ITE - ΙΝΣΤΙΤΟΥΤΟ ΠΛΗΡΟΦΟΡΙΚΗΣ
ITE - ΙΝΣΤΙΤΟΥΤΟ ΠΛΗΡΟΦΟΡΙΚΗΣ
|  Publications of (DiSCS)  |  Workshops

Publications

Publications of (DiSCS)

Workshops (54)

Papers in Proceedings (full-paper reviewed)

  1. Papadopoulos, P., & Pachilakis, M, Chariton, A. A. , Markatos, E.P. (2022). OUTOPIA: Private User Discovery on the Internet. In proceedings of the 15th European Workshop on Systems Security (EuroSec 2022), Rennes, France, April 2022. (pdf).
  2. Saeed, T., Aziz, B., Pitsillides, A., Vassiliou, Y., Taghvaee, H., Abadal, S., Liaskos, C. K., Tsioliaridou, N. A., Ioannidis, S., Emoyon-Iredia, E., & Lestas, M. (2021). On the Use of Programmable Metasurfaces in Vehicular Networks2021 IEEE 22nd International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Lucca, Italy, Semptember 2021.
  3. Kazlouski, A., Marchioro, T., Manifavas, H., & Markatos, E.P. (2021). Do partner apps offer the same level of privacy protection? The case of wearable applications.. Proceedings of the 7th Workshop on Sensing Systems and Applications using Wrist Worn Smart Devices (WristSense), Kassel, Germany, March 2021.
  4. Papadogiannaki, E., Deyannis , D., & Ioannidis, S. (2020). Head (er) Hunter: Fast Intrusion Detection using Packet Metadata Signatures2020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Online, September 2020.
  5. Mathioudakis, F., Liaskos, C. K., Tsioliaridou, N. A., Nie, S., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2020). Advanced Physical-layer Security as an App in Programmable Wireless Environments2020 IEEE 21st International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Online, May 2020.
  6. Deyannis , D., Karnikis, D., Vasiliadis, G., & Ioannidis, S. (2020). An enclave assisted snapshot-based kernel integrity monitor3rd ACM International Workshop on Edge Systems, Analytics and Networking (EdgeSys '20), Online, April 2020.
  7. Hatzivasilis, G., Chatziadam, P., Petroulakis, N.E., Ioannidis, S., Mangini, M., Kloukinas, Ch., Yautsiukhin, A., Antoniou, M., Katehakis, D.G., & Panayiotou, M. (2019). Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Healthcare OrganizationsProceedings of 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus, September 11-13. DOI: 10.1109/CAMAD.2019.8858165, S2CID: 204232044.
  8. Solomos, K., Ilia, P., Ioannidis, S., & Kourtellis, N. (2019). Automated Measurements of Cross-Device Tracking. International Workshop on Information and Operational Technology Security Systems (IOSec 2018), Heraklion, Crete, Greece, September 2019. (pdf).
  9. Soultatos, O., Papoutsakis, M., Fysarakis, K., Hatzivasilis, G., Michalodimitrakis, M, Spanoudakis, G., & Ioannidis, S. (2019). Pattern-driven security, privacy, dependability and interoperability management of IoT environments2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), September 2019.
  10. Kritikos, K., Papoutsakis, M., Ioannidis, S., & Magoutis, K. (2019). Towards Configurable Vulnerability Assessment in the Cloud2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), September 2019.
  11. Lampropoulos, K., Georgakakos, G., & Ioannidis, S. (2019). Using blockchains to enable big data analysis of private information2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), September 2019.
  12. Liaskos, C. K., Tsioliaridou, N. A., Nie, S., Pitsillides, A., Ioannidis, S., & Akyildiz, I. (2019). An Interpretable Neural Network for Configuring Programmable Wireless EnvironmentsProceedings of the International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) 2019, Cannes, France, July 2019.
  13. Liaskos, C. K., Tsioliaridou, N. A., Pitilakis, A., Pirialakos, G. , Tsilipakos, O., Tasolamprou, A., Kantartzis, N. , Ioannidis, S., Kafesaki, M. , Pitsillides, A., & Akyildiz, I. (2019).  Joint Compressed Sensing and Manipulation of Wireless Emissions with Intelligent SurfacesProceedings of the International Workshop on IoT Applications and Industry 4.0 (IoTI4 2019), Santorini Island, Greece, May 2019.
  14. Liaskos, C. K., Tsioliaridou, N. A., & Ioannidis, S. (2019). Organizing Network Management Logic with Circular Economy PrinciplesProceedings of the 1st International Workshop on Smart Circular Economy (SmaCE 2019), Santorini Island, Greece, May 2019.
  15. Papadopoulos, P., Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2019). Is Privacy possible without Anonymity? The case for microblogging services. In proceedings of the 12th European Workshop on Systems Security (EuroSec), Dresden, Germany, March 2019. (pdf).
  16. Tzagarakis, G., Papadopoulos, P., Chariton, A. A. , Athanasopoulos, E., & Markatos, E.P. (2018). 0pass: Zero-storage Password Management Based on Password Reminders. 11th European Workshop on Systems Security (EuroSec 2018), Porto, Portugal, April 2018. (pdf).
  17. Papadopoulos, P., Kourtellis, N., & Markatos, E.P. (2018). Exclusive: How the (synced) Cookie Monster breached my encrypted VPN session. 11th European Workshop on Systems Security (EuroSec 2018), Porto, Portugal, April 2018. (pdf).
  18. Tsioliaridou, N. A., Liaskos, C. K., & Ioannidis, S. (2018). BitSurfing: Wireless Communications with Outsourced Symbol GenerationIEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2018), Barcelona, Spain, 17-19 Sept.. IEEE (pdf).
  19. Kornilakis, A., Papadopoulos, P., & Markatos, E.P. (2018). Incognitus: Privacy-Preserving User Interests in Online Social NetworksProceedings of the International Workshop on Information and Operational Technology Security Systems (IOSec 2018), Heraklion, Crete, Greece, September 2018.
  20. Liaskos, C. K., Tsioliaridou, N. A., & Ioannidis, S. (2018). Towards a Circular Economy via Intelligent MetamaterialsIEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2018), Barcelona, Spain, 17-19 Sept.. IEEE (pdf).
  21. Deyannis , D., Tsirbas, R., Vasiliadis, G., Montella, R., Kosta, S., & Ioannidis, S. (2018). Enabling GPU-assisted Antivirus Protection on Android Devices through Edge Offloading1st International Workshop on Edge Systems, Analytics and Networking, June 2018.
  22. Papoutsakis, M., Kritikos, K., Magoutis, K., & Ioannidis, S. (2018). Towards Model-Driven Application Security across Clouds5th Workshop on CrossCloud Infrastructures & Platforms, April 2018.
  23. Chariton, A. A. , Degkleri, E., Papadopoulos, P., Ilia, P., & Markatos, E.P. (2016). DCSP: Performant Certificate Revocation a DNS-based approach. Proceedings of the 9th European Workshop on Systems Security (EuroSec), London, UK, April 2016. (pdf).
  24. Papadopoulos, P., Petsas, T., Christou, G., & Vasiliadis, G. (2015). MAD: A Middleware Framework for Multi-Step Attack Detection . Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2015), Kyoto, Japan, November 2015. (pdf).
  25. Polakis, I., Ilia, P., Tzermias, Z., Ioannidis, S., & Fragopoulou, P. (2015). Social Forensics: Searching for Needles in Digital Haystacks4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2015), Kyoto, Japan, 5-5 Nov. (pp. 54-66). IEEE.
  26. Petsas, T., Voyatzis, G, Athanasopoulos, E., Polychronakis, M., & Ioannidis, S. (2014). Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android MalwareIn Proceedings of the 7th European Workshop on System Security (EuroSec), Amsterdam, The Netherlands, April 2014.
  27. Chinis, G., Pratikakis , P., Athanasopoulos, E., & Ioannidis, S. (2013). Practical Information Flow for Legacy Web ApplicationsIn Proceedings of the International Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems (ICOOOLPS), co-located with ECOOP, Montpellier, France, July 2013.
  28. Ladakis, E, Koromilas, L., Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2013). You Can Type, but You Can't Hide: A Stealthy GPU-based Keylogger In Proceedings of the 6th European Workshop on System Security (EuroSec), Prague, Czech Republic, April. (pdf).
  29. Kontaxis, G., Antoniades, D., Polakis, I., & Markatos, E.P. (2011). An Empirical Study on the Security of Cross-Domain Policies in Rich Internet ApplicationsIn Proceedings of the 4th European Workshop on System Security (EuroSec), Salzburg, Austria, April 2011. (pdf).
  30. Polakis, I., Kontaxis, G., & Ioannidis, S. (2011). CAPTCHuring Automated (Smart)Phone AttacksIn Proceedings of the 1st Workshop on Systems Security (SysSec), co-located with the 8th conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Amsterdam, The Netherlands, July 2011. (pdf).
  31. Sfakianakis, A., Athanasopoulos, E., & Ioannidis, S. (2011). CensMon: A Web Censorship Monitor. In Proceedings of the 1st USENIX Workshop on Free and Open Communications on the Internet (FOCI), co-located with the 20th USENIX Security Symposium, San Francisco, CA, USA, August 2011. (pdf).
  32. Tzermias, Z., Sykiotakis, G., Polychronakis, M., & Markatos, E.P. (2011). Combining Static and Dynamic Analysis for the Detection of Malicious DocumentsIn Proceedings of the 4th European Workshop on System Security (EuroSec), Salzburg, Austria, April 2011. (pdf).
  33. Kontaxis, G., Polakis, I., Polychronakis, M., & Markatos, E.P. (2011). dead.drop: URL-based Stealthy MessagingIn Proceedings of the 7th European Conference on Computer Network Defense (EC2ND), Gothenburg, Sweden, September 2011. (pdf).
  34. Kontaxis, G., Polakis, I., Ioannidis, S., & Markatos, E.P. (2011). Detecting Social Network Profile CloningIn Workshop Proceedings of the 9th Annual IEEE International Conference on Pervasive Computing and Communications, Seattle, WA, USA, March 2011. (pdf).
  35. Gessiou, E., Hieu Vu, Q., & Ioannidis, S. (2011). IRILD: an Information Retrieval based method for Information Leak DetectionIn Proceedings of the 7th European Conference on Computer Network Defense (EC2ND), Gothenburg, Sweden, September 2011. (pdf).
  36. Kontaxis, G., Polakis, I., & Ioannidis, S. (2011). Outsourcing Malicious Infrastructure to the CloudIn Proceedings of the 1st Workshop on Systems Security (SysSec), co-located with the 8th conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Amsterdam, The Netherlands, July 2011. (pdf).
  37. Athanasopoulos, E., Krithinakis, A., & Markatos, E.P. (2010). Hunting Cross-Site Scripting Attacks in the Network. In Proceedings of the 4th Workshop on Web 2.0 Security & Privacy (W2SP), Oakland, California, May 2010. (pdf).
  38. Papadogiannakis, A., Polychronakis, M., & Markatos, E.P. (2010). Improving the accuracy of network intrusion detection systems under load using selective packet discarding. Proceedings of the Third European Workshop on System Security, Paris, France, (pp. 15-21). New York, NY, USA: ACM (978-1-4503-0059-9), (pdf).
  39. Krithinakis, A., Athanasopoulos, E., & Markatos, E.P. (2010). Isolating javaScript in dynamic code environments. 2010 Workshop on the Analysis and Programming Languages for Web Applications and Cloud Applications, APLWACA 2010, Toronto, ON, June 6 (pp. 45-49). (9781605589138 (ISBN)), (pdf).
  40. Polakis, I., Kontaxis, G., Antonatos, S., Gessiou, E., Petsas, T., & Markatos, E.P. (2010). Using social networks to harvest email addresses9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS '10, Chicago, IL, October 4-8 (pp. 11-20). (15437221; 9781450300964 (ISBN)), (pdf).
  41. Gessiou, E., Labrinidis, A., & Ioannidis, S. (2009). A Greek (privacy) tragedy: the introduction of social security numbers in Greece. WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic society, Chicago, Illinois, USA, (pp. 101-104). New York, NY, USA: ACM (978-1-60558-783-7), (pdf).
  42. Polychronakis, M., Anagnostakis, K.G., & Markatos, E.P. (2009). An Empirical Study of Real-world Polymorphic Code Injection Attacks2nd Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET '09), Boston, MA, USA, April. (pdf).
  43. Papadakis, H., Trufino, P., Talia, D., & Fragopoulou, P. (2009). An Experimental Evaluation of the DQ-DHT Algorithm in a Grid Information Service. In Proceedings of the CoreGRID ERCIM Working Group Workshop on Grids, P2P and Service Computing. Held in conjunction With EuroPAR 2009, Delft, The Netherlands, August. (pdf).
  44. Athanasopoulos, E., Pappas, V., & Markatos, E.P. (2009). Code-Injection Attacks in Browsers Supporting Policies. In Proceedings of the Third Workshop on Web 2.0 Security & Privacy (W2SP), Oakland, CA, USA, May. (pdf).
  45. Foukarakis, M., Antoniades, D., & Polychronakis, M. (2009). Deep packet anonymization. EUROSEC '09: Proceedings of the Second European Workshop on System Security, Nuremburg, Germany, March (pp. 16-21). New York, NY, USA: ACM (978-1-60558-472-0), (pdf).
  46. Koromilas, L., Chinis, G., Fundulaki, I., & Ioannidis, S. (2009). Controlling access to XML documents over XML native and relational databases. In Proceedings of the 6th VLDB Workshop on Secure Data Management (SDM), Lyon, France, 28 August 2009 through 28 August 2009 (vol. 5776 LNCS, pp. 122-141). (03029743; 364204218X (ISBN); 9783642042188 (ISBN)), (pdf).
  47. Ciuffoletti, A., Marchetti, Y., Papadogiannakis, A., & Polychronakis, M. (2008). Prototype Implementation of a Demand-Driven Network Monitoring Architecture. CoreGRID Integration Workshop, Heraklion, Crete, Greece, April 2008. (pdf).
  48. Ciuffoletti, A., Papadogiannakis, A., & Polychronakis, M. (2007). Network Monitoring Session Description. In Proceedings of the CoreGRID Workshop on Grid Middleware (in conjunction with ISC '07), Dresden, Germany, June 2007. (pdf).
  49. Markatos, E.P. (1996). Issues in Reliable Network Memory Paging. In Proceedings of MASCOTS'96 (Int. Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems), San Jose, CA, USA, February 1996. (pdf).
  50. Markatos, E.P. (1996). Using Remote Memory to avoid Disk Thrashing:A Simulation Study. In Proceedings of MASCOTS'96 (Int. Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems), San Jose, CA, USA, February 1996. (pdf).
  51. Markatos, E.P., & Dramitinos, G. (1995). Adding Flexibility to a Remote Memory Pager.  In Fourth International Workshop on Object Orientation in Operating Systems, IWOOOS 96,  Lund, Sweden, August 1995 (pp. 183-186). (pdf).
  52. Markatos, E.P., Katevenis, M.G.H., Kalokairinos, G., & Serpanos, D.N. (1995). An Efficient Processor-Network Interface for Local Area Multiprocessors. In Proceedings of the SCIzzL Workshop on LocalArea MultiProcessors, Heraklion, Crete, Greece, October 1995 (pp. 23-32). (pdf).

Posters

  1. Papadogiannaki, E., & Ioannidis, S. (2016). An Efficient Scheduling Approach for Concurrent Packet Processing Applications on Heterogeneous Systems. 3rd ACM-W Europe Celebration of Women in Computing (womENcourage 2016), Linz, Austria, September 2016. (pdf).
  2. Polakis, I., Kontaxis, G., Ioannidis, S., & Markatos, E.P. (2011). Dynamic Monitoring of Dark IP Address SpaceIn Proceedings of the COST TMA International Workshop on Traffic Monitoring and Analysis (TMA), Vienna, Austria, April 2011. (pdf).
Found: 54 publications