Vasilis Pappas
Vasilis Pappas
Verified email at cs.columbia.edu - Homepage
TitleCited byYear
Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
V Pappas, M Polychronakis, AD Keromytis
Security and Privacy (SP), 2012 IEEE Symposium on, 601-615, 2012
3352012
Transparent ROP exploit mitigation using indirect branch tracing
V Pappas, M Polychronakis, AD Keromytis
Proceedings of the 22nd USENIX conference on Security, 447-462, 2013
2882013
Blind seer: A scalable private dbms
V Pappas, F Krell, B Vo, V Kolesnikov, T Malkin, SG Choi, W George, ...
Security and Privacy (SP), 2014 IEEE Symposium on, 359-374, 2014
1932014
kBouncer: Efficient and Transparent ROP Mitigation
V Pappas
512012
Compromising anonymity using packet spinning
V Pappas, E Athanasopoulos, S Ioannidis, EP Markatos
International Conference on Information Security, 161-174, 2008
452008
CloudFence: Data flow tracking as a cloud service
V Pappas, VP Kemerlis, A Zavou, M Polychronakis, AD Keromytis
International Workshop on Recent Advances in Intrusion Detection, 411-431, 2013
392013
xJS: practical XSS prevention for web application development
E Athanasopoulos, V Pappas, A Krithinakis, S Ligouras, EP Markatos, ...
Proceedings of the 2010 USENIX conference on Web application development …, 2010
392010
CellFlood: Attacking Tor onion routers on the cheap
MV Barbera, VP Kemerlis, V Pappas, AD Keromytis
European Symposium on Research in Computer Security, 664-681, 2013
282013
Private search in the real world
V Pappas, M Raykova, B Vo, SM Bellovin, T Malkin
Proceedings of the 27th Annual Computer Security Applications Conference, 83-92, 2011
262011
Code-Injection Attacks in Browsers Supporting Policies
E Athanasopoulos, V Pappas, E Markatos
Proceedings of the 2nd Workshop on Web 2.0 Security & Privacy (W2SP), 2009
212009
Towards a universal data provenance framework using dynamic instrumentation
E Gessiou, V Pappas, E Athanasopoulos, AD Keromytis, S Ioannidis
IFIP International Information Security Conference, 103-114, 2012
182012
Cloudopsy: an Autopsy of Data Flows in the Cloud
A Zavou, V Pappas, VP Kemerlis, M Polychronakis, G Portokalidis, ...
Proc. of HCII, 2013
142013
Cloud-Fence: Enabling Users to Audit the Use of their Cloud-Resident Data
V Pappas, V Kemerlis, A Zavou, M Polychronakis, AD Keromytis
Columbia University Computer Science Technical Reports, 2012
112012
iLeak: A lightweight system for detecting inadvertent information leaks
VP Kemerlis, V Pappas, G Portokalidis, AD Keromytis
Proceedings of the 6th European Conference on Computer Network Defense …, 2010
112010
Practical Software Diversification Using In-Place Code Randomization
V Pappas, M Polychronakis, AD Keromytis
Moving Target Defense II, 175-202, 2012
102012
Evaluation of a spyware detection system using thin client computing
V Pappas, BM Bowen, AD Keromytis
International Conference on Information Security and Cryptology, 222-232, 2010
92010
Crimeware swindling without virtual machines
V Pappas, BM Bowen, AD Keromytis
International Conference on Information Security, 196-202, 2010
92010
Dynamic reconstruction of relocation information for stripped binaries
V Pappas, M Polychronakis, AD Keromytis
International Workshop on Recent Advances in Intrusion Detection, 68-87, 2014
82014
Measuring the deployment hiccups of DNSSEC
V Pappas, AD Keromytis
Advances in Computing and Communications, 44-53, 2011
12011
Diversified instruction set processing to enhance security
L Sethumadhavan, K Sinha, A Keromytis, V Pappas, V Kemerlis
US Patent App. 14/946,961, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20