Conferences and Workshops

Techu: Open and Privacy-preserving Crowdsourced GPS for the Masses (pdf)
Ioannis Agadakos, Jason Polakis, and Georgios Portokalidis
Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), Niagara Falls, NY, USA, June 2017 (18%)

Location-enhanced Authentication using the IoT (pdf)
Ioannis Agadakos, Per Hallgren, Dimitrios Damopoulos, Andrei Sabelfeld, and Georgios Portokalidis
Proceedings of the Annual Computer Security Applications Conference (ACSAC), Los Angeles, CA, USA, December 2016 (22.8%)

Bypassing CLANG’s Safestack for Fun and Profit (link)
Aggelos Oikonomopoulos, Benjamin Kollenda, Cristiano Giuffrida, Elias Athanasopoulos, Enes Göktaş, Georgios Portokalidis, Herbert Bos, and Robert Gawlik
Black Hat Europe, London, UK, November 2016

NaClDroid: Native Code Isolation for Android Applications (pdf)
Elias Athanasopoulos, Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos Keromytis
Proceedings of the European Symposium on Research in Computer Security (ESORICS), Heraklion, Crete, Greece, September 2016 (21%)

Undermining Entropy-based Information Hiding (And What to do About it) (pdf)
Enes Göktaş, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, and Herbert Bos
Proceedings of the USENIX Security Symposium, Austin, TX, USA, August 2016 (15.55%)

Speculative Memory Checkpointing (pdf)
Dirk Vogt, Armando Miraglia, Georgios Portokalidis, Herbert Bos, Andrew S Tanenbaum, and Cristiano Giuffrida
Proceedings of the ACM/IFIP/USENIX Middleware Conference, Vancouver, Canada, December 2015

ShrinkWrap: VTable Protection without Loose Ends (pdf)
Istvan Haller, Enes Göktaş, Elias Athanasopoulos, Georgios Portokalidis, and Herbert Bos
Proceedings of the Annual Computer Security Applications Conference (ACSAC), Los Angeles, CA, USA, December 2015 (24.4%) Best student paper award

WYSISNWIV: What You Scan Is Not What I Visit (pdf)
Qilang Yang, Dimitrios Damopoulos, and Georgios Portokalidis
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Kyoto, Japan, November 2015 (22.69%)

GPU-Disasm: A GPU based x86 Disassembler (pdf)
Evangelos Ladakis, Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis, and Georgios Portokalidis
Proceedings of the Information Security Conference (ISC), Trondheim, Norway, September 2015 (29.1%)

The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines (pdf)
Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, and Sotiris Ioannidis
Proceedings of the Network and Distributed System Security (NDSS) Symposium, San Diego, CA, USA, February 2015 (19.6%)

Size Does Matter - Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard (pdf)
Enes Göktaş, Elias Athanasopoulos, Herbert Bos, Michalis Polychronakis, and Georgios Portokalidis
Proceedings of the USENIX Security Symposium, San Diego, CA, USA, August 2014 (19.1%)

Out Of Control: Overcoming Control-Flow Integrity (pdf)
Enes Göktaş, Elias Athanasopoulos, Herbert Bos, and Georgios Portokalidis
Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, USA, May 2014 (13.6%)

The Best of Both Worlds. A Framework for the Synergistic Operation of Host and Cloud Anomaly-based IDS for Smartphones (pdf)
Dimitrios Damopoulos, Georgios Kambourakis, and Georgios Portokalidis
Proceedings of the European Workshop on System Security (EUROSEC), Amsterdam, The Netherlands, April 2014 (42.9%)

On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records (pdf)
Sambuddho Chakravarty, Marco V. Barbera, Georgios Portokalidis, Michalis Polychronakis, and Angelos D. Keromytis
Proceedings of the Passive and Active Measurement (PAM) Conference, Los Angeles, CA, USA, March 2014 (31.5%)

SAuth: Protecting User Accounts from Password Database Leaks (pdf)
Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis
Proceedings of the ACM Conference on Computer and Communications Security (CCS), Berlin, Germany, November 2013 (19.8%)

ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking (pdf)
Kangkook Jee, Vasileios P. Kemerlis, Angelos D. Keromytis, and Georgios Portokalidis
Proceedings of the ACM Conference on Computer and Communications Security (CCS), Berlin, Germany, November 2013 (19.8%)

Cloudopsy: an Autopsy of Data Flows in the Cloud (pdf)
Angeliki Zavou, Vasilis Pappas, Vasileios P. Kemerlis, Michalis Polychronakis, Georgios Portokalidis, and Angelos D. Keromytis
Proceedings of the International Conference on Human-Computer Interaction (HCI), Las Vegas, NV, USA, July 2013

Self-Healing Multitier Architectures Using Cascading Rescue Points (pdf)
Angeliki Zavou, Georgios Portokalidis, and Angelos D Keromytis
Proceedings of the Annual Computer Security Applications Conference (ACSAC), Orlando, FL, USA, December 2012 (19%)

Adaptive Defenses for Commodity Software through Virtual Application Partitioning (pdf)
Dimitris Geneiatakis, Georgios Portokalidis, Vasileios P. Kemerlis, and Angelos D. Keromytis
Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, USA, October 2012 (18.9%)

Exploiting Split Browsers for Efficiently Protecting User Data (pdf)
Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis
Proceedings of CCSW: The ACM Cloud Computing Security Workshop, Raleigh, NC, USA, October 2012

kGuard: Lightweight Kernel Protection against Return-to-user Attacks (pdf)
Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis
Proceedings of the USENIX Security Symposium, Bellevue, WA, USA, August 2012 (19.4%)

libdft: Practical Dynamic Data Flow Tracking for Commodity Systems (pdf)
Vasileios P. Kemerlis, Georgios Portokalidis, Kangkook Jee, and Angelos D. Keromytis
Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE), London, UK, March 2012

A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware (pdf)
Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August, and Angelos D. Keromytis
Proceedings of the Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 2012 (17.8%)

A Multilayer Overlay Network Architecture for Enhancing IP Service Availability Against DoS (pdf)
Dimitris Geneiatakis, Georgios Portokalidis, and Angelos D. Keromytis
Proceedings of the International Conference on Information Systems Security (ICISS), Kolkata, India, December 2011 (22.8%)

Taint-Exchange: a Generic System for Cross-process and Cross-host Taint Tracking (pdf)
Angeliki Zavou, Georgios Portokalidis, and Angelos D. Keromytis
Proceedings of the International Workshop on Security (IWSEC), Tokyo, Japan, November 2011

REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points (pdf)
Georgios Portokalidis and Angelos D. Keromytis
Proceedings of the International Workshop on Security (IWSEC), Tokyo, Japan, November 2011 Best paper award

Detecting Traffic Snooping in Tor Using Decoys (pdf)
Sambuddho Chakravarty, Michalis Polychronakis Georgios Portokalidis, and Angelos D. Keromytis
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Menlo Park, CA, USA, September 2011 (23%)

Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution (pdf)
Georgios Portokalidis and Angelos D. Keromytis
Proceedings of the ARO Workshop on Moving Target Defense, Fairfax, VA, USA, January 2011

Paranoid Android: Versatile Protection For Smartphones (pdf)
Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, and Herbert Bos
Proceedings of the Annual Computer Security Applications Conference (ACSAC), Austin, TX, USA, December 2010 (17%)

Fast and Practical Instruction-Set Randomization for Commodity Systems (pdf)
Georgios Portokalidis and Angelos D. Keromytis
Proceedings of the Annual Computer Security Applications Conference (ACSAC), Austin, TX, USA, December 2010 (17%)

iLeak: a Lightweight System for Detecting Inadvertent Information Leaks (pdf)
Vasileios P. Kemerlis, Vasilis Pappas, Georgios Portokalidis, and Angelos D. Keromytis
Proceedings of the European Conference on Computer Network Defense (EC2ND), Berlin, Germany, October 2010

Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits (pdf)
Georgios Portokalidis and Herbert Bos
Proceedings of the ACM SIGOPS/EuroSys European Conference on Computer Systems, Glasgow, Scotland, April 2008 (18%)

Argos: Emulated Hardware Support to Fingerprint Zero-Day Attacks by Means of Dynamic Data Flow Analysis (pdf)
Georgios Portokalidis, Asia Slowinska, and Herbert Bos
Proceedings of the Annual Conference of the Advanced School for Computing and Imaging (ASCI), Belgium, June 2006

Argos: an Emulator for Fingerprinting Zero-Day Attacks (pdf)
Georgios Portokalidis, Asia Slowinska, and Herbert Bos
Proceedings of ACM SIGOPS EUROSYS, Leuven, Belgium, April 2006 (20%)

Argos: Securing IP Communications Against Zero-Day Attacks
Georgios Portokalidis, Asia Slowinska, and Herbert Bos
Proceedings of NLUUG Unix Users Group Annual Conference, The Netherlands, April 2006 (invited)

FFPF: Fairly Fast Packet Filters (pdf)
Herbert Bos, Willem Bruijn, Mihai Cristea, Trung Nguyen, and Georgios Portokalidis
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Francisco, CA, USA, December 2004 (14%)

Journals

Detection and Analysis of Eavesdropping in Anonymous Communication Networks
Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, and Angelos D. Keromytis
International Journal of Information Security (IJIS) (Volume 14, Issue 3, Pages 205–220, June 2015)

kGuard: Lightweight Kernel Protection (pdf)
Vasileios P. Kemerlis, Georgios Portokalidis, Elias Athanasopoulos, and Angelos D. Keromytis
USENIX;login: Magazine (Volume 37, Issue 6, Pages 7–14, December 2012)

SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots (pdf)
Georgios Portokalidis and Herbert Bos
Elsevier Journal on Computer Networks, Special Issue on Security through Self-Protecting and Self-Healing Systems (Volume 51, Issue 5, Pages 1256–1274, April 2007)

Books/Book Chapters

Special Issue on Security and Privacy in Unified Communications: Challenges and Solutions
Georgios Karopoulos, Georgios Portokalidis, Josep Domingo-Ferrer, Ying-Dar Lin, Dimitris Geneiatakis, and Georgios Kambourakis (editors)
Computer Communications, Elsevier, September 2015

Research in Attacks, Intrusions, and Defenses (RAID)
Angelos Stavrou, Herbert Bos, and Georgios Portokalidis (editors)
Lecture Notes in Computer Science (LNCS), Springer, September 2014

Technical Reports

Multi-tier intrusion detection by means of replayable virtual machines (pdf)
Auke Folkerts, Georgios Portokalidis, and Herbert Bos
Technical report IR-CS-047, Vrije Universiteit, Amsterdam, The Netherlands, August 2008

Prospector: a Protocol-Specific Detector of Polymorphic Buffer Overflows (pdf)
Asia Slowinska, Georgios Portokalidis, and Herbert Bos
Technical report IR-CS-023, Vrije Universiteit, Amsterdam, The Netherlands, June 2006

Study and Bridging of Peer-to-Peer File Sharing Systems (pdf)
Georgios Portokalidis, Evangelos P. Markatos, and Manolis Marazakis
Technical report 312, ICS-FORTH, Heraklion, Crete, Greece, October 2002