Publications
Issued Patents
1.
Systems
and
methods for inhibiting attacks with a network
Angelos Stavrou, Angelos D. Keromytis
U.S. Patent Number 9,344,418. Issued on May
17th, 2016.
2.
Methods
and
apparatus for application isolation
Anup Ghosh, Yih Huang, Jiang Wang, Angelos
Stavrou
U.S. Patent Number 9,098,698.
Issued on August
4th, 2015.
3.
Adaptive
feedback
loop based on a sensor for streaming static and interactive
media
content to animals
Angelos Stavrou,
Margaret Lee Perry-Flippin
U.S. Patent Number 9,043,818.
Issued on May 26th,
2015.
4.
Malware
detector
Angelos Stavrou, Sushil Jajodia, Anup Ghosh, Rhandi Martin,
Charalampos Andrianakis
U.S. Patent Number 8,935,773.
Issued on January 13th, 2015.
5.
Systems,
methods,
and media for recovering an application from a fault or attack
Michael E. Locasto,
Angelos D. Keromytis, Angelos Stavrou,
Gabriela
F. Ciocarlie
U.S. Patent Number 8,924,782.
Issued on December 30th, 2014.
6.
Hardware-assisted
integrity
monitor
Jiang Wang, Angelos
Stavrou, Anup Ghosh, Kun Sun
U.S. Patent Number 8,819,225. Issued on August 26th, 2014.
7.
Website
matching
based on network traffic
Angelos Stavrou, Mohammed A.
Alhussein, Brian Sanders
U.S. Patent Number 8,726,005.
Issued on May 13th, 2014.
8.
Systems
and
methods for inhibiting attacks with a network
Angelos Stavrou,
Angelos D. Keromytis.
U.S. Patent Number 8,631,484. Issued on January 14th,
2014.
9.
Methods, media and systems for responding to a denial of service attack
Angelos Stavrou, Angelos D.
Keromytis, Jason Nieh, Vishal Misra, and Daniel Rubenstein.
U.S. Patent Number 8,549,646. Issued on October 1st, 2013.
10.
Systems,
methods, and media for generating sanitized
data, sanitizing anomaly detection models, and/or generating
sanitized anomaly
detection models
Gabriela
Cretu, Angelos Stavrou,
Salvatore J. Stolfo, Angelos D. Keromytis, Michael
E. Locasto.
U.S. Patent Number 8,407,160.
Issued on March 26th,
2013.
11.
Systems
and methods for computing data
transmission characteristics of a network path based
on single-ended measurements
Angelos D. Keromytis, Sambuddho Chakravarty, and Angelos
Stavrou.
U.S. Patent Number 8,228,815. Issued on July 24th,
2012.
12.
Methods,
systems and media
for software self-healing
Michael
E.
Locasto, Angelos D. Keromytis, Salvatore J. Stolfo, Angelos
Stavrou,
Gabriela Cretu,
Stylianos Sidiroglou, Jason Nieh, and Oren Laadan.
U.S. Patent Number 7,962,798. Issued on June 14th, 2011.
13.
Systems and methods for computing data transmission characteristics of
a network path based
on
single-ended measurements
Angelos D. Keromytis, Sambuddho Chakravarty, and Angelos
Stavrou.
U.S. Patent Number 7,660,261. Issued on February 9th, 2010.
Journal Publications
1.
On
Early Detection of
Application-level Resource Exhaustion and Starvation
Mohamed Elsabagh, Daniel Barbara,
Dan Fleck,
Angelos Stavrou.
To appear on the Elsevier Journal
of
Systems and Software. (2017)
2.
Towards
Transparent Debugging
Fengwei Zhang, Kevin Leach, Angelos Stavrou, and Haining Wang.
In the IEEE
Transactions
on Dependable and Secure Computing (TDSC) (2016) vol.PP,
no.99, pp.1-1
3.
On
the
Move: Evading Distributed Denial-of-Service Attacks
Angelos
Stavrou, Daniel Fleck,
Constantinos Kolias.
IEEE
Computer 49(3):
104-107 (2016)
4.
Intrusion
Detection
in 802.11 Networks: Empirical Evaluation of Threats and a Public
Dataset
Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, Stefanos Gritzalis.
IEEE Communications Surveys and Tutorials 18(1): 184-208 (2016)
5.
Learning
Internet-of-Things
Security "Hands-On"
Constantinos Kolias, Angelos
Stavrou, Jeffrey M.
Voas, Irena Bojanova, D. Richard
Kuhn.
IEEE Security & Privacy 14(1): 37-46 (2016)
6.
Securely
Making
"Things" Right
Constantinos Kolias, Angelos
Stavrou, Jeffrey M.
Voas.
IEEE
Computer 48(9):
84-88 IEEE Magazine (2015)
7.
A
Moving Target DDoS Defense Mechanism
Huangxin
Wang,
Quan Jia, Dan Fleck, Walter Powell, Fei Li, Angelos
Stavrou.
In the Elsevier Journal of
Computer
Communications, 46: 10-21 (2014)
8.
HyperCheck:
A
Hardware-Assisted Integrity Monitor
Fengwei Zhang, Jiang Wang, Kun Sun, and Angelos Stavrou.
In the proceedings of IEEE Transactions on Dependable and Secure
Computing
(TDSC), 11(4):
332-344
(2014)
9.
Improving
network response times using
social information
Sharath Hiremagalore, Chen Liang, Angelos
Stavrou
and Huzefa Rangwala.
Proceedings of Social Network Analysis and Mining, Springer
Social Network Analysis and Mining, Volume 3, pages 209-220 (2013)
10.
Providing
Users' Anonymity in Mobile Hybrid
Networks
Claudio Agostino Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos
Stavrou.
ACM Transactions on Internet Technology, Volume 12, 3, Article 7, pages
1 - 33
(May 2013)
11.
Building
Security into Off-the-Shelf
Smartphones
Angelos Stavrou, Jeffrey Voas, Tom
Karygiannis, Steve Quirolgico.
IEEE Computer, vol. 45, no. 2, pp. 82-84,
Feb.
2012, doi:10.1109/MC.2012.44
12.
DoubleGuard:
Detecting Intrusions In
Multi-tier Web Applications
Meixing Le, Angelos Stavrou,
Brent
ByungHoon Kang.
In IEEE Journal on Transactions on Dependable and Secure Computing
(TDSC) 2011,
ISSN: 1545-5971 10 Nov. 2011. IEEE computer Society Digital Library.
IEEE
Computer Society.
Acceptance Rate: 10-12% as reported by 2009 TDSC editorial,
ISI Impact Factor: 2.093
(2010).
13.
The Ephemeral Legion:
Producing an Expert Cyber-security Workforce from Thin Air
Michael E. Locasto, Anup Ghosh, Sushil Jajodia, and Angelos Stavrou.
In the Communications of the ACM,
Vol. 54,
Issue 1, pp 129 - 131.
Impact Factor: 2.362
(2010). [bib]
14.
The
Dynamic Community of Interest and its
Realization in ZODIAC
Scott Alexander, Steve Bellovin, Yuu-Heng Cheng, Brian Coan, Andrei
Ghetie,
Vikram Kaul, Nicholas F. Maxemchuk, Henning Schulzrinne, Stephen Schwab,
Bruce
Siegell,
Angelos Stavrou, and Jonathan M.
Smith.
In IEEE Communications Magazine, October 2009, pp. 40-47. Impact Factor:
2.837
15.
On
the Infeasibility of Modeling
Polymorphic Shellcode: Re-thinking the Role of Learning in Intrusion
Detection
Systems
Yingbo Song, Michael E. Locasto, Angelos
Stavrou, Angelos D. Keromytis, and Salvatore J.
Stolfo.
In the Proceedings of Machine
Learning
Journal (MLJ) p. 179-205. Accepted: 7 August 2009.
Published online: 29 October 2009. Editors:
Pavel
Laskov and Richard Lippmann. ISI Impact Factor: 1.956
(2010). [bib]
16.
WebSOS:
An Overlay-based System For
Protecting Web Servers From Denial of Service Attacks
Angelos Stavrou, Debra L.
Cook,
William G. Morein, Angelos D. Keromytis, Vishal Misra, and Dan
Rubenstein.
In Elsevier
Journal
of Computer Networks, special issue on Web and Network Security,
vol. 48, no. 5,
p. 781 - 807. August 2005 5-Year
Impact
Factor: 1.690.
[bib]
17.
A
Lightweight, Robust, P2P System to Handle
Flash Crowds
Angelos Stavrou, Dan
Rubenstein,
Sambit Sahu.
In the Proceedings of IEEE
Journal
on Selected Areas in Communications (JSAC),
special issue on Service Overlay Networks, Volume 22, Number 1, p. 6-17,
January 2004. Impact Factor: 4.232 (2010). [bib]
Conference Publications
1.
Strict Virtual Call Integrity
Checking for
C++ Binaries
Mohamed
Elsabagh,
Dan Fleck, Angelos Stavrou.
To appear in the Proceedings of the ACM
Asia Conference on Computer and
Communications Security (ASIACCS) 2017, April 2-6, 2017 Abu Dhabi, UAE (Acceptance Rate: 18.7%, 67/359)
2.
Detecting ROP with Statistical
Learning of
Program Characteristics (short
paper)
Mohamed
Elsabagh,
Dan Fleck, Angelos Stavrou.
To appear in the Proceedings of the
7th ACM Conference on Data and
Application and Privacy (CODASPY 2017), March 22-24, 2017, Scottsdale, Arizona, USA
3.
Why
Software
DoS is Hard to Fix: Denying Access in Embedded Android Platforms
Ryan Johnson, Mohamed
Elsabagh, and
Angelos
Stavrou
In the proceedings of the 14th International Conference on Applied
Cryptography
and
Network Security (ACNS) 2016, June 19-22, 2016 London, UK. (Acceptance
Rate: 19.13%, 35/183)
4.
When
a
Tree Falls: Using
Diversity in
Ensemble Classifiers to Identify Evasion in Malware Detectors
Charles Smutz and Angelos
Stavrou
In the proceedings of the Network
and Distributed System Security
Symposium (NDSS) 2016,
February 21-24, San Diego, California. (Acceptance Rate: 15.4%,
60/389)
5.
Targeted
DoS
on Android: How to Disable Android in 10 Seconds or Less
Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou, and
Vincent Sritapan
In the proceedings of the 10th Malware Conference (MALCON) Oct. 2015,
IEEE
Computer Society
ISBN: 978-1-5090-0317-4 pp: 136-143 Puerto Rico, USA.
6.
Preventing
Exploits
in Microsoft Office Documents through Content Randomization
Charles Smutz and Angelos
Stavrou
In the proceedings of the
18th
International Symposium on Research in Attacks, Intrusions and
Defenses (RAID),
Kyoto, Japan, November 2015. (Acceptance Rate: 23.5%, 28/119)
7.
Continuous
Authentication
on Mobile Devices Using Power Consumption, Touch Gestures and
Physical Movement of Users
Rahul Murmuria, Angelos
Stavrou, Daniel
Barbara, Dan Fleck
In the proceedings of the 18th International Symposium on Research in
Attacks,
Intrusions and Defenses (RAID), Kyoto, Japan, November 2015.
(Acceptance Rate:
23.5%, 28/119)
8.
Privacy
Risk
Assessment on Online Photos
Haitao Xu, Haining Wang, Angelos
Stavrou
In the proceedings of the
18th
International Symposium on Research in Attacks, Intrusions and
Defenses (RAID),
Kyoto, Japan, November 2015. (Acceptance Rate: 23.5%, 28/119)
9.
Radmin:
Early
Detection of Application-Level Resource Exhaustion and Starvation
Attacks
Mohamed Elsabagh, Daniel
Barbara,
Daniel Fleck, Angelos
Stavrou
In the proceedings of the 18th International Symposium on Research in
Attacks,
Intrusions and Defenses (RAID), Kyoto, Japan, November 2015.
(Acceptance Rate:
23.5%, 28/119)
10.
On
the DNS
Deployment of Modern Web Services
(Best
paper nominee)
Shuai Hao, Haining Wang, Angelos
Stavrou, and Evgenia
Smirni
In the proceeding of the 23rd IEEE International Conference on Network
Protocols (ICNP)
San Francisco, CA, November 10-13 2015. (Acceptance rate: 20%)
11.
Analysis
of
Content Copyright Infringement in Mobile Application Markets
(Best paper award)
Ryan Johnson, Nikolaos
Kiourtis, Angelos
Stavrou, and Vincent
Sritapan
In the proceedings of APWG/IEEE eCrime Research Summit 2015,
Barcelona, Spain,
May 2015.
12.
Using
Hardware
Features for Increased Debugging Transparency
Fengwei Zhang, Kevin Leach, Angelos
Stavrou, Haining Wang, and Kun
Sun
In the Proceedings of the 36th IEEE Symposium on Security and Privacy
(Oakland 2015), San Jose, CA, May 2015. (Acceptance Rate: 13.5%,
55/407)
13.
Resurrecting
the READ_LOGS Permission on
Samsung Devices
Ryan Johnson and Angelos
Stavrou
In the briefings of Blackhat
Asia
2015.
14.
E-commerce Reputation Manipulation: The Emergence of
Reputation-Escalation-as-a-Service
(Best paper nominee)
Haitao Xu, Daiping Liu, Haining Wang and Angelos
Stavrou
In the Proceedings of 24th World Wide Web Conference (WWW
2015). (Acceptance
Rate: 14.1%, 131/929)
15.
TrustLogin:
Securing
Password-Login on Commodity Operating Systems
Fengwei Zhang, Kevin Leach, Haining Wang, and Angelos
Stavrou
In the Proceedings of The 10th ACM Symposium on Information, Computer
and
Communications Security (AsiaCCS'15), Singapore, April 2015.
(Acceptance Rate: 17.8%,
48/269)
16.
transAD:
An
Anomaly Detection Network Intrusion Sensor for the Web (short paper)
Sharath Hiremagalore, Daniel Barbara, Dan Fleck, Walter Powell, and
Angelos Stavrou
In the Proceedings of Information Security Conference (ISC
2014), Lecture Notes in
Computer Science p 477-489, Hong Kong, Oct 2014.
(Acceptance Rate: 17.8%, 48/269)
17.
A
Framework to Secure Peripherals at Runtime
Fengwei Zhang, Haining Wang, Kevin Leach, Angelos
Stavrou
European Symposium on Research in Computer Security (ESORICS) p. 219-238
(2014)
(Acceptance Rate: 24.8%,
58/234)
18.
Click
Fraud
Detection on the Advertiser Side
Haitao Xu, Daiping Liu, Aaron Koehl, Haining Wang, Angelos
Stavrou
European Symposium on Research in Computer Security (ESORICS) p. 419-438
(2014)
(Acceptance Rate: 24.8%, 58/234)
19.
Activity
Spoofing
and Its Defense in Android Smartphones
Brett Cooley, Haining Wang, and Angelos
Stavrou
In the proceedings of the 12th International Conference on Applied
Cryptography and Network Security (ACNS 2014) Lausanne,
Switzerland.
(Acceptance Rate: 22.5%, 33/147)
20.
Catch
Me if You Can: A Cloud-Enabled DDoS
Defense
Quan Jia, Huangxin Wang, Dan Fleck, Fei Li, Angelos
Stavrou, Walter A. Powell.
In the Proceedings of the 44th Annual IEEE/IFIP International Conference
on
Dependable Systems and Networks (IEEE DSN
2014),
Atlanta, Georgia USA,
June 23 - 26, 2014.
21.
Detecting
Malicious Javascript in PDF
through Document Instrumentation
Daiping Liu, Haining Wang, and Angelos
Stavrou.
In the Proceedings of the 44th Annual IEEE/IFIP International
Conference
on
Dependable Systems and Networks (IEEE DSN
2014),
Atlanta, Georgia USA,
June 23 - 26, 2014.
22.
PyTrigger:
A
System to Trigger & Extract User-Activated Malware Behavior
Dan Fleck, Arnur Tokhtabayev, Alex Alarif, Angelos
Stavrou,
and Tomas Nykodym.
In the proceedings of the 8th
ARES
Conference (ARES 2013),
University of Regensburg, Germany September 2nd - 6th, 2013.
23.
MOTAG:
Moving
Target Defense Against Internet Denial of Service Attacks
Quan Jia, Kun Sun, Angelos
Stavrou.
In the proceedings of the International
Conference
on Computer Communications
and Networks ICCCN 2013 Nassau, Bahamas July 30 - August 2, 2013.
24.
Behavioral
Analysis of Android
Applications Using Automated Instrumentation
Mohammad Karami, Mohamed Elsabagh, Parnian Najafiborazjani,
and Angelos Stavrou.
In the Proceedings of the 7th
International
Conference on Software Security and Reliability
(IEEE SERE 2013), 18-20 June 2013, Washington DC, USA. (Acceptance
rate
30%)
25.
Forced-Path
Execution for Android
Applications on x86 Platforms
Ryan Johnson, and Angelos Stavrou.
In the Proceedings of the 7th
International
Conference on Software Security and Reliability
(IEEE SERE 2013), 18-20 June 2013, Washington DC, USA. (Acceptance
rate
30%)
26.
Towards
a
Cyber Conflict Taxonomy
Scott Applegate and Angelos Stavrou.
To appear in the Proceedings of the 5th International
Conference
on Cyber Conflict (CyCon 2013)
NATO Cooperative Cyber Defence Centre of Excellence conference, 4-7
June
2013 in Tallinn, Estonia.
27.
Spectre:
A
Dependable Introspection Framework via System Management Mode
Fengwei Zhang, Kevin Leach, Kun Sun, and Angelos
Stavrou.
In the Proceedings of the 43nd Annual IEEE/IFIP International Conference
on
Dependable Systems and Networks (IEEE DSN
2013),
Budapest, 24 - 27 June 2013.
(Acceptance Rate: 19.6%)
28.
Exposing
Software
Security and Availability Risks For Commercial Mobile Devices (CMDs)
Ryan Johnson, Zhaohui Wang, Angelos
Stavrou, and Jeff Voas.
In the Proceedings of the IEEE RAMS 2013,
Orlando, Florida, 28 - 31 January 2013.
29.
Malicious
PDF
Detection Using Metadata and Structural Features
Charles Smutz and Angelos
Stavrou.
In the Proceedings of the 2012 Annual Computer Security Applications
Conference
(ACSAC), Orlando, Florida, USA, December 3-7, 2012. (Acceptance Rate:
19%,
44/231)
30.
Malware
Characterization
using Behavioral Components
Chaitanya Yavvari, Arnur Tokhtabayev, Huzefa Rangwala, and Angelos
Stavrou.
In the Proceedings of 6th International Conference "Mathematical
Methods, Models, and
Architectures for Computer Network Security", St. Petersburg, Russia,
October
17-20, 2012.
31.
Exposing
Security
Risks for Commercial Mobile Devices(Invited)
Zhaohui Wang, Ryan Johnson, Rahul Murmuria, and Angelos
Stavrou.
In the Proceedings of 6th International Conference "Mathematical
Methods, Models, and
Architectures for Computer Network Security", St. Petersburg, Russia,
October
17-20, 2012.
32.
Mobile
Application and Device Power Usage
Measurements
Rahul Murmuria, Jeffrey Medsger, Angelos
Stavrou.
In the Proceedings of the 6th International Conference on Software
Security and Reliability (SERE 2012), Washington, DC, June 2012.
33.
Netgator:
Malware
Detection Using Program Interactive Challenges
Brian
Schulte,
Haris Andrianakis, Kun Sun, Angelos Stavrou.
In the
Proceedings of the 9th Conference on Detection of Intrusions and
Malware
& Vulnerability Assessment (DIMVA 2012), Heraklion, Crete, Greece, July 26-27th, 2012.
34.
A
Dependability Analysis of
Hardware-Assisted Polling Integrity Checking Systems
Jiang Wang, Kun Sun, and Angelos
Stavrou.
In the Proceedings of the 42nd Annual IEEE/IFIP International Conference
on
Dependable Systems and Networks
(DSN
2012), Boston, Massachusetts, June, 2012.
35.
Implementing
&
Optimizing an Encryption File System on Android
Zhaohui
Wang,
Rahul Murmuria, and Angelos Stavrou.
In the Proceedings of the IEEE
International Conference on Mobile Data
Management
(IEEE MDM 2012), July 23 - 26, 2012, Bangalore, India. (Acceptance Rate: 22/88)
36.
Analysis
Android ApplicationsÕ Permissions
(short paper)
Ryan Johnson, Zhaohui Wang, Corey Gagnon and Angelos
Stavrou.
In the Proceedings of the 6th
International
Conference on Software Security and Reliability (SERE 2012), Washington,
DC, June 2012.
37.
Mutual
Authentication for USB
Communications (short paper)
Zhaohui Wang, Ryan Johnson and Angelos
Stavrou.
In the Proceedings of the 6th
International
Conference on Software Security and Reliability (SERE 2012), Washington,
DC, June 2012.
38.
A
Framework for Automated Security Testing
of Android Applications on the Cloud (short)
Sam Malek, Naeem Esfahani, Thabet Kacem, Riyadh Mahmood, Nariman
Mirzaei, and Angelos Stavrou. In the
Proceedings of the 6th
International Conference on
Software Security and Reliability (SERE 2012), Washington, DC,
June 2012.
39.
SecureSwitch:
BIOS-Assisted Isolation and
Switch between Trusted and Untrusted Commodity OSes
Kun Sun, Jiang Wang, Fengwei Zhang and Angelos
Stavrou.
In the Proceedings of the 19th
Annual Network & Distributed System
Security Symposium NDSS 2012, San Diego, California,
5-8 February
2012. Impact
Factor: 2.60 (Acceptance Rate: 46/258 - 17.8%). [Presentation]
40.
Hardware-Assisted
Application Integrity
Monitor
Jiang Wang, Kun Sun, Angelos Stavrou.
In the Proceedings of IEEE Hawaii International Conference on System
Sciences
(HICSS45) pp. 5375-5383, 45th Hawaii International Conference on System
Sciences, 2012 January 4-7,
2012, Grand
Wailea, Maui, USA. Impact
Factor: N/A,
(Acceptance Rate: N/A).
41.
Cross-domain
Collaborative
Anomaly Detection: So Far Yet So Close
Nathaniel Boggs, Sharath Hiremagalore, Angelos
Stavrou, Salvatore J. Stolfo.
In the Proceedings of the 14th International Symposium on Recent
Advances in Intrusion Detection (RAID). September 2011, Menlo Park, CA.
Impact Factor: 2.20
(Acceptance rate: 20/87 - 23%).
42.
Trading
Elephants For Ants: Efficient
Post-Attack Reconstitution (Short paper)
Meixing Le, Zhaohui Wang, Quan Jia, Angelos
Stavrou,
Anup Ghosh and Sushil Jajodia
In the Proceedings of the 7th International ICST Conference on Security
and
Privacy
in Communication Networks (Securecomm 2011), p. 1-10, September 7-9
2011,
London.
Impact Factor: N/A, (Acceptance rate: 24%).
43.
Predicting
Network Response Times Using
Social Information (short paper)
Chen Liang, Sharath Hiremagalore, Angelos
Stavrou and Huzefa Rangwala.
In the Proceedings of the ACM
2011
Conference on Advances in Social Networks Analysis and Mining, p.
527-531,
July, 2011, Kaohsiung, Taiwan. Impact Factor: N/A, (Acceptance rate:
25%) [bib]
44.
Breaching
and Protecting an Anonymizing
Network System
Jason Clark and Angelos Stavrou.
In the Proceedings of the 6th Annual Symposium on Information
Assurance (ASIA 2011).
Impact Factor: N/A, (Acceptance rate: 50%).
45.
Advantages
and disadvantages of remote
asynchronous usability testing using amazon mechanical turk
Erik Nelson and Angelos Stavrou.
Proceedings of the Human
Factors and
Ergonomics Society 55th Annual Meeting, pages 1080-1084, HFES 2011 Conference, Red Rock Resort, Las Vegas,
Nevada,
September 19-23, 2011.
Impact Factor: N/A, (Acceptance rate: N/A).
46.
Exploiting
Smart-Phone
USB Connectivity For Fun And Profit (Extended
Version)
Angelos Stavrou
and Zhaohui Wang.
BlackHat Technical Conference
DC 2011
- Technical Briefings Session.
47.
Exploiting
Smart-Phone
USB Connectivity For Fun And Profit
Zhaohui Wang and Angelos
Stavrou.
In the Proceedings of the 26th
Annual
Computer Security Applications Conference (ACM ACSAC)
p. 357-366. December 6-10, 2010, Austin, Texas, USA. Impact Factor: 1.82
(Acceptance
rate: 39/227) [bib]
48.
Experimental
Results
of Cross-Site Exchange of Web Content Anomaly Detector Alerts
Nathaniel Boggs, Sharath Hiremagalore, Angelos
Stavrou, and Salvatore J. Stolfo.
In the Proceedings of IEEE Conference on
Homeland Security Technologies (IEEE HST 2010),
November 8-10, 2010, Waltham, MA, USA. Impact Factor: N/A (Acceptance
rate:
N/A).
49.
An
Adversarial
Evaluation of Network Signaling and Control Mechanisms
Kangkook Jee, Stelios Sidiroglou-Douskos, Angelos
Stavrou, and Angelos D. Keromytis.
In the Proceedings of the 13th International Conference on Information
Security
and Cryptology (ICISC).
December 2010, Seoul, Korea. Impact Factor: N/A (Acceptance rate: N/A).
50.
Small
World
VoIP
Xiaohui Yang, Angelos
Stavrou,
Ram Dantu, and Duminda Wijesekera.
In the Proceedings of the Second International Conference on Mobile
Computing,
Applications,
and Services MobiCASE, October
25-28,
2010, Santa Clara, CA, USA.
Impact Factor: N/A (Acceptance rate: N/A).
51.
QoP
and
QoS policy cognizant policy composition
Paul Seymer, Angelos
Stavrou,
Duminda Wijesekera, Sushil Jajodia.
In the Proceedings of the IEEE
International
Symposium on Policies for Distributed Systems
and Networks, p. 77-86, Fairfax, VA, July 21-23, 2010. (Acceptance rate:
19.2%)
[bib]
52.
Providing
Mobile Users' Anonymity in Hybrid
Networks
Claudio Ardagna, Sushil Jajodia, Pierangela Samarati, and Angelos
Stavrou (Alphabetic)
In the Proceedings of the 15th
European
Symposium on Research in Computer Security
(ESORICS 2010), p. 540-557, September 2010, Athens, Greece.
Impact Factor: 1.45
(Acceptance
rate: 42/210 - 20%). [bib]
53.
Traffic
Analysis Against Low-Latency
Anonymity Networks Using Available Bandwidth Estimation
Sambuddho Chakravarty, Angelos
Stavrou, and Angelos D. Keromytis.
In the Proceedings of the 15th
European
Symposium on Research in Computer Security
(ESORICS 2010) p. 249-267, September 2010, Athens, Greece.
Impact Factor: 1.45
(Acceptance
rate: 42/210 - 20%). [bib]
54.
HyperCheck:
A Hardware-Assisted Integrity
Monitor
Jiang Wang, Angelos
Stavrou,
and Anup K. Ghosh.
In the Proceedings of 13th
International
Symposium on Recent Advances in Intrusion Detection
(RAID 2010), p. 158-177, Ottawa, Canada, September 15-17, 2010.
Impact Factor: 2.20
(Acceptance
rate: 24/104 - 23.1%). [bib]
55.
A
Virtualization Architecture for In-Depth
Kernel Isolation
Jiang Wang, Sameer Niphadkar, Angelos
Stavrou, Anup K. Ghosh.
In the Proceedings of 43rd Hawaii International International Conference
on
Systems Science,
IEEE Computer Society, p. 1-10, 5-8 January 2010, Koloa, Kauai, HI, USA.
Impact Factor: N/A (Acceptance rate: N/A).
56.
Privacy
preservation over untrusted mobile
networks
Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos
Stavrou in Privacy in Location-Based
Applications: Research
Issues and
Emerging Trends, Springer Lecture Notes in Computer Science, Volume
5599, 2009, pages 84-105. Impact Factor: N/A (Acceptance rate: N/A).
57.
Deny-by-Default
Distributed Security Policy
Enforcement in Mobile Ad Hoc Networks (short)
Mansoor Alicherry, Angelos D. Keromytis, and Angelos
Stavrou.
In the Proceedings of the 5th International ICST Conference on Security
and Privacy
in Communication
Networks SECURECOMM 2009, p. 41-50. September 2009, Athens, Greece.
Impact Factor: N/A, (Acceptance rate: 25.3%). [bib]
58.
Adding
Trust to P2P Distribution of Paid
Content
Alex Sherman, Angelos
Stavrou,
Jason Nieh, Angelos D. Keromytis, and Clifford Stein.
In the Proceedings of the 12th Information Security Conference (ISC),
p.459-474.
September 2009, Pisa, Italy. Impact Factor: 1.24, (Acceptance
rate: 27.6%).
[bib]
59.
A2M:
Access-Assured
Mobile Desktop Computing
Angelos Stavrou,
Ricardo A. Baratto, Angelos D. Keromytis, and Jason Nieh.
In the Proceedings of the 12th Information Security Conference (ISC), p.
186-201.
September 2009, Pisa, Italy. Impact Factor: 1.24, (Acceptance
rate: 27.6%).
[bib]
60.
Adaptive
Anomaly Detection via
Self-Calibration and Dynamic Updating
Gabriela F. Cretu, Angelos Stavrou,
Michael
E. Locasto, Salvatore J. Stolfo.
In the Proceedings of 12th International Symposium On Recent Advances In
Intrusion Detection,
p. 41-60. Saint-Malo, Brittany, France, September 23-25, 2009.
Impact Factor: 2.20
(Acceptance
rate: 17 / 59 - 28.8%). [bib]
61.
SQLProb:
A Proxy-based Architecture towards
Preventing SQL Injection Attacks
Anyi Liu, Yi Yuan, Duminda Wijesekera, and Angelos
Stavrou.
In the Proceedings of 24th Annual ACM Symposium on Applied Computing
(SAC'09), p.
2054-2061
March 8-12, 2009, Honolulu, Hawaii. Impact Factor: N/A, (Acceptance
Rate:
16.6%). [bib]
62.
A
Security Architecture for Information
Assurance and Availability in MANETs
Angelos Stavrou,
and Anup K. Ghosh.
In the Proceedings of IEEE Conference on Military Communications (MILCOM
'08),
p. 1 - 8, November 2008, San Diego, CA. Impact Factor: N/A, (Acceptance
Rate:
N/A).
Impact Factor: N/A, (Acceptance Rate: N/A). [bib]
63.
PAR:
Payment for Anonymous Routing
Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos
Stavrou, and Steven M. Bellovin.
In the Proceedings of 8th Privacy Enhancing Technologies Symposium, p.
219-236,
Leuven, Belgium
July 23 - July 25, 2008. Impact Factor: 1.95,
Acceptance rate: 13/49 - 26%). [bib]
64.
The
Hidden Difficulties of Watching and
Rebuilding Networks.
Michael Locasto and Angelos Stavrou.
IEEE Security and Privacy, vol. 6, no. 2, pp. 79-82, Mar/Apr, 2008.
Impact Factor: 1.17, (Acceptance Rate: N/A). [bib]
65.
Pushback for Overlay Networks: Protecting against Malicious Insiders
Angelos Stavrou, Michael E. Locasto,
and
Angelos D. Keromytis.
In the Proceedings of the 6th International Conference on Applied
Cryptography
and Network Security (ACNS). June 2008, New York, NY.
Impact Factor: N/A, (Acceptance Rate: N/A). [bib]
66.
Casting
out Demons: Sanitizing Training Data
for Anomaly Sensors
Gabriela F. Cretu, Angelos Stavrou ,
Michael
E. Locasto, Salvatore J. Stolfo, and Angelos D. Keromytis.
In the Proceedings of the IEEE Symposium on Security & Privacy p.
81-95.
May 2008, Oakland, CA.
Impact Factor: 4.15,
(Acceptance
Rate: 11.2%) [bib]
67.
On
the Infeasibility of Modeling
Polymorphic Shellcode
Yingbo Song, Michael E. Locasto, Angelos
Stavrou
, Angelos D. Keromytis, and Salvatore J. Stolfo.
In the Proceedings of the 13th ACM Conference on Computer and
Communications
Security (CCS),
pp. 541 - 551. October/November 2007, Alexandria, VA. Impact Factor: 2.87,
(Acceptance rate:
18.1%) [bib]
68.
A Study of Malcode-Bearing Documents
Weijen Li, Salvatore Stolfo, Angelos
Stavrou, Elli Androulaki, and Angelos D. Keromytis.
In Proceedings of the 4th GI International Conference on Detection of
Intrusions & Malware, and
Vulnerability Assessment (DIMVA), pp. 231 - 250. July 2007, Lucerne,
Switzerland.
Impact Factor: 1.42, (Acceptance rate: 21%). [bib]
69.
From
STEM to SEAD: Speculative Execution
for Automated Defense.
Michael E. Locasto, Angelos
Stavrou,
Gabriela F. Cretu, and Angelos D. Keromytis.
In the Proceedings of the USENIX
Annual
Technical Conference (USENIX 2007),
pp. 219-232, June 2007, Santa Clara, CA. Impact
Factor: N/A, (Acceptance rate:
18.75%) [bib]
70.
Network
Security as a Composable Service
Stelios Sidiroglou, Angelos Stavrou,
and
Angelos D. Keromytis.
In the Proceedings of the IEEE
Sarnoff
Symposium. January 2007, Princeton, NJ. (Invited paper)
71.
Countering DDoS Attacks with Multi-path Overlay Networks
Angelos Stavrou and Angelos D.
Keromytis.
In the Information Assurance
Technology
Analysis Center (IATAC) Information Assurance
Newsletter (IAnewsletter), vol. 9, no. 3, November 2006. (Invited paper,
based
on the CCS 2005 paper.)[pdf]
72.
W3Bcrypt:
Encryption as a Stylesheet
Angelos Stavrou, Michael E. Locasto,
and
Angelos D. Keromytis. In the Proceedings of the
4th
International Conference on
Applied Cryptography and Network Security (ACNS 2006),
pp. 349-364, June 6-9, 2006, Singapore. Impact Factor: 1.44,
(Acceptance rate: 33 / 218
-
15.1%) [bib]
73.
Countering
DoS Attacks With Stateless
Multipath Overlays
Angelos Stavrou and Angelos D.
Keromytis.
In the Proceedings of the 12th ACM
Conference on Computer
and Communications Security (CCS),
pp. 249 - 259. November 2005, Alexandria, VA. Impact Factor: 2.87,
(Acceptance rate: 15.2%) [bib]
74.
gore: Routing-Assisted Defense Against DDoS Attacks
Stephen T. Chou, Angelos Stavrou,
John
Ioannidis, and Angelos D. Keromytis.
In the Proceedings of the 8th
Information Security Conference (ISC),
p.
179-193.
September 2005, Singapore. Impact
Factor:
1.24, (Acceptance rate: 14%). [bib]
75.
MOVE:
An End-to-End Solution To Network
Denial of Service
Angelos Stavrou, Angelos D.
Keromytis, Jason
Nieh, Vishal Misra, and Dan Rubenstein.
In the Proceedings of the Internet Society (ISOC) Symposium
on
Network and Distributed Systems Security
(NDSS), pp. 81 - 96. February 2005, San Diego, CA. Impact Factor:
2.60
(Acceptance rate: 12.9%). [bib]
76.
Content
distribution for seamless transmission
Edward G. Coffman Jr., Andreas Constantinides, Dan Rubenstein,
Bruce
Shepherd, Angelos Stavrou
In the Proceedings of SIGMETRICS
Performance
Evaluation Review 32(2): 31-32 (2004) [pdf
(936 KB)].
77.
A
Pay-per-Use DoS Protection Mechanism For
The Web
Angelos Stavrou, John
Ioannidis,
Angelos D. Keromytis, Vishal Misra, and Dan Rubenstein.
In the Proceedings of the Applied
Cryptography
and Network Security (ACNS) Conference.
June 2004, Yellow Mountain, China. LNCS Volume 3089/2004, pp. 120-134,
ISBN:
3-540-22217-0.
Impact Factor: 1.44
(Acceptance rate: 12%). [bib]
78.
Using
Graphic Turing Tests to Counter
Automated DDoS Attacks Against Web Servers
William G. Morein, Angelos Stavrou,
Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein.
In the Proceedings of the 10th
ACM
International Conference on Computer and Communications Security
(CCS), Washington, DC, October 2003. Impact Factor: 2.87,
(Acceptance rate: 13.8%) [bib]
79.
A Lightweight, Robust P2P System to Handle Flash Crowds
Angelos Stavrou, Dan
Rubenstein and Sambit
Sahu.
In the Proceedings of IEEE ICNP 2002, Paris, France, November, 2002.
[Proceedings Version
ps
(252K)] [Proceedings
Version
ps.gz (65K)] [Proceedings
Version
pdf (143K)]
An earlier version is available as Columbia Technical Report EE020321-1,
February, 2002.
[Tech Report ps (508K)]
[Tech Report ps.gz
(109K)] [Tech Report
pdf (242K)].
Impact Factor: N/A, (Acceptance rate: 14.7%). [bib]
Books/Book Chapters
1.
Overlay-Based
DoS
Defenses
Angelos
Stavrou.
In Henk C.A. van Tilborg and
Sushil Jajodia, editors, Encyclopedia of Cryptography and Security, 2nd
Edition. Springer, 2010.
2.
TCP
Modulation Attacks
Angelos
Stavrou.
In Henk C.A. van Tilborg and
Sushil Jajodia, editors, Encyclopedia of Cryptography and Security, 2nd
Edition. Springer, 2010.
Workshops
1.
Your
Data in Your Hands: Privacy-preserving User Behavior Models for
Context
Computation
Rahul Murmuria, Angelos Stavrou, Daniel Barbara, and Vincent
Sritapan
To appear in the proceedings of International Workshop on Behavioral
Implications of Contextual Analytics (co-located with IEEE PerCom 2017)
2.
Authentication
Feature and Model Selection using Penalty
Algorithms
Rahul Murmuria and Angelos Stavrou.
In the proceedings of
the Twelfth Symposium on Usable Privacy and Security (SOUPS 2016).
USENIX
Association, 2016, Way workshop, Denver Colorado June 22-24, 2016
3.
Switchwall:
Automated Topology
Fingerprinting & Behavior Deviation Identification
Nelson Nazzicari, Javier Almillategui, Angelos Stavrou and Sushil Jajodia.
In the Proceedings of
the 8th International Workshop on Security and Trust Management (STM
2012)
in conjunction with ESORICS 2012,
Pisa, Italy - September 13-14,
2012
4.
A
Whitebox Approach for
Automated Security Testing of Android Applications on the Cloud
Riyadh Mahmood, Naeem Esfahani, Thabet Kacem, Nariman Mirzaei, Sam
Malek, and Angelos Stavrou.
In the Proceedings of the 7th International
Workshop on
Automation of Software Test (AST 2012), Zurich, Switzerland,
June 2012.
5.
The
MEERKATS Cloud Security Architecture
, , , , ,
, ,
, ,
and .
In the Proceedings
of the 3rd
International Workshop on Security and Privacy in Cloud Computing
(ICDCS-SPCC). June 2012, Macao, China.
6.
CapMan:
Capability-based
Defense against Multi-Path Denial of Service (DoS) Attacks in
MANET
Quan Jia, Kun Sun and Angelos
Stavrou.
In the Proceedings of
the
First International Workshop on Privacy, Security and Trust in Mobile
and
Wireless Systems
(MobiPST 2011) in conjunction with 20th
International Conference on
Computer Communications and Networks (ICCCN 2011)
7.
The
MINESTRONE Architecture: Combining Static
and Dynamic Analysis Techniques for Software Security
Angelos D. Keromytis, Salvatore J. Stolfo, Junfeng Yang, Angelos
Stavrou,
Anup Ghosh, Dawson Engler, Marc Dacier, Matthew Elder, and Darrell
Kienzle.
In the Proceedings of the 1st Workshop on Systems Security (SysSec).
July 2011, Amsterdam, Netherlands.
8.
Firmware-assisted
Memory Acquisition and
Analysis tools for Digital Forensic (short paper)
Jiang Wang, Fengwei
Zhang,
Kun Sun, and Angelos Stavrou.
In the Sixth International
Workshop on
Systematic Approaches to Digital Forensic Engineering (IEEE SADFE 2011).
In conjunction with IEEE Security and Privacy Symposium, Oakland, CA,
USA, May
26, 2011
9.
Moving
Forward,
Building An Ethics Community (Panel Statements) - Computer Security
Ethics, Quo Vadis?
Erin Kenneally, Angelos Stavrou,
John
McHugh, and Nicolas Christin.
In the proceedings of the
2nd
Workshop on Ethics in Computer Security Research 2011
Springer Lecture Notes in Computer Science (LNCS).
10.
Scalable
Web Object Inspection and Malfease
Collection
Charalampos Andrianakis, Paul Seymer, and Angelos
Stavrou.
In the Proceedings of the 5th USENIX Workshop on Hot Topics in Security
(HotSec
'10).
August 10, 2010 Washington, DC. (Acceptance rate: 11/57)
11.
Fine-grained
Sharing of Health Records using
XSPA Profile for XACML
A. Al-Faresi, Bo Yu, Khalid Moidu, Angelos
Stavrou, Duminda Wijesekera, Anoop Singhal
In the Proceedings of 1st USENIX Workshop on Health Security and Privacy
(HealthSec '10),
August, 2010, Washington DC, USA.
12.
Evaluating
a Collaborative Defense Architecture for
MANETs
Mansoor Alicherry, Angelos
Stavrou, and Angelos D. Keromytis.
In the Proceedings (electronic) of the IEEE Workshop on Collaborative
Security
Technologies (CoSec),
pp. 37 - 42. December 2009, Bangalore, India. (Acceptance rate: 17.2%).
13.
Keep
your friends
close: the necessity for updating an anomaly sensor with legitimate
environment
changes.
Angelos Stavrou,
Gabriela F. Cretu, Michael E. Locasto, Salvatore J. Stolfo.
In the Proceedings of the 2nd ACM Workshop on Security and Artificial
intelligence
(Chicago, Illinois, USA, November 09 - 09, 2009). AISec '09. ACM, New
York, NY,
39-46. (Position paper)
14.
The
Heisenberg
Measuring Uncertainty in Lightweight Virtualization Testbeds
Quan Jia, Zhaohui Wang and Angelos
Stavrou.
In the Proceedings of 2nd Workshop on Cyber Security Experimentation and
Test
(CSET '09). August, 2009, Montreal, Canada.
15.
Universal
Multi-Factor
Authentication Using Graphical Passwords
Alireza Pirayesh Sabzevar, and Angelos
Stavrou.
In the Proceedings of the 2nd IEEE/ACM Workshop on Security and Privacy
in
Telecommunications and Information Systems (SePTIS). December 2008,
Bali,
Indonesia.
16.
Identifying
Proxy
Nodes in a Tor Anonymization Circuit
Sambuddho Chakravarty, Angelos Stavrou,
and
Angelos D. Keromytis.
In the Proceedings of the 2nd IEEE/ACM Workshop on Security and Privacy
in Telecommunications and Information Systems (SePTIS). December 2008,
Bali,
Indonesia.
17.
A
multi-path approach for
k-anonymity in mobile hybrid networks
Claudio Agostino Ardagna, Angelos
Stavrou,
Sushil Jajodia, Pierangela Samarati and Rhandi Martin.
In the Proceedings of International Workshop on Privacy in
Location-Based
Applications (PiLBA '08), October 2008.
18.
Efficiently
Tracking
Application Interactions using Lightweight Virtualization
Yih Huang, Angelos Stavrou, Anup K.
Ghosh
and Sushil Jajodia.
In the Proceeding of the 1st
Workshop on
Virtualization Security (VMSec), in conjunction
with ACM CCS 2008, October 2008.
19.
Return
Value
Predictability for Self-Healing
Michael E. Locasto, Angelos Stavrou>,
Gabriela F. Cretu, Angelos D. Keromytis, and Salvatore J. Stolfo.
In the Proceedings of the 3rd
International
Workshop on Security (IWSEC), November 2008, Kagawa, Japan.
20.
Online
Training
and Sanitization of AD Systems (extended abstract)
Gabriela F. Cretu, Angelos Stavrou,
Michael
E. Locasto, Salvatore J. Stolfo.
In the Proceedings of NIPS 2007 Workshop on Machine Learning in
Adversarial
Environments for Computer Security,
December 2007, Vancouver, B.C., Canada. [pdf]
21.
Data
Sanitization:
Improving the Forensic Utility of Anomaly Detection Systems
Gabriela F. Cretu, Angelos Stavrou,
Salvatore J. Stolfo, Angelos D. Keromytis.
In the Proceedings of the 3rd Workshop on Hot Topics in System
Dependability
(HotDep), pp. 64 - 70. June 2007, Edinburgh, UK. [pdf]
22.
Bridging
the
Network Reservation Gap Using Overlays
Angelos Stavrou, David Turner,
Angelos D.
Keromytis, and Vassilis Prevelakis.
In the Proceedings of the 1st Workshop
on
Information Assurance for Middleware Communications (IAMCOM).
January 2007, Bangalore, India. [pdf]
[ps]
23.
Dark
Application Communities
Michael E. Locasto, Angelos Stavrou,
and
Angelos D. Keromytis.
In the Proceedings of the 15th
New Security
Paradigms Workshop (NSPW 2006).
September 2006, Schloss Dagstuhl, Germany. [pdf]
[ps]
Technical Reports
1. Netgator: Malware Detection Through Program Interactive Proofs
GMU-CS-TR-2011-6
2. SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes
GMU-CS-TR-2011-7
,3. An Analysis of System Management Mode (SMM)-based Integrity Checking Systems and Evasion Attacks
GMU-CS-TR-2011-8
,4.
Ruminate:
A
Scalable Architecture for Deep Network Analysis
, GMU-CS-TR-2010-20.