The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Angelos D. Keromytis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael E. Locasto, Angelos D. Keromytis
    CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:1-15 [Conf]
  2. Stephen W. Boyd, Angelos D. Keromytis
    SQLrand: Preventing SQL Injection Attacks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:292-302 [Conf]
  3. Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
    A Pay-per-Use DoS Protection Mechanism for the Web. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:120-134 [Conf]
  4. Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis
    W3Bcrypt: Encryption as a Stylesheet. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:349-364 [Conf]
  5. Gaurav S. Kc, Angelos D. Keromytis
    e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:286-302 [Conf]
  6. Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov
    Highlights from the 2005 New Security Paradigms Workshop. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:393-396 [Conf]
  7. Angelos D. Keromytis
    Tagging Data in the Network Stack: mbuf_tags. [Citation Graph (0, 0)][DBLP]
    BSDCon, 2003, pp:125-132 [Conf]
  8. Theodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung
    The dual receiver cryptosystem and its applications. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:330-343 [Conf]
  9. William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis
    Efficient, DoS-resistant, secure key exchange for internet protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:48-58 [Conf]
  10. John Ioannidis, Angelos D. Keromytis
    Network security and IPsec (tutorial). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:- [Conf]
  11. Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith
    Implementing a distributed firewall. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:190-199 [Conf]
  12. Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis
    Countering code-injection attacks with instruction-set randomization. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:272-280 [Conf]
  13. William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
    Using graphic turing tests to counter automated DDoS attacks against web servers. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:8-19 [Conf]
  14. Angelos Stavrou, Angelos D. Keromytis
    Countering DoS attacks with stateless multipath overlays. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:249-259 [Conf]
  15. Debra L. Cook, Angelos D. Keromytis, Moti Yung
    Elastic block ciphers: the basic design. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:350-352 [Conf]
  16. Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck
    CryptoGraphics: Secret Key Cryptography Using Graphics Cards. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:334-350 [Conf]
  17. Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith
    A Secure PLAN. [Citation Graph (0, 0)][DBLP]
    DANCE, 2002, pp:224-237 [Conf]
  18. Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith
    The STRONGMAN Architecture. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:178-188 [Conf]
  19. D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith
    Security in Active Networks. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:433-451 [Conf]
  20. Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
    The Role of Trust Management in Distributed Systems Security. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:185-210 [Conf]
  21. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Offline Micropayments without Trusted Hardware. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:21-40 [Conf]
  22. John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Vassilis Prevelakis
    Fileteller: Paying and Getting Paid for File Storage. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:282-299 [Conf]
  23. Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis
    Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:363-375 [Conf]
  24. Rakan El-Khalil, Angelos D. Keromytis
    Hydan: Hiding Information in Program Binaries. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:187-199 [Conf]
  25. Matt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis
    TAPI: Transactions for Accessing Public Infrastructure. [Citation Graph (0, 0)][DBLP]
    PWC, 2003, pp:90-100 [Conf]
  26. Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos D. Keromytis
    The effect of DNS delays on worm propagation in an IPv6 Internet. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:2405-2414 [Conf]
  27. David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis
    The Bandwidth Exchange Architecture. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:939-944 [Conf]
  28. Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo
    An Email Worm Vaccine Architecture. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:97-108 [Conf]
  29. Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis
    gore: Routing-Assisted Defense Against DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:179-193 [Conf]
  30. Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald
    Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:427-442 [Conf]
  31. Matthew Burnside, Angelos D. Keromytis
    Low Latency Anonymity with Mix Rings. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:32-45 [Conf]
  32. Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis
    A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:1-15 [Conf]
  33. Debra L. Cook, Angelos D. Keromytis
    Conversion and Proxy Functions for Symmetric Key Ciphers. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:662-667 [Conf]
  34. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Experience with the KeyNote Trust Management System: Applications and Future Directions. [Citation Graph (0, 0)][DBLP]
    iTrust, 2003, pp:284-300 [Conf]
  35. Kostas G. Anagnostakis, Michael W. Hicks, Sotiris Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
    Scalable Resource Control in Active Networks. [Citation Graph (0, 0)][DBLP]
    IWAN, 2000, pp:343-357 [Conf]
  36. Michael W. Hicks, Angelos D. Keromytis
    A Secure Plan. [Citation Graph (0, 0)][DBLP]
    IWAN, 1999, pp:307-314 [Conf]
  37. Mark C. Benvenuto, Angelos D. Keromytis
    EasyVPN: IPsec Remote Access Made Easy. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:87-94 [Conf]
  38. William A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith
    Automated Recovery in a Secure Bootstrap Process. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  39. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Trust Management for IPsec. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  40. Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis
    Software Self-Healing Using Collaborative Application Communities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  41. Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, Dan Rubenstein
    MOVE: An End-to-End Solution to Network Denial of Service. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  42. Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo
    FLIPS: Hybrid Adaptive Intrusion Prevention. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:82-101 [Conf]
  43. Aleksey Kurchuk, Angelos D. Keromytis
    Recursive Sandboxes: Extending Systrace To Empower Applications. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:473-488 [Conf]
  44. Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
    SOS: secure overlay services. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2002, pp:61-72 [Conf]
  45. Stelios Sidiroglou, Oren Laadan, Angelos D. Keromytis, Jason Nieh
    Using Rescue Points to Navigate Software Recovery. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:273-280 [Conf]
  46. William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
    Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:27-39 [Conf]
  47. Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
    KeyNote: Trust Management for Public-Key Infrastructures (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:59-63 [Conf]
  48. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Trust Management and Network Layer Security Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:103-118 [Conf]
  49. Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin
    WAR: Wireless Anonymous Routing. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:218-232 [Conf]
  50. Niklas Hallqvist, Angelos D. Keromytis
    Implementing Internet Key Exchange (IKE). [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2000, pp:201-214 [Conf]
  51. Angelos D. Keromytis, Jason L. Wright
    Transparent Network Security Policy Enforcement. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2000, pp:215-226 [Conf]
  52. Angelos D. Keromytis, Jason L. Wright, Theo de Raadt
    The Design of the {OpenBSD} Cryptographic Framework. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2003, pp:181-196 [Conf]
  53. Stefan Miltchev, Sotiris Ioannidis, Angelos D. Keromytis
    A Study of the Relative Costs of Network Security Protocols. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2002, pp:41-48 [Conf]
  54. Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
    Secure and Flexible Global File Sharing. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2003, pp:165-178 [Conf]
  55. Theo de Raadt, Niklas Hallqvist, Artur Grabowski, Angelos D. Keromytis, Niels Provos
    Cryptography in OpenBSD: An Overview. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 1999, pp:93-101 [Conf]
  56. Stelios Sidiroglou, Michael E. Locasto, Stephen W. Boyd, Angelos D. Keromytis
    Building a Reactive Immune System for Software Services. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2005, pp:149-161 [Conf]
  57. Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
    Design and Implementation of Virtual Private Services. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:269-274 [Conf]
  58. Alexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis
    WebDAVA: An Administrator-Free Approach To Web File-Sharing. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:59-64 [Conf]
  59. Stelios Sidiroglou, Angelos D. Keromytis
    A Network Worm Vaccine Architecture. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:220-225 [Conf]
  60. Angelos Stavrou, Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
    WebSOS: an overlay-based system for protecting web servers from denial of service attacks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:5, pp:781-807 [Journal]
  61. Angelos D. Keromytis
    "Patch on Demand" Saves Even More Time? [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:8, pp:94-96 [Journal]
  62. Stelios Sidiroglou, Angelos D. Keromytis
    Countering Network Worms Through Automatic Patch Generation. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:41-49 [Journal]
  63. Stelios Sidiroglou, Angelos D. Keromytis
    Execution transactions for defending against software failures: use and evaluation. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:2, pp:77-91 [Journal]
  64. Stelios Sidiroglou, Michael E. Locasto, Angelos D. Keromytis
    Hardware support for self-healing software services. [Citation Graph (0, 0)][DBLP]
    SIGARCH Computer Architecture News, 2005, v:33, n:1, pp:42-47 [Journal]
  65. Matthew Burnside, Angelos D. Keromytis
    The case for crypto protocol awareness inside the OS kernel. [Citation Graph (0, 0)][DBLP]
    SIGARCH Computer Architecture News, 2005, v:33, n:1, pp:58-64 [Journal]
  66. William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
    Just fast keying: Key agreement in a hostile internet. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:242-273 [Journal]
  67. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Trust management for IPsec. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:2, pp:95-118 [Journal]
  68. Angelos D. Keromytis, Jason L. Wright, Theo de Raadt, Matthew Burnside
    Cryptography as an operating system service: A case study. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2006, v:24, n:1, pp:1-38 [Journal]
  69. Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith
    A secure PLAN. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:413-426 [Journal]
  70. Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis
    A Study of Malcode-Bearing Documents. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:231-250 [Conf]
  71. Debra L. Cook, Moti Yung, Angelos D. Keromytis
    The Security of Elastic Block Ciphers Against Key-Recovery Attacks. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:89-103 [Conf]
  72. Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis
    Dark application communities. [Citation Graph (0, 0)][DBLP]
    NSPW, 2006, pp:11-18 [Conf]
  73. David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis
    The Bandwidth Exchange Architecture [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  74. Angelos D. Keromytis, Jonathan M. Smith
    Requirements for scalable access control and security management architectures. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Internet Techn., 2007, v:7, n:2, pp:- [Journal]

  75. Capturing Information Flow with Concatenated Dynamic Taint Analysis. [Citation Graph (, )][DBLP]


  76. Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. [Citation Graph (, )][DBLP]


  77. Pushback for Overlay Networks: Protecting Against Malicious Insiders. [Citation Graph (, )][DBLP]


  78. SSARES: Secure Searchable Automated Remote Email Storage. [Citation Graph (, )][DBLP]


  79. Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. [Citation Graph (, )][DBLP]


  80. A Network Access Control Mechanism Based on Behavior Profiles. [Citation Graph (, )][DBLP]


  81. ASSURE: automatic software self-healing using rescue points. [Citation Graph (, )][DBLP]


  82. On the infeasibility of modeling polymorphic shellcode. [Citation Graph (, )][DBLP]


  83. Asynchronous policy evaluation and enforcement. [Citation Graph (, )][DBLP]


  84. Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. [Citation Graph (, )][DBLP]


  85. Bridging the Network Reservation Gap Using Overlays. [Citation Graph (, )][DBLP]


  86. Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. [Citation Graph (, )][DBLP]


  87. A Survey of Voice over IP Security Research. [Citation Graph (, )][DBLP]


  88. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. [Citation Graph (, )][DBLP]


  89. DoubleCheck: Multi-path verification against man-in-the-middle attacks. [Citation Graph (, )][DBLP]


  90. Behavior-Based Network Access Control: A Proof-of-Concept. [Citation Graph (, )][DBLP]


  91. Path-Based Access Control for Enterprise Networks. [Citation Graph (, )][DBLP]


  92. F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services. [Citation Graph (, )][DBLP]


  93. Adding Trust to P2P Distribution of Paid Content. [Citation Graph (, )][DBLP]


  94. A2M: Access-Assured Mobile Desktop Computing. [Citation Graph (, )][DBLP]


  95. Return Value Predictability Profiles for Self-healing. [Citation Graph (, )][DBLP]


  96. Online Network Forensics for Automatic Repair Validation. [Citation Graph (, )][DBLP]


  97. Authentication on Untrusted Remote Hosts with Public-Key Sudo. [Citation Graph (, )][DBLP]


  98. Taming the Devil: Techniques for Evaluating Anonymized Network Data. [Citation Graph (, )][DBLP]


  99. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. [Citation Graph (, )][DBLP]


  100. An Analysis of Rogue AV Campaigns. [Citation Graph (, )][DBLP]


  101. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. [Citation Graph (, )][DBLP]


  102. Casting out Demons: Sanitizing Training Data for Anomaly Sensors. [Citation Graph (, )][DBLP]


  103. From STEM to SEAD: Speculative Execution for Automated Defense. [Citation Graph (, )][DBLP]


  104. Automating the injection of believable decoys to detect snooping. [Citation Graph (, )][DBLP]


  105. Dynamic Trust Management. [Citation Graph (, )][DBLP]


  106. Decentralized access control in distributed file systems. [Citation Graph (, )][DBLP]


Search in 0.067secs, Finished in 0.072secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002