User profiles for Giorgos Vasiliadis

Giorgos Vasiliadis

Hellenic Mediterranean University and FORTH
Verified email at ics.forth.gr
Cited by 1741

Gnort: High performance network intrusion detection using graphics processors

G Vasiliadis, S Antonatos, M Polychronakis… - Recent Advances in …, 2008 - Springer
The constant increase in link speeds and number of threats poses challenges to network
intrusion detection systems (NIDS), which must cope with higher traffic throughput and perform …

Regular expression matching on graphics hardware for intrusion detection

G Vasiliadis, M Polychronakis, S Antonatos… - Recent Advances in …, 2009 - Springer
The expressive power of regular expressions has been often exploited in network intrusion
detection systems, virus scanners, and spam filtering applications. However, the flexible …

MIDeA: a multi-parallel intrusion detection architecture

G Vasiliadis, M Polychronakis, S Ioannidis - Proceedings of the 18th …, 2011 - dl.acm.org
Network intrusion detection systems are faced with the challenge of identifying diverse
attacks, in extremely high speed networks. For this reason, they must operate at multi-Gigabit …

{GASPP}: A {GPU-Accelerated} stateful packet processing framework

G Vasiliadis, L Koromilas, M Polychronakis… - 2014 USENIX Annual …, 2014 - usenix.org
Graphics processing units (GPUs) are a powerful platform for building high-speed network
traffic processing applications using low-cost hardware. Existing systems tap the massively …

GPU-assisted malware

G Vasiliadis, M Polychronakis, S Ioannidis - International Journal of …, 2015 - Springer
Malware writers constantly seek new methods to increase the infection lifetime of their
malicious software. To that end, techniques such as code unpacking and polymorphism have …

[PDF][PDF] You can type, but you can't hide: A stealthy GPU-based keylogger

E Ladakis, L Koromilas, G Vasiliadis… - Proceedings of the 6th …, 2013 - Citeseer
Keyloggers are a prominent class of malware that harvests sensitive data by recording any
typed in information. Keylogger implementations strive to hide their presence using rootkit-…

PixelVault: Using GPUs for securing cryptographic operations

G Vasiliadis, E Athanasopoulos… - Proceedings of the …, 2014 - dl.acm.org
Protecting the confidentiality of cryptographic keys in the event of partial or full system
compromise is crucial for containing the impact of attacks. The Heartbleed vulnerability of April …

Gravity: a massively parallel antivirus engine

G Vasiliadis, S Ioannidis - International Workshop on Recent Advances in …, 2010 - Springer
In the ongoing arms race against malware, antivirus software is at the forefront, as one of
the most important defense tools in our arsenal. Antivirus software is flexible enough to be …

Parallelization and characterization of pattern matching using GPUs

G Vasiliadis, M Polychronakis… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Pattern matching is a highly computationally intensive operation used in a plethora of
applications. Unfortunately, due to the ever increasing storage capacity and link speeds, the …

Master of web puppets: Abusing web browsers for persistent and stealthy computation

…, EP Markatos, S Ioannidis, G Vasiliadis - arXiv preprint arXiv …, 2018 - arxiv.org
The proliferation of web applications has essentially transformed modern browsers into small
but powerful operating systems. Upon visiting a website, user devices run implicitly trusted …