2008}, organization = {null}, }
  15. Locasto, Michael E, Stavrou, Angelos, and Cretu, Gabriela F. Life after self-healing: assessing post-repair program behavior. Technical report, Technical report, George Mason University, 2008. Link to this entry
    BibTeX Entry
    @techreport{locasto2008life, author = {Locasto, Michael E and Stavrou, Angelos and Cretu, Gabriela F}, title = {Life after self-healing: assessing post-repair program behavior}, year = {2008}, institution = {Technical report, Technical report, George Mason University}, }

2007

  1. Locasto, Michael E, Stavrou, Angelos, Cretu, Gabriela F, and Keromytis, Angelos D. From STEM to SEAD: Speculative execution for automated defense. 2007. Link to this entry
    BibTeX Entry
    @article{locasto2007stem, author = {Locasto, Michael E and Stavrou, Angelos and Cretu, Gabriela F and Keromytis, Angelos D}, title = {From STEM to SEAD: Speculative execution for automated defense}, year = {2007}, }
  2. Cretu, Gabriela F, Stavrou, Angelos, Stolfo, Salvatore, and Keromytis, Angelos D. Data sanitization: Improving the forensic utility of anomaly detection systems. 2007. Link to this entry
    BibTeX Entry
    @article{cretu2007data, author = {Cretu, Gabriela F and Stavrou, Angelos and Stolfo, Salvatore and Keromytis, Angelos D}, title = {Data sanitization: Improving the forensic utility of anomaly detection systems}, year = {2007}, }
  3. Locasto, Michael E, Cretu, Gabriela F, Stavrou, Angelos, and Keromytis, Angelos D. A Model for Automatically Repairing Execution Integrity. 2007. Link to this entry
    BibTeX Entry
    @article{locasto2007model, author = {Locasto, Michael E and Cretu, Gabriela F and Stavrou, Angelos and Keromytis, Angelos D}, title = {A Model for Automatically Repairing Execution Integrity}, year = {2007}, }
  4. Locasto, Michael E, Cretu, Gabriela F, Hershkop, Shlomo, and Stavrou, Angelos. Post-patch retraining for host-based anomaly detection. 2007. Link to this entry
    BibTeX Entry
    @article{locasto2007post, author = {Locasto, Michael E and Cretu, Gabriela F and Hershkop, Shlomo and Stavrou, Angelos}, title = {Post-patch retraining for host-based anomaly detection}, year = {2007}, }
  5. Cretu, Gabriela F, Stavrou, Angelos, Locasto, Michael E, and Stolfo, Salvatore. Online Training and Sanitization of AD Systems. 2007. Link to this entry
    BibTeX Entry
    @article{cretu2007online, author = {Cretu, Gabriela F and Stavrou, Angelos and Locasto, Michael E and Stolfo, Salvatore}, title = {Online Training and Sanitization of AD Systems}, year = {2007}, }
  6. Androulaki, Elli, Raykova, Mariana Petrova, Stavrou, Angelos, and Bellovin, Steven Michael. OpenTor: Anonymity as a Commodity Service. 2007. Link to this entry
    BibTeX Entry
    @article{androulaki2007opentor, author = {Androulaki, Elli and Raykova, Mariana Petrova and Stavrou, Angelos and Bellovin, Steven Michael}, title = {OpenTor: Anonymity as a Commodity Service}, year = {2007}, }
  7. Cretu, Gabriela F, Stavrou, Angelos, Stolfo, Salvatore, and Keromytis, Angelos D. STAND: Sanitization Tool for ANomaly Detection. 2007. Link to this entry
    BibTeX Entry
    @article{cretu2007stand, author = {Cretu, Gabriela F and Stavrou, Angelos and Stolfo, Salvatore and Keromytis, Angelos D}, title = {STAND: Sanitization Tool for ANomaly Detection}, year = {2007}, }
  8. Sherman, Alex, Stavrou, Angelos, Nieh, Jason, Stein, Clifford S, and Keromytis, Angelos D. Can P2P Replace Direct Download for Content Distribution. 2007. Link to this entry
    BibTeX Entry
    @article{sherman2007can, author = {Sherman, Alex and Stavrou, Angelos and Nieh, Jason and Stein, Clifford S and Keromytis, Angelos D}, title = {Can P2P Replace Direct Download for Content Distribution}, year = {2007}, }
  9. Song, Yingbo, Locasto, Michael E, Stavrou, Angelos, Keromytis, Angelos D, and Stolfo, Salvatore. On the infeasibility of Modeling Polymorphic shellcode for Signature Detection. 2007. Link to this entry
    BibTeX Entry
    @article{song2007infeasibility, author = {Song, Yingbo and Locasto, Michael E and Stavrou, Angelos and Keromytis, Angelos D and Stolfo, Salvatore}, title = {On the infeasibility of Modeling Polymorphic shellcode for Signature Detection}, year = {2007}, }
  10. Song, Yingbo, Locasto, Michael E, Stavrou, Angelos, Keromytis, Angelos D, and Stolfo, Salvatore J. On the infeasibility of modeling polymorphic shellcode. In Proceedings of the 14th ACM conference on Computer and communications security, pages 541-551, 2007. Link to this entry
    BibTeX Entry
    @inproceedings{song2007infeasibility, author = {Song, Yingbo and Locasto, Michael E and Stavrou, Angelos and Keromytis, Angelos D and Stolfo, Salvatore J}, title = {On the infeasibility of modeling polymorphic shellcode}, booktitle = {Proceedings of the 14th ACM conference on Computer and communications security}, pages = {541--551}, year = {2007}, }
  11. Li, Wei-Jen, Stolfo, Salvatore, Stavrou, Angelos, Androulaki, Elli, and Keromytis, Angelos D. A study of malcode-bearing documents. In Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings 4, pages 231-250, 2007. Link to this entry
    BibTeX Entry
    @inproceedings{li2007study, author = {Li, Wei-Jen and Stolfo, Salvatore and Stavrou, Angelos and Androulaki, Elli and Keromytis, Angelos D}, title = {A study of malcode-bearing documents}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings 4}, pages = {231--250}, year = {2007}, organization = {Springer Berlin Heidelberg}, }
  12. Sidiroglou, Stelios, Stavrou, Angelos, and Keromytis, Angelos D. Mediated overlay services (MOSES): Network security as a composable service. In 2007 IEEE Sarnoff Symposium, pages 1-7, 2007. Link to this entry
    BibTeX Entry
    @inproceedings{sidiroglou2007mediated, author = {Sidiroglou, Stelios and Stavrou, Angelos and Keromytis, Angelos D}, title = {Mediated overlay services (MOSES): Network security as a composable service}, booktitle = {2007 IEEE Sarnoff Symposium}, pages = {1--7}, year = {2007}, organization = {IEEE}, }
  13. Stavrou, Angelos, Turner, David, Keromytis, Angelos D, and Prevelakis, Vassilis. Bridging the Network Reservation Gap Using Overlays. In 2007 2nd International Conference on Communication Systems Software and Middleware, pages 1-6, 2007. Link to this entry
    BibTeX Entry
    @inproceedings{stavrou2007bridging, author = {Stavrou, Angelos and Turner, David and Keromytis, Angelos D and Prevelakis, Vassilis}, title = {Bridging the Network Reservation Gap Using Overlays}, booktitle = {2007 2nd International Conference on Communication Systems Software and Middleware}, pages = {1--6}, year = {2007}, organization = {IEEE}, }

2006

  1. Locasto, Michael E, Stavrou, Angelos, Cretu, Gabriela F, Keromytis, Angelos D, and Stolfo, Salvatore. Quantifying Application Behavior Space for Detection and Self-Healing. 2006. Link to this entry
    BibTeX Entry
    @article{locasto2006quantifying, author = {Locasto, Michael E and Stavrou, Angelos and Cretu, Gabriela F and Keromytis, Angelos D and Stolfo, Salvatore}, title = {Quantifying Application Behavior Space for Detection and Self-Healing}, year = {2006}, }
  2. Stavrou, Angelos and Keromytis, Angelos D. Countering DDoS Attacks with Multi-Path Overlay Networks. 2006. Link to this entry
    BibTeX Entry
    @article{stavrou2006countering, author = {Stavrou, Angelos and Keromytis, Angelos D}, title = {Countering DDoS Attacks with Multi-Path Overlay Networks}, year = {2006}, }
  3. Sherman, Alex, Stavrou, Angelos, Nieh, Jason, Stein, Clifford S, and Keromytis, Angelos D. A Case for P2P Delivery of Paid Content. 2006. Link to this entry
    BibTeX Entry
    @article{sherman2006case, author = {Sherman, Alex and Stavrou, Angelos and Nieh, Jason and Stein, Clifford S and Keromytis, Angelos D}, title = {A Case for P2P Delivery of Paid Content}, year = {2006}, }
  4. Stavrou, Angelos, Locasto, Michael E, and Keromytis, Angelos D. W3bcrypt: Encryption as a stylesheet. In Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings 4, pages 349-364, 2006. Link to this entry
    BibTeX Entry
    @inproceedings{stavrou2006w3bcrypt, author = {Stavrou, Angelos and Locasto, Michael E and Keromytis, Angelos D}, title = {W3bcrypt: Encryption as a stylesheet}, booktitle = {Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings 4}, pages = {349--364}, year = {2006}, organization = {Springer Berlin Heidelberg}, }
  5. Locasto, Michael E, Stavrou, Angelos, and Keromytis, Angelos D. Dark application communities. In Proceedings of the 2006 workshop on New security paradigms, pages 11-18, 2006. Link to this entry
    BibTeX Entry
    @inproceedings{locasto2006dark, author = {Locasto, Michael E and Stavrou, Angelos and Keromytis, Angelos D}, title = {Dark application communities}, booktitle = {Proceedings of the 2006 workshop on New security paradigms}, pages = {11--18}, year = {2006}, }

2005

  1. Stavrou, Angelos, Cook, Debra L, Morein, William G, Keromytis, Angelos D, Misra, Vishal, and Rubenstein, Dan. WebSOS: an overlay-based system for protecting web servers from denial of service attacks. Computer Networks, 48(5):781-807, 2005. Elsevier. Link to this entry
    BibTeX Entry
    @article{stavrou2005websos, author = {Stavrou, Angelos and Cook, Debra L and Morein, William G and Keromytis, Angelos D and Misra, Vishal and Rubenstein, Dan}, title = {WebSOS: an overlay-based system for protecting web servers from denial of service attacks}, journal = {Computer Networks}, volume = {48}, number = {5}, pages = {781--807}, year = {2005}, publisher = {Elsevier}, }
  2. Stavrou, Angelos, Keromytis, Angelos D, Nieh, Jason, Misra, Vishal, and Rubenstein, Daniel Stuart. Move: An end-to-end solution to network denial of service. 2005. Link to this entry
    BibTeX Entry
    @article{stavrou2005move, author = {Stavrou, Angelos and Keromytis, Angelos D and Nieh, Jason and Misra, Vishal and Rubenstein, Daniel Stuart}, title = {Move: An end-to-end solution to network denial of service}, year = {2005}, }
  3. Stavrou, Angelos and Keromytis, Angelos D. Countering dos attacks with stateless multipath overlays. In Proceedings of the 12th ACM conference on Computer and communications security, pages 249-259, 2005. Link to this entry
    BibTeX Entry
    @inproceedings{stavrou2005countering, author = {Stavrou, Angelos and Keromytis, Angelos D}, title = {Countering dos attacks with stateless multipath overlays}, booktitle = {Proceedings of the 12th ACM conference on Computer and communications security}, pages = {249--259}, year = {2005}, }
  4. Chou, Stephen T, Stavrou, Angelos, Ioannidis, John, and Keromytis, Angelos D. gore: Routing-assisted defense against DDoS attacks. In Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings 8, pages 179-193, 2005. Link to this entry
    BibTeX Entry
    @inproceedings{chou2005gore, author = {Chou, Stephen T and Stavrou, Angelos and Ioannidis, John and Keromytis, Angelos D}, title = {gore: Routing-assisted defense against DDoS attacks}, booktitle = {Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings 8}, pages = {179--193}, year = {2005}, organization = {Springer Berlin Heidelberg}, }

2004

  1. Stavrou, Angelos, Rubenstein, Dan, and Sahu, Sambit. A lightweight, robust P2P system to handle flash crowds. IEEE Journal on Selected Areas in Communications, 22(1):6-17, 2004. IEEE. Link to this entry
    BibTeX Entry
    @article{stavrou2004lightweight, author = {Stavrou, Angelos and Rubenstein, Dan and Sahu, Sambit}, title = {A lightweight, robust P2P system to handle flash crowds}, journal = {IEEE Journal on Selected Areas in Communications}, volume = {22}, number = {1}, pages = {6--17}, year = {2004}, publisher = {IEEE}, }
  2. Coffman, EG, Constantinides, Andreas, Rubenstein, Dan, Shepherd, Bruce, and Stavrou, Angelos. Content distribution for seamless transmission. SIGMETRICS Perform. Evaluation Rev., 32(2):31-32, 2004. Link to this entry
    BibTeX Entry
    @article{coffman2004content, author = {Coffman, EG and Constantinides, Andreas and Rubenstein, Dan and Shepherd, Bruce and Stavrou, Angelos}, title = {Content distribution for seamless transmission}, journal = {SIGMETRICS Perform. Evaluation Rev.}, volume = {32}, number = {2}, pages = {31--32}, year = {2004}, }
  3. Stavrou, Angelos, Keromytis, Angelos D, and Rubenstein, Daniel Stuart. Exploiting the Structure in DHT Overlays for DoS Protection. 2004. Link to this entry
    BibTeX Entry
    @article{stavrou2004exploiting, author = {Stavrou, Angelos and Keromytis, Angelos D and Rubenstein, Daniel Stuart}, title = {Exploiting the Structure in DHT Overlays for DoS Protection}, year = {2004}, }
  4. Stavrou, Angelos and Keromytis, Angelos D. Improving The Resiliency Of Indirection-Based DDoS Protection Mechanisms Using Per-Packet Path Diversity. 2004. Link to this entry
    BibTeX Entry
    @article{stavrou2004improving, author = {Stavrou, Angelos and Keromytis, Angelos D}, title = {Improving The Resiliency Of Indirection-Based DDoS Protection Mechanisms Using Per-Packet Path Diversity}, year = {2004}, }
  5. Stavrou, Angelos, Ioannidis, John, Keromytis, Angelos D, Misra, Vishal, and Rubenstein, Dan. A pay-per-use DoS protection mechanism for the Web. In International Conference on Applied Cryptography and Network Security, pages 120-134, 2004. Link to this entry
    BibTeX Entry
    @inproceedings{stavrou2004pay, author = {Stavrou, Angelos and Ioannidis, John and Keromytis, Angelos D and Misra, Vishal and Rubenstein, Dan}, title = {A pay-per-use DoS protection mechanism for the Web}, booktitle = {International Conference on Applied Cryptography and Network Security}, pages = {120--134}, year = {2004}, organization = {Springer Berlin Heidelberg Berlin, Heidelberg}, }

2003

  1. Morein, William G, Stavrou, Angelos, Cook, Debra L, Keromytis, Angelos D, Misra, Vishal, and Rubenstein, Dan. Using graphic turing tests to counter automated ddos attacks against web servers. In Proceedings of the 10th ACM conference on Computer and communications security, pages 8-19, 2003. Link to this entry
    BibTeX Entry
    @inproceedings{morein2003using, author = {Morein, William G and Stavrou, Angelos and Cook, Debra L and Keromytis, Angelos D and Misra, Vishal and Rubenstein, Dan}, title = {Using graphic turing tests to counter automated ddos attacks against web servers}, booktitle = {Proceedings of the 10th ACM conference on Computer and communications security}, pages = {8--19}, year = {2003}, }

2002

  1. Stavrou, Angelos, Rubenstein, Dan, and Sahu, Sambit. A lightweight, robust p2p system to handle flash crowds. In 10th IEEE International Conference on Network Protocols, 2002. Proceedings., pages 226-235, 2002. Link to this entry
    BibTeX Entry
    @inproceedings{stavrou2002lightweight, author = {Stavrou, Angelos and Rubenstein, Dan and Sahu, Sambit}, title = {A lightweight, robust p2p system to handle flash crowds}, booktitle = {10th IEEE International Conference on Network Protocols, 2002. Proceedings.}, pages = {226--235}, year = {2002}, organization = {IEEE}, }