Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks C Panos, C Ntantogian, S Malliaros, C Xenakis Computer Networks 113, 94-110, 2017 | 82 | 2017 |
Evaluating the privacy of Android mobile applications under forensic analysis C Ntantogian, D Apostolopoulos, G Marinakis, C Xenakis Computers & Security 42, 66-76, 2014 | 63 | 2014 |
Evaluation of cryptography usage in android applications A Chatzikonstantinou, C Ntantogian, G Karopoulos, C Xenakis Proceedings of the 9th EAI International Conference on Bio-inspired …, 2016 | 57 | 2016 |
Evaluation of password hashing schemes in open source web platforms C Ntantogian, S Malliaros, C Xenakis Computers & Security 84, 206-224, 2019 | 44 | 2019 |
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications A Stasinopoulos, C Ntantogian, C Xenakis International Journal of Information Security 18 (1), 49-72, 2019 | 42 | 2019 |
One-pass EAP-AKA authentication in 3G-WLAN integrated networks C Ntantogian, C Xenakis Wireless personal communications 48 (4), 569-584, 2009 | 42 | 2009 |
Discovering authentication credentials in volatile memory of android mobile devices D Apostolopoulos, G Marinakis, C Ntantogian, C Xenakis Conference on e-Business, e-Services and e-Society, 178-185, 2013 | 41 | 2013 |
Gaithashing: a two-factor authentication scheme based on gait features C Ntantogian, S Malliaros, C Xenakis Computers & Security 52, 17-32, 2015 | 29 | 2015 |
Secure edge computing with lightweight control-flow property-based attestation N Koutroumpouchos, C Ntantogian, SA Menesidou, K Liang, P Gouvas, ... 2019 IEEE Conference on Network Softwarization (NetSoft), 84-92, 2019 | 28 | 2019 |
A Security Evaluation of FIDO’s UAF Protocol in Mobile and Embedded Devices C Panos, S Malliaros, C Ntantogian, A Panou, C Xenakis International Tyrrhenian Workshop on Digital Communication, 127-142, 2017 | 28 | 2017 |
Commix: Detecting and exploiting command injection flaws. A Stasinopoulos, C Ntantogian, C Xenakis Department of Digital Systems, University of Piraeus, BlackHat Europe, Nov …, 2015 | 27 | 2015 |
P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go A Farao, E Veroni, C Ntantogian, C Xenakis Sensors 21 (8), 2686, 2021 | 26 | 2021 |
CUREX: seCUre and pRivate hEalth data eXchange F Mohammadi, A Panou, C Ntantogian, E Karapistoli, E Panaousis, ... IEEE/WIC/ACM International Conference on Web Intelligence-Companion Volume …, 2019 | 26 | 2019 |
Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone N Koutroumpouchos, C Ntantogian, C Xenakis Sensors 21 (2), 520, 2021 | 25 | 2021 |
ObjectMap: detecting insecure object deserialization N Koutroumpouchos, G Lavdanis, E Veroni, C Ntantogian, C Xenakis Proceedings of the 23rd Pan-Hellenic Conference on Informatics, 67-72, 2019 | 24 | 2019 |
Attacking the baseband modem of mobile phones to breach the users' privacy and network security C Xenakis, C Ntantogian 2015 7th International Conference on Cyber Conflict: Architectures in …, 2015 | 23 | 2015 |
Distributed key management in microgrids V Bolgouras, C Ntantogian, E Panaousis, C Xenakis IEEE Transactions on Industrial Informatics 16 (3), 2125-2133, 2019 | 22 | 2019 |
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem G Karopoulos, C Ntantogian, C Xenakis Computers & Security 73, 307-325, 2018 | 21 | 2018 |
Ropinjector: Using return oriented programming for polymorphism and antivirus evasion G Poulios, C Ntantogian, C Xenakis Blackhat USA, 2015 | 21 | 2015 |
NodeXP: NOde. js server-side JavaScript injection vulnerability DEtection and eXPloitation C Ntantogian, P Bountakas, D Antonaropoulos, C Patsakis, C Xenakis Journal of Information Security and Applications 58, 102752, 2021 | 20 | 2021 |