Implementing a distributed firewall S Ioannidis, AD Keromytis, SM Bellovin, JM Smith Proceedings of the 7th ACM conference on Computer and communications …, 2000 | 1009 | 2000 |
Countering code-injection attacks with instruction-set randomization GS Kc, AD Keromytis, V Prevelakis Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 989 | 2003 |
KeyNote: Trust management for public-key infrastructures M Blaze, J Feigenbaum, A Keromytis Security Protocols, 59-63, 1999 | 978* | 1999 |
The KeyNote trust-management system, version 2 M Blaze, J Feigenbaum, J Ioannidis, AD Keromytis Request for Comments (RFC) 2704, 1999 | 908* | 1999 |
The role of trust management in distributed systems security M Blaze, J Feigenbaum, J Ioannidis, A Keromytis Secure Internet Programming, 185-210, 1999 | 890* | 1999 |
SOS: Secure Overlay Services AD Keromytis, V Misra, D Rubenstein ACM SIGCOMM Computer Communication Review 32 (4), 61-72, 2002 | 796 | 2002 |
SQLrand: Preventing SQL injection attacks S Boyd, A Keromytis Applied Cryptography and Network Security, 292-302, 2004 | 680 | 2004 |
Smashing the gadgets: Hindering return-oriented programming using in-place code randomization V Pappas, M Polychronakis, AD Keromytis 2012 IEEE Symposium on Security and Privacy, 601-615, 2012 | 501 | 2012 |
Methods, systems, and media for detecting covert malware BM Bowen, PV Prabhu, VP Kemerlis, S Sidiroglou, SJ Stolfo, ... US Patent 8,528,091, 2013 | 486 | 2013 |
The SwitchWare active network architecture DS Alexander, WA Arbaugh, MW Hicks, P Kakkar, AD Keromytis, ... Network, IEEE 12 (3), 29-36, 1998 | 484 | 1998 |
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing V Pappas, M Polychronakis, AD Keromytis USENIX Security, 447-462, 2013 | 473 | 2013 |
Methods, systems, and media for baiting inside attackers SJ Stolfo, AD Keromytis, BM Bowen, S Hershkop, VP Kemerlis, ... US Patent 9,009,829, 2015 | 443 | 2015 |
Systems and methods for detecting and inhibiting attacks using honeypots S Sidiroglou, AD Keromytis, KG Anagnostakis US Patent 7,904,959, 2011 | 428 | 2011 |
Systems, methods, and media for detecting network anomalies using a trained probabilistic model Y Song, AD Keromytis, SJ Stolfo US Patent 8,844,033, 2014 | 392 | 2014 |
Secure and Reliable Bootstrap Architecture W Arbaugh, D Farber, A Keromytis, S Jonathan US Patent 6,185,678, 2001 | 381 | 2001 |
Fog computing: Mitigating insider data theft attacks in the cloud SJ Stolfo, MB Salem, AD Keromytis 2012 IEEE symposium on security and privacy workshops, 125-128, 2012 | 373 | 2012 |
The spy in the sandbox: Practical cache attacks in javascript and their implications Y Oren, VP Kemerlis, S Sethumadhavan, AD Keromytis Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 369 | 2015 |
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems SJ Stolfo, T Malkin, AD Keromytis, V Misra, M Locasto, J Parekh US Patent 7,779,463, 2010 | 365 | 2010 |
Detecting targeted attacks using shadow honeypots KG Anagnostakis, S Sidiroglou, P Akritidis, K Xinidis, E Markatos, ... Proceedings of the 14th USENIX security symposium 144, 2005 | 334 | 2005 |
Blind seer: A scalable private DBMS V Pappas, F Krell, B Vo, V Kolesnikov, T Malkin, SG Choi, W George, ... 2014 IEEE Symposium on Security and Privacy, 359-374, 2014 | 326 | 2014 |