Follow
George Argyros
George Argyros
PhD, Columbia University
No verified email - Homepage
Title
Cited by
Cited by
Year
HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations
S Sivakorn, G Argyros, K Pei, AD Keromytis, S Jana
Proceedings of the 38th IEEE Symposium on Security & Privacy (San Jose, CA, 2017
1022017
Where's Wally?: Precise User Discovery Attacks in Location Proximity Services
I Polakis, G Argyros, T Petsios, S Sivakorn, AD Keromytis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
892015
SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning
G Argyros, I Stais, S Jana, AD Keromytis, A Kiayias
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
622016
The Learnability of Symbolic Automata
G Argyros, L D’Antoni
International Conference on Computer Aided Verification, 427-445, 2018
482018
Back in black: towards formal, black box analysis of sanitizers and filters
G Argyros, I Stais, A Kiayias, AD Keromytis
2016 IEEE Symposium on Security and Privacy (SP), 91-109, 2016
482016
I forgot your password: Randomness attacks against PHP applications
G Argyros, A Kiayias
Presented as part of the 21st USENIX Security Symposium (USENIX Security 12 …, 2012
252012
Evaluating the Privacy Guarantees of Location Proximity Services
G Argyros, T Petsios, S Sivakorn, AD Keromytis, J Polakis
ACM Transactions on Privacy and Security (TOPS) 19 (4), 12, 2017
142017
PRNG: Pwning Random Number Generators
G Argyros, A Kiayias
BlackHat 2012, 2012
42012
Blueprints for a Large-Scale Early Warning System
PG Spirakis, V Vlachos, V Karakoidas, D Liappis, D Kalaitzis, E Valeontis, ...
2010 14th Panhellenic Conference on Informatics, 7-11, 2010
32010
Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks⋆
S Chaliasos, G Metaxopoulos, G Argyros, D Mitropoulos
3*
The system can't perform the operation now. Try again later.
Articles 1–10