Angelos D. Keromytis, Ph.D.

Affiliations: 
Computer Science Columbia University, New York, NY 
 2001 University of Pennsylvania, Philadelphia, PA, United States 
Area:
Security, Cryptography, Networks, Operating Systems, Distributed Systems.
Google:
"Angelos Keromytis"

Parents

Sign in to add mentor
Jonathan M. Smith grad student 2001 Penn
 (STRONGMAN: A scalable solution to trust management in networks.)

Children

Sign in to add trainee
Debra L. Cook grad student 2006 Columbia
Michael E. Locasto grad student 2008 Columbia
Stylianos Sidiroglou grad student 2008 Columbia
Mansoor Alicherry grad student 2011 Columbia
Sambuddho Chakravarty grad student 2014 Columbia
Vasileios Pappas grad student 2015 Columbia
Angeliki Zavou grad student 2015 Columbia
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Petsios T, Kemerlis VP, Polychronakis M, et al. (2015) DynaGuard: Armoring canary-based protections against brute-force attacks Acm International Conference Proceeding Series. 7: 351-360
Oren Y, Kemerlis VP, Sethumadhavan S, et al. (2015) The spy in the sandbox: Practical cache attacks in JavaScript and their implications Proceedings of the Acm Conference On Computer and Communications Security. 2015: 1406-1418
Oren Y, Keromytis AD. (2015) Attacking the internet using broadcast digital television Acm Transactions On Information and System Security. 17
Tsiatsikas Z, Geneiatakis D, Kambourakis G, et al. (2015) An efficient and easily deployable method for dealing with DoS in SIP services Computer Communications. 57: 50-63
Chakravarty S, Portokalidis G, Polychronakis M, et al. (2015) Detection and analysis of eavesdropping in anonymous communication networks International Journal of Information Security. 14: 205-220
Pomonis M, Petsios T, Jee K, et al. (2014) IntFlow: Improving the accuracy of arithmetic error detection using information flow tracking Acm International Conference Proceeding Series. 2014: 416-425
Polakis I, Ilia P, Maggi F, et al. (2014) Faces in the distorting mirror: Revisiting photo-based social authentication Proceedings of the Acm Conference On Computer and Communications Security. 501-512
Pappas V, Krell F, Vo B, et al. (2014) Blind seer: A scalable private DBMS Proceedings - Ieee Symposium On Security and Privacy. 359-374
Pappas V, Polychronakis M, Keromytis AD. (2014) Dynamic reconstruction of relocation information for stripped binaries Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8688: 68-87
Chakravarty S, Barbera MV, Portokalidis G, et al. (2014) On the effectiveness of traffic analysis against anonymity networks using flow records Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8362: 247-257
See more...