Conference publications
  1. "Defending Against Next Generation Attacks Through Network/Endpoint Collaboration and Interaction"
    Spiros Antonatos, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, and Evangelos Markatos. To appear in the Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND). October 2007, Heraclion, Greece. (Invited paper)
  2. "Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks"
    P. Akritidis, W.Y. Chin, V.T. Lam, S. Sidiroglou, K.G. Anagnostakis
    in Proc. of USENIX Security 2007, August 2007 (Acceptance rate: 12.3%)
  3. "Using Rescue Points to Navigate Software Recovery (Short Paper)"
    Stelios Sidiroglou, Oren Laadan, Angelos D. Keromytis, and Jason Nieh. To appear in the Proceedings of the IEEE Symposium on Security & Privacy. May 2007, Oakland, CA. (Acceptance rate: 8.3%)
  4. "Network Security as a Composable Service"
    Stelios Sidiroglou, Angelos Stavrou, and Angelos D. Keromytis. To appear in the Proceedings of the IEEE Sarnoff Symposium. May 2007, Princeton, NJ. (Invited paper)
  5. "Software Self-Healing Using Collaborative Application Communities"
    Michael E. Locasto, Stelios Sidiroglou, and Angelos D. Keromytis. To appear in the Proceedings of the Internet Society (ISOC) Symposium on Network and Distributed Systems Security (SNDSS). February 2005, San Diego, CA. (Acceptance Rate: 13.6%)
  6. "A Dynamic Mechanism for Recovering from Buffer Overflow Attacks"
    Stelios Sidiroglou, Giannis Giovanidis, and Angelos D. Keromytis. To appear in the Proceedings of the 8th Information Security Conference (ISC). September 2005, Singapore. An older version of this paper is available as Columbia University Computer Science Department Technical Report CUCS-031-04, September 2004. (Acceptance rate: 14%)
  7. "Detecting Targeted Attacks Using Shadow Honeypots"
    Kostas G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Konstantinos Xinidis, Evangelos Markatos, and Angelos D. Keromytis. To appear in the Proceedings of the 14th USENIX Security Symposium. August 2005, Baltimore, MD. (Acceptance rate: 12.3%)
  8. "An Email Worm Vaccine Architecture"
    Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, and Salvatore J. Stolfo. To appear in the Proceedings of the 1st Information Security Practice and Experience Conference (ISPEC) April 2005, Singapore
  9. "Building A Reactive Immune System for Software Services"
    Stelios Sidiroglou, Michael E. Locasto, Stephen W. Boyd, Angelos D. Keromytis. To appear in the Proceedings of the USENIX Annual Technical Conference. April 2005, Anaheim,CA

Workshop Publications
  1. "Band-aid Patching (Poster Paper)"
    Stelios Sidiroglou, Sotiris Ioannidis, and Angelos D. Keromytis. To appear in the Proceedings of the 3rd Workshop on Hot Topics in System Dependability (HotDep). June 2007, Edinburgh, UK.
  2. "Privacy as an Operating System Service"
    Stelios Sidiroglou, Sotiris Ioannidis and Angelos D. Keromytis. To appear in the Proceedings of the Workshop on Hot Topics in Security (HOTSEC). August 2006, Vancouver, CA.
  3. "Application Communities: Using Monoculture for Dependability"
    Michael E. Locasto, Stelios Sidiroglou, and Angelos D. Keromytis. To appear in the Proceedings of the 1st Workshop on Hot Topics in System Dependability (HotDep), held in conjunction with the International Conference on Dependable Systems and Networks (DSN). June 2005, Yokohama, Japan.
  4. "Speculative Virtual Verification: Policy-Constrained Speculative Execution"
    Michael E. Locasto, Stelios Sidiroglou, and Angelos D. Keromytis. To appear in the Proceedings of the New Security Paradigms Workshop (NSPW). September 2005, Lake Arrowhead, CA.
  5. "Hardware Support For Self-Healing Software Services"
    Stelios Sidiroglou, Michael E. Locasto, and Angelos D. Keromytis. To appear in the Proceedings of the Workshop on Architectural Support for Security and Anti-Virus (WASSA), held in conjunction with the 11th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-XI). October 2004, Boston, MA.
  6. "A Network Worm Vaccine Architecture"
    Stelios Sidiroglou and Angelos D. Keromytis. In Proceedings of the IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Enterprise Security. June 2003, Linz, Austria.
  7. "Ubiquitous Computing Using SIP"
    Stefan Berger, Henning Schulzrinne, Stelios Sidiroglou and Xiaotao Wu. In Proceedings of the ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV). June 2003, Monterey, CA.
Journal Publications
  1. "Execution Transactions for Defending Against Software Failures: Use and Evaluation"
    Stelios Sidiroglou and Angelos D. Keromytis. In Springer International Journal of Information Security (IJIS), vol. 5, no. 2, pp. 77 - 91, April 2006. (Extended version of the ISC 2005 paper.)
  2. "Countering Network Worms Through Automatic Patch Generation"
    Stelios Sidiroglou and Angelos D. Keromytis. IEEE Security & Privacy, Volume:3 Issue 6, Nov.2005. Pages: 41-49 An older, extended version is available as Columbia University Computer Science Department Technical Report CUCS-029-03, November 2003.
  3. "Hardware Support For Self-Healing Software Services"
    Stelios Sidiroglou, Michael E. Locasto, and Angelos D. Keromytis. In ACM SIGARCH Computer Architecture News, vol. 33, no. 1, pp. 42 - 47. March 2005. Also appeared in the Proceedings of the Workshop on Architectural Support for Security and Anti-Virus (WASSA), held in conjunction with the 11th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-XI), pp. 37 - 43. October 2004, Boston, MA.
  4. "Topics in in-how networking -Ubiquitous computing in home networks"
    Stefan Berger, Henning Schulzrinne, Stelios Sidiroglou and Xiaotao Wu. Communications Magazine, IEEE, Volume:41 Issue 11, Nov.2003. Pages: 128-135
Books/Book Chapters
  1. "Composite Hybrid Techniques for Defending against Targeted Attacks"
    Stelios Sidiroglou and Angelos D. Keromytis. In Malware Detection, vol. 27 of Advances in Information Security Series, Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, and Cliff Wang (editors). Springer, October 2006. (By invitation, as part of the ARO/DHS 2005 Workshop on Malware Detection.)