Michalis Polychronakis
Orcid: 0000-0002-3106-0343
According to our database1,
Michalis Polychronakis
authored at least 113 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Comput. Secur., September, 2023
2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering.
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Domain name encryption is not enough: privacy leakage via IP-based website fingerprinting.
Proc. Priv. Enhancing Technol., 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, 2021
2020
DTRAP, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Confine: Automated System Call Policy Generation for Container Attack Surface Reduction.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Proceedings of the 9th USENIX Workshop on Free and Open Communications on the Internet, 2019
SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 12th European Workshop on Systems Security, 2019
Proceedings of the 12th European Workshop on Systems Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the Internet Measurement Conference 2018, 2018
Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Design and Implementation of a Stateful Network Packet Processing Framework for GPUs.
IEEE/ACM Trans. Netw., 2017
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Twelfth European Conference on Computer Systems, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
TopoMan: Global Network Visibility in the Presence of Middleboxes (A Graybox Approach).
CoRR, 2016
PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks.
Comput. Secur., 2016
Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Juggling the Gadgets: Binary-level Code Randomization using Instruction Displacement.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016
2015
Int. J. Inf. Sec., 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
IEEE J. Sel. Areas Commun., 2014
RAPID: Traffic-agnostic intrusion detection for resource-constrained wireless mesh networks.
Comput. Secur., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 USENIX Annual Technical Conference, 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014
Proceedings of the Seventh European Workshop on System Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the Secure Cloud Computing, 2014
2013
Proceedings of the Moving Target Defense II, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the 2013 Internet Measurement Conference, 2013
Proceedings of the 2013 Internet Measurement Conference, 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Int. J. Inf. Sec., 2012
Improving the performance of passive network monitoring applications with memory locality enhancements.
Comput. Commun., 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the 2012 USENIX Annual Technical Conference, 2012
Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches.
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011
SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms.
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the 2011 IEEE International Symposium on Workload Characterization, 2011
Proceedings of the Fourth European Workshop on System Security, 2011
Proceedings of the Seventh European Conference on Computer Network Defense, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the MASCOTS 2010, 2010
Improving the accuracy of network intrusion detection systems under load using selective packet discarding.
Proceedings of the Third European Workshop on System Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
PhD thesis, 2009
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Traffic Monitoring and Analysis, First International Workshop, 2009
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009
Proceedings of the Second European Workshop on System Security, 2009
2008
Proceedings of the 4th International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2008), 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008
Proceedings of the 22nd Large Installation System Administration Conference, 2008
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
Proceedings of the Grid Computing, 2008
2007
J. Comput. Virol., 2007
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Improving the Performance of Passive Network Monitoring Applications using Locality Buffering.
Proceedings of the 15th International Symposium on Modeling, 2007
2006
Proceedings of the 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), 2006
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
2005
Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
2004
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004
2003
E<sup>2</sup>xB: A Domain-Specific String Matching Algorithm for Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003