1. On The General Applicability of Instruction-Set Randomization Boyd, Stephen W.; Kc, Gaurav S.; Locasto, Michael E.; Keromytis, Angelos D.; Prevelakis, Vassilis 2010 Articles Computer science
2. Casting Out Demons: Sanitizing Training Data for Anomaly Sensors Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore J.; Keromytis, Angelos D. 2008 Articles Computer scienceAnomaly detection (Computer security)Computer securityCyberterrorism
3. Online Network Forensics for Automatic Repair Validation Locasto, Michael E.; Burnside, Matthew Spindel; Keromytis, Angelos D. 2008 Articles Computer science
4. Pushback for Overlay Networks: Protecting Against Malicious Insiders Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2008 Articles Computer science
5. Return Value Predictability Profiles for Self–healing Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore 2008 Articles Computer science
6. Return Value Predictability Profiles for Self-Healing Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore 2008 Articles Computer scienceAnomaly detection (Computer security)
7. A Model for Automatically Repairing Execution Integrity Locasto, Michael E.; Cretu, Gabriela F.; Stavrou, Angelos; Keromytis, Angelos D. 2007 Reports Computer science
8. Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction Antonatos, Spiros; Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D.; Markatos, Evangelos 2007 Articles Computer science
9. From STEM to SEAD: Speculative Execution for Automated Defense Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D. 2007 Articles Computer science
10. On the Infeasibility of Modeling Polymorphic Shellcode Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore 2007 Articles Computer scienceDigital signatures
11. On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore 2007 Reports Computer science
12. SSARES: Secure Searchable Automated Remote Email Storage Aviv, Adam J.; Locasto, Michael E.; Potter, Shaya; Keromytis, Angelos D. 2007 Articles Computer science
13. Binary-level Function Profiling for Intrusion Detection and Smart Error Virtualization Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
14. Bloodhound: Searching Out Malicious Input in Network Flows for Automatic Repair Validation Locasto, Michael E.; Burnside, Matthew Spindel; Keromytis, Angelos D. 2006 Reports Computer science
15. Dark Application Communities Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
16. PalProtect: A Collaborative Security Approach to Comment Spam Wong, Benny; Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
17. PalProtect: A Collaborative Security Approach to Comment Spam Wong, Benny; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
18. Quantifying Application Behavior Space for Detection and Self-Healing Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore 2006 Reports Computer science
19. Software Self-Healing Using Collaborative Application Communities Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2006 Articles Computer science
20. Speculative Execution as an Operating System Service Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science