Block oriented programming: Automating data-only attacks KK Ispoglou, B AlBassam, T Jaeger, M Payer Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 177 | 2018 |
{FuzzGen}: Automatic fuzzer generation K Ispoglou, D Austin, V Mohan, M Payer 29th USENIX Security Symposium (USENIX Security 20), 2271-2287, 2020 | 128 | 2020 |
{malWASH}: washing malware to evade dynamic analysis KK Ispoglou, M Payer 10th USENIX workshop on offensive technologies (WOOT 16), 2016 | 45 | 2016 |
PSHAPE: automatically combining gadgets for arbitrary method execution A Follner, A Bartel, H Peng, YC Chang, K Ispoglou, M Payer, E Bodden Security and Trust Management: 12th International Workshop, STM 2016 …, 2016 | 25 | 2016 |
VirISA: Recruiting Virtualization and Reconfigurable Processor ISA for Malicious Code Injection Protection AP Fournaris, G Keramidas, K Ispoglou, N Voros Components and Services for IoT Platforms: Paving the Way for IoT Standards …, 2017 | 1 | 2017 |
Inference of Residual Attack Surface Under Mitigations KK Ispoglou Purdue University, 2019 | | 2019 |
Partial Order Preserving Encryption Search Trees K Ispoglou, C Makris, YC Stamatiou, EC Stavropoulos, AK Tsakalidis, ... Database and Expert Systems Applications: 26th International Conference …, 2015 | | 2015 |