Skip to main content

Showing 1–6 of 6 results for author: Keromytis, A D

  1. arXiv:2403.10659  [pdf, other

    cs.CR

    Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans

    Authors: Athanasios Moschos, Fabian Monrose, Angelos D. Keromytis

    Abstract: We introduce a new class of hardware trojans called interrupt-resilient trojans (IRTs). Our work is motivated by the observation that hardware trojan attacks on CPUs, even under favorable attack scenarios (e.g., an attacker with local system access), are affected by unpredictability due to non-deterministic context switching events. As we confirm experimentally, these events can lead to race condi… ▽ More

    Submitted 2 May, 2024; v1 submitted 15 March, 2024; originally announced March 2024.

  2. arXiv:1810.04779  [pdf, other

    cs.CR

    Redirect2Own: Protecting the Intellectual Property of User-uploaded Content through Off-site Indirect Access

    Authors: Georgios Kontaxis, Angelos D. Keromytis, Georgios Portokalidis

    Abstract: Social networking services have attracted millions of users, including individuals, professionals, and companies, that upload massive amounts of content, such as text, pictures, and video, every day. Content creators retain the intellectual property (IP) rights on the content they share with these networks, however, very frequently they implicitly grant them, a sometimes, overly broad license to u… ▽ More

    Submitted 10 October, 2018; originally announced October 2018.

  3. arXiv:1708.09334  [pdf, other

    cs.CR cs.OS

    Tug-of-War: Observations on Unified Content Handling

    Authors: Theofilos Petsios, Adrian Tang, Dimitris Mitropoulos, Salvatore Stolfo, Angelos D. Keromytis, Suman Jana

    Abstract: Modern applications and Operating Systems vary greatly with respect to how they register and identify different types of content. These discrepancies lead to exploits and inconsistencies in user experience. In this paper, we highlight the issues arising in the modern content handling ecosystem, and examine how the operating system can be used to achieve unified and consistent content identificatio… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

  4. SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities

    Authors: Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, Suman Jana

    Abstract: Algorithmic complexity vulnerabilities occur when the worst-case time/space complexity of an application is significantly higher than the respective average case for particular user-controlled inputs. When such conditions are met, an attacker can launch Denial-of-Service attacks against a vulnerable application by providing inputs that trigger the worst-case behavior. Such attacks have been known… ▽ More

    Submitted 28 August, 2017; originally announced August 2017.

    Comments: ACM CCS '17, October 30-November 3, 2017, Dallas, TX, USA

  5. arXiv:1502.07373  [pdf, other

    cs.CR cs.NI

    The Spy in the Sandbox -- Practical Cache Attacks in Javascript

    Authors: Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis

    Abstract: We present the first micro-architectural side-channel attack which runs entirely in the browser. In contrast to other works in this genre, this attack does not require the attacker to install any software on the victim's machine -- to facilitate the attack, the victim needs only to browse to an untrusted webpage with attacker-controlled content. This makes the attack model highly scalable and extr… ▽ More

    Submitted 1 March, 2015; v1 submitted 25 February, 2015; originally announced February 2015.

  6. arXiv:cs/0504007  [pdf, ps, other

    cs.NI cs.CR

    The Bandwidth Exchange Architecture

    Authors: David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis

    Abstract: New applications for the Internet such as video on demand, grid computing etc. depend on the availability of high bandwidth connections with acceptable Quality of Service (QoS). There appears to be, therefore, a requirement for a market where bandwidth-related transactions can take place. For this market to be effective, it must be efficient for both the provider (seller) and the user (buyer) of… ▽ More

    Submitted 3 April, 2005; originally announced April 2005.

    Comments: 8 pages, 6 figures

    Report number: DU-CS-05-03