Topic |
Date
|
Paper |
Presenters |
Code Injection |
29/9 |
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks |
Giannis Makrydakis ppt |
On the Effectiveness of Address-Space Randomization |
Vasilis Lekakis ppt |
Race Conditions |
1/10 |
TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study |
Ilias Tsompanidis pdf |
Portably Solving File TOCTTOU Races with Hardness Amplification |
Vasilis Lekakis pdf |
Botnet Detection |
6/10 |
Wide Scale Botnet Detection and Characterization |
Constantinos Koukos pdf |
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation |
Lazaros Koromilas pdf |
Botnet Detection |
8/10 |
A Multifaceted Approach to Understanding the Botnet Phenomenon |
Giannis Makrydakis ppt |
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection |
Petros Politopoulos ppt |
Malware |
13/10 |
Panaroma: Capturing System-wide Information Flow for Malware Detection and Analysis |
Vasilis Lekakis pdf |
TightLip: Keeping Applications from Spilling the Beans |
Antonis Krithinakis pptx |
Malware |
15/10 |
Exploring Multiple Execution Paths for Malware Analysis |
Artemis Papakostantinou pptx |
BitScope: Automatically Dissecting Malicious Binaries |
Ourania Smyrnaki ppt |
Malware |
20/10 |
A Look In the Mirror: Attacks on Package Managers |
Fontas Fafoutis MISSING |
BootJacker: Compromising Computers using Forced Restarts |
Petros Politopoulos ppt |
Code Injection |
22/10 |
Code Injection Attacks on Harvard-Architecture Devices |
Giwrgos Chinis ppt |
When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC |
Lazaros Koromilas pdf |
WiFi |
27/10 |
Security Analysis and Improvements for IEEE802.11i |
Antonis Papadogiannakis ppt |
Proximity breeds Danger: Emerging Threats in Metro-area Wireless Networks |
Constantinos Koukos ppt |
Traceback |
29/10 |
Network Support for IP Traceback |
Giannis Makrydakis ppt |
Cancelled |
|
Traceback & DDoS |
3/11 |
Advanced and Authenticated Marking Schemes for IP Traceback |
Ourania Smyrnaki ppt |
SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks |
V. Flouris pdf |
Traceback |
5/11 |
ClearShot: Eavesdropping Keyboard Input from Video |
Artemhs Papakwstantinou pptx |
Compromising Reflections -or- How to Read LCD Monitors Around the Corner |
Constantinos Koukos pdf |
Web Hacks |
10/11 |
All Your iFRAMEs Point to Us |
Antonis Papadogiannakis ppt |
Securing Frame Communication in Browsers |
Ilias Tsompanidis pdf |
Botnets And M. Payloads |
12/11 |
Measurement and Classification of Humans and Bots in Internet Chat |
Antonis Krithinakis ppt |
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads |
V. Flouris pdf |
CloudAV and CSRF |
19/11 |
CloudAV: N-Version Antivirus in the Network Cloud |
Lazaros Koromilas pdf |
Robust Defenses for Cross-Site Request Forgery |
Giwrgos Chinis ppt |
Web Security |
24/11 |
SOMA: Mutual Approval for Included Content in Web Pages |
V. Flouris pdf |
OMash: Enabling Secure Web Mashups via Object Abstractions |
Constantinos Koukos pdf |
Botnets And Spam |
26/11 |
Characterizing Botnets from Email Spam Records |
Artemis Papakwstantinou pptx |
Peeking into Spammer Behavior from a Unique Vantage Point |
Ourania Smyrnaki ppt |
Worms and Spam |
1/12 |
Catching Instant Messaging Worms with Change-Point Detection Techniques |
Antwnis Papadogiannakis ppt |
Exploiting Machine Learning to Subvert Your Spam Filter |
Petros Politopoulos ppt |
Worms and Botnets |
3/12 |
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm |
Antonis Krithinakis pptx |
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff |
Vasilhs Flouris pdf |
Rootkits |
8/12 |
Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing |
Giannis Makrydakis pdf |
Countering Persistent Kernel Rootkits Through Systematic Hook Discovery |
Ilias Tsompanidis pdf |
SPAM |
11/12 |
Spamscatter: Characterizing Internet Scam Hosting Infrastructure |
Artemis Papakwstantinou pptx |
On the Spam Campaign Trail |
Kostas Koukos pdf |