Vasileios P. Kemerlis

Orcid: 0000-0002-6528-437X

According to our database1, Vasileios P. Kemerlis authored at least 50 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BeeBox: Hardening BPF against Transient Execution Attacks.
Proceedings of the 33rd USENIX Security Symposium, 2024

QUACK: Hindering Deserialization Attacks via Static Duck Typing.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

ISLAB: Immutable Memory Management Metadata for Commodity Operating System Kernels.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks.
Proceedings of the 32nd USENIX Security Symposium, 2023

EPF: Evil Packet Filter.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023

FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

SysXCHG: Refining Privilege with Adaptive System Call Filters.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

BinWrap: Hybrid Protection against Native Node.js Add-ons.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Timeloops: System Call Policy Learning for Containerized Microservices.
CoRR, 2022

2021
EPI: Efficient Pointer Integrity For Securing Embedded Systems.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021

μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

2020
xMP: Selective Memory Protection for Kernel and User Space.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

sysfilter: Automated System Call Filtering for Commodity Software.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Egalito: Layout-Agnostic Binary Recompilation.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020

2019
Kernel Protection Against Just-In-Time Code Reuse.
ACM Trans. Priv. Secur., 2019

PAIRS: Control Flow Protection using Phantom Addressed Instructions.
CoRR, 2019

Scanning the Internet for ROS: A View of Security in Robotics Research.
Proceedings of the International Conference on Robotics and Automation, 2019

Nibbler: debloating binary shared libraries.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Compiler-Assisted Code Randomization.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
Reviving instruction set randomization.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

2016
Shuffler: Fast and Deployable Continuous Code Re-Randomization.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

RETracer: triaging crashes by reverse execution from partial memory dumps.
Proceedings of the 38th International Conference on Software Engineering, 2016

NaClDroid: Native Code Isolation for Android Applications.
Proceedings of the Computer Security - ESORICS 2016, 2016

VTPin: practical VTable hijacking protection for binaries.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Protecting Commodity Operating Systems through Strong Kernel Isolation.
PhD thesis, 2015

The Spy in the Sandbox - Practical Cache Attacks in Javascript.
CoRR, 2015

Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

DynaGuard: Armoring Canary-based Protections against Brute-force Attacks.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
ret2dir: Rethinking Kernel Isolation.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
CloudFence: Data Flow Tracking as a Cloud Service.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Cloudopsy: An Autopsy of Data Flows in the Cloud.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

CellFlood: Attacking Tor Onion Routers on the Cheap.
Proceedings of the Computer Security - ESORICS 2013, 2013

ShadowReplica: efficient parallelization of dynamic data flow tracking.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
kGuard: Lightweight Kernel Protection.
login Usenix Mag., 2012

A system for generating and injecting indistinguishable network decoys.
J. Comput. Secur., 2012

libdft: practical dynamic data flow tracking for commodity systems.
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012

kGuard: Lightweight Kernel Protection against Return-to-User Attacks.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Adaptive defenses for commodity software through virtual application partitioning.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Wireless community networks: an alternative approach for nomadic broadband network access.
IEEE Commun. Mag., 2011

2010
Automating the injection of believable decoys to detect snooping.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2009
A BitTorrent module for the OMNeT++ simulator.
Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, 2009

2007
Fueling Game Development in Mobile P2P Environments.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Experimental evaluation of community-based WLAN voice and data services.
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007

A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance.
Proceedings of the 20th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2007), 2007

2006
Public infrastructures for internet access in metropolitan areas.
Proceedings of the 1st International ICST Conference on Access Networks, ACCESSNETS 2006, 2006


  Loading...