Match!
Angelos Stavrou
George Mason University
200Publications
31H-index
3,543Citations
Publications 180
Newest
Dec 1, 2018 in DSC (IEEE Conference Dependable and Secure Computing)
#1Mohamed ElsabaghH-Index: 5
#2Ryan Johnson (GMU: George Mason University)H-Index: 5
Last.Angelos Stavrou (GMU: George Mason University)H-Index: 31
view all 3 authors...
Android markets have grown both in size and diversity, offering apps that are localized or curated for specific use cases. It is not uncommon for users to be unaware of the exact app version or name they should be installing. This has given rise to the threat of app cloning where adversaries copy the package of an app, minimally modify its code, and redistribute the clone on the market to gain a monetary advantage or to distribute malicious payloads. Existing clone detection methods use static s...
Source
Dec 1, 2018 in DSC (IEEE Conference Dependable and Secure Computing)
#1Daniel Fleck (GMU: George Mason University)H-Index: 7
#2Angelos Stavrou (GMU: George Mason University)H-Index: 31
Last.Takis Konstantopoulos (University of Liverpool)H-Index: 10
view all 6 authors...
We consider a cloud based multiserver system consisting of a set of replica application servers behind a set of proxy (indirection) servers which interact directly with clients over the Internet. We study a proactive moving-target defense to thwart a DDoS attacker's reconnaissance phase and consequently reduce the attack's impact. The defense is effectively a moving-target (motag) technique in which the proxies dynamically change. The system is evaluated using an AWS prototype of HTTP redirectio...
1 CitationsSource
#1George Kesidis (PSU: Pennsylvania State University)H-Index: 28
#2Yuquan Shan (PSU: Pennsylvania State University)H-Index: 2
Last.Takis Konstantopoulos (University of Liverpool)H-Index: 10
view all 5 authors...
We consider a moving-target defense of a proxied multiserver tenant of the cloud where the proxies dynamically change to defeat reconnaissance activity by a botnet planning a DDoS attack targeting the tenant. Unlike the system of [4] where all proxies change simultaneously at a fixed rate, we consider a more “responsive” system where the proxies may change more rapidly and selectively based on the current session request intensity, which is expected to be abnormally large during active reconnais...
Source
#1Haitao Xu (ASU: Arizona State University)H-Index: 3
#2Zhao Li (Alibaba Group)H-Index: 3
Last.Angelos Stavrou (GMU: George Mason University)H-Index: 31
view all 8 authors...
A certain amount of web traffic is attributed to web bots on the Internet. Web bot traffic has raised serious concerns among website operators, because they usually consume considerable resources at web servers, resulting in high workloads and longer response time, while not bringing in any profit. Even worse, the content of the pages it crawled might later be used for other fraudulent activities. Thus, it is important to detect web bot traffic and characterize it. In this paper, we first propos...
2 CitationsSource
#1Jeffrey Voas (NIST: National Institute of Standards and Technology)H-Index: 12
#2Rick Kuhn (NIST: National Institute of Standards and Technology)H-Index: 16
Last.Georgios Kambourakis (University of the Aegean)H-Index: 24
view all 5 authors...
Will our smart devices betray us? Can we trust our smart beds, pet feeders, and watches to maintain the level of privacy we want and expect? As the numbers of devices coming online reach staggering levels, serious questions must be raised about the level of cybertrust we can reasonably expect to have in our modern lifestyle.
1 CitationsSource
May 29, 2018 in CCS (Computer and Communications Security)
#1Ryan Johnson (GMU: George Mason University)H-Index: 5
#2Mohamed ElsabaghH-Index: 5
Last.Jeff Offutt (GMU: George Mason University)H-Index: 38
view all 4 authors...
Android devices are an integral part of modern life from phone to media boxes to smart home appliances and cameras. With 38.9% of market share, Android is now the most used operating system not just in terms of mobile devices but considering all OSes. As applications' complexity and features increased, Android relied more heavily on code and data sharing among apps for faster response times and richer user experience. To achieve that, Android apps reuse functionality and data by means of inter-a...
Source
#1Fengwei Zhang (WSU: Wayne State University)H-Index: 11
#2Kevin Leach (UVA: University of Virginia)H-Index: 8
Last.Haining Wang (UD: University of Delaware)H-Index: 34
view all 4 authors...
Traditional malware analysis relies on virtualization or emulation technology to run samples in a confined environment, and to analyze malicious activities by instrumenting code execution. However, virtual machines and emulators inevitably create artifacts in the execution environment, making these approaches vulnerable to detection or subversion. In this paper, we present MalT , a debugging framework that employs System Management Mode, a CPU mode in the x86 architecture, to transparently study...
2 CitationsSource
#1Shuai Hao (UD: University of Delaware)H-Index: 3
#2Yubao Zhang (UD: University of Delaware)H-Index: 2
Last.Angelos Stavrou (GMU: George Mason University)H-Index: 31
view all 4 authors...
2 Citations
#1Neda NasirianiH-Index: 8
#2Yuquan ShanH-Index: 2
Last.Angelos StavrouH-Index: 31
view all 6 authors...
We consider a cloud based multiserver system consisting of a set of replica application servers behind a set of proxy (indirection) servers which interact directly with clients over the Internet. We study a proactive moving-target defense to thwart a DDoS attacker's reconnaissance phase and consequently reduce the attack's impact. The defense is effectively a moving-target (motag) technique in which the proxies dynamically change. The system is evaluated using an AWS prototype of HTTP redirectio...
Nov 3, 2017 in CCS (Computer and Communications Security)
#1Bhavani Thuraisingharn (UTD: University of Texas at Dallas)H-Index: 40
#2Ghassan O. KarameH-Index: 21
Last.Angelos Stavrou (GMU: George Mason University)H-Index: 31
view all 3 authors...
It is our great pleasure to welcome you to the 8th ACM Cloud Computing Security Workshop (CCSW). Since its inception, CCSW has been a forum for bringing together researchers and practitioners to discuss technological advances bearing on the security of compute clouds, their tenants, and the larger Internet community. This year's workshop continues in this tradition. Submissions were evaluated by a program committee of 30 experts in the field, resulting in the selection of 3 full papers and 4 sho...
12345678910