Stelios Sidiroglou-Douskos
Stelios Sidiroglou-Douskos
Verified email at - Homepage
Cited by
Cited by
Managing performance vs. accuracy trade-offs with loop perforation
S Sidiroglou-Douskos, S Misailovic, H Hoffmann, M Rinard
Proceedings of the 19th ACM SIGSOFT symposium and the 13th European …, 2011
Automatically patching errors in deployed software
JH Perkins, S Kim, S Larsen, S Amarasinghe, J Bachrach, M Carbin, ...
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
Methods, systems, and media for detecting covert malware
BM Bowen, PV Prabhu, VP Kemerlis, S Sidiroglou, SJ Stolfo, ...
US Patent 8,528,091, 2013
Dynamic knobs for responsive power-aware computing
H Hoffmann, S Sidiroglou, M Carbin, S Misailovic, A Agarwal, M Rinard
Proceedings of the sixteenth international conference on Architectural …, 2011
Systems and methods for detecting and inhibiting attacks using honeypots
S Sidiroglou, AD Keromytis, KG Anagnostakis
US Patent 7,904,959, 2011
Detecting targeted attacks using shadow honeypots
KG Anagnostakis, S Sidiroglou, P Akritidis, K Xinidis, E Markatos, ...
Control jujutsu: On the weaknesses of fine-grained control flow integrity
I Evans, F Long, U Otgonbaatar, H Shrobe, M Rinard, H Okhravi, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Quality of service profiling
S Misailovic, S Sidiroglou, H Hoffmann, M Rinard
Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010
Building a reactive immune system for software services
S Sidiroglou, ME Locasto, SW Boyd, AD Keromytis
Assure: automatic software self-healing using rescue points
S Sidiroglou, O Laadan, C Perez, N Viennot, J Nieh, AD Keromytis
ACM SIGARCH Computer Architecture News 37 (1), 37-48, 2009
Missing the point (er): On the effectiveness of code pointer integrity
I Evans, S Fingeret, J Gonzalez, U Otgonbaatar, T Tang, H Shrobe, ...
2015 IEEE Symposium on Security and Privacy, 781-796, 2015
Using code perforation to improve performance, reduce energy consumption, and respond to failures
H Hoffmann, S Misailovic, S Sidiroglou, A Agarwal, M Rinard
Countering network worms through automatic patch generation
S Sidiroglou, AD Keromytis
IEEE Security & Privacy 3 (6), 41-49, 2005
Automatic error elimination by horizontal code transfer across multiple applications
S Sidiroglou-Douskos, E Lahtinen, F Long, M Rinard
Proceedings of the 36th ACM SIGPLAN Conference on Programming Language …, 2015
Systems, methods, and media protecting a digital data processing device from attack
S Sidiroglou, AD Keromytis, SJ Stolfo
US Patent 8,407,785, 2013
Ubiquitous computing in home networks
H Schulzrinne, X Wu, S Sidiroglou, S Berger
IEEE Communications Magazine 41 (11), 128-135, 2003
Methods and systems for repairing applications
AD Keromytis, M Locasto, S Sidiroglou
US Patent 7,490,268, 2009
A network worm vaccine architecture
S Sidiroglou, AD Keromytis
WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling …, 2003
Automatic runtime error repair and containment via recovery shepherding
F Long, S Sidiroglou-Douskos, M Rinard
ACM SIGPLAN Notices 49 (6), 227-238, 2014
Methods, media and systems for detecting anomalous program executions
SJ Stolfo, AD Keromytis, S Sidiroglou
US Patent 8,074,115, 2011
The system can't perform the operation now. Try again later.
Articles 1–20