Publications

Book Editions

  1. Proceedings of the 2nd International Workshop on Model-driven Simulation and Training Environments for Cybersecurity. George Hatzivasilis and Sotiris Ioannidis (Eds.). Gilford, UK, September 14-18, 2020. Lecture Notes in Computer Science,, Springer 2020, ISBN 978-3-030-62432-3.

  2. Proceedings of the 1st International Workshops IOSec, MSTEC, and FINSEC. Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, Silvio Ranise, Luca Verderame, Alberto Siena, and Joaquín García-Alfaro (Eds.). Luxembourg City, Luxembourg, September 26-27, 2019. Lecture Notes in Computer Science 11981, Springer 2020, ISBN 978-3-030-42050-5.

  3. Proceedings of the 21st International Symposium on Research on Attacks, Intrusions, and Defenses (RAID). Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, and Sotiris Ioannidis (Eds.). Heraklion, Greece, September 10-12, 2018, Lecture Notes in Computer Science, Springer 2018.

  4. Proceedings of the 21st European Symposium on Research on Computer Security (ESORICS). Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows (Eds.). Heraklion, Greece, September 26-30, 2016, Lecture Notes in Computer Science, Springer 2016.

  5. Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS). Mihai Christodorescu and Sotiris Ioannidis (Eds.). Wroclaw, Poland, September 11, 2014, IEEE Computer Society. ISBN: 978-1-4799-8308-7.

  6. Proceedings of the 7th on Trust and Trustworthy Computing (TRUST). Thorsten Holz and Sotiris Ioannidis (Eds.). Heraklion, Crete, June 30 – July 2, 2014. ISBN: 978-3-319-08592-0 (Print) 978-3-319-08593-7 (Online).

  7. Proceedings of the 4th European Conference on Computer Network Defense (EC2ND). Liam Meany, Kostas Anagnostakis, and Sotiris Ioannidis (Eds.). Dublin, Ireland, 11-12 December 2008. ISBN: 978-0-7695-3479-4.

  8. Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND). Vasilios Siris, Sotiris Ioannidis, Kostas Anagnostakis, and Panos Trimintzios (Eds.). Heraklion, Greece, 2007. ISBN: 978-3-319-45740-6 (Print) 978-3-319-45741-3 (Online).

Book Chapters

  1. “The Evolution of Hardware-Assisted Security” Giorgos Christou, Elias Athanasopoulos, and Sotiris Ioannidis. In Leandros Maglaras and Ioanna Kantzavelou (eds) Cybersecurity Issues in Emerging Technologies. CRC Press ISBN 9780367626174 October 15, 2021.

  2. “Big Data Analytics in the Banking Sector: Guidelines and Lessons Learned from the CaixaBank Case” Andreas Alexopoulos, Yolanda Becerra, Omer Boehm, George Bravos, Vasilis Chatzigiannakis, Cesare Cugnasco, Giorgos Demetriou, Iliada Eleftheriou, Lidija Fodor, Spiros Fotis, Sotiris Ioannidis, Dusan Jakovetic, Leonidas Kallipolitis, Vlatka Katusic, Evangelia Kavakli, Despina Kopanaki, Christoforos Leventis, Mario Maawad Marcos, Ramon Martin de Pozuelo, Miquel Martínez, Nemanja Milosevic, Enric Pere Pages Montanera, Gerald Ristow, Hernan Ruiz-Ocampo, Rizos Sakellariou, Raül Sirvent, Srdjan Skrbic, Ilias Spais, Giorgos Vasiliadis and Michael Vinov. In Ed. Curry et al. (eds) “Technologies and Applications for Big Data Value” Open Access Book, 2021.

  3. “Big Data Analytics in the Manufacturing Sector: Guidelines and Lessons Learned through the CRF Case” Andreas Alexopoulos, Yolanda Becerra, Omer Boehm, George Bravos, Vasilis Chatzigiannakis, Cesare Cugnasco, Giorgos Demetriou, Iliada Eleftheriou, Spiros Fotis, Gianmarco Genchi, Sotiris Ioannidis, Dusan Jakovetic, Leonidas Kallipolitis, Vlatka Katusic, Evangelia Kavakli, Despina Kopanaki, Christoforos Leventis, Miquel Martínez, Julien Mascolo, Nemanja Milosevic, Enric Pere Pages Montanera, Gerald Ristow, Hernan Ruiz-Ocampo, Rizos Sakellariou, Raül Sirvent, Srdjan Skrbic, Ilias Spais, Giuseppe Danilo Spennacchio, Dusan Stamenkovic, Giorgos Vasiliadis and Michael Vinov. In Ed. Curry et al. (eds) “Technologies and Applications for Big Data Value” Open Access Book, 2021.

  4. “Biosensors and Internet of Things in smart healthcare applications: challenges and opportunities” Maria Pateraki, Kostas Fysarakis, Vaggelis Sakkalis, Giorgos Spanoudakis, Iraklis Varlamis, Michalis Maniadakis, Manolis Lourakis, Sotiris Ioannidis, Nicholas Cummins, Bjorne Schuller, Emmanouil Loutsetis, and Dimitris Koutsouris. In N. Dey et al. (eds) Wearable and Implantable Medical Devices, Series: Advances in ubiquitous sensing applications for healthcare, Elsevier, January 2020.

  5. “A Comprehensive Technical Survey of Contemporary Cybersecurity Products and Solutions” Christos Tselios, George Tsolis, Manos Athanatos. Computer Security, pp 3-18,Springer, Cham, September 2019

  6. “CIPSEC - Enhancing Critical Infrastructure Protection with innovative SECurity framework” Antonio Álvarez, Rubén Trapero, Denis Guilhot, Ignasi García-Mila, Francisco Hernandez, Eva Marín-Tordera, Jordi Forne, Xavi Masip-Bruin, Neeraj Suri, Markus Heinrich, Stefan Katzenbeisser, Manos Athanatos, Sotiris Ioannidis, Leonidas Kallipolitis, Ilias Spais, Apostolos Fournaris, and Konstantinos Lampropoulos. In “Challenges in Cybersecurity and Privacy - the European Research Landscape”, ISBN: 9788770220880, June 2019.

  7. "CyberSure: A Framework for Liability Based Trust" George Christou, Eva Papadogiannaki, Michalis Diamantaris, Livia Torterolo, and Panos Chatziadam. In Computer Security, pp. 19-34. Springer, Cham, 2019.

  8. “Security Concerns in Cooperative Intelligent Transport Systems” Konstantinos Fysarakis, Ioannis Askoxylakis, Vasilios Katos, Sotiris Ioannidis, and Louis Marinos. In Intrusion Detection and Prevention for Mobile Ecosystems. Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, and Dimitrios Damopoulos (editors), pp. 487–522, Chapter 16. Taylor & Francis Group, 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742 CRC Press 2017. Print ISBN: 978-1-138-03357-3. eBook ISBN: 978-1-315-30582-0

  9. “Experiences Enhancing Open Source Security in the POSSE Project” Jonathan M. Smith, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis, Ben Laurie, Douglas Maughan, Dale Rahn, and Jason L. Wright. In Free/Open Source Software Development, Stefan Koch (editor), pp. 242-257. Idea Group Publishing, 2004. Also republished in Global Information Technologies: Concepts, Methodologies, Tools, and Applications, Felix B. Tan (editor), pp. 1587-1598. Idea Group Publishing, 2007.

  10. “On using Reliable Network RAM in Networks of Workstations” Sotiris Ioannidis, Athanasios E. Papathanasiou, Grigorios I. Magklis, Evangelos P. Markatos, Dionisios N. Pnevmatikatos, and Julia Sevaslidou. In Cluster Computing, pp. 109-121, Chapter 10, 2001, ISBN 1-59033-113-3, Nova Science Publishers. USA, 2001.


Transactions Publications

  1. “WARDOG: Awareness detection watchdog for botnet infection on the host device” George Hatzivasilis, Othonas Soultatos, Panos Chatziadam, Konstantinos Fysarakis, Ioannis Askoxylakis, Sotiris Ioannidis, George Alaxandris, Vasilis Katos, and George Spanoudakis. IEEE Transactions on Sustainable Computing (T-SUSC), 2021.

  2. “On Architectural Support for Instruction Set Randomization.” George Christou, Giorgos Vasiliadis, Vassilis Papaefstathiou, Antonis Papadogiannakis, and Sotiris Ioannidis. In ACM Transactions on Architecture and Code Optimization (TACO), 2020.

  3. “End-to-end Wireless Path Deployment with Intelligent Surfaces Using Interpretable Neural Networks” Christos Liaskos, Shuai Nie, Ageliki Tsioliaridou, Andreas Pitsillides, Sotiris Ioannidis, and Ian Akyildiz. In IEEE Transactions on Communications (TCOM), July 2020.

  4. “The Seven Deadly Sins of the HTML5 WebAPI: A Large-scale Study on the Risks of Mobile Sensor-based Attacks” Michalis Diamantaris, Francesco Marcantoni, Sotiris Ioannidis, and Jason Polakis. In ACM Transactions on Privacy and Security (TOPS), 2020.

  5. MobileTrust: Secure Knowledge Integration in VANETs” George Hatzivasilis, Othonas Soultatos, Sotiris Ioannidis, George Spanoudakis, Vassilios Katos, and Giorgos Demetriou. In ACM Transactions on Cyber-Physical Systems (TCPS), vol. 4, no. 2, October 2019.

  6. “On the Network-layer Modeling and Configuration of Programmable Wireless Environments” Christos Liaskos, Ageliki Tsioliaridou, Shuai Nie, Andreas Pitsillides, Sotiris Ioannidis, and Ian Akyildiz. In IEEE/ACM Transactions on Networking (TON), 2019.

  7. “Network Topology Effects on the Detectability of Crossfire Attacks” Christos Liaskos and Sotiris Ioannidis. IEEE Transactions on Information Forensics and Security, vol. 13, no. 7, pp. 1682-1695, April 2018.

  8. “Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware Architectures” Eva Papadogiannaki Giorgos Vasiliadis, Lazaros Koromilas, and Sotiris Ioannidis. In IEEE/ACM Transactions on Networking (TON), vol. 15, no. 3, pp. 1593-1606, June 2017.

  9. “Design and Implementation of a Stateful Network Packet Processing Framework for GPUs” Giorgos Vasiliadis, Lazaros Koromilas, Michalis Polychronakis, and Sotiris Ioannidis. In IEEE/ACM Transactions on Networking (TON), vol. 25, no. 1, pp. 610-623, February 2017.


Journal Publications

  1. “CIRCE: Circular & Trustworthy IoT Orchestrations” Manos Papoutsakis, Konstantinos Fysarakis, Emmanouil Michalodimitrakis, George Spanoudakis, and Sotiris Ioannidis, Frontiers in Sustainability, section Circular Economy, 2022.

  2. “Discovery and classification of Twitter bots” Alexander Shevtsov, Maria Oikonomidou, Despoina Antonakaki, Polyvios Pratikakis, Alexandros Kanterakis, Sotiris Ioannidis, and Paraskevi Fragopoulou. SN Computer Science, Springer, 2022.

  3. "Preventing Dynamic Library Compromise on Node.js via RWX-Based Privilege Reduction" Nikos Vasilakis, Cristian-Alexandru Staicu, Grigoris Ntousakis, Konstantinos Kallas, Ben Karel, André DeHon, Michael Pradel. ACM Conference on Computer and Communications Security (ACM CCS21), November 2021.

  4. “The Green Blockchains of Circular Economy”, Giorgos Hatzivasilis, Sotiris Ioannidis, Kostas Fysarakis, Giorgos Spanoudakis, and Nikos Papadakis, Electronics – Special Issue on Artificial Intelligence Applications in Next Generation Communication Infrastructures Security, MDPI Open Access Journal, vol. 10, issue 16, pp. 1-16, August 2021. (DOI: 10.3390/electronics10162008)

  5. "Efficient Module-Level Dynamic Analysis for Dynamic Languages with Module Recontextualization" Nikos Vasilakis, Grigoris Ntousakis, Veit Heller, Martin Rinard. ACM Joint European Software Engineering Conference & Symposium on the Foundations of Software Engineering (ESEC/FSE 2021) Received Distinguished Paper Award, August 2021.

  6. "A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures" Eva Papadogiannaki and Sotiris Ioannidis. ACM Computing Surveys (CSUR), vol. 54, issue: 6, pp. 1-35, 13 July 2021.

  7. “CYRA: A Model-Driven CYber Range Assurance Platform” Michalis Smyrlis M, Iasonas Somarakis, Giorgos Spanoudakis, Giorgos Hatzivasilis, and Sotiris Ioannidis. In Special Issue on Security management of 5G and IoT ecosystems Applied Sciences, 11(11):5165, 2021.

  8. "Towards a Collection of Security and Privacy Patterns" Manos Papoutsakis, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis and Konstantina Koloutsou. In Special Issue on Security management of 5G and IoT ecosystems Applied Sciences, vol. 11, no. 4: 1396, February 2021.

  9. “A survey of Twitter research: Data Model, Graph Structure, Sentiment Analysis and Attacks” Despoina Antonakaki, Sotiris Ioannidis, and Paraskevi Fragopoulou. Expert Systems With Applications (ESWA), Volume 164, February 2021.

  10. “Acceleration of Intrusion Detection in Encrypted Network Traffic using Heterogeneous Hardware” Eva Papadogiannaki and Sotiris Ioannidis. MDPI Sensors, 21(4), February 2021.

  11. SPD-Safe: Secure Administration of Railway CPS and Intelligent Transportation Systems” George Hatzivasilis, Konstantinos Fysarakis, Sotiris Ioannidis, Ilias Hatzakis, George Vardakis, Nikos Papadakis, and George Spanoudakis. Electronics – Special Issue on Advances in Public Transport Platform for the Development of Sustainability Cities, Open Access Journal, 10(1), pp. 1-26, January, 2021

  12. “The Internet of MetaMaterial Things and Their Software Enablers” Christos Liaskos, Georgios Pyrialakos, Alexandros Pitilakis, Ageliki Tsioliaridou, Michail Christodoulou, Nikolaos V. Kantartzis, Sotiris Ioannidis, Andreas Pitsillides, and Ian F. Akyildiz. ITU Journal on Future and Evolving Technologies (J-FET), 2020.

  13. “Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees” George Hatzivasilis, Sotiris Ioannidis, Michali Smyrlis, George Spanoudakis, Fulvio Frati, Ludger Goeke, Torsten Hildebrandt, George Tsakirakis, Fotis Oikonomou, George Leftheriotis, and Hristo Koshutanski. Applied Sciences – Special Issue on Cyber Security of Critical Infrastructures, MDPI Open Access Journal, vol. 10, issue 16, article 5702, pp. 1-26, August 2020.

  14. “AI-driven composition and security validation of an IoT ecosystem” George Hatzivasilis, Nikos Papadakis, Ilias Hatzakis, Sotiris Ioannidis, and George Vardakis. In Applied Sciences – Special Issue Smart City and Multi-Agent Systems, MDPI Open Access Journal, vol. 10, issue 14, article 4862, pp. 1-31, August 2020.

  15. “Towards Intelligent Metasurfaces: The Progress from Globally-Tunable Meta- surfaces to Software-Defined Metasurfaces with an Embedded Network of Controllers” Odysseas Tsilipakos, Anna C. Tasolamprou, Alexandros Pitilakis, Fu Liu, Xuchen Wang, Mohammad Sajjad Mirmoosa, Dimitrios C. Tzarouchis, Sergi Abadal, Hamidreza Taghvaee, Christos Liaskos, Ageliki Tsioliaridou, Julius Georgiou, Albert Cabellos-Aparicio, Eduard Alarcón, Sotiris Ioannidis, Andreas Pitsillides, Ian F. Akyildiz, Nikolaos V. Kantartzis, Eleftherios N. Economou, Costas M. Soukoulis, Maria Kafesaki, and Sergei Tretyakov. In Advanced Optical Materials, Wiley, 2020.

  16. “A Fine-grained Social Network Recommender System” Markos Aivazoglou, Antonios O. Roussos, Dionisis Margaris, Costas Vassilakis, Sotiris Ioannidis, Jason Polakis, and Dimitris Spiliotopoulos. In Social Network Analysis and Mining (SNAM), Springer, 2020.

  17. “A survey on vulnerability assessment tools and databases for cloud-based web applications” Kyriakos Kritikos, Kostas Magoutis, Manos Papoutsakis, and Sotiris Ioannidis. Array, Elsevier,Volumes 3-4, September - December 2019.

  18. “Exploration of Intercell Wireless Millimeter-Wave Communication in the Landscape of Intelligent Metasurfaces” Anna C. Tasolamprou, Alexandros Pitilakis, Sergi Abadal, Odysseas Tsilipakos, Xavier Timoneda, H. Taghvaee, Mohammad Sajjad Mirmoosa, Fu Liu, Christow Liaskos, Angeliki Tsioliaridou, Sotiris Ioannidis, Nikolaos V. Kantartzis, Dionysios Manessis, Julius Georgiou, Albert Cabellos-Aparicio, Eduard Alarcon, Ian F. Akyildiz, Sergei A. Tretyakov, Eleftherios N. Economou, Maria Kafesaki, and Costas. M. Soukoulis. In IEEE Access, August 2019.

  19. “A novel communication paradigm for high capacity and security via programmable indoor wireless environments in next generation wireless systems” Christos Liaskos, Shuai Nie, Ageliki Tsioliaridou, Andreas Pitsillides, Sotiris Ioannidis, and Ian Akyildiz. Ad Hoc Networks, Elsevier, vol. 87, pages 1-16, 2019.

  20. “Utilizing the average node degree to assess the temporal growth rate of Twitter” Despoina Antonakaki, Sotiris Ioannidis, and Paraskevi Fragopoulou. Social Network Analysis and Mining (SNAM), February 16th, 2018.

  21. “Social media analysis during political turbulence” Despoina Antonakaki, Dimitris Spiliotopoulos, Christos V. Samaras, Polyvios Pratikakis, Sotiris Ioannidis, and Paraskevi Fragopoulou. PLOS One, October 31st, 2017.

  22. “Computing and Communications for the Software-Defined Metamaterial Paradigm: A Context Analysis” Sergi Abadal, Christos Liaskos, Ageliki Tsioliaridou, Sotiris Ioannidis, Andreas Pitsillides, Josep Solé-Pareta, Albert Cabellos-Aparicio, and Eduard Alarcon. IEEE Access, 2017.

  23. “Packet Routing in 3D Nanonetworks: A Lightweight, Linear-path Scheme” Ageliki Tsioliaridou, Christos Liaskos, Eugen Dedu, and Sotiris Ioannidis. In Nano Communications Networks (Elsevier), 2017.

  24. “Exploiting abused trending topics to identify spam campaigns in Twitter” Despoina Antonakaki, Iasonas Polakis, Ilias Athanasopoulos, Sotiris Ioannidis, and Paraskevi Fragopoulou. In Social Network Analysis and Mining (SNAM), vol. 6, no. 1, pp. 1-11, December 2016.

  25. Lightweight, Self-tuning Data Dissemination for Dense Nanonetworks” Ageliki Tsioliaridou, Christos Liaskos, Sotiris Ioannidis, and Andreas Pitsillides. In Nano Communications Networks, Special issue on Electromagnetic Communications in Nano-scale, Elsevier, 2015.

  26. “GPU-Assisted Malware” Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. In International Journal of Information Security (IJIS), vol. 14, no. 3, pp. 289-297, June 2015.

  27. “Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data” Panagiotis Andriotis, Zacharias Tzermias, Anthi Mparmpaki, Sotiris Ioannidis, and George Oikonomou. In International Journal of Digital Crime and Forensics (IJDCF), vol. 5, no. 4, pp. 34-54, IGI Global, 2013.

  28. “Decentralized Access Control in Distributed File Systems” Stefan Miltchev, Jonathan M. Smith, Vassilis Prevelakis, Angelos D. Keromytis, and Sotiris Ioannidis. In ACM Computing Surveys, vol. 40, no. 3, September 2008.

  29. “COVERAGE: Detecting and Reacting to Worm Epidemics Using Cooperation and Validation” Kostas Anagnostakis, Michael Greenwald, S. Ioannidis, and Angelos D. Keromytis. In Springer International Journal of Information Security (IJIS), Special Issue, 2007.

  30. “Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications” Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Kostas Anagnostakis, and Jonathan M. Smith. In International Journal of Network Security (IJNS), Vol. 4, No. 1, pp. 69-80, January 2007.

  31. “Flexible Network Monitoring with FLAME” Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, Dekai Li, and Jonathan M. Smith. In Computer Networks Journal, Special Issue on Active Networks, Elsevier Science, Vol. 50, No. 14, pp. 2548-2563, October 2006.

  32. “Available bandwidth measurement as simple as running wget” Demetres Antoniades, Manos Athanatos, Antonis Papadogiannakis, Evangelos P Markatos, Constantine Dovrolis. Journal: Proc. of Passive and Active Measurement Conference (PAM 2006), pp 61-70, March 2006.

  33. “CRAUL: Compiler and Run-Time Integration for Adaptation Under Load” Sotiris Ioannidis, Umit Rencuzogullari, Robert Stets, and Sandhya Dwarkadas. In Journal of Scientific Programming, pp. 261-273, Spring 1999.

  34. “On using Network RAM as a non-volatile Buffer” Dionisios Pnevmatikatos, Evangelos P. Markatos, Gregory Magklis, and Sotiris Ioannidis. In Cluster Computing, Special Issue on I/O in Shared-Storage Clusters, 2(4), pp. 295-303, Baltzer Science Publishers, 1999.

  35. “On using Reliable Network RAM in Networks of Workstations” Sotiris Ioannidis, Athanasios E. Papathanasiou, Grigorios I. Magklis, Evangelos P. Markatos, Dionisios N. Pnevmatikatos, and Julia Sevaslidou. In Special Issue on High Performance Computing on Clusters Parallel and Distributed Computing Practices (PDCP), Vol. 2, No. 2, Nova Science Publishers, USA, February 1999.

  36. “Efficient Use of Memory Mapped Interfaces for Shared Memory Computing” Nikos Hardavellas, Galen C. Hunt, Sotiris Ioannidis, Rob Stets, Sandhya Dwarkadas, Leonidas Kontothanassis, and Michal L. Scott. In IEEE Technical Committee on Computer Architecture (TCCA), Special Issue on Distributed Shared Memory, pp. 28-33, March 1997.

Magazine Publications

  1. "Realizing Ambient Backscatter Communications with Intelligent Surfaces in 6G Wireless Systems" Christos Liaskos, Ageliki Tsioliaridou, Sotiris Ioannidis, Andreas Pitsillides, and Ian F. Akyildiz. IEEE Wireless Communications Magazine, 2022.

  2. "Next Generation Connected Materials for Intelligent Energy Propagation in Multiphysics Systems" Christos Liaskos, Ageliki Tsioliaridou, Sotiris Ioannidis, Andreas Pitsillides, and Ian F. Akyildiz. IEEE Communications Magazine, May 2021.

  3. “Accelerating Phylogenetics using FPGAs in the Cloud” Nikolaos Alachiotis, Andreas Brokalakis, Vasilis Amourgianos, Sotiris Ioannidis, Pavlos Malakonakis, and Tasos Bokalidis. IEEE Micro, Special Issue on FPGA Computing, July-August 2021.

  4. “Pairing Circular Economy and the 5G-enabled Internet of Things” Andreas Miaoudakis, Konstantinos Fysarakis, Nikolaos Petroulakis, Sofia Alexaki, George Alexandirs, Sotiris Ioannidis, George Spanoudakis, Vasilios Katos, and Christos Verikoukis. IEEE Vehicular Technology Magazine (VTM), 2020.

  5. “Using any Surface to Realize a New Paradigm for Wireless Communications” Christos Liaskos, Ageliki Tsioliaridou, Andreas Pitsillides, Sotiris Ioannidis, and Ian Akyildiz. Communications of the ACM, vol. 61, no. 11, pages 30-33, November 2018.

  6. “A New Wireless Communication Paradigm through Software-controlled Metasurfaces” Christos Liaskos, Shuai Nie, Ageliki Tsioliaridou, Andreas Pitsillides, Sotiris Ioannidis, and Ian Akyildiz. IEEE Communications Magazine, vol 56, issue 9, pages 162-169, September 2018.

  7. “Design and Development of Software Defined Metamaterials for Nanonetworks” Christos Liaskos, Ageliki Tsioliaridou, Andreas Pitsillides, Ian Akyildiz, Nikolaos Kantartzis, Antonios Lalas, Xenofontas Dimitropoulos, Sotiris Ioannidis, Maria Kafesaki, and Costas Soukoulis. In IEEE Circuits and Systems Magazine, vol. 15, no. 4, pp. 12-25, November 2015.

  8. “Understanding the Behavior of Malicious Applications in Social Networks” Andreas Makridakis, Elias Athanasopoulos, Spiros Antonatos, Demetres Antoniades, Sotiris Ioannidis, and Evangelos P. Markatos. In IEEE Network, vol. 24, no. 5, pp. 14-19, September-October 2010.

Peer-reviewed Conference Proceedings


  1. “Identification of Twitter Bots Based on an Explainable Machine Learning Framework: The US 2020 Elections Case Study” Alexander Shevtsov, Despoina Antonakaki, Christos Tzagkarakis, Dimitris Mavroidis, and Sotiris Ioannidis. In Proceedings of the AAAI International Conference on Web and Social Media (ICWSM), Atlanta, Georgia, USA, June 2022.

  2. “Demo: Detecting Third-Party Library Problems with Combined Program Analysis” Grigoris Ntousakis, Sotiris Ioannidis, and Nikos Vasilakis. In Proceedings of the ACM/SIGSAC Conference on Computer and Communications Security (CCS), Seul, Republic of Korea, November 2021 (demo and poster).

  3. “This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration” Michalis Diamantaris, Serafeim Moustakas, Lichao Sun, Sotiris Ioannidis, and Jason Polakis. In Proceedings of the ACM/SIGSAC Conference on Computer and Communications Security (CCS), Seul, Republic of Korea, November 2021.

  4. “Andromeda: Enabling Secure Enclaves For The Android Ecosystem” Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, and Sotiris Ioannidis. In Proceedings of the 24th Information Security Conference (ISC), Indonesia, November 2021.

  5. “MARVEL: Multimodal Extreme Scale Data Analytics for Smart Cities Environments” Dragana Bajovic et al. In Proceedings of the 4th International Balkan Conference on Communications and Networking, Novi Sad, Serbia. September 2021.

  6. “A Hardware Implementation of BitSurfing for Communication without Packet Creation” Dimitris Karagounis, Christos Liaskos, Ageliki Tsioliaridou, and Sotiris Ioannidis. In Proceedings of the 8th ACM International Conference on Nanoscale Computing and Communication (NanoCom), Catania, Italy. September 2021.

  7. “Cybersecurity in the Era of Digital Transformation: The case of Greece” Leandros Maglaras, George Drivas, Nestoras Chouliaras, Eerke Boiten, Costas Lambrinoudakis, and Sotiris Ioannidis. In Proceedings of the ΙΕΕΕ International Conference on Internet of Things and Intelligent Applications (ITIA), Zhenjiang China, November 2020.

  8. “The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws” Kostas Drakonakis, Sotiris Ioannidis, and Jason Polakis. In Proceedings of the ACM/SIGSAC Conference on Computer and Communications Security (CCS), online, November 2020.

  9. “Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures” Eva Papadogiannaki, Dimitris Deyannis, and Sotiris Ioannidis. In Proceedings of the IEEE International Conference on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD), Pisa, Italy, September 2020.

  10. “The Million Dollar Handshake: Secure and Attested Communications in the Cloud” Nikolaos Chalkiadakis, Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, and Sotiris Ioannidis. In Proceedings of the IEEE International Conference on Cloud Computing (CLOUD), Beijing, China, October 2020.

  11. “Integration of an online voting solution with the SMESEC security framework” Jordi Cucurull, Christos Tselios, Carolina Rueda, Noemi Folch, Fady Copty, Reda Igbaria, Manos Athanatos, Antonios Krithinakis, Sotiris Ioannidis, Jose Francisco Ruiz, and Pablo Barrientos. In Proceedings of the IEEE International Systems Conference (SysCon), Montreal, Canada, August 2020.

  12. "Automated Mortality Prediction in Critically-ill Patients with Thrombosis using Machine Learning" Vasiliki Danilatou, Despoina Antonakaki, Christos Tzagkarakis, Alexandros Kanterakis, Vasilios Katos and Theodoros Kostoulas.2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE), Cincinnati, OH, 2020, pp. 247-254, August 2020.

  13. “Pythia: Scheduling of Concurrent Network Packet Processing Applications on Heterogeneous Devices” Giannis Giakoumakis, Eva Papadogiannaki, Giorgos Vasiliadis, and Sotiris Ioannidis. In Proceedings of the IEEE Conference on Network Softwarization (NETSOFT), Ghent, Belgium, June-July 2020 (short paper).

  14. “Mobility-aware Beam Steering in Metasurface-based Programmable Wireless Environments” Christos Liaskos, Shuai Nie, Ageliki Tsioliaridou, Andreas Pitsillides, Sotiris Ioannidis, and Ian Akyildiz. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Barcelona, Spain, May 2020.

  15. “TrustAV: Practical and privacy preserving malware analysis in the cloud” Dimitris Deyannis, Eva Papapdogiannaki, George Kalivianakis, Giorgos Vasiliadis, and Sotiris Ioannidis. In Proceedings of the 10th ACM Conference on Data Application Security and Privacy (CODASPY), New Orleans LA, USA, March 2020.

  16. “Secure Semantic Interoperability for IoT Applications with Linked Data” George Hatzivasilis, Othonas Soultatos, Eftychia Lakka, Sotiris Ioannidis, Darko Anicic, Arne Broring, Konstantinos Fysarakis, George Spanoudakis, Mirko Falchetto, and Lukasz Ciechomski. In Proceedings of the IEEE Global Communications Conference - Communication and Information System Security Symposium (GLOBECOM CISS), Waikoloa, HI, USA, December 2019.

  17. “Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Healthcare Organizations” George Hatzivasilis, Panos Chatziadam, Nikos Petroulakis, Sotiris Ioannidis, Matteo Mangini, Christos Kloukinas, Artsiom Yautsiukhin, Michalis Antoniou, Dimitrios G. Katehakis, and Marios Panayiotou. In Proceedings of the IEEE International Conference on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus, September 2019.

  18. “Towards Configurable Vulnerability Assessment in the Cloud” Kyriakos Kritikos, Manos Papoutsakis, Sotiris Ioannidis, and Kostas Magoutis. In Proceedings of the IEEE International Conference on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus, September 2019.

  19. “Using blockchains to enable Big Data analysis of private information” Kostas Lampropoulos, Giorgios Georgakakos, and Sotiris Ioannidis. In Proceedings of the IEEE International Conference on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus, September 2019.

  20. “Pattern-driven Security, Privacy, Dependability and Interoperability management of IoT environments” Othonas Soulatos, Manos Papoutsakis, Konstantinos Fysarakis, George Hatzivasilis, Manolis Michalodimitrakis, George Spanoudakis, and Sotiris Ioannidis. In Proceedings of the IEEE International Conference on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus, September 2019.

  21. “ABSense: Sensing Electromagnetic Waves on Metasurfaces via Ambient Compilation of Full Absorption” Christos Liaskos, Georgios G. Pyrialakos, Alexandros Pitilakis, Sergi Abadal, Ageliki Tsioliaridou, Anna Tasolamprou, Odysseas Tsilipakos, Odysseas Tsilipakos, Nikolaos V. Kantartzis, Sotiris Ioannidis, Eduard Alarcón, Albert Cabellos-Aparicio, Maria Kafesaki, Andreas Pitsillides, Kypros Kossifos, Julius Georgiou, and Ian F. Akyildiz. In Proceedings of the 6th ACM International Conference on Nanoscale Computing and Communication (NanoCom), Dublin, Ireland. September 2019.

  22. “TALON: An Automated Framework for Cross-Device Tracking Detection” Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, and Nicolas Kourtellis. In Proceedings of the 22nd International Symposium on Research on Attacks, Intrusions, and Defenses (RAID), Beijing, China, September 2019.

  23. “The Software-Defined Metasurfaces Concept and Electromagnetic Aspects” Anna C. Tasolamprou, Alexandros Pitilakis, Odysseas Tsilipakos, Christos Liaskos, Angeliki Tsiolaridou, Fu Liu, X. Wang, Mohammad Sajjad Mirmoosa, Kypros Kossifos, Julius Georgiou, Andreas Pitsilides, Nikolaos V. Kantartzis, Dionysios Manessis, Sotiris Ioannidis, George Kenanakis, George Deligeorgis, Eleftherios N. Economou, Sergei A. Tretyakov, Costas M. Soukoulis, and Maria Kafesaki. In Proceedings of the 10th International Conference on Metamaterials, Photonic Crystals and Plasmonics (META), Lisbon, July 2019.

  24. “Towards Specification of a Software Architecture for Cross-Sectoral Big Data Applications” Ioannis Arapakis, Yolanda Becerra, Omer Boehm, George Bravos, Vassilis Chatzigiannakis, Cesare Cugnasco, Giorgos Demetriou, Iliada Eleftheriou, Julien Etienne Mascolo, Lidija Fodor, Sotiris Ioannidis, Dusan Jakovetic, Leonidas Kallipolitis, Evangelia Kavakli, Despina Kopanaki, Nicolas Kourtellis, Mario Maawad Marcos, Ramon Martin de Pozuelo, Nemanja Milosevic, Giuditta Morandi, Enric Pages Montanera, Gerald Ristow, Rizos Sakellariou, Raul Sirvent, Srdjan Skrbic, Ilias Spais, Giorgos Vasiliadis, and Michael Vinov. In Proceedings of the 2019 IEEE World Congress on Services (SERVICES), Milan, Italy, July 2019.

  25. “Cyber Security Assessment of the Public Sector in Greece” George Drivas, Leandros Maglaras, Helge Janicke, and Sotiris Ioannidis. In Proceedings of the 18th European Conference on Cyber Warfare and Security (ECCWS), Coimbra, Portugal, July 2019.

  26. “Botnet Attack Detection at the IoT Edge Based on Sparse Representation” Christos Tzagkarakis, Nikolaos Petroulakis, and Sotiris Ioannidis. In Proceedings of the Global IoT Summit (GIoTS), Aarhus, Denmark, June 2019.

  27. “A Large-scale Study on the Risks of the HTML5 WebAPI for Mobile Sensor-based Attacks” Francesco Marcantoni, Michalis Diamantaris, Sotiris Ioannidis, and Jason Polakis. In Proceedings of the 2019 World Wide Web Conference (WWW), San Francisco, CA, USA, May 2019

  28. “REAPER: Real-time App Analysis for Augmenting the Android Permission System” Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, and Jason Polakis. In Proceedings of the 9th ACM Conference on Data Application Security and Privacy (CODASPY), Dallas TX, USA, March 2019.

  29. “Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation” Panagiotis Papadopoulos, Panagiotis Ilia, Michalis Polychronakis, Evangelos Markatos, Sotiris Ioannidis, and Giorgos Vasiliadis. In Proceedings of the Network and Distributed Systems Security (NDSS) Symposium, San Diego CA, USA, February 2019.

  30. “Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta) Data” Kostas Drakonakis, Panagiotis Ilia, Sotiris Ioannidis, and Jason Polakis. In Proceedings of the Network and Distributed Systems Security (NDSS) Symposium, San Diego CA, USA, February 2019.

  31. “I-BiDaaS: Industrial-Driven Big Data as a Self-Service Solution” Giorgos Vasiliadis, Dusan Jakovetic, Ilias Spais, and Sotiris Ioannidis. In Proceedings of the 7th European Conference on Service-Oriented and Cloud Computing (ESOCC), Como, Italy, September 2018.

  32. “BitSurfing: Wireless Communications with Outsourced Symbol Generation” Ageliki Tsioliaridou, Christos Liaskos, and Sotiris Ioannidis. In Proceedings of the IEEE International Conference on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD), Barcelona, Spain, September 2018.

  33. “Towards a Circular Economy via Intelligent Metamaterials” Ageliki Tsioliaridou, Christos Liaskos, and Sotiris Ioannidis. In Proceedings of the IEEE International Conference on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD) - Special Session on Data-driven Circular Economy, Barcelona, Spain, September 2018.

  34. “Software-Defined Metasurface Paradigm: Concept, Challenges, Prospects” Alexandros Pitilakis, Anna Tasolamprou, Christos Liaskos, Fu Liu, Odysseas Tsilipakos, X. Wang, Mohammad Sajjad Mirmoosa, Kypros Kossifos, Julius Georgiou, Andreas Pitsillides, Nikolaos V. Kantartzis, Sotiris Ioannidis, Eleftherios Economou, Maria Kafesaki, Sergei A. Tretyakov, Costas Soukoulis. In 12th International Congress on Artificial Materials for Novel Wave Phenomena, METAMATERIALS - Special Session, Espoo, Finland. August 2018.

  35. “Realizing Wireless Communication through Software-defined HyperSurface Environments” Christos Liaskos, Shuai Nie, Ageliki Tsioliaridou, Andreas Pitsillides, Sotiris Ioannidis, and Ian Akyildiz. In Proceedings on the 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Chania, Greece, June 2018.

  36. “A Large-scale Analysis of Content Modification by Open HTTP Proxies” Giorgos Tsirantonakis, Panagiotis Ilia, Sotiris Ioannidis, Elias Athanasopoulos, Michalis Polychronakis. In Proceedings of the Network and Distributed Systems Security (NDSS) Symposium, San Diego, USA, February 2018.

  37. “No sugar but all the taste! Memory Encryption without Architectural Support” Panagiotis Papadopoulos, George Christou, Giorgos Vasiliadis, Evangelos Markatos, and Sotiris Ioannidis. In Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), Oslo, Norway, September 2017.

  38. “A Novel Protocol for Network-Controlled Metasurfaces” Ageliki Tsioliaridou, Christos Liaskos, Andreas Pitsillides, and Sotiris Ioannidis. In Proceedings of the 4th ACM International Conference on Nanoscale Computing and Communication (NanoCom), Washington, DC, USA. September 2017.

  39. “Reveal: Fine-grained Recommendations in Online Social Networks” Markos Aivazoglou, Antonios Roussos, Sotiris Ioannidis, Dimitris Spiliotopoulos, and Jason Polakis. In Proceedings of the 9th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Sydney, Australia, July 2017.

  40. “The Socket Store: An App Model for the Application-Network Interaction” Ageliki Tsioliaridou, Christos Liaskos, and Sotiris Ioannidis. In Proceedings of the 22nd IEEE Symposium on Computers and Communication (ISCC), Heraklion, Greece, July 2017.

  41. “The Long-Standing Privacy Debate: Mobile Websites vs. Mobile Apps” Elias P. Papadopoulos, Michalis Diamantaris, Panagiotis Papadopoulos, Thanasis Petsas, Sotiris Ioannidis, and Evangelos P. Markatos. In Proceedings of the 26th International World Wide Web Conference (WWW), Perth, Australia, April 2017 (Best Paper Honorable Mention Award).

  42. “SAMPAC: Socially-Aware collaborative Multi-Party Access Control” Panagiotis Ilia, Barbara Carminati, Elena Ferrari, Paraskevi Fragopoulou, and Sotiris Ioannidis. In Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY), Scottsdale, AZ, USA, March 2017.

  43. “On the Effectiveness of Snapshot-based Kernel Integrity Monitors” Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 19th International Symposium on Research on Attacks, Intrusions, and Defenses (RAID), Evry, France, September 2016.

  44. “Stateless Linear-path Routing for 3D Nanonetworks” Ageliki Tsioliaridiou, Christos Liaskos, Eugen Dedu, and Sotiris Ioannidis. In Proceedings of the 3rd ACM International Conference on Nanoscale Computing and Communications (NanoCom), New York City, NY, USA, September 2016.

  45. “Investigating the complete corpus of Referendum and Elections tweets” Despoina Antonakaki, Dimitris Spiliotopoulos, Christos Samaras, Sotiris Ioannidis and Paraskevi Fragopoulou. In Proceedings of the 8th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), San Francisco, CA, USA, August 2016.

  46. “Usability Evaluation of Accessible Complex Graphs” Dimitris Spiliotopoulos, Despoina Antonakaki, Sotiris Ioannidis, and Paraskevi Fragopoulou. Proceedings of the 15th International Conference on Computers Helping People with Special Needs (ICCHP), Linz, Austria, July 2016.

  47. “Motivation Effect of Social Media Posts about Well-being and Healthy Living” Dimitris Spiliotopoulos, Despoina Antonakaki, Sotiris Ioannidis, and Paraskevi Fragopoulou. Proceedings of the 9th ACM International Conference on Pervasive Technologies Related to Assistive Environments (PETRA), Corfu, Greece, June 2016.

  48. “N3: Addressing and Routing in 3D Nanonetworks” Ageliki Tsioliaridou, Christos Liaskos, Lefteris Pachis, Sotiris Ioannidis, and Andreas Pitsillides. In Proceedings of the International Conference on Telecommunications (ICT), Thessaloniki, Greece, May 2016 (Best Paper Award).

  49. “A Deployable Routing System for Nanonetworks” Christos Liaskos, Ageliki Tsioliaridou, Sotiris Ioannidis, Nikolaos Kantartzis, and Andreas Pitsillides. In Proceedings of the IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, May 2016.

  50. “HCFI: Hardware-enforced Control Flow Integrity” Nick Christoulakis, George Christou, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY), New Orleans, LA, USA, March 2016 (Outstanding Paper Award).

  51. “Secure Software-Hardware Architectures for Robust Computing Systems” Elias Athanasopoulos, Martin Boehner, Sotiris Ioannidis, Cristiano Giuffrida, Dmitry Pidan, Vassilis Prevelakis, Ioannis Sourdis, Christos Strydis, and John Thomson. In Proceedings of the 6th International Conference on e-Democracy - Citizen Rights in the World of the New Computing Paradigms, Athens, Greece, December 2015.

  52. “Face/Off: Preventing Privacy Leakage From Photos in Social Networks” Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. In Proceedings of the 22nd ACM/SIGSAC Conference on Computer and Communications Security (CCS), Denver, CO, USA, November 2015.

  53. “Enhancing the Trustworthiness of Service On-demand Systems via Smart Vote Filtering” Christos V. Samaras, Ageliki Tsioliaridou, Christos Liaskos, Dimitris Spiliotopoulos, and Sotiris Ioannidis. In Proceedings of the 8th International Conference on Trust and Trustworthy Computing (TRUST), Heraklion, Crete, Greece, September 2015.

  54. “Trust and Trustworthiness Maintenance: From Architecture to Evaluation” Micha Moffie, Abigail Goldsteen, Willis Chen, Thorsten Weyer, Sotiris Ioannidis, and Costas Kalogiros. In Proceedings of the 8th International Conference on Trust and Trustworthy Computing (TRUST), Heraklion, Crete, Greece, September 2015 (short paper and poster).

  55. “GPU-Disasm: A GPU based x86 Disassembler” Evangelos Ladakis, Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis, and Georgios Portokalidis. Proceedings of the 18th Information Security Conference (ISC), Trondheim, Norway, September 2015.

  56. “CORONA: A Coordinate and Routing system for Nanonetworks” Ageliki Tsioliaridiou, Christos Liaskos, Sotiris Ioannidis, and Andreas Pitsillides. In Proceedings of the 2nd ACM International Conference on Nanoscale Computing and Communications (NanoCom), Boston, Massachusetts, USA, September 2015.

  57. “Revealing the Relationship Network Behind Link Spam” Apostolis Zarras, Antonis Papadogiannakis, Sotiris Ioannidis, and Thorsten Holz. In Proceedings of the 13th Conference on Privacy, Security and Trust (PST), Izmir, Turkey, July 2015.

  58. “Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software” Iasonas Polakis, Michalis Diamantaris, Thanasis Petsas, Federico Maggi, and Sotiris Ioannidis. In Proceedings of the 12th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Milano, Italy, July 2015.

  59. “The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines” Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Giorgos Portokalidis, and Sotiris Ioannidis. In Proceedings of the Network and Distributed Systems Security (NDSS) Symposium, San Diego, USA, February 2015.

  60. “PixelVault: Using GPUs for Securing Cryptographic Operations” Giorgos Vasiliadis, Elias Athanasopoulos, Michalis Polychronakis, and Sotiris Ioannidis. In Proceedings of the 21st ACM/SIGSAC Conference on Computer and Communications Security (CCS), Scottsdale, AZ, USA, November 2014.

  61. “Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication” Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, and Angelos Keromytis. In Proceedings of the 21st ACM/SIGSAC Conference on Computer and Communications Security (CCS), Scottsdale, AZ, USA, November 2014.

  62. “Flying Memcache: Lessons Learned from Different Acceleration Strategies” Dimitris Deyannis, Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 2014 IEEE Symposium on Computer Architecture and High Performance Computing (SBAC-PAD), Paris, France, October 2014.

  63. “Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware Architectures” Lazaros Koromilas, Giorgos Vasiliadis, Ioannis Manousakis, and Sotiris Ioannidis. In Proceedings of the 2014 ACM/IEEE Symposium on Architectures for Networking and Communication Systems (ANCS), Marina del Rey, CA, USA, October 2014.

  64. “Securing Legacy Code with the TRACER Platform” Kostantinos Stroggylos, Dimitris Mitropoulos, Zacharias Tzermias, Panagiotis Papadopoulos, Fotios Rafailidis, Diomidis Spinellis, Sotiris Ioannidis, and Panagiotis Katsaros. In Proceedings of the 18th Panhellenic Conference on Informatics (PCI), Athens, Greece, October 2014.

  65. “GASPP: A GPU-Accelerated Stateful Packet Processing Framework” Giorgos Vasiliadis, Lazaros Koromilas, Michalis Polychronakis, and Sotiris Ioannidis. In Proceedings of the 2014 USENIX Annual Technical Conference (ATC), Philadelphia, PA, USA, June 2014.

  66. “TRACER: A Platform for Securing Legacy Code” Kostantinos Stroggylos, Dimitris Mitropoulos, Zacharias Tzermias, Panagiotis Papadopoulos, Fotios Rafailidis, Diomidis Spinellis, Sotiris Ioannidis, and Panagiotis Katsaros. In Proceedings of the 7th International Conference on Trust and Trustworthy Computing (TRUST), Heraklion, Crete, Greece, June 2014.

  67. “AndRadar: Fast Discovery of Android Applications in Alternative Markets” Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, and Sotiris Ioannidis. In Proceedings of the 11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), London, UK, July 2014.

  68. “Privacy Risks from Public Data Sources” Zacharias Tzermias, Vassilis Prevelakis, and Sotiris Ioannidis. In Proceedings of the 29th IFIP International Information Security and Privacy Conference (SEC), Marrakech, Morocco, June 2014.

  69. “ASIST: Architectural Support for Instruction Set Randomization” Antonis Papadogiannakis, Laertis Loutsis, Vassilis Papaefstathiou, and Sotiris Ioannidis. In Proceedings of the 20th ACM/SIGSAC Conference on Computer and Communications Security (CCS), Berlin, Germany, November 2013.

  70. “All Your Face Are Belong to Us: Breaking Facebook's Social Authentication” Jason Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, Sotiris Ioannidis, Angelos D. Keromytis, and Stefano Zanero. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC), Orlando, FL, USA, December 2012.

  71. “Digging up Social Structures from Documents on the Web” Eleni Gessiou, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos, and Sotiris Ioannidis. In Proceedings of the IEEE Communication and Information System Security Symposium (Globecom CISS), Anaheim, CA, USA, December 2012.

  72. “Towards a Universal Data Provenance Framework using Dynamic Instrumentation” Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, and Sotiris Ioannidis. In Proceedings of the 27th IFIP International Information Security and Privacy Conference (SEC), Heraklion, Crete, Greece, June 2012.

  73. Parallelization and Characterization of Pattern Matching using GPUs” Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. In Proceedings of the 2011 IEEE International Symposium on Workload Characterization (IISWC), Austin, TX, USA, November 2011.

  74. “MIDeA: A Multi-Parallel Intrusion Detection Architecture” Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. In Proceedings of the 18th ACM/SIGSAC Conference on Computer and Communications Security (CCS), Chicago, IL, USA, October 2011.

  75. “IRILD: An Information Retrieval Based Method for Information Leak Detection” Eleni Gessiou, Quang Hieu Vu, and Sotiris Ioannidis. In Proceedings of the 7th European Conference on Computer and Network Defense (EC2ND), Goteborg, Sweden, September 2011.

  76. “we.b: The Web of Short URLs” Demetres Antoniades, Iasonas Polakis, Georgios Kontaxis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos Markatos, and Thomas Karagiannis. In Proceedings of the 20th International World Wide Web Conference (WWW), Hyderabad, India, March 2011.

  77. “Security and Privacy Architectures for Biomedical Cloud Computing” Vasiliki Danilatou and Sotiris Ioannidis. In Proceedings of the 10th IEEE International Conference on Information Technology and Applications in Biomedicine (ITAB), Corfu, Greece, November 2010.

  78. “GPU-assisted Malware” Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. In Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software (MALWARE), Nancy, France, October 2010.

  79. “D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks” Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, and Evangelos P. Markatos. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS), Athens, Greece, September 2010.

  80. “GrAVity: A Massively Parallel Antivirus Engine” Giorgