ICS Publications - DCS

Conferences (100)

    Papers in Proceedings (full-paper reviewed)

  1. Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2019). Cookie synchronization: Everything you always wanted to know but were afraid to ask. Proceedings of the 28th International Conference on World Wide Web, San Fransisco, USA, May 2019. (pdf).
  2. Papadopoulos, P., Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2019). Is Privacy possible without Anonymity? The case for microblogging services. In proceedings of the 12th European Workshop on Systems Security (EuroSec), Dresden, Germany, March 2019. (pdf).
  3. Diamantaris, M., Papadopoulos, E. P. , Markatos, E.P., Ioannidis, S., & Polakis, I. (2019). REAPER: Real-time App Analysis for Augmenting the Android Permission System. Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (ACM CODASPY), Dallas, TX, USA, March 2019. (pdf).
  4. Papadopoulos, P., Ilia, P., Polychronakis, M., Markatos, E.P., Ioannidis, S., & Vasiliadis, G. (2019). Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation. Proceedings of the the Network and Distributed System Security Symposium (NDSS '19), San Diego, USA, February 2019. website, (pdf).
  5. Papadopoulos, P., Chariton, A. A. , Athanasopoulos, E., & Markatos, E.P. (2018). Where’s Wally? How to Privately Discover your Friends on the Internet. In proceedings of the 13th ACM ASIA Conference on Information, Computer and Communications Security (ACM ASIACCS 2018), Songdo, Incheon, Korea, June 2018. (pdf).
  6. Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2018). The Cost of Digital Advertisement: Comparing User and Advertiser Views. Proceedings of the 27th International World Wide Web Conference (WWW 2018), Lyon, France, April 2018. (pdf).
  7. Papadopoulos, P., Vasiliadis, G., Christou, G., Markatos, E.P., & Ioannidis, S. (2017). No Sugar but all the Taste! Memory Encryption without Architectural Support. Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS 2017), Oslo, Norway, September 2017. (pdf).
  8. Chariton, A. A. , Degkleri, E., Papadopoulos, P., Ilia, P., & Markatos, E.P. (2017). CCSP: a Compressed Certificate Status Protocol. Proceedings of the IEEE International Conference on Computer Communications (INFOCOM '17), Atlanta, GA, USA, May 2017. (pdf).
  9. Papadopoulos, E. P. , Diamantaris, M., Papadopoulos, P., Petsas, T., Ioannidis, S., & Markatos, E.P. (2017). The Long-Standing Privacy Debate: Mobile Websites Vs Mobile Apps. Proceedings of the 26th International World Wide Web Conference, (WWW 2017), Perth, Western Australia, April 2017. (pdf).
  10. Papadopoulos, P., Athanasopoulos, E., Kosta, E., Siganos, G., Keromytis, A.D., & Markatos, E.P. (2016). Provable Network Activity for Protecting Users against False Accusation. Proceedings of the 10th International Conference on Information Security Theory and Practice (WISTP'2016) , Heraklion, Crete, Greece, September 2016. (pdf).
  11. Chariton, A. A. , Degkleri, E., Papadopoulos, P., Ilia, P., & Markatos, E.P. (2016). DCSP: Performant Certificate Revocation a DNS-based approach. Proceedings of the 9th European Workshop on Systems Security (EuroSec), London, UK, April 2016. (pdf).
  12. Papadopoulos, P., Papadogiannakis, A., Polychronakis, M., Zarras, A., Holz, Th., & Markatos, E.P. (2013). k-subscription: Privacy-preserving Microblogging Browsing through ObfuscationIn Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, USA , December 2013.
  13. Petsas, T., Papadogiannakis, A., Polychronakis, M., Markatos, E.P., & Karagiannis, Th. (2013). Rise of the Planet of the Apps: A Systematic Study of the Mobile App EcosystemIn Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC), Barcelona, Spain , October 2013. (pdf).
  14. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2013). Scap: Stream-Oriented Network Traffic Capture and Analysis for High-Speed NetworksIn Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC), Barcelona, Spain , October 2013. (pdf).
  15. Polakis, I., Volanis, S., Athanasopoulos, E., & Markatos, E.P. (2013). The man who was there: Fortifying the Economy of Location-Based ServicesIn Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, USA , December 2013.
  16. Gessiou, E., Volanis, S., Athanasopoulos, E., Markatos, E.P., & Ioannidis, S. (2012). Digging up social structures from documents on the webIn Proceedings of IEEE 2012 Communication and Information System Security Symposium (Globecom CISS), Anaheim, CA, USA, December 2012.
  17. Athanasopoulos, E., Kemerlis, V. P., Polychronakis, M., & Markatos, E.P. (2012). ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches. In Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS'12), Singapore, June 2012. (pdf).
  18. Kontaxis, G., Polychronakis, M., Keromytis, A. D., & Markatos, E.P. (2012). Privacy-Preserving Social PluginsIn Proceedings of the 21st USENIX Security Symposium, Bellevue, WA, USA, August 2012.
  19. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2012). Tolerating Overload Attacks Against Packet Capturing SystemsIn Proceedings of the USENIX Annual Technical Conference (ATC)(available from usenix website ), Boston, MA, USA, June 2012. (pdf).
  20. Antoniades, D., Kontaxis, G., Athanasopoulos, E., Ioannidis, S., Markatos, E.P., & Karagiannis, Th. (2011).  we.b: The Web of Short URLsIn Proceedings of the 20th International World Wide Web Conference (WWW), Hyderabad, India, March 2011. (pdf).
  21. Kontaxis, G., Polychronakis, M., & Markatos, E.P. (2011). SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-On PlatformsIn Proceedings of the 14th Information Security Conference (ISC), Xi'an, China, October 2011. (pdf).
  22. Markatos, E.P., Petsas, T., Polakis, I.S., & Antonatos, S. (2010). A systematic characterization of IM threats using honeypots. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS 2010), Feb 2010. (pdf).
  23. Athanasopoulos, E., Krithinakis, A., & Markatos, E.P. (2010). An architecture for enforcing JavaScript randomization in web2.0 applicationsShort paper in Proceedings of the 13th Information Security Conference (ISC 2010), Boca Raton, FL, USA, 25 October 2010 through 28 October 2010 (vol. 6531 LNCS, pp. 203-209). (03029743; 9783642181771 (ISBN)), (pdf).
  24. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2010). Comprehensive shellcode detection using runtime heuristicsProceedings of the 26th Annual Computer Security Applications Conference, Austin, Texas, (pp. 287-296). New York, NY, USA: ACM (978-1-4503-0133-6), (pdf).
  25. Kapravelos, A., Polakis, I., Athanasopoulos, E., Ioannidis, S., & Markatos, E.P. (2010). D(e|i)aling with VoIP: Robust prevention of DIAL attacksIn Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS), Athens, Greece, September 20-22 (vol. 6345, pp. 663-678). (03029743; 3642154964 (ISBN); 9783642154966 (ISBN)), (pdf).
  26. Kontaxis, G., Polakis, I., & Markatos, E.P. (2010). Experiences and observations from the NoAH infrastructure6th European Conference on Computer Network Defense, EC2ND 2010, Berlin, October 28-29 (pp. 11-18). (9780769543116 (ISBN)), (pdf).
  27. Athanasopoulos, E., Krithinakis, A., & Markatos, E.P. (2010). Hunting Cross-Site Scripting Attacks in the Network. In Proceedings of the 4th Workshop on Web 2.0 Security & Privacy (W2SP), Oakland, California, May 2010. (pdf).
  28. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2010). Improving the accuracy of network intrusion detection systems under load using selective packet discarding. Proceedings of the Third European Workshop on System Security, Paris, France, (pp. 15-21). New York, NY, USA: ACM (978-1-4503-0059-9), (pdf).
  29. Krithinakis, A., Athanasopoulos, E., & Markatos, E.P. (2010). Isolating javaScript in dynamic code environments. 2010 Workshop on the Analysis and Programming Languages for Web Applications and Cloud Applications, APLWACA 2010, Toronto, ON, June 6 (pp. 45-49). (9781605589138 (ISBN)), (pdf).
  30. Antoniades, D., Markatos, E.P., & Dovrolis, C. (2010). MOR: monitoring and measurements through the onion router. Proceedings of the 11th international conference on Passive and active measurement, Zurich, Switzerland, (pp. 131-140). Berlin, Heidelberg: Springer-Verlag (3-642-12333-3, 978-3-642-12333-7), (pdf).
  31. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2010). RRDtrace: Long-term raw network traffic recording using fixed-size storage. 18th Annual IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2010, Miami Beach, FL, August 17-19 (pp. 101-110). (9780769541976 (ISBN)), (pdf).
  32. Polakis, I., Kontaxis, G., Antonatos, S., Gessiou, E., Petsas, T., & Markatos, E.P. (2010). Using social networks to harvest email addresses9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS '10, Chicago, IL, October 4-8 (pp. 11-20). (15437221; 9781450300964 (ISBN)), (pdf).
  33. Athanasopoulos, E., Pappas, V., Krithinakis, A., Ligouras, S., Markatos, E.P., & Karagiannis, Th. (2010). xJS: practical XSS prevention for web application development. In Proceedings of the 1st USENIX Conference on Web Application Development (WebApps), Boston, MA, USA, (pp. 13). Berkeley, CA, USA: USENIX Association (pdf).
  34. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2009). An Empirical Study of Real-world Polymorphic Code Injection Attacks2nd Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET '09), Boston, MA, USA, April. (pdf).
  35. Athanasopoulos, E., Pappas, V., & Markatos, E.P. (2009). Code-Injection Attacks in Browsers Supporting Policies. In Proceedings of the Third Workshop on Web 2.0 Security & Privacy (W2SP), Oakland, CA, USA, May. (pdf).
  36. Chin, W.Y., Markatos, E.P., Antonatos, S., & Ioannidis, S. (2009). HoneyLab: Large-scale honeypot deployment and resource sharing. 2009 3rd International Conference on Network and System Security, NSS 2009, Gold Coast, QLD, 19 October 2009 through 21 October 2009 (pp. 381-388). (9780769538389 (ISBN)), (pdf).
  37. Papadakis, H., Roussopoulos, M., Fragopoulou, P., & Markatos, E.P. (2009). Imbuing unstructured P2P systems with non-intrusive topology awareness. In Proceedings of the 9th International Conference on Peer-to-Peer Computing., Seattle, USA, 91-1 September (pp. 51-60). (pdf).
  38. Antoniades, D., Markatos, E.P., & Dovrolis, C. (2009). One-click hosting services: a file-sharing hideout. IMC '09: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, Chicago, Illinois, USA, (pp. 223-234). New York, NY, USA: ACM (978-1-60558-771-4), (pdf).
  39. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2009). Real-world Polymorphic Attack Detection. In Proceedings of the 4th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA), Athens, Greece, June. (pdf).
  40. Friedl, A., Ubik, S., Kapravelos, A., Polychronakis, M., & Markatos, E.P. (2009). Realistic passive packet loss measurement for high-speed networks. 1st International Workshop on Traffic Monitoring and Analysis, TMA 2009, Aachen, 11 May 2009 through 11 May 2009 (vol. 5537 LNCS, pp. 1-7). (03029743; 9783642016448 (ISBN)), (pdf).
  41. Vasiliadis, G., Polychronakis, M., Antonatos, S., Markatos, E.P., & Ioannidis, S. (2009). Regular Expression Matching on Graphics Hardware for Intrusion Detection. Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25 (pp. 265-283). (pdf).
  42. Athanasopoulos, E., Makridakis, A., Antonatos, S., Antoniades, D., Ioannidis, S., Anagnostakis, K.G., & Markatos, E.P. (2008). Antisocial networks: Turning a social network into a botnet. 11th International Conference on Information Security, ISC 2008, Taipei, Taiwan, 15 September 2008 through 18 September 2008 (vol. 5222 LNCS, pp. 146-160). (03029743; 3540858849 (ISBN); 9783540858843 (ISBN)), (pdf).
  43. Pappas, V., Athanasopoulos, E., Ioannidis, S., & Markatos, E.P. (2008). Compromising anonymity using packet spinning. 11th International Conference on Information Security, ISC 2008, Taipei, Taiwan, 15 September 2008 through 18 September 2008 (vol. 5222 LNCS, pp. 161-174). (03029743; 3540858849 (ISBN); 9783540858843 (ISBN)), (pdf).
  44. Bos, H., & Markatos, E.P. (2008). European Conference on Computer Systems: Preface. 1st European Workshop on System Security, EUROSEC '08, Glasgow, 31 March 2008 through 31 March 2008. Association for Computing Machinery (9781605581194 (ISBN)).
  45. Politopoulos, P.I., Markatos, E.P., & Ioannidis, S. (2008). Evaluation of compression of remote network monitoring data streams. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, Salvador da Bahia, Brazil, 7 April 2008 through 11 April 2008 (pp. 109-115). (9781424420674 (ISBN)), (pdf).
  46. Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E.P., & Ioannidis, S. (2008). Gnort: High performance network intrusion detection using graphics processors. Recent Advances in Intrusion Detection - 11th International Symposium, RAID 2008, Proceedings, Cambridge, MA, USA, 15 September 2008 through 17 September 2008 (vol. 5230 LNCS, pp. 116-134). (03029743; 354087402X (ISBN); 9783540874027 (ISBN)), (pdf).
  47. Antonatos, S., Athanatos, M., Kondaxis, G., Velegrakis, J., Hatzibodozis, N., Ioannidis, S., & Markatos, E.P. (2008). Honey@home: A new approach to large-scale threat monitoring. WOMBAT Workshop on Information Security Threats Data Collection and Sharing, WISTDCS 2008, Amsterdam, 21 April 2008 through 22 April 2008 (pp. 3-16). (9780769533476 (ISBN)), (pdf).
  48. Antoniades, D., Polychronakis, M., Nikiforakis, N., Markatos, E.P., & Mitsos, Y. (2008). Monitoring three National Research Networks for eight weeks: Observations and implications. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, Salvador da Bahia, 7 April 2008 through 11 April 2008 (pp. 153-156). (9781424420674 (ISBN)), (pdf).
  49. Foukarakis, M., Antoniades, D., Antonatos, S., & Markatos, E.P. (2008). On the Anonymization and Deanonymization of Netflow Traffic. In Proceedings of FloCon 2008, Savannah, Georgia, USA, January. (pdf).
  50. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2008). Real-world polymorphic attack detection using network-level emulation. CSIIRW '08: Proceedings of the 4th annual workshop on Cyber security and information intelligence research, Oak Ridge, Tennessee, (pp. 1-3). New York, NY, USA: ACM (978-1-60558-098-2), (pdf).
  51. Theocharides, A., Antoniades, D., Polychronakis, M., Athanasopoulos, E., & Markatos, E.P. (2008). Topnet: A Network-aware top(1)LISA; Proceedings of the 22nd Large Installation System Administration Conference, {LISA} 2008, November 9-14, 2008, San Diego, {CA {USA}, San Diego, California, September (pp. 145-157). USENIX Association (978-1-931971-63-8), (pdf).
  52. Nikiforakis, N., Antoniades, D., Markatos, E.P., Ioannidis, S., & Øslebø, A. (2008). When AppMon met Stager. 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, Salvador da Bahia, 7 April 2008 through 11 April 2008 (pp. 157-160). (9781424420674 (ISBN)), (pdf).
  53. Krithinakis, A., Stroetmann, L., Athanasopoulos, E., Kopidakis, G., & Markatos, E.P. (2008). WSIM: A Software Platform to Simulate All-Optical Security Operations. Computer Network Defense, 2008. EC2ND 2008. European Conference on, Dublin, Ireland, Decembe (pp. 41-47). (pdf).
  54. Nikiforakis, N., Makridakis, A., Athanasopoulos, E., & Markatos, E.P. (2007). Alice, what did you do last time? Fighting Phishing Using Past Activity Tests. Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND '07); LNEE (Lecture Notes on Electrical Engineering), Heraklion, Greece, 4-5 October. Springer (978-0-387-85554-7), (pdf).
  55. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2007). Emulation-based detection of non-self-contained polymorphic shellcode. 10th Symposium on Recent Advances in Intrusion Detection, RAID 2007, Gold Coast, Australia, 5 September 2007 through 7 September 2007 (vol. 4637 LNCS, pp. 87-106). (03029743; 9783540743194 (ISBN)), (pdf).
  56. Foukarakis, M., Antoniades, D., Antonatos, S., & Markatos, E.P. (2007). Flexible and high-performance anonymization of Netflow records using anontool. 3rd International Conference on Security and Privacy in Communication Networks, SecureComm, Nice, 17 September 2007 through 21 September 2007 (pp. 33-38). (1424409756 (ISBN); 9781424409754 (ISBN)), (pdf).
  57. Athanasopoulos, E., Roussopoulos, M., Anagnostakis, K.G., & Markatos, E.P. (2007). GAS: Overloading a file sharing network as an anonymizing system. 2nd International Workshop on Security, IWSEC 2007, Nara, 29 October 2007 through 31 October 2007 (vol. 4752 LNCS, pp. 365-379). (03029743; 9783540756507 (ISBN)), (pdf).
  58. Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2007). Honey@home: a new approach to large-scale threat monitoring. WORM '07: Proceedings of the 2007 ACM workshop on Recurring malcode, Alexandria, Virginia, USA, (pp. 38-45). New York, NY, USA: ACM (978-1-59593-886-2), (pdf).
  59. Papadogiannakis, A., Antoniades, D., Polychronakis, M., & Markatos, E.P. (2007). Improving the performance of passive network monitoring applications using locality buffering. 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS '07, Istanbul, 24 October 2007 through 26 October 2007 (pp. 151-157). (9781424418541 (ISBN)), (pdf).
  60. Andreozzi, S., Ciuffoletti, A., Ghiselli, A., Antoniades, D., Polychronakis, M., Markatos, E.P., & Trimintzios, P. (2007). On the Integration of Passive and Active Network Monitoring in Grid Systems. Integrated Research in GRID Computing. Workshop 2005 (Selected Papers), Pisa, Italy, November 28–30 (pp. 147-161). USA: Springer (978-0-387-47656-8 (Print) 978-0-387-47658-2 (Online)), (pdf).
  61. Koukis, D., Antonatos, S., Antoniades, D., Markatos, E.P., & Trimintzios, P. (2006). A generic anonymization framework for network traffic. 2006 IEEE International Conference on Communications, ICC 2006, Istanbul, 11 July 2006 through 15 July 2006 (vol. 5, pp. 2302-2309). (05361486; 1424403553 (ISBN); 9781424403554 (ISBN)), (pdf).
  62. Antoniades, D., Polychronakis, M., Antonatos, S., Markatos, E.P., Ubik, S., & Øslebø, A. (2006). Appmon: An Application for Accurate per Application Network Traffic Characterisation. In IST Broadband Europe 2006 Conference, Geneva, Switzerland, December. (pdf).
  63. Antoniades, D., Athanatos, M., Papadogiannakis, A., Markatos, E.P., & Dovrolis, C. (2006). Available bandwidth measurement as simple as running wget. In Proceedings of the Passive and Active Measurement Conference (PAM2006), Adelaide, Australia, March. (pdf).
  64. Trimintzios, P., Polychronakis, M., Papadogiannakis, A., Foukarakis, M., Markatos, E.P., & Øslebø, A. (2006). DiMAPI: An application programming interface for distributed network monitoring. 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006, Vancouver, BC, 3 April 2006 through 7 April 2006 (pp. 382-393). (1424401429 (ISBN); 9781424401420 (ISBN)), (pdf).
  65. Papadakis, H., Fragopoulou, P., Markatos, E.P., Dikaiakos, M., & Labrinidis, A. (2006). Divide et Impera: Partitioning Unstructured Peer-to-Peer Systems to Improve Resource Location. In Proceedings of the 3nd CoreGRID Integration Workshop, Krakow Poland.
  66. Neokleous, K., Dikaiakos, M., Fragopoulou, P., & Markatos, E.P. (2006). Grid Reliability: A Study of Failures on the EGEE Infrastructure. Proceedings of the 3rd CoreGRID Integration Workshop, Krakow, Poland, 19-20 October (pp. 165-176). (pdf).
  67. Athanasopoulos, E., Anagnostakis, K.G., & Markatos, E.P. (2006). Misusing unstructured P2P systems to perform DoS attacks: The network that never forgets. 4th International Conference on Applied Cryptography and Network Security, ACNS 2006, Singapore, 6 June 2006 through 9 June 2006 (vol. 3989 LNCS, pp. 130-145). (03029743; 3540347038 (ISBN); 9783540347033 (ISBN)), (pdf).
  68. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2006). Network-Level Polymorphic Shellcode Detection Using Emulation. Berlin, Germany, July 13-14 (pp. 54-73). (pdf).
  69. Papadogiannakis, A., Kapravelos, A., Polychronakis, M., Markatos, E.P., & Ciuffoletti, A. (2006). Passive end-to-end packet loss estimation for GRID traffic monitoring. CoreGRID Integration Workshop 2006, Krakow, Poland, October 19-20. Krakow: CYFRONET AG (83-915141-6-1), (pdf).
  70. Papadakis, H., Fragopoulou, P., Athanasopoulos, E., Dikaiakos, M., & Markatos, E.P. (2005). A Feedback-based Approach to Reduce Duplicate Messages. In Proceedings of the 2nd CoreGrid Integration Workshop, Lisbon, Portugal, November. (pdf).
  71. Antonatos, S., Akritidis, P., Markatos, E.P., & Anagnostakis, K.G. (2005). Defending against hitlist worms using network address space randomization. WORM '05 - 2005 ACM Workshop on Rapid Malcode, Farfax, VA, 11 November 2005 through 11 November 2005 (pp. 30-40). (1595932291 (ISBN)), (pdf).
  72. Xinidis, K., Anagnostakis, K.G., & Markatos, E.P. (2005). Design and Implementation of a High-Performance Network Intrusion Prevention System. IFIP TC11 20th International Information Security Conference, Chiba, Japan, May 30 – June 1 (pp. 359-374). (pdf).
  73. Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E.P., & Keromytis, A.D. (2005). Detecting Targeted Attacks Using Shadow HoneypotsProceedings of the 14th {USENIX} Security Symposium, August. USENIX (pdf).
  74. Akritidis, P., Anagnostakis, K.G., & Markatos, E.P. (2005). Efficient content-based detection of zero-day worms. Communications, 2005. ICC 2005. 2005 IEEE International Conference on Communications (ICC 2005), Seoul, Korea, 16-20 May (vol. 2, pp. 837-843). (pdf).
  75. Andreozzi, S., Antoniades, D., Ciuffoletti, A., Ghiselli, A., Markatos, E.P., Polychronakis, M., & Trimintzios, P. (2005). Issues about the Integration of Passive and Active Monitoring for Grid NetworksCoreGRID Integration Workshop 2005, Nov. Pisa (pdf).
  76. Antonatos, S., Polychronakis, M., Akritidis, P., Anagnostakis, K.G., & Markatos, E.P. (2005). Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection. SEC, Chiba, Japan, May 30 - June 1 (pp. 393-408). (pdf).
  77. Akritidis, P., Markatos, E.P., Polychronakis, M., & Anagnostakis, K.G. (2005). STRIDE: Polymorphic Sled Detection Through Instruction Sequence Analysis. Chiba, Japan, May 30 – June 1 (pp. 375-391). (pdf).
  78. Polychronakis, M., Markatos, E.P., Anagnostakis, K.G., & Øslebø, A. (2004). Design of an application programming interface for IP network monitoring. 2004 IEEE/IFIP Network Operations and Management Symposium: Managing Next Generation Convergence Networks and Services, NOMS 2004, Seoul, 1 April 2004 through 1 April 2004 (pp. 483-496). (pdf).
  79. Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2004). Generating Realistic Workloads for Network Intrusion Detection Systems. Proceedings of the Fourth International Workshop on Software and Performance (WOSP2004), January 2004. (pdf).
  80. Antonatos, S., Anagnostakis, K.G., Markatos, E.P., & Polychronakis, M. (2004). Performance Analysis of Content Matching Intrusion Detection Systems. Proceedings of the International Symposium on Applications and the Internet (SAINT2004), January 2004. (pdf).
  81. Markatos, E.P., Ji R Novotn, Y., Polychronakis, M., Smotlacha, V.R., & Ubik, S. (2004). SCAMPI - A Scaleable Monitoring Platform for the InternetIn Proceedings of the 2nd International Workshop on Inter-Domain Performance and Simulation (IPS 2004), Budapest, Hungary, 22-23 March. (pdf).
  82. Luque, E., Castaños, J.G., Markatos, E.P., & Perego, R. (2004). Topic 3: Scheduling and Load Balancing. Pisa, Italy, August 31- September 3 (pp. 220-221).
  83. Charitakis, I., Anagnostakis, K.G., & Markatos, E.P. (2003). An Active Trafc Splitter Architecture for Intrusion Detection. Proceedings of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Orlando Florida, October 2003 (pp. 238-240). (pdf).
  84. Charitakis, I., Pnevmatikatos, D., Markatos, E.P., & Anagnostakis, K.G. (2003). Code Generation for Packet Header Intrusion Analysis on the IXP1200 Network Processor. Proceedings of the 7th International Workshop on Software and Compilers for Embedded Systems, SCOPES 2003, Vienna, Austria, September 2003 (pp. 226-239). (pdf).
  85. Anagnostakis, K.G., Antonatos, S., Markatos, E.P., & Polychronakis, M. (2003). E2xB: A domain–specific string matching algorithm for intrusion detection. Proceedings of the 18th IFIP International Information Security Conference (SEC2003), May 2003. (pdf).
  86. Coppens, J., Van den Berghe, S., Bos, H., Markatos, E.P., De Turck, F., Oslebo, A., & Ubik, S. (2003). SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks. Proceedings of the Workshop on End-to-End Monitoring Techniques and Services (E2EMON), September 2003. (pdf).
  87. Markatos, E.P., Antonatos, S., Polychronakis, M., & Anagnostakis, K.G. (2002). Exclusion-based Signature Matching for Intrusion Detection. Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN), Cambridge, USA, November 2002 (pp. 146-152). (pdf).
  88. Markatos, E.P. (2002). Speeding-up TCP/IP: Faster Processors are not Enough. In Proceedings of the 21st IEEE International Performance, Computing, and Communications Conference (IPCCC 2002), April 2002 (pp. 341-345). (pdf).
  89. Markatos, E.P. (2002). Tracing a large-scale Peer to Peer System:an hour in the life of Gnutella. In Proceedings of the CCGrid 2002: the second IEEE International Symposium on Cluster Computing and the Grid, May 2002 (pp. 65-74). (pdf).
  90. Gialama, E.M., Markatos, E.P., Sevaslidou, J.E., Serpanos, D.N., Asimakopoulou, X.A., & Kotsovinos, E.N. (2001). DIVISOR: DIstributed VIdeo Server fOr stReaming. In the Proceedings of the 5th WSES/IEEE WORLD MULTICONFERENCE ON Circuits, Systems, Communications and Computers (CSCC 2001), July 2001 (pp. 4531-4536). (pdf).
  91. Markatos, E.P. (2000). On Caching Search Engine Query Results. In the Proceedings of the 5th International Web Caching and Content Delivery Workshop, May 2000. (pdf).
  92. Markatos, E.P., Katevenis, M.G.H., Pnevmatikatos, D., & Flouris, M.D. (1999). Secondary Storage Management for Web Proxies. In Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems (USITS99), Co-Sponsored by IEEE Computer Society, Technical Committee on the Internet., (pp. 93-104). (pdf).
  93. Markatos, E.P., & Chronaki, C. (1998). A Top-10 Approach to Prefetching the Web. In Proceedings of INET' 98 (The Internet Summit), Geneva, Switzerland, July 1998.
  94. Papathanasiou, A E., & Markatos, E.P. (1998). Lightweight Transactions on Networks of Workstations. In International Conference on Distributed Computing Systems (ICDCS 1998), Amsterdam, May 1998. (pdf).
  95. Ioannidis, S., Markatos, E.P., & Sevaslidou, J.E. (1998). On Using Network Memory to Improve the Performance of TransactionBased Systems.  In Proceedings of 1998 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'98), Las Vegas, USA, July 1998. (pdf).
  96. Papadakis, N., Markatos, E.P., & Papathanasiou, A E. (1998). Palantir: A Visualization Tool for the World Wide Web.  In Proceedings of INET' 98 (The Internet Summit), Geneva, Switzerland, July 1998.
  97. Markatos, E.P., & Dramitinos, G. (1996). Implementation of a Reliable Remote Memory Pager. In the proceedings of the USENIX  Technical Conference, San Diego, Ca, January 22-26. (pdf).
  98. Markatos, E.P., & Chronaki, C. (1994). Using reference counters in Update Based Coherent Memory. In PARLE '94 Parallel ARchitectures and Languages Europe, Athens, Greece (pdf).
  99. Markatos, E.P. (1993).  How Architecture Evolution influences the Scheduling Discipline in Shared-Memory Multiprocessors. In PARCO 93, Grenoble, France (pdf).
      Poster presentations (abstract reviewed)

    1. Degkleri, E., Chariton, A. A. , Ilia, P., Papadopoulos, P., & Markatos, E.P. (2016). Leveraging DNS for timely SSL Certificate Revocation. In 3rd ACM-W Europe Celebration of Women in Computing (womENcourage 2016), Linz, Austria, September 2016. (pdf).

                WorkShops (11)

                  Papers in Proceedings (full-paper reviewed)

                1. Tzagarakis, G., Papadopoulos, P., Chariton, A. A. , Athanasopoulos, E., & Markatos, E.P. (2018). 0pass: Zero-storage Password Management Based on Password Reminders. 11th European Workshop on Systems Security (EuroSec 2018), Porto, Portugal, April 2018. (pdf).
                2. Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2018). Exclusive: How the (synced) Cookie Monster breached my encrypted VPN session. 11th European Workshop on Systems Security (EuroSec 2018), Porto, Portugal, April 2018. (pdf).
                3. Kontaxis, G., Antoniades, D., Polakis, I., & Markatos, E.P. (2011). An Empirical Study on the Security of Cross-Domain Policies in Rich Internet ApplicationsIn Proceedings of the 4th European Workshop on System Security (EuroSec), Salzburg, Austria, April 2011. (pdf).
                4. Tzermias, Z., Sykiotakis, G., Polychronakis, M., & Markatos, E.P. (2011). Combining Static and Dynamic Analysis for the Detection of Malicious DocumentsIn Proceedings of the 4th European Workshop on System Security (EuroSec), Salzburg, Austria, April 2011. (pdf).
                5. Kontaxis, G., Polakis, I., Polychronakis, M., & Markatos, E.P. (2011). dead.drop: URL-based Stealthy MessagingIn Proceedings of the 7th European Conference on Computer Network Defense (EC2ND), Gothenburg, Sweden, September 2011. (pdf).
                6. Kontaxis, G., Polakis, I., Ioannidis, S., & Markatos, E.P. (2011). Detecting Social Network Profile CloningIn Workshop Proceedings of the 9th Annual IEEE International Conference on Pervasive Computing and Communications, Seattle, WA, USA, March 2011. (pdf).
                7. Markatos, E.P. (1996). Issues in Reliable Network Memory Paging. In Proceedings of MASCOTS'96 (Int. Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems), San Jose, CA, USA, February 1996. (pdf).
                8. Markatos, E.P. (1996). Using Remote Memory to avoid Disk Thrashing:A Simulation Study. In Proceedings of MASCOTS'96 (Int. Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems), San Jose, CA, USA, February 1996. (pdf).
                9. Markatos, E.P., & Dramitinos, G. (1995). Adding Flexibility to a Remote Memory Pager.  In Fourth International Workshop on Object Orientation in Operating Systems, IWOOOS 96,  Lund, Sweden, August 1995 (pp. 183-186). (pdf).
                10. Markatos, E.P., Katevenis, M.G.H., Kalokairinos, G., & Serpanos, D.N. (1995). An Efficient Processor-Network Interface for Local Area Multiprocessors. In Proceedings of the SCIzzL Workshop on LocalArea MultiProcessors, Heraklion, Crete, Greece, October 1995 (pp. 23-32). (pdf).
                      Posters

                    1. Polakis, I., Kontaxis, G., Ioannidis, S., & Markatos, E.P. (2011). Dynamic Monitoring of Dark IP Address SpaceIn Proceedings of the COST TMA International Workshop on Traffic Monitoring and Analysis (TMA), Vienna, Austria, April 2011. (pdf).

                            Books (4)

                                Editor

                              1. Bos, H., & Markatos, E.P. (2008). Proceedings of the 1st European Workshop on System Security : March 31, 2008, Glascow, United Kingdom.  New York, N.Y.: ACM Press, (ISBN 9781605581194 1605581194).
                              2. Leitold, H., & Markatos, E.P. (2006). Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings. Communications and Multimedia Security; Lecture Notes in Computer ScienceVol. 4237 Springer, (ISBN 3-540-47820-5).
                                Chapters (in book)

                              1. Papadakis, H., Fragopoulou, P., Markatos, E.P., Dikaiakos, M., & Labrinidis, A. (2008). Divide et Impera: Partitioning Unstructured Peer-to-Peer Systems to Improve Resource Location. Achievements in European Research on grid systems.  (pp. 1 - 12), Springer.
                              2. Papadakis, H., Fragopoulou, P., Markatos, E.P., Athanasopoulos, E., Dikaiakos, M., & Labrinidis, A. (2007). A Feedback-based Approach to reduce Duplicate Messages in Unstructured Peer-to-Peer Systems. Integrated research in Grid Computing.  (pp. 103 - 118), Springer,  (pdf).

                                    Periodicals (45)

                                      Journal Articles

                                    1. Petsas, T., Papadogiannakis, A., Polychronakis, M., Markatos, E.P., & Karagiannis, Th. (2017). Measurement, Modeling, and Analysis of the Mobile App Ecosystem. ACM Transactions on on Modeling and Performance Evaluation of Computing Systems (ACM TOPECS)2(2), 1-33.
                                    2. Tsikoudis, N., Papadogiannakis, A., & Markatos, E.P. (2016). LEoNIDS: a Low-latency and Energy-efficient Network-level Intrusion Detection System. IEEE Transactions on Emerging Topics in Computing (TETC), Special Issue on Emerging Topics in Cyber Security4(1), 142-155.
                                    3. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2014). Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks. IEEE Journal of Selected Areas in Comunications (JSAC)32(10), 1849-1863.
                                    4. Tsikoudis, N., Papadogiannakis, A., & Markatos, E.P. (2014). LEoNIDS: a Low-latency and Energy-efficient Network-level Intrusion Detection System.IEEE Transactions on Emerging Topics in Computing (TETC), Special Issue on Emerging Topics in Cyber SecurityPP(99), 1-1.
                                    5. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2014). Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks. In IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Deep Packet Inspection: Algorithms, Hardware, and Applications32(10), 1-15, (pdf).
                                    6. Papadakis, H., Fragopoulou, P., Markatos, E.P., & Roussopoulos, M. (2013). ITA: Innocuous Topology Awareness for Unstructured P2P NetworksIEEE Transactions on Parallel and Distributed Systems24(8), 1589-1601.
                                    7. Kontaxis, G., Polychronakis, M., & Markatos, E.P. (2012). Minimizing information disclosure to third parties in social login platformsIn International Journal of Information Security (IJIS)11(5), 321-332.
                                    8. Papadogiannakis, A., Vasiliadis, G., Antoniades, D., Polychronakis, M., & Markatos, E.P. (2012). Improving the Performance of Passive Network Monitoring Applications with Memory Locality EnhancementsIn Computer Communications Journal (COMCOM)(available from Science Direct)35(1), 129-140, (pdf).
                                    9. Papadakis, H., Roussopoulos, M., Fragopoulou, P., & Markatos, E.P. (2012). ITA: Innocuous Topology Awareness for Unstructured P2P Networks. Transactions on Parallel and Distributed Systems.
                                    10. Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Polychronakis, M., Keromytis, A.D., & Markatos, E.P. (2010). Shadow Honeypots. In International Journal of Computer and Network Security (IJCNS)2(9), 1-16, (pdf).
                                    11. Makridakis, A., Athanasopoulos, E., Antonatos, S., Antoniades, D., Ioannidis, S., & Markatos, E.P. (2010). Understanding the behavior of malicious applications in social networksIn IEEE Network. (available from IEEE Xplore) 24(5), 14-19, (08908044).
                                    12. Papadakis, H., Fragopoulou, P., Markatos, E.P., Dikaiakos, M., & Labrinidis, A. (2009). Hash-Based Overlay Partitioning in Unstructured Peer-to-Peer SystemsIn Parallel Processing Letters, (available from World Scientific) 19(1), 57-71, (0129-6264).
                                    13. Antonatos, S., Akritidis, P., Markatos, E.P., & Anagnostakis, K.G. (2007). Defending against hitlist worms using network address space randomization. In Computer Networks51(12), 3471-3490, (1389-1286), (pdf).
                                    14. Neokleous, K., Dikaiakos, M., Fragopoulou, P., & Markatos, E.P. (2007). Failure Management in Grids: the Case of the EGEE InfrastructureIn Parallel Processing Letters, (available from World Scientific)17(4), 391-410.
                                    15. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2007). Network-level polymorphic shellcode detection using emulation. Journal in Computer Virology2(4), 257-274, (pdf).
                                    16. Xinidis, K., Charitakis, I., Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2006). An active splitter architecture for intrusion detection and prevention. IEEE Trans.Dependable Secure Comput.3(1), 31-44, (15455971), (pdf).
                                    17. Markatos, E.P., Pnevmatikatos, D., Flouris, M.D., & Katevenis, M.G.H. (2002). Web-Conscious Storage Management for Web Proxies In IEEE/ACM Transactions on Networking, (available from IEEE Xplore)10(6), 735-748.
                                    18. Markatos, E.P. (2001). On Caching Search Engine Query Results. In Computer Communications,Elsevier Science, 137-143, (pdf).
                                    19. Dramitinos, G., & Markatos, E.P. (1999). Adaptive and Reliable Paging to Remote Main MemoryIn Journal of Parallel and Distributed Computing (available from Science Direct)58(3), 357-388.
                                    20. Pnevmatikatos, D., Markatos, E.P., Maglis, Gr., & Ioannidis, S. (1999). On Using Network RAM as a non-volatile Buffer In Cluster Computing Journal on Networks, Software, and Applications, Baltzer Science Publishers. (available from Springer Link) 2(4), 295-303.
                                    21. Ioannidis, S., Papathanasiou, A E., Maglis, Gr., Pnevmatikatos, D., Markatos, E.P., & Sevaslidou, J.E. (1999). On Using Reliable Network RAM in Networks of Workstations In Parallel and Distributed Computing Practices, Special Issue on High Performance Computing on Clusters, Nova Science Publishers, USA, accepted for publication. (available from SCPE).
                                    22. Flouris, M.D., & Markatos, E.P. (1999). The Network RamDisk: using remote memory on heterogeneous NOWs In Cluster Computing Journal on Networks, Software, and Applications, Baltzer Science Publishers. (available from Springer Link) 2(4), 281-293.
                                    23. Markatos, E.P., Papathanasiou, A E., & Papadakakis, N. (1999). Visualizing Traffic on the World Wide WebIn WebNet Journal: Internet Technologies, Applications and Issues (available from Ed/ITLib)1(2), 57-65.
                                    24. Katevenis, M.G.H., Markatos, E.P., Kalokairinos, G., & Dollas, A. (1997). Telegraphos: a substrate for high-performance computing on workstation clustersJournal of Parallel and Distributed Computing43(2), 94-108, (0743-7315).
                                    25. Houstis, C.E., Kapidakis, S., Markatos, E.P., & Gelenbe, E. (1997). Execution of Compute Intensive Applications into Parallel Machines In Information Sciences, special issue on load balancing in distributed systems, Elsevier Science. (available from Science Direct) 97(1-2), 83-124.
                                    26. Markatos, E.P. (1996). Main Memory Caching of Web DocumentsIn Computer Networks and ISDN Systems. Also appeared in Proceedings of the Fifth International World Wide Web Conference, Paris, France, May 199628(7-11), 893-906.
                                    27. Markatos, E.P., & Leblanc, Th.J. (1994). Using Processor Affinity in Loop Scheduling on Shared-Memory Multiprocessors.  In IEEE Transactions on Parallel and Distributed Processing,5(4), 379-400, (pdf).
                                          Magazine article

                                        1. Ioannidis, S., Markatos, E.P., Kirda, E., & Kruegel, Ch. (2009). Drivers of Emerging and Future Threats in ICT Infrastructures . , 5(3),  http://www.ics.forth.gr/dcs/Activities/forward-enisa-quarterly-2009.3.pdf.
                                        2. Markatos, E.P., & Anagnostakis, K.G. (2008). NoAH: A European Network of Affined Honeypots for cyber-attack Tracking and Alerting. , (262).
                                        3. Antonatos, S., Athanasopoulos, E., Anagnostakis, K.G., & Markatos, E.P. (2007). Honey@Home: Παγιδεύοντας τις επιθέσεις από το διαδίκτυο. The Economist (Kathimerini)9.
                                        4. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2007). LOBSTER: Ανίχνευση επιθέσεων στο διαδίκτυο. The Economist (Kathimerini)9.
                                        5. Markatos, E.P., Anagnostakis, K.G., Antonatos, S., & Polychronakis, M. (2007). Real-time Monitoring and Detection of Cyberattacks. , 3(1),  http://www.ics.forth.gr/_pdf/brochures/noah-lobster-enisa-quarterly-2007.1.pdf.
                                        6. Athanasopoulos, E., Kopidakis, G., & Markatos, E.P. (2007). Ανάπτυξη ασφαλών οπτικών δικτύων. The Economist (Kathimerini)9.
                                        7. Markatos, E.P., Antonatos, S., & Anagnostakis, K.G. (2006). Discovering Hackers, with a honeypot as bait. ,  http://www.ics.forth.gr/_pdf/brochures/naftemporiki_Dec2006.2.pdf.
                                        8. Antonatos, S., Anagnostakis, K.G., & Markatos, E.P. (2006). Μία Ευρωπαϊκή Πλατφόρμα ανίχνευσης & αναχαίτισης ηλεκτρονικών επιθέσεων στο Διαδίκτυο. The Economist (Kathimerini)4, 89.
                                              ERCIM News

                                            1. Zanero, S., Ioannidis, S., & Markatos, E.P. (2012). i-Code: Real-Time Malicious Code IdentificationERCIM News90, 19-20, July.
                                            2. Markatos, E.P., & Bos, H. (2012). SysSec: Managing Theats and Vulnerabilities in the Future InternetERCIM News90, 13-14, July.
                                            3. Ioannidis, S., Markatos, E.P., & Kruegel, Ch. (2009). On looking FORWARDERCIM News76, January 2009.
                                            4. Anagnostakis, K.G., & Markatos, E.P. (2005). Towards a European Malware Containment InfrastructureERCIM News63, 16-17, October 2005.
                                            5. Bilas, A., & Markatos, E.P. (2003). Wearable Systems for Everyday UseERCIM News52, 15-16, January 2003.
                                            6. Markatos, E.P. (2001). ServerGrids: Available and Scalable Global Computing PlatformsERCIM News45, April 2001.
                                            7. Markatos, E.P., & Papathanasiou, A E. (1999). Monitoring and Displaying Traffic on the World Wide WebERCIM News37, April 1999.
                                            8. Markatos, E.P. (1998). TeachWEB - Novel Learning Approaches using the World-Wide WebERCIM News33, April 1998.
                                            9. Markatos, E.P., & Chronaki, C. (1996). Caching, Prefetching and Coherence in the World Wide WebERCIM News25, April 1996.
                                            10. Nikolaou, Ch., Saridakis, T., & Markatos, E.P. (1995). ArrayTracerERCIM News23, April 1995.

                                                Talks (20)

                                                    Invited Talks

                                                  1. Markatos, E.P. (2012). Future Research on Systems Security. At FIA Roadmapping Workshop, June, Brussels, Belgium.
                                                  2. Markatos, E.P. (2012). Managing Threats and Vulnerabilities in the Future Internet. At Joint EDA EC Workshop, October, Brussels, Belgium.
                                                  3. Markatos, E.P. (2012). Managing Threats and Vulnerabilities in the Future Internet. At Cyber Security & Privacy EU Forum 2012, April, Berlin, Germany.
                                                  4. Markatos, E.P. (2012). Privacy-Preserving Social Plugins.  Invited talk at Boston University, June, Boston, MA, USA.
                                                  5. Markatos, E.P. (2012). Privacy-Preserving Social Plugins. Invited talk at University of Miami, June, Miami, FL, USA.
                                                  6. Markatos, E.P. (2012). Real-world Polymorphic Attack Detection. Invited talk at T-Labs, TU-Berlin, April, Berlin, Germany.
                                                  7. Markatos, E.P. (2012). Real-world Polymorphic attack Detection. Invited talk at Imperial College, March, London, United Kingdom.
                                                  8. Markatos, E.P. (2012). SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-On Platforms. Invited talk at Cambridge Systems Workshop, March, Cambridge, United Kingdom.
                                                  9. Markatos, E.P. (2011). Detecting Polymorphic Cyberattacks. At "Network and Information Security: Research Ideas" workshop. Organized by Trust and Security Unit, DG INFSO, September, Brussels, Belgium.
                                                  10. Markatos, E.P. (2011). Future Research Needs and Trends in Trustworthy ICT. At Information Day on ICT FP7 Call on Trustworthy ICT. Organized by the European Commission, September, Brussels, Belgium.
                                                  11. Markatos, E.P. (2011). Privacy and Social Networks. At "Privacy Protection and ICT: Research Ideas" workshop. Organized by Trust and Security Unit, DG INFSO, September, Brussels, Belgium.
                                                  12. Markatos, E.P., & Polychronakis, M. (2011). Real-world Polymorphic Attack Detection. Invited talk at University of Cyprus, November, Nicosia, Cyprus.
                                                  13. Markatos, E.P., & Polychronakis, M. (2011). Real-world Polymorphic Attack Detection. At ASPLOS 2012 Program Committee mini-symposium, October, Rochester, NY, USA.
                                                  14. Markatos, E.P. (2011). SysSec: A European Network of Excellence in Managing Threats and Vulnerabilities in the Future Internet. Invited talk at Northeastern University, July, Boston, MA, USA.
                                                  15. Markatos, E.P. (2011). SysSec: A European Network of Excellence in Managing Threats and Vulnerabilities in the Future Internet. At Effectsplus clustering meeting, July, Amsterdam, The Netherlands.
                                                  16. Markatos, E.P. (2010). Collaboration in Systems Security. At Inco-Trust networking session in ICT 2010, September, Brussels, Belgium.
                                                  17. Markatos, E.P. (2010). Managing Threats and Vulnerabilities in the Future Internet. At "WebScienceNet " meeting, December, Patras, Greece.
                                                  18. Markatos, E.P. (2010). SysSec: A European Network of Excellence in Managing Threats and Vulnerabilities in the Future Internet. At "Open Doors FORTH-ICS ", October, Heraklion, Greece.
                                                  19. Markatos, E.P. (2010). SysSec: A European Network of Excellence in Managing Threats and Vulnerabilities in the Future Internet. At Effectsplus networking session in ICT 2010, September, Brussels, Belgium.
                                                  20. Markatos, E.P. (2010). Threats and Vulnerabilities in the Future Internet: The SysSec project. At Effectsplus 1st technical cluster meeting, March, Brussels, Belgium.

                                                    Technical & Research Reports (20)

                                                          ICS-FORTH Technical Reports

                                                        1. Kapravelos, A., Polakis, I., Athanasopoulos, E., Ioannidis, S., & Markatos, E.P. (2009). Digital is Calling the Analog : Robust Prevention of Dial Attacks. 2009.TR399_Robust_Prevention_Dial_Attacks.pdf.
                                                        2. Athanasopoulos, E., Pappas, V., Ligouras, S., & Markatos, E.P. (2009). JS : Lightweight Cross-Site Scripting Prevention Using Isolation Operators. 2009.TR400_Lightweight_Cross-Site_Scripting.pdf.
                                                        3. Anagnostakis, K.G., Antonatos, S., & Markatos, E.P. (2006). Honey@home: A New Approach to Large-Scale Threat Monitoring. 2006.TR378_Large-Scale_Threat_Monitoring.pdf.
                                                        4. Athanasopoulos, E., & Markatos, E.P. (2006). Misusing Unstructured P2P Systems to Perform DoS Attacks:The Network that Never Forgets. 2006.TR370_Misusing_Unstructured_P2P_Systems.pdf.
                                                        5. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2006). Network-Level Polymorphic Shellcode Detection Using Emulation. 2006.TR368_Network_Level_Polymorphic_Shellcode_Detection.pdf.
                                                        6. Anagnostakis, K.G., Antonatos, S., Akritidis, P., & Markatos, E.P. (2005). Defending against Hitlist Worms using Network Address Space Randomization. 2005.TR349_Network_Address_Space_Randomization_Against_Worms.pdf.
                                                        7. Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E.P., & Keromytis, A.D. (2005). Detecting Targeted Attacks Using Shadow Honeypots. 2005.TR348_Targeted_Attacks_Shadow_Honeypots.pdf.
                                                        8. Charitakis, I., Anagnostakis, K.G., & Markatos, E.P. (2004). A Network-Processor-Based Traffic Splitter for Intrusion Detection. 2004.TR342_Network_Processor_Traffic_Splitter_Intrusion_Detection.pdf.
                                                        9. Charitakis, I., Anagnostakis, K.G., & Markatos, E.P. (2003). An Active Traffic Splitter Architecture for Intrusion Detection. 2003.TR323.Active_Traffic_Splitter.pdf.
                                                        10. Antonatos, S., Anagnostakis, K.G., Markatos, E.P., & Polychronakis, M. (2002, December 2002). Benchmarking and Design of String Matching Intrusion Detection Systems. Technical Report 315. December 2002.
                                                        11. Anagnostakis, K.G., Antonatos, S., Markatos, E.P., & Polychronakis, M. (2002, October 2002). E2 XB: A Domain-Specific String Matching Algorithm for Intrusion Detection. Technical Report 311. October 2002.
                                                        12. Markatos, E.P., Antonatos, S., Polychronakis, M., & Anagnostakis, K.G. (2002, October 2002). Exclusion-based signature matching for intrusion detection. 2002.TR310.String_Matching_for_Intrusion_Detection.pdf.
                                                        13. Portokalidis, G., Markatos, E.P., & Marazakis, M. (2002, October 2002). Study and Bridging of Peer-to-Peer File Sharing Systems. 2002.TR312.Bridging_Peer-to-Peer_File_Sharing_Systems.pdf.
                                                        14. Markatos, E.P. (2001). Speeding up TCP / IP : Faster Processors are not Enough. 2001.TR297.SpeedingUp_TCP_IP_faster_processors.ps.gz.
                                                        15. Markatos, E.P. (2001). Tracing a large-scale Peer to Peer System:an hour in the life of Gnutella. 2001.TR298.Tracing_Peer_to_Peer_System.pdf.
                                                        16. Markatos, E.P., Pnevmatikatos, D., Flouris, M.D., & Katevenis, M.G.H. (2000, October 2000). Web-Conscious Storage Management for Web Proxies. 2000.TR275.Web_Conscious_Storage_Management_Web_Proxies.pdf.
                                                        17. Pnevmatikatos, D., Markatos, E.P., Magklis, G.I., & Ioannidis, S. (1998). On Using Network RAM as a non-volatile Buffer. 1998.TR227.NVRAM.ps.gz.
                                                        18. Markatos, E.P. (1997). Tracing a large-scale Peer to Peer System: an hour in the life of Gnutella. 
                                                        19. Georgiannakis, G., Houstis, C.E., Kapidakis, S., Karavassili, M., Nikolaou, Ch., Labrinidis, A., Marazakis, M., Markatos, E.P., Mavronicolas, M., Chabridon, S., Gelenbe, E., Born, E., Richter, L., & Riedl, R. (1995). DESCRIPTION OF THE ADAPTIVE RESOURCE MANAGEMENT PROBLEM, COST FUNCTIONS AND PERFORMANCE OBJECTIVES. 1995.TR130.LYDIA.D1.ps.gz.
                                                        20. Markatos, E.P. (1993). How Architecture Evolution Influences the Scheduling Discipline used in Shared-Memory Multiprocessors. 1993.PARCO93.Architecture_infuence_on_Scheduling.ps.Z.

                                                                Others (3)

                                                                        Professional

                                                                      1. Polychronakis, M., Markatos, E.P., Mitsos, Y., Gajin, S., & Muratovski, G. (2008). Real-world Polymorphic Attack Detection. 4 (2).
                                                                      2. Markatos, E.P., Ioannidis, S., & Kruegel, Ch. (2008). Tracing the Changing Nature of Cyber-attacks. 4 (4), http://www.ics.forth.gr/_pdf/brochures/forward-enisa-quarterly-2008.4.pdf.
                                                                      3. Athanasopoulos, E., Anagnostakis, K.G., & Markatos, E.P. (2006). On Exploiting a File Sharing System for DDoS Attacks . October, http://www.ics.forth.gr/_pdf/brochures/gnutella-ddos-enisa-quarterly-2006.3.pdf.
                                                                        Found: 203 publications
                                                                        Conditions of Use | Privacy Policy