Conferences and Workshops

Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure
Enes Göktaş, Benjamin Kollenda, Philipp Koppe, Eric Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, and Cristiano Giuffrida
Proceedings of the IEEE European Symposium on Security and Privacy, London, United Kingdom, April 2018 (22.9%)

Techu: Open and Privacy-preserving Crowdsourced GPS for the Masses
Ioannis Agadakos, Jason Polakis, and Georgios Portokalidis
Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), Niagara Falls, NY, USA, June 2017 (18%)

Location-enhanced Authentication using the IoT
Ioannis Agadakos, Per Hallgren, Dimitrios Damopoulos, Andrei Sabelfeld, and Georgios Portokalidis
Proceedings of the Annual Computer Security Applications Conference (ACSAC), Los Angeles, CA, USA, December 2016 (22.8%)

Bypassing CLANG’s Safestack for Fun and Profit
Aggelos Oikonomopoulos, Benjamin Kollenda, Cristiano Giuffrida, Elias Athanasopoulos, Enes Göktaş, Georgios Portokalidis, Herbert Bos, and Robert Gawlik
Black Hat Europe, London, UK, November 2016

NaClDroid: Native Code Isolation for Android Applications
Elias Athanasopoulos, Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos Keromytis
Proceedings of the European Symposium on Research in Computer Security (ESORICS), Heraklion, Crete, Greece, September 2016 (21%)

Undermining Entropy-based Information Hiding (And What to do About it)
Enes Göktaş, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, and Herbert Bos
Proceedings of the USENIX Security Symposium, Austin, TX, USA, August 2016 (15.55%)

Speculative Memory Checkpointing
Dirk Vogt, Armando Miraglia, Georgios Portokalidis, Herbert Bos, Andrew S Tanenbaum, and Cristiano Giuffrida
Proceedings of the ACM/IFIP/USENIX Middleware Conference, Vancouver, Canada, December 2015

ShrinkWrap: VTable Protection without Loose Ends Outstanding student paper award
Istvan Haller, Enes Göktaş, Elias Athanasopoulos, Georgios Portokalidis, and Herbert Bos
Proceedings of the Annual Computer Security Applications Conference (ACSAC), Los Angeles, CA, USA, December 2015 (24.4%)

WYSISNWIV: What You Scan Is Not What I Visit
Qilang Yang, Dimitrios Damopoulos, and Georgios Portokalidis
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Kyoto, Japan, November 2015 (22.69%)

GPU-Disasm: A GPU based x86 Disassembler
Evangelos Ladakis, Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis, and Georgios Portokalidis
Proceedings of the Information Security Conference (ISC), Trondheim, Norway, September 2015 (29.1%)

The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines
Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, and Sotiris Ioannidis
Proceedings of the Network and Distributed System Security (NDSS) Symposium, San Diego, CA, USA, February 2015 (19.6%)

Size Does Matter - Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard
Enes Göktaş, Elias Athanasopoulos, Herbert Bos, Michalis Polychronakis, and Georgios Portokalidis
Proceedings of the USENIX Security Symposium, San Diego, CA, USA, August 2014 (19.1%)

Out Of Control: Overcoming Control-Flow Integrity
Enes Göktaş, Elias Athanasopoulos, Herbert Bos, and Georgios Portokalidis
Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, USA, May 2014 (13.6%)

The Best of Both Worlds. A Framework for the Synergistic Operation of Host and Cloud Anomaly-based IDS for Smartphones
Dimitrios Damopoulos, Georgios Kambourakis, and Georgios Portokalidis
Proceedings of the European Workshop on System Security (EUROSEC), Amsterdam, The Netherlands, April 2014 (42.9%)

On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records
Sambuddho Chakravarty, Marco V. Barbera, Georgios Portokalidis, Michalis Polychronakis, and Angelos D. Keromytis
Proceedings of the Passive and Active Measurement (PAM) Conference, Los Angeles, CA, USA, March 2014 (31.5%)

SAuth: Protecting User Accounts from Password Database Leaks
Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis
Proceedings of the ACM Conference on Computer and Communications Security (CCS), Berlin, Germany, November 2013 (19.8%)

ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking
Kangkook Jee, Vasileios P. Kemerlis, Angelos D. Keromytis, and Georgios Portokalidis
Proceedings of the ACM Conference on Computer and Communications Security (CCS), Berlin, Germany, November 2013 (19.8%)

Cloudopsy: an Autopsy of Data Flows in the Cloud
Angeliki Zavou, Vasilis Pappas, Vasileios P. Kemerlis, Michalis Polychronakis, Georgios Portokalidis, and Angelos D. Keromytis
Proceedings of the International Conference on Human-Computer Interaction (HCI), Las Vegas, NV, USA, July 2013

Self-Healing Multitier Architectures Using Cascading Rescue Points
Angeliki Zavou, Georgios Portokalidis, and Angelos D Keromytis
Proceedings of the Annual Computer Security Applications Conference (ACSAC), Orlando, FL, USA, December 2012 (19%)

Adaptive Defenses for Commodity Software through Virtual Application Partitioning
Dimitris Geneiatakis, Georgios Portokalidis, Vasileios P. Kemerlis, and Angelos D. Keromytis
Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, USA, October 2012 (18.9%)

Exploiting Split Browsers for Efficiently Protecting User Data
Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis
Proceedings of CCSW: The ACM Cloud Computing Security Workshop, Raleigh, NC, USA, October 2012

kGuard: Lightweight Kernel Protection against Return-to-user Attacks
Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis
Proceedings of the USENIX Security Symposium, Bellevue, WA, USA, August 2012 (19.4%)

libdft: Practical Dynamic Data Flow Tracking for Commodity Systems
Vasileios P. Kemerlis, Georgios Portokalidis, Kangkook Jee, and Angelos D. Keromytis
Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE), London, UK, March 2012

A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware
Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August, and Angelos D. Keromytis
Proceedings of the Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 2012 (17.8%)

A Multilayer Overlay Network Architecture for Enhancing IP Service Availability Against DoS
Dimitris Geneiatakis, Georgios Portokalidis, and Angelos D. Keromytis
Proceedings of the International Conference on Information Systems Security (ICISS), Kolkata, India, December 2011 (22.8%)

REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points Best paper award
Georgios Portokalidis and Angelos D. Keromytis
Proceedings of the International Workshop on Security (IWSEC), Tokyo, Japan, November 2011

Taint-Exchange: a Generic System for Cross-process and Cross-host Taint Tracking
Angeliki Zavou, Georgios Portokalidis, and Angelos D. Keromytis
Proceedings of the International Workshop on Security (IWSEC), Tokyo, Japan, November 2011

Detecting Traffic Snooping in Tor Using Decoys
Sambuddho Chakravarty, Michalis Polychronakis Georgios Portokalidis, and Angelos D. Keromytis
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Menlo Park, CA, USA, September 2011 (23%)

Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution
Georgios Portokalidis and Angelos D. Keromytis
Proceedings of the ARO Workshop on Moving Target Defense, Fairfax, VA, USA, January 2011

Paranoid Android: Versatile Protection For Smartphones
Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, and Herbert Bos
Proceedings of the Annual Computer Security Applications Conference (ACSAC), Austin, TX, USA, December 2010 (17%)

Fast and Practical Instruction-Set Randomization for Commodity Systems
Georgios Portokalidis and Angelos D. Keromytis
Proceedings of the Annual Computer Security Applications Conference (ACSAC), Austin, TX, USA, December 2010 (17%)

iLeak: a Lightweight System for Detecting Inadvertent Information Leaks
Vasileios P. Kemerlis, Vasilis Pappas, Georgios Portokalidis, and Angelos D. Keromytis
Proceedings of the European Conference on Computer Network Defense (EC2ND), Berlin, Germany, October 2010

Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits
Georgios Portokalidis and Herbert Bos
Proceedings of the ACM SIGOPS/EuroSys European Conference on Computer Systems, Glasgow, Scotland, April 2008 (18%)

Argos: Emulated Hardware Support to Fingerprint Zero-Day Attacks by Means of Dynamic Data Flow Analysis
Georgios Portokalidis, Asia Slowinska, and Herbert Bos
Proceedings of the Annual Conference of the Advanced School for Computing and Imaging (ASCI), Belgium, June 2006

Argos: an Emulator for Fingerprinting Zero-Day Attacks
Georgios Portokalidis, Asia Slowinska, and Herbert Bos
Proceedings of ACM SIGOPS EUROSYS, Leuven, Belgium, April 2006 (20%)

Argos: Securing IP Communications Against Zero-Day Attacks
Georgios Portokalidis, Asia Slowinska, and Herbert Bos
Proceedings of NLUUG Unix Users Group Annual Conference, The Netherlands, April 2006 (invited)

FFPF: Fairly Fast Packet Filters
Herbert Bos, Willem Bruijn, Mihai Cristea, Trung Nguyen, and Georgios Portokalidis
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Francisco, CA, USA, December 2004 (14%)

Journals

Detection and Analysis of Eavesdropping in Anonymous Communication Networks
Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, and Angelos D. Keromytis
International Journal of Information Security (IJIS) (Volume 14, Issue 3, Pages 205–220, June 2015)

kGuard: Lightweight Kernel Protection
Vasileios P. Kemerlis, Georgios Portokalidis, Elias Athanasopoulos, and Angelos D. Keromytis
USENIX;login: Magazine (Volume 37, Issue 6, Pages 7–14, December 2012)

SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots
Georgios Portokalidis and Herbert Bos
Elsevier Journal on Computer Networks, Special Issue on Security through Self-Protecting and Self-Healing Systems (Volume 51, Issue 5, Pages 1256–1274, April 2007)

Books/Book Chapters

Evaluating Control-Flow Restricting Defenses
Enes Göktaş, Elias Athanasopoulos, Herbert Bos, and Georgios Portokalidis
In Per Larsen and Ahmad-Reza Sadeghi, editors, The Continuing Arms Race: Code-Reuse Attacks and Defenses, chapter 5, pages 117--137. ACM and Morgan & Claypool, 2018

Technical Reports

On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records
Sambuddho Chakravarty, Marco V. Barbera, Georgios Portokalidis, Michalis Polychronakis, and Angelos D. Keromytis
Technical report CUCS-019-13, Columbia University, New York, NY, USA, July 2013

libdft: Practical Dynamic Data Flow Tracking for Commodity Systems
Vasileios P. Kemerlis, Georgios Portokalidis, Kangkook Jee, and Angelos D. Keromytis
Technical report CUCS-044-11, Columbia University, New York, NY, USA, October 2011

Detecting Traffic Snooping in Anonymity Networks Using Decoys
Sambuddho Chakravarty, Michalis Polychronakis Georgios Portokalidis, and Angelos D. Keromytis
Technical report CUCS-005-11, Columbia University, New York, NY, USA, February 2011

Protecting Smart Phones by Means of Execution Replication
Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, and Herbert Bos
Technical report IR-CS-054, Vrije Universiteit, Amsterdam, The Netherlands, September 2009

Multi-tier intrusion detection by means of replayable virtual machines
Auke Folkerts, Georgios Portokalidis, and Herbert Bos
Technical report IR-CS-047, Vrije Universiteit, Amsterdam, The Netherlands, August 2008

Prospector: a Protocol-Specific Detector of Polymorphic Buffer Overflows
Asia Slowinska, Georgios Portokalidis, and Herbert Bos
Technical report IR-CS-023, Vrije Universiteit, Amsterdam, The Netherlands, June 2006

Argos: an x86 Emulator for Fingerprinting Zero-Day Attacks by Means of Dynamic Data Flow Analysis
Georgios Portokalidis, Asia Slowinska, and Herbert Bos
Technical report IR-CS-017, Vrije Universiteit, Amsterdam, The Netherlands, June 2005

SweetBait: Zero-Hour Worm Detection and Containment Using Honeypots
Georgios Portokalidis and Herbert Bos
Technical report IR-CS-015, Vrije Universiteit, Amsterdam, The Netherlands, May 2005

Packet Monitoring at High Speed with FFPF
Georgios Portokalidis and Herbert Bos
Technical report 2004-01, LIACS, Leiden University, Leiden, The Netherlands, January 2004

Study and Bridging of Peer-to-Peer File Sharing Systems
Georgios Portokalidis, Evangelos P. Markatos, and Manolis Marazakis
Technical report 312, ICS-FORTH, Heraklion, Crete, Greece, October 2002