default search action
Vasileios P. Kemerlis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c42]Marius Momeu, Fabian Kilger, Christopher Roemheld, Simon Schnückel, Sergej Proskurin, Michalis Polychronakis, Vasileios P. Kemerlis:
ISLAB: Immutable Memory Management Metadata for Commodity Operating System Kernels. AsiaCCS 2024 - [c41]Yaniv David, Neophytos Christou, Andreas D. Kellas, Vasileios P. Kemerlis, Junfeng Yang:
QUACK: Hindering Deserialization Attacks via Static Duck Typing. NDSS 2024 - [c40]Di Jin, Alexander J. Gaidis, Vasileios P. Kemerlis:
BeeBox: Hardening BPF against Transient Execution Attacks. USENIX Security Symposium 2024 - 2023
- [c39]George Christou, Grigoris Ntousakis, Eric Lahtinen, Sotiris Ioannidis, Vasileios P. Kemerlis, Nikos Vasilakis:
BinWrap: Hybrid Protection against Native Node.js Add-ons. AsiaCCS 2023: 429-442 - [c38]Alexander J. Gaidis, Vaggelis Atlidakis, Vasileios P. Kemerlis:
SysXCHG: Refining Privilege with Adaptive System Call Filters. CCS 2023: 1964-1978 - [c37]Alexander J. Gaidis, Joao Moreira, Ke Sun, Alyssa Milburn, Vaggelis Atlidakis, Vasileios P. Kemerlis:
FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking. RAID 2023: 527-546 - [c36]Di Jin, Vaggelis Atlidakis, Vasileios P. Kemerlis:
EPF: Evil Packet Filter. USENIX ATC 2023: 735-751 - [c35]Neophytos Christou, Di Jin, Vaggelis Atlidakis, Baishakhi Ray, Vasileios P. Kemerlis:
IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks. USENIX Security Symposium 2023: 2383-2400 - [i6]Alexander J. Gaidis, Joao Moreira, Ke Sun, Alyssa Milburn, Vaggelis Atlidakis, Vasileios P. Kemerlis:
FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking. CoRR abs/2303.16353 (2023) - 2022
- [i5]Meghna Pancholi, Andreas D. Kellas, Vasileios P. Kemerlis, Simha Sethumadhavan:
Timeloops: System Call Policy Learning for Containerized Microservices. CoRR abs/2204.06131 (2022) - [i4]Neophytos Christou, Di Jin, Vaggelis Atlidakis, Baishakhi Ray, Vasileios P. Kemerlis:
IvySyn: Automated Vulnerability Discovery for Deep Learning Frameworks. CoRR abs/2209.14921 (2022) - 2021
- [c34]Nick Roessler, Lucas Atayde, Imani Palmer, Derrick Paul McKee, Jai Pandey, Vasileios P. Kemerlis, Mathias Payer, Adam Bates, Jonathan M. Smith, André DeHon, Nathan Dautenhahn:
μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts. RAID 2021: 296-311 - [c33]Mohamed Tarek Ibn Ziad, Miguel A. Arroyo, Evgeny Manzhosov, Vasileios P. Kemerlis, Simha Sethumadhavan:
EPI: Efficient Pointer Integrity For Securing Embedded Systems. SEED 2021: 163-175 - 2020
- [c32]David Williams-King, Hidenori Kobayashi, Kent Williams-King, Graham Patterson, Frank Spano, Yu Jian Wu, Junfeng Yang, Vasileios P. Kemerlis:
Egalito: Layout-Agnostic Binary Recompilation. ASPLOS 2020: 133-147 - [c31]Nicholas DeMarinis, Kent Williams-King, Di Jin, Rodrigo Fonseca, Vasileios P. Kemerlis:
sysfilter: Automated System Call Filtering for Commodity Software. RAID 2020: 459-474 - [c30]Sergej Proskurin, Marius Momeu, Seyedhamed Ghavamnia, Vasileios P. Kemerlis, Michalis Polychronakis:
xMP: Selective Memory Protection for Kernel and User Space. SP 2020: 563-577
2010 – 2019
- 2019
- [j4]Marios Pomonis, Theofilos Petsios, Angelos D. Keromytis, Michalis Polychronakis, Vasileios P. Kemerlis:
Kernel Protection Against Just-In-Time Code Reuse. ACM Trans. Priv. Secur. 22(1): 5:1-5:28 (2019) - [c29]Ioannis Agadakos, Di Jin, David Williams-King, Vasileios P. Kemerlis, Georgios Portokalidis:
Nibbler: debloating binary shared libraries. ACSAC 2019: 70-83 - [c28]Nicholas DeMarinis, Stefanie Tellex, Vasileios P. Kemerlis, George Dimitri Konidaris, Rodrigo Fonseca:
Scanning the Internet for ROS: A View of Security in Robotics Research. ICRA 2019: 8514-8521 - [i3]Mohamed Tarek Ibn Ziad, Miguel A. Arroyo, Evgeny Manzhosov, Vasileios P. Kemerlis, Simha Sethumadhavan:
PAIRS: Control Flow Protection using Phantom Addressed Instructions. CoRR abs/1911.02038 (2019) - 2018
- [c27]Hyungjoon Koo, Yaohui Chen, Long Lu, Vasileios P. Kemerlis, Michalis Polychronakis:
Compiler-Assisted Code Randomization. IEEE Symposium on Security and Privacy 2018: 461-477 - [i2]Nicholas DeMarinis, Stefanie Tellex, Vasileios P. Kemerlis, George Dimitri Konidaris, Rodrigo Fonseca:
Scanning the Internet for ROS: A View of Security in Robotics Research. CoRR abs/1808.03322 (2018) - 2017
- [c26]Marios Pomonis, Theofilos Petsios, Angelos D. Keromytis, Michalis Polychronakis, Vasileios P. Kemerlis:
kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse. EuroSys 2017: 420-436 - [c25]Kanad Sinha, Vasileios P. Kemerlis, Simha Sethumadhavan:
Reviving instruction set randomization. HOST 2017: 21-28 - 2016
- [c24]Pawel Sarbinowski, Vasileios P. Kemerlis, Cristiano Giuffrida, Elias Athanasopoulos:
VTPin: practical VTable hijacking protection for binaries. ACSAC 2016: 448-459 - [c23]Elias Athanasopoulos, Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis:
NaClDroid: Native Code Isolation for Android Applications. ESORICS (1) 2016: 422-439 - [c22]Weidong Cui, Marcus Peinado, Sang Kil Cha, Yanick Fratantonio, Vasileios P. Kemerlis:
RETracer: triaging crashes by reverse execution from partial memory dumps. ICSE 2016: 820-831 - [c21]David Williams-King, Graham Gobieski, Kent Williams-King, James P. Blake, Xinhao Yuan, Patrick Colp, Michelle Zheng, Vasileios P. Kemerlis, Junfeng Yang, William Aiello:
Shuffler: Fast and Deployable Continuous Code Re-Randomization. OSDI 2016: 367-382 - 2015
- [b1]Vasileios P. Kemerlis:
Protecting Commodity Operating Systems through Strong Kernel Isolation. Columbia University, USA, 2015 - [c20]Theofilos Petsios, Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis:
DynaGuard: Armoring Canary-based Protections against Brute-force Attacks. ACSAC 2015: 351-360 - [c19]Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis:
The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications. CCS 2015: 1406-1418 - [c18]Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang:
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting. NDSS 2015 - [i1]Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis:
The Spy in the Sandbox - Practical Cache Attacks in Javascript. CoRR abs/1502.07373 (2015) - 2014
- [c17]Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis:
ret2dir: Rethinking Kernel Isolation. USENIX Security Symposium 2014: 957-972 - 2013
- [c16]Kangkook Jee, Vasileios P. Kemerlis, Angelos D. Keromytis, Georgios Portokalidis:
ShadowReplica: efficient parallelization of dynamic data flow tracking. CCS 2013: 235-246 - [c15]Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas, Angelos D. Keromytis:
CellFlood: Attacking Tor Onion Routers on the Cheap. ESORICS 2013: 664-681 - [c14]Angeliki Zavou, Vasilis Pappas, Vasileios P. Kemerlis, Michalis Polychronakis, Georgios Portokalidis, Angelos D. Keromytis:
Cloudopsy: An Autopsy of Data Flows in the Cloud. HCI (27) 2013: 366-375 - [c13]Vasilis Pappas, Vasileios P. Kemerlis, Angeliki Zavou, Michalis Polychronakis, Angelos D. Keromytis:
CloudFence: Data Flow Tracking as a Cloud Service. RAID 2013: 411-431 - 2012
- [j3]Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo:
A system for generating and injecting indistinguishable network decoys. J. Comput. Secur. 20(2-3): 199-221 (2012) - [j2]Vasileios P. Kemerlis, Georgios Portokalidis, Elias Athanasopoulos, Angelos D. Keromytis:
kGuard: Lightweight Kernel Protection. login Usenix Mag. 37(6) (2012) - [c12]Elias Athanasopoulos, Vasileios P. Kemerlis, Michalis Polychronakis, Evangelos P. Markatos:
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches. ACNS 2012: 400-417 - [c11]Dimitris Geneiatakis, Georgios Portokalidis, Vasileios P. Kemerlis, Angelos D. Keromytis:
Adaptive defenses for commodity software through virtual application partitioning. CCS 2012: 133-144 - [c10]Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August, Angelos D. Keromytis:
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware. NDSS 2012 - [c9]Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis:
kGuard: Lightweight Kernel Protection against Return-to-User Attacks. USENIX Security Symposium 2012: 459-474 - [c8]Vasileios P. Kemerlis, Georgios Portokalidis, Kangkook Jee, Angelos D. Keromytis:
libdft: practical dynamic data flow tracking for commodity systems. VEE 2012: 121-132 - 2011
- [j1]Pantelis A. Frangoudis, George C. Polyzos, Vasileios P. Kemerlis:
Wireless community networks: an alternative approach for nomadic broadband network access. IEEE Commun. Mag. 49(5): 206-213 (2011) - 2010
- [c7]Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo:
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. RAID 2010: 118-137 - [c6]Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo:
Automating the injection of believable decoys to detect snooping. WISEC 2010: 81-86
2000 – 2009
- 2009
- [c5]Konstantinos V. Katsaros, Vasileios P. Kemerlis, Charilaos Stais, George Xylomenos:
A BitTorrent module for the OMNeT++ simulator. MASCOTS 2009: 1-10 - 2007
- [c4]Eugenia G. Giannopoulou, Vasileios P. Kemerlis, Michalis Polemis, Joseph Papaparaskevas, Alkiviadis C. Vatopoulos, Michalis Vazirgiannis:
A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance. CBMS 2007: 439-444 - [c3]Pantelis A. Frangoudis, Vasileios P. Kemerlis, Dimitrios C. Paraskevaidis, Elias C. Efstathiou, George C. Polyzos:
Experimental evaluation of community-based WLAN voice and data services. MobiMedia 2007: 16 - [c2]Aris Kosmopoulos, Ifigeneia Karamichali, Vasileios P. Kemerlis, George C. Polyzos:
Fueling Game Development in Mobile P2P Environments. PIMRC 2007: 1-5 - 2006
- [c1]Elias C. Efstathiou, Fotios A. Elianos, Pantelis A. Frangoudis, Vasileios P. Kemerlis, Dimitrios C. Paraskevaidis, Eleftherios C. Stefanis, George C. Polyzos:
Public infrastructures for internet access in metropolitan areas. AccessNets 2006: 19
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 00:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint