BibTeX records: Soteris Demetriou

download as .bib file

@article{DBLP:journals/corr/abs-2004-05703,
  author    = {Fan Mo and
               Ali Shahin Shamsabadi and
               Kleomenis Katevas and
               Soteris Demetriou and
               Ilias Leontiadis and
               Andrea Cavallaro and
               Hamed Haddadi},
  title     = {DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution
               Environments},
  journal   = {CoRR},
  volume    = {abs/2004.05703},
  year      = {2020},
  url       = {https://arxiv.org/abs/2004.05703},
  archivePrefix = {arXiv},
  eprint    = {2004.05703},
  timestamp = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-2004-05703.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/HojjatiLDG19,
  author    = {Avesta Hojjati and
               Yunhui Long and
               Soteris Demetriou and
               Carl A. Gunter},
  editor    = {Xenofon D. Koutsoukos and
               Alvaro A. C{\'{a}}rdenas and
               Ehab Al{-}Shaer},
  title     = {{BEEER:} distributed record and replay for medical devices in hospital
               operating rooms},
  booktitle = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science
               of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019},
  pages     = {1:1--1:10},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3314058.3314061},
  doi       = {10.1145/3314058.3314061},
  timestamp = {Sat, 22 Jun 2019 19:13:09 +0200},
  biburl    = {https://dblp.org/rec/conf/hotsos/HojjatiLDG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/DemetriouJK18,
  author    = {Soteris Demetriou and
               Puneet Jain and
               Kyu{-}Han Kim},
  title     = {CoDrive: Improving Automobile Positioning via Collaborative Driving},
  booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
               Honolulu, HI, USA, April 16-19, 2018},
  pages     = {72--80},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/INFOCOM.2018.8486281},
  doi       = {10.1109/INFOCOM.2018.8486281},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/infocom/DemetriouJK18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/TuncayDGG18,
  author    = {G{\"{u}}liz Seray Tuncay and
               Soteris Demetriou and
               Karan Ganju and
               Carl A. Gunter},
  title     = {Resolving the Predicament of Android Custom Permissions},
  booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS}
               2018, San Diego, California, USA, February 18-21, 2018},
  publisher = {The Internet Society},
  year      = {2018},
  url       = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018\_08-4\_Tuncay\_paper.pdf},
  timestamp = {Thu, 09 Aug 2018 10:56:55 +0200},
  biburl    = {https://dblp.org/rec/conf/ndss/TuncayDGG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LeeLZDZWCZHG17,
  author    = {Yeonjoon Lee and
               Tongxin Li and
               Nan Zhang and
               Soteris Demetriou and
               Mingming Zha and
               XiaoFeng Wang and
               Kai Chen and
               Xiao{-}yong Zhou and
               Xinhui Han and
               Michael Grace},
  title     = {Ghost Installer in the Shadow: Security Analysis of App Installation
               on Android},
  booktitle = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems
               and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017},
  pages     = {403--414},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {https://doi.org/10.1109/DSN.2017.33},
  doi       = {10.1109/DSN.2017.33},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/dsn/LeeLZDZWCZHG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/SrivastavaJDCK17,
  author    = {Animesh Srivastava and
               Puneet Jain and
               Soteris Demetriou and
               Landon P. Cox and
               Kyu{-}Han Kim},
  editor    = {M. Rasit Eskicioglu},
  title     = {CamForensics: Understanding Visual Privacy Leaks in the Wild},
  booktitle = {Proceedings of the 15th {ACM} Conference on Embedded Network Sensor
               Systems, SenSys 2017, Delft, Netherlands, November 06-08, 2017},
  pages     = {30:1--30:13},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3131672.3131683},
  doi       = {10.1145/3131672.3131683},
  timestamp = {Wed, 21 Nov 2018 12:44:16 +0100},
  biburl    = {https://dblp.org/rec/conf/sensys/SrivastavaJDCK17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DemetriouZLWGZG17,
  author    = {Soteris Demetriou and
               Nan Zhang and
               Yeonjoon Lee and
               XiaoFeng Wang and
               Carl A. Gunter and
               Xiao{-}yong Zhou and
               Michael Grace},
  editor    = {Guevara Noubir and
               Mauro Conti and
               Sneha Kumar Kasera},
  title     = {HanGuard: SDN-driven protection of smart home WiFi devices from malicious
               mobile apps},
  booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
               Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
               2017},
  pages     = {122--133},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3098243.3098251},
  doi       = {10.1145/3098243.3098251},
  timestamp = {Tue, 06 Nov 2018 16:59:31 +0100},
  biburl    = {https://dblp.org/rec/conf/wisec/DemetriouZLWGZG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DemetriouZLWGZG17,
  author    = {Soteris Demetriou and
               Nan Zhang and
               Yeonjoon Lee and
               XiaoFeng Wang and
               Carl A. Gunter and
               Xiao{-}yong Zhou and
               Michael Grace},
  title     = {Guardian of the {HAN:} Thwarting Mobile Attacks on Smart-Home Devices
               Using OS-level Situation Awareness},
  journal   = {CoRR},
  volume    = {abs/1703.01537},
  year      = {2017},
  url       = {http://arxiv.org/abs/1703.01537},
  archivePrefix = {arXiv},
  eprint    = {1703.01537},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/DemetriouZLWGZG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhangDMDYZQW0TG17,
  author    = {Nan Zhang and
               Soteris Demetriou and
               Xianghang Mi and
               Wenrui Diao and
               Kan Yuan and
               Peiyuan Zong and
               Feng Qian and
               XiaoFeng Wang and
               Kai Chen and
               Yuan Tian and
               Carl A. Gunter and
               Kehuan Zhang and
               Patrick Tague and
               Yue{-}Hsun Lin},
  title     = {Understanding IoT Security Through the Data Crystal Ball: Where We
               Are Now and Where We Are Going to Be},
  journal   = {CoRR},
  volume    = {abs/1703.09809},
  year      = {2017},
  url       = {http://arxiv.org/abs/1703.09809},
  archivePrefix = {arXiv},
  eprint    = {1703.09809},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/ZhangDMDYZQW0TG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TuncayDG16,
  author    = {G{\"{u}}liz Seray Tuncay and
               Soteris Demetriou and
               Carl A. Gunter},
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {Draco: {A} System for Uniform and Fine-grained Access Control for
               Web Code on Android},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {104--115},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2976749.2978322},
  doi       = {10.1145/2976749.2978322},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/TuncayDG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DemetriouMYZG16,
  author    = {Soteris Demetriou and
               Whitney Merrill and
               Wei Yang and
               Aston Zhang and
               Carl A. Gunter},
  title     = {Free for All! Assessing User Data Exposure to Advertising Libraries
               on Android},
  booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
               2016, San Diego, California, USA, February 21-24, 2016},
  publisher = {The Internet Society},
  year      = {2016},
  url       = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/free-for-all-assessing-user-data-exposure-advertising-libraries-android.pdf},
  timestamp = {Wed, 13 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ndss/DemetriouMYZG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DemetriouZNLYWG15,
  author    = {Soteris Demetriou and
               Xiao{-}yong Zhou and
               Muhammad Naveed and
               Yeonjoon Lee and
               Kan Yuan and
               XiaoFeng Wang and
               Carl A. Gunter},
  title     = {What's in Your Dongle and Bank Account? Mandatory and Discretionary
               Protection of Android External Resources},
  booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
               2015, San Diego, California, USA, February 8-11, 2015},
  publisher = {The Internet Society},
  year      = {2015},
  url       = {https://www.ndss-symposium.org/ndss2015/whats-your-dongle-and-bank-account-mandatory-and-discretionary-protection-android-external},
  timestamp = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ndss/DemetriouZNLYWG15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NaveedZDWG14,
  author    = {Muhammad Naveed and
               Xiao{-}yong Zhou and
               Soteris Demetriou and
               XiaoFeng Wang and
               Carl A. Gunter},
  title     = {Inside Job: Understanding and Mitigating the Threat of External Device
               Mis-Binding on Android},
  booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS}
               2014, San Diego, California, USA, February 23-26, 2014},
  publisher = {The Internet Society},
  year      = {2014},
  url       = {https://www.ndss-symposium.org/ndss2014/inside-job-understanding-and-mitigating-threat-external-device-mis-bonding-android},
  timestamp = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ndss/NaveedZDWG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ixda/SintorisYDA13,
  author    = {Christos Sintoris and
               Nikoleta Yiannoutsou and
               Soteris Demetriou and
               Nikolaos M. Avouris},
  title     = {Discovering the invisible city: Location-based games for learning
               in smart cities},
  journal   = {IxD{\&}A},
  volume    = {16},
  pages     = {47--64},
  year      = {2013},
  url       = {http://www.mifav.uniroma2.it/inevent/events/idea2010/index.php?s=10\&\#38;a=10\&\#38;link=ToC\_16\_P\&\#38;link=16\_5\_abstract},
  timestamp = {Wed, 22 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ixda/SintorisYDA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouDHNPWGN13,
  author    = {Xiao{-}yong Zhou and
               Soteris Demetriou and
               Dongjing He and
               Muhammad Naveed and
               Xiaorui Pan and
               XiaoFeng Wang and
               Carl A. Gunter and
               Klara Nahrstedt},
  editor    = {Ahmad{-}Reza Sadeghi and
               Virgil D. Gligor and
               Moti Yung},
  title     = {Identity, location, disease and more: inferring your secrets from
               android public resources},
  booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  pages     = {1017--1028},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2508859.2516661},
  doi       = {10.1145/2508859.2516661},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/ZhouDHNPWGN13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics