Follow
Kyriakos Ispoglou
Kyriakos Ispoglou
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Block oriented programming: Automating data-only attacks
KK Ispoglou, B AlBassam, T Jaeger, M Payer
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1772018
{FuzzGen}: Automatic fuzzer generation
K Ispoglou, D Austin, V Mohan, M Payer
29th USENIX Security Symposium (USENIX Security 20), 2271-2287, 2020
1282020
{malWASH}: washing malware to evade dynamic analysis
KK Ispoglou, M Payer
10th USENIX workshop on offensive technologies (WOOT 16), 2016
452016
PSHAPE: automatically combining gadgets for arbitrary method execution
A Follner, A Bartel, H Peng, YC Chang, K Ispoglou, M Payer, E Bodden
Security and Trust Management: 12th International Workshop, STM 2016 …, 2016
252016
VirISA: Recruiting Virtualization and Reconfigurable Processor ISA for Malicious Code Injection Protection
AP Fournaris, G Keramidas, K Ispoglou, N Voros
Components and Services for IoT Platforms: Paving the Way for IoT Standards …, 2017
12017
Inference of Residual Attack Surface Under Mitigations
KK Ispoglou
Purdue University, 2019
2019
Partial Order Preserving Encryption Search Trees
K Ispoglou, C Makris, YC Stamatiou, EC Stavropoulos, AK Tsakalidis, ...
Database and Expert Systems Applications: 26th International Conference …, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–7