Block oriented programming: Automating data-only attacks KK Ispoglou, B AlBassam, T Jaeger, M Payer Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 98 | 2018 |
{FuzzGen}: Automatic Fuzzer Generation K Ispoglou, D Austin, V Mohan, M Payer 29th USENIX Security Symposium (USENIX Security 20), 2271-2287, 2020 | 57 | 2020 |
{malWASH}: Washing Malware to Evade Dynamic Analysis KK Ispoglou, M Payer 10th USENIX workshop on offensive technologies (WOOT 16), 2016 | 32 | 2016 |
PSHAPE: automatically combining gadgets for arbitrary method execution A Follner, A Bartel, H Peng, YC Chang, K Ispoglou, M Payer, E Bodden International Workshop on Security and Trust Management, 212-228, 2016 | 22 | 2016 |
VirISA: Recruiting Virtualization and Reconfigurable Processor ISA for Malicious Code Injection Protection AP Fournaris, G Keramidas, K Ispoglou, N Voros Components and Services for IoT Platforms, 117-130, 2017 | 1 | 2017 |
Partial order preserving encryption search trees K Ispoglou, C Makris, YC Stamatiou, EC Stavropoulos, AK Tsakalidis, ... Database and Expert Systems Applications, 49-56, 2015 | 1 | 2015 |
INFERENCE OF RESIDUAL ATTACK SURFACE UNDER MITIGATIONS KK Ispoglou Purdue University Graduate School, 2019 | | 2019 |