Elias Athanasopoulos
Assistant Professor

Department of Computer Science
University of Cyprus

1 University Avenue
1678 Nicosia, Cyprus
Contact | Google Scholar | CV


A Large-scale Analysis of Content Modification by Open HTTP Proxies
Georgios Tsirantonakis, Panagiotis Ilia, Sotiris Ioannidis, Elias Athanasopoulos, and Michalis Polychronakis
In Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2018).
San Diego, CA, US, February 2018.

PROV2R: Practical Provenance Analysis of Unstructured Processes
Manolis Stamatogiannakis, Elias Athanasopoulos, Herbert Bos, and Paul Groth
In Proceedings of the ACM Transactions on Internet Technology.
August 2017.

No Need to Hide: Protecting Safe Regions on Commodity Hardware
Koen Koning, Xi Chen, Herbert Bos, Cristiano Giuffrida, and Elias Athanasopoulos
In Proceedings of the European Conference on Computer Systems (EuroSys).
Belgrade, Serbia, April 2017.

MARX: Uncovering Class Hierarchies in C++ Programs
Andre Pawloski, Moritz Contag, Thorsten Holz, Victor van der Veen, Chris Ouwehand, Herbert Bos, Elias Athanasopoulos, and Cristiano Giuffrida
In Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017).
San Diego, CA, US, February 2017.

VTPin: Practical VTable Hijacking Protection for Binaries
Pawel Sarbinowski, Vasileios P. Kemerlis, Cristiano Giuffrida, and Elias Athanasopoulos
In Proceedings of the 32nd Annual Computer Security Applications Conference (ACSAC).
Los Angeles, CA, US, December 2016.

NaClDroid: Native Code Isolation for Android Applications
Elias Athanasopoulos, Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis
In Proceedings of the 21st European Symposium on Resaerch in Computer Security (ESORICS).
Heraklion, Crete, Greece, September 2016.

Provable Network Activity for Protecting Users against False Accusation
Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, and Evangelos P. Markatos
In Proceedings of the 10th WISTP Conference in Information Security Theory and Practice (WISTP).
Heraklion, Crete, Greece, September 2016.

GRIM: Leveraging GPUs for Kernel Integrity Monitoring
Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, and Sotiris Ioannidis
In Proceedings of the 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
France, Paris, September 2016.

Poking Holes in Information Hiding
Aggelos Oikonomopoulos, Elias Athanasopoulos, Herbert Bos, and Cristiano Giuffrida
In Proceedings of the 25th USENIX Security Symposium.
Austin, TX, US, August 2016.

Undermining Information Hiding (And What to do About it)
Enes Göktaş, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, and Herbert Bos
In Proceedings of the 25th USENIX Security Symposium.
Austin, TX, US, August 2016.

A Tough call: Mitigating Advanced Code-Reuse Attacks At The Binary Level
Victor van der Veen, Enes Göktaş, Moritz Contag, Andre Pawloski, Xi Chen, Sanjay Rawat, Herbert Bos, Thorsten Holz, Elias Athanasopoulos, and Cristiano Giuffrida
In Proceedings of the 37th Symposium on Security and Privacy (Oakland).
San Jose, CA, US, May 2016.

HCFI: Hardware-enforced Control-Flow Integrity
Nick Christoulakis, George Christou, Elias Athanasopoulos, and Sotiris Ioannidis
In Proceedings of the 6th ACM Conference on Data and Applications Security and Privacy (CODASPY).
New Orleans, LA, US, March 2016.
Outstanding Paper Award!

ShrinkWrap: VTable Protection without Loose Ends
Istvan Haller, Enes Göktaş, Elias Athanasopoulos, Georgios Portokalidis, and Herbert Bos
In Proceedings of the 31st Annual Computer Security Applications Conference (ACSAC).
Los Angeles, CA, US, December 2015.
Best Student Paper!

Face/Off: Preventing Privacy Leakage From Photos in Social Networks
Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, Sotiris Ioannidis
In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS).
Denver, CO, US, October 2015.

Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption
Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, and Sotiris Ioannidis
In Proceedings of the 8th European Workshop on System Security (EUROSEC 2015).
Bordeaux, France, April 2015.

The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines
Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, and Sotiris Ioannidis
In Proceedings of the 22nd Network and Distributed System Security Symposium (NDSS 2015).
San Diego, CA, US, February 2015.

PixelVault: Using GPUs for Securing Cryptographic Operations
Giorgos Vasiliadis, Elias Athanasopoulos, Michalis Polychronakis, and Sotiris Ioannidis
In Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS).
Scottsdale, Arizona, US, November 2014.

Flying Memcache: Lessons Learned from Different Acceleration Strategies
Dimitris Deyannis, Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, and Sotiris Ioannidis
In Proceedings of the International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD).
Paris, France, October 2014.

Size Does Matter - Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard
Enes Göktaş, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, and Georgios Portokalidis
In Proceedings of the 23rd USENIX Security Symposium.
San Diego, CA, US, August 2014.

AndRadar: Fast Discovery of Android Applications in Alternative Markets
Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, and Sotiris Ioannidis
In Proceedings of the 11th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
Egham, UK, July 2014.

Out Of Control: Overcoming Control-Flow Integrity
Enes Göktaş, Elias Athanasopoulos, Herbert Bos, and Georgios Portokalidis
In Proceedings of the 35th IEEE Symposium on Security and Privacy (Oakland).
San Jose, CA, US, May 2014.
Enes won the DCSR best paper award!

Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware
Thanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Michalis Polychronakis, and Sotiris Ioannidis
In Proceedings of the 7th ACM European Workshop on System Security (EUROSEC).
Amsterdam, The Netherlands, April 2014.

The man who was there: Fortifying the Economy of Location-Based Services
Iasonas Polakis, Stamatis Volanis, Elias Athanasopoulos, and Evangelos P. Markatos
In Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC).
New Orleans, LA, US, December 2013.

SAuth: Protecting User Accounts from Password Database Leaks
Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis
In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS).
Berlin, Germany, November 2013.

Practical Information Flow for Legacy Web Applications
Georgios Chinis, Polyvios Pratikakis, Elias Athanasopoulos, and Sotiris Ioannidis
In Proceedings of the International Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems (ICOOOLPS), co-located with ECOOP.
Montpellier, France, July 2013.

kGuard: Lightweight Kernel Protection
Vasileios P. Kemerlis, Georgios Portokalidis, Elias Athanasopoulos, and Angelos D. Keromytis
In Proceedings of the USENIX ;login: Magazine, vol. 37, no. 6, pp. 7 - 14.
December 2012.

Digging up Social Structures from Documents on the Web
Eleni Gessiou, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos, and Sotiris Ioannidis
In Proceedings of the IEEE Global Communications Conference (GLOBECOM).
Anaheim, California, USA, December 2012.

Exploiting Split Browsers for Efficiently Protecting User Data
Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis
In Proceedings of the ACM Cloud Computing Security Workshop (CCSW).
Raleigh, NC, USA, October 2012.

ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches
Elias Athanasopoulos, Vasileios P. Kemerlis, Michalis Polychronakis, and Evangelos P. Markatos
In Proceedings of the 10th International Conference on Applied Cryptography and Network Security (ACNS).
Singapore, June 2012.

Towards a Universal Data Provenance Framework using Dynamic Instrumentation
Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, and Sotiris Ioannidis
In Proceedings of the 27th IFIP International Information Security and Privacy Conference (IFIP SEC).
Heraklion, Crete, Greece, June 2012.

CensMon: A Web Censorship Monitor
Andreas Sfakianakis, Elias Athanasopoulos, and Sotiris Ioannidis
In Proceedings of the 1st USENIX Workshop on Free and Open Communications on the Internet (FOCI), co-located with USENIX Security.
San Francisco, CA, US, August 2011.

we.b: The Web of Short URLs
Demetris Antoniades, Iasonas Polakis, Giorgos Kontaxis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos, and Thomas Karagiannis
In Proceedings of the 20th International World Wide Web Conference (WWW).
Hyderabad, India, March 2011.

Understanding The Behavior of Malicious Applications in Social Networks
Andreas Makridakis, Elias Athanasopoulos, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannids, and Evangelos P. Markatos
In Proceedings of the IEEE Network.
September-October 2010.

An Architecture For Enforcing JavaScript Randomization in Web2.0 Applications (short paper)
Elias Athanasopoulos, Antonis Krithinakis, and Evangelos P. Markatos
In Proceedings of the 13th Information Security Conference (ISC).
Boca Raton, Florida, October 2010.

D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, and Evangelos P. Markatos
In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS).
Athens, Greece, September 2010.

xJS: Practical XSS Prevention for Web Application Development
Elias Athanasopoulos, Vasilis Pappas, Antonis Krithinakis, Spyros Ligouras, Evangelos P. Markatos, and Thomas Karagiannis
In Proceedings of the 1st USENIX Conference on Web Application Development (WebApps).
Boston, Massachusetts, June 2010.

Isolating JavaScript in Dynamic Code Environments
Antonis Krithinakis, Elias Athanasopoulos, and Evangelos P. Markatos
In Proceedings of the 1st Workshop on Analysis and Programming Languages for Web Applications and Cloud Applications (APLWACA), co-located with PLDI.
Toronto, Canada, June 2010.

Hunting Cross-Site Scripting Attacks in the Network
Elias Athanasopoulos, Antonis Krithinakis, and Evangelos P. Markatos
In Proceedings of the 4th Workshop on Web 2.0 Security & Privacy (W2SP).
Oakland, California, May 2010.

Code-Injection Attacks in Browsers Supporting Policies
Elias Athanasopoulos, Vasilis Pappas, and Evangelos P. Markatos
In Proceedings of the 3rd Workshop on Web 2.0 Security & Privacy (W2SP).
Oakland, California, May 2009.

WISDOM: Security-Aware Fibres
Elias Athanasopoulos, Antonis Krithinakis, Georgios Kopidakis, Graeme Maxwell, Alistair Poustie, Bob Manning, Rod Webb, Martin Koyabe, Carla Di Cairano-Gilfedder
In Proceedings of the 2nd ACM European Workshop on System Security (EUROSEC).
Nuremberg, Germany, March 2009.

WSIM: A software platform to simulate all-optical security operations
Antonis Krithinakis, Lubomir Stroetmann, Elias Athanasopoulos, Georgios Kopidakis, Evangelos P. Markatos
In Proceedings of the 2nd European Conference on Computer Network Defense (EC2ND).
Dublin, Ireland, December 2008.

Topnet: A Network-aware top(1)
Antonis Theocharides, Demetres Antoniades, Michalis Polychronakis, Elias Athanasopoulos, and Evangelos P. Markatos
In Proceedings of the 22nd USENIX Large Installation Systems Administration (LISA) Conference.
San Diego, California, November 2008.

Antisocial Networks: Turning a Social Network into a Botnet
Elias Athanasopoulos, Andreas Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, and Evangelos P. Markatos
In Proceedings of the 11th Information Security Conference (ISC).
Taipei, Taiwan, September 2008.
We got Slashdotted! Check also the Wired, ZDNet, TheRegister, NewScientist and TechCrunch stories.

Compromising Anonymity Using Packet Spinning
Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, and Evangelos P. Markatos
In Proceedings of the 11th Information Security Conference (ISC).
Taipei, Taiwan, September 2008.

GAS: Overloading a File Sharing Network as an Anonymizing System
Elias Athanasopoulos, Mema Roussopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos
In Proceedings of the 2nd International Workshop on Security (IWSEC).
Nara, Japan, October 2007.

Alice, what did you do last time? Fighting Phishing Using Past Activity Tests
Nikos Nikiforakis, Andreas Makridakis, Elias Athanasopoulos, and Evangelos P. Markatos
In Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND).
Heraklion, Greece, October 2007.

Enhanced CAPTCHAs: Using Animation To Tell Humans And Computers Apart
Elias Athanasopoulos and Spiros Antonatos
In Proceedings of the 10th IFIP Open Conference on Communications and Multimedia Security.
Heraklion, Crete, October 2006.

Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network that Never Forgets
Elias Athanasopoulos, Kostas G. Anagnostakis and Evangelos P. Markatos
In Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS).
Singapore, June 2006.
Check out the Netcraft article.

A Feedback-based Approach to Reduce Duplicate Messages in Unstructured Peer-to-Peer Networks
Charis Papadakis, Paraskevi Fragopoulou, Elias Athanasopoulos, Marios Dikaiakos, Alexandros Labrinidis, Evangelos Markatos
In Proceedings of the CoreGRID Integration Workshop.
Pisa, Italy, November 2005.