Out of control: Overcoming control-flow integrity E Göktas, E Athanasopoulos, H Bos, G Portokalidis 2014 IEEE Symposium on Security and Privacy, 575-589, 2014 | 583 | 2014 |
Rage against the virtual machine: hindering dynamic analysis of android malware T Petsas, G Voyatzis, E Athanasopoulos, M Polychronakis, S Ioannidis Proceedings of the seventh european workshop on system security, 1-6, 2014 | 352 | 2014 |
A tough call: Mitigating advanced code-reuse attacks at the binary level V Van Der Veen, E Göktas, M Contag, A Pawoloski, X Chen, S Rawat, ... 2016 IEEE Symposium on Security and Privacy (SP), 934-953, 2016 | 272 | 2016 |
Size Does Matter: Why Using {Gadget-Chain} Length to Prevent {Code-Reuse} Attacks is Hard E Göktaş, E Athanasopoulos, M Polychronakis, H Bos, G Portokalidis 23rd USENIX Security Symposium (USENIX Security 14), 417-432, 2014 | 219 | 2014 |
Face/off: Preventing privacy leakage from photos in social networks P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis Proceedings of the 22nd ACM SIGSAC Conference on computer and communications …, 2015 | 205 | 2015 |
Throwhammer: Rowhammer attacks over the network and defenses A Tatar, RK Konoth, E Athanasopoulos, C Giuffrida, H Bos, K Razavi 2018 USENIX Annual Technical Conference (USENIX ATC 18), 213-226, 2018 | 189 | 2018 |
No need to hide: Protecting safe regions on commodity hardware K Koning, X Chen, H Bos, C Giuffrida, E Athanasopoulos Proceedings of the Twelfth European Conference on Computer Systems, 437-452, 2017 | 176 | 2017 |
Two-factor authentication: is the world ready? Quantifying 2FA adoption T Petsas, G Tsirantonakis, E Athanasopoulos, S Ioannidis Proceedings of the eighth european workshop on system security, 1-7, 2015 | 166 | 2015 |
we. b: The web of short URLs D Antoniades, I Polakis, G Kontaxis, E Athanasopoulos, S Ioannidis, ... Proceedings of the 20th international conference on World Wide Web, 715-724, 2011 | 153 | 2011 |
HCFI: Hardware-enforced control-flow integrity N Christoulakis, G Christou, E Athanasopoulos, S Ioannidis Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016 | 151 | 2016 |
Poking holes in information hiding A Oikonomopoulos, E Athanasopoulos, H Bos, C Giuffrida 25th USENIX Security Symposium (USENIX Security 16), 121-138, 2016 | 122 | 2016 |
Antisocial networks: Turning a social network into a botnet E Athanasopoulos, A Makridakis, S Antonatos, D Antoniades, S Ioannidis, ... International Conference on Information Security, 146-160, 2008 | 117 | 2008 |
Undermining information hiding (and what to do about it) E Göktaş, R Gawlik, B Kollenda, E Athanasopoulos, G Portokalidis, ... 25th USENIX Security Symposium (USENIX Security 16), 105-119, 2016 | 109 | 2016 |
AndRadar: fast discovery of android applications in alternative markets M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ... Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014 | 97 | 2014 |
{CensMon}: A Web Censorship Monitor E Athanasopoulos, S Ioannidis, A Sfakianakis USENIX Workshop on Free and Open Communications on the Internet (FOCI 11), 2011 | 97 | 2011 |
Enhanced captchas: Using animation to tell humans and computers apart E Athanasopoulos, S Antonatos Communications and Multimedia Security: 10th IFIP TC-6 TC-11 International …, 2006 | 88 | 2006 |
PixelVault: Using GPUs for securing cryptographic operations G Vasiliadis, E Athanasopoulos, M Polychronakis, S Ioannidis Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 82 | 2014 |
Sauth: Protecting user accounts from password database leaks G Kontaxis, E Athanasopoulos, G Portokalidis, AD Keromytis Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 76 | 2013 |
Shrinkwrap: Vtable protection without loose ends I Haller, E Göktaş, E Athanasopoulos, G Portokalidis, H Bos Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 64 | 2015 |
The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines. M Athanasakis, E Athanasopoulos, M Polychronakis, G Portokalidis, ... NDSS, 2015 | 64 | 2015 |