ICS Publications - DCS

WorkShops (19)

    Papers in Proceedings (full-paper reviewed)

  1. Tzagarakis, G., Papadopoulos, P., Chariton, A. A. , Athanasopoulos, E., & Markatos, E.P. (2018). 0pass: Zero-storage Password Management Based on Password Reminders. 11th European Workshop on Systems Security (EuroSec 2018), Porto, Portugal, April 2018. (pdf).
  2. Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2018). Exclusive: How the (synced) Cookie Monster breached my encrypted VPN session. 11th European Workshop on Systems Security (EuroSec 2018), Porto, Portugal, April 2018. (pdf).
  3. Kontaxis, G., Antoniades, D., Polakis, I., & Markatos, E.P. (2011). An Empirical Study on the Security of Cross-Domain Policies in Rich Internet ApplicationsIn Proceedings of the 4th European Workshop on System Security (EuroSec), Salzburg, Austria, April 2011. (pdf).
  4. Polakis, I., Kontaxis, G., & Ioannidis, S. (2011). CAPTCHuring Automated (Smart)Phone AttacksIn Proceedings of the 1st Workshop on Systems Security (SysSec), co-located with the 8th conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Amsterdam, The Netherlands, July 2011. (pdf).
  5. Sfakianakis, A., Athanasopoulos, E., & Ioannidis, S. (2011). CensMon: A Web Censorship Monitor. In Proceedings of the 1st USENIX Workshop on Free and Open Communications on the Internet (FOCI), co-located with the 20th USENIX Security Symposium, San Francisco, CA, USA, August 2011. (pdf).
  6. Tzermias, Z., Sykiotakis, G., Polychronakis, M., & Markatos, E.P. (2011). Combining Static and Dynamic Analysis for the Detection of Malicious DocumentsIn Proceedings of the 4th European Workshop on System Security (EuroSec), Salzburg, Austria, April 2011. (pdf).
  7. Kontaxis, G., Polakis, I., Polychronakis, M., & Markatos, E.P. (2011). dead.drop: URL-based Stealthy MessagingIn Proceedings of the 7th European Conference on Computer Network Defense (EC2ND), Gothenburg, Sweden, September 2011. (pdf).
  8. Kontaxis, G., Polakis, I., Ioannidis, S., & Markatos, E.P. (2011). Detecting Social Network Profile CloningIn Workshop Proceedings of the 9th Annual IEEE International Conference on Pervasive Computing and Communications, Seattle, WA, USA, March 2011. (pdf).
  9. Gessiou, E., Hieu Vu, Q., & Ioannidis, S. (2011). IRILD: an Information Retrieval based method for Information Leak DetectionIn Proceedings of the 7th European Conference on Computer Network Defense (EC2ND), Gothenburg, Sweden, September 2011. (pdf).
  10. Kontaxis, G., Polakis, I., & Ioannidis, S. (2011). Outsourcing Malicious Infrastructure to the CloudIn Proceedings of the 1st Workshop on Systems Security (SysSec), co-located with the 8th conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Amsterdam, The Netherlands, July 2011. (pdf).
  11. Koromilas, L., Chinis, G., Fundulaki, I., & Ioannidis, S. (2009). Controlling access to XML documents over XML native and relational databases. In Proceedings of the 6th VLDB Workshop on Secure Data Management (SDM), Lyon, France, 28 August 2009 through 28 August 2009 (vol. 5776 LNCS, pp. 122-141). (03029743; 364204218X (ISBN); 9783642042188 (ISBN)), (pdf).
  12. Ciuffoletti, A., Marchetti, Y., Papadogiannakis, A., & Polychronakis, M. (2008). Prototype Implementation of a Demand-Driven Network Monitoring Architecture. CoreGRID Integration Workshop, Heraklion, Crete, Greece, April 2008. (pdf).
  13. Ciuffoletti, A., Papadogiannakis, A., & Polychronakis, M. (2007). Network Monitoring Session Description. In Proceedings of the CoreGRID Workshop on Grid Middleware (in conjunction with ISC '07), Dresden, Germany, June 2007. (pdf).
  14. Markatos, E.P. (1996). Issues in Reliable Network Memory Paging. In Proceedings of MASCOTS'96 (Int. Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems), San Jose, CA, USA, February 1996. (pdf).
  15. Markatos, E.P. (1996). Using Remote Memory to avoid Disk Thrashing:A Simulation Study. In Proceedings of MASCOTS'96 (Int. Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems), San Jose, CA, USA, February 1996. (pdf).
  16. Markatos, E.P., & Dramitinos, G. (1995). Adding Flexibility to a Remote Memory Pager.  In Fourth International Workshop on Object Orientation in Operating Systems, IWOOOS 96,  Lund, Sweden, August 1995 (pp. 183-186). (pdf).
  17. Markatos, E.P., Katevenis, M.G.H., Kalokairinos, G., & Serpanos, D.N. (1995). An Efficient Processor-Network Interface for Local Area Multiprocessors. In Proceedings of the SCIzzL Workshop on LocalArea MultiProcessors, Heraklion, Crete, Greece, October 1995 (pp. 23-32). (pdf).
        Posters

      1. Papadogiannaki, E., & Ioannidis, S. (2016). An Efficient Scheduling Approach for Concurrent Packet Processing Applications on Heterogeneous Systems. 3rd ACM-W Europe Celebration of Women in Computing (womENcourage 2016), Linz, Austria, September 2016. (pdf).
      2. Polakis, I., Kontaxis, G., Ioannidis, S., & Markatos, E.P. (2011). Dynamic Monitoring of Dark IP Address SpaceIn Proceedings of the COST TMA International Workshop on Traffic Monitoring and Analysis (TMA), Vienna, Austria, April 2011. (pdf).
              Found: 19 publications
              Conditions of Use | Privacy Policy