HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations S Sivakorn, G Argyros, K Pei, AD Keromytis, S Jana Proceedings of the 38th IEEE Symposium on Security & Privacy (San Jose, CA, 2017 | 102 | 2017 |
Where's Wally?: Precise User Discovery Attacks in Location Proximity Services I Polakis, G Argyros, T Petsios, S Sivakorn, AD Keromytis Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 89 | 2015 |
SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning G Argyros, I Stais, S Jana, AD Keromytis, A Kiayias Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 62 | 2016 |
The Learnability of Symbolic Automata G Argyros, L D’Antoni International Conference on Computer Aided Verification, 427-445, 2018 | 48 | 2018 |
Back in black: towards formal, black box analysis of sanitizers and filters G Argyros, I Stais, A Kiayias, AD Keromytis 2016 IEEE Symposium on Security and Privacy (SP), 91-109, 2016 | 48 | 2016 |
I forgot your password: Randomness attacks against PHP applications G Argyros, A Kiayias Presented as part of the 21st USENIX Security Symposium (USENIX Security 12 …, 2012 | 25 | 2012 |
Evaluating the Privacy Guarantees of Location Proximity Services G Argyros, T Petsios, S Sivakorn, AD Keromytis, J Polakis ACM Transactions on Privacy and Security (TOPS) 19 (4), 12, 2017 | 14 | 2017 |
PRNG: Pwning Random Number Generators G Argyros, A Kiayias BlackHat 2012, 2012 | 4 | 2012 |
Blueprints for a Large-Scale Early Warning System PG Spirakis, V Vlachos, V Karakoidas, D Liappis, D Kalaitzis, E Valeontis, ... 2010 14th Panhellenic Conference on Informatics, 7-11, 2010 | 3 | 2010 |
Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks⋆ S Chaliasos, G Metaxopoulos, G Argyros, D Mitropoulos | 3* | |