1. Enhancing Security by Diversifying Instruction Sets Kemerlis, Vasileios; Sinha, Kanad; Pappas, Vasileios; Sethumadhavan, Simha; Keromytis, Angelos D. 2014 Reports Computer science
2. Bait and Snitch: Defending Computer Systems with Decoys Voris, Jonathan A.; Jermyn, Jill; Keromytis, Angelos D.; Stolfo, Salvatore 2013 Reports Computer science
3. On Effectiveness of Traffic Analysis Against Anonymity Networks Using Netflow Chakravarty, Sambuddho; Polychronakis, Michalis; Portokalidis, Georgios; Barbera, Marco V.; Keromytis, Angelos D. 2013 Reports Computer science
4. CloudFence: Enabling Users to Audit the Use of their Cloud-Resident Data Pappas, Vasilis; Kemerlis, Vasileios; Zavou, Angeliki; Polychronakis, Michalis; Keromytis, Angelos D. 2012 Reports Computer science
5. Exploiting Split Browsers for Efficiently Protecting User Data Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D.; Athanasopoulos, Elias 2012 Articles Information science
6. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud Stolfo, Salvatore; Ben Salem, Malek; Keromytis, Angelos D. 2012 Articles Computer science
7. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems Kemerlis, Vasileios; Portokalidis, Georgios; Jee, Kangkook; Keromytis, Angelos D. 2012 Articles Computer science
8. Self-Healing Multitier Architectures Using Cascading Rescue Points Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D. 2012 Articles Information science
9. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization Pappas, Vasilis; Polychronakis, Michalis; Keromytis, Angelos D. 2012 Articles Computer science
10. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation Gessiou, Eleni; Pappas, Vasilis; Athanasopoulos, Ilias; Keromytis, Angelos D.; Ioannidis, Sotiris 2012 Articles Computer science