April 9, 2018

Publications

Journal Articles

2018

  1. Jeffrey M. VoasRick KuhnConstantinos KoliasAngelos StavrouGeorgios Kambourakis:
    Cybertrust in the IoT Age. IEEE Computer 51(7): 12-15 (2018)
  2. Mohamed ElsabaghDaniel BarbaráDan FleckAngelos Stavrou:
    On early detection of application-level resource exhaustion and starvation.  Journal of Systems and Software 137: 430-447 (2018)
  3. Fengwei ZhangKevin LeachAngelos StavrouHaining Wang:
    Towards Transparent Debugging. IEEE Trans. Dependable Sec. Comput. 15(2): 321-335 (2018)
  4. Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou, Jeff Offutt:
    Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities. AsiaCCS 2018: 777-791 (2018)
  5. Haitao Xu, Zhao Li, Chen Chu, Yuanmi Chen, Yifan Yang, Haifeng Lu, Haining Wang, Angelos Stavrou:
    Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace. ESORICS (2) 2018: 143-163 (2018)
  6. Shuai Hao, Yubao Zhang, Haining Wang, Angelos Stavrou:
    End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks. USENIX Security Symposium 2018: 1129-1145 (2018)
  7. Angelos Stavrou, Konrad Rieck:
    Proceedings of the 11th European Workshop on Systems Security, EuroSec@EuroSys 2018, Porto, Portugal, April 23, 2018. ACM (2018) [contents]

2017

  1. Angelos Stavrou, Jeffrey M. Voas:
    Verified Time. IEEE Computer 50(3): 78-82 (2017)
  2. Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, Jeffrey M. Voas:
    DDoS in the IoT: Mirai and Other Botnets. IEEE Computer 50(7): 80-84 (2017)
  3. Jean-Pierre Auffret, Jane L. Snowdon, Angelos Stavrou, Jeffrey S. Katz, Diana Kelley, Rasheq S. Rahman, Frank Stein, Lisa Sokol, Peter Allor, Peng Warweg:
    Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems. Journal of Interconnection Networks 17(1): 1-20 (2017)
  4. Haitao Xu, Daiping Liu, Haining Wang, Angelos Stavrou:
    An Empirical Investigation of Ecommerce-Reputation-Escalation-as-a-Service. TWEB 11(2): 13:1-13:35 (2017)
  5. Avinash Srinivasan, Hunter Dong, Angelos Stavrou:
    FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance. ARES 2017: 82:1-82:8 (2017)
  6. Mohamed Elsabagh, Dan Fleck, Angelos Stavrou:
    Strict Virtual Call Integrity Checking for C++ Binaries. AsiaCCS 2017: 140-154 (2017)
  7. Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou:
    Detecting ROP with Statistical Learning of Program Characteristics. CODASPY 2017: 219-226 (2017)
  8. Daiping Liu, Xing Gao, Mingwei Zhang, Haining Wang, Angelos Stavrou:
    Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency. DSN 2017: 615-626
  9. Constantinos Kolias, Lucas Copi, Fengwei Zhang, Angelos Stavrou:
    Breaking BLE Beacons For Fun But Mostly Profit. EUROSEC 2017: 4:1-4:6 (2017)
  10. Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang, Angelos Stavrou:
    E-Android: A New Energy Profiling Tool for Smartphones. ICDCS 2017: 492-502 (2017)
  11. Jonathan Bell, Thomas D. LaToza, Foteini Baldmitsi, Angelos Stavrou:
    Advancing Open Science with Version Control and Blockchains. SE4Science@ICSE 2017: 13-14 (2017)
  12. Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
    Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems. MALWARE 2017: 67-74 (2017)
  13. Georgios Kambourakis, Constantinos Kolias, Angelos Stavrou:
    The Mirai botnet and the IoT Zombie Armies. MILCOM 2017: 267-272 (2017)
  14. Ryan Johnson, Rahul Murmuria, Angelos Stavrou, Vincent Sritapan:
    Pairing continuous authentication with proactive platform hardening. PerCom Workshops 2017: 88-90 (2017)
  15. Rahul Murmuria, Angelos Stavrou, Daniel Barbará, Vincent Sritapan:
    Your data in your hands: Privacy-preserving user behavior models for context computation. PerCom Workshops 2017: 170-175 (2017)
  16. Mohamed Elsabagh, Dan Fleck, Angelos Stavrou, Michael Kaplan, Thomas Bowen:
    Practical and Accurate Runtime Application Protection Against DoS Attacks. RAID 2017: 450-471 (2017)
  17. Bhavani M. Thuraisingham, Ghassan Karame, Angelos Stavrou:
    Proceedings of the 9th Cloud Computing Security Workshop, CCSW@CCS 2017, Dallas, TX, USA, November 3, 2017. ACM 2017, ISBN 978-1-4503-5204-8 [contents] (2017)
  18. Cristiano Giuffrida, Angelos Stavrou:
    Proceedings of the 10th European Workshop on Systems Security, EUROSEC 2017, Belgrade, Serbia, April 23, 2017. ACM 2017, ISBN 978-1-4503-4935-2 [contents] (2017)
  19. Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
    Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems. CoRR abs/1704.06794(2017)
  20. Neda Nasiriani, Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
    Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks. CoRR abs/1712.01102 (2017)

2016

  1. Angelos Stavrou, Daniel Fleck, Constantinos Kolias:
    On the Move: Evading Distributed Denial-of-Service Attacks. IEEE Computer 49(3): 104-107 (2016)
  2. Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, Stefanos Gritzalis:
    Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset. IEEE Communications Surveys and Tutorials 18(1): 184-208 (2016)
  3. Constantinos Kolias, Angelos Stavrou, Jeffrey M. Voas, Irena Bojanova, D. Richard Kuhn:
    Learning Internet-of-Things Security “Hands-On”. IEEE Security & Privacy 14(1): 37-46 (2016)
  4. Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou:
    Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms. ACNS 2016: 193-211 (2016)
  5. Charles Smutz, Angelos Stavrou:
    When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors. NDSS 2016 (2016)
  6. Rahul Murmuria, Angelos Stavrou:
    Authentication Feature and Model Selection using Penalty Algorithms. WAY@SOUPS 2016 (2016)

2015

  1. Constantinos Kolias, Angelos Stavrou, Jeffrey M. Voas:
    Securely Making “Things” Right. IEEE Computer 48(9): 84-88 (2015)
  2. Fengwei Zhang, Kevin Leach, Haining Wang, Angelos Stavrou:
    TrustLogin: Securing Password-Login on Commodity Operating Systems. AsiaCCS 2015: 333-344 (2015)
  3. Ryan Johnson, Nikolaos Kiourtis, Angelos Stavrou, Vincent Sritapan:
    Analysis of content copyright infringement in mobile application markets. eCrime 2015: 43-52
  4. Shuai Hao, Haining Wang, Angelos Stavrou, Evgenia Smirni:
    On the DNS Deployment of Modern Web Services. ICNP 2015: 100-110 (2015)
  5. Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou, Vincent Sritapan:
    Targeted DoS on android: how to disable android in 10 seconds or less. MALWARE 2015: 136-143 (2015)
  6. Charles Smutz, Angelos Stavrou:
    Preventing Exploits in Microsoft Office Documents Through Content Randomization. RAID 2015: 225-246 (2015)
  7. Rahul Murmuria, Angelos Stavrou, Daniel Barbará, Dan Fleck:
    Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users. RAID 2015:405-424 (2015)
  8. Haitao Xu, Haining Wang, Angelos Stavrou:
    Privacy Risk Assessment on Online Photos. RAID 2015: 427-447 (2015)
  9. Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou:
    Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks. RAID 2015: 515-537 (2015)
  10. Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang, Kun Sun:
    Using Hardware Features for Increased Debugging Transparency. IEEE Symposium on Security and Privacy 2015: 55-69 (2015)
  11. Haitao Xu, Daiping Liu, Haining Wang, Angelos Stavrou:
    E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service. WWW 2015: 1296-1306 (2015)

2014

  1. A Moving Target DDoS Defense Mechanism
    Huangxin Wang, Quan Jia, Dan Fleck, Walter Powell, Fei Li, Angelos Stavrou.
    In the Elsevier Journal of Computer Communications, (2014, vol 46).
  2. HyperCheck: A Hardware-Assisted Integrity Monitor
    Fengwei Zhang, Jiang Wang, Kun Sun, and Angelos Stavrou.
    In the IEEE Transactions on Dependable and Secure Computing (TDSC), (2014, vol 11)
  3. Brett CooleyHaining WangAngelos Stavrou:
    Activity Spoofing and Its Defense in Android Smartphones. ACNS 2014: 494-512 (2014)
  4. Fengwei ZhangHaining WangKevin LeachAngelos Stavrou:
    A Framework to Secure Peripherals at Runtime. ESORICS (1) 2014: 219-238 (2014)
  5. Haitao XuDaiping LiuAaron KoehlHaining WangAngelos Stavrou:
    Click Fraud Detection on the Advertiser Side. ESORICS (2) 2014: 419-438

2013

  1. Improving network response times using social information
    Sharath Hiremagalore, Chen Liang, Angelos Stavrou and Huzefa Rangwala.
    Proceedings of Social Network Analysis and Mining, Springer
    Social Network Analysis and Mining, Volume 3, P:209-220 (2013)
  2. Quan JiaKun SunAngelos Stavrou:
    Capability-Based Defenses Against DoS Attacks in Multi-path MANET Communications. Wireless Personal Communications 73(1): 127-148(2013)
  3. Providing Users’ Anonymity in Mobile Hybrid Networks
    ACM Transactions on Internet Technology, Volume 12(3): 7 (2013)
  4. Avinash SrinivasanSrinath Thirthahalli NazarajAngelos Stavrou:
    HIDEINSIDE – A novel randomized & encrypted antiforensic information hiding. ICNC 2013: 626-631 (2013)
    Claudio Agostino Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou:
  5. Angelos Stavrou:
    Programming on Android: Best Practices for Security and Reliability. SERE 2013: 1-2 (2013)

2012

  1. Building Security into Off-the-Shelf Smartphones
    Angelos Stavrou, Jeffrey Voas, Tom Karygiannis, Steve Quirolgico,
    Computer, vol. 45, no. 2, pp. 82-84, Feb. 2012, doi:10.1109/MC.2012.44 (2012)
  2. Riyadh MahmoodNaeem EsfahaniThabet KacemNariman MirzaeiSam MalekAngelos Stavrou:
    A whitebox approach for automated security testing of Android applications on the cloud. AST 2012: 22-28 (2012)
  3. Zhaohui WangRahul MurmuriaAngelos Stavrou:
    Implementing and Optimizing an Encryption Filesystem on Android. MDM 2012: 52-62 (2012)
  4. Zhaohui WangAngelos Stavrou:
    Attestation & Authentication for USB Communications. SERE (Companion) 2012: 43-44 (2012)
  5. Ryan JohnsonZhaohui WangCorey GagnonAngelos Stavrou:
    Analysis of Android Applications’ Permissions. SERE (Companion) 2012: 45-46 (2012)
  6. Nelson NazzicariJavier AlmillateguiAngelos StavrouSushil Jajodia:
    Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification. STM 2012: 161-176 (2012)

2011

  1. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
    Meixing Le, Angelos Stavrou, Brent ByungHoon Kang.
    In IEEE Journal on Transactions on Dependable and Secure Computing (TDSC) 2011, ISSN: 1545-5971
    10 Nov. 2011. IEEE computer Society Digital Library. IEEE Computer Society.
    Acceptance Rate: 10-12% as reported by 2009 TDSC editorial, ISI Impact Factor: 2.093 (2011).
  2. The Ephemeral Legion: Producing an Expert Cyber-security Workforce from Thin Air
    Michael E. Locasto, Anup Ghosh, Sushil Jajodia, and Angelos Stavrou.
    In the Proceedings of the Communications of the ACM, Vol. 54, Issue 1, pp 129—131.
    Impact Factor: 2.362 (2011).
  3. DaeHun NyangAbedelaziz MohaisenTaekyoung KwonBrent ByungHoon KangAngelos Stavrou:
    Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface. CoRR abs/1112.2245 (2011)
  4. Quan JiaKun SunAngelos Stavrou:
    CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET. ICCCN 2011: 1-6
  5. Angelos Stavrou:
    TCP Modulation Attacks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1279-1281

2010

  1. On the Infeasibility of Modeling Polymorphic Shellcode: Re-thinking the Role of Learning in Intrusion Detection Systems 
    Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, and Salvatore J. Stolfo.
    In the Proceedings of Machine Learning Journal (MLJ) p. 179-205. Accepted: 7 August 2009, Published
    online: 29 October 2009.  Editors: Pavel Laskov and Richard Lippmann. ISI Impact Factor: 1.956 (2010). [bib]
  2. A Lightweight, Robust, P2P System to Handle Flash Crowds
    Angelos Stavrou, Dan Rubenstein, Sambit Sahu.
    In the Proceedings of IEEE Journal on Selected Areas in Communications (JSAC), special issue on Service
    Overlay Networks, Volume 22, Number 1, p. 6-17, January 2004. Impact Factor: 4.232 (2010). [bib]

2009

  1. The Dynamic Community of Interest and its Realization in ZODIAC
    Scott Alexander, Steve Bellovin, Yuu-Heng Cheng, Brian Coan, Andrei Ghetie,
    Vikram Kaul, Nicholas F. Maxemchuk, Henning Schulzrinne, Stephen Schwab, Bruce Siegell,
    Angelos Stavrou, and Jonathan M. Smith.
    In IEEE Communications Magazine, October 2009, pp. 40-47. Impact Factor: 2.837 (2009)
  2. On the Infeasibility of Modeling Polymorphic Shellcode: Re-thinking the Role of Learning in Intrusion Detection Systems 
    Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, and Salvatore J. Stolfo.
    In the Proceedings of Machine Learning Journal (MLJ) p. 179-205. Accepted: 7 August 2009, Published
  3. Angelos StavrouRicardo A. BarratoAngelos D. KeromytisJason Nieh:
    A2M: Access-Assured Mobile Desktop Computing. ISC 2009: 186-201
  4. Alex ShermanAngelos StavrouJason NiehAngelos D. KeromytisClifford Stein:
    Adding Trust to P2P Distribution of Paid Content. ISC 2009: 459-474
  5. Gabriela F. Cretu-CiocarlieAngelos StavrouMichael E. LocastoSalvatore J. Stolfo:
    Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. RAID 2009: 41-60
  6. Anyi LiuYi YuanDuminda WijesekeraAngelos Stavrou:
    SQLProb: a proxy-based architecture towards preventing SQL injection attacks. SAC 2009: 2054-2061
  7. Quan JiaZhaohui WangAngelos Stavrou:
    The Heisenberg Measuring Uncertainty in Lightweight Virtualization Testbeds. CSET 2009

2008

  1. Michael E. LocastoAngelos Stavrou:
    The Hidden Difficulties of Watching and Rebuilding Networks. IEEE Security & Privacy 6(2): 79-82 (2008)
  2. Angelos StavrouMichael E. LocastoAngelos D. Keromytis:
    Pushback for Overlay Networks: Protecting Against Malicious Insiders. ACNS 2008: 39-54
  3. Claudio Agostino ArdagnaAngelos StavrouSushil JajodiaPierangela SamaratiRhandi Martin:
    A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks. PiLBA 2008
  4. Michael E. LocastoAngelos StavrouGabriela F. CretuAngelos D. KeromytisSalvatore J. Stolfo:
    Return Value Predictability Profiles for Self-healing. IWSEC 2008: 152-166
  5. Elli AndroulakiMariana RaykovaShreyas SrivatsanAngelos StavrouSteven M. Bellovin:
    PAR: Payment for Anonymous Routing. Privacy Enhancing Technologies 2008: 219-236
  6. Alireza Pirayesh SabzevarAngelos Stavrou:
    Universal Multi-Factor Authentication Using Graphical Passwords. SITIS 2008: 625-632
  7. Sambuddho ChakravartyAngelos StavrouAngelos D. Keromytis:
    Identifying Proxy Nodes in a Tor Anonymization Circuit. SITIS 2008: 633-639
  8. Gabriela F. CretuAngelos StavrouMichael E. LocastoSalvatore J. StolfoAngelos D. Keromytis:
    Casting out Demons: Sanitizing Training Data for Anomaly Sensors. IEEE Symposium on Security and Privacy 2008: 81-95

2007

  1. Wei-Jen LiSalvatore J. StolfoAngelos StavrouElli AndroulakiAngelos D. Keromytis:
    A Study of Malcode-Bearing Documents. DIMVA 2007: 231-250

2006

  1. Angelos StavrouMichael E. LocastoAngelos D. Keromytis:
    W3Bcrypt: Encryption as a Stylesheet. ACNS 2006: 349-364
  2. Michael E. LocastoAngelos StavrouAngelos D. Keromytis:
    Dark application communities. NSPW 2006: 11-18

2005

  1. Angelos StavrouDebra L. CookWilliam G. MoreinAngelos D. KeromytisVishal MisraDan Rubenstein:
    WebSOS: an overlay-based system for protecting web servers from denial of service attacks. Computer Networks 48(5): 781-807 (2005)
  2. Stephen T. ChouAngelos StavrouJohn IoannidisAngelos D. Keromytis:
    gore: Routing-Assisted Defense Against DDoS Attacks. ISC 2005: 179-193
  3. Angelos StavrouAngelos D. KeromytisJason NiehVishal MisraDan Rubenstein:
    MOVE: An End-to-End Solution to Network Denial of Service. NDSS 2005
  4. WebSOS: An Overlay-based System For Protecting Web Servers From Denial of Service Attacks
    Angelos Stavrou, Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, and Dan Rubenstein.
    In Elsevier Journal of Computer Networks, special issue on Web and Network Security, vol. 48, no. 5,
    p. 781 – 807. August 2005 5-Year Impact Factor: 1.690. [bib]

2004

  1. Angelos StavrouDan RubensteinSambit Sahu:
    A lightweight, robust P2P system to handle flash crowds. IEEE Journal on Selected Areas in Communications 22(1): 6-17 (2004)
  2. Edward G. Coffman Jr.Andreas ConstantinidesDan RubensteinF. Bruce ShepherdAngelos Stavrou:
    Content distribution for seamless transmission. SIGMETRICS Performance Evaluation Review 32(2): 31-32 (2004)
  3. Angelos StavrouJohn IoannidisAngelos D. KeromytisVishal MisraDan Rubenstein:
    A Pay-per-Use DoS Protection Mechanism for the Web. ACNS 2004: 120-134

2002

  1. Angelos StavrouDan RubensteinSambit Sahu:
    A Lightweight, Robust P2P System to Handle Flash Crowds. ICNP 2002: 226-235

 

 

Conference Publications

2017

  1. Ghassan O. Karame, Angelos Stavrou:
    CCSW’17: 2017 ACM Cloud Computing Security. ACM Conference on Computer and Communications Security 2017: 2627-2628 (2017)

2014

  1. transAD: An Anomaly Detection Network Intrusion Sensor for the Web
    Sharath Hiremagalore, Daniel Barbar ?a, Dan Fleck, Walter Powell, and Angelos Stavrou.
    In the Proceedings of International Security Conference (ISC 2014), Leipzig, Germany, (June 2014)
  2. Catch Me if You Can: A Cloud-Enabled DDoS Defense
    Quan Jia, Huangxin Wang, Dan Fleck, Fei Li, Angelos Stavrou, Walter A. Powell.
    In the Proceedings of the 44th Annual IEEE/IFIP International Conference on
    Dependable Systems and Networks (IEEE DSN 2014), Atlanta, Georgia USA,
    June 23 – 26, 2014.
  3. Angelos StavrouHerbert BosGeorgios Portokalidis:
    Research in Attacks, Intrusions and Defenses – 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings. Lecture Notes in Computer Science 8688, Springer 2014, ISBN 978-3-319-11378-4 [contents]
  4. Detecting Malicious Javascript in PDF through Document Instrumentation
    Daiping Liu, Haining Wang, and Angelos Stavrou.
    In the Proceedings of the 44th Annual IEEE/IFIP International Conference on
    Dependable Systems and Networks (IEEE DSN 2014), Atlanta, Georgia USA,
    June 23 – 26, 2014.

2013

  1. PyTrigger: A System to Trigger & Extract User-Activated Malware Behavior
    Dan Fleck, Arnur Tokhtabayev, Alex Alarif, Angelos Stavrou, and Tomas Nykodym.
    In the proceedings of the 8th ARES Conference (ARES 2013),
    University of Regensburg, Germany September 2nd – 6th, 2013.
  2. MOTAG: Moving Target Defense Against Internet Denial of Service Attacks
    Quan Jia, Kun Sun, Angelos Stavrou.
    In the proceedings of the International Conference on Computer Communications
    and Networks ICCCN 2013 
    Nassau, Bahamas July 30 – August 2, 2013.
  3. Scott D. ApplegateAngelos Stavrou:
    Towards a Cyber Conflict Taxonomy. CyCon 2013: 1-18
  4. Behavioral Analysis of Android Applications Using Automated Instrumentation
    Mohammad Karami, Mohamed Elsabagh, Parnian Najafiborazjani, and Angelos Stavrou.
    In the Proceedings of the 7th International Conference on Software Security and Reliability
    (IEEE SERE 2013)
    , 18-20 June 2013, Washington DC, USA.
  5. Forced-Path Execution for Android Applications on x86 Platforms
    Ryan Johnson, and Angelos Stavrou.
    In the Proceedings of the 7th International Conference on Software Security and Reliability
    (IEEE SERE 2013),
     18-20 June 2013, Washington DC, USA.
  6. Spectre: A Dependable Introspection Framework via System Management Mode
    Fengwei Zhang, Kevin Leach, Kun Sun, and Angelos Stavrou.
    In the Proceedings of the 43nd Annual IEEE/IFIP International Conference on
    Dependable Systems and Networks (IEEE DSN 2013), Budapest, 24 – 27 June 2013.
  7. Exposing Software Security and Availability Risks For Commercial Mobile Devices (CMDs)
    Ryan Johnson, Zhaohui Wang, Angelos Stavrou, and Jeff Voas.
    In the Proceedings of the IEEE RAMS 2013, Orlando, Florida, 28 – 31 January 2013.

2012

  1. Malicious PDF Detection Using Metadata and Structural Features
    Charles Smutz and Angelos Stavrou.
    In the Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC), Orlando,
    Florida, USA, December 3–7, 2012.
  2. Malware Characterization using Behavioral Components
    Chaitanya Yavvari, Arnur Tokhtabayev, Huzefa Rangwala, and Angelos Stavrou.
    In the Proceedings of 6th International Conference “Mathematical Methods, Models, and Architectures for
    Computer Network Security
    “, St. Petersburg, Russia, October 17-20, 2012.
  3. Exposing Security Risks for Commercial Mobile Devices(Invited)
    Zhaohui Wang, Ryan Johnson, Rahul Murmuria, and Angelos Stavrou.
    In the Proceedings of 6th International Conference “Mathematical Methods, Models, and Architectures for
    Computer Network Security
    “, St. Petersburg, Russia, October 17-20, 2012.
  4. Mobile Application and Device Power Usage Measurements 
    Rahul Murmuria, Jeffrey Medsger, Angelos Stavrou.
    In the Proceedings of the 6th International Conference on Software
    Security and Reliability (SERE 2012), Washington, DC, June 2012.
  5. Netgator: Malware Detection Using Program Interactive Challenges
    Brian Schulte, Haris Andrianakis, Kun Sun, Angelos Stavrou.
    In the Proceedings of the 9th Conference on Detection of Intrusions and Malware
    & Vulnerability Assessment (DIMVA 2012), Heraklion, Crete, Greece, July 26-27th, 2012.
  6. A Dependability Analysis of Hardware-Assisted Polling Integrity Checking Systems
    Jiang Wang, Kun Sun, and Angelos Stavrou.
    In the Proceedings of the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and
    Networks (DSN 2012), Boston, Massachusetts, June, 2012.
  7. Implementing & Optimizing an Encryption File System on Android
    Zhaohui Wang, Rahul Murmuria, and Angelos Stavrou.
    In the Proceedings of the IEEE International Conference on Mobile Data Management
    (IEEE MDM 2012)
    , July 23 – 26, 2012, Bangalore, India. (Acceptance Rate: 22/88)
  8. Analysis Android Applications’ Permissions (short paper)
    Ryan Johnson, Zhaohui Wang, Corey Gagnon and Angelos Stavrou.
    In the Proceedings of the 6th International Conference on Software Security and Reliability (SERE 2012),
    Washington, DC, June 2012.
  9. Mutual Authentication for USB Communications (short paper)
    Zhaohui Wang, Ryan Johnson and Angelos Stavrou.
    In the Proceedings of the 6th International Conference on Software Security and Reliability (SERE 2012),
    Washington, DC, June 2012.
  10. A Framework for Automated Security Testing of Android Applications on the Cloud (short paper)
    Sam Malek, Naeem Esfahani, Thabet Kacem, Riyadh Mahmood, Nariman Mirzaei, and Angelos Stavrou.
    In the Proceedings of the 6th International Conference on Software Security and Reliability (SERE 2012),
    Washington, DC, June 2012.
  11. SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes
    Kun Sun, Jiang Wang, Fengwei Zhang and Angelos Stavrou.
    In the Proceedings of the 19th Annual Network & Distributed System Security Symposium NDSS 2012,
    San Diego, California, 5-8 February 2012. Impact Factor: 2.60 (Acceptance Rate: 46/258 – 17.8%).  [Presentation]
  12. Hardware-Assisted Application Integrity Monitor
    Jiang Wang, Kun Sun, Angelos Stavrou.
    In the Proceedings of IEEE Hawaii International Conference on System Sciences (HICSS45) pp. 5375-5383,
    45th Hawaii International Conference on System Sciences, 2012 January 4-7, 2012, Grand Wailea, Maui, USA.
    Impact Factor: N/A, (Acceptance Rate: N/A).
  13. Angelos D. KeromytisRoxana GeambasuSimha SethumadhavanSalvatore J. StolfoJunfeng YangAzzedine BenameurMarc DacierMatthew C. ElderDarrell M. KienzleAngelos Stavrou:
    The MEERKATS Cloud Security Architecture. ICDCS Workshops 2012: 446-450

2011

  1. Erin KenneallyAngelos StavrouJohn McHughNicolas Christin:
    Moving Forward, Building an Ethics Community (Panel Statements). Financial Cryptography Workshops 2011: 178-183
  2. Cross-domain Collaborative Anomaly Detection: So Far Yet So Close
    Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, Salvatore J. Stolfo.
    In the Proceedings of the 14th International Symposium on Recent
    Advances in Intrusion Detection (RAID). September 2011, Menlo Park, CA.
    Impact Factor: 2.20 (Acceptance rate: 20/87 – 23%).
  3. Trading Elephants For Ants: Efficient Post-Attack Reconstitution (Short paper)
    Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou, Anup Ghosh and Sushil Jajodia
    In the Proceedings of the 7th International ICST Conference on Security and Privacy
    in Communication Networks (Securecomm 2011), p. 1-10, September 7-9 2011, London.
    Impact Factor: N/A, (Acceptance rate: 24%).
  4. Predicting Network Response Times Using Social Information (short paper)
    Chen Liang, Sharath Hiremagalore, Angelos Stavrou and Huzefa Rangwala.
    In the Proceedings of the ACM 2011 Conference on Advances in Social Networks Analysis and Mining,
    p. 527-531, July, 2011, Kaohsiung, Taiwan. Impact Factor: N/A, (Acceptance rate: 25%) [bib]
  5. Breaching and Protecting an Anonymizing Network System
    Jason Clark and Angelos Stavrou.
    In the Proceedings of the 6th Annual Symposium on Information Assurance (ASIA ‘11).
    Impact Factor: N/A, (Acceptance rate: 50%). (2011)
  6. Advantages and disadvantages of remote asynchronous usability testing using amazon mechanical turk
    Erik Nelson and Angelos Stavrou.
    Proceedings of the Human Factors and Ergonomics Society 55th Annual Meeting, pages 1080-1084, HFES
    2011 Conference, Red Rock Resort, Las Vegas, Nevada, September 19-23, 2011.
    Impact Factor: N/A, (Acceptance rate: N/A).
  7. Jiang WangFengwei ZhangKun SunAngelos Stavrou:
    Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics. SADFE 2011: 1-5
  8. Exploiting Smart-Phone USB Connectivity For Fun And Profit (Extended Version)
    Angelos Stavrou and Zhaohui Wang.
    BlackHat Technical Conference DC 2011 – Technical Briefings Session.

2010

  1. Exploiting Smart-Phone USB Connectivity For Fun And Profit
    Zhaohui Wang and Angelos Stavrou.
    In the Proceedings of the 26th Annual Computer Security Applications Conference (ACM ACSAC) 
    p. 357-366. December 6–10, 2010, Austin, Texas, USA. Impact Factor: 1.82 (Acceptance rate: 39/227)
  2. Angelos Stavrou:
    Overlay-Based DoS Defenses. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 891-897 (2011)
  3. Experimental Results of Cross-Site Exchange of Web Content Anomaly Detector Alerts
    Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, and Salvatore J. Stolfo.
    In the Proceedings of IEEE Conference on Homeland Security Technologies (IEEE HST 2010),
    November 8-10, 2010, Waltham, MA, USA. Impact Factor: N/A (Acceptance rate: N/A).
  4. An Adversarial Evaluation of Network Signaling and Control Mechanisms
    Kangkook Jee, Stelios Sidiroglou-Douskos, Angelos Stavrou, and Angelos D. Keromytis.
    In the Proceedings of the 13th International Conference on Information Security and Cryptology (ICISC).
    December 2010, Seoul, Korea. Impact Factor: N/A (Acceptance rate: N/A).
  5. Small World VoIP
    Xiaohui Yang, Angelos Stavrou, Ram Dantu, and Duminda Wijesekera.
    In the Proceedings of the Second International Conference on Mobile Computing, Applications,
    and Services MobiCASE, October 25-28, 2010, Santa Clara, CA, USA.
    Impact Factor: N/A (Acceptance rate: N/A).
  6. QoP and QoS policy cognizant policy composition
    Paul Seymer, Angelos Stavrou, Duminda Wijesekera, Sushil Jajodia.
    In the Proceedings of the IEEE International Symposium on Policies for Distributed Systems 
    and Networks, p. 77-86, Fairfax, VA, July 21-23, 2010. (Acceptance rate: 19.2%) [bib]
  7. Providing Mobile Users’ Anonymity in Hybrid Networks
    Claudio Ardagna, Sushil Jajodia, Pierangela Samarati, and Angelos Stavrou (Alphabetic)
    In the Proceedings of the 15th European Symposium on Research in Computer Security
    (ESORICS 2010), p. 540-557, September 2010, Athens, Greece.
    Impact Factor: 1.45 (Acceptance rate: 42/210 – 20%). [bib]
  8. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation 
    Sambuddho Chakravarty, Angelos Stavrou, and Angelos D. Keromytis.
    In the Proceedings of the 15th European Symposium on Research in Computer Security
    (ESORICS 2010) p. 249-267, September 2010, Athens, Greece.
    Impact Factor: 1.45 (Acceptance rate: 42/210 – 20%). [bib]
  9. HyperCheck: A Hardware-Assisted Integrity Monitor
    Jiang Wang, Angelos Stavrou, and Anup K. Ghosh.
    In the Proceedings of 13th International Symposium on Recent Advances in Intrusion Detection
    (RAID 2010)
    , p. 158-177, Ottawa, Canada, September 15-17, 2010.
    Impact Factor: 2.20 (Acceptance rate: 24/104 – 23.1%). [bib]
  10. A Virtualization Architecture for In-Depth Kernel Isolation
    Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anup K. Ghosh.
    In the Proceedings of 43rd Hawaii International International Conference on Systems Science,
    IEEE Computer Society, p. 1-10, 5-8 January 2010, Koloa, Kauai, HI, USA.
    Impact Factor: N/A (Acceptance rate: N/A).
  11. Charalampos AndrianakisPaul SeymerAngelos Stavrou:
    Scalable Web Object Inspection and Malfease Collection, 2010. HotSec 2010
  12. Ahmed A. L. FaresiBo YuKhaled MoiduAngelos StavrouDuminda WijesekeraAnoop Singhal:
    Fine-grained Sharing of Health Records using XSPA Profile for XACML – An Extended Abstract, 2010. HealthSec 2010
  13. Terry V. BenzelJelena MirkovicAngelos Stavrou:
    3rd Workshop on Cyber Security Experimentation and Test, CSET ’10, Washington, D.C., USA, August 9, 2010. USENIX Association, 2010. [contents]

2009

  1. Angelos StavrouGabriela F. Cretu-CiocarlieMichael E. LocastoSalvatore J. Stolfo:
    Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. AISec 2009: 39-46
  2. Mansoor AlicherryAngelos D. KeromytisAngelos Stavrou:
    Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks. SecureComm 2009: 41-50
  3. Terry V. BenzelJelena MirkovicAngelos Stavrou:
    2nd Workshop on Cyber Security Experimentation and Test, CSET ’09, Montreal, Canada, August 10, 2009. USENIX Association 2009[contents]

2008

  1. Yih HuangAngelos StavrouAnup K. GhoshSushil Jajodia:
    Efficiently tracking application interactions using lightweight virtualization. VMSec 2008: 19-28
  2. Jason NiehAngelos Stavrou:
    Proceedings of the 1st ACM Workshop on Virtual Machine Security, VMSec 2008, Alexandria, VA, USA, October 27, 2008. ACM 2008, ISBN 978-1-60558-298-6 [contents]

2007

  1. Yingbo SongMichael E. LocastoAngelos StavrouAngelos D. KeromytisSalvatore J. Stolfo:
    On the infeasibility of modeling polymorphic shellcode. ACM Conference on Computer and Communications Security 2007: 541-551
  2. Angelos StavrouDavid TurnerAngelos D. KeromytisVassilis Prevelakis:
    Bridging the Network Reservation Gap Using Overlays. COMSWARE 2007
  3. Michael E. LocastoAngelos StavrouGabriela F. CretuAngelos D. Keromytis:
    From STEM to SEAD: Speculative Execution for Automated Defense. USENIX Annual Technical Conference 2007: 219-232

2005

  1. Angelos StavrouAngelos D. Keromytis:
    Countering DoS attacks with stateless multipath overlays. ACM Conference on Computer and Communications Security 2005: 249-259

2003

  1. William G. MoreinAngelos StavrouDebra L. CookAngelos D. KeromytisVishal MisraDan Rubenstein:
    Using graphic turing tests to counter automated DDoS attacks against web servers. ACM Conference on Computer and Communications Security 2003: 8-19

2002

  1. Angelos StavrouDan RubensteinSambit Sahu:
    A lightweight, robust P2P system to handle flash crowds. Computer Communication Review 32(3): 17 (2002)