1. Enhancing Security by Diversifying Instruction Sets Kemerlis, Vasileios; Sinha, Kanad; Pappas, Vasileios; Sethumadhavan, Simha; Keromytis, Angelos D. 2014 Reports Computer science
2. On Effectiveness of Traffic Analysis Against Anonymity Networks Using Netflow Chakravarty, Sambuddho; Polychronakis, Michalis; Portokalidis, Georgios; Barbera, Marco V.; Keromytis, Angelos D. 2013 Reports Computer science
3. CloudFence: Enabling Users to Audit the Use of their Cloud-Resident Data Pappas, Vasilis; Kemerlis, Vasileios; Zavou, Angeliki; Polychronakis, Michalis; Keromytis, Angelos D. 2012 Reports Computer science
4. Detecting Traffic Snooping in Anonymity Networks Using Decoys Chakravarty, Sambuddho; Portokalidis, Georgios; Polychronakis, Michalis; Keromytis, Angelos D. 2011 Reports Computer science
5. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems Kemerlis, Vasileios; Portokalidis, Georgios; Jee, Kangkook; Keromytis, Angelos D. 2011 Reports Computer science
6. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2010 Reports Computer science
7. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Reports Computer science
8. Baiting Inside Attackers Using Decoy Documents Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
9. F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services Burnside, Matthew Spindel; Keromytis, Angelos D. 2009 Reports Computer science
10. Approximating a Global Passive Adversary Against Tor Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2008 Reports Computer scienceComputer networksComputer networks--Security measures
11. Behavior-Based Network Access Control: A Proof-of-Concept Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2008 Articles Computer scienceComputer networks--Access controlIntrusion detection systems (Computer security)
12. Distributed Firewall For MANETs Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos 2008 Reports Computer science
13. LinkWidth: A Method to Measure Link Capacity and Available Bandwidth using Single-End Probes Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2008 Reports Computer science
14. Path-based Access Control for Enterprise Networks Burnside, Matthew Spindel; Keromytis, Angelos D. 2008 Reports Computer science
15. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic Song, Yingbo; Keromytis, Angelos D.; Stolfo, Salvatore 2008 Reports Computer science
16. A Model for Automatically Repairing Execution Integrity Locasto, Michael E.; Cretu, Gabriela F.; Stavrou, Angelos; Keromytis, Angelos D. 2007 Reports Computer science
17. A Study of Malcode-Bearing Documents Li, Wei-Jen; Stolfo, Salvatore; Stavrou, Angelos; Androulaki, Elli; Keromytis, Angelos D. 2007 Articles Computer science
18. BARTER: Profile Model Exchange for Behavior-Based Access Control and Communication Security in MANETs Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2007 Reports Computer science
19. Can P2P Replace Direct Download for Content Distribution Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Stein, Clifford S.; Keromytis, Angelos D. 2007 Reports Computer science
20. Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems Cretu, Gabriela F.; Stavrou, Angelos; Stolfo, Salvatore; Keromytis, Angelos D. 2007 Articles Computer science
21. From STEM to SEAD: Speculative Execution for Automated Defense Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D. 2007 Articles Computer science
22. On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore 2007 Reports Computer science
23. STAND: Sanitization Tool for ANomaly Detection Cretu, Gabriela F.; Stavrou, Angelos; Stolfo, Salvatore; Keromytis, Angelos D. 2007 Reports Computer science
24. A Case for P2P Delivery of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Stein, Clifford S.; Keromytis, Angelos D. 2006 Reports Computer science
25. Binary-level Function Profiling for Intrusion Detection and Smart Error Virtualization Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
26. Bloodhound: Searching Out Malicious Input in Network Flows for Automatic Repair Validation Locasto, Michael E.; Burnside, Matthew Spindel; Keromytis, Angelos D. 2006 Reports Computer science
27. LinkWidth: A Method to measure Link Capacity and Available Bandwidth Using Single-End Probes Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2006 Reports Computer science
28. PalProtect: A Collaborative Security Approach to Comment Spam Wong, Benny; Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
29. Quantifying Application Behavior Space for Detection and Self-Healing Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore 2006 Reports Computer science
30. Speculative Execution as an Operating System Service Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
31. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
32. A General Analysis of the Security of Elastic Block Ciphers Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2005 Reports Computer science
33. On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2005 Reports Computer science
34. PachyRand: SQL Randomization for the PostgreSQL JDBC Driver Locasto, Michael E.; Keromytis, Angelos D. 2005 Reports Computer science
35. The Pseudorandomness of Elastic Block Ciphers Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2005 Reports Computer science
36. Building a Reactive Immune System for Software Services Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D. 2004 Reports Computer science
37. Collaborative Distributed Intrusion Detection Locasto, Michael E.; Parekh, Janak J.; Stolfo, Salvatore; Keromytis, Angelos D.; Malkin, Tal G.; Misra, Vishal 2004 Reports Computer science
38. Elastic Block Ciphers Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2004 Reports Computer science
39. Elastic Block Ciphers: The Feistel Cipher Case Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2004 Reports Computer science
40. Exploiting the Structure in DHT Overlays for DoS Protection Stavrou, Angelos; Keromytis, Angelos D.; Rubenstein, Daniel Stuart 2004 Reports Computer science
41. Remotely Keyed CryptoGraphics - Secure Remote Display Access Using (Mostly) Untrusted Hardware - Extended Version Cook, Debra L.; Baratto, Ricardo A.; Keromytis, Angelos D. 2004 Reports Computer science
42. Secret Key Cryptography Using Graphics Cards Cook, Debra L.; Ioannidis, John; Keromytis, Angelos D.; Luck, Jake 2004 Reports Computer science
43. Using Execution Transactions To Recover From Buffer Overflow Attacks Sidiroglou, Stelios; Keromytis, Angelos D. 2004 Reports Computer science
44. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Reports Computer science
45. Countering Network Worms Through Automatic Patch Generation Sidiroglou, Stelios; Keromytis, Angelos D. 2003 Reports Computer science
46. Requirements for Scalable Access Control and Security Management Architectures Keromytis, Angelos D.; Smith, Jonathan M. 2002 Reports Computer science