ANGELOS STAVROU - Publications

 

 

 

Journal Publications

1.       Towards Transparent Debugging
Fengwei Zhang, Kevin Leach, Angelos Stavrou, and Haining Wang.
To appear in IEEE Transactions on Dependable and Secure Computing (TDSC) (2016)
accepted March 2016.

2.       On the Move: Evading Distributed Denial-of-Service Attacks
Angelos Stavrou, Daniel Fleck, Constantinos Kolias.
IEEE Computer 49(3): 104-107 (2016)

3.       Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset
Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, Stefanos Gritzalis.
IEEE Communications Surveys and Tutorials 18(1): 184-208 (2016)

4.       Learning Internet-of-Things Security "Hands-On"
Constantinos Kolias, Angelos Stavrou, Jeffrey M. Voas, Irena Bojanova, D. Richard Kuhn.
IEEE Security & Privacy 14(1): 37-46 (2016)

5.       Securely Making "Things" Right
Constantinos Kolias, Angelos Stavrou, Jeffrey M. Voas.
IEEE Computer 48(9): 84-88 (2015)

6.       A Moving Target DDoS Defense Mechanism
Huangxin Wang, Quan Jia, Dan Fleck, Walter Powell, Fei Li, Angelos Stavrou.
In the Elsevier Journal of Computer Communications, 46: 10-21 (2014)

7.       HyperCheck: A Hardware-Assisted Integrity Monitor 
Fengwei Zhang, Jiang Wang, Kun Sun, and
Angelos Stavrou.
In the proceedings of IEEE Transactions on Dependable and Secure Computing
(TDSC),
11(4): 332-344 (2014)

8.       Improving network response times using social information
Sharath Hiremagalore, Chen Liang, Angelos Stavrou and Huzefa Rangwala.
Proceedings of Social Network Analysis and Mining, Springer
Social Network Analysis and Mining, Volume 3, P:209-220 (2013)

9.       Providing Users' Anonymity in Mobile Hybrid Networks
Claudio Agostino Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou.
ACM Transactions on Internet Technology, Volume 12(3): 7 (2013)

10.     Building Security into Off-the-Shelf Smartphones
Angelos Stavrou, Jeffrey Voas, Tom Karygiannis, Steve Quirolgico.
Computer, vol. 45, no. 2, pp. 82-84, Feb. 2012, doi:10.1109/MC.2012.44

11.     DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
Meixing Le, Angelos Stavrou, Brent ByungHoon Kang.
In IEEE Journal on Transactions on Dependable and Secure Computing (TDSC) 2011,
ISSN: 1545-5971 10 Nov. 2011. IEEE computer Society Digital Library. IEEE Computer Society.
Acceptance Rate: 10-12% as reported by 2009 TDSC editorial, ISI Impact Factor: 2.093 (2010).

12.     The Ephemeral Legion: Producing an Expert Cyber-security Workforce from Thin Air
Michael E. Locasto, Anup Ghosh, Sushil Jajodia, and Angelos Stavrou.
In the Proceedings of the Communications of the ACM, Vol. 54, Issue 1, pp 129 - 131.
Impact Factor: 2.362 (2010). [bib]

13.     The Dynamic Community of Interest and its Realization in ZODIAC
Scott Alexander, Steve Bellovin, Yuu-Heng Cheng, Brian Coan, Andrei Ghetie,
Vikram Kaul, Nicholas F. Maxemchuk, Henning Schulzrinne, Stephen Schwab, Bruce Siegell,
Angelos Stavrou, and Jonathan M. Smith.
In IEEE Communications Magazine, October 2009, pp. 40-47. Impact Factor: 2.837

14.     On the Infeasibility of Modeling Polymorphic Shellcode: Re-thinking the Role of Learning in Intrusion Detection Systems
Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, and Salvatore J. Stolfo.
In the Proceedings of Machine Learning Journal (MLJ) p. 179-205. Accepted: 7 August 2009.
Published online: 29 October 2009.  Editors: Pavel Laskov and Richard Lippmann. ISI Impact Factor: 1.956 (2010). [bib]

15.     WebSOS: An Overlay-based System For Protecting Web Servers From Denial of Service Attacks
Angelos Stavrou, Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, and Dan Rubenstein. 
In Elsevier Journal of Computer Networks, special issue on Web and Network Security, vol. 48, no. 5,
p. 781 - 807. August 2005 5-Year Impact Factor: 1.690. [bib]

16.     A Lightweight, Robust, P2P System to Handle Flash Crowds
Angelos Stavrou, Dan Rubenstein, Sambit Sahu.
In the Proceedings of IEEE Journal on Selected Areas in Communications (JSAC),
special issue on Service Overlay Networks, Volume 22, Number 1, p. 6-17, January 2004. Impact Factor: 4.232 (2010). [bib]

Conference Publications

1.     Why Software DoS is Hard to Fix: Denying Access in Embedded Android Platforms
Ryan Johnson, Mohamed Elsabagh, and Angelos Stavrou
To appear in the proceedings of the 14th International Conference on Applied Cryptography and
Network Security (ACNS) 2016, June 19-22, 2016 London, UK.

2.     When a Tree Falls:  Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors
Charles Smutz and Angelos Stavrou
In the proceedings of the Network and Distributed System Security Symposium (NDSS) 2016, February 21-24, San Diego, California.

3.     Targeted DoS on Android: How to Disable Android in 10 Seconds or Less
Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou, and Vincent Sritapan
In the proceedings of the 10th Malware Conference (MALCON) Oct. 2015, IEEE Computer Society
ISBN: 978-1-5090-0317-4 pp: 136-143 Puerto Rico, USA.

4.     Preventing Exploits in Microsoft Office Documents through Content Randomization
Charles Smutz and Angelos Stavrou
In the proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Kyoto, Japan, November 2015.

5.     Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users
Rahul Murmuria, Angelos Stavrou, Daniel Barbara, Dan Fleck
In the proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Kyoto, Japan, November 2015.

6.     Privacy Risk Assessment on Online Photos
Haitao Xu, Haining Wang, Angelos Stavrou
In the proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Kyoto, Japan, November 2015.

7.     Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks
Mohamed Elsabagh, Daniel Barbara, Daniel Fleck, Angelos Stavrou
In the proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Kyoto, Japan, November 2015.

8.     On the DNS Deployment of Modern Web Services
Shuai Hao, Haining Wang, Angelos Stavrou, and Evgenia Smirni
In the 23rd IEEE International Conference on Network Protocols (ICNP)
San Francisco, CA, November 10-13 2015.

9.     Analysis of Content Copyright Infringement in Mobile Application Markets (Best paper award)
Ryan Johnson, Nikolaos Kiourtis, Angelos Stavrou, and Vincent Sritapan
In the proceedings of APWG/IEEE eCrime Research Summit 2015, Barcelona, Spain, May 2015.

10.   Using Hardware Features for Increased Debugging Transparency
Fengwei Zhang, Kevin Leach,
Angelos Stavrou, Haining Wang, and Kun Sun
In the Proceedings of the 36th IEEE Symposium on Security and Privacy
(Oakland 2015), San Jose, CA, May 2015.


11.   Resurrecting the READ_LOGS Permission on Samsung Devices
Ryan Johnson and Angelos Stavrou
In the briefings of Blackhat Asia 2015.

12.   E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service
Haitao Xu, Daiping Liu, Haining Wang and Angelos Stavrou
To appear in the Proceedings of 24th World Wide Web Conference (WWW 2015).

13.   TrustLogin: Securing Password-Login on Commodity Operating Systems
Fengwei Zhang, Kevin Leach, Haining Wang, and
Angelos Stavrou
To appear in Proceedings of The 10th ACM Symposium on Information, Computer and Communications Security (AsiaCCS'15), Singapore, April 2015.


14.   transAD: An Anomaly Detection Network Intrusion Sensor for the Web (short paper)
Sharath Hiremagalore, Daniel Barbará, Dan Fleck, Walter Powell, and Angelos Stavrou
In the Proceedings of Information Security Conference (ISC 2014), Lecture Notes in Computer Science p 477-489, Hong Kong, Oct 2014.

15.   A Framework to Secure Peripherals at Runtime
Fengwei Zhang, Haining Wang, Kevin Leach, Angelos Stavrou
European Symposium on Research in Computer Security (ESORICS) p. 219-238 (2014)

16.   Click Fraud Detection on the Advertiser Side
Haitao Xu, Daiping Liu, Aaron Koehl, Haining Wang, Angelos Stavrou
European Symposium on Research in Computer Security (ESORICS) p. 419-438 (2014)

17.   Activity Spoofing and Its Defense in Android Smartphones
Brett Cooley, Haining Wang, and Angelos Stavrou
In the proceedings of the 12th International Conference on 
Applied Cryptography and Network Security (ACNS 2014)
Lausanne, Switzerland.

18.   Catch Me if You Can: A Cloud-Enabled DDoS Defense
Quan Jia, Huangxin Wang, Dan Fleck, Fei Li, Angelos Stavrou, Walter A. Powell.
In the Proceedings of the 44th Annual IEEE/IFIP International Conference on
Dependable Systems and Networks (IEEE DSN 2014), Atlanta, Georgia USA,
June 23 - 26, 2014.

19.   Detecting Malicious Javascript in PDF through Document Instrumentation
Daiping Liu, Haining Wang, and Angelos Stavrou.
In the Proceedings of the 44th Annual IEEE/IFIP International Conference on
Dependable Systems and Networks (IEEE DSN 2014), Atlanta, Georgia USA,
June 23 - 26, 2014.

20.   PyTrigger: A System to Trigger & Extract User-Activated Malware Behavior
Dan Fleck, Arnur Tokhtabayev, Alex Alarif, Angelos Stavrou, and Tomas Nykodym.
In the proceedings of the 8th ARES Conference (ARES 2013),
University of Regensburg, Germany September 2nd - 6th, 2013.

21.   MOTAG: Moving Target Defense Against Internet Denial of Service Attacks
Quan Jia, Kun Sun, Angelos Stavrou.
In the proceedings of the International Conference on Computer Communications
and Networks ICCCN 2013
Nassau, Bahamas July 30 - August 2, 2013.

22.   Behavioral Analysis of Android Applications Using Automated Instrumentation
Mohammad Karami, Mohamed Elsabagh, Parnian Najafiborazjani, and Angelos Stavrou.
In the Proceedings of the 7th International Conference on Software Security and Reliability
(IEEE SERE 2013)
, 18-20 June 2013, Washington DC, USA.

 

23.   Forced-Path Execution for Android Applications on x86 Platforms
Ryan Johnson, and Angelos Stavrou.
In the Proceedings of the 7th International Conference on Software Security and Reliability
(IEEE SERE 2013)
, 18-20 June 2013, Washington DC, USA.

 

24.   Towards a Cyber Conflict Taxonomy
Scott Applegate and Angelos Stavrou.
To appear in the Proceedings of the 5th International Conference on Cyber Conflict (CyCon 2013)
NATO Cooperative Cyber Defence Centre of Excellence conference, 4-7 June 2013 in Tallinn, Estonia.

25.   Spectre: A Dependable Introspection Framework via System Management Mode
Fengwei Zhang, Kevin Leach, Kun Sun, and Angelos Stavrou.
In the Proceedings of the 43nd Annual IEEE/IFIP International Conference on
Dependable Systems and Networks (IEEE DSN 2013), Budapest, 24 - 27 June 2013.

26.   Exposing Software Security and Availability Risks For Commercial Mobile Devices (CMDs)
Ryan Johnson, Zhaohui Wang, Angelos Stavrou, and Jeff Voas.
In the Proceedings of the IEEE RAMS 2013, Orlando, Florida, 28 - 31 January 2013.

27.   Malicious PDF Detection Using Metadata and Structural Features
Charles Smutz and Angelos Stavrou.
In the Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC), Orlando,Florida, USA, December 3-7, 2012.

28.   Malware Characterization using Behavioral Components
Chaitanya Yavvari, Arnur Tokhtabayev, Huzefa Rangwala, and Angelos Stavrou.
In the Proceedings of 6th International Conference “Mathematical Methods, Models, and Architectures for Computer Network Security”, St. Petersburg, Russia, October 17-20, 2012.

 

29.   Exposing Security Risks for Commercial Mobile Devices(Invited)
Zhaohui Wang, Ryan Johnson, Rahul Murmuria, and Angelos Stavrou.
In the Proceedings of 6th International Conference “Mathematical Methods, Models, and Architectures for Computer Network Security”, St. Petersburg, Russia, October 17-20, 2012.

30.   Mobile Application and Device Power Usage Measurements
Rahul Murmuria, Jeffrey Medsger, Angelos Stavrou.
In the Proceedings of the 6th International Conference on Software
Security and Reliability (SERE 2012), Washington, DC, June 2012.

31.  Netgator: Malware Detection Using Program Interactive Challenges
Brian Schulte, Haris Andrianakis, Kun Sun, Angelos Stavrou.
In the Proceedings of the 9th Conference on Detection of Intrusions and Malware
& Vulnerability Assessment (DIMVA 2012),
Heraklion, Crete, Greece, July 26-27th, 2012.

 

32.   A Dependability Analysis of Hardware-Assisted Polling Integrity Checking Systems
Jiang Wang, Kun Sun, and Angelos Stavrou.
In the Proceedings of the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and  Networks (DSN 2012), Boston, Massachusetts, June, 2012.

 

33.   Implementing & Optimizing an Encryption File System on Android
Zhaohui Wang, Rahul Murmuria, and Angelos Stavrou.
In the Proceedings of the IEEE International Conference on Mobile Data Management
(IEEE MDM 2012)
, July 23 - 26, 2012, Bangalore, India. (Acceptance Rate: 22/88)

 

34.   Analysis Android Applications’ Permissions (short paper)
Ryan Johnson, Zhaohui Wang, Corey Gagnon and Angelos Stavrou.
In the Proceedings of the 6th International Conference on Software Security and Reliability (SERE 2012),  Washington, DC, June 2012.

35.   Mutual Authentication for USB Communications (short paper)
Zhaohui Wang, Ryan Johnson and Angelos Stavrou.
In the Proceedings of the 6th International Conference on Software Security and Reliability (SERE 2012),  Washington, DC, June 2012.

36.   A Framework for Automated Security Testing of Android Applications on the Cloud (short paper)
Sam Malek, Naeem Esfahani, Thabet Kacem, Riyadh Mahmood, Nariman Mirzaei, and Angelos Stavrou.
In the Proceedings of the 6th International Conference on Software Security and Reliability (SERE 2012),
Washington, DC, June 2012.

37.   SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes
Kun Sun, Jiang Wang, Fengwei Zhang and Angelos Stavrou.
In the Proceedings of the 19th Annual Network & Distributed System Security Symposium NDSS 2012,
San Diego, California, 5-8 February 2012. Impact Factor: 2.60 (Acceptance Rate: 46/258 - 17.8%).  [Presentation]

38.   Hardware-Assisted Application Integrity Monitor
Jiang Wang, Kun Sun, Angelos Stavrou.
In the Proceedings of IEEE Hawaii International Conference on System Sciences (HICSS45) pp. 5375-5383,
45th Hawaii International Conference on System Sciences, 2012 January 4-7, 2012, Grand Wailea, Maui, USA.
Impact Factor: N/A, (Acceptance Rate: N/A).

39.   Cross-domain Collaborative Anomaly Detection: So Far Yet So Close
Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, Salvatore J. Stolfo.
In the Proceedings of the 14th International Symposium on Recent
Advances in Intrusion Detection (RAID). September 2011, Menlo Park, CA.
Impact Factor: 2.20 (Acceptance rate: 20/87 - 23%).

40.   Trading Elephants For Ants: Efficient Post-Attack Reconstitution (Short paper)
Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou, Anup Ghosh and Sushil Jajodia
In the Proceedings of the 7th International ICST Conference on Security and Privacy
in Communication Networks (Securecomm 2011), p. 1-10, September 7-9 2011, London.
Impact Factor: N/A, (Acceptance rate: 24%).      

41.   Predicting Network Response Times Using Social Information (short paper)
Chen Liang, Sharath Hiremagalore, Angelos Stavrou and Huzefa Rangwala.
In the Proceedings of the ACM 2011 Conference on Advances in Social Networks Analysis and Mining,
p. 527-531, July, 2011, Kaohsiung, Taiwan. Impact Factor: N/A, (Acceptance rate: 25%) [bib]

42.   Breaching and Protecting an Anonymizing Network System
Jason Clark and Angelos Stavrou.
In the Proceedings of the 6th Annual Symposium on Information Assurance (ASIA ‘11).
Impact Factor: N/A, (Acceptance rate: 50%).

43.   Advantages and disadvantages of remote asynchronous usability testing using amazon mechanical turk
Erik Nelson and Angelos Stavrou.
Proceedings of the Human Factors and Ergonomics Society 55th Annual Meeting, pages 1080-1084, HFES
2011 Conference, Red Rock Resort, Las Vegas, Nevada, September 19-23, 2011.
Impact Factor: N/A, (Acceptance rate: N/A).

44.   Exploiting Smart-Phone USB Connectivity For Fun And Profit (Extended Version)
Angelos Stavrou and Zhaohui Wang.
BlackHat Technical Conference DC 2011 - Technical Briefings Session.

45.   Exploiting Smart-Phone USB Connectivity For Fun And Profit
Zhaohui Wang and Angelos Stavrou.
In the Proceedings of the 26th Annual Computer Security Applications Conference (ACM ACSAC)
p. 357-366. December 6-10, 2010, Austin, Texas, USA. Impact Factor: 1.82 (Acceptance rate: 39/227) [bib]

46.   Experimental Results of Cross-Site Exchange of Web Content Anomaly Detector Alerts
Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, and Salvatore J. Stolfo.
In the Proceedings of IEEE Conference on Homeland Security Technologies (IEEE HST 2010),
November 8-10, 2010, Waltham, MA, USA. Impact Factor: N/A (Acceptance rate: N/A).

47.   An Adversarial Evaluation of Network Signaling and Control Mechanisms
Kangkook Jee, Stelios Sidiroglou-Douskos, Angelos Stavrou, and Angelos D. Keromytis.
In the Proceedings of the 13th International Conference on Information Security and Cryptology (ICISC).
December 2010, Seoul, Korea. Impact Factor: N/A (Acceptance rate: N/A).

