Publications

Validating Memory Safety in Rust Binaries
Antonis Louka, Antreas Dionysiou, and Elias Athanasopoulos. In Proceedings of the 17th European Workshop on Systems Security (EuroSec). Athens, Greece, April 2024.
Been here already? Detecting Synchronized Browsers in the Wild
Pantelina Ioannou and Elias Athanasopoulos. In Proceedings of the 8th IEEE European Symposium on Security and Privacy. Delft, Netherlands, July 2023.
SoK: Membership Inference is Harder than Previously Thought
Antreas Dionysiou and Elias Athanasopoulos. In Proceedings of the 23rd Privacy Enhancing Technologies Symposium (PETS). Lausanne, Switzerland, June 2023.
Exploring Model Inversion Attacks in the Black-box Setting
Antreas Dionysiou, Vassilis Vassiliades, and Elias Athanasopoulos. In Proceedings of the 23rd Privacy Enhancing Technologies Symposium (PETS). Lausanne, Switzerland, June 2023.
Lethe: Practical Data Breach Detection with Zero Persistent Secret State
Antreas Dionysiou and Elias Athanasopoulos. In Proceedings of the 7th IEEE European Symposium on Security and Privacy. Genoa, Italy, June, 2022.
🤙 Distinguished paper award finalist.
Unicode Evil: Evading NLP Systems Using Visual Similarities of Text Characters
Antreas Dionysiou and Elias Athanasopoulos. In Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security (AISEC). Virtual, November, 2021.
webFuzz: Grey-box Fuzzing for Web Applications
Orpheas van Rooij, Marcos Charalambous, Demetris Kaizer, Michalis Papaevripides, and Elias Athanasopoulos. In Proceedings of the 26th European Symposium on Research in Computer Security (ESORICS). Darmstadt, Germany (virtual), October 2021.
Hard edges: Hardware-based Control-Flow Integrity for Embedded Devices
George Christou, Giorgos Vasiliadis, Elias Athanasopoulos and Sotiris Ioannidis. In Proceedings of the 21st International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (SAMOS). Virtual, July 2021.
HoneyGen: Generating Honeywords Using Representation Learning
Antreas Dionysiou, Vassilis Vassiliades, and Elias Athanasopoulos. In Proceedings of the 16th ACM Asia Conference on Computer and Communications Security (AsiaCCS). Hong Kong, China (virtual), June 2021.
Exploiting Mixed Binaries
Michalis Papaevripides and Elias Athanasopoulos. In Proceedings of the ACM Transactions on Privacy and Security (TOPS). Article No.: 7, pp 1-29, January 2021.
Evaluation of the Adoption and Privacy Risks of Google Prompts
Christos Avraam and Elias Athanasopoulos. In Proceedings of the 1st Workshop on Security in Mobile Technologies (co-located with ACNS). Rome, Italy (virtual), October 2020.
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions
Radhesh K. Konoth, Björn Fischer, Wan Fokkink, Elias Athanasopoulos, Kaveh Razavi, Herbert Bos. In Proceedings of the 5th IEEE European Symposium on Security and Privacy 2020. Genova, Italy (virtual), September 2020.
🤙 Best Paper Award!
auth.js: Advanced Authentication for the Web
Neophytos Christou and Elias Athanasopoulos. In Proceedings of the 3rd International Workshop on Emerging Technologies for Authorization and Authentication (co-located with ESORICS). Guildford, UK (virtual), September 2020.
SoK: Machine vs. Machine - A Systematic Classification of Automated Machine Learning-based CAPTCHA Solvers
Antreas Dionysiou and Elias Athanasopoulos. In Proceedings of the Computers & Security 97, 101947. July 2020.
Practical Password Hardening based on TLS
Constantinos Diomedous and Elias Athanasopoulos. In Proceedings of the 16th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). Gothenburg, Sweden, June 2019.
KAuth: A Strong Single Sign-On Service based on PKI
Panayiotis Charalambous, Marios Karapetris, and Elias Athanasopoulos. In Proceedings of the International Conference on Security and Cryptography (SECRYPT). Porto, Portugal, July 2018.
Throwhammer: Rowhammer Attacks over the Network and Defenses
Andrei Tatar, Radhesh Krishnan, Elias Athanasopoulos, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi. In Proceedings of the Annual Usenix Technical Conference (ATC). Boston, MA, US, June 2018.
🤙  Check the Ars Technica article.
Where's Wally? How to Privately Discover your Friends on the Internet (short paper)
Panagiotis Papadopoulos, Antonios A. Chariton, Elias Athanasopoulos, Evangelos P. Markatos. In Proceedings of the 13th ACM Asia Conference on Computer and Communications Security (AsiaCCS). Songdo, Incheon, South Korea, June 2018.
0pass: Zero-storage Password Management Based on Password Reminders
Giannis Tzagarakis, Panagiotis Papadopoulos, Antonios A. Chariton, Elias Athanasopoulos, Evangelos P. Markatos. In Proceedings of the 11th European Workshop on Systems Security (EuroSec). Porto, Portugal, April 2018.
A Large-scale Analysis of Content Modification by Open HTTP Proxies
Georgios Tsirantonakis, Panagiotis Ilia, Sotiris Ioannidis, Elias Athanasopoulos, and Michalis Polychronakis. In Proceedings of the 24th Network and Distributed System Security Symposium (NDSS). San Diego, CA, US, February 2018.
PROV2R: Practical Provenance Analysis of Unstructured Processes
Manolis Stamatogiannakis, Elias Athanasopoulos, Herbert Bos, and Paul Groth. In Proceedings of the ACM Transactions on Internet Technology. August 2017.
No Need to Hide: Protecting Safe Regions on Commodity Hardware
Koen Koning, Xi Chen, Herbert Bos, Cristiano Giuffrida, and Elias Athanasopoulos. In Proceedings of the European Conference on Computer Systems (EuroSys). Belgrade, Serbia, April 2017.
MARX: Uncovering Class Hierarchies in C++ Programs
Andre Pawloski, Moritz Contag, Thorsten Holz, Victor van der Veen, Chris Ouwehand, Herbert Bos, Elias Athanasopoulos, and Cristiano Giuffrida. In Proceedings of the 24th Network and Distributed System Security Symposium (NDSS). San Diego, CA, US, February 2017.
VTPin: Practical VTable Hijacking Protection for Binaries
Pawel Sarbinowski, Vasileios P. Kemerlis, Cristiano Giuffrida, and Elias Athanasopoulos. In Proceedings of the 32nd Annual Computer Security Applications Conference (ACSAC). Los Angeles, CA, US, December 2016.
NaClDroid: Native Code Isolation for Android Applications
Elias Athanasopoulos, Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis. In Proceedings of the 21st European Symposium on Resaerch in Computer Security (ESORICS). Heraklion, Crete, Greece, September 2016.
Provable Network Activity for Protecting Users against False Accusation
Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, and Evangelos P. Markatos. In Proceedings of the 10th WISTP Conference in Information Security Theory and Practice (WISTP). Heraklion, Crete, Greece, September 2016.
GRIM: Leveraging GPUs for Kernel Integrity Monitoring
Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). France, Paris, September 2016.
Poking Holes in Information Hiding
Aggelos Oikonomopoulos, Elias Athanasopoulos, Herbert Bos, and Cristiano Giuffrida. In Proceedings of the 25th USENIX Security Symposium. Austin, TX, US, August 2016.
Undermining Information Hiding (And What to do About it)
Enes Göktaş, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, and Herbert Bos. In Proceedings of the 25th USENIX Security Symposium. Austin, TX, US, August 2016.
A Tough call: Mitigating Advanced Code-Reuse Attacks At The Binary Level
Victor van der Veen, Enes Göktaş, Moritz Contag, Andre Pawloski, Xi Chen, Sanjay Rawat, Herbert Bos, Thorsten Holz, Elias Athanasopoulos, and Cristiano Giuffrida. In Proceedings of the 37th Symposium on Security and Privacy (Oakland). San Jose, CA, US, May 2016.
HCFI: Hardware-enforced Control-Flow Integrity
Nick Christoulakis, George Christou, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 6th ACM Conference on Data and Applications Security and Privacy (CODASPY). New Orleans, LA, US, March 2016.
🤙 Outstanding Paper Award!
ShrinkWrap: VTable Protection without Loose Ends
Istvan Haller, Enes Göktaş, Elias Athanasopoulos, Georgios Portokalidis, and Herbert Bos. In Proceedings of the 31st Annual Computer Security Applications Conference (ACSAC). Los Angeles, CA, US, December 2015.
🤙 Best Student Paper!
Face/Off: Preventing Privacy Leakage From Photos in Social Networks
Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, Sotiris Ioannidis. In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS). Denver, CO, US, October 2015.
Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption
Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 8th European Workshop on System Security (EUROSEC 2015). Bordeaux, France, April 2015.
The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines
Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, and Sotiris Ioannidis. In Proceedings of the 22nd Network and Distributed System Security Symposium (NDSS 2015). San Diego, CA, US, February 2015.
PixelVault: Using GPUs for Securing Cryptographic Operations
Giorgos Vasiliadis, Elias Athanasopoulos, Michalis Polychronakis, and Sotiris Ioannidis. In Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS). Scottsdale, Arizona, US, November 2014.
Flying Memcache: Lessons Learned from Different Acceleration Strategies
Dimitris Deyannis, Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD). Paris, France, October 2014.
Size Does Matter - Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard
Enes Göktaş, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, and Georgios Portokalidis. In Proceedings of the 23rd USENIX Security Symposium. San Diego, CA, US, August 2014.
AndRadar: Fast Discovery of Android Applications in Alternative Markets
Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, and Sotiris Ioannidis . In Proceedings of the 11th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). Egham, UK, July 2014.
Out Of Control: Overcoming Control-Flow Integrity
Enes Göktaş, Elias Athanasopoulos, Herbert Bos, and Georgios Portokalidis. In Proceedings of the 35th IEEE Symposium on Security and Privacy (Oakland). San Jose, CA, US, May 2014.
🤙  Enes won the DCSR best paper award!
Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware
Thanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Michalis Polychronakis, and Sotiris Ioannidis. In Proceedings of the 7th ACM European Workshop on System Security (EUROSEC). Amsterdam, The Netherlands, April 2014.
The man who was there: Fortifying the Economy of Location-Based Services
Iasonas Polakis, Stamatis Volanis, Elias Athanasopoulos, and Evangelos P. Markatos. In Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC). New Orleans, LA, US, December 2013.
SAuth: Protecting User Accounts from Password Database Leaks
Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS). Berlin, Germany, November 2013.
Practical Information Flow for Legacy Web Applications
Georgios Chinis, Polyvios Pratikakis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the International Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems (ICOOOLPS), co-located with ECOOP. Montpellier, France, July 2013.
kGuard: Lightweight Kernel Protection
Vasileios P. Kemerlis, Georgios Portokalidis, Elias Athanasopoulos, and Angelos D. Keromytis. In Proceedings of the USENIX ;login: Magazine, vol. 37, no. 6, pp. 7 - 14. December 2012.
Digging up Social Structures from Documents on the Web
Eleni Gessiou, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos, and Sotiris Ioannidis. In Proceedings of the IEEE Global Communications Conference (GLOBECOM). Anaheim, California, USA, December 2012.
Exploiting Split Browsers for Efficiently Protecting User Data
Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis. In Proceedings of the ACM Cloud Computing Security Workshop (CCSW). Raleigh, NC, USA, October 2012.
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches
Elias Athanasopoulos, Vasileios P. Kemerlis, Michalis Polychronakis, and Evangelos P. Markatos. In Proceedings of the 10th International Conference on Applied Cryptography and Network Security (ACNS). Singapore, June 2012.
Towards a Universal Data Provenance Framework using Dynamic Instrumentation
Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, and Sotiris Ioannidis. In Proceedings of the 27th IFIP International Information Security and Privacy Conference (IFIP SEC). Heraklion, Crete, Greece, June 2012.
CensMon: A Web Censorship Monitor
Andreas Sfakianakis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 1st USENIX Workshop on Free and Open Communications on the Internet (FOCI), co-located with USENIX Security. San Francisco, CA, US, August 2011.
we.b: The Web of Short URLs
Demetris Antoniades, Iasonas Polakis, Giorgos Kontaxis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos, and Thomas Karagiannis. In Proceedings of the 20th International World Wide Web Conference (WWW). Hyderabad, India, March 2011.
Understanding The Behavior of Malicious Applications in Social Networks
Andreas Makridakis, Elias Athanasopoulos, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannids, and Evangelos P. Markatos. In Proceedings of the IEEE Network. September-October 2010.
An Architecture For Enforcing JavaScript Randomization in Web2.0 Applications (short paper)
Elias Athanasopoulos, Antonis Krithinakis, and Evangelos P. Markatos. In Proceedings of the 13th Information Security Conference (ISC). Boca Raton, Florida, October 2010.
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, and Evangelos P. Markatos. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS). Athens, Greece, September 2010.
xJS: Practical XSS Prevention for Web Application Development
Elias Athanasopoulos, Vasilis Pappas, Antonis Krithinakis, Spyros Ligouras, Evangelos P. Markatos, and Thomas Karagiannis. In Proceedings of the 1st USENIX Conference on Web Application Development (WebApps). Boston, Massachusetts, June 2010.
Isolating JavaScript in Dynamic Code Environments
Antonis Krithinakis, Elias Athanasopoulos, and Evangelos P. Markatos. In Proceedings of the 1st Workshop on Analysis and Programming Languages for Web Applications and Cloud Applications (APLWACA), co-located with PLDI. Toronto, Canada, June 2010.
Hunting Cross-Site Scripting Attacks in the Network
Elias Athanasopoulos, Antonis Krithinakis, and Evangelos P. Markatos. In Proceedings of the 4th Workshop on Web 2.0 Security & Privacy (W2SP). Oakland, California, May 2010.
Code-Injection Attacks in Browsers Supporting Policies
Elias Athanasopoulos, Vasilis Pappas, and Evangelos P. Markatos. In Proceedings of the 3rd Workshop on Web 2.0 Security & Privacy (W2SP). Oakland, California, May 2009.
WISDOM: Security-Aware Fibres
Elias Athanasopoulos, Antonis Krithinakis, Georgios Kopidakis, Graeme Maxwell, Alistair Poustie, Bob Manning, Rod Webb, Martin Koyabe, Carla Di Cairano-Gilfedder. In Proceedings of the 2nd ACM European Workshop on System Security (EUROSEC). Nuremberg, Germany, March 2009.
WSIM: A software platform to simulate all-optical security operations
Antonis Krithinakis, Lubomir Stroetmann, Elias Athanasopoulos, Georgios Kopidakis, Evangelos P. Markatos. In Proceedings of the 2nd European Conference on Computer Network Defense (EC2ND). Dublin, Ireland, December 2008.
Topnet: A Network-aware top(1)
Antonis Theocharides, Demetres Antoniades, Michalis Polychronakis, Elias Athanasopoulos, and Evangelos P. Markatos. In Proceedings of the 22nd USENIX Large Installation Systems Administration (LISA) Conference. San Diego, California, November 2008.
Antisocial Networks: Turning a Social Network into a Botnet
Elias Athanasopoulos, Andreas Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, and Evangelos P. Markatos. In Proceedings of the 11th Information Security Conference (ISC). Taipei, Taiwan, September 2008.
🤙  We got Slashdotted! Check also the Wired, ZDNet, TheRegister, NewScientist and TechCrunch stories.
Compromising Anonymity Using Packet Spinning
Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, and Evangelos P. Markatos. In Proceedings of the 11th Information Security Conference (ISC). Taipei, Taiwan, September 2008.
GAS: Overloading a File Sharing Network as an Anonymizing System
Elias Athanasopoulos, Mema Roussopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos. In Proceedings of the 2nd International Workshop on Security (IWSEC). Nara, Japan, October 2007.
Alice, what did you do last time? Fighting Phishing Using Past Activity Tests
Nikos Nikiforakis, Andreas Makridakis, Elias Athanasopoulos, and Evangelos P. Markatos. In Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND). Heraklion, Greece, October 2007.
Enhanced CAPTCHAs: Using Animation To Tell Humans And Computers Apart
Elias Athanasopoulos and Spiros Antonatos . In Proceedings of the 10th IFIP Open Conference on Communications and Multimedia Security. Heraklion, Crete, October 2006.
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network that Never Forgets
Elias Athanasopoulos, Kostas G. Anagnostakis and Evangelos P. Markatos. In Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS). Singapore, June 2006.
🤙 Check out the Netcraft article.
A Feedback-based Approach to Reduce Duplicate Messages in Unstructured Peer-to-Peer Networks
Charis Papadakis, Paraskevi Fragopoulou, Elias Athanasopoulos, Marios Dikaiakos, Alexandros Labrinidis, Evangelos Markatos. In Proceedings of the CoreGRID Integration Workshop. Pisa, Italy, November 2005.