Stelios Sidiroglou-Douskos
Stelios Sidiroglou-Douskos
Research Scientist at MIT CSAIL
Verified email at csail.mit.edu - Homepage
TitleCited byYear
Managing performance vs. accuracy trade-offs with loop perforation
S Sidiroglou-Douskos, S Misailovic, H Hoffmann, M Rinard
Proceedings of the 19th ACM SIGSOFT symposium and the 13th European …, 2011
4392011
Automatically patching errors in deployed software
JH Perkins, S Kim, S Larsen, S Amarasinghe, J Bachrach, M Carbin, ...
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
3872009
Dynamic knobs for responsive power-aware computing
H Hoffmann, S Sidiroglou, M Carbin, S Misailovic, A Agarwal, M Rinard
Proceedings of the sixteenth international conference on Architectural …, 2011
3542011
Methods, systems, and media for detecting covert malware
BM Bowen, PV Prabhu, VP Kemerlis, S Sidiroglou, SJ Stolfo, ...
US Patent 8,528,091, 2013
3372013
Systems and methods for detecting and inhibiting attacks using honeypots
S Sidiroglou, AD Keromytis, KG Anagnostakis
US Patent 7,904,959, 2011
2792011
Detecting targeted attacks using shadow honeypots
KG Anagnostakis, S Sidiroglou, P Akritidis, K Xinidis, E Markatos, ...
2782005
Building a reactive immune system for software services
S Sidiroglou, ME Locasto, SW Boyd, AD Keromytis
2382005
Quality of service profiling
S Misailovic, S Sidiroglou, H Hoffmann, M Rinard
2010 ACM/IEEE 32nd International Conference on Software Engineering 1, 25-34, 2010
2332010
Assure: automatic software self-healing using rescue points
S Sidiroglou, O Laadan, C Perez, N Viennot, J Nieh, AD Keromytis
ACM SIGARCH Computer Architecture News 37 (1), 37-48, 2009
2002009
Control jujutsu: On the weaknesses of fine-grained control flow integrity
I Evans, F Long, U Otgonbaatar, H Shrobe, M Rinard, H Okhravi, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1672015
Countering network worms through automatic patch generation
S Sidiroglou, AD Keromytis
IEEE Security & Privacy 3 (6), 41-49, 2005
1532005
Ubiquitous computing in home networks
H Schulzrinne, X Wu, S Sidiroglou, S Berger
IEEE Communications Magazine 41 (11), 128-135, 2003
1362003
Missing the point (er): On the effectiveness of code pointer integrity
I Evans, S Fingeret, J Gonzalez, U Otgonbaatar, T Tang, H Shrobe, ...
2015 IEEE Symposium on Security and Privacy, 781-796, 2015
1352015
Using code perforation to improve performance, reduce energy consumption, and respond to failures
H Hoffmann, S Misailovic, S Sidiroglou, A Agarwal, M Rinard
1282009
Methods and systems for repairing applications
AD Keromytis, M Locasto, S Sidiroglou
US Patent 7,490,268, 2009
1242009
A network worm vaccine architecture
S Sidiroglou, AD Keromytis
WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling …, 2003
1052003
Methods, media and systems for detecting anomalous program executions
SJ Stolfo, AD Keromytis, S Sidiroglou
US Patent 8,074,115, 2011
1042011
Automatic error elimination by horizontal code transfer across multiple applications
S Sidiroglou-Douskos, E Lahtinen, F Long, M Rinard
Acm Sigplan Notices 50 (6), 43-54, 2015
1022015
A dynamic mechanism for recovering from buffer overflow attacks
S Sidiroglou, G Giovanidis, AD Keromytis
International Conference on Information Security, 1-15, 2005
942005
Software self-healing using collaborative application communities
ME Locasto, S Sidiroglou, AD Keromytis
872006
The system can't perform the operation now. Try again later.
Articles 1–20