Follow
Vasileios P. Kemerlis
Vasileios P. Kemerlis
Other namesVasilis Kemerlis
Assistant Professor, Brown University
Verified email at cs.brown.edu - Homepage
Title
Cited by
Cited by
Year
Methods, Systems, and Media for Detecting Covert Malware
BM Bowen, PV Prabhu, VP Kemerlis, S Sidiroglou, SJ Stolfo, ...
US Patent 8,528,091, 2013
4712013
Methods, Systems, and Media for Baiting Inside Attackers
SJ Stolfo, AD Keromytis, BM Bowen, S Hershkop, VP Kemerlis, ...
US Patent 9,009,829, 2015
4332015
The Spy in the Sandbox: Practical Cache Attacks in Javascript and their Implications
Y Oren, VP Kemerlis, S Sethumadhavan, AD Keromytis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
3622015
libdft: Practical Dynamic Data Flow Tracking for Commodity Systems
VP Kemerlis, G Portokalidis, K Jee, AD Keromytis
Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012
3112012
Shuffler: Fast and Deployable Continuous Code Re-Randomization
D Williams-King, G Gobieski, K Williams-King, JP Blake, X Yuan, P Colp, ...
12th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2016
1822016
ret2dir: Rethinking Kernel Isolation
VP Kemerlis, M Polychronakis, AD Keromytis
23rd USENIX Security Symposium (USENIX Security 14), 957-972, 2014
1652014
kGuard: Lightweight Kernel Protection against Return-to-user Attacks
VP Kemerlis, G Portokalidis, AD Keromytis
21st USENIX Security Symposium (USENIX Security 12), 459-474, 2012
1562012
Wireless Community Networks: An Alternative Approach for Nomadic Broadband Network Access
PA Frangoudis, GC Polyzos, VP Kemerlis
IEEE Communications Magazine 49 (5), 206-213, 2011
1082011
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting
K Lu, Z Li, VP Kemerlis, Z Wu, L Lu, C Zheng, Z Qian, W Lee, G Jiang
NDSS, 2015
1042015
Scanning the Internet for ROS: A View of Security in Robotics Research
N DeMarinis, S Tellex, VP Kemerlis, G Konidaris, R Fonseca
2019 International Conference on Robotics and Automation (ICRA), 8514-8521, 2019
1022019
Egalito: Layout-Agnostic Binary Recompilation
D Williams-King, H Kobayashi, K Williams-King, G Patterson, F Spano, ...
Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020
982020
ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking
K Jee, VP Kemerlis, AD Keromytis, G Portokalidis
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
962013
Compiler-assisted Code Randomization
H Koo, Y Chen, L Lu, VP Kemerlis, M Polychronakis
2018 IEEE symposium on security and privacy (SP), 461-477, 2018
932018
RETracer: Triaging Crashes by Reverse Execution from Partial Memory Dumps
W Cui, M Peinado, SK Cha, Y Fratantonio, VP Kemerlis
Proceedings of the 38th International Conference on Software Engineering …, 2016
922016
Nibbler: Debloating Binary Shared Libraries
I Agadakos, D Jin, D Williams-King, VP Kemerlis, G Portokalidis
Proceedings of the 35th Annual Computer Security Applications Conference, 70-83, 2019
872019
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.
K Jee, G Portokalidis, VP Kemerlis, S Ghosh, DI August, AD Keromytis
NDSS, 2012
842012
kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse
M Pomonis, T Petsios, AD Keromytis, M Polychronakis, VP Kemerlis
Proceedings of the Twelfth European Conference on Computer Systems, 420-436, 2017
822017
xMP: Selective Memory Protection for Kernel and User Space
S Proskurin, M Momeu, S Ghavamnia, VP Kemerlis, M Polychronakis
2020 IEEE Symposium on Security and Privacy (SP), 563-577, 2020
722020
CloudFence: Data Flow Tracking as a Cloud Service
V Pappas, VP Kemerlis, A Zavou, M Polychronakis, AD Keromytis
Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013
662013
sysfilter: Automated System Call Filtering for Commodity Software
N DeMarinis, K Williams-King, D Jin, R Fonseca, VP Kemerlis
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
632020
The system can't perform the operation now. Try again later.
Articles 1–20