| Topic |
Date
|
Paper |
Presenters |
| Code Injection |
29/9 |
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks |
Giannis Makrydakis ppt |
|
On the Effectiveness of Address-Space Randomization |
Vasilis Lekakis ppt |
| Race Conditions |
1/10 |
TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study |
Ilias Tsompanidis pdf |
|
Portably Solving File TOCTTOU Races with Hardness Amplification |
Vasilis Lekakis pdf |
| Botnet Detection |
6/10 |
Wide Scale Botnet Detection and Characterization |
Constantinos Koukos pdf |
|
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation |
Lazaros Koromilas pdf |
| Botnet Detection |
8/10 |
A Multifaceted Approach to Understanding the Botnet Phenomenon |
Giannis Makrydakis ppt |
|
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection |
Petros Politopoulos ppt |
| Malware |
13/10 |
Panaroma: Capturing System-wide Information Flow for Malware Detection and Analysis |
Vasilis Lekakis pdf |
|
TightLip: Keeping Applications from Spilling the Beans |
Antonis Krithinakis pptx |
| Malware |
15/10 |
Exploring Multiple Execution Paths for Malware Analysis |
Artemis Papakostantinou pptx |
|
BitScope: Automatically Dissecting Malicious Binaries |
Ourania Smyrnaki ppt |
| Malware |
20/10 |
A Look In the Mirror: Attacks on Package Managers |
Fontas Fafoutis MISSING |
|
BootJacker: Compromising Computers using Forced Restarts |
Petros Politopoulos ppt |
| Code Injection |
22/10 |
Code Injection Attacks on Harvard-Architecture Devices |
Giwrgos Chinis ppt |
|
When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC |
Lazaros Koromilas pdf |
| WiFi |
27/10 |
Security Analysis and Improvements for IEEE802.11i |
Antonis Papadogiannakis ppt |
|
Proximity breeds Danger: Emerging Threats in Metro-area Wireless Networks |
Constantinos Koukos ppt |
| Traceback |
29/10 |
Network Support for IP Traceback |
Giannis Makrydakis ppt |
|
Cancelled |
|
| Traceback & DDoS |
3/11 |
Advanced and Authenticated Marking Schemes for IP Traceback |
Ourania Smyrnaki ppt |
|
SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks |
V. Flouris pdf |
| Traceback |
5/11 |
ClearShot: Eavesdropping Keyboard Input from Video |
Artemhs Papakwstantinou pptx |
|
Compromising Reflections -or- How to Read LCD Monitors Around the Corner |
Constantinos Koukos pdf |
| Web Hacks |
10/11 |
All Your iFRAMEs Point to Us |
Antonis Papadogiannakis ppt |
|
Securing Frame Communication in Browsers |
Ilias Tsompanidis pdf |
| Botnets And M. Payloads |
12/11 |
Measurement and Classification of Humans and Bots in Internet Chat |
Antonis Krithinakis ppt |
|
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads |
V. Flouris pdf |
| CloudAV and CSRF |
19/11 |
CloudAV: N-Version Antivirus in the Network Cloud |
Lazaros Koromilas pdf |
|
Robust Defenses for Cross-Site Request Forgery |
Giwrgos Chinis ppt |
| Web Security |
24/11 |
SOMA: Mutual Approval for Included Content in Web Pages |
V. Flouris pdf |
|
OMash: Enabling Secure Web Mashups via Object Abstractions |
Constantinos Koukos pdf |
| Botnets And Spam |
26/11 |
Characterizing Botnets from Email Spam Records |
Artemis Papakwstantinou pptx |
|
Peeking into Spammer Behavior from a Unique Vantage Point |
Ourania Smyrnaki ppt |
| Worms and Spam |
1/12 |
Catching Instant Messaging Worms with Change-Point Detection Techniques |
Antwnis Papadogiannakis ppt |
|
Exploiting Machine Learning to Subvert Your Spam Filter |
Petros Politopoulos ppt |
| Worms and Botnets |
3/12 |
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm |
Antonis Krithinakis pptx |
|
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff |
Vasilhs Flouris pdf |
| Rootkits |
8/12 |
Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing |
Giannis Makrydakis pdf |
|
Countering Persistent Kernel Rootkits Through Systematic Hook Discovery |
Ilias Tsompanidis pdf |
| SPAM |
11/12 |
Spamscatter: Characterizing Internet Scam Hosting Infrastructure |
Artemis Papakwstantinou pptx |
|
On the Spam Campaign Trail |
Kostas Koukos pdf |