default search action
Stelios Sidiroglou-Douskos
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c32]Stelios Sidiroglou-Douskos, Eric Lahtinen, Anthony Eden, Fan Long, Martin C. Rinard:
CodeCarbonCopy. ESEC/SIGSOFT FSE 2017: 95-105 - 2016
- [j4]Robert K. Cunningham, Pamela Gupta, Ulf Lindqvist, Stelios Sidiroglou-Douskos, Michael Hicks:
IEEE SecDev 2016: Prioritizing Secure Development. IEEE Secur. Priv. 14(4): 82-84 (2016) - [c31]Jeff H. Perkins, Jordan Eikenberry, Alessandro Coglio, Daniel Willenson, Stelios Sidiroglou-Douskos, Martin C. Rinard:
AutoRand: Automatic Keyword Randomization to Prevent Injection Attacks. DIMVA 2016: 37-57 - 2015
- [c30]Stelios Sidiroglou-Douskos, Eric Lahtinen, Nathan Rittenhouse, Paolo Piselli, Fan Long, Deokhwan Kim, Martin C. Rinard:
_targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement. ASPLOS 2015: 473-486 - [c29]Isaac Evans, Fan Long, Ulziibayar Otgonbaatar, Howard E. Shrobe, Martin C. Rinard, Hamed Okhravi, Stelios Sidiroglou-Douskos:
Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity. CCS 2015: 901-913 - [c28]Peter Amidon, Eli Davis, Stelios Sidiroglou-Douskos, Martin C. Rinard:
Program fracture and recombination for efficient automatic code reuse. HPEC 2015: 1-6 - [c27]Brendan Juba, Christopher Musco, Fan Long, Stelios Sidiroglou-Douskos, Martin C. Rinard:
Principled Sampling for Anomaly Detection. NDSS 2015 - [c26]Stelios Sidiroglou-Douskos, Eric Lahtinen, Fan Long, Martin C. Rinard:
Automatic error elimination by horizontal code transfer across multiple applications. PLDI 2015: 43-54 - [c25]Isaac Evans, Sam Fingeret, Julian Gonzalez, Ulziibayar Otgonbaatar, Tiffany Tang, Howard E. Shrobe, Stelios Sidiroglou-Douskos, Martin C. Rinard, Hamed Okhravi:
Missing the Point(er): On the Effectiveness of Code Pointer Integrity. IEEE Symposium on Security and Privacy 2015: 781-796 - 2014
- [c24]Fan Long, Stelios Sidiroglou-Douskos, Martin C. Rinard:
Automatic runtime error repair and containment via recovery shepherding. PLDI 2014: 227-238 - [c23]Fan Long, Stelios Sidiroglou-Douskos, Deokhwan Kim, Martin C. Rinard:
Sound input filter generation for integer overflow errors. POPL 2014: 439-452 - 2013
- [c22]Youry Khmelevsky, Martin C. Rinard, Stelios Sidiroglou-Douskos:
A source-to-source transformation tool for error fixing. CASCON 2013: 147-160 - 2012
- [c21]Fan Long, Vijay Ganesh, Michael Carbin, Stelios Sidiroglou, Martin C. Rinard:
Automatic input rectification. ICSE 2012: 80-90 - [c20]Sasa Misailovic, Stelios Sidiroglou, Martin C. Rinard:
Dancing with uncertainty. RACES@SPLASH 2012: 51-60 - 2011
- [c19]Henry Hoffmann, Stelios Sidiroglou, Michael Carbin, Sasa Misailovic, Anant Agarwal, Martin C. Rinard:
Dynamic knobs for responsive power-aware computing. ASPLOS 2011: 199-212 - [c18]Stelios Sidiroglou-Douskos, Sasa Misailovic, Henry Hoffmann, Martin C. Rinard:
Managing performance vs. accuracy trade-offs with loop perforation. SIGSOFT FSE 2011: 124-134 - 2010
- [c17]Kangkook Jee, Stelios Sidiroglou-Douskos, Angelos Stavrou, Angelos D. Keromytis:
An Adversarial Evaluation of Network Signaling and Control Mechanisms. ICISC 2010: 252-265 - [c16]Sasa Misailovic, Stelios Sidiroglou, Henry Hoffmann, Martin C. Rinard:
Quality of service profiling. ICSE (1) 2010: 25-34 - [c15]Martin C. Rinard, Henry Hoffmann, Sasa Misailovic, Stelios Sidiroglou:
Patterns and statistical analysis for understanding reduced resource computing. OOPSLA 2010: 806-821 - [c14]Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo:
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. RAID 2010: 118-137
2000 – 2009
- 2009
- [c13]Stelios Sidiroglou, Oren Laadan, Carlos Perez, Nicolas Viennot, Jason Nieh, Angelos D. Keromytis:
ASSURE: automatic software self-healing using rescue points. ASPLOS 2009: 37-48 - [c12]Jeff H. Perkins, Sunghun Kim, Samuel Larsen, Saman P. Amarasinghe, Jonathan Bachrach, Michael Carbin, Carlos Pacheco, Frank Sherwood, Stelios Sidiroglou, Gregory T. Sullivan, Weng-Fai Wong, Yoav Zibin, Michael D. Ernst, Martin C. Rinard:
Automatically patching errors in deployed software. SOSP 2009: 87-102 - 2007
- [c11]Stelios Sidiroglou, Oren Laadan, Angelos D. Keromytis, Jason Nieh:
Using Rescue Points to Navigate Software Recovery. S&P 2007: 273-280 - [c10]Periklis Akritidis, Wee-Yung Chin, Vinh The Lam, Stelios Sidiroglou, Kostas G. Anagnostakis:
Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks. USENIX Security Symposium 2007 - [p1]Stelios Sidiroglou, Angelos D. Keromytis:
Composite Hybrid Techniques For Defending Against _targeted Attacks. Malware Detection 2007: 213-229 - 2006
- [j3]Stelios Sidiroglou, Angelos D. Keromytis:
Execution transactions for defending against software failures: use and evaluation. Int. J. Inf. Sec. 5(2): 77-91 (2006) - [c9]Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis:
Software Self-Healing Using Collaborative Application Communities. NDSS 2006 - [c8]Sotiris Ioannidis, Stelios Sidiroglou, Angelos D. Keromytis:
Privacy as an Operating System Service. HotSec 2006 - 2005
- [j2]Stelios Sidiroglou, Angelos D. Keromytis:
Countering Network Worms Through Automatic Patch Generation. IEEE Secur. Priv. 3(6): 41-49 (2005) - [j1]Stelios Sidiroglou, Michael E. Locasto, Angelos D. Keromytis:
Hardware support for self-healing software services. SIGARCH Comput. Archit. News 33(1): 42-47 (2005) - [c7]Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John P. McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov:
Highlights from the 2005 New Security Paradigms Workshop. ACSAC 2005: 393-396 - [c6]Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo:
An Email Worm Vaccine Architecture. ISPEC 2005: 97-108 - [c5]Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis:
A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. ISC 2005: 1-15 - [c4]Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis:
Speculative virtual verification: policy-constrained speculative execution. NSPW 2005: 119-124 - [c3]Stelios Sidiroglou, Michael E. Locasto, Stephen W. Boyd, Angelos D. Keromytis:
Building a Reactive Immune System for Software Services. USENIX ATC, General Track 2005: 149-161 - [c2]Kostas G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Konstantinos Xinidis, Evangelos P. Markatos, Angelos D. Keromytis:
Detecting _targeted Attacks Using Shadow Honeypots. USENIX Security Symposium 2005 - 2003
- [c1]Stelios Sidiroglou, Angelos D. Keromytis:
A Network Worm Vaccine Architecture. WETICE 2003: 220-225
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint