Follow
Michalis Polychronakis
Michalis Polychronakis
Associate Professor, Stony Brook University
Verified email at cs.stonybrook.edu - Homepage
Title
Cited by
Cited by
Year
Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
V Pappas, M Polychronakis, AD Keromytis
2012 IEEE Symposium on Security and Privacy, 601-615, 2012
5072012
Transparent ROP Exploit Mitigation using Indirect Branch Tracing
V Pappas, M Polychronakis, AD Keromytis
22nd USENIX Security Symposium (USENIX Security 13), 447-462, 2013
4812013
Gnort: High performance network intrusion detection using graphics processors
G Vasiliadis, S Antonatos, M Polychronakis, EP Markatos, S Ioannidis
Recent Advances in Intrusion Detection, 116-134, 2008
4742008
Rage against the virtual machine: hindering dynamic analysis of android malware
T Petsas, G Voyatzis, E Athanasopoulos, M Polychronakis, S Ioannidis
Proceedings of the seventh european workshop on system security, 1-6, 2014
3482014
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard
E Göktaş, E Athanasopoulos, M Polychronakis, H Bos, G Portokalidis
23rd USENIX Security Symposium (USENIX Security 14), 417-432, 2014
2192014
Sok: The challenges, pitfalls, and perils of using hardware performance counters for security
S Das, J Werner, M Antonakakis, M Polychronakis, F Monrose
2019 IEEE Symposium on Security and Privacy (SP), 20-38, 2019
2092019
Regular expression matching on graphics hardware for intrusion detection
G Vasiliadis, M Polychronakis, S Antonatos, EP Markatos, S Ioannidis
Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009
1932009
MIDeA: a multi-parallel intrusion detection architecture
G Vasiliadis, M Polychronakis, S Ioannidis
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1902011
Combining static and dynamic analysis for the detection of malicious documents
Z Tzermias, G Sykiotakis, M Polychronakis, EP Markatos
Proceedings of the Fourth European Workshop on System Security, 1-6, 2011
1872011
ret2dir: Rethinking kernel isolation
VP Kemerlis, M Polychronakis, AD Keromytis
23rd USENIX Security Symposium (USENIX Security 14), 957-972, 2014
1782014
Spotless sandboxes: Evading malware analysis systems using wear-and-tear artifacts
N Miramirkhani, MP Appini, N Nikiforakis, M Polychronakis
2017 IEEE Symposium on Security and Privacy (SP), 1009-1024, 2017
1732017
Network–level polymorphic shellcode detection using emulation
M Polychronakis, KG Anagnostakis, EP Markatos
International Conference on Detection of Intrusions and Malware, and …, 2006
1712006
Rise of the planet of the apps: A systematic study of the mobile app ecosystem
T Petsas, A Papadogiannakis, M Polychronakis, EP Markatos, ...
Proceedings of the 2013 conference on Internet measurement conference, 277-290, 2013
1552013
Emulation-based detection of non-self-contained polymorphic shellcode
M Polychronakis, KG Anagnostakis, EP Markatos
Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007
1422007
STRIDE: Polymorphic sled detection through instruction sequence analysis
P Akritidis, E Markatos, M Polychronakis, K Anagnostakis
20th IFIP International Information Security Conference (IFIP/SEC), 2005
1312005
E2xB: A domain-specific string matching algorithm for intrusion detection
KG Anagnostakis, EP Markatos, S Antonatos, M Polychronakis
Proc. of the 18th IFIP International Information Security Conference …, 2003
1272003
Exclusion-based signature matching for intrusion detection
EP Markatos, S Antonatos, M Polychronakis, KG Anagnostakis
Proceedings of the IASTED International Conference on Communications and …, 2002
1242002
Temporal system call specialization for attack surface reduction
S Ghavamnia, T Palit, S Mishra, M Polychronakis
29th USENIX Security Symposium (USENIX Security 20), 1749-1766, 2020
1212020
Confine: Automated system call policy generation for container attack surface reduction
S Ghavamnia, T Palit, A Benameur, M Polychronakis
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
1202020
On the effectiveness of traffic analysis against anonymity networks using flow records
S Chakravarty, MV Barbera, G Portokalidis, M Polychronakis, ...
Passive and Active Measurement: 15th International Conference, PAM 2014, Los …, 2014
1132014
The system can't perform the operation now. Try again later.
Articles 1–20