1. Exploiting Split Browsers for Efficiently Protecting User Data Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D.; Athanasopoulos, Elias 2012 Articles Information science
2. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud Stolfo, Salvatore; Ben Salem, Malek; Keromytis, Angelos D. 2012 Articles Computer science
3. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems Kemerlis, Vasileios; Portokalidis, Georgios; Jee, Kangkook; Keromytis, Angelos D. 2012 Articles Computer science
4. Self-Healing Multitier Architectures Using Cascading Rescue Points Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D. 2012 Articles Information science
5. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization Pappas, Vasilis; Polychronakis, Michalis; Keromytis, Angelos D. 2012 Articles Computer science
6. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation Gessiou, Eleni; Pappas, Vasilis; Athanasopoulos, Ilias; Keromytis, Angelos D.; Ioannidis, Sotiris 2012 Articles Computer science
7. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2011 Articles Computer science
8. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS Geneiatakis, Dimitris; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
9. Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent Johnson, Maritza Lupe; Bellovin, Steven Michael; Keromytis, Angelos D. 2011 Articles Computer science
10. Detecting Traffic Snooping in Tor Using Decoys Chakravarty, Sambuddho; Portokalidis, Georgios; Polychronakis, Michalis; Keromytis, Angelos D. 2011 Articles Computer science