Conference publications
- "Defending
Against Next Generation Attacks Through Network/Endpoint Collaboration
and Interaction"
- Spiros
Antonatos, Michael
E. Locasto, Stelios
Sidiroglou, Angelos
D. Keromytis, and Evangelos
Markatos. To appear in the Proceedings of the 3rd
European Conference on Computer Network Defense (EC2ND). October
2007, Heraclion, Greece. (Invited paper)
-
- "Proximity Breeds Danger: Emerging Threats in
Metro-area Wireless Networks"
-
P. Akritidis, W.Y. Chin, V.T. Lam, S. Sidiroglou,
K.G. Anagnostakis
in Proc. of USENIX Security 2007, August
2007
(Acceptance rate: 12.3%)
-
- "Using Rescue Points to Navigate Software
Recovery (Short Paper)"
- Stelios
Sidiroglou, Oren
Laadan, Angelos D.
Keromytis, and Jason
Nieh. To appear in the Proceedings of the
IEEE Symposium on Security & Privacy. May
2007, Oakland, CA. (Acceptance rate:
8.3%)
-
- "Network Security as a Composable
Service"
- Stelios
Sidiroglou, Angelos Stavrou, and
Angelos D.
Keromytis. To appear in the Proceedings of the
IEEE Sarnoff Symposium. May 2007, Princeton,
NJ. (Invited paper)
-
- "Software Self-Healing Using Collaborative
Application Communities"
- Michael E. Locasto, Stelios Sidiroglou, and
Angelos D. Keromytis. To appear in the Proceedings of
the Internet Society (ISOC) Symposium on Network
and Distributed Systems Security (SNDSS).
February 2005, San Diego, CA. (Acceptance Rate:
13.6%)
-
-
"A Dynamic Mechanism for Recovering from Buffer
Overflow Attacks"
- Stelios Sidiroglou, Giannis Giovanidis, and
Angelos D. Keromytis. To appear in the Proceedings of
the 8th Information Security Conference
(ISC). September 2005, Singapore. An older
version of this paper is available as
Columbia University Computer Science Department
Technical Report CUCS-031-04, September 2004.
(Acceptance rate: 14%)
-
-
"Detecting Targeted Attacks Using Shadow
Honeypots"
- Kostas G. Anagnostakis, Stelios Sidiroglou,
Periklis Akritidis, Konstantinos Xinidis, Evangelos
Markatos, and Angelos D. Keromytis. To appear in the
Proceedings of the 14th USENIX Security
Symposium. August 2005, Baltimore, MD.
(Acceptance rate: 12.3%)
-
-
"An Email Worm Vaccine Architecture"
- Stelios Sidiroglou, John Ioannidis, Angelos D.
Keromytis, and Salvatore J. Stolfo. To appear in the
Proceedings of the 1st Information Security
Practice and Experience Conference (ISPEC) April
2005, Singapore
-
-
"Building A Reactive Immune System for Software
Services"
- Stelios Sidiroglou, Michael E. Locasto, Stephen
W. Boyd, Angelos D. Keromytis. To appear in the
Proceedings of the USENIX Annual Technical
Conference. April 2005, Anaheim,CA
Workshop Publications
- "Band-aid
Patching (Poster Paper)"
- Stelios
Sidiroglou, Sotiris
Ioannidis, and Angelos
D. Keromytis. To appear in the Proceedings of the
3rd Workshop on Hot Topics in System Dependability
(HotDep). June 2007, Edinburgh, UK.
-
- "Privacy as an Operating System
Service"
- Stelios Sidiroglou, Sotiris Ioannidis and Angelos
D. Keromytis. To appear in the Proceedings of the
Workshop on Hot Topics in Security (HOTSEC).
August 2006, Vancouver, CA.
-
-
"Application Communities: Using Monoculture for
Dependability"
- Michael E. Locasto, Stelios Sidiroglou, and
Angelos D. Keromytis. To appear in the Proceedings of
the 1st Workshop on Hot Topics in
System Dependability (HotDep), held in
conjunction with the International Conference on
Dependable Systems and Networks (DSN). June 2005,
Yokohama, Japan.
-
- "Speculative
Virtual Verification: Policy-Constrained Speculative
Execution"
- Michael E. Locasto, Stelios Sidiroglou, and
Angelos D. Keromytis. To appear in the Proceedings of
the New Security Paradigms Workshop (NSPW).
September 2005, Lake Arrowhead, CA.
-
-
"Hardware Support For Self-Healing Software
Services"
- Stelios Sidiroglou, Michael E. Locasto, and
Angelos D. Keromytis. To appear in the Proceedings of
the Workshop on Architectural Support for Security
and Anti-Virus (WASSA), held in conjunction with
the 11th International Conference on
Architectural Support for Programming Languages and
Operating Systems (ASPLOS-XI). October 2004,
Boston, MA.
-
-
"A Network Worm Vaccine Architecture"
- Stelios Sidiroglou and Angelos D. Keromytis. In
Proceedings of the IEEE International Workshops on
Enabling Technologies: Infrastructure for
Collaborative Enterprises (WETICE), Workshop on
Enterprise Security. June 2003, Linz,
Austria.
-
-
"Ubiquitous Computing Using SIP"
- Stefan Berger, Henning Schulzrinne, Stelios
Sidiroglou and Xiaotao Wu. In Proceedings of the
ACM International Workshop on Network and
Operating Systems Support for Digital Audio and Video
(NOSSDAV). June 2003, Monterey, CA.
Journal Publications
- "Execution Transactions
for Defending Against Software Failures: Use and
Evaluation"
- Stelios
Sidiroglou and Angelos
D. Keromytis. In Springer International Journal of
Information Security (IJIS), vol. 5, no. 2, pp. 77 - 91, April
2006. (Extended version of the ISC 2005 paper.)
-
- "Countering Network Worms Through Automatic
Patch Generation"
- Stelios Sidiroglou and Angelos D. Keromytis.
IEEE Security & Privacy, Volume:3 Issue 6,
Nov.2005. Pages: 41-49 An older, extended version
is available as Columbia University
Computer Science Department Technical Report
CUCS-029-03, November 2003.
-
-
"Hardware Support For Self-Healing Software
Services"
- Stelios Sidiroglou, Michael E. Locasto, and
Angelos D. Keromytis. In ACM SIGARCH Computer
Architecture News, vol. 33, no. 1, pp. 42 - 47.
March 2005. Also appeared in the Proceedings of the
Workshop on Architectural Support for Security and
Anti-Virus (WASSA), held in conjunction with the
11th International Conference on
Architectural Support for Programming Languages and
Operating Systems (ASPLOS-XI), pp. 37 - 43.
October 2004, Boston, MA.
-
-
"Topics in in-how networking -Ubiquitous computing in
home networks"
- Stefan Berger, Henning Schulzrinne, Stelios
Sidiroglou and Xiaotao Wu. Communications
Magazine, IEEE, Volume:41 Issue 11, Nov.2003.
Pages: 128-135
Books/Book Chapters
-
- "Composite Hybrid Techniques for Defending
against Targeted Attacks"
- Stelios
Sidiroglou and Angelos D. Keromytis. In
Malware Detection, vol. 27 of Advances in
Information Security Series, Mihai Christodorescu,
Somesh Jha, Douglas Maughan, Dawn Song, and Cliff
Wang (editors). Springer, October 2006. (By
invitation, as part of the ARO/DHS 2005 Workshop on
Malware Detection.)