Journal Articles
2018
- Jeffrey M. Voas, Rick Kuhn, Constantinos Kolias, Angelos Stavrou, Georgios Kambourakis:
Cybertrust in the IoT Age. IEEE Computer 51(7): 12-15 (2018) - Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou:
On early detection of application-level resource exhaustion and starvation. Journal of Systems and Software 137: 430-447 (2018) - Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang:
Towards Transparent Debugging. IEEE Trans. Dependable Sec. Comput. 15(2): 321-335 (2018) - Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou, Jeff Offutt:
Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities. AsiaCCS 2018: 777-791 (2018) - Haitao Xu, Zhao Li, Chen Chu, Yuanmi Chen, Yifan Yang, Haifeng Lu, Haining Wang, Angelos Stavrou:
Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace. ESORICS (2) 2018: 143-163 (2018) - Shuai Hao, Yubao Zhang, Haining Wang, Angelos Stavrou:
End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks. USENIX Security Symposium 2018: 1129-1145 (2018) - Angelos Stavrou, Konrad Rieck:
Proceedings of the 11th European Workshop on Systems Security, EuroSec@EuroSys 2018, Porto, Portugal, April 23, 2018. ACM (2018) [contents]
2017
- Angelos Stavrou, Jeffrey M. Voas:
Verified Time. IEEE Computer 50(3): 78-82 (2017) -
Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, Jeffrey M. Voas:
DDoS in the IoT: Mirai and Other Botnets. IEEE Computer 50(7): 80-84 (2017) - Jean-Pierre Auffret, Jane L. Snowdon, Angelos Stavrou, Jeffrey S. Katz, Diana Kelley, Rasheq S. Rahman, Frank Stein, Lisa Sokol, Peter Allor, Peng Warweg:
Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems. Journal of Interconnection Networks 17(1): 1-20 (2017) -
Haitao Xu, Daiping Liu, Haining Wang, Angelos Stavrou:
An Empirical Investigation of Ecommerce-Reputation-Escalation-as-a-Service. TWEB 11(2): 13:1-13:35 (2017) - Avinash Srinivasan, Hunter Dong, Angelos Stavrou:
FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance. ARES 2017: 82:1-82:8 (2017) -
Mohamed Elsabagh, Dan Fleck, Angelos Stavrou:
Strict Virtual Call Integrity Checking for C++ Binaries. AsiaCCS 2017: 140-154 (2017) -
Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou:
Detecting ROP with Statistical Learning of Program Characteristics. CODASPY 2017: 219-226 (2017) -
Daiping Liu, Xing Gao, Mingwei Zhang, Haining Wang, Angelos Stavrou:
Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency. DSN 2017: 615-626 -
Constantinos Kolias, Lucas Copi, Fengwei Zhang, Angelos Stavrou:
Breaking BLE Beacons For Fun But Mostly Profit. EUROSEC 2017: 4:1-4:6 (2017) -
Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang, Angelos Stavrou:
E-Android: A New Energy Profiling Tool for Smartphones. ICDCS 2017: 492-502 (2017) -
Jonathan Bell, Thomas D. LaToza, Foteini Baldmitsi, Angelos Stavrou:
Advancing Open Science with Version Control and Blockchains. SE4Science@ICSE 2017: 13-14 (2017) -
Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems. MALWARE 2017: 67-74 (2017) -
Georgios Kambourakis, Constantinos Kolias, Angelos Stavrou:
The Mirai botnet and the IoT Zombie Armies. MILCOM 2017: 267-272 (2017) -
Ryan Johnson, Rahul Murmuria, Angelos Stavrou, Vincent Sritapan:
Pairing continuous authentication with proactive platform hardening. PerCom Workshops 2017: 88-90 (2017) -
Rahul Murmuria, Angelos Stavrou, Daniel Barbará, Vincent Sritapan:
Your data in your hands: Privacy-preserving user behavior models for context computation. PerCom Workshops 2017: 170-175 (2017) -
Mohamed Elsabagh, Dan Fleck, Angelos Stavrou, Michael Kaplan, Thomas Bowen:
Practical and Accurate Runtime Application Protection Against DoS Attacks. RAID 2017: 450-471 (2017) - Bhavani M. Thuraisingham, Ghassan Karame, Angelos Stavrou:
Proceedings of the 9th Cloud Computing Security Workshop, CCSW@CCS 2017, Dallas, TX, USA, November 3, 2017. ACM 2017, ISBN 978-1-4503-5204-8 [contents] (2017) - Cristiano Giuffrida, Angelos Stavrou:
Proceedings of the 10th European Workshop on Systems Security, EUROSEC 2017, Belgrade, Serbia, April 23, 2017. ACM 2017, ISBN 978-1-4503-4935-2 [contents] (2017) - Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems. CoRR abs/1704.06794(2017) - Neda Nasiriani, Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks. CoRR abs/1712.01102 (2017)
2016
-
Angelos Stavrou, Daniel Fleck, Constantinos Kolias:
On the Move: Evading Distributed Denial-of-Service Attacks. IEEE Computer 49(3): 104-107 (2016) - Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, Stefanos Gritzalis:
Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset. IEEE Communications Surveys and Tutorials 18(1): 184-208 (2016) -
Constantinos Kolias, Angelos Stavrou, Jeffrey M. Voas, Irena Bojanova, D. Richard Kuhn:
Learning Internet-of-Things Security “Hands-On”. IEEE Security & Privacy 14(1): 37-46 (2016) -
Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou:
Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms. ACNS 2016: 193-211 (2016) -
Charles Smutz, Angelos Stavrou:
When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors. NDSS 2016 (2016) -
Rahul Murmuria, Angelos Stavrou:
Authentication Feature and Model Selection using Penalty Algorithms. WAY@SOUPS 2016 (2016)
2015
-
Constantinos Kolias, Angelos Stavrou, Jeffrey M. Voas:
Securely Making “Things” Right. IEEE Computer 48(9): 84-88 (2015) -
Fengwei Zhang, Kevin Leach, Haining Wang, Angelos Stavrou:
TrustLogin: Securing Password-Login on Commodity Operating Systems. AsiaCCS 2015: 333-344 (2015) -
Ryan Johnson, Nikolaos Kiourtis, Angelos Stavrou, Vincent Sritapan:
Analysis of content copyright infringement in mobile application markets. eCrime 2015: 43-52 -
Shuai Hao, Haining Wang, Angelos Stavrou, Evgenia Smirni:
On the DNS Deployment of Modern Web Services. ICNP 2015: 100-110 (2015) -
Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou, Vincent Sritapan:
Targeted DoS on android: how to disable android in 10 seconds or less. MALWARE 2015: 136-143 (2015) -
Charles Smutz, Angelos Stavrou:
Preventing Exploits in Microsoft Office Documents Through Content Randomization. RAID 2015: 225-246 (2015) -
Rahul Murmuria, Angelos Stavrou, Daniel Barbará, Dan Fleck:
Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users. RAID 2015:405-424 (2015) -
Haitao Xu, Haining Wang, Angelos Stavrou:
Privacy Risk Assessment on Online Photos. RAID 2015: 427-447 (2015) -
Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou:
Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks. RAID 2015: 515-537 (2015) -
Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang, Kun Sun:
Using Hardware Features for Increased Debugging Transparency. IEEE Symposium on Security and Privacy 2015: 55-69 (2015) -
Haitao Xu, Daiping Liu, Haining Wang, Angelos Stavrou:
E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service. WWW 2015: 1296-1306 (2015)
2014
-
A Moving Target DDoS Defense Mechanism
Huangxin Wang, Quan Jia, Dan Fleck, Walter Powell, Fei Li, Angelos Stavrou.
In the Elsevier Journal of Computer Communications, (2014, vol 46). - HyperCheck: A Hardware-Assisted Integrity Monitor
Fengwei Zhang, Jiang Wang, Kun Sun, and Angelos Stavrou.
In the IEEE Transactions on Dependable and Secure Computing (TDSC), (2014, vol 11) -
Brett Cooley, Haining Wang, Angelos Stavrou:
Activity Spoofing and Its Defense in Android Smartphones. ACNS 2014: 494-512 (2014) -
Fengwei Zhang, Haining Wang, Kevin Leach, Angelos Stavrou:
A Framework to Secure Peripherals at Runtime. ESORICS (1) 2014: 219-238 (2014) -
Haitao Xu, Daiping Liu, Aaron Koehl, Haining Wang, Angelos Stavrou:
Click Fraud Detection on the Advertiser Side. ESORICS (2) 2014: 419-438
2013
- Improving network response times using social information
Sharath Hiremagalore, Chen Liang, Angelos Stavrou and Huzefa Rangwala.
Proceedings of Social Network Analysis and Mining, Springer
Social Network Analysis and Mining, Volume 3, P:209-220 (2013) - Quan Jia, Kun Sun, Angelos Stavrou:
Capability-Based Defenses Against DoS Attacks in Multi-path MANET Communications. Wireless Personal Communications 73(1): 127-148(2013) - Providing Users’ Anonymity in Mobile Hybrid Networks
ACM Transactions on Internet Technology, Volume 12(3): 7 (2013) -
Avinash Srinivasan, Srinath Thirthahalli Nazaraj, Angelos Stavrou:
HIDEINSIDE – A novel randomized & encrypted antiforensic information hiding. ICNC 2013: 626-631 (2013)
Claudio Agostino Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou: -
Angelos Stavrou:
Programming on Android: Best Practices for Security and Reliability. SERE 2013: 1-2 (2013)
2012
- Building Security into Off-the-Shelf Smartphones
Angelos Stavrou, Jeffrey Voas, Tom Karygiannis, Steve Quirolgico,
Computer, vol. 45, no. 2, pp. 82-84, Feb. 2012, doi:10.1109/MC.2012.44 (2012) -
Riyadh Mahmood, Naeem Esfahani, Thabet Kacem, Nariman Mirzaei, Sam Malek, Angelos Stavrou:
A whitebox approach for automated security testing of Android applications on the cloud. AST 2012: 22-28 (2012) -
Zhaohui Wang, Rahul Murmuria, Angelos Stavrou:
Implementing and Optimizing an Encryption Filesystem on Android. MDM 2012: 52-62 (2012) -
Zhaohui Wang, Angelos Stavrou:
Attestation & Authentication for USB Communications. SERE (Companion) 2012: 43-44 (2012) -
Ryan Johnson, Zhaohui Wang, Corey Gagnon, Angelos Stavrou:
Analysis of Android Applications’ Permissions. SERE (Companion) 2012: 45-46 (2012) - Nelson Nazzicari, Javier Almillategui, Angelos Stavrou, Sushil Jajodia:
Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification. STM 2012: 161-176 (2012)
2011
- DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
Meixing Le, Angelos Stavrou, Brent ByungHoon Kang.
In IEEE Journal on Transactions on Dependable and Secure Computing (TDSC) 2011, ISSN: 1545-5971
10 Nov. 2011. IEEE computer Society Digital Library. IEEE Computer Society.
Acceptance Rate: 10-12% as reported by 2009 TDSC editorial, ISI Impact Factor: 2.093 (2011). - The Ephemeral Legion: Producing an Expert Cyber-security Workforce from Thin Air
Michael E. Locasto, Anup Ghosh, Sushil Jajodia, and Angelos Stavrou.
In the Proceedings of the Communications of the ACM, Vol. 54, Issue 1, pp 129—131.
Impact Factor: 2.362 (2011). - DaeHun Nyang, Abedelaziz Mohaisen, Taekyoung Kwon, Brent ByungHoon Kang, Angelos Stavrou:
Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface. CoRR abs/1112.2245 (2011) -
Quan Jia, Kun Sun, Angelos Stavrou:
CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET. ICCCN 2011: 1-6 -
Angelos Stavrou:
TCP Modulation Attacks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1279-1281
2010
- On the Infeasibility of Modeling Polymorphic Shellcode: Re-thinking the Role of Learning in Intrusion Detection Systems
Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, and Salvatore J. Stolfo.
In the Proceedings of Machine Learning Journal (MLJ) p. 179-205. Accepted: 7 August 2009, Published
online: 29 October 2009. Editors: Pavel Laskov and Richard Lippmann. ISI Impact Factor: 1.956 (2010). [bib] - A Lightweight, Robust, P2P System to Handle Flash Crowds
Angelos Stavrou, Dan Rubenstein, Sambit Sahu.
In the Proceedings of IEEE Journal on Selected Areas in Communications (JSAC), special issue on Service
Overlay Networks, Volume 22, Number 1, p. 6-17, January 2004. Impact Factor: 4.232 (2010). [bib]
2009
- The Dynamic Community of Interest and its Realization in ZODIAC
Scott Alexander, Steve Bellovin, Yuu-Heng Cheng, Brian Coan, Andrei Ghetie,
Vikram Kaul, Nicholas F. Maxemchuk, Henning Schulzrinne, Stephen Schwab, Bruce Siegell,
Angelos Stavrou, and Jonathan M. Smith.
In IEEE Communications Magazine, October 2009, pp. 40-47. Impact Factor: 2.837 (2009) - On the Infeasibility of Modeling Polymorphic Shellcode: Re-thinking the Role of Learning in Intrusion Detection Systems
Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, and Salvatore J. Stolfo.
In the Proceedings of Machine Learning Journal (MLJ) p. 179-205. Accepted: 7 August 2009, Published -
Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh:
A2M: Access-Assured Mobile Desktop Computing. ISC 2009: 186-201 - Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis, Clifford Stein:
Adding Trust to P2P Distribution of Paid Content. ISC 2009: 459-474 -
Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo:
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. RAID 2009: 41-60 -
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Stavrou:
SQLProb: a proxy-based architecture towards preventing SQL injection attacks. SAC 2009: 2054-2061 -
Quan Jia, Zhaohui Wang, Angelos Stavrou:
The Heisenberg Measuring Uncertainty in Lightweight Virtualization Testbeds. CSET 2009
2008
-
Michael E. Locasto, Angelos Stavrou:
The Hidden Difficulties of Watching and Rebuilding Networks. IEEE Security & Privacy 6(2): 79-82 (2008) -
Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis:
Pushback for Overlay Networks: Protecting Against Malicious Insiders. ACNS 2008: 39-54 - Claudio Agostino Ardagna, Angelos Stavrou, Sushil Jajodia, Pierangela Samarati, Rhandi Martin:
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks. PiLBA 2008 - Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo:
Return Value Predictability Profiles for Self-healing. IWSEC 2008: 152-166 -
Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, Steven M. Bellovin:
PAR: Payment for Anonymous Routing. Privacy Enhancing Technologies 2008: 219-236 -
Alireza Pirayesh Sabzevar, Angelos Stavrou:
Universal Multi-Factor Authentication Using Graphical Passwords. SITIS 2008: 625-632 -
Sambuddho Chakravarty, Angelos Stavrou, Angelos D. Keromytis:
Identifying Proxy Nodes in a Tor Anonymization Circuit. SITIS 2008: 633-639 -
Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis:
Casting out Demons: Sanitizing Training Data for Anomaly Sensors. IEEE Symposium on Security and Privacy 2008: 81-95
2007
-
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis:
A Study of Malcode-Bearing Documents. DIMVA 2007: 231-250
2006
-
Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis:
W3Bcrypt: Encryption as a Stylesheet. ACNS 2006: 349-364 - Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis:
Dark application communities. NSPW 2006: 11-18
2005
-
Angelos Stavrou, Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
WebSOS: an overlay-based system for protecting web servers from denial of service attacks. Computer Networks 48(5): 781-807 (2005) -
Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis:
gore: Routing-Assisted Defense Against DDoS Attacks. ISC 2005: 179-193 - Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, Dan Rubenstein:
MOVE: An End-to-End Solution to Network Denial of Service. NDSS 2005 - WebSOS: An Overlay-based System For Protecting Web Servers From Denial of Service Attacks
Angelos Stavrou, Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, and Dan Rubenstein.
In Elsevier Journal of Computer Networks, special issue on Web and Network Security, vol. 48, no. 5,
p. 781 – 807. August 2005 5-Year Impact Factor: 1.690. [bib]
2004
-
Angelos Stavrou, Dan Rubenstein, Sambit Sahu:
A lightweight, robust P2P system to handle flash crowds. IEEE Journal on Selected Areas in Communications 22(1): 6-17 (2004) -
Edward G. Coffman Jr., Andreas Constantinides, Dan Rubenstein, F. Bruce Shepherd, Angelos Stavrou:
Content distribution for seamless transmission. SIGMETRICS Performance Evaluation Review 32(2): 31-32 (2004) - Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
A Pay-per-Use DoS Protection Mechanism for the Web. ACNS 2004: 120-134
2002
- Angelos Stavrou, Dan Rubenstein, Sambit Sahu:
A Lightweight, Robust P2P System to Handle Flash Crowds. ICNP 2002: 226-235
Conference Publications
2017
-
Ghassan O. Karame, Angelos Stavrou:
CCSW’17: 2017 ACM Cloud Computing Security. ACM Conference on Computer and Communications Security 2017: 2627-2628 (2017)
2014
- transAD: An Anomaly Detection Network Intrusion Sensor for the Web
Sharath Hiremagalore, Daniel Barbar ?a, Dan Fleck, Walter Powell, and Angelos Stavrou.
In the Proceedings of International Security Conference (ISC 2014), Leipzig, Germany, (June 2014) - Catch Me if You Can: A Cloud-Enabled DDoS Defense
Quan Jia, Huangxin Wang, Dan Fleck, Fei Li, Angelos Stavrou, Walter A. Powell.
In the Proceedings of the 44th Annual IEEE/IFIP International Conference on
Dependable Systems and Networks (IEEE DSN 2014), Atlanta, Georgia USA,
June 23 – 26, 2014. - Angelos Stavrou, Herbert Bos, Georgios Portokalidis:
Research in Attacks, Intrusions and Defenses – 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings. Lecture Notes in Computer Science 8688, Springer 2014, ISBN 978-3-319-11378-4 [contents] - Detecting Malicious Javascript in PDF through Document Instrumentation
Daiping Liu, Haining Wang, and Angelos Stavrou.
In the Proceedings of the 44th Annual IEEE/IFIP International Conference on
Dependable Systems and Networks (IEEE DSN 2014), Atlanta, Georgia USA,
June 23 – 26, 2014.
2013
- PyTrigger: A System to Trigger & Extract User-Activated Malware Behavior
Dan Fleck, Arnur Tokhtabayev, Alex Alarif, Angelos Stavrou, and Tomas Nykodym.
In the proceedings of the 8th ARES Conference (ARES 2013),
University of Regensburg, Germany September 2nd – 6th, 2013. - MOTAG: Moving Target Defense Against Internet Denial of Service Attacks
Quan Jia, Kun Sun, Angelos Stavrou.
In the proceedings of the International Conference on Computer Communications
and Networks ICCCN 2013 Nassau, Bahamas July 30 – August 2, 2013. - Behavioral Analysis of Android Applications Using Automated Instrumentation
Mohammad Karami, Mohamed Elsabagh, Parnian Najafiborazjani, and Angelos Stavrou.
In the Proceedings of the 7th International Conference on Software Security and Reliability
(IEEE SERE 2013), 18-20 June 2013, Washington DC, USA. - Forced-Path Execution for Android Applications on x86 Platforms
Ryan Johnson, and Angelos Stavrou.
In the Proceedings of the 7th International Conference on Software Security and Reliability
(IEEE SERE 2013), 18-20 June 2013, Washington DC, USA. - Spectre: A Dependable Introspection Framework via System Management Mode
Fengwei Zhang, Kevin Leach, Kun Sun, and Angelos Stavrou.
In the Proceedings of the 43nd Annual IEEE/IFIP International Conference on
Dependable Systems and Networks (IEEE DSN 2013), Budapest, 24 – 27 June 2013. - Exposing Software Security and Availability Risks For Commercial Mobile Devices (CMDs)
Ryan Johnson, Zhaohui Wang, Angelos Stavrou, and Jeff Voas.
In the Proceedings of the IEEE RAMS 2013, Orlando, Florida, 28 – 31 January 2013.
2012
- Malicious PDF Detection Using Metadata and Structural Features
Charles Smutz and Angelos Stavrou.
In the Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC), Orlando,
Florida, USA, December 3–7, 2012. - Malware Characterization using Behavioral Components
Chaitanya Yavvari, Arnur Tokhtabayev, Huzefa Rangwala, and Angelos Stavrou.
In the Proceedings of 6th International Conference “Mathematical Methods, Models, and Architectures for
Computer Network Security“, St. Petersburg, Russia, October 17-20, 2012. - Exposing Security Risks for Commercial Mobile Devices(Invited)
Zhaohui Wang, Ryan Johnson, Rahul Murmuria, and Angelos Stavrou.
In the Proceedings of 6th International Conference “Mathematical Methods, Models, and Architectures for
Computer Network Security“, St. Petersburg, Russia, October 17-20, 2012. - Mobile Application and Device Power Usage Measurements
Rahul Murmuria, Jeffrey Medsger, Angelos Stavrou.
In the Proceedings of the 6th International Conference on Software
Security and Reliability (SERE 2012), Washington, DC, June 2012. - Netgator: Malware Detection Using Program Interactive Challenges
Brian Schulte, Haris Andrianakis, Kun Sun, Angelos Stavrou.
In the Proceedings of the 9th Conference on Detection of Intrusions and Malware
& Vulnerability Assessment (DIMVA 2012), Heraklion, Crete, Greece, July 26-27th, 2012. - A Dependability Analysis of Hardware-Assisted Polling Integrity Checking Systems
Jiang Wang, Kun Sun, and Angelos Stavrou.
In the Proceedings of the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and
Networks (DSN 2012), Boston, Massachusetts, June, 2012. - Implementing & Optimizing an Encryption File System on Android
Zhaohui Wang, Rahul Murmuria, and Angelos Stavrou.
In the Proceedings of the IEEE International Conference on Mobile Data Management
(IEEE MDM 2012), July 23 – 26, 2012, Bangalore, India. (Acceptance Rate: 22/88) - Analysis Android Applications’ Permissions (short paper)
Ryan Johnson, Zhaohui Wang, Corey Gagnon and Angelos Stavrou.
In the Proceedings of the 6th International Conference on Software Security and Reliability (SERE 2012),
Washington, DC, June 2012. - Mutual Authentication for USB Communications (short paper)
Zhaohui Wang, Ryan Johnson and Angelos Stavrou.
In the Proceedings of the 6th International Conference on Software Security and Reliability (SERE 2012),
Washington, DC, June 2012. - A Framework for Automated Security Testing of Android Applications on the Cloud (short paper)
Sam Malek, Naeem Esfahani, Thabet Kacem, Riyadh Mahmood, Nariman Mirzaei, and Angelos Stavrou.
In the Proceedings of the 6th International Conference on Software Security and Reliability (SERE 2012),
Washington, DC, June 2012. - SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes
Kun Sun, Jiang Wang, Fengwei Zhang and Angelos Stavrou.
In the Proceedings of the 19th Annual Network & Distributed System Security Symposium NDSS 2012,
San Diego, California, 5-8 February 2012. Impact Factor: 2.60 (Acceptance Rate: 46/258 – 17.8%). [Presentation] - Hardware-Assisted Application Integrity Monitor
Jiang Wang, Kun Sun, Angelos Stavrou.
In the Proceedings of IEEE Hawaii International Conference on System Sciences (HICSS45) pp. 5375-5383,
45th Hawaii International Conference on System Sciences, 2012 January 4-7, 2012, Grand Wailea, Maui, USA.
Impact Factor: N/A, (Acceptance Rate: N/A). - Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle, Angelos Stavrou:
The MEERKATS Cloud Security Architecture. ICDCS Workshops 2012: 446-450
2011
-
Erin Kenneally, Angelos Stavrou, John McHugh, Nicolas Christin:
Moving Forward, Building an Ethics Community (Panel Statements). Financial Cryptography Workshops 2011: 178-183 - Cross-domain Collaborative Anomaly Detection: So Far Yet So Close
Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, Salvatore J. Stolfo.
In the Proceedings of the 14th International Symposium on Recent
Advances in Intrusion Detection (RAID). September 2011, Menlo Park, CA.
Impact Factor: 2.20 (Acceptance rate: 20/87 – 23%). - Trading Elephants For Ants: Efficient Post-Attack Reconstitution (Short paper)
Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou, Anup Ghosh and Sushil Jajodia
In the Proceedings of the 7th International ICST Conference on Security and Privacy
in Communication Networks (Securecomm 2011), p. 1-10, September 7-9 2011, London.
Impact Factor: N/A, (Acceptance rate: 24%). - Predicting Network Response Times Using Social Information (short paper)
Chen Liang, Sharath Hiremagalore, Angelos Stavrou and Huzefa Rangwala.
In the Proceedings of the ACM 2011 Conference on Advances in Social Networks Analysis and Mining,
p. 527-531, July, 2011, Kaohsiung, Taiwan. Impact Factor: N/A, (Acceptance rate: 25%) [bib] - Breaching and Protecting an Anonymizing Network System
Jason Clark and Angelos Stavrou.
In the Proceedings of the 6th Annual Symposium on Information Assurance (ASIA ‘11).
Impact Factor: N/A, (Acceptance rate: 50%). (2011) - Advantages and disadvantages of remote asynchronous usability testing using amazon mechanical turk
Erik Nelson and Angelos Stavrou.
Proceedings of the Human Factors and Ergonomics Society 55th Annual Meeting, pages 1080-1084, HFES
2011 Conference, Red Rock Resort, Las Vegas, Nevada, September 19-23, 2011.
Impact Factor: N/A, (Acceptance rate: N/A). -
Jiang Wang, Fengwei Zhang, Kun Sun, Angelos Stavrou:
Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics. SADFE 2011: 1-5 - Exploiting Smart-Phone USB Connectivity For Fun And Profit (Extended Version)
Angelos Stavrou and Zhaohui Wang.
BlackHat Technical Conference DC 2011 – Technical Briefings Session.
2010
- Exploiting Smart-Phone USB Connectivity For Fun And Profit
Zhaohui Wang and Angelos Stavrou.
In the Proceedings of the 26th Annual Computer Security Applications Conference (ACM ACSAC)
p. 357-366. December 6–10, 2010, Austin, Texas, USA. Impact Factor: 1.82 (Acceptance rate: 39/227) -
Angelos Stavrou:
Overlay-Based DoS Defenses. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 891-897 (2011) - Experimental Results of Cross-Site Exchange of Web Content Anomaly Detector Alerts
Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, and Salvatore J. Stolfo.
In the Proceedings of IEEE Conference on Homeland Security Technologies (IEEE HST 2010),
November 8-10, 2010, Waltham, MA, USA. Impact Factor: N/A (Acceptance rate: N/A). - An Adversarial Evaluation of Network Signaling and Control Mechanisms
Kangkook Jee, Stelios Sidiroglou-Douskos, Angelos Stavrou, and Angelos D. Keromytis.
In the Proceedings of the 13th International Conference on Information Security and Cryptology (ICISC).
December 2010, Seoul, Korea. Impact Factor: N/A (Acceptance rate: N/A). - Small World VoIP
Xiaohui Yang, Angelos Stavrou, Ram Dantu, and Duminda Wijesekera.
In the Proceedings of the Second International Conference on Mobile Computing, Applications,
and Services MobiCASE, October 25-28, 2010, Santa Clara, CA, USA.
Impact Factor: N/A (Acceptance rate: N/A). - QoP and QoS policy cognizant policy composition
Paul Seymer, Angelos Stavrou, Duminda Wijesekera, Sushil Jajodia.
In the Proceedings of the IEEE International Symposium on Policies for Distributed Systems
and Networks, p. 77-86, Fairfax, VA, July 21-23, 2010. (Acceptance rate: 19.2%) [bib] - Providing Mobile Users’ Anonymity in Hybrid Networks
Claudio Ardagna, Sushil Jajodia, Pierangela Samarati, and Angelos Stavrou (Alphabetic)
In the Proceedings of the 15th European Symposium on Research in Computer Security
(ESORICS 2010), p. 540-557, September 2010, Athens, Greece.
Impact Factor: 1.45 (Acceptance rate: 42/210 – 20%). [bib] - Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
Sambuddho Chakravarty, Angelos Stavrou, and Angelos D. Keromytis.
In the Proceedings of the 15th European Symposium on Research in Computer Security
(ESORICS 2010) p. 249-267, September 2010, Athens, Greece.
Impact Factor: 1.45 (Acceptance rate: 42/210 – 20%). [bib] - HyperCheck: A Hardware-Assisted Integrity Monitor
Jiang Wang, Angelos Stavrou, and Anup K. Ghosh.
In the Proceedings of 13th International Symposium on Recent Advances in Intrusion Detection
(RAID 2010), p. 158-177, Ottawa, Canada, September 15-17, 2010.
Impact Factor: 2.20 (Acceptance rate: 24/104 – 23.1%). [bib] - A Virtualization Architecture for In-Depth Kernel Isolation
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anup K. Ghosh.
In the Proceedings of 43rd Hawaii International International Conference on Systems Science,
IEEE Computer Society, p. 1-10, 5-8 January 2010, Koloa, Kauai, HI, USA.
Impact Factor: N/A (Acceptance rate: N/A). -
Charalampos Andrianakis, Paul Seymer, Angelos Stavrou:
Scalable Web Object Inspection and Malfease Collection, 2010. HotSec 2010 -
Ahmed A. L. Faresi, Bo Yu, Khaled Moidu, Angelos Stavrou, Duminda Wijesekera, Anoop Singhal:
Fine-grained Sharing of Health Records using XSPA Profile for XACML – An Extended Abstract, 2010. HealthSec 2010 - Terry V. Benzel, Jelena Mirkovic, Angelos Stavrou:
3rd Workshop on Cyber Security Experimentation and Test, CSET ’10, Washington, D.C., USA, August 9, 2010. USENIX Association, 2010. [contents]
2009
-
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Michael E. Locasto, Salvatore J. Stolfo:
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. AISec 2009: 39-46 -
Mansoor Alicherry, Angelos D. Keromytis, Angelos Stavrou:
Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks. SecureComm 2009: 41-50 - Terry V. Benzel, Jelena Mirkovic, Angelos Stavrou:
2nd Workshop on Cyber Security Experimentation and Test, CSET ’09, Montreal, Canada, August 10, 2009. USENIX Association 2009[contents]
2008
-
Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia:
Efficiently tracking application interactions using lightweight virtualization. VMSec 2008: 19-28 - Jason Nieh, Angelos Stavrou:
Proceedings of the 1st ACM Workshop on Virtual Machine Security, VMSec 2008, Alexandria, VA, USA, October 27, 2008. ACM 2008, ISBN 978-1-60558-298-6 [contents]
2007
-
Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode. ACM Conference on Computer and Communications Security 2007: 541-551 - Angelos Stavrou, David Turner, Angelos D. Keromytis, Vassilis Prevelakis:
Bridging the Network Reservation Gap Using Overlays. COMSWARE 2007 -
Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis:
From STEM to SEAD: Speculative Execution for Automated Defense. USENIX Annual Technical Conference 2007: 219-232
2005
- Angelos Stavrou, Angelos D. Keromytis:
Countering DoS attacks with stateless multipath overlays. ACM Conference on Computer and Communications Security 2005: 249-259
2003
- William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
Using graphic turing tests to counter automated DDoS attacks against web servers. ACM Conference on Computer and Communications Security 2003: 8-19
2002
-
Angelos Stavrou, Dan Rubenstein, Sambit Sahu:
A lightweight, robust P2P system to handle flash crowds. Computer Communication Review 32(3): 17 (2002)