Elias Athanasopoulos [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Throwhammer: Rowhammer Attacks over the Network and Defenses UsenixATCBoston-2018 - Boston, USA
A Large-scale Analysis of Content Modification by Open HTTP Proxies. NDSS-2018 - san diego,usa
MARX: Uncovering Class Hierarchies in C++ Programs NDSS-2017 - california,usa
BYPASSING CLANG'S SAFESTACK FOR FUN AND PROFIT BlackHatEU-2016 - London,uk
Undermining Information Hiding (and What to Do about It) USENIX-2016 - austin,usa
Poking Holes in Information Hiding USENIX-2016 - austin,usa
ShrinkWrap: VTable protection without loose ends ACSAC-2015 - los angeles,usa
The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines NDSS-2015 - san diego,usa
PixelVault: Using GPUs for Securing Cryptographic Operations CCS-2014 - Scottsdale,USA
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard usenix-2014 - san diego,usa
AndRadar: Fast Discovery of Android Applications in Alternative Markets Dimva-2014 - London,UK
Out Of Control: Overcoming Control-Flow Integrity IEEE-2014 - SamJose,USA
The Man Who Was There: Validating Check-ins in Location-Based Services ACSAC-2013 - New Orleans, USA
Exploiting Split Browsers for Efficiently Protecting User Data CCSW-2012 - Raleigh,USA
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches 10th International Conference on Applied Cryptography and Network Security-2012 - Singapore
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches ACNS-2013 - Alberta,Canada
Towards a universal data provenance framework using dynamic instrumentation, IFIP International Information Security and Privacy Conference-2012 - Heraklion, Crete, Greece
Wsim: A Software Platform To Simulate All-Optical Security Operations EC2ND-2008 - Heraklion, Greece Security Application Security
Alice, What Did You Do Last Time? Fighting Phishing Using Past Activity Tests EC2ND-2007 - Heraklion, Greece Phishing