Æȷοì
Vasilis Pappas
Vasilis Pappas
cs.columbia.eduÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
V Pappas, M Polychronakis, AD Keromytis
Security and Privacy (SP), 2012 IEEE Symposium on, 601-615, 2012
4952012
Transparent ROP exploit mitigation using indirect branch tracing
V Pappas, M Polychronakis, AD Keromytis
Proceedings of the 22nd USENIX conference on Security, 447-462, 2013
4612013
Blind seer: A scalable private dbms
V Pappas, F Krell, B Vo, V Kolesnikov, T Malkin, SG Choi, W George, ...
Security and Privacy (SP), 2014 IEEE Symposium on, 359-374, 2014
3242014
kBouncer: Efficient and Transparent ROP Mitigation
V Pappas
822012
CloudFence: Data flow tracking as a cloud service
V Pappas, VP Kemerlis, A Zavou, M Polychronakis, AD Keromytis
International Workshop on Recent Advances in Intrusion Detection, 411-431, 2013
662013
Compromising anonymity using packet spinning
V Pappas, E Athanasopoulos, S Ioannidis, EP Markatos
International Conference on Information Security, 161-174, 2008
522008
CellFlood: Attacking Tor onion routers on the cheap
MV Barbera, VP Kemerlis, V Pappas, AD Keromytis
European Symposium on Research in Computer Security, 664-681, 2013
502013
xJS: practical XSS prevention for web application development
E Athanasopoulos, V Pappas, A Krithinakis, S Ligouras, EP Markatos, ...
Proceedings of the 2010 USENIX conference on Web application development ¡¦, 2010
492010
Private search in the real world
V Pappas, M Raykova, B Vo, SM Bellovin, T Malkin
Proceedings of the 27th Annual Computer Security Applications Conference, 83-92, 2011
342011
Towards a universal data provenance framework using dynamic instrumentation
E Gessiou, V Pappas, E Athanasopoulos, AD Keromytis, S Ioannidis
IFIP International Information Security Conference, 103-114, 2012
322012
Cloudopsy: an Autopsy of Data Flows in the Cloud
A Zavou, V Pappas, VP Kemerlis, M Polychronakis, G Portokalidis, ...
Proc. of HCII, 2013
222013
Practical Software Diversification Using In-Place Code Randomization
V Pappas, M Polychronakis, AD Keromytis
Moving Target Defense II, 175-202, 2012
212012
Code-Injection Attacks in Browsers Supporting Policies
E Athanasopoulos, V Pappas, E Markatos
Proceedings of the 2nd Workshop on Web 2.0 Security & Privacy (W2SP), 2009
212009
Diversified instruction set processing to enhance security
L Sethumadhavan, K Sinha, A Keromytis, V Pappas, V Kemerlis
US Patent App. 14/946,961, 2015
14*2015
Dynamic reconstruction of relocation information for stripped binaries
V Pappas, M Polychronakis, AD Keromytis
International Workshop on Recent Advances in Intrusion Detection, 68-87, 2014
142014
Evaluation of a spyware detection system using thin client computing
V Pappas, BM Bowen, AD Keromytis
International Conference on Information Security and Cryptology, 222-232, 2010
142010
iLeak: A lightweight system for detecting inadvertent information leaks
VP Kemerlis, V Pappas, G Portokalidis, AD Keromytis
Proceedings of the 6th European Conference on Computer Network Defense ¡¦, 2010
142010
Cloud-Fence: Enabling Users to Audit the Use of their Cloud-Resident Data
V Pappas, V Kemerlis, A Zavou, M Polychronakis, AD Keromytis
Columbia University Computer Science Technical Reports, 2012
112012
Crimeware swindling without virtual machines
V Pappas, BM Bowen, AD Keromytis
International Conference on Information Security, 196-202, 2010
102010
Measuring the deployment hiccups of DNSSEC
V Pappas, AD Keromytis
Advances in Computing and Communications, 44-53, 2011
12011
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20