Angelos Dennis Keromytis
#138,884
Most Influential Person Now
Angelos Dennis Keromytis's AcademicInfluence.com Rankings
Angelos Dennis Keromytiscriminal-justice Degrees
Criminal Justice
#163
World Rank
#187
Historical Rank
Cyber Security
#17
World Rank
#19
Historical Rank
Angelos Dennis Keromytiscomputer-science Degrees
Computer Science
#6546
World Rank
#6902
Historical Rank
Cybersecurity
#17
World Rank
#19
Historical Rank
Database
#3627
World Rank
#3778
Historical Rank
Download Badge
Criminal Justice Computer Science
Angelos Dennis Keromytis's Degrees
- PhD Computer Science Columbia University
- Masters Computer Science Columbia University
- Bachelors Computer Science Columbia University
Similar Degrees You Can Earn
Why Is Angelos Dennis Keromytis Influential?
(Suggest an Edit or Addition)Angelos Dennis Keromytis's Published Works
Published Works
- The KeyNote Trust-Management System Version 2 (1999) (782)
- Countering code-injection attacks with instruction-set randomization (2003) (726)
- SOS: secure overlay services (2002) (609)
- The Role of Trust Management in Distributed Systems Security (2001) (584)
- SQLrand: Preventing SQL Injection Attacks (2004) (484)
- Implementing a distributed firewall (2000) (393)
- The KeyNote trust management system version2, IETF RFC 2704 (1999) (381)
- Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization (2012) (372)
- KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) (1998) (357)
- The SwitchWare active network architecture (1998) (340)
- Transparent ROP Exploit Mitigation Using Indirect Branch Tracing (2013) (316)
- Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud (2012) (286)
- The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications (2015) (269)
- libdft: practical dynamic data flow tracking for commodity systems (2012) (250)
- Blind Seer: A Scalable Private DBMS (2014) (247)
- Key note: Trust management for public-key infrastructures (1999) (234)
- Detecting Targeted Attacks Using Shadow Honeypots (2005) (229)
- SOS: an architecture for mitigating DDoS attacks (2004) (218)
- Casting out Demons: Sanitizing Training Data for Anomaly Sensors (2008) (207)
- Baiting Inside Attackers Using Decoy Documents (2009) (199)
- One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses (2003) (194)
- ASSURE: automatic software self-healing using rescue points (2009) (193)
- The KeyNote Trust-Management System (1998) (186)
- Building a Reactive Immune System for Software Services (2005) (183)
- Towards collaborative security and P2P intrusion detection (2005) (166)
- Using graphic turing tests to counter automated DDoS attacks against web servers (2003) (165)
- A Comprehensive Survey of Voice over IP Security Research (2012) (160)
- Countering network worms through automatic patch generation (2005) (153)
- On the infeasibility of modeling polymorphic shellcode (2007) (153)
- SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities (2017) (153)
- Just fast keying: Key agreement in a hostile internet (2004) (150)
- Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic (2009) (131)
- Active network encapsulation protocol (anep) (1997) (122)
- A secure active network environment architecture: realization in SwitchWare (1998) (121)
- kGuard: Lightweight Kernel Protection against Return-to-User Attacks (2012) (113)
- CryptoGraphics: Secret Key Cryptography Using Graphics Cards (2005) (107)
- I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs (2016) (107)
- Insider Attack and Cyber Security - Beyond the Hacker (2008) (105)
- FLIPS: Hybrid Adaptive Intrusion Prevention (2005) (103)
- ret2dir: Rethinking Kernel Isolation (2014) (96)
- Countering DoS attacks with stateless multipath overlays (2005) (91)
- Trust management for IPsec (2002) (90)
- A Study of Malcode-Bearing Documents (2007) (87)
- Dynamic Trust Management (2009) (87)
- Experience with the KeyNote Trust Management System: Applications and Future Directions (2003) (84)
- Hydan: Hiding Information in Program Binaries (2004) (80)
- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks (2005) (80)
- Learning Rules from System Call Arguments and Sequences for Anomaly 20 Detection (2003) (77)
- A network worm vaccine architecture (2003) (76)
- KeyNote : Trust management for public-key infrastructures. Discussion (1999) (75)
- DoubleCheck: Multi-path verification against man-in-the-middle attacks (2009) (75)
- KeyNote : Trust management for public-key infrastructures. Discussion (1999) (75)
- A cooperative immunization system for an untrusting Internet (2003) (74)
- A secure PLAN (1999) (73)
- Where's Wally?: Precise User Discovery Attacks in Location Proximity Services (2015) (73)
- Fast and practical instruction-set randomization for commodity systems (2010) (71)
- An Analysis of Rogue AV Campaigns (2010) (71)
- NEZHA: Efficient Domain-Independent Differential Testing (2017) (71)
- Fileteller: Paying and Getting Paid for File Storage (2002) (70)
- On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records (2014) (70)
- HVLearn: Automated Black-Box Analysis of Hostname Verification in SSL/TLS Implementations (2017) (69)
- WebSOS: an overlay-based system for protecting web servers from denial of service attacks (2005) (68)
- ShadowReplica: efficient parallelization of dynamic data flow tracking (2013) (68)
- A Study of the Relative Costs of Network Security Protocols (2002) (67)
- On the General Applicability of Instruction-Set Randomization (2010) (67)
- The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information (2016) (67)
- Software Self-Healing Using Collaborative Application Communities (2006) (67)
- Designing Host and Network Sensors to Mitigate the Insider Threat (2009) (63)
- MOVE: An End-to-End Solution to Network Denial of Service (2005) (61)
- Taming the Devil: Techniques for Evaluating Anonymized Network Data (2008) (60)
- The STRONGMAN architecture (2003) (60)
- A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware (2012) (59)
- Worm Propagation Strategies in an IPv6 Internet (2006) (59)
- Automated Recovery in a Secure Bootstrap Process (1998) (57)
- A holistic approach to service survivability (2003) (57)
- Retrofitting Security in COTS Software with Binary Rewriting (2011) (56)
- Decentralized access control in distributed file systems (2008) (56)
- Safety and security of programmable network infrastructures (1998) (56)
- xPF: packet filtering for low-cost network monitoring (2002) (56)
- Offline Micropayments without Trusted Hardware (2002) (56)
- Collaborative Distributed Intrusion Detection (2004) (54)
- Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation (2010) (53)
- SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning (2016) (53)
- CloudFence: Data Flow Tracking as a Cloud Service (2013) (52)
- kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse (2017) (52)
- ROP payload detection using speculative code execution (2011) (50)
- On the Use of Stream Control Transmission Protocol (SCTP) with IPsec (2003) (49)
- All your face are belong to us: breaking Facebook's social authentication (2012) (48)
- The price of safety in an active network (2001) (47)
- Cryptography in OpenBSD: An Overview (1999) (46)
- SAuth: protecting user accounts from password database leaks (2013) (45)
- A Secure Active Network Environment Architecture (1997) (44)
- The effect of DNS delays on worm propagation in an IPv6 Internet (2005) (43)
- From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television (2014) (42)
- Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters (2016) (42)
- Voice-over-IP Security: Research and Practice (2010) (41)
- Trust Management and Network Layer Security Protocols (1999) (40)
- The Design of the {OpenBSD} Cryptographic Framework (2003) (40)
- The dual receiver cryptosystem and its applications (2004) (39)
- Implementing IPsec (1997) (38)
- Detecting Traffic Snooping in Tor Using Decoys (2011) (38)
- Secure and Flexible Global File Sharing (2003) (37)
- e-NeXSh: achieving an effectively non-executable stack and heap via system-call policing (2005) (36)
- WebSOS: protecting web servers from DDoS attacks (2003) (36)
- Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution (2011) (35)
- Application communities: using monoculture for dependability (2005) (35)
- Defending Against Web Application Attacks: Approaches, Challenges and Implications (2019) (35)
- Requirements for scalable access control and security management architectures (2007) (35)
- Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking (2011) (35)
- CellFlood: Attacking Tor Onion Routers on the Cheap (2013) (34)
- A Survey of Voice over IP Security Research (2009) (34)
- Privacy-Preserving Social Plugins (2012) (34)
- Identifying Proxy Nodes in a Tor Anonymization Circuit (2008) (34)
- Bait and Snitch: Defending Computer Systems with Decoys (2013) (33)
- Characterizing Software Self-healing Systems (2007) (33)
- From STEM to SEAD: Speculative Execution for Automated Defense (2007) (32)
- Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks (2009) (31)
- A Network Access Control Mechanism Based on Behavior Profiles (2009) (31)
- An Email Worm Vaccine Architecture (2005) (31)
- Automating the injection of believable decoys to detect snooping (2010) (29)
- Using Rescue Points to Navigate Software Recovery (2007) (29)
- REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points (2011) (28)
- A market-based bandwidth charging framework (2010) (27)
- The MEERKATS Cloud Security Architecture (2012) (27)
- A Look at VoIP Vulnerabilities (2010) (25)
- The Use of HMAC-RIPEMD-160-96 within ESP and AH (2000) (25)
- Randomized Instruction Sets and Runtime Environments Past Research and Future Directions (2009) (24)
- DynaGuard: Armoring Canary-based Protections against Brute-force Attacks (2015) (24)
- Security in Active Networks (2001) (24)
- Elastic Block Ciphers (2004) (24)
- Monitoring Technologies for Mitigating Insider Threats (2010) (24)
- Secure quality of service handling: SQoSH (2000) (23)
- Evaluating a collaborative defense architecture for MANETs (2009) (23)
- Band-aid patching (2007) (23)
- DIPLOMA: Distributed Policy Enforcement Architecture for MANETs (2010) (23)
- SSARES: Secure Searchable Automated Remote Email Storage (2007) (23)
- BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection (2010) (22)
- Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication (2014) (22)
- Strongman: a scalable solution to trust management in networks (2001) (22)
- Characterizing Self-Healing Software Systems (2007) (22)
- Transparent Network Security Policy Enforcement (2000) (22)
- That's the Way the Cookie Crumbles: Evaluating HTTPS Enforcing Mechanisms (2016) (21)
- Design and implementation of virtual private services (2003) (21)
- Adaptive defenses for commodity software through virtual application partitioning (2012) (21)
- Capturing Information Flow with Concatenated Dynamic Taint Analysis (2009) (21)
- Towards a Universal Data Provenance Framework Using Dynamic Instrumentation (2012) (21)
- Implementing Internet Key Exchange (IKE) (2000) (21)
- Ethics in security vulnerability research (2010) (19)
- Recursive Sandboxes: Extending Systrace To Empower Applications (2004) (19)
- CryptoGraphics - Exploiting Graphics Cards for Security (2006) (19)
- The SwitchWare Active Network Implementation (1998) (19)
- IntFlow: improving the accuracy of arithmetic error detection using information flow tracking (2014) (19)
- Anonymity in Wireless Broadcast Networks (2009) (19)
- Cloudopsy: An Autopsy of Data Flows in the Cloud (2013) (18)
- An efficient and easily deployable method for dealing with DoS in SIP services (2015) (18)
- Voice over IP Security - A Comprehensive Survey of Vulnerabilities and Academic Research (2011) (18)
- Buffer Overflow Attacks (2011) (18)
- SecureGov: secure data sharing for government services (2013) (18)
- WAR: Wireless Anonymous Routing (2003) (18)
- Shadow Honeypots (2009) (17)
- Using overlays to improve network security (2002) (17)
- Detection and analysis of eavesdropping in anonymous communication networks (2015) (17)
- Using Rescue Points to Navigate Software Recovery (Short Paper) (2007) (16)
- CloudFence: Enabling Users to Audit the Use of their Cloud-Resident Data (2012) (16)
- Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors (2008) (16)
- LinkWidth: A Method to measure Link Capacity and Available Bandwidth Using Single-End Probes (2006) (16)
- Designing an Embedded Firewall/VPN Gateway (2002) (16)
- Elastic block ciphers: the basic design (2007) (16)
- Distributed Trust (2004) (15)
- Drop-in security for distributed and portable computing elements (2003) (15)
- Anomaly Detection at Multiple Scales (ADAMS) (2011) (15)
- Conversion and proxy functions for symmetric key ciphers (2005) (15)
- Data sanitization: improving the forensic utility of anomaly detection systems (2007) (15)
- Securing MANET Multicast Using DIPLOMA (2010) (14)
- Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction (2009) (14)
- "Patch on Demand" Saves Even More Time? (2004) (14)
- Scalable Resource Control in Active Networks (2000) (14)
- TAPI: Transactions for Accessing Public Infrastructure (2003) (14)
- BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs (2009) (13)
- Behavior-Based Network Access Control: A Proof-of-Concept (2008) (13)
- Evaluating the Privacy Guarantees of Location Proximity Services (2017) (12)
- Low Latency Anonymity with Mix Rings (2006) (12)
- On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusi (2010) (11)
- Practical Software Diversification Using In-Place Code Randomization (2013) (11)
- Self-healing multitier architectures using cascading rescue points (2012) (11)
- WebDAVA: An administrator-free approach to Web file-sharing (2003) (11)
- The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security (2011) (11)
- A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS (2011) (11)
- How to Train Your Browser (2016) (11)
- DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System (2000) (11)
- iLeak: A Lightweight System for Detecting Inadvertent Information Leaks (2010) (11)
- Using Execution Transactions To Recover From Buffer Overflow Attacks (2004) (11)
- A Pay-per-Use DoS Protection Mechanism for the Web (2004) (11)
- Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation (2006) (11)
- Cryptography as an operating system service: A case study (2006) (11)
- NaClDroid: Native Code Isolation for Android Applications (2016) (10)
- Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent (2011) (10)
- Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware (2005) (10)
- Elastic block ciphers: method, security and instantiations (2009) (10)
- IP Security Policy (IPSP) Requirements (2003) (10)
- Computational Decoys for Cloud Security (2014) (9)
- High-speed I/O: the operating system as a signalling mechanism (2003) (9)
- Secret Key Cryptography Using Graphics Cards (2004) (9)
- On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection (2007) (9)
- Designing Firewalls: A Survey (2007) (9)
- Mediated overlay services (MOSES): Network security as a composable service (2007) (8)
- EasyVPN: IPsec Remote Access Made Easy (2003) (8)
- Adding Trust to P2P Distribution of Paid Content (2009) (8)
- Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications (2007) (8)
- A system for generating and injecting indistinguishable network decoys (2012) (8)
- Kernel Protection Against Just-In-Time Code Reuse (2019) (8)
- Conversion Functions for Symmetric Key Ciphers (2006) (8)
- F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services (2009) (8)
- Privacy as an Operating System Service (2006) (8)
- CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security) (2006) (8)
- Financial Cryptography and Data Security (2012) (7)
- Hardware support for self-healing software services (2005) (7)
- Quantifying Application Behavior Space for Detection and Self-Healing (2006) (7)
- The bandwidth exchange architecture (2005) (7)
- Protocols for anonymity in wireless networks (2003) (7)
- Accelerating application-level security protocols (2003) (6)
- Tagging Data in the Network Stack: mbuf_tags (2003) (6)
- The Efficient Dual Receiver Cryptosystem and Its Applications (2011) (6)
- CASPER: Compiler-Assisted Securing of Programs at Runtime (2002) (6)
- Attacking the Internet Using Broadcast Digital Television (2015) (6)
- DHCP++: Applying an efficient implementation method for fail-stop cryptographic protocols (1998) (6)
- Execution transactions for defending against software failures: use and evaluation (2006) (6)
- COVERAGE: detecting and reacting to worm epidemics using cooperation and validation (2007) (6)
- Approximating a Global Passive Adversary Against Tor (2008) (5)
- Creating Efficient Fail-Stop Cryptographic Protocols (1996) (5)
- Elastic AES (2004) (5)
- Dealing with System Monocultures (2004) (5)
- A secure PLAN (extended version) (2002) (5)
- Exploiting split browsers for efficiently protecting user data (2012) (5)
- On the Deployment of Dynamic Taint Analysis for Application Communities (2009) (5)
- The Security of Elastic Block Ciphers Against Key-Recovery Attacks (2007) (5)
- The SPARCHS Project: Hardware Support for Software Security (2011) (5)
- A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP (2013) (5)
- PalProtect: A Collaborative Security Approach to Comment Spam (2006) (5)
- Managing Access Control in Large Scale Heterogeneous Networks (2003) (5)
- A Model for Automatically Repairing Execution Integrity (2007) (5)
- Gone Rogue: An Analysis of Rogue Security Software Campaigns (2009) (5)
- Dynamic Reconstruction of Relocation Information for Stripped Binaries (2014) (5)
- Trust Management for IPsec. (2001) (5)
- Design and Analysis of Decoy Systems for Computer Security (2011) (5)
- Elastic Block Ciphers in Practice: Constructions and Modes of Encryption (2009) (4)
- Return Value Predictability Profiles for Self-healing (2008) (4)
- Privacy Threats in E-Shopping (Position Paper) (2015) (4)
- Performance Implications of Securing Active Networks (1998) (4)
- A Survey of Randomization Techniques Against Common Mode Attacks (2005) (4)
- Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005 (2005) (4)
- Arachne: Integrated Enterprise Security Management (2007) (4)
- Trust Management and Network Security Protocols (1999) (4)
- Proceedings of the 2010 workshop on New security paradigms (2008) (4)
- kGuard: Lightweight Kernel Protection (2012) (4)
- Transport Layer Security (TLS) Authorization Using KeyNote (2010) (4)
- The case for crypto protocol awareness inside the OS kernel (2005) (4)
- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers (2008) (4)
- Speculative virtual verification: policy-constrained speculative execution (2005) (4)
- Experiences Enhancing Open Source Security in the POSSE Project (2005) (4)
- Firewalls in active networks (1998) (4)
- The 'suggested ID' extension for IKE (2001) (3)
- Bloodhound: Searching Out Malicious Input in Network Flows for Automatic Repair Validation (2006) (3)
- A Stack Memory Abstraction and Symbolic Analysis Framework for Executables (2016) (3)
- Cookie Hijacking in the Wild : Security and Privacy Implications (2016) (3)
- A2M: Access-Assured Mobile Desktop Computing (2009) (3)
- Towards a Forensic Analysis for Multimedia Communication Services (2011) (3)
- Privacy policy-driven mashups (2013) (3)
- Dark application communities (2006) (3)
- Evaluation of a Spyware Detection System Using Thin Client Computing (2010) (3)
- gore: Routing-Assisted Defense Against DDoS Attacks (2005) (3)
- Distributed Firewall For MANETs (2008) (3)
- Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned (2014) (3)
- Enhancing Security by Diversifying Instruction Sets (2014) (3)
- Speculative Execution as an Operating System Service (2006) (3)
- IPsec Policy Architecture (2000) (3)
- Detecting Traffic Snooping in Anonymity Networks Using Decoys (2011) (2)
- Asynchronous policy evaluation and enforcement (2008) (2)
- W3Bcrypt: Encryption as a Stylesheet (2006) (2)
- Baiting Inside Attackers using Decoy Documents Report Title (2009) (2)
- Financial cryptography and data security : 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012 : revised selected papers (2012) (2)
- Network Bandwidth Denial of Service (DoS) (2011) (2)
- Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009 (2009) (2)
- An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables (2013) (2)
- Exploiting the Structure in DHT Overlays for DoS Protection (2004) (2)
- Remotely Keyed CryptoGraphics - Secure Remote Display Access Using (Mostly) Untrusted Hardware - Extended Version (2004) (2)
- A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions (2018) (2)
- Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs (2018) (2)
- Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators (2022) (2)
- PachyRand: SQL Randomization for the PostgreSQL JDBC Driver (2005) (2)
- Network security and IPsec (tutorial) (2000) (2)
- Decentralized Access Control in Networked File Systems (2006) (2)
- Hard Problems and Research Challenges Concluding Remarks (2008) (1)
- Misuse Detection in Consent-Based Networks (2011) (1)
- Control in Large Scale Heterogeneous Networks (2003) (1)
- Pushback for Overlay Networks: Protecting Against Malicious Insiders (2008) (1)
- Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010 (2010) (1)
- X.509 Key and Signature Encoding for the KeyNote Trust Management System (2010) (1)
- Secure Overlay Services (SOS) (2004) (1)
- CCS'10 : proceedings of the 17th ACM Conference on Computer and Communications Security, October 4-8, 2010, Chicago, Illinois, USA (2010) (1)
- curity of etwork Infrastructures (1998) (1)
- Survey of VoIP Security Research Literature (2011) (1)
- Bridging the Network Reservation Gap Using Overlays (2007) (1)
- Measuring the Deployment Hiccups of DNSSEC (2011) (1)
- The Pseudorandomness of Elastic Block Ciphers (2005) (1)
- Survivable Embedded Systems (2007) (1)
- BARTER: Profile Model Exchange for Behavior-Based Access Control and Communication Security in MANETs (2007) (1)
- Path-Based Access Control for Enterprise Networks (2008) (1)
- Binary-level Function Profiling for Intrusion Detection and Smart Error Virtualization (2006) (1)
- A repeater encryption unit for 1Pv4 and 1Pv6 (2005) (1)
- Elastic Block Ciphers: The Feistel Cipher Case (2004) (1)
- Proceedings of the Third international conference on Applied Cryptography and Network Security (2005) (1)
- Creating e cient fail-stop cryptographic protocols Technical Report MS-CIS-96-32 (1)
- On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses (2005) (1)
- A General Analysis of the Security of Elastic Block Ciphers (2005) (1)
- Protecting Insecure Communications with Topology-aware Network Tunnels (2016) (1)
- Adding a Flow-Oriented Paradigm to Commodity Operating Systems (2005) (1)
- Efficiently Detecting and Reacting to Day-Zero Worms on the Internet (1)
- HammerScope: Observing DRAM Power Consumption Using Rowhammer (2022) (1)
- Crimeware Swindling without Virtual Machines (2010) (1)
- Scalable Security Mechanisms for the Internet (2001) (1)
- Software self-healing using error virtualization (2008) (1)
- Zero-day Attacks Patch on Demand " Patch on Demand " Saves Even More Time? (0)
- View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy (2022) (0)
- On Effectiveness of Traffic Analysis Against Anonymity Networks Using Netflow (2013) (0)
- Tug-of-War: Observations on Unified Content Handling (2017) (0)
- On the Feasibility of Remotely Triggered Automotive Hardware Trojans (2022) (0)
- CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap (2004) (0)
- Chapter 3 Designing Firewalls : A Survey (2007) (0)
- Large Scale System Defense (2008) (0)
- Creating efficient fail-stop cryptographic protocols MS-CIS-96-32 (2014) (0)
- Provable Network Activity for Protecting Users Against False Accusation (2016) (0)
- Overview of VoIP Systems (2011) (0)
- A Taxonomy of Active CodeD (1999) (0)
- Can P2P Replace Direct Download for Content Distribution (2007) (0)
- Proceedings of the ACM Conference on Computer and Communications Security: CCS 2010 program chair's welcome (2010) (0)
- AFRL-RY-WP-TR-2015-0002 MINESTRONE (2015) (0)
- Hard Problems and Research Challenges (2008) (0)
- FlowPuter: A Cluster Architecture Unifying Switch, Server and Storage Processing (2005) (0)
- IPsec Policy Discovery Protocol requirements (1999) (0)
- SPARCHS: Symbiotic, Polymorphic, Automatic, Resilient, Clean-Slate, Host Security (2016) (0)
- Integrity postures for software self-defense (2008) (0)
- BIOS Basic Input Output System (2011) (0)
- WAR: Wireless Anonymous Routing. Commentary. Authors' reply (2005) (0)
- A distributed policy enforcement architecture for mobile ad-hoc networks (2011) (0)
- The First Annual Workshop on Interaction between Operating System and Computer Architecture ( IOSCA – 1 ) (2005) (0)
- Some Problems with Perimeter Firewalls (2002) (0)
- Action amplification: a new approach to scalable administration (2005) (0)
- Applied Cryptography and Network Security (2006) (0)
- STAND: Sanitization Tool for ANomaly Detection (2007) (0)
- Authentication on Untrusted Remote Hosts with Public-Key Sudo (2008) (0)
- The bank card (2013) (0)
- Columbia University Countering Network Worms Through Automatic Patch Generation 52 (2005) (0)
- DRAFT : Path-based Access Control for Enterprise Networks (2008) (0)
- Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA - September 18-21, 2007 (2007) (0)
- The Shrink-Wrapped VPN Node (2000) (0)
- Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs (2009) (0)
- On Action at a Distance (0)
- Detection and analysis of eavesdropping in anonymous communication networks (2014) (0)
- Next Generation Attacks on the Internet (2006) (0)
- Proceedings of the 2nd USENIX workshop on Hot topics in security (2007) (0)
- Race to the Bottom: Malicious Hardware (2008) (0)
- Foundational and Systems Support for Quantitative Trust Management (QTM) (2009) (0)
- Survey and Analysis of VoIP/IMS Vulnerabilities (2011) (0)
- ATM ISDN FDDI Ethernet Overlays Standard Subnets (2016) (0)
- Redirect2Own: Protecting the Intellectual Property of User-uploaded Content through Off-site Indirect Access (2018) (0)
- IPsec Policy Discovery Architecture (1999) (0)
- Highlights from the 2005 New Security Paradigms Workshop (2005) (0)
- Countering DDoS Attacks with Multi-Path Overlay Networks (2006) (0)
- An Adversarial Evaluation of Network Signaling and Control Mechanisms (2010) (0)
- Peer Review Process (2020) (0)
- Biometric Cryptosystem (2009) (0)
- A Case for P2P Delivery of Paid Content (2006) (0)
- Distributed Trust Management and Rogue AV Software (2010) (0)
- Network DoS (2011) (0)
- Online Network Forensics for Automatic Repair Validation (2008) (0)
- MATRIX FACTORIZATIONS IN OPTIMIZATION OF NONLINEAR FUNCTIONS SUBJECT TO LINEAR CONSTRAINTS- AN ADDENDUM (2005) (0)
- Proceedings of Freenix Track: 2000 Usenix Annual Technical Conference P O L I C Y E N F O R C E M E N T (2000) (0)
- Exposing Trust Assumptions in Distributed Policy Enforcement (Briefing Charts) (2009) (0)
- Final Report Anomaly Detection At Multiple Scales ( ADAMS ) Sponsored (2011) (0)
- DHCP Continuation Option Code (2000) (0)
- Candidate Self − monitor Self − diagnosis Self − adaptationSelf − testing event Anomalous Fault identificationDeployment fix generation (2007) (0)
- O ine Micropayments without Trusted Hardware (2001) (0)
- Secure fingerprinting using public-key cryptography. Discussion. Authors' reply (1999) (0)
- Automatic Software Self-healing Using Error Virtualization Rescue Points ( ASSURE ) (0)
- WORM '05 : proceedings of the 2005 ACM Workshop on Rapid Malcode : November 11, 2005, Fairfax, Virginia, USA : co-located with CCS 2005 (2005) (0)
- Dynamic Trust Management (DTM) (2009) (0)
- AS ecure Plan (1999) (0)
- The Shrink-Wrapped VPN Node Technical Report MS-CIS-00-21 Digital Systems Laboratory Department of Computer and Information Science (2000) (0)
- USENIX Association Proceedings of the General Track : 2003 USENIX Annual (2003) (0)
- Security and Privacy in Communication Networks (2012) (0)
- Composite Hybrid Techniques For Defending Against Targeted Attacks (2007) (0)
- Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010 (2010) (0)
- An overlay architecture for end-to-end service availability (2007) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Angelos Dennis Keromytis?
Angelos Dennis Keromytis is affiliated with the following schools: