Periklis Akritidis

According to our database1, Periklis Akritidis authored at least 18 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
FRAMER: a tagged-pointer capability system with memory safety applications.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
FRAMER: A Cache-friendly Software-based Capability Model.
CoRR, 2018

OTTer: A Scalable High-Resolution Encrypted Traffic Identification Engine.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

2017
MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2011
Practical memory safety for C.
PhD thesis, 2011

2010
Cling: A Memory Allocator to Mitigate Dangling Pointers.
Proceedings of the 19th USENIX Security Symposium, 2010

Dynamically checking ownership policies in concurrent c/c++ programs.
Proceedings of the 37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2010

2009
Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors.
Proceedings of the 18th USENIX Security Symposium, 2009

Fast byte-granularity software fault isolation.
Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, 2009

2008
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure.
ACM Trans. Inf. Syst. Secur., 2008

Preventing Memory Error Exploits with WIT.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

2007
Defending against hitlist worms using network address space randomization.
Comput. Networks, 2007

Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

2005
Detecting Targeted Attacks Using Shadow Honeypots.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

The VoteSecure<sup>TM</sup> Secure Internet Voting System.
Proceedings of the Trust Management, Third International Conference, 2005

Efficient content-based detection of zero-day worms.
Proceedings of IEEE International Conference on Communications, 2005


  Loading...