Angelos D. Keromytis
Orcid: 0000-0003-3815-5932Affiliations:
- Columbia University, New York City, USA
According to our database1,
Angelos D. Keromytis
authored at least 243 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2017, "For contributions to the theory and practice of systems and network security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans.
CoRR, 2024
AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators.
Proceedings of the 32nd USENIX Security Symposium, 2023
Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2019
IEEE Trans. Dependable Secur. Comput., 2019
A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
Redirect2Own: Protecting the Intellectual Property of User-uploaded Content through Off-site Indirect Access.
CoRR, 2018
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018
2017
ACM Trans. Priv. Secur., 2017
HVLearn: Automated Black-Box Analysis of Hostname Verification in SSL/TLS Implementations.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Twelfth European Conference on Computer Systems, 2017
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
ACM Trans. Softw. Eng. Methodol., 2016
How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints.
ACM Trans. Priv. Secur., 2016
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
Proceedings of the Information Security Theory and Practice, 2016
The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
ACM Trans. Inf. Syst. Secur., 2015
Int. J. Inf. Sec., 2015
Comput. Commun., 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the Secure Cloud Computing, 2014
2013
Proceedings of the Moving Target Defense II, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables.
Proceedings of the 2013 IEEE International Conference on Software Maintenance, 2013
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the 14th Annual International Conference on Digital Government Research, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
J. Comput. Secur., 2012
IEEE Commun. Surv. Tutorials, 2012
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the Information Security and Privacy Research, 2012
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Voice over IP Security - A Comprehensive Survey of Vulnerabilities and Academic Research.
Springer Briefs in Computer Science 1, Springer, ISBN: 978-1-4419-9866-8, 2011
Proceedings of the Moving Target Defense, 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Int. J. Netw. Secur., 2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011
Proceedings of the Advances in Information and Computer Security, 2011
Proceedings of the Advances in Information and Computer Security, 2011
A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS.
Proceedings of the Information Systems Security - 7th International Conference, 2011
Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent.
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the First SysSec Workshop 2011, 2011
The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security.
Proceedings of the First SysSec Workshop 2011, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
Proceedings of the Advances in Computing and Communications, 2011
2010
RFC, January, 2010
Proceedings of the Insider Threats in Cyber Security, 2010
IEEE Trans. Dependable Secur. Comput., 2010
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems.
Mach. Learn., 2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation.
Proceedings of the Computer Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
IEICE Trans. Inf. Syst., 2009
Randomized Instruction Sets and Runtime Environments Past Research and Future Directions.
IEEE Secur. Priv., 2009
IEEE Secur. Priv., 2009
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009
Proceedings of the Information Systems Security, 5th International Conference, 2009
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs.
Proceedings of the Information Systems Security, 5th International Conference, 2009
Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the 22nd Large Installation System Administration Conference, 2008
Proceedings of the Advances in Information and Computer Security, 2008
Proceedings of the Advances in Information and Computer Security, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
Proceedings of the Malware Detection, 2007
ACM Trans. Internet Techn., 2007
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications.
Int. J. Netw. Secur., 2007
Int. J. Inf. Sec., 2007
Proceedings of the 2007 USENIX Annual Technical Conference, 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the Detection of Intrusions and Malware, 2007
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
ACM Trans. Comput. Syst., 2006
Int. J. Inf. Sec., 2006
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006
Proceedings of the New Security Paradigms Workshop 2006, 2006
Proceedings of the Network and Distributed System Security Symposium, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
Advances in Information Security 20, Springer, ISBN: 978-0-387-29015-7, 2006
2005
SIGARCH Comput. Archit. News, 2005
SIGARCH Comput. Archit. News, 2005
WebSOS: an overlay-based system for protecting web servers from denial of service attacks.
Comput. Networks, 2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Proceedings of the 2005 USENIX Annual Technical Conference, 2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
Proceedings of the New Security Paradigms Workshop 2005, 2005
Proceedings of the Network and Distributed System Security Symposium, 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware.
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Topics in Cryptology, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Proceedings of the Practical Handbook of Internet Computing., 2004
ACM Trans. Inf. Syst. Secur., 2004
Proceedings of the Security and Protection in Information Processing Systems, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap.
Proceedings of the Applied Cryptography and Network Security, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
RFC, July, 2003
Internet Res., 2003
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003
Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference, 2003
Proceedings of the General Track: 2003 USENIX Annual Technical Conference, 2003
Proceedings of the 17th Conference on Systems Administration (LISA 2003), 2003
Experience with the KeyNote Trust Management System: Applications and Future Directions.
Proceedings of the Trust Management, First International Conference, 2003
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Proceedings of BSDCon 2003, San Mateo, California, USA, September 8-12, 2003, 2003
2002
Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference, 2002
Proceedings of the ACM SIGCOMM 2002 Conference on Applications, 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
Proceedings of the Financial Cryptography, 2001
2000
RFC, March, 2000
Proceedings of the Freenix Track: 2000 USENIX Annual Technical Conference, 2000
Proceedings of the Freenix Track: 2000 USENIX Annual Technical Conference, 2000
Proceedings of the Active Networks, Second International Working Conference, 2000
1999
Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference, 1999
Proceedings of the Security Protocols, 1999
Proceedings of the Active Networks, First International Working Conference, 1999
Proceedings of the Secure Internet Programming, 1999
1998
IEEE Netw., 1998
Proceedings of the Security Protocols, 1998
Proceedings of the Network and Distributed System Security Symposium, 1998