What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Vasileios P. Kemerlis
Google Scholar
ORCID:
0000-0002-6528-437X
26
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
IUBIK: Isolating User Bytes in Commodity Operating System Kernels via Memory Tagging Extensions.
Marius Momeu
Alexander J. Gaidis
Jasper v. d. Heidt
Vasileios P. Kemerlis
2024
conf/ccs
Safeslab: Mitigating Use-After-Free Vulnerabilities via Memory Protection Keys.
Marius Momeu
Simon Schnückel
Kai Angnis
Michalis Polychronakis
Vasileios P. Kemerlis
2024
conf/ccs
Eclipse: Preventing Speculative Memory-error Abuse with Artificial Data Dependencies.
Neophytos Christou
Alexander J. Gaidis
Vaggelis Atlidakis
Vasileios P. Kemerlis
2024
conf/uss
BeeBox: Hardening BPF against Transient Execution Attacks.
Di Jin
Alexander J. Gaidis
Vasileios P. Kemerlis
2024
conf/asiaccs
ISLAB: Immutable Memory Management Metadata for Commodity Operating System Kernels.
Marius Momeu
Fabian Kilger
Christopher Roemheld
Simon Schnückel
Sergej Proskurin
Michalis Polychronakis
Vasileios P. Kemerlis
2024
conf/ndss
QUACK: Hindering Deserialization Attacks via Static Duck Typing.
Yaniv David
Neophytos Christou
Andreas D. Kellas
Vasileios P. Kemerlis
Junfeng Yang
2023
conf/ccs
SysXCHG: Refining Privilege with Adaptive System Call Filters.
Alexander J. Gaidis
Vaggelis Atlidakis
Vasileios P. Kemerlis
2023
conf/uss
IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks.
Neophytos Christou
Di Jin
Vaggelis Atlidakis
Baishakhi Ray
Vasileios P. Kemerlis
2023
conf/asiaccs
BinWrap: Hybrid Protection against Native Node.js Add-ons.
George Christou
Grigoris Ntousakis
Eric Lahtinen
Sotiris Ioannidis
Vasileios P. Kemerlis
Nikos Vasilakis
2020
conf/sp
xMP: Selective Memory Protection for Kernel and User Space.
Sergej Proskurin
Marius Momeu
Seyedhamed Ghavamnia
Vasileios P. Kemerlis
Michalis Polychronakis
2019
conf/acsac
Nibbler: debloating binary shared libraries.
Ioannis Agadakos
Di Jin
David Williams-King
Vasileios P. Kemerlis
Georgios Portokalidis
2018
conf/sp
Compiler-Assisted Code Randomization.
Hyungjoon Koo
Yaohui Chen
Long Lu
Vasileios P. Kemerlis
Michalis Polychronakis
2017
conf/host
Reviving instruction set randomization.
Kanad Sinha
Vasileios P. Kemerlis
Simha Sethumadhavan
2016
conf/esorics
NaClDroid: Native Code Isolation for Android Applications.
Elias Athanasopoulos
Vasileios P. Kemerlis
Georgios Portokalidis
Angelos D. Keromytis
2016
conf/acsac
VTPin: practical VTable hijacking protection for binaries.
Pawel Sarbinowski
Vasileios P. Kemerlis
Cristiano Giuffrida
Elias Athanasopoulos
2015
conf/ccs
The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications.
Yossef Oren
Vasileios P. Kemerlis
Simha Sethumadhavan
Angelos D. Keromytis
2015
conf/ndss
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Kangjie Lu
Zhichun Li
Vasileios P. Kemerlis
Zhenyu Wu
Long Lu
Cong Zheng
Zhiyun Qian
Wenke Lee
Guofei Jiang
2015
conf/acsac
DynaGuard: Armoring Canary-based Protections against Brute-force Attacks.
Theofilos Petsios
Vasileios P. Kemerlis
Michalis Polychronakis
Angelos D. Keromytis
2014
conf/uss
ret2dir: Rethinking Kernel Isolation.
Vasileios P. Kemerlis
Michalis Polychronakis
Angelos D. Keromytis
2013
conf/ccs
ShadowReplica: efficient parallelization of dynamic data flow tracking.
Kangkook Jee
Vasileios P. Kemerlis
Angelos D. Keromytis
Georgios Portokalidis
2013
conf/esorics
CellFlood: Attacking Tor Onion Routers on the Cheap.
Marco Valerio Barbera
Vasileios P. Kemerlis
Vasilis Pappas
Angelos D. Keromytis
2012
conf/ccs
Adaptive defenses for commodity software through virtual application partitioning.
Dimitris Geneiatakis
Georgios Portokalidis
Vasileios P. Kemerlis
Angelos D. Keromytis
2012
conf/uss
kGuard: Lightweight Kernel Protection against Return-to-User Attacks.
Vasileios P. Kemerlis
Georgios Portokalidis
Angelos D. Keromytis
2012
conf/acns
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches.
Elias Athanasopoulos
Vasileios P. Kemerlis
Michalis Polychronakis
Evangelos P. Markatos
2012
conf/ndss
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.
Kangkook Jee
Georgios Portokalidis
Vasileios P. Kemerlis
Soumyadeep Ghosh
David I. August
Angelos D. Keromytis
2010
conf/wisec
Automating the injection of believable decoys to detect snooping.
Brian M. Bowen
Vasileios P. Kemerlis
Pratap V. Prabhu
Angelos D. Keromytis
Salvatore J. Stolfo
Coauthors
Alexander J. Gaidis
(4)
Andreas D. Kellas
(1)
Angelos D. Keromytis
(10)
Baishakhi Ray
(1)
Brian M. Bowen
(1)
Christopher Roemheld
(1)
Cong Zheng
(1)
Cristiano Giuffrida
(1)
David I. August
(1)
David Williams-King
(1)
Di Jin
(3)
Dimitris Geneiatakis
(1)
Elias Athanasopoulos
(3)
Eric Lahtinen
(1)
Evangelos P. Markatos
(1)
Fabian Kilger
(1)
George Christou
(1)
Georgios Portokalidis
(6)
Grigoris Ntousakis
(1)
Guofei Jiang
(1)
Hyungjoon Koo
(1)
Ioannis Agadakos
(1)
Jasper v. d. Heidt
(1)
Junfeng Yang
(1)
Kai Angnis
(1)
Kanad Sinha
(1)
Kangjie Lu
(1)
Kangkook Jee
(2)
Long Lu
(2)
Marco Valerio Barbera
(1)
Marius Momeu
(4)
Michalis Polychronakis
(7)
Neophytos Christou
(3)
Nikos Vasilakis
(1)
Pawel Sarbinowski
(1)
Pratap V. Prabhu
(1)
Salvatore J. Stolfo
(1)
Sergej Proskurin
(2)
Seyedhamed Ghavamnia
(1)
Simha Sethumadhavan
(2)
Simon Schnückel
(2)
Sotiris Ioannidis
(1)
Soumyadeep Ghosh
(1)
Theofilos Petsios
(1)
Vaggelis Atlidakis
(3)
Vasileios P. Kemerlis
(26)
Vasilis Pappas
(1)
Wenke Lee
(1)
Yaniv David
(1)
Yaohui Chen
(1)
Yossef Oren
(1)
Zhenyu Wu
(1)
Zhichun Li
(1)
Zhiyun Qian
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to