48.   Small World VoIP
Xiaohui Yang, Angelos Stavrou, Ram Dantu, and Duminda Wijesekera.
In the Proceedings of the Second International Conference on Mobile Computing, Applications,
and Services MobiCASE, October 25-28, 2010, Santa Clara, CA, USA.
Impact Factor: N/A (Acceptance rate: N/A).

49.   QoP and QoS policy cognizant policy composition
Paul Seymer, Angelos Stavrou, Duminda Wijesekera, Sushil Jajodia.
In the Proceedings of the IEEE International Symposium on Policies for Distributed Systems
and Networks, p. 77-86, Fairfax, VA, July 21-23, 2010. (Acceptance rate: 19.2%) [bib]

50.   Providing Mobile Users' Anonymity in Hybrid Networks
Claudio Ardagna, Sushil Jajodia, Pierangela Samarati, and Angelos Stavrou (Alphabetic)
In the Proceedings of the 15th European Symposium on Research in Computer Security
(ESORICS 2010), p. 540-557, September 2010, Athens, Greece.  
Impact Factor: 1.45 (Acceptance rate: 42/210 - 20%). [bib]

51.   Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
Sambuddho Chakravarty, Angelos Stavrou, and Angelos D. Keromytis.
In the Proceedings of the 15th European Symposium on Research in Computer Security
(ESORICS 2010) p. 249-267, September 2010, Athens, Greece.
Impact Factor: 1.45 (Acceptance rate: 42/210 - 20%). [bib]

52.   HyperCheck: A Hardware-Assisted Integrity Monitor
Jiang Wang, Angelos Stavrou, and Anup K. Ghosh.
In the Proceedings of 13th International Symposium on Recent Advances in Intrusion Detection
(RAID 2010), p. 158-177, Ottawa, Canada, September 15-17, 2010.
Impact Factor: 2.20 (Acceptance rate: 24/104 - 23.1%). [bib]

53.   A Virtualization Architecture for In-Depth Kernel Isolation
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anup K. Ghosh.
In the Proceedings of 43rd Hawaii International International Conference on Systems Science,
IEEE Computer Society, p. 1-10, 5-8 January 2010, Koloa, Kauai, HI, USA.
Impact Factor: N/A (Acceptance rate: N/A).

54.   Privacy preservation over untrusted mobile networks
Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou in Privacy in Location-Based
Applications:  Research Issues and Emerging Trends, Springer Lecture Notes in Computer Science, Volume
5599, 2009, pages 84-105. Impact Factor: N/A (Acceptance rate: N/A).

55.   Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks (short)
Mansoor Alicherry, Angelos D. Keromytis, and Angelos Stavrou.
In the Proceedings of the 5th International ICST Conference on Security and Privacy in Communication
Networks SECURECOMM 2009, p. 41-50. September 2009, Athens, Greece.
Impact Factor: N/A, (Acceptance rate: 25.3%). [bib]

56.   Adding Trust to P2P Distribution of Paid Content
Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis, and Clifford Stein.
In the Proceedings of the 12th Information Security Conference (ISC), p.459-474.
September 2009, Pisa, Italy. Impact Factor: 1.24, (Acceptance rate: 27.6%). [bib]

57.   A2M: Access-Assured Mobile Desktop Computing
Angelos Stavrou, Ricardo A. Baratto, Angelos D. Keromytis, and Jason Nieh.
In the Proceedings of the 12th Information Security Conference (ISC), p. 186-201.
September 2009, Pisa, Italy. Impact Factor: 1.24, (Acceptance rate: 27.6%). [bib]

58.   Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating
Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo.
In the Proceedings of 12th International Symposium On Recent Advances In Intrusion Detection,
p. 41-60. Saint-Malo, Brittany, France, September 23-25, 2009.
Impact Factor: 2.20 (Acceptance rate: 17 / 59 - 28.8%). [bib]

59.   SQLProb: A Proxy-based Architecture towards Preventing SQL Injection Attacks
Anyi Liu, Yi Yuan, Duminda Wijesekera, and Angelos Stavrou.
In the Proceedings of 24th Annual ACM Symposium on Applied Computing (SAC'09), p. 2054-2061
March 8-12, 2009, Honolulu, Hawaii. Impact Factor: N/A, (Acceptance Rate: 16.6%). [bib]

60.   A Security Architecture for Information Assurance and Availability in MANETs
Angelos Stavrou, and Anup K. Ghosh.
In the Proceedings of IEEE Conference on Military Communications (MILCOM '08),
p. 1 - 8, November 2008, San Diego, CA. Impact Factor: N/A, (Acceptance Rate: N/A).
Impact Factor: N/A, (Acceptance Rate: N/A). [bib]

61.   PAR: Payment for Anonymous Routing
Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, and Steven M. Bellovin.
In the Proceedings of 8th Privacy Enhancing Technologies Symposium, p. 219-236, Leuven, Belgium
July 23 - July 25, 2008. Impact Factor: 1.95, Acceptance rate: 13/49 - 26%). [bib]

62.   The Hidden Difficulties of Watching and Rebuilding Networks.
Michael Locasto and Angelos Stavrou.
IEEE Security and Privacy, vol. 6, no. 2, pp. 79-82, Mar/Apr, 2008.
Impact Factor: 1.17, (Acceptance Rate: N/A). [bib]

63.   Pushback for Overlay Networks: Protecting against Malicious Insiders
Angelos Stavrou, Michael E. Locasto, and Angelos D. Keromytis.
In the Proceedings of the 6th International Conference on Applied Cryptography
and Network Security (ACNS). June 2008, New York, NY.
Impact Factor: N/A, (Acceptance Rate: N/A). [bib]

64.   Casting out Demons: Sanitizing Training Data for Anomaly Sensors
Gabriela F. Cretu, Angelos Stavrou , Michael E. Locasto, Salvatore J. Stolfo, and Angelos D. Keromytis.
In the Proceedings of the IEEE Symposium on Security & Privacy p. 81-95. May 2008, Oakland, CA.
Impact Factor: 4.15, (Acceptance Rate: 11.2%) [bib]

65.   On the Infeasibility of Modeling Polymorphic Shellcode
Yingbo Song, Michael E. Locasto, Angelos Stavrou , Angelos D. Keromytis, and Salvatore J. Stolfo.
In the Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS),
pp. 541 - 551. October/November 2007, Alexandria, VA. Impact Factor: 2.87, (Acceptance rate: 18.1%) [bib]

 

66.   A Study of Malcode-Bearing Documents
Weijen Li, Salvatore Stolfo, Angelos Stavrou, Elli Androulaki, and Angelos D. Keromytis.
In Proceedings of the 4th GI International Conference on Detection of Intrusions & Malware, and
Vulnerability Assessment (DIMVA), pp. 231 - 250. July 2007, Lucerne, Switzerland.
Impact Factor: 1.42, (Acceptance rate: 21%). [bib]

67.   From STEM to SEAD: Speculative Execution for Automated Defense.
Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, and Angelos D. Keromytis.
In the Proceedings of the USENIX Annual Technical Conference (USENIX 2007),
pp. 219-232, June 2007, Santa Clara, CA.  Impact Factor: N/A, (Acceptance rate: 18.75%) [bib]

68.   Network Security as a Composable Service
Stelios Sidiroglou, Angelos Stavrou, and Angelos D. Keromytis.
In the Proceedings of the IEEE Sarnoff Symposium. January 2007, Princeton, NJ. (Invited paper)

69.   Countering DDoS Attacks with Multi-path Overlay Networks
Angelos Stavrou and Angelos D. Keromytis.
In the Information Assurance Technology Analysis Center (IATAC) Information Assurance
Newsletter (IAnewsletter), vol. 9, no. 3, November 2006. (Invited paper, based on the CCS 2005 paper.)[pdf]

70.   W3Bcrypt: Encryption as a Stylesheet
Angelos Stavrou, Michael E. Locasto, and Angelos D. Keromytis. In the Proceedings of the
 4th International Conference on Applied Cryptography and Network Security (ACNS 2006),
pp. 349-364,
June 6-9, 2006, Singapore. Impact Factor: 1.44, (Acceptance rate: 33 / 218 - 15.1%) [bib]

71.   Countering DoS Attacks With Stateless Multipath Overlays
Angelos Stavrou and Angelos D. Keromytis.
In the Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS),
pp. 249 - 259. November 2005, Alexandria, VA. Impact Factor: 2.87, (Acceptance rate: 15.2%) [bib]

72.   gore: Routing-Assisted Defense Against DDoS Attacks
Stephen T. Chou, Angelos Stavrou, John Ioannidis, and Angelos D. Keromytis.
In the Proceedings of the 8th Information Security Conference (ISC), p. 179-193.
September 2005, Singapore. Impact Factor: 1.24, (Acceptance rate: 14%). [bib]

73.   MOVE: An End-to-End Solution To Network Denial of Service
Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, and Dan Rubenstein.
In the Proceedings of the Internet Society (ISOC) Symposium on Network and Distributed Systems Security
(NDSS)
, pp. 81 - 96. February 2005, San Diego, CA. Impact Factor: 2.60 (Acceptance rate: 12.9%). [bib]

74.   Content distribution for seamless transmission
Edward G. Coffman Jr., Andreas Constantinides, Dan Rubenstein, Bruce Shepherd, Angelos Stavrou
In the Proceedings of SIGMETRICS Performance Evaluation Review 32(2): 31-32 (2004) [pdf (936 KB)].

75.   A Pay-per-Use DoS Protection Mechanism For The Web
Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, and Dan Rubenstein.
In the Proceedings of the Applied Cryptography and Network Security (ACNS) Conference.
June 2004, Yellow Mountain, China. LNCS Volume 3089/2004, pp. 120-134, ISBN: 3-540-22217-0.
Impact Factor: 1.44 (Acceptance rate: 12%). [bib]

76.   Using Graphic Turing Tests to Counter Automated DDoS Attacks Against Web Servers
William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein.
In the Proceedings of the 10th ACM International Conference on Computer and Communications Security
(CCS)
, Washington, DC, October 2003. Impact Factor: 2.87, (Acceptance rate: 13.8%) [bib]

77.   A Lightweight, Robust P2P System to Handle Flash Crowds
Angelos Stavrou, Dan Rubenstein and Sambit Sahu.
In the Proceedings of IEEE ICNP 2002, Paris, France, November, 2002.
[Proceedings Version ps (252K)] [Proceedings Version ps.gz (65K)] [Proceedings Version pdf (143K)]
An earlier version is available as Columbia Technical Report EE020321-1, February, 2002.
[Tech Report ps (508K)] [Tech Report ps.gz (109K)] [Tech Report pdf (242K)].
Impact Factor: N/A, (Acceptance rate: 14.7%). [bib]


Books/Book Chapters

 

1.     Overlay-Based DoS Defenses
Angelos Stavrou. In Henk C.A. van Tilborg and Sushil Jajodia, editors, Encyclopedia of Cryptography and Security, 2nd  Edition. Springer, 2010.

2.     TCP Modulation Attacks
Angelos Stavrou. In Henk C.A. van Tilborg and Sushil Jajodia, editors, Encyclopedia of Cryptography and Security, 2nd  Edition. Springer, 2010.


Workshops

 

 

1.       Switchwall: Automated Topology Fingerprinting & Behavior Deviation Identification

Nelson Nazzicari, Javier Almillategui, Angelos Stavrou and Sushil Jajodia.

In the Proceedings of the 8th International Workshop on Security and Trust Management (STM 2012)
in conjunction with ESORICS 2012, Pisa, Italy - September 13-14, 2012

 

2.       A Whitebox Approach for Automated Security Testing of Android Applications on the Cloud
Riyadh Mahmood, Naeem Esfahani, Thabet Kacem, Nariman Mirzaei, Sam Malek, and Angelos Stavrou.
In the Proceedings of the 7th International Workshop on Automation of Software Test (AST 2012), Zurich, Switzerland, June 2012.

3.       The MEERKATS Cloud Security Architecture
Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang,
Azzedine Benameur, Marc Dacier, Matthew Elder, Darrell Kienzle, and Angelos Stavrou.

In the Proceedings of the 3rd International Workshop on Security and Privacy in Cloud Computing
(ICDCS-SPCC). June 2012, Macao, China.

4.       CapMan: Capability-based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET
Quan Jia, Kun Sun and Angelos Stavrou.
In the Proceedings of the First International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems
(MobiPST 2011) in conjunction with 20th International Conference on Computer Communications and Networks (ICCCN 2011)

5.       The MINESTRONE Architecture: Combining Static and Dynamic Analysis Techniques for Software Security
Angelos D. Keromytis, Salvatore J. Stolfo, Junfeng Yang, Angelos Stavrou,
Anup Ghosh, Dawson Engler, Marc Dacier, Matthew Elder, and Darrell Kienzle.
In the Proceedings of the 1st Workshop on Systems Security (SysSec).
July 2011, Amsterdam, Netherlands.

6.       Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensic (short paper)
Jiang Wang, Fengwei Zhang, Kun Sun, and Angelos Stavrou.
In the Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE SADFE 2011).
In conjunction with IEEE Security and Privacy Symposium, Oakland, CA, USA, May 26, 2011

7.       Moving Forward, Building An Ethics Community (Panel Statements) - Computer Security Ethics, Quo Vadis?
Erin Kenneally, Angelos Stavrou, John McHugh, and Nicolas Christin.
In the proceedings of the 2nd Workshop on Ethics in Computer Security Research 2011
Springer Lecture Notes in Computer Science (LNCS).

8.       Scalable Web Object Inspection and Malfease Collection
Charalampos Andrianakis, Paul Seymer, and Angelos Stavrou.
In the Proceedings of the 5th USENIX Workshop on Hot Topics in Security (HotSec '10).
August 10, 2010 Washington, DC. (Acceptance rate: 11/57)

9.       Fine-grained Sharing of Health Records using XSPA Profile for XACML
A. Al-Faresi, Bo Yu, Khalid Moidu, Angelos Stavrou, Duminda Wijesekera, Anoop Singhal
In the Proceedings of 1st USENIX Workshop on Health Security and Privacy (HealthSec '10),
August, 2010, Washington DC, USA.

10.     Evaluating a Collaborative Defense Architecture for MANETs
Mansoor Alicherry, Angelos Stavrou, and Angelos D. Keromytis.
In the Proceedings (electronic) of the IEEE Workshop on Collaborative Security Technologies (CoSec),
pp. 37 - 42. December 2009, Bangalore, India. (Acceptance rate: 17.2%).

11.     Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes.
Angelos Stavrou, Gabriela F. Cretu, Michael E. Locasto, Salvatore J. Stolfo.
In the Proceedings of the 2nd ACM Workshop on Security and Artificial intelligence
(Chicago, Illinois, USA, November 09 - 09, 2009). AISec '09. ACM, New York, NY, 39-46. (Position paper)

12.     The Heisenberg Measuring Uncertainty in Lightweight Virtualization Testbeds
Quan Jia, Zhaohui Wang and Angelos Stavrou.
In the Proceedings of 2nd Workshop on Cyber Security Experimentation and Test
(CSET '09). August, 2009, Montreal, Canada.

13.     Universal Multi-Factor Authentication Using Graphical Passwords
Alireza Pirayesh Sabzevar, and Angelos Stavrou.
In the Proceedings of the 2nd IEEE/ACM Workshop on Security and Privacy in
Telecommunications and Information Systems (SePTIS). December 2008, Bali, Indonesia.

14.     Identifying Proxy Nodes in a Tor Anonymization Circuit
Sambuddho Chakravarty, Angelos Stavrou, and Angelos D. Keromytis.
In the Proceedings of the 2nd IEEE/ACM Workshop on Security and Privacy
in Telecommunications and Information Systems (SePTIS). December 2008, Bali, Indonesia.

15.     A multi-path approach for k-anonymity in mobile hybrid networks
Claudio Agostino Ardagna, Angelos Stavrou, Sushil Jajodia, Pierangela Samarati and Rhandi Martin.
In the Proceedings of International Workshop on Privacy in Location-Based Applications (PiLBA '08), October 2008.

16.     Efficiently Tracking Application Interactions using Lightweight Virtualization
Yih Huang, Angelos Stavrou, Anup K. Ghosh and Sushil Jajodia.
In the Proceeding of the 1st Workshop on Virtualization Security (VMSec), in conjunction
with ACM CCS 2008, October 2008.

17.     Return Value Predictability for Self-Healing
Michael E. Locasto, Angelos Stavrou>, Gabriela F. Cretu, Angelos D. Keromytis, and Salvatore J. Stolfo.
In the Proceedings of the 3rd International Workshop on Security (IWSEC), November 2008, Kagawa, Japan.

18.     Online Training and Sanitization of AD Systems (extended abstract)
Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo.
In the Proceedings of NIPS 2007 Workshop on Machine Learning in Adversarial Environments for Computer Security,
December 2007, Vancouver, B.C., Canada. [pdf]

19.     Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems
Gabriela F. Cretu, Angelos Stavrou, Salvatore J. Stolfo, Angelos D. Keromytis.
In the Proceedings of the 3rd Workshop on Hot Topics in System Dependability (HotDep), pp. 64 - 70. June 2007, Edinburgh, UK. [pdf]

20.     Bridging the Network Reservation Gap Using Overlays
Angelos Stavrou, David Turner, Angelos D. Keromytis, and Vassilis Prevelakis.
In the Proceedings of the 1st Workshop on Information Assurance for Middleware Communications (IAMCOM).
January 2007, Bangalore, India. [pdf] [ps]

21.     Dark Application Communities
Michael E. Locasto, Angelos Stavrou, and Angelos D. Keromytis.
In the Proceedings of the 15th New Security Paradigms Workshop (NSPW 2006).
September 2006, Schloss Dagstuhl, Germany. [pdf] [ps]


Technical Reports

 

1.       Netgator: Malware Detection Through Program Interactive Proofs

Brian Schulte, Rhandi Martin, Haris Andrianakis and Angelos Stavrou, GMU-CS-TR-2011-6

 

2.       SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes

Kun Sun, Jiang Wang, Fengwei Zhang and Angelos Stavrou, GMU-CS-TR-2011-7

 

3.       An Analysis of System Management Mode (SMM)-based Integrity Checking Systems and Evasion Attacks

Jiang Wang, Kun Sun and Angelos Stavrou, GMU-CS-TR-2011-8

 

4.       Ruminate: A Scalable Architecture for Deep Network Analysis
Charles Smutz and Angelos Stavrou, GMU-CS-TR-2010-20.