Follow
Kyriakos Ispoglou
Kyriakos Ispoglou
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Block oriented programming: Automating data-only attacks
KK Ispoglou, B AlBassam, T Jaeger, M Payer
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
982018
{FuzzGen}: Automatic Fuzzer Generation
K Ispoglou, D Austin, V Mohan, M Payer
29th USENIX Security Symposium (USENIX Security 20), 2271-2287, 2020
572020
{malWASH}: Washing Malware to Evade Dynamic Analysis
KK Ispoglou, M Payer
10th USENIX workshop on offensive technologies (WOOT 16), 2016
322016
PSHAPE: automatically combining gadgets for arbitrary method execution
A Follner, A Bartel, H Peng, YC Chang, K Ispoglou, M Payer, E Bodden
International Workshop on Security and Trust Management, 212-228, 2016
222016
VirISA: Recruiting Virtualization and Reconfigurable Processor ISA for Malicious Code Injection Protection
AP Fournaris, G Keramidas, K Ispoglou, N Voros
Components and Services for IoT Platforms, 117-130, 2017
12017
Partial order preserving encryption search trees
K Ispoglou, C Makris, YC Stamatiou, EC Stavropoulos, AK Tsakalidis, ...
Database and Expert Systems Applications, 49-56, 2015
12015
INFERENCE OF RESIDUAL ATTACK SURFACE UNDER MITIGATIONS
KK Ispoglou
Purdue University Graduate School, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–7