default search action
Elias Athanasopoulos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c63]Antonis Louka, Antreas Dionysiou, Elias Athanasopoulos:
Validating Memory Safety in Rust Binaries. EuroSec@EUROSYS 2024: 8-14 - [i3]I Putu Arya Dharmaadi, Elias Athanasopoulos, Fatih Turkmen:
Fuzzing Frameworks for Server-side Web Applications: A Survey. CoRR abs/2406.03208 (2024) - [i2]Antonis Louka, Antreas Dionysiou, Elias Athanasopoulos:
Towards Safer Software: Exploring Validation Techniques for Rust Binaries. ERCIM News 139(138) (2024) - 2023
- [j8]Antreas Dionysiou, Vassilis Vassiliades, Elias Athanasopoulos:
Exploring Model Inversion Attacks in the Black-box Setting. Proc. Priv. Enhancing Technol. 2023(1): 190-206 (2023) - [j7]Antreas Dionysiou, Elias Athanasopoulos:
SoK: Membership Inference is Harder Than Previously Thought. Proc. Priv. Enhancing Technol. 2023(3): 286-306 (2023) - [c62]Apostolos P. Fournaris, Christos Tselios, Evangelos Haleplidis, Elias Athanasopoulos, Antreas Dionysiou, Dimitrios Mitropoulos, Panos Louridas, Georgios Christou, Manos Athanatos, George Hatzivasilis, Konstantinos Georgopoulos, Costas Kalogeros, Christos Kotselidis, Simon Vogl, François Hamon, Sotiris Ioannidis:
Providing Security Assurance & Hardening for Open Source Software/Hardware: The SecOPERA approach. CAMAD 2023: 80-86 - [c61]Pantelina Ioannou, Elias Athanasopoulos:
Been Here Already? Detecting Synchronized Browsers in the Wild. EuroS&P 2023: 913-927 - [e3]Elias Athanasopoulos, Bart Mennink:
Information Security - 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings. Lecture Notes in Computer Science 14411, Springer 2023, ISBN 978-3-031-49186-3 [contents] - 2022
- [c60]Antreas Dionysiou, Elias Athanasopoulos:
Lethe: Practical Data Breach Detection with Zero Persistent Secret State. EuroS&P 2022: 223-235 - [c59]Eva Anastasiadi, Elias Athanasopoulos, Evangelos P. Markatos:
The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems. SECRYPT 2022: 560-567 - 2021
- [j6]Michalis Papaevripides, Elias Athanasopoulos:
Exploiting Mixed Binaries. ACM Trans. Priv. Secur. 24(2): 7:1-7:29 (2021) - [c58]Antreas Dionysiou, Vassilis Vassiliades, Elias Athanasopoulos:
HoneyGen: Generating Honeywords Using Representation Learning. AsiaCCS 2021: 265-279 - [c57]Antreas Dionysiou, Elias Athanasopoulos:
Unicode Evil: Evading NLP Systems Using Visual Similarities of Text Characters. AISec@CCS 2021: 1-12 - [c56]Orpheas van Rooij, Marcos Antonios Charalambous, Demetris Kaizer, Michalis Papaevripides, Elias Athanasopoulos:
webFuzz: Grey-Box Fuzzing for Web Applications. ESORICS (1) 2021: 152-172 - [c55]Christos Grigoriadis, Spyridon Papastergiou, Panayiotis Kotzanikolaou, Christos Douligeris, Antreas Dionysiou, Elias Athanasopoulos, Karin Bernsmed, Per Håkon Meland, Liina Kamm:
Integrating and Validating Maritime Transport Security Services: Initial results from the CS4EU demonstrator. IC3 2021: 371-377 - [c54]George Christou, Giorgos Vasiliadis, Elias Athanasopoulos, Sotiris Ioannidis:
Hard Edges: Hardware-Based Control-Flow Integrity for Embedded Devices. SAMOS 2021: 275-287 - 2020
- [j5]Antreas Dionysiou, Elias Athanasopoulos:
SoK: Machine vs. machine - A systematic classification of automated machine learning-based CAPTCHA solvers. Comput. Secur. 97: 101947 (2020) - [c53]Christos Avraam, Elias Athanasopoulos:
Evaluation of the Adoption and Privacy Risks of Google Prompts. ACNS Workshops 2020: 508-522 - [c52]Neophytos Christou, Elias Athanasopoulos:
auth.js: Advanced Authentication for the Web. ETAA@ESORICS 2020: 33-49 - [c51]Radhesh Krishnan Konoth, Björn Fischer, Wan J. Fokkink, Elias Athanasopoulos, Kaveh Razavi, Herbert Bos:
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions. EuroS&P 2020: 569-586 - [c50]Marios Belk, Christos Fidas, Juliana Bowles, Elias Athanasopoulos, Andreas Pitsillides:
Adaptive and Personalized Privacy and Security (APPS 2020): Workshop Chairs' Welcome. UMAP (Adjunct Publication) 2020: 167-168 - [c49]Marios Belk, Christos Fidas, Juliana Bowles, Elias Athanasopoulos, Andreas Pitsillides:
APPS 2020: Second International Workshop on Adaptive and Personalized Privacy and Security. UMAP 2020: 398-399
2010 – 2019
- 2019
- [c48]Constantinos Diomedous, Elias Athanasopoulos:
Practical Password Hardening Based on TLS. DIMVA 2019: 441-460 - [c47]Marios Belk, Christos Fidas, Elias Athanasopoulos, Andreas Pitsillides:
Adaptive and Personalized Privacy and Security (APPS 2019): Workshop Chairs' Welcome and Organization. UMAP (Adjunct Publication) 2019: 191-192 - 2018
- [c46]Panagiotis Papadopoulos, Antonios A. Chariton, Elias Athanasopoulos, Evangelos P. Markatos:
Where's Wally?: How to Privately Discover your Friends on the Internet. AsiaCCS 2018: 425-430 - [c45]Giannis Tzagarakis, Panagiotis Papadopoulos, Antonios A. Chariton, Elias Athanasopoulos, Evangelos P. Markatos:
Øpass: Zero-storage Password Management Based on Password Reminders. EuroSec@EuroSys 2018: 2:1-2:6 - [c44]Panayiotis Charalambous, Marios Karapetris, Elias Athanasopoulos:
KAuth: A Strong Single Sign-On Service based on PKI. ICETE (2) 2018: 644-649 - [c43]Giorgos Tsirantonakis, Panagiotis Ilia, Sotiris Ioannidis, Elias Athanasopoulos, Michalis Polychronakis:
A Large-scale Analysis of Content Modification by Open HTTP Proxies. NDSS 2018 - [c42]Andrei Tatar, Radhesh Krishnan Konoth, Elias Athanasopoulos, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
Throwhammer: Rowhammer Attacks over the Network and Defenses. USENIX ATC 2018: 213-226 - [p1]Enes Göktas, Elias Athanasopoulos, Herbert Bos, Georgios Portokalidis:
Evaluating control-flow restricting defenses. The Continuing Arms Race 2018: 117-137 - [i1]Myoung Jin Nam, David J. Greaves, Elias Athanasopoulos, Periklis Akritidis:
FRAMER: A Cache-friendly Software-based Capability Model. CoRR abs/1810.11622 (2018) - 2017
- [j4]Manolis Stamatogiannakis, Elias Athanasopoulos, Herbert Bos, Paul Groth:
PROV2R: Practical Provenance Analysis of Unstructured Processes. ACM Trans. Internet Techn. 17(4): 37:1-37:24 (2017) - [c41]Koen Koning, Xi Chen, Herbert Bos, Cristiano Giuffrida, Elias Athanasopoulos:
No Need to Hide: Protecting Safe Regions on Commodity Hardware. EuroSys 2017: 437-452 - [c40]Andre Pawlowski, Moritz Contag, Victor van der Veen, Chris Ouwehand, Thorsten Holz, Herbert Bos, Elias Athanasopoulos, Cristiano Giuffrida:
MARX: Uncovering Class Hierarchies in C++ Programs. NDSS 2017 - [e2]Eric Bodden, Mathias Payer, Elias Athanasopoulos:
Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings. Lecture Notes in Computer Science 10379, Springer 2017, ISBN 978-3-319-62104-3 [contents] - 2016
- [j3]Despoina Antonakaki, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, Paraskevi Fragopoulou:
Exploiting abused trending topics to identify spam campaigns in Twitter. Soc. Netw. Anal. Min. 6(1): 48:1-48:11 (2016) - [c39]Pawel Sarbinowski, Vasileios P. Kemerlis, Cristiano Giuffrida, Elias Athanasopoulos:
VTPin: practical VTable hijacking protection for binaries. ACSAC 2016: 448-459 - [c38]Nick Christoulakis, George Christou, Elias Athanasopoulos, Sotiris Ioannidis:
HCFI: Hardware-enforced Control-Flow Integrity. CODASPY 2016: 38-49 - [c37]Elias Athanasopoulos, Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis:
NaClDroid: Native Code Isolation for Android Applications. ESORICS (1) 2016: 422-439 - [c36]Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, Sotiris Ioannidis:
GRIM: Leveraging GPUs for Kernel Integrity Monitoring. RAID 2016: 3-23 - [c35]Victor van der Veen, Enes Göktas, Moritz Contag, Andre Pawlowski, Xi Chen, Sanjay Rawat, Herbert Bos, Thorsten Holz, Elias Athanasopoulos, Cristiano Giuffrida:
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level. IEEE Symposium on Security and Privacy 2016: 934-953 - [c34]Enes Göktas, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos:
Undermining Information Hiding (and What to Do about It). USENIX Security Symposium 2016: 105-119 - [c33]Angelos Oikonomopoulos, Elias Athanasopoulos, Herbert Bos, Cristiano Giuffrida:
Poking Holes in Information Hiding. USENIX Security Symposium 2016: 121-138 - [c32]Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, Evangelos P. Markatos:
Provable Network Activity for Protecting Users Against False Accusation. WISTP 2016: 254-261 - [e1]Juan Caballero, Eric Bodden, Elias Athanasopoulos:
Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings. Lecture Notes in Computer Science 9639, Springer 2016, ISBN 978-3-319-30805-0 [contents] - 2015
- [c31]István Haller, Enes Göktas, Elias Athanasopoulos, Georgios Portokalidis, Herbert Bos:
ShrinkWrap: VTable Protection without Loose Ends. ACSAC 2015: 341-350 - [c30]Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, Sotiris Ioannidis:
Face/Off: Preventing Privacy Leakage From Photos in Social Networks. CCS 2015: 781-792 - [c29]Elias Athanasopoulos, Martin Böhner, Sotiris Ioannidis, Cristiano Giuffrida, Dmitry Pidan, Vassilis Prevelakis, Ioannis Sourdis, Christos Strydis, John Thomson:
Secure Hardware-Software Architectures for Robust Computing Systems. e-Democracy 2015: 209-212 - [c28]Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, Sotiris Ioannidis:
Two-factor authentication: is the world ready?: quantifying 2FA adoption. EUROSEC 2015: 4:1-4:7 - [c27]Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, Sotiris Ioannidis:
The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines. NDSS 2015 - 2014
- [c26]Giorgos Vasiliadis, Elias Athanasopoulos, Michalis Polychronakis, Sotiris Ioannidis:
PixelVault: Using GPUs for Securing Cryptographic Operations. CCS 2014: 1131-1142 - [c25]Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis:
AndRadar: Fast Discovery of Android Applications in Alternative Markets. DIMVA 2014: 51-71 - [c24]Thanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Michalis Polychronakis, Sotiris Ioannidis:
Rage against the virtual machine: hindering dynamic analysis of Android malware. EUROSEC 2014: 5:1-5:6 - [c23]Dimitris Deyannis, Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, Sotiris Ioannidis:
Flying Memcache: Lessons Learned from Different Acceleration Strategies. SBAC-PAD 2014: 25-32 - [c22]Despoina Antonakaki, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, Paraskevi Fragopoulou:
Think Before RT: An Experimental Study of Abusing Twitter Trends. SocInfo Workshops 2014: 402-413 - [c21]Enes Göktas, Elias Athanasopoulos, Herbert Bos, Georgios Portokalidis:
Out of Control: Overcoming Control-Flow Integrity. IEEE Symposium on Security and Privacy 2014: 575-589 - [c20]Enes Göktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis:
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard. USENIX Security Symposium 2014: 417-432 - 2013
- [c19]Iasonas Polakis, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos:
The man who was there: validating check-ins in location-based services. ACSAC 2013: 19-28 - [c18]Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, Angelos D. Keromytis:
SAuth: protecting user accounts from password database leaks. CCS 2013: 187-198 - [c17]Georgios Chinis, Polyvios Pratikakis, Sotiris Ioannidis, Elias Athanasopoulos:
Practical information flow for legacy web applications. ICOOOLPS@ECOOP 2013: 17-28 - 2012
- [j2]Vasileios P. Kemerlis, Georgios Portokalidis, Elias Athanasopoulos, Angelos D. Keromytis:
kGuard: Lightweight Kernel Protection. login Usenix Mag. 37(6) (2012) - [c16]Elias Athanasopoulos, Vasileios P. Kemerlis, Michalis Polychronakis, Evangelos P. Markatos:
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches. ACNS 2012: 400-417 - [c15]Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis, Angelos D. Keromytis:
Exploiting split browsers for efficiently protecting user data. CCSW 2012: 37-42 - [c14]Eleni Gessiou, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos, Sotiris Ioannidis:
Digging up social structures from documents on the web. GLOBECOM 2012: 744-750 - [c13]Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, Sotiris Ioannidis:
Towards a Universal Data Provenance Framework Using Dynamic Instrumentation. SEC 2012: 103-114 - 2011
- [b1]Elias Athanasopoulos:
Modern techniques for the detection and prevention of web2.0 attacks. University of Crete, Greece, 2011 - [c12]Elias Athanasopoulos, Sotiris Ioannidis, Andreas Sfakianakis:
CensMon: A Web Censorship Monitor. FOCI 2011 - [c11]Demetres Antoniades, Iasonas Polakis, Georgios Kontaxis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos, Thomas Karagiannis:
we.b: the web of short urls. WWW 2011: 715-724 - 2010
- [j1]A. Makridakis, Elias Athanasopoulos, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Evangelos P. Markatos:
Understanding the behavior of malicious applications in social networks. IEEE Netw. 24(5): 14-19 (2010) - [c10]Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos:
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks. ESORICS 2010: 663-678 - [c9]Elias Athanasopoulos, Antonis Krithinakis, Evangelos P. Markatos:
An Architecture for Enforcing JavaScript Randomization in Web2.0 Applications. ISC 2010: 203-209 - [c8]Elias Athanasopoulos, Vasilis Pappas, Antonis Krithinakis, Spyros Ligouras, Evangelos P. Markatos, Thomas Karagiannis:
xJS: Practical XSS Prevention for Web Application Development. WebApps 2010
2000 – 2009
- 2009
- [c7]Elias Athanasopoulos, Antonis Krithinakis, Georgios Kopidakis, Graeme Maxwell, Alistair Poustie, Bob Manning, Rod Webb, Martin Koyabe, Carla Di Cairano-Gilfedder:
WISDOM: security-aware fibres. EUROSEC 2009: 22-27 - 2008
- [c6]Elias Athanasopoulos, A. Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, Evangelos P. Markatos:
Antisocial Networks: Turning a Social Network into a Botnet. ISC 2008: 146-160 - [c5]Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos:
Compromising Anonymity Using Packet Spinning. ISC 2008: 161-174 - [c4]Antonis Theocharides, Demetres Antoniades, Michalis Polychronakis, Elias Athanasopoulos, Evangelos P. Markatos:
Topnet: A Network-aware top(1). LISA 2008: 145-157 - 2007
- [c3]Elias Athanasopoulos, Mema Roussopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos:
GAS: Overloading a File Sharing Network as an Anonymizing System. IWSEC 2007: 365-379 - 2006
- [c2]Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos:
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. ACNS 2006: 130-145 - [c1]Elias Athanasopoulos, Spyros Antonatos:
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart. Communications and Multimedia Security 2006: 97-108
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint