Obserwuj
Vasileios P. Kemerlis
Vasileios P. Kemerlis
Assistant Professor, Brown University
Zweryfikowany adres z cs.brown.edu - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Methods, systems, and media for detecting covert malware
BM Bowen, PV Prabhu, VP Kemerlis, S Sidiroglou, SJ Stolfo, ...
US Patent 8,528,091, 2013
4092013
Methods, systems, and media for baiting inside attackers
SJ Stolfo, AD Keromytis, BM Bowen, S Hershkop, VP Kemerlis, ...
US Patent 9,009,829, 2015
3552015
The spy in the sandbox: Practical cache attacks in javascript and their implications
Y Oren, VP Kemerlis, S Sethumadhavan, AD Keromytis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2842015
libdft: Practical dynamic data flow tracking for commodity systems
VP Kemerlis, G Portokalidis, K Jee, AD Keromytis
Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012
2602012
Shuffler: Fast and Deployable Continuous Code {Re-Randomization}
D Williams-King, G Gobieski, K Williams-King, JP Blake, X Yuan, P Colp, ...
12th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2016
1442016
{kGuard}: Lightweight Kernel Protection against {Return-to-User} Attacks
VP Kemerlis, G Portokalidis, AD Keromytis
21st USENIX Security Symposium (USENIX Security 12), 459-474, 2012
1352012
ret2dir: Rethinking kernel isolation
VP Kemerlis, M Polychronakis, AD Keromytis
23rd USENIX Security Symposium (USENIX Security 14), 957-972, 2014
1302014
Wireless community networks: an alternative approach for nomadic broadband network access
PA Frangoudis, GC Polyzos, VP Kemerlis
IEEE Communications Magazine 49 (5), 206-213, 2011
1012011
Checking more and alerting less: detecting privacy leakages via enhanced data-flow analysis and peer voting.
K Lu, Z Li, VP Kemerlis, Z Wu, L Lu, C Zheng, Z Qian, W Lee, G Jiang
NDSS, 2015
902015
ShadowReplica: efficient parallelization of dynamic data flow tracking
K Jee, VP Kemerlis, AD Keromytis, G Portokalidis
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
802013
Scanning the internet for ros: A view of security in robotics research
N DeMarinis, S Tellex, VP Kemerlis, G Konidaris, R Fonseca
2019 International Conference on Robotics and Automation (ICRA), 8514-8521, 2019
742019
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.
K Jee, G Portokalidis, VP Kemerlis, S Ghosh, DI August, AD Keromytis
NDSS, 2012
742012
Retracer: Triaging crashes by reverse execution from partial memory dumps
W Cui, M Peinado, SK Cha, Y Fratantonio, VP Kemerlis
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE …, 2016
702016
kR^ X: Comprehensive kernel protection against just-in-time code reuse
M Pomonis, T Petsios, AD Keromytis, M Polychronakis, VP Kemerlis
Proceedings of the Twelfth European Conference on Computer Systems, 420-436, 2017
672017
Egalito: Layout-agnostic binary recompilation
D Williams-King, H Kobayashi, K Williams-King, G Patterson, F Spano, ...
Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020
622020
CloudFence: Data flow tracking as a cloud service
V Pappas, VP Kemerlis, A Zavou, M Polychronakis, AD Keromytis
International Workshop on Recent Advances in Intrusion Detection, 411-431, 2013
612013
Compiler-assisted code randomization
H Koo, Y Chen, L Lu, VP Kemerlis, M Polychronakis
2018 IEEE Symposium on Security and Privacy (SP), 461-477, 2018
592018
Automating the injection of believable decoys to detect snooping
BM Bowen, VP Kemerlis, P Prabhu, AD Keromytis, SJ Stolfo
Proceedings of the third ACM conference on Wireless network security, 81-86, 2010
502010
A BitTorrent module for the OMNeT++ simulator
K Katsaros, VP Kemerlis, C Stais, G Xylomenos
Modeling, Analysis & Simulation of Computer and Telecommunication Systems …, 2009
502009
Botswindler: Tamper resistant injection of believable decoys in vm-based hosts for crimeware detection
BM Bowen, P Prabhu, VP Kemerlis, S Sidiroglou, AD Keromytis, SJ Stolfo
International Workshop on Recent Advances in Intrusion Detection, 118-137, 2010
472010
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20