Dimitris Mitropoulos

Orcid: 0000-0002-5061-9018

According to our database1, Dimitris Mitropoulos authored at least 57 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Artifact for "Bloat beneath Python's Scales: A Fine-Grained Inter-Project Dependency Analysis".
Dataset, April, 2024

Bloat beneath Python's Scales: A Fine-Grained Inter-Project Dependency Analysis.
Proc. ACM Softw. Eng., 2024

When Your Infrastructure Is a Buggy Program: Understanding Faults in Infrastructure as Code Ecosystems.
Proc. ACM Program. Lang., 2024

Charting The Evolution of Solidity Error Handling.
CoRR, 2024

Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

nvshare: Practical GPU Sharing without Memory Size Constraints.
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024

Broken Agreement: The Evolution of Solidity Error Handling.
Proceedings of the 18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2024

2023
Smart Contract and DeFi Security: Insights from Tool Evaluations and Practitioner Surveys.
CoRR, 2023

Syntax-Aware Mutation for Testing the Solidity Compiler.
Proceedings of the Computer Security - ESORICS 2023, 2023

Providing Security Assurance & Hardening for Open Source Software/Hardware: The SecOPERA approach.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

2022
Finding typing compiler bugs.
Proceedings of the PLDI '22: 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation, San Diego, CA, USA, June 13, 2022

2021
Artifact: Well-Typed Programs Can Go Wrong: A Study of Typing-Related Bugs in JVM Compilers.
Dataset, September, 2021

Well-typed programs can go wrong: a study of typing-related bugs in JVM compilers.
Proc. ACM Program. Lang., 2021

CrossVul: a cross-language vulnerability dataset with commit data.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Replication Package for Article: Data-Oriented Differential Testing of Object-Relational Mapping Systems.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2021

Data-Oriented Differential Testing of Object-Relational Mapping Systems.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

A Replication Package for PyCG: Practical Call Graph Generation in Python.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2021

PyCG: Practical Call Graph Generation in Python.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

2020
A model for detecting faults in build specifications.
Proc. ACM Program. Lang., 2020

PDGuard: an architecture for the control and secure processing of personal data.
Int. J. Inf. Sec., 2020

Identifying Bugs in Make and JVM-Oriented Builds.
CoRR, 2020

Practical fault detection in puppet programs.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
All Your Script Are Belong to Us: Collecting and Analyzing JavaScript Code from 10K Sites for 9 Months.
Dataset, March, 2019

Defending Against Web Application Attacks: Approaches, Challenges and Implications.
IEEE Trans. Dependable Secur. Comput., 2019

Detecting Missing Dependencies and Notifiers in Puppet Programs.
CoRR, 2019

Time present and time past: analyzing the evolution of JavaScript code in the wild.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

Pythia: Identifying Dangerous Data-flows in Django-based Applications.
Proceedings of the 12th European Workshop on Systems Security, 2019

Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Aspects of the History of Computing in Modern Greece.
IEEE Ann. Hist. Comput., 2018

VulinOSS: a dataset of security vulnerabilities in open-source systems.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

2017
Fatal injection: a survey of modern code injection attack countermeasures.
PeerJ Comput. Sci., 2017

How 1 million app calls can tell you a bit about malware.
XRDS, 2017

Tug-of-War: Observations on Unified Content Handling.
CoRR, 2017

2016
POSIX Has Become Outdated.
login Usenix Mag., 2016

How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints.
ACM Trans. Priv. Secur., 2016

POSIX abstractions in modern operating systems: the old, the new, and the missing.
Proceedings of the Eleventh European Conference on Computer Systems, 2016

2015
Charting the API minefield using software telemetry data.
Empir. Softw. Eng., 2015

On the evolution of security bugs.
XRDS, 2015

A type-safe embedding of SQL into Java using the extensible compiler framework J%.
Comput. Lang. Syst. Struct., 2015

Generating the Blueprints of the Java Ecosystem.
Proceedings of the 12th IEEE/ACM Working Conference on Mining Software Repositories, 2015

2014
Τεχνολογίες ανάπτυξης ασφαλούς λογισμικού
PhD thesis, 2014

TRACER: A Platform for Securing Legacy Code.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Securing Legacy Code with the TRACER Platform.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

The bug catalog of the maven ecosystem.
Proceedings of the 11th Working Conference on Mining Software Repositories, 2014

The Vulnerability Dataset of a Large Software Ecosystem.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

2013
Security bugs in large software ecosystems.
XRDS, 2013

Data security in the cloud environment.
XRDS, 2013

Dismal Code: Studying the Evolution of Security Bugs.
Proceedings of the 2013 Workshop on Learning from Authoritative Security Experiment Results, 2013

Improving the quality of APIs through the analysis of software crash reports.
Proceedings of the 2013 Imperial College Computing Student Workshop, 2013

2012
Blogs.
XRDS, 2012

Better safe than sorry: backup your backups.
XRDS, 2012

Blogs.
XRDS, 2012

Measuring the Occurrence of Security-Related Bugs through Software Evolution.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

2011
Countering Code Injection Attacks: A Unified Approach.
Inf. Manag. Comput. Secur., 2011

2010
Cyberdiversity: Measures and Initial Results.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010

2009
SDriver: Location-specific signatures prevent SQL injection attacks.
Comput. Secur., 2009

Fortifying Applications Against Xpath Injection Attacks.
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009


  Loading...