1. On Effectiveness of Traffic Analysis Against Anonymity Networks Using Netflow Chakravarty, Sambuddho; Polychronakis, Michalis; Portokalidis, Georgios; Barbera, Marco V.; Keromytis, Angelos D. 2013 Reports Computer science
2. Exploiting Split Browsers for Efficiently Protecting User Data Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D.; Athanasopoulos, Elias 2012 Articles Information science
3. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems Kemerlis, Vasileios; Portokalidis, Georgios; Jee, Kangkook; Keromytis, Angelos D. 2012 Articles Computer science
4. Self-Healing Multitier Architectures Using Cascading Rescue Points Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D. 2012 Articles Information science
5. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS Geneiatakis, Dimitris; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
6. Detecting Traffic Snooping in Anonymity Networks Using Decoys Chakravarty, Sambuddho; Portokalidis, Georgios; Polychronakis, Michalis; Keromytis, Angelos D. 2011 Reports Computer science
7. Detecting Traffic Snooping in Tor Using Decoys Chakravarty, Sambuddho; Portokalidis, Georgios; Polychronakis, Michalis; Keromytis, Angelos D. 2011 Articles Computer science
8. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems Kemerlis, Vasileios; Portokalidis, Georgios; Jee, Kangkook; Keromytis, Angelos D. 2011 Reports Computer science
9. REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
10. Taint-Exchange: a Generic System for Cross-process and Cross-host Taint Tracking Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
11. Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
12. Fast and Practical Instruction-Set Randomization for Commodity Systems Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science
13. Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science
14. iLeak: A Lightweight System for Detecting Inadvertent Information Leaks Kemerlis, Vasileios; Pappas, Vasileios; Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science