Angelos D. Keromytis
Georgia Institute of Technology
H-index: 83
North America-United States
Top articles of Angelos D. Keromytis
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans | arXiv preprint arXiv:2403.10659 | Athanasios Moschos Fabian Monrose Angelos D Keromytis | 2024/3/15 |
Harnessing the Power of General-Purpose LLMs in Hardware Trojan Design | Georgios Kokolakis Athanasios Moschos Angelos D Keromytis | 2024 | |
Detecting return-oriented programming payloads by evaluating data for a gadget address space address and determining whether operations associated with instructions beginning … | 2023/3/7 | ||
AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials | Network and Distributed System Security Symposium (NDSS) | Hexuan Yu Changlai Du Yang Xiao Angelos Keromytis Chonggang Wang | 2023 |
{UCBlocker}: Unwanted call blocking using anonymous authentication | Changlai Du Hexuan Yu Yang Xiao Y Thomas Hou Angelos D Keromytis | 2023 | |
Beyond The Gates: An Empirical Analysis of {HTTP-Managed} Password Stealers and Operators | Athanasios Avgetidis Omar Alrawi Kevin Valakuzhy Charles Lever Paul Burbage | 2023 | |
Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys | Zane Ma Aaron Faulkenberry Thomas Papastergiou Zakir Durumeric Michael D Bailey | 2023/10/24 | |
Hammerscope: observing DRAM power consumption using rowhammer | Yaakov Cohen Kevin Sam Tharayil Arie Haenel Daniel Genkin Angelos D Keromytis | 2022/11/7 | |
Methods, media, and systems for detecting anomalous program executions | 2022/2/24 | ||
View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy | Aaron Faulkenberry Athanasios Avgetidis Zane Ma Omar Alrawi Charles Lever | 2022/12/5 | |
On the Feasibility of Remotely Triggered Automotive Hardware Trojans | Athanasios Moschos Kevin Valakuzhy Angelos D Keromytis | 2022/11/16 | |
Methods, media, and systems for detecting an anomalous sequence of function calls | 2021/8/31 | ||
Methods, media, and systems for detecting attack on a digital processing device | 2021/1/26 | ||
Detecting network anomalies by probabilistic modeling of argument strings with markov chains | 2020/10/27 |