Follow
Angelos D. Keromytis
Title
Cited by
Cited by
Year
Implementing a distributed firewall
S Ioannidis, AD Keromytis, SM Bellovin, JM Smith
Proceedings of the 7th ACM conference on Computer and communications …, 2000
10072000
Countering code-injection attacks with instruction-set randomization
GS Kc, AD Keromytis, V Prevelakis
Proceedings of the 10th ACM conference on Computer and communications …, 2003
9942003
KeyNote: Trust management for public-key infrastructures
M Blaze, J Feigenbaum, A Keromytis
Security Protocols, 59-63, 1999
975*1999
The KeyNote trust-management system, version 2
M Blaze, J Feigenbaum, J Ioannidis, AD Keromytis
Request for Comments (RFC) 2704, 1999
907*1999
The role of trust management in distributed systems security
M Blaze, J Feigenbaum, J Ioannidis, A Keromytis
Secure Internet Programming, 185-210, 1999
891*1999
SOS: Secure Overlay Services
AD Keromytis, V Misra, D Rubenstein
ACM SIGCOMM Computer Communication Review 32 (4), 61-72, 2002
7942002
SQLrand: Preventing SQL injection attacks
S Boyd, A Keromytis
Applied Cryptography and Network Security, 292-302, 2004
6862004
Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
V Pappas, M Polychronakis, AD Keromytis
2012 IEEE Symposium on Security and Privacy, 601-615, 2012
5002012
Methods, systems, and media for detecting covert malware
BM Bowen, PV Prabhu, VP Kemerlis, S Sidiroglou, SJ Stolfo, ...
US Patent 8,528,091, 2013
4862013
The SwitchWare active network architecture
DS Alexander, WA Arbaugh, MW Hicks, P Kakkar, AD Keromytis, ...
Network, IEEE 12 (3), 29-36, 1998
4861998
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing
V Pappas, M Polychronakis, AD Keromytis
USENIX Security, 447-462, 2013
4732013
Methods, systems, and media for baiting inside attackers
SJ Stolfo, AD Keromytis, BM Bowen, S Hershkop, VP Kemerlis, ...
US Patent 9,009,829, 2015
4422015
Systems and methods for detecting and inhibiting attacks using honeypots
S Sidiroglou, AD Keromytis, KG Anagnostakis
US Patent 7,904,959, 2011
4282011
Systems, methods, and media for detecting network anomalies using a trained probabilistic model
Y Song, AD Keromytis, SJ Stolfo
US Patent 8,844,033, 2014
3922014
Fog computing: Mitigating insider data theft attacks in the cloud
SJ Stolfo, MB Salem, AD Keromytis
2012 IEEE symposium on security and privacy workshops, 125-128, 2012
3812012
Secure and Reliable Bootstrap Architecture
W Arbaugh, D Farber, A Keromytis, S Jonathan
US Patent 6,185,678, 2001
3812001
The spy in the sandbox: Practical cache attacks in javascript and their implications
Y Oren, VP Kemerlis, S Sethumadhavan, AD Keromytis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
3752015
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
SJ Stolfo, T Malkin, AD Keromytis, V Misra, M Locasto, J Parekh
US Patent 7,779,463, 2010
3642010
Detecting targeted attacks using shadow honeypots
KG Anagnostakis, S Sidiroglou, P Akritidis, K Xinidis, E Markatos, ...
Proceedings of the 14th USENIX security symposium 144, 2005
3352005
Blind seer: A scalable private DBMS
V Pappas, F Krell, B Vo, V Kolesnikov, T Malkin, SG Choi, W George, ...
2014 IEEE Symposium on Security and Privacy, 359-374, 2014
3272014
The system can't perform the operation now. Try again later.
Articles 1–20