Countering code-injection attacks with instruction-set randomization GS Kc, AD Keromytis, V Prevelakis Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 961 | 2003 |
The athens affair V Prevelakis, D Spinellis Ieee Spectrum 44 (7), 26-33, 2007 | 161 | 2007 |
The athens affair V Prevelakis, D Spinellis Ieee Spectrum 44 (7), 26-33, 2007 | 161 | 2007 |
Sandboxing Applications. V Prevelakis, D Spinellis Usenix annual technical conference, freenix track, 119-126, 2001 | 147 | 2001 |
On the general applicability of instruction-set randomization SW Boyd, GS Kc, ME Locasto, AD Keromytis, V Prevelakis IEEE Transactions on Dependable and Secure Computing 7 (3), 255-270, 2008 | 85 | 2008 |
Fileteller: Paying and getting paid for file storage J Ioannidis, S Ioannidis, AD Keromytis, V Prevelakis Proceedings of the Sixth Annual Conference on Financial Cryptography, 282-299, 2001 | 83 | 2001 |
Decentralized access control in distributed file systems S Miltchev, JM Smith, V Prevelakis, A Keromytis, S Ioannidis ACM Computing Surveys (CSUR) 40 (3), 1-30, 2008 | 71 | 2008 |
Characterizing the'security vulnerability likelihood'of software functions D DaCosta, C Dahn, S Mancoridis, V Prevelakis International Conference on Software Maintenance, 2003. ICSM 2003 …, 2003 | 64 | 2003 |
Drop‐in security for distributed and portable computing elements V Prevelakis, A Keromytis Internet Research, 2003 | 58 | 2003 |
Secure and flexible global file sharing S Miltchev, V Prevelakis, S Ioannidis, J Ioannidis, AD Keromytis, JM Smith | 41 | 2003 |
A secure station for network monitoring and control V Prevelakis Proceedings of 8th USENIX SECURITY Conference, 101-109, 1999 | 29 | 1999 |
Tapi: Transactions for accessing public infrastructure M Blaze, J Ioannidis, S Ioannidis, AD Keromytis, P Nikander, V Prevelakis Personal Wireless Communications: IFIP-TC6 8th International Conference, PWC …, 2003 | 23 | 2003 |
Attack-tree-based Threat Modeling of Medical Implants. MA Siddiqi, RM Seepers, M Hamad, V Prevelakis, C Strydis PROOFS, 32-49, 2018 | 20 | 2018 |
Towards comprehensive threat modeling for vehicles M Hamad, M Nolte, V Prevelakis the 1st Workshop on Security and Dependability of Critical Embedded Real …, 2016 | 19 | 2016 |
Designing an Embedded Firewall/VPN Gateway V Prevelakis, A Keromytis | 19 | 2002 |
A communication framework for distributed access control in microkernel-based systems M Hamad, J Schlatow, V Prevelakis, R Ernst 12th Annual Workshop on Operating Systems Platforms for Embedded Real-Time …, 2016 | 18 | 2016 |
SAVTA: A hybrid vehicular threat model: Overview and case study M Hamad, V Prevelakis Information 11 (5), 273, 2020 | 17 | 2020 |
Prediction of abnormal temporal behavior in real-time systems M Hamad, ZAH Hammadeh, S Saidi, V Prevelakis, R Ernst Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 359-367, 2018 | 17 | 2018 |
Versioning issues for hypertext systems V Prevelakis Object Management= Gestion d'objets, 89-105, 1990 | 16 | 1990 |
Designing firewalls: A survey AD Keromytis, V Prevelakis Network Security: Current Status and Future Directions, 33-49, 2007 | 15 | 2007 |