User profiles for Giorgos Vasiliadis
Giorgos VasiliadisHellenic Mediterranean University and FORTH Verified email at ics.forth.gr Cited by 1741 |
Gnort: High performance network intrusion detection using graphics processors
The constant increase in link speeds and number of threats poses challenges to network
intrusion detection systems (NIDS), which must cope with higher traffic throughput and perform …
intrusion detection systems (NIDS), which must cope with higher traffic throughput and perform …
Regular expression matching on graphics hardware for intrusion detection
The expressive power of regular expressions has been often exploited in network intrusion
detection systems, virus scanners, and spam filtering applications. However, the flexible …
detection systems, virus scanners, and spam filtering applications. However, the flexible …
MIDeA: a multi-parallel intrusion detection architecture
Network intrusion detection systems are faced with the challenge of identifying diverse
attacks, in extremely high speed networks. For this reason, they must operate at multi-Gigabit …
attacks, in extremely high speed networks. For this reason, they must operate at multi-Gigabit …
{GASPP}: A {GPU-Accelerated} stateful packet processing framework
G Vasiliadis, L Koromilas, M Polychronakis… - 2014 USENIX Annual …, 2014 - usenix.org
Graphics processing units (GPUs) are a powerful platform for building high-speed network
traffic processing applications using low-cost hardware. Existing systems tap the massively …
traffic processing applications using low-cost hardware. Existing systems tap the massively …
GPU-assisted malware
Malware writers constantly seek new methods to increase the infection lifetime of their
malicious software. To that end, techniques such as code unpacking and polymorphism have …
malicious software. To that end, techniques such as code unpacking and polymorphism have …
[PDF][PDF] You can type, but you can't hide: A stealthy GPU-based keylogger
E Ladakis, L Koromilas, G Vasiliadis… - Proceedings of the 6th …, 2013 - Citeseer
Keyloggers are a prominent class of malware that harvests sensitive data by recording any
typed in information. Keylogger implementations strive to hide their presence using rootkit-…
typed in information. Keylogger implementations strive to hide their presence using rootkit-…
PixelVault: Using GPUs for securing cryptographic operations
G Vasiliadis, E Athanasopoulos… - Proceedings of the …, 2014 - dl.acm.org
Protecting the confidentiality of cryptographic keys in the event of partial or full system
compromise is crucial for containing the impact of attacks. The Heartbleed vulnerability of April …
compromise is crucial for containing the impact of attacks. The Heartbleed vulnerability of April …
Gravity: a massively parallel antivirus engine
G Vasiliadis, S Ioannidis - International Workshop on Recent Advances in …, 2010 - Springer
In the ongoing arms race against malware, antivirus software is at the forefront, as one of
the most important defense tools in our arsenal. Antivirus software is flexible enough to be …
the most important defense tools in our arsenal. Antivirus software is flexible enough to be …
Parallelization and characterization of pattern matching using GPUs
G Vasiliadis, M Polychronakis… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Pattern matching is a highly computationally intensive operation used in a plethora of
applications. Unfortunately, due to the ever increasing storage capacity and link speeds, the …
applications. Unfortunately, due to the ever increasing storage capacity and link speeds, the …
Master of web puppets: Abusing web browsers for persistent and stealthy computation
The proliferation of web applications has essentially transformed modern browsers into small
but powerful operating systems. Upon visiting a website, user devices run implicitly trusted …
but powerful operating systems. Upon visiting a website, user devices run implicitly trusted …