Elias Athanasopoulos
Elias Athanasopoulos
Assistant Professor, University of Cyprus
Verified email at cs.ucy.ac.cy - Homepage
TitleCited byYear
Out of control: Overcoming control-flow integrity
E Göktas, E Athanasopoulos, H Bos, G Portokalidis
2014 IEEE Symposium on Security and Privacy, 575-589, 2014
3222014
Rage against the virtual machine: hindering dynamic analysis of android malware
T Petsas, G Voyatzis, E Athanasopoulos, M Polychronakis, S Ioannidis
Proceedings of the Seventh European Workshop on System Security, 5, 2014
1852014
Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard
E Göktaş, E Athanasopoulos, M Polychronakis, H Bos, G Portokalidis
23rd {USENIX} Security Symposium ({USENIX} Security 14), 417-432, 2014
1482014
we. b: The web of short URLs
D Antoniades, I Polakis, G Kontaxis, E Athanasopoulos, S Ioannidis, ...
Proceedings of the 20th international conference on World Wide Web, 715-724, 2011
1182011
A tough call: Mitigating advanced code-reuse attacks at the binary level
V Van Der Veen, E Göktas, M Contag, A Pawoloski, X Chen, S Rawat, ...
2016 IEEE Symposium on Security and Privacy (SP), 934-953, 2016
972016
Antisocial networks: Turning a social network into a botnet
E Athanasopoulos, A Makridakis, S Antonatos, D Antoniades, S Ioannidis, ...
International Conference on Information Security, 146-160, 2008
972008
Face/off: Preventing privacy leakage from photos in social networks
P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
852015
Enhanced captchas: Using animation to tell humans and computers apart
E Athanasopoulos, S Antonatos
IFIP International Conference on Communications and Multimedia Security, 97-108, 2006
652006
Censmon: A web censorship monitor
A Sfakianakis, E Athanasopoulos, S Ioannidis
Free and Open Communications on the Internet. USENIX, 113, 2011
622011
AndRadar: fast discovery of android applications in alternative markets
M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ...
International Conference on Detection of Intrusions and Malware, and …, 2014
572014
Misusing unstructured p2p systems to perform dos attacks: The network that never forgets
E Athanasopoulos, KG Anagnostakis, EP Markatos
International Conference on Applied Cryptography and Network Security, 130-145, 2006
572006
PixelVault: Using GPUs for securing cryptographic operations
G Vasiliadis, E Athanasopoulos, M Polychronakis, S Ioannidis
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
532014
Poking holes in information hiding
A Oikonomopoulos, E Athanasopoulos, H Bos, C Giuffrida
25th {USENIX} Security Symposium ({USENIX} Security 16), 121-138, 2016
502016
Two-factor authentication: is the world ready?: quantifying 2FA adoption
T Petsas, G Tsirantonakis, E Athanasopoulos, S Ioannidis
Proceedings of the eighth european workshop on system security, 4, 2015
502015
Undermining information hiding (and what to do about it)
E Göktaş, R Gawlik, B Kollenda, E Athanasopoulos, G Portokalidis, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 105-119, 2016
482016
Sauth: Protecting user accounts from password database leaks
G Kontaxis, E Athanasopoulos, G Portokalidis, AD Keromytis
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
482013
Hcfi: Hardware-enforced control-flow integrity
N Christoulakis, G Christou, E Athanasopoulos, S Ioannidis
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
462016
Compromising anonymity using packet spinning
V Pappas, E Athanasopoulos, S Ioannidis, EP Markatos
International Conference on Information Security, 161-174, 2008
452008
Shrinkwrap: Vtable protection without loose ends
I Haller, E Göktaş, E Athanasopoulos, G Portokalidis, H Bos
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
412015
Throwhammer: Rowhammer attacks over the network and defenses
A Tatar, RK Konoth, E Athanasopoulos, C Giuffrida, H Bos, K Razavi
2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 213-226, 2018
402018
The system can't perform the operation now. Try again later.
Articles 1–20