Michalis Polychronakis
Michalis Polychronakis
Associate Professor, Stony Brook University
Verified email at cs.stonybrook.edu - Homepage
Title
Cited by
Cited by
Year
Gnort: High performance network intrusion detection using graphics processors
G Vasiliadis, S Antonatos, M Polychronakis, EP Markatos, S Ioannidis
Recent Advances in Intrusion Detection, 116-134, 2008
4362008
Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
V Pappas, M Polychronakis, AD Keromytis
2012 IEEE Symposium on Security and Privacy, 601-615, 2012
4052012
Transparent {ROP} exploit mitigation using indirect branch tracing
V Pappas, M Polychronakis, AD Keromytis
22nd {USENIX} Security Symposium ({USENIX} Security 13), 447-462, 2013
3702013
Rage against the virtual machine: hindering dynamic analysis of android malware
T Petsas, G Voyatzis, E Athanasopoulos, M Polychronakis, S Ioannidis
Proceedings of the seventh european workshop on system security, 1-6, 2014
2402014
Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard
E Göktaş, E Athanasopoulos, M Polychronakis, H Bos, G Portokalidis
23rd {USENIX} Security Symposium ({USENIX} Security 14), 417-432, 2014
1842014
Regular expression matching on graphics hardware for intrusion detection
G Vasiliadis, M Polychronakis, S Antonatos, EP Markatos, S Ioannidis
International Workshop on Recent Advances in Intrusion Detection, 265-283, 2009
1742009
MIDeA: a multi-parallel intrusion detection architecture
G Vasiliadis, M Polychronakis, S Ioannidis
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1612011
Network–level polymorphic shellcode detection using emulation
M Polychronakis, KG Anagnostakis, EP Markatos
International Conference on Detection of Intrusions and Malware, and …, 2006
1522006
Combining static and dynamic analysis for the detection of malicious documents
Z Tzermias, G Sykiotakis, M Polychronakis, EP Markatos
Proceedings of the Fourth European Workshop on System Security, 1-6, 2011
1372011
Emulation-based detection of non-self-contained polymorphic shellcode
M Polychronakis, KG Anagnostakis, EP Markatos
International Workshop on Recent Advances in Intrusion Detection, 87-106, 2007
1352007
E2xB: A domain-specific string matching algorithm for intrusion detection
KG Anagnostakis, EP Markatos, S Antonatos, M Polychronakis
Proc. of the 18th IFIP International Information Security Conference …, 2003
1262003
STRIDE: Polymorphic sled detection through instruction sequence analysis
P Akritidis, E Markatos, M Polychronakis, K Anagnostakis
20th IFIP International Information Security Conference (IFIP/SEC), 2005
1252005
Rise of the planet of the apps: A systematic study of the mobile app ecosystem
T Petsas, A Papadogiannakis, M Polychronakis, EP Markatos, ...
Proceedings of the 2013 conference on Internet measurement conference, 277-290, 2013
1152013
Exclusion-based signature matching for intrusion detection
EP Markatos, S Antonatos, M Polychronakis, KG Anagnostakis
Proceedings of the IASTED International Conference on Communications and …, 2002
1152002
Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware
M Polychronakis, P Mavrommatis, N Provos
LEET 8, 1-8, 2008
1052008
ret2dir: Rethinking kernel isolation
VP Kemerlis, M Polychronakis, AD Keromytis
23rd {USENIX} Security Symposium ({USENIX} Security 14), 957-972, 2014
1032014
Comprehensive shellcode detection using runtime heuristics
M Polychronakis, KG Anagnostakis, EP Markatos
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
932010
On the effectiveness of traffic analysis against anonymity networks using flow records
S Chakravarty, MV Barbera, G Portokalidis, M Polychronakis, ...
International conference on passive and active network measurement, 247-257, 2014
852014
Performance analysis of content matching intrusion detection systems
S Antonatos, KG Anagnostakis, EP Markatos, M Polychronakis
2004 International Symposium on Applications and the Internet. Proceedings …, 2004
832004
You can type, but you canąt hide: A stealthy GPU-based keylogger
E Ladakis, L Koromilas, G Vasiliadis, M Polychronakis, S Ioannidis
Proceedings of the 6th European Workshop on System Security (EuroSec), 2013
762013
The system can't perform the operation now. Try again later.
Articles 1–20