Preventing memory error exploits with WIT P Akritidis, C Cadar, C Raiciu, M Costa, M Castro 2008 IEEE Symposium on Security and Privacy (sp 2008), 263-277, 2008 | 451 | 2008 |
Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors. P Akritidis, M Costa, M Castro, S Hand USENIX Security Symposium 10, 96, 2009 | 403 | 2009 |
Defending against hitlist worms using network address space randomization S Antonatos, P Akritidis, EP Markatos, KG Anagnostakis Proceedings of the 2005 ACM workshop on Rapid malcode, 30-40, 2005 | 355 | 2005 |
Detecting targeted attacks using shadow honeypots KG Anagnostakis, S Sidiroglou, P Akritidis, K Xinidis, E Markatos, ... | 326 | 2005 |
Fast byte-granularity software fault isolation M Castro, M Costa, JP Martin, M Peinado, P Akritidis, A Donnelly, ... Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009 | 268 | 2009 |
Cling: A memory allocator to mitigate dangling pointers P Akritidis 19th USENIX Security Symposium (USENIX Security 10), 2010 | 208 | 2010 |
Stride: Polymorphic sled detection through instruction sequence analysis P Akritidis, EP Markatos, M Polychronakis, K Anagnostakis Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20 th …, 2005 | 131 | 2005 |
Data randomization C Cadar, P Akritidis, M Costa, JP Martin, M Castro Technical Report TR-2008-120, Microsoft Research, 2008. Cited on, 2008 | 126 | 2008 |
Puppetnets: Misusing web browsers as a distributed attack infrastructure VT Lam, S Antonatos, P Akritidis, KG Anagnostakis Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 90 | 2006 |
Efficient content-based detection of zero-day worms P Akritidis, K Anagnostakis, EP Markatos IEEE International Conference on Communications, 2005. ICC 2005. 2005 2, 837-843, 2005 | 75 | 2005 |
Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks. P Akritidis, WY Chin, Vinh The Lam, S Sidiroglou, KG Anagnostakis USENIX Security Symposium, 2007 | 65 | 2007 |
Piranha: Fast and memory-efficient pattern matching for intrusion detection S Antonatos, M Polychronakis, P Akritidis, KG Anagnostakis, EP Markatos Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20 th …, 2005 | 51 | 2005 |
Puppetnets: Misusing web browsers as a distributed attack infrastructure S Antonatos, P Akritidis, VT Lam, KG Anagnostakis ACM Transactions on Information and System Security (TISSEC) 12 (2), 1-38, 2008 | 40 | 2008 |
Otter: A scalable high-resolution encrypted traffic identification engine E Papadogiannaki, C Halevidis, P Akritidis, L Koromilas Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018 | 36 | 2018 |
Detecting memory errors using write integrity testing P Akritidis, M Costa, M Castro US Patent 8,434,064, 2013 | 33 | 2013 |
Dynamically checking ownership policies in concurrent C/C++ programs JP Martin, M Hicks, M Costa, P Akritidis, M Castro ACM Sigplan Notices 45 (1), 457-470, 2010 | 28 | 2010 |
Shadow honeypots KG Anagnostakis, S Sidiroglou, P Akritidis, M Polychronakis, ... | 28 | 2010 |
FRAMER: a tagged-pointer capability system with memory safety applications MJ Nam, P Akritidis, DJ Greaves Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 27 | 2019 |
Software fault isolation using byte-granularity memory protection RJ Black, P Barham, M Costa, M Peinado, JP Martin, P Akritidis, ... US Patent 8,352,797, 2013 | 24 | 2013 |
Efficient content-based fingerprinting of zero-day worms P Akritidis, K Anagnostakis, EP Markatos Proceedings of the IEEE International Conference on Communications (ICC), 2005 | 8 | 2005 |