Conference Publications

  1. transAD: An Anomaly Detection Network Intrusion Sensor for the Web
    Sharath Hiremagalore, Daniel Barbar ?a, Dan Fleck, Walter Powell, and Angelos Stavrou.
    In the Proceedings of International Security Conference (ISC 2014), Leipzig, Germany, June 2014.

  2. Catch Me if You Can: A Cloud-Enabled DDoS Defense
    Quan Jia, Huangxin Wang, Dan Fleck, Fei Li, Angelos Stavrou, Walter A. Powell.
    In the Proceedings of the 44th Annual IEEE/IFIP International Conference on
    Dependable Systems and Networks (IEEE DSN 2014), Atlanta, Georgia USA,
    June 23 - 26, 2014.

  3. Detecting Malicious Javascript in PDF through Document Instrumentation
    Daiping Liu, Haining Wang, and Angelos Stavrou.
    In the Proceedings of the 44th Annual IEEE/IFIP International Conference on
    Dependable Systems and Networks (IEEE DSN 2014), Atlanta, Georgia USA,
    June 23 - 26, 2014.

  4. PyTrigger: A System to Trigger & Extract User-Activated Malware Behavior
    Dan Fleck, Arnur Tokhtabayev, Alex Alarif, Angelos Stavrou, and Tomas Nykodym.
    In the proceedings of the 8th ARES Conference (ARES 2013),
    University of Regensburg, Germany September 2nd - 6th, 2013.

  5. MOTAG: Moving Target Defense Against Internet Denial of Service Attacks
    Quan Jia, Kun Sun, Angelos Stavrou.
    In the proceedings of the International Conference on Computer Communications
    and Networks ICCCN 2013 
    Nassau, Bahamas July 30 - August 2, 2013.

  6. Behavioral Analysis of Android Applications Using Automated Instrumentation
    Mohammad Karami, Mohamed Elsabagh, Parnian Najafiborazjani, and Angelos Stavrou.
    In the Proceedings of the 7th International Conference on Software Security and Reliability
    (IEEE SERE 2013)
    , 18-20 June 2013, Washington DC, USA.

  7. Forced-Path Execution for Android Applications on x86 Platforms
    Ryan Johnson, and Angelos Stavrou.
    In the Proceedings of the 7th International Conference on Software Security and Reliability
    (IEEE SERE 2013),
     18-20 June 2013, Washington DC, USA.

  8. Spectre: A Dependable Introspection Framework via System Management Mode
    Fengwei Zhang, Kevin Leach, Kun Sun, and Angelos Stavrou.
    In the Proceedings of the 43nd Annual IEEE/IFIP International Conference on
    Dependable Systems and Networks (IEEE DSN 2013), Budapest, 24 - 27 June 2013.

  9. Exposing Software Security and Availability Risks For Commercial Mobile Devices (CMDs)
    Ryan Johnson, Zhaohui Wang, Angelos Stavrou, and Jeff Voas.
    In the Proceedings of the IEEE RAMS 2013, Orlando, Florida, 28 - 31 January 2013.

  10. Malicious PDF Detection Using Metadata and Structural Features
    Charles Smutz and Angelos Stavrou.
    In the Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC), Orlando,
    Florida, USA, December 3–7, 2012.

  11. Malware Characterization using Behavioral Components
    Chaitanya Yavvari, Arnur Tokhtabayev, Huzefa Rangwala, and Angelos Stavrou.
    In the Proceedings of 6th International Conference "Mathematical Methods, Models, and Architectures for
    Computer Network Security
    ", St. Petersburg, Russia, October 17-20, 2012.

  12. Exposing Security Risks for Commercial Mobile Devices(Invited)
    Zhaohui Wang, Ryan Johnson, Rahul Murmuria, and Angelos Stavrou.
    In the Proceedings of 6th International Conference "Mathematical Methods, Models, and Architectures for
    Computer Network Security
    ", St. Petersburg, Russia, October 17-20, 2012.

  13. Mobile Application and Device Power Usage Measurements 
    Rahul Murmuria, Jeffrey Medsger, Angelos Stavrou.
    In the Proceedings of the 6th International Conference on Software
    Security and Reliability (SERE 2012), Washington, DC, June 2012.

  14. Netgator: Malware Detection Using Program Interactive Challenges
    Brian Schulte, Haris Andrianakis, Kun Sun, Angelos Stavrou.
    In the Proceedings of the 9th Conference on Detection of Intrusions and Malware
    & Vulnerability Assessment (DIMVA 2012), Heraklion, Crete, Greece, July 26-27th, 2012.

  15. A Dependability Analysis of Hardware-Assisted Polling Integrity Checking Systems
    Jiang Wang, Kun Sun, and Angelos Stavrou.
    In the Proceedings of the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and
    Networks (DSN 2012), Boston, Massachusetts, June, 2012.

  16. Implementing & Optimizing an Encryption File System on Android
    Zhaohui Wang, Rahul Murmuria, and Angelos Stavrou.
    In the Proceedings of the IEEE International Conference on Mobile Data Management
    (IEEE MDM 2012)
    , July 23 - 26, 2012, Bangalore, India. (Acceptance Rate: 22/88)

  17. Analysis Android Applications' Permissions (short paper)
    Ryan Johnson, Zhaohui Wang, Corey Gagnon and Angelos Stavrou.
    In the Proceedings of the 6th International Conference on Software Security and Reliability (SERE 2012),
    Washington, DC, June 2012.

  18. Mutual Authentication for USB Communications (short paper)
    Zhaohui Wang, Ryan Johnson and Angelos Stavrou.
    In the Proceedings of the 6th International Conference on Software Security and Reliability (SERE 2012),
    Washington, DC, June 2012.

  19. A Framework for Automated Security Testing of Android Applications on the Cloud (short paper)
    Sam Malek, Naeem Esfahani, Thabet Kacem, Riyadh Mahmood, Nariman Mirzaei, and Angelos Stavrou.
    In the Proceedings of the 6th International Conference on Software Security and Reliability (SERE 2012),
    Washington, DC, June 2012.

  20. SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes
    Kun Sun, Jiang Wang, Fengwei Zhang and Angelos Stavrou.
    In the Proceedings of the 19th Annual Network & Distributed System Security Symposium NDSS 2012,
    San Diego, California, 5-8 February 2012. Impact Factor: 2.60 (Acceptance Rate: 46/258 – 17.8%).  [Presentation]

  21. Hardware-Assisted Application Integrity Monitor
    Jiang Wang, Kun Sun, Angelos Stavrou.
    In the Proceedings of IEEE Hawaii International Conference on System Sciences (HICSS45) pp. 5375-5383,
    45th Hawaii International Conference on System Sciences, 2012 January 4-7, 2012, Grand Wailea, Maui, USA.
    Impact Factor: N/A, (Acceptance Rate: N/A).

  22. Cross-domain Collaborative Anomaly Detection: So Far Yet So Close
    Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, Salvatore J. Stolfo.
    In the Proceedings of the 14th International Symposium on Recent
    Advances in Intrusion Detection (RAID). September 2011, Menlo Park, CA.
    Impact Factor: 2.20 (Acceptance rate: 20/87 - 23%).

  23. Trading Elephants For Ants: Efficient Post-Attack Reconstitution (Short paper)
    Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou, Anup Ghosh and Sushil Jajodia
    In the Proceedings of the 7th International ICST Conference on Security and Privacy
    in Communication Networks (Securecomm 2011), p. 1-10, September 7-9 2011, London.
    Impact Factor: N/A, (Acceptance rate: 24%).     

  24. Predicting Network Response Times Using Social Information (short paper)
    Chen Liang, Sharath Hiremagalore, Angelos Stavrou and Huzefa Rangwala.
    In the Proceedings of the ACM 2011 Conference on Advances in Social Networks Analysis and Mining,
    p. 527-531, July, 2011, Kaohsiung, Taiwan. Impact Factor: N/A, (Acceptance rate: 25%) [bib]

  25. Breaching and Protecting an Anonymizing Network System
    Jason Clark and Angelos Stavrou.
    In the Proceedings of the 6th Annual Symposium on Information Assurance (ASIA ‘11).
    Impact Factor: N/A, (Acceptance rate: 50%).

  26. Advantages and disadvantages of remote asynchronous usability testing using amazon mechanical turk
    Erik Nelson and Angelos Stavrou.
    Proceedings of the Human Factors and Ergonomics Society 55th Annual Meeting, pages 1080-1084, HFES
    2011 Conference, Red Rock Resort, Las Vegas, Nevada, September 19-23, 2011.
    Impact Factor: N/A, (Acceptance rate: N/A).

  27. Exploiting Smart-Phone USB Connectivity For Fun And Profit (Extended Version)
    Angelos Stavrou and Zhaohui Wang.
    BlackHat Technical Conference DC 2011 - Technical Briefings Session.

  28. Exploiting Smart-Phone USB Connectivity For Fun And Profit
    Zhaohui Wang and Angelos Stavrou.
    In the Proceedings of the 26th Annual Computer Security Applications Conference (ACM ACSAC) 
    p. 357-366. December 6–10, 2010, Austin, Texas, USA. Impact Factor: 1.82 (Acceptance rate: 39/227) [bib]

  29. Experimental Results of Cross-Site Exchange of Web Content Anomaly Detector Alerts
    Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, and Salvatore J. Stolfo.
    In the Proceedings of IEEE Conference on Homeland Security Technologies (IEEE HST 2010),
    November 8-10, 2010, Waltham, MA, USA. Impact Factor: N/A (Acceptance rate: N/A).

  30. An Adversarial Evaluation of Network Signaling and Control Mechanisms
    Kangkook Jee, Stelios Sidiroglou-Douskos, Angelos Stavrou, and Angelos D. Keromytis.
    In the Proceedings of the 13th International Conference on Information Security and Cryptology (ICISC).
    December 2010, Seoul, Korea. Impact Factor: N/A (Acceptance rate: N/A).

  31. Small World VoIP
    Xiaohui Yang, Angelos Stavrou, Ram Dantu, and Duminda Wijesekera.
    In the Proceedings of the Second International Conference on Mobile Computing, Applications,
    and Services MobiCASE, October 25-28, 2010, Santa Clara, CA, USA.
    Impact Factor: N/A (Acceptance rate: N/A).

  32. QoP and QoS policy cognizant policy composition
    Paul Seymer, Angelos Stavrou, Duminda Wijesekera, Sushil Jajodia.
    In the Proceedings of the IEEE International Symposium on Policies for Distributed Systems 
    and Networks, p. 77-86, Fairfax, VA, July 21-23, 2010. (Acceptance rate: 19.2%) [bib]

  33. Providing Mobile Users' Anonymity in Hybrid Networks
    Claudio Ardagna, Sushil Jajodia, Pierangela Samarati, and Angelos Stavrou (Alphabetic)
    In the Proceedings of the 15th European Symposium on Research in Computer Security
    (ESORICS 2010), p. 540-557, September 2010, Athens, Greece. 
    Impact Factor: 1.45 (Acceptance rate: 42/210 – 20%). [bib]

  34. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation 
    Sambuddho Chakravarty, Angelos Stavrou, and Angelos D. Keromytis.
    In the Proceedings of the 15th European Symposium on Research in Computer Security
    (ESORICS 2010) p. 249-267, September 2010, Athens, Greece.
    Impact Factor: 1.45 (Acceptance rate: 42/210 – 20%). [bib]

  35. HyperCheck: A Hardware-Assisted Integrity Monitor
    Jiang Wang, Angelos Stavrou, and Anup K. Ghosh.
    In the Proceedings of 13th International Symposium on Recent Advances in Intrusion Detection
    (RAID 2010)
    , p. 158-177, Ottawa, Canada, September 15-17, 2010.
    Impact Factor: 2.20 (Acceptance rate: 24/104 – 23.1%). [bib]

  36. A Virtualization Architecture for In-Depth Kernel Isolation
    Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anup K. Ghosh.
    In the Proceedings of 43rd Hawaii International International Conference on Systems Science,
    IEEE Computer Society, p. 1-10, 5-8 January 2010, Koloa, Kauai, HI, USA.
    Impact Factor: N/A (Acceptance rate: N/A).