Project Deliverables & Whitepapers

Deliverables

2014

  • SysSec Deliverable D3.4: Second Summer School (January 2015) Icon pdf (1.5 MB)
  • SysSec Deliverable D2.9: Final Collection of Whitepapers (January 2015) Icon pdf (17.2 MB)
  • SysSec Deliverable D2.8: Fourth Periodic Dissemination Report (January 2015) Icon pdf (13.9 MB)
  • SysSec Deliverable D4.5: Social, Legal and Regulatory Aspects of Network and Information Security in the Future Internet, Release 2 (January 2015) Icon pdf (388.9 KB)
  • SysSec Deliverable D2.2: Final Report on Web Access (December 2014) Icon pdf (1.7 MB)
  • SysSec Deliverable D7.4: Final Report on Cyberattacks (December 2014) Icon pdf (2.9 MB)
  • SysSec Deliverable D3.5: Experiences with the Common Curriculum Implementation (December 2014) Icon pdf (775.7 KB)
  • SysSec Deliverable D6.4: Final Report on Smart Environments (October 2014) Icon pdf (7.0 MB)
  • SysSec Deliverable D5.5: Final Report on Malware and Fraud (October 2014)  Icon pdf (3.7 MB)
  • SysSec Deliverable D4.4: Final Report on Threats on the Future Internet: A Research Outlook (September 2014) Icon pdf (1.2 MB)

2013

  • SysSec Deliverable D4.5: Social, Legal and Regulatory Aspects of Network and Information Security in the Future Internet (September 2013) Icon pdf (121.2 KB)
  • SysSec Deliverable D2.7: Third Periodic Dissemination Report (September 2013) Icon pdf (16.0 MB)
  • SysSec Deliverable D7.3: Advanced Report on Cyberattacks on Lightweight Devices (September 2013) Icon pdf (4.5 MB)
  • SysSec Deliverable D5.4: Intermediate Report on Internet Fraud (September 2013) Icon pdf (8.8 MB)
  • SysSec Deliverable D2.4: Second Public Workshop Proceedings (September 2013) Icon pdf (69.8 MB)
  • SysSec Deliverable D6.3: Advanced Report on Smart Environments (September 2013) Icon pdf (3.4 MB)
  • SysSec Deliverable D4.3: The Red Book - A Roadmap for Systems Security Research (September 2013)
    Available from the red-book.eu website .
  • SysSec Deliverable D3.3: Common Curriculum (April 2013) Icon pdf (476.2 KB)
  • SysSec Deliverable D5.3: Case Study: Malicious Activity in the Turkish Network (February 2013) Icon pdf (1.3 MB)
  • SysSec Deliverable D3.2: First Summer School (January 2013) Icon pdf (1.5 MB)

2012

  • SysSec Deliverable D4.2: Second Report on Threats on the Future Internet and Research Roadmap (September 2012) Icon pdf (501.2 KB)
  • SysSec Deliverable D2.6: Second Periodic Dissemination Report (September 2012) Icon pdf (4.5 MB)
  • SysSec Deliverable D7.2: Intermediate Report on Cyberattacks on Ultra-portable Devices (September 2012) Icon pdf (1.3 MB)
  • SysSec Deliverable D6.2: Intermediate Report on the Security of the Connected Car (September 2012) Icon pdf (2.0 MB)
  • SysSec Deliverable D5.2: Preliminary Report on Social Networks Security (March 2012) Icon pdf (1.4 MB)

2011

  • SysSec Deliverable D2.5: First Periodic Dissemination Report (October 2011) Icon pdf (4.1 MB)
  • SysSec Deliverable D4.1: First Report on Threats on the Future Internet and Research Roadmap (September 2011) Icon pdf (5.7 MB)
  • SysSec Deliverable D6.1: Report on the State of the Art of Security in Sensor Networks (September 2011) Icon pdf (376.5 KB)
  • SysSec Deliverable D2.3: First Public Workshop Proceedings (August 2011) Icon pdf (4.6 MB)
  • SysSec Deliverable D5.1: Survey of Research and Data Collection Initiatives in Malware and Fraud (June 2011) Icon pdf (1.6 MB)
  • SysSec Deliverable D7.1: Review of the State-of-the-Art in Cyberattacks (June 2011) Icon pdf (2.0 MB)
  • SysSec Deliverable D3.1: Framework for Researcher Exchanges (March 2011) Icon pdf (144.0 KB)

2010

Whitepapers and reports

  • European Cyber-Security Research and Innovation (January 2015) Icon pdf (136.9 KB)
  • When Smart Cities Meet Big Data (July 2014) Icon pdf (911.4 KB)
  • Cybersecurity in the Smart Grid (January 2013) Icon pdf (479.3 KB)
  • Cyber Threats in Social Networks and User's Response Dynamics (January 2013). Report in Bulgarian, available online.
  • SysSec: Managing Threats and Vulnerabilities in the Future Internet (July 2012) Icon pdf (6.7 MB)
  • Future Research in Systems Security (June 2012) Icon pdf (45.4 KB)
  • Social network security: A SysSec Whitepaper (June 2012) Icon pdf (137.3 KB)
  • System Security Research in Europe: A Research Roadmap (April 2012) Icon pdf (148.0 KB)
  • The Turkish National Cyber Security Exercise 2011: Final Report (April 2012) Icon pdf (2.5 MB)

Publications in Journals & Conferences

2014

  • Nikos Tsikoudis, Antonis Papadogiannakis, Evangelos P. Markatos. LEoNIDS: a Low-latency and Energy-efficient Network-level Intrusion Detection System. In IEEE Transactions on Emerging Topics in Computing (TETC), Special Issue on Emerging Topics in Cyber Security, Volume PP, Issue 99, pages 1. December, 2014. Icon pdf (7.5 MB)
  • Giorgos Vasiliadis, Elias Athanasopoulos, Michalis Polychronakis, and Sotiris Ioannidis. PixelVault: Using GPUs for securing cryptographic operations. In Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS). November 2014, Scottsdale, AZ, USA. Icon pdf (347.8 KB)
  • Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, and Angelos D. Keromytis. Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication. In Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), Arizona, USA, November 2014. Icon pdf (1.1 MB)
  • Zlatogor Minchev. Cyber Threats Analysis In On-Line Social Networks With A Study On User Response. IT4Sec Reports. November 2014. Icon pdf (6.4 MB)
  • Zlatogor Minchev and Luben Boyanov. Smart Homes Cyberthreats Identification Based on Interactive Training. In Proceedings of ICAICTSEE 2014. Sofia, Bulgaria. Sofia, Bulgaria. November 2014. Icon pdf (661.0 KB)
  • Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos. Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks. In IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Deep Packet Inspection: Algorithms, Hardware, and Applications, Volume 32, Issue 10, pages 1-15. October 2014.  Icon pdf (332.4 KB)
  • Zlatogor Minchev, Vladimir Dimitrov, Milena Tulechka, and Luben Boyanov. Multimedia as an Emerging Cyberthreat in Modern Social Networks. In Proceedings of the International Conference Automatics & Informatics 2014. October 2014, Sofia, Bulgaria. Icon pdf (534.4 KB)
  • Zhang Fu, Magnus Almgren, Olaf Landsiedel, and Marina Papatriantafilou. Online Temporal-Spatial Analysis for Detection of Critical Events in Cyber-Physical Systems. In Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014).  October 2014, Washington DC, USA. Icon pdf (476.5 KB)
  • Vincenzo Gulisano, Magnus Almgren, and Marina Papatriantafilou. Online and Scalable Data Validation in Advanced Metering Infrastructures. In Proceedings of the 5th IEEE PES Innovative Smart Grid Technologies (ISGT) European 2014 Conference. October 2014, Istanbul, Turkey. Icon pdf (681.1 KB)
  • Vincenzo Gulisano, Magnus Almgren, and Marina Papatriantafilou. METIS: a Two-Tier Intrusion Detection System for Advanced Metering Infrastructures. In Proceedings of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm). September 2014, Beijing, China. Icon pdf (1.4 MB)
  • Martina Lindorfer, Matthias Neugschwandtner, Lukas Weichselbaum, Yanick Fratantonio, Victor van der Veen, Christian Platzer. ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviors. In Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS). September 2014, Wroclaw, Poland. Icon pdf (740.8 KB)
  • Martin Jauernig, Matthias Neugschwandtner, Christian Platzer, Paolo Milani Comparetti. LOBOTOMY An Architecture for JIT Spraying Mitigation. In Proceedings of the International Conference on Availability, Reliability and Security (ARES). September 2014, Fribourg, Switzerland. Icon pdf (319.6 KB)
  • Farnaz Moradi, Tomas Olovsson, and Philippas Tsigas. A Local Seed Selection Algorithm for Overlapping Community Detection. In Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’14).  August 2014, Beijing, China. Icon pdf (273.1 KB)
  • Enes Göktaş, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis. Size Does Matter - Why Using Gadget Chain Length to Prevent Code-reuse Attacks is Hard. In Proceedings of the 23rd USENIX Security Symposium, San Diego. August 2014, CA, USA. Icon pdf (525.8 KB)
  • Andrei Costin, Jonas Zaddach, Francillon Francillon, Aurélien, Davide Balzarotti. A Large Scale Analysis of the Security of Embedded Firmwares. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security). August 2014, San Diego, CA, USA. Icon pdf (508.9 KB)
  • Sergey Bratus, Iván Arce, Michael E. Locasto, and Stefano Zanero. Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of “Crypto Wars” in Security Research. ;login:, 39:302–311, August 2014. Icon pdf (168.6 KB)
  • Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, and Stefano Zanero. Phoenix: DGA-Based Botnet Tracking and Intelligence. In Proceedings of the 11th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). July 2014, Egham, UK. Icon pdf (707.9 KB)
  • Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis. AndRadar: Fast Discovery of Android Applications in Alternative Markets. In Proceedings of the 11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). July 2014. Egham, UK. Icon pdf (1.4 MB)
  • Asia Slowinska, Istvan Haller, Andrei Bacs, Silviu Baranga, and Herbert Bos. Data structure archaeology: scrape away the dirt and glue back the pieces! (Or: automated techniques to recover split and merged variables). In Proceedings of the 11th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Egham, UK, July 2014. Icon pdf (744.8 KB)
  • Dennis Andriesse and Herbert Bos. Instruction-Level Steganography for Covert Trigger-Based Malware. In Proceedings of the 11th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Egham, UK, July 2014. Icon pdf (168.9 KB)
  • Cristiano Giuffrida, Kamil Majdanik, Mauro Conti, and Herbert Bos. I Sensed It Was You: Authenticating Mobile Users with Sensor-enhanced Keystroke Dynamics. In Proceedings of the 11th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Egham, UK, July 2014. Icon pdf (796.9 KB)
  • Vincenzo Gulisano, Magnus Almgren, Marina Papatriantafilou. POSTER: METIS: a Two-Tier Intrusion Detection System for Advanced Metering Infrastructures. In Proceedings of the 5th International Conference on Future Energy Systems (ACM e-Energy). June 2014. Cambridge, UK. Icon pdf (764.3 KB)
  • Claudio Criscione, Fabio Bosatelli, Stefano Zanero, and Federico Maggi. Zarathustra: Extracting WebInject Signatures from Banking Trojans. In Proceedings of the 12th Annual International Conference on Privacy, Security and Trust (PST). July 2014, Toronto, Canada. Icon pdf (423.5 KB)
  • Rafael A Rodríguez Gómez, Gabriel Maciá Fernández, Pedro García Teodoro, Moritz Steiner, and Davide Balzarotti. Resource monitoring for the detection of parasite P2P botnets. Computer Networks, Elsevier B.V., pages 302–311, June 2014.  Icon pdf (1008.1 KB)
  • Christian Platzer, Martin Stuetz, and Martina Lindorfer. Skin Sheriff: A Machine Learning Solution for Detecting Explicit Images. In Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems (ASIACCS-SFCS). June 2014. Kyoto, Japan. Icon pdf (1.4 MB)
  • Markus Kammerstetter, Christian Platzer, and Wolfgang Kastner. PROSPECT. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014). June 2014. Kyoto, Japan. Icon pdf (1.6 MB)
  • Jelena Isacenkova and Davide Balzarotti. Shades of Gray: A Closer Look at Emails in the Gray Area. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014). June 2014. Kyoto, Japan. Icon pdf (689.7 KB)
  • Davide Canali, Leyla Bilge, and Davide Balzarotti. On the Effectiveness of Risk Prediction Based on Users Browsing Behavior. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014). June 2014. Kyoto, Japan. Icon pdf (451.3 KB)
  • Gábor Pék, Andrea Lanzi, Abhinav Srivastava, Davide Balzarotti, Aurélien Francillon, and Christoph Neumann. On the Feasibility of Software Attacks on Commodity Virtual Machine Monitors via Direct Device Assignment. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014). June 2014. Kyoto, Japan. Icon pdf (326.8 KB)
  • Michele Carminati, Roberto Caron, Federico Maggi, Ilenia Epifani, and Stefano Zanero. BankSealer: An Online Banking Fraud Analysis and Decision Support System. In Proceedings of the 29th IFIP International Information Security and Privacy Conference, Marrakech, Morocco, June 2014. Icon pdf (769.0 KB)
  • Sebastian Neuner, Victor van der Veen, Martina Lindorfer, Markus Huber, Georg Merzdovnik, Martin Mulazzani, and Edgar Weippl. Enter Sandbox: Android Sandbox Comparison. In Proceedings of the IEEE Mobile Security Technologies Workshop (MoST). May 2014. San Jose, CA, USA. Icon pdf (162.6 KB)
  • Enes Göktaş, Elias Athanasopoulos, Herbert Bos, and Georgios Portokalidis. Out Of Control: Overcoming Control-Flow Integrity. In Proceedings of the 35th IEEE Symposium on Security and Privacy (Oakland). May 2014. San Jose, CA, USA. Icon pdf (528.0 KB)
  • Erik Bosman and Herbert Bos. Framing Signals – A Return to Portable Shellcode. In Proceedings of the 35th IEEE Symposium on Security and Privacy (Oakland). May 2014. San Jose, CA, USA. Icon pdf (301.9 KB)
  • Farnaz Moradi, Tomas Olovsson, and Philippas Tsigas. Overlapping Communities for Identifying Misbehavior in Network Communications. In Proceedings of the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining, Tainan, Taiwan, May 2014. Icon pdf (280.0 KB)
  • Farnaz Moradi, Ann-Marie Eklund, Dimitrios Kokkinakis, Tomas Olovsson, and Philippas Tsigas. A Graph-Based Analysis of Medical Queries of a Swedish Health Care Portal. In Proceedings of the Fifth International Workshop on Health Text Mining and Information Analysis (Louhi), Gothenburg, Sweden, April 2014. Icon pdf (125.3 KB)
  • Zhang Fu, Olaf Landsiedel, Magnus Almgren, and Marina Papatriantafilou. Managing your Trees: Insights from a Metropolitan-Scale Low-Power Wireless Network. In Proceedings of the 3rd Workshop on Communications and Control for Smart Energy Systems (CCSES), IEEE INFOCOM. April 2014. Westin Harbour Castle Toronto, ON, Canada. Icon pdf (2.8 MB)
  • William Johansson, Martin Svensson, Ulf Larson, Magnus Almgren, and Vincenzo Gulisano. T-Fuzz: Model-Based Fuzzing for Robustness Testing of Telecommunication Protocols. In Proceedings of the 7th International Conference on Software Testing, Verification and Validation (ICST). April 2014. Cleveland, Ohio, USA. Icon pdf (254.8 KB)
  • Thanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Michalis Polychronakis, Sotiris Ioannidis. Rage Against the Virtual Machine: Hindering Dynamic Analysis of Mobile Malware. In Proceedings of the 7th European Workshop on Systems Security (EuroSec). April 2014. Amsterdam, The Nederlands.  Icon pdf (156.8 KB)
  • Nick Nikiforakis, Federico Maggi, Gianluca Stringhini, M Zubair Rafique, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna, Stefano Zanero. Stranger Danger: Exploring the Ecosystem of Ad-based URL Shortening Services. In Proceedings of the 2014 International World Wide Web Conference (WWW). April 2014. Seoul, Korea. Icon pdf (406.6 KB)
  • Zlatogor Minchev, Suzan Feimova. Modern Social Networks Emerging Cyber Threats Identification: A Practical Methodological Framework with Examples. In Proceedings of the 6th AFCEA Sixth Young Scientists Conference 'Future of ICT', at NATO C4ISR Industry Conference & TechNet International. March, 2014. Bucharest, Romania. Icon pdf (333.9 KB)
  • Michele Spagnuolo, Federico Maggi, and Stefano Zanero. BitIodine: Extracting Intelligence from the Bitcoin Network. In Proceedings of the 18th International Conference on Financial Cryptography and Data Security, Financial Crypto 2014, Barbados, March 2014. Icon pdf (852.3 KB)
  • Jonas Zaddach, Luca Bruno, Aurelien Francillon, and Davide Balzarotti. Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares. In Proceedings of the Network and Distributed System Security Symposium (NDSS). February 2014, San Diego, USA.  Icon pdf (1.5 MB)
  • Giancarlo Pellegrino and Davide Balzarotti. Toward Black-Box Detection of Logic Flaws in Web Applications. In Proceedings of the Network and Distributed System Security Symposium (NDSS). February 2014, San Diego, USA.  Icon pdf (913.6 KB)

2013

  • Jonas Zaddach, Anil Kurmus, Davide Balzarotti, Erik Olivier Blass,  Aurelien Francillon, Travis Goodspeed, Moitrayee Gupta, Ioannis Koltsidas. Implementation and Implications of a Stealth Hard-Drive Backdoor. In Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC). December 2013, New Orleans, LA, USA. Icon pdf (799.7 KB)
  • Gabriele Bonetti, Marco Viglione, Alessandro Frossi, Federico Maggi Stefano Zanero. A Comprehensive Black-box Methodology for Testing the Forensic Characteristics of Solid-state Drives. In Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC). December 2013, New Orleans, LA, USA. Icon pdf (293.4 KB)
  • Zlatogor. Minchev and Luben Boyanov. Smart Homes Cyberthreats Identification Based on Interactive Training. In Proceedings of the 3rd International Conference on Application of Information and Communication Technology and Statistics in Economy an d Education (ICAICTSEE). December 2013, Sofia, Bulgaria. Icon pdf (1.4 MB)
  • Iasonas Polakis, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos. The man who was there: Validating check-ins in location-based services. In Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC). December 2013, New Orleans, LA, USA. Icon pdf (392.0 KB)
  • Panagiotis Papadopoulos, Antonis Papadogiannakis, Michalis Polychronakis, Apostolis Zarras, Thorsten Holz, Evangelos P. Markatos. k-subscription: Privacy-preserving Microblogging Browsing through Obfuscation. In Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC). December 2013, New Orleans, LA, USA. Icon pdf (609.2 KB)
  • Martina Lindorfer, Bernhard Miller, Matthias Neugschwandtner, Christian Platzer. Take a Bite - Finding the Worm in the Apple. In Proceedings of the 9th International Conference on Information, Communications and Signal Processing (ICICS). December 2013,Tainan, Taiwan. Icon pdf (235.7 KB)
  • Martina Lindorfer, Matthias Neumayr, Juan Caballero, Christian Platzer. POSTER: Cross-Platform Malware: Write Once, Infect Everywhere. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS). November 2013, Berlin, Germany. Icon pdf (231.0 KB)
  • Valentin Tudor, Magnus Almgren, and Marina Papatriantafilou. Analysis of the Impact of Data Granularity on Privacy for the Smart Grid. In Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society (WPES), Berlin, Germany, November 2013. Icon pdf (810.2 KB)
  • Federico Maggi, Andrea Valdi, Stefano Zanero. AndroTotal: A Flexible, Scalable Toolbox and Service for Testing Mobile Malware Detectors. In Proceedings of the 3rd Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM). November 2013, Berlin, Germany. Icon pdf (328.7 KB)
  • Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, Angelos D. Keromytis. SAuth: Protecting User Accounts from Password Database Leaks. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS). November 2013, Berlin, Germany. Icon pdf (608.8 KB)
  • Antonis Papadogiannakis, Laertis Loutsis, Vassilis Papaefstathiou, Sotiris Ioannidis. ASIST: Architectural Support for Instruction Set Randomization. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS). November 2013, Berlin, Germany.  Icon pdf (332.1 KB)
  • Stiliyan Georgiev, Zlatogor Minchev. An Evolutionary Prototyping for Smart Home Inhabitants Wearable Biomonitoring. In Proceedings of Conjoint Scientific Seminar ‘Modelling & Control of Information Processes’. November 2013, Sofia, Bulgaria. Icon pdf (476.6 KB)
  • Xi Chen, Asia Slowinska, Herbert Bos. Who allocated my memory? Detecting custom memory allocators in C binaries. In Proceedings of the 20th Working Conference on Reverse Engineering (WCRE). October 2013, Koblenz, Germany. Icon pdf (442.6 KB)
  • Istvan Haller, Asia Slowinska, Herbert Bos. MemPick: High-Level Data Structure Detection in C/C++ Binaries. In Proceedings of the 20th Working Conference on Reverse Engineering (WCRE). October 2013, Koblenz, Germany. Icon pdf (319.5 KB)
  • Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert Bos. Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus. In Proceedings of the 8th IEEE International Conference on Malicious and Unwanted Software (MALWARE'13). October 2013, Fajardo, Puerto Rico, USA. Icon pdf (104.4 KB)
  • Mariano Graziano, Andrea Lanzi, Davide Balzarotti. Hypervisor Memory Forensics. In Proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). October 2013, Saint Lucia. Icon pdf (343.6 KB)
  • Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos. Scap: Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC). October 2013, Barcelona, Spain. Icon pdf (350.3 KB)
  • Thanasis Petsas, Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos, Thomas Karagiannis. Rise of the Planet of the Apps: A Systematic Study of the Mobile App Ecosystem. In In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC). October 2013, Barcelona, Spain. Icon pdf (1.7 MB)
  • Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos. Dowsing for overflows: A guided fuzzer to find buffer boundary violations. In Proceedings of the 22nd USENIX Security Symposium (USENIX-SEC). August 2013, Washington, DC, USA. (available from usenix website )
  • Matthias Neugschwandtner, Martina Lindorfer, Christian Platzer. A view to a kill: Webview exploitation. In Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET). August 2013, Washington, DC, USA. (available from usenix website )
  • Andrei Costin, Jelena Isacenkova, Marco Balduzzi, Aurelien Francillon, Davide Balzarotti. The Role of Phone Numbers in Understanding Cyber-Crime Schemes. In Proceedings of the Annual Conference on Privacy, Security and Trust (PST). July 2013, Terragona, Spain. Icon pdf (666.4 KB)
  • Tomas Hruby, Herbert Bos, Andrew S. Tanenbaum. When Slower is Faster: On Heterogeneous Multicores for Reliable Systems. In Proceedings of USENIX ATC, San Jose, CA, USA, June 2013. Icon pdf (393.0 KB)
  • Zlatogor Minchev. Security of Digital Society. Technological Perspectives & Challenges. In Proceedings of the Jubilee International Scientific Conference "Ten Years Security Education in New Bulgarian University: Position and Perspectives for the Education in a Dynamic and Hardly Predicted Environment". June 2013,  Sofia, Bulgaria. Icon pdf (2.0 MB)
  • Zlatogor Minchev, Luben Boyanov, Stiliyan Georgiev. Security of Future Smart Homes. Cyber-Physical Threats Identification Perspectives. In Proceedings of the National Conference with International Participation in Realization of the EU project “Development of Tools Needed to Coordinate Intersectorial Power and Transport CIP Activities at a Situation of Multilateral Terrorist Threat. Increase of the Capacity of Key CIP Objects in Bulgaria”. June 2013, Sofia, Bulgaria. Icon pdf (271.0 KB)
  • Davide Canali, Davide Balzarotti, Aurelien Francillon. The Role of Web Hosting Providers in Detecting Compromised Websites. In Proceedings of the 22nd International World Wide Web Conference (WWW). May 2013, Rio de Janeiro, Brazil. Icon pdf (191.9 KB)
  • Federico Maggi, Alessandro Frossi, Stefano Zanero, Gianluca Stringhini, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna. Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures. In Proceedings of the 22nd International World Wide Web Conference (WWW). May 2013, Rio de Janeiro, Brazil. Icon pdf (1.1 MB)
  • Shlomi Dolev, Omri Liba,  Elad M. Schiller. Self-Stabilizing Byzantine Resilient Topology Discovery and Message Delivery. In Proceedings of the 2013 International Conference on Networked Systems (NET- SYS). May 2013, Marrakech, Morocco. Icon pdf (325.7 KB)
  • Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone Gross, Christian J. Dietrich, and Herbert Bos. P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets. In Proceedings of the IEEE S&P symposium, San Francisco, CA, USA, May 2013. Icon pdf (406.0 KB)
  • Evangelos Ladakis, Lazaros Koromilas, Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis. You Can Type, but You Can't Hide: A Stealthy GPU-based Keylogger. In Proceedings of the 6th European Workshop on System Security (EuroSec). April 2013, Prague, Czech Republic. Icon pdf (323.5 KB)
  • Mar Callau-Zori, Ricardo Jim/ enez-Peris, Vincenzo Gulisano, Marina Papatriantafilo, Zhang Fu, and Marta Patio-Martinez. STONE: a stream-based DDoS defense framework. In Proceedings of the ACM Symposium on Applied Computing (SAC), pages 807–812, Coimbra, Portugal, March 2013. Icon pdf (763.8 KB)
  • Davide Canali and Davide Balzarotti. Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web. In Proceedings of the 2013 Network and Distributed System Security Symposium (NDSS). February 2013, San Diego, CA, USA. Icon pdf (1.8 MB)
  • Frank Breitinger and Kaloyan Petrov. Reducing time cost in hashing operations. In Proceedings of the 9th Annual IFIP WG 11.9 International Conference on Digital Forensics. January 2013, Orlando, FL, USA. Icon pdf (267.0 KB)
  • Luben Boyanov, Zlatogor Minchev and Kiril Boyanov. Some Cyber Threats in Digital Society. In International Journal "Automatics & Informatics". January 2013. Icon pdf (345.2 KB)

2012

  • Leyla Bilge, Davide Balzarotti, William Robertson, Engin Kirda, Christopher Kruegel. DISCLOSURE: Detecting Botnet Command and Control Servers Through Large-Scale NetFlow Analysis. In Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC). December 2012,  Orlando, FL, USA. Icon pdf (665.5 KB)
  • Mario Graziano, Corrado Leita, Davide Balzarotti. Towards Network Containment in Malware Analysis Systems. In Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC). December 2012,  Orlando, FL, USA. Icon pdf (592.8 KB)
  • Martina Lindorfer, Alessandro Di Federico, Federico Maggi, Paolo Milani Comparetti, Stefano Zanero. Lines of Malicious Code: Insights Into the Malicious Software Industry. In Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC). December 2012,  Orlando, FL, USA. Icon pdf (504.8 KB)
  • Iasonas Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, Sotiris Ioannidis, Angelos D. Keromytis, Stefano Zanero. All your face are belong to us: Breaking Facebook’s Social Authentication. In Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC). December 2012,  Orlando, FL, USA. Icon pdf (852.4 KB)
  • Markus Kammerstetter, Christian Platzer, Gilbert Wondracek. Vanity, Cracks and Malware: Insights into the Anti-Copy Protection Ecosystem. In Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS). October 2012, Raleigh, NC, USA. Icon pdf (1.4 MB)
  • Zhang Fu, Marina Papatriantafilou. Off The Wall: Lightweight Distributed Filtering to Mitigate Distributed Denial of Service Attacks. In Proceedings of the 31st IEEE International Symposium on Reliable Distributed Systems (SRDS). October 2012, Irvine, CA, USA. Icon pdf (567.2 KB)
  • Zlatogor Minchev. Social Networks Security Aspects: A Technological and User Based Perspectives. In Proceedings of the 20th National Jubilee Conference with International Participation (TELECOM2012). October 2012, Sofia, Bulgaria. Icon pdf (1.3 MB)
  • Georgios Kontaxis, Michalis Polychronakis, Evangelos P. Markatos. Minimizing information disclosure to third parties in social login platforms. In International Journal of Information Security (IJIS), Volume 11, Issue 5. October 2012. Icon pdf (537.5 KB)
  • Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos. Privacy-Preserving Social Plugins. In proceedings of the 21st USENIX Security Symposium (USENIX-SEC). August 2012, Bellevue, WA, USA. Icon pdf (723.5 KB)
  • Andreas Larsson, Philippas Tsigas. Self-stabilizing (k,r)- Clustering in Clock Rate-Limited Systems. In proceedings of the 19th International Colloquium on Structural Information and Communication Complexity (SIROCCO). July 2012, Reykjavík, Iceland. Icon pdf (143.1 KB)
  • Andrei Bacs, Remco Vermeulen, Asia Slowinska, Herbert Bos. System-level Support for Intrusion Recovery. In proceedings of the 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). July 2012, Heraklion, Greece. Icon pdf (303.7 KB)
  • Christian Rossow, Christian Dietrich,  Herbert Bos. Large-Scale Analysis of Malware Downloaders. In proceedings of the 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). July 2012, Heraklion, Greece. Icon pdf (321.8 KB)
  • Davide Canali, Andrea Lanzi, Davide Balzarotti, Mihai Christoderescu, Christopher Kruegel, Engin Kirda. A Quantitative Study of Accuracy in System Call-Based Malware Detection. In proceedings of the International Symposium on Software Testing and Analysis (ISSTA). July 2012, Minneapolis, MN, USA. Icon pdf (587.3 KB)
  • Theodore Scholte, William Robertson, Davide Balzarotti, Engin Kirda. Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis. In Proceedings of the 36th Annual IEEE Computer Software and Applications Conference (COMPSAC). July 2012, Izmir, Turkey. Icon pdf (546.7 KB)
  • Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos. Tolerating Overload Attacks Against Packet Capturing Systems. In proceedings of the 2012 USENIX Annual Technical Conference (ATC). June 2012, Boston, MA, USA. (available from usenix website )
  • Asia Slowinska, Traian Stancescu, Herbert Bos. Body armor for binaries: preventing buffer overflows without recompilation. In proceedings of the 2012 USENIX Annual Technical Conference (ATC). June 2012, Boston, MA, USA. (available from usenix website )
  • Farnaz Moradi, Tomas Olovsson, Philippas Tsigas. An Evaluation of Community Detection Algorithms on Large-Scale Email Traffic. In proceedings of the 11th International Symposium on Experimental Algorithms (SEA). June 2011, Bordeaux, France. Icon pdf (327.5 KB)
  • Zhang Fu, Marina Papatriantafilou, Philippas Tsigas. Mitigating distributed denial of service attacks in multiparty applications in the presence of clock drifts. In IEEE Transactions on Dependable and Secure Computing (TSDC), Volume 9, Issue 3. May 2012. Icon pdf (564.8 KB)
  • Christian Rossow, Christian J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, Maarten van Steen. Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. In proceedings of the 2012 IEEE Symposium on Security and Privacy (SP). May 2012, San Francisco Bay Area, CA, USA. Icon pdf (387.6 KB)
  • Luca Invernizzi, Paolo Milani Comparetti, Stefano Benvenuti, Christopher Kruegel, Marco Cova, Giovanni Vigna. EVILSEED: A Guided Approach to Finding Malicious Web Pages. In proceedings of the 2012 IEEE Symposium on Security and Privacy (SP). May 2012, San Francisco Bay Area, CA, USA. Icon pdf (759.4 KB)
  • Farnaz Moradi, Tomas Olovsson, Philippas Tsigas. Towards Modeling Legitimate and Unsolicited email Traffic Using Social Network Properties. In proceedings of the 5th Workshop on Social Network Systems (SNS). April 2012, Bern, Switzerland. Icon pdf (1.0 MB)
  • Zlatogor Minchev, Plamen Gatev. Psychophysiological Evaluation of Emotions due to the Communication in Social Networks. In Scripta Scientifica Medica, Volume 44, Issue 1, Supplement 1. April 2012. Icon pdf (350.8 KB)
  • Marco Balduzzi, Jonas Zaddach, Davide Balzarotti, Engin Kirda, Sergio Loureiro. A Security Analysis of Amazon's Elastic Compute Cloud Service. In proceedings of the 27th Symposium On Applied Computing (SAC). March 2012, Riva del Garda, Italy. Icon pdf (319.3 KB)
  • Theodoor Scholte, Davide Balzarotti, William Robertson, Engin Kirda. An Empirical Analysis of Input Validation Mechanisms in Web Applications and Languages. In proceedings of the 27th Symposium On Applied Computing (SAC). March 2012, Riva del Garda, Italy. Icon pdf (296.3 KB)
  • Kaan Onarlioglu, Utku Ozan Yilmaz, Engin Kirda, Davide Balzarotti. Insights into user Behavior in Dealing with Internet Attacks. In proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS). February 2012, San Diego, CA, USA. Icon pdf (398.1 KB)
  • Antonis Papadogiannakis, Giorgos Vasiliadis, Demetres Antoniades, Michalis Polychronakis, Evangelos P. Markatos. Improving the Performance of Network Monitoring Applications with Memory Locality Enhancements. In Computer Communications Journal (COMCOM), Volume 35, Issue 1. January 2012. Icon pdf (230.1 KB)
  • Luigi Sportiello, Stefano Zanero. Context-based File Block Classification. In proceedings of the Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics. January 2012, Pretoria, South Africa. Icon pdf (742.2 KB)

2011

  • Federico Maggi, Andrea Bellini, Guido Salvaneschi, Stefano Zanero. Finding Non-trivial Malware Naming Inconsistencies. In proceedings of the 7th International Conference on Information Systems Security (ICISS). December 2011, Kolkata, India. Icon pdf (1.1 MB)
  • Federico Maggi, Alberto Volpatto, Simone Gasparini, Giacomo Boracchi, Stefano Zanero. A Fast Eavesdropping Attack Against Touchscreens. In proceedings of the 7th International Conference Information Assurance and Security (IEEE IAS). December 2011, Malacca, Malaysia. Icon pdf (1.7 MB)
  • Matthias Neugschwandtner, Paolo Milani Comparetti, and Christian Platzer. Detecting Malwares Failover C&C Strategies with SQUEEZE. In Proceedings of the 2011 Annual Computer Security Applications Conference (ACSAC). December 2011, Orlando, FL, USA. Icon pdf (685.0 KB)
  • Matthias Neugschwandtner, Paolo Milani Comparetti, Gregoire Jacob, Christopher Kruegel. FORECAST – Skimming off the Malware Cream. In Proceedings of the 2011 Annual Computer Security Applications Conference (ACSAC). December 2011, Orlando, FL, USA. Icon pdf (287.1 KB)
  • Christian Platzer. Sequence-Based Bot Detection in Massive Multiplayer Online Games. In Proceedings of the 13th International Conference on Information and Communications Security (ICICS). November 2011, Beijing, China. Icon pdf (182.5 KB)
  • Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis. Parallelization and Characterization of Pattern Matching using GPUs. In Proceedings of the IEEE International Symposium on Workload Characterization (IISWC). November 2011, Austin, TX, USA. Icon pdf (300.2 KB)
  • Federico Maggi, Alberto Volpatto, Simone Gasparini, Giacomo Boracchi, Stefano Zanero. POSTER: Fast, Automatic iPhone Shoulder Surfing. In proceedings of the 18th ACM/SIGSAC Conference on Computer and Communications Security (CCS). October 2011, Chicago, IL, USA.  Icon pdf (587.9 KB)
  • Clemens Kolbitsch, Engin Kirda, Christopher Kruegel. The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code. In proceedings of the 18th ACM/SIGSAC Conference on Computer and Communications Security (CCS). October 2011, Chicago, IL, USA. Icon pdf (2.0 MB)
  • Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis. MIDeA: A Multi-Parallel Intrusion Detection Architecture. In proceedings of the 18th ACM/SIGSAC Conference on Computer and Communications Security (CCS). October 2011, Chicago, IL, USA. Icon pdf (377.0 KB)
  • Georgios Kontaxis, Michalis Polychronakis, Evangelos P. Markatos. SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-On Platforms. In proceedings of the 14th Information Security Conference (ISC). October 2011, Xi'an, China. Icon pdf (352.4 KB)
  • Vladimir Dimitrov, Zlatogor Minchev, Dimitar Todorov, Hristo Turlakov. An Approach to Security Analysis of Distributed Computing GRID Environment. In Proceedings of the International Conference "Automatics & Informatics '11". October 2011, Sofia, Bulgaria. Icon pdf (297.8 KB)
  • Farnaz Moradi, Tomas Olovsson, and Philippas Tsigas. The anti-social behavior of spam. In Proceedings of the 7th European Conference on Computer Network Defense (EC2ND), Göteborg, Sweden, September 2011. Icon pdf (10.5 KB)
  • Erik Bosman, Asia Slowinska, Herbert Bos. Minemu: The World's Fastest Taint Tracker. In Proceedings of the 14th International Symposium On Recent Advances In Intrusion Detection (RAID). September 2011,  Menlo Park, CA, USA. Icon pdf (427.1 KB)
  • Martina Lindorfer, Clemens Kolbitsch, Paolo Milani Comparetti. Detecting Environment-Sensitive Malware. In Proceedings of the 14th International Symposium On Recent Advances In Intrusion Detection (RAID). September 2011,  Menlo Park, CA, USA. Icon pdf (577.2 KB)
  • Christian J. Dietrich, Christian Rossow, Felix C. Freiling, Herbert Bos, Maarten van Steen, Norbert Pohlmann. On Botnets that use DNS for Command and Control. In Proceedings of the 7th European Conference on Computer Network Defense (EC2ND). September 2011, Göteborg, Sweden. Icon pdf (217.4 KB)
  • Mihai Costache, Valentin Tudor, Magnus Almgren, Marina Papatriantafilou, Christopher Saunders. Remote control of smart meters: friend or foe? In Proceedings of the 7th European Conference on Computer Network Defense (EC2ND). September 2011, Göteborg, Sweden. Icon pdf (308.0 KB)
  • Georgios Kontaxis, Iasonas Polakis, Michalis Polychronakis, Evangelos P. Markatos. dead.drop: URL-based Stealthy Messaging. In Proceedings of the 7th European Conference on Computer Network Defense (EC2ND). September 2011, Göteborg, Sweden. Icon pdf (260.8 KB)
  • Eleni Gessiou, Quang Hieu Vu, Sotiris Ioannidis. IRILD: an Information Retrieval based method for Information Leak Detection. In Proceedings of the 7th European Conference on Computer Network Defense (EC2ND). September 2011, Göteborg, Sweden. Icon pdf (234.0 KB)
  • Martin Szydlowski, Ben Y. Zhao, Engin Kirda, Christopher Kruegel. BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients. In Proceedings of the 20th International Conference on Computer Communications and Networks (ICCCN 2011). August 2011,  Maui, HI, USA. Icon pdf (336.9 KB)
  • Danesh Irani, Marco Balduzzi, Davide Balzarotti, Engin Kirda, Carlton Pu. Reverse Social Engineering Attacks in Online Social Networks. In Proceedings of the 8th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). July 2011, Amsterdam, The Netherlands. Icon pdf (297.2 KB)
  • Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis. Outsourcing Malicious Infrastructure to the Cloud. In proceedings of the 1st SysSec Workshop on Systems Security. July 2011, Amsterdam, The Netherlands. Icon pdf (247.8 KB)
  • Iasonas Polakis, Georgios Kontaxis, Sotiris Ioannidis. CAPTCHuring Automated (Smart)Phone Attacks. In proceedings of the 1st SysSec Workshop on Systems Security. July 2011, Amsterdam, The Netherlands. Icon pdf (644.6 KB)
  • Magnus Almgren, Zhang Fu, Erland Jonsson, Pierre Kleberger, Andreas Larsson, Farnaz Moradi, Tomas Olovsson, Marina Papatriantafilou, Laleh Pirzadeh,  Philippas Tsigas. Mapping Systems Security Research at Chalmers. In proceedings of the 1st SysSec Workshop on Systems Security. July 2011, Amsterdam, The Netherlands. Icon pdf (87.6 KB)
  • Federico Maggi, Stefano Zanero. Systems Security research at Politecnico di Milano. In proceedings of the 1st SysSec Workshop on Systems Security. July 2011, Amsterdam, The Netherlands. Icon pdf (381.0 KB)
  • Kiril Boyanov. The security aspects of the research activities in IICT-BAS. In proceedings of the 1st SysSec Workshop on Systems Security. July 2011, Amsterdam, The Netherlands. Icon pdf (62.3 KB)
  • Herbert Bos, Lorenzo Cavallaro. Systems Security at VU University Amsterdam. In proceedings of the 1st SysSec Workshop on Systems Security. July 2011, Amsterdam, The Netherlands. Icon pdf (90.0 KB)
  • Francesco Roveta, Luca di Mario, Federico Maggi, Giorgio Caviglia, Stefano Zanero, Paolo Ciuccarelli. BURN: Baring Unknown Rogue Networks. In proceedings of VizSec 2011. July 2011, Pittsburg, PA, USA Icon pdf (2.5 MB)
  • Andreas Larsson, Philippas Tsigas. A Self-stabilizing (k,r)-clustering Algorithm with Multiple Paths for Wireless Ad-hoc Networks. In proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS 2011), June 2011, Minneapolis, Minnesota, USA. Icon pdf (154.5 KB)
  • Pierre Kleberger, Tomas Olovsson, Erland Jonsson. Security Aspects of the In-Vehicle Network in the Connected Car. In proceedings of the 2011 IEEE Intelligent Vehicles Symposium (VI 2011). June 2011, Baden-Baden, Germany. Icon pdf (144.3 KB)
  • Willem De Bruijn, Herbert Bos, Henri Bal. Application-tailored I/O with Streamline. In ACM Transactions on Computer Systems (TOCS), Volume 29, Issue 2. May 2011. Icon pdf (363.1 KB)
  • Farnaz Moradi, Magnus Almgren, Wolfgang John, Tomas Olovsson, Philippas Tsigas. On Collection of Large-Scale Multi-Purpose Datasets on Internet Backbone Links. In proceedings of the First Work- shop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS). April 2011, Salzburg, Austria. Icon pdf (167.0 KB)
  • Georgios Kontaxis, Demetris Antoniades, Iasonas Polakis, Evangelos P. Markatos. An Empirical Study on the Security of Cross-Domain Policies in Rich Internet Applications. In proceedings of the 4th European Workshop on System Security (EuroSec). April 2011, Salzburg, Austria. Icon pdf (339.9 KB)
  • Zacharias Tzermias, Giorgos Sykiotakis, Michalis Polychronakis, Evangelos P. Markatos. Combining Static and Dynamic Analysis for the Detection of Malicious Documents. In proceedings of the 4th European Workshop on System Security (EuroSec). April 2011, Salzburg, Austria. Icon pdf (240.8 KB)
  • Leyla Bilge, Andrea Lanzi, Davide Balzarotti. Thwarting Real-Time Dynamic Unpacking. In proceedings of the 2011 European Workshop on System Security (EuroSec). April 2011, Salzburg, Austria. Icon pdf (80.7 KB)
  • Iasonas Polakis, Georgios Kontaxis, Sotiris Ioannidis, Evangelos P. Markatos. Dynamic Monitoring of Dark IP Address Space. In proceedings of the COST TMA International Workshop on Traffic Monitoring and Analysis (TMA) (poster session). April 2011, Vienna, Austria. Icon pdf (200.1 KB)
  • Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis, Evangelos P. Markatos. Detecting Social Network Profile Cloning. In proceedings of the 3rd IEEE International Workshop on SEcurity and SOCial Networking (SESOC). March 2011, Seattle, WA, USA. Icon pdf (199.5 KB)
  • Demetris Antoniades, Iasonas Polakis, Georgios Kontaxis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos, Thomas Karagiannis. we.b: The Web of Short URLs. In proceedings of the 20th International World Wide Web Conference (WWW). March 2011, Hyderabad, India. Icon pdf (4.4 MB)
  • Nick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, Davide Balzarotti. Exposing the Lack of Privacy in File Hosting Services. In proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET). March 2011, Boston, MA, USA. Icon pdf (149.8 KB)
  • Zhang Fu, Marina Papatriantafilou, Philippas Tsigas. CluB: A Cluster Based Proactive Method for Mitigating Distributed Denial of Service Attacks. In proceedings of the 26th ACM Symposium on Applied Computing (SAC). March 2011, TaiChung, Taiwan. Icon pdf (923.1 KB)
  • Theodoor Scholte, Davide Balzarotti, Engin Kirda. Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications. In proceedings of the 15th International Conference on Financial Cryptography and Data Security (FC). February 2011, St. Lucia.  Icon pdf (210.3 KB)
  • Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna. PiOS: Detecting Privacy Leaks in iOS Applications. In proceedings of the 18th Annual Network & Distributed System Security Symposium (NDSS). February 2011, San Diego, CA, USA. Icon pdf (272.1 KB)
  • Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. In proceedings of the 18th Annual Network & Distributed System Security Symposium (NDSS). February 2011, San Diego, CA, USA. Icon pdf (201.3 KB)
  • Asia Slowinska, Traian Stancescu, Herbert Bos. Howard: a dynamic excavator for reverse engineering data structures. In proceedings of the 18th Annual Network & Distributed System Security Symposium (NDSS). February 2011, San Diego, CA, USA. Icon pdf (431.0 KB)

2010

  • Andreas Larsson, Philippas Tsigas. Self-stabilizing (k,r)-Clustering in Wireless Ad-hoc Networks with Multiple Paths. Brief announcement in Proceedings of 14th International Conference On Principles Of Distributed Systems (OPODIS). December 2010, Tozeur, Tunisia. Icon pdf (154.5 KB)
  • Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, Engin Kirda. G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries. In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC). December 2010, Austin, TX, USA. Icon pdf (262.9 KB)
  • Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos. Comprehensive Shellcode Detection using Runtime Heuristics.  In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC). December 2010, Austin, TX, USA. Icon pdf (323.7 KB)
  • Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, Herbert Bos. Paranoid Android: Versatile Protection For Smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC). December 2010, Austin, TX, USA. Icon pdf (572.9 KB)
  • Zlatogor Minchev, Maria Petkova. Information Processes and Threats in Social Networks: A Case Study. In Conjoint Scientific Seminar "Modelling and Control of Information Processes". Organized by College of Telecommunications, Institute of ICT - Bulgarian Academy of Sciences and Institute of Mathematics and Informatics - Bulgarian Academy of Sciences. November 2010, Sofia, Bulgaria. Icon pdf (365.1 KB)
  • Phuong Nguyen, Wil Kling, Giorgos Georgiadis, Marina Papatriantafilou, Anh Tuan Le, Lina Bertling. Distributed Routing Algorithms to Manage Power Flow in Agent-Based Active Distribution Network. Proceedings of 1st Conference on Innovative Smart Grid Technologies Europe. Göteborg, Sweden, October 2010. Icon pdf (398.1 KB)
  • Magnus Almgren and Wolfgang John. Tracking Malicious Hosts on an 10Gbps Backbone Link. Proceedings of the 15th Nordic Conference in Secure IT Systems (NordSec 2010), October 2010, Espoo, Finland. Icon pdf (235.2 KB)
  • Iasonas Polakis, Georgios Kontaxis, Spiros Antonatos, Eleni Gessiou, Thanasis Petsas, Evangelos P. Markatos. Using Social Networks to Harvest Email Addresses. In Proceedings of the 9th Workshop on Privacy in the Electronic Society (WPES), co-located with ACM CCS. Chicago, IL, USA, October 2010. Icon pdf (187.8 KB)
  • Elias Athanasopoulos, Antonis Krithinakis, Evangelos P. Markatos. An Architecture For Enforcing JavaScript Randomization in Web2.0 Applications.  Short paper in Proceedings of the 13th Information Security Conference (ISC 2010). October 2010, Boca Raton, FL, USA. Icon pdf (120.1 KB)
  • Georgios Kontaxis, Iasonas Polakis, Spiros Antonatos, Evangelos P. Markatos. Experiences and observations from the NoAH infrastructure. In Proceedings of the 6th European Conference on Computer Network Defense (EC2ND). Berlin, Germany, October 2010. Icon pdf (1.6 MB)
  • Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos. D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS). Athens, Greece,  September 2010. Icon pdf (166.9 KB)
  • Asia Slowinska, Traian Stancescu, Herbert Bos. DDE: Dynamic Data Structure Excavation. In Proceedings of First ACM Asia-Pacific Workshop on Systems (ACM APSYS'10). August 2010, New Delhi, India. Icon pdf (62.2 KB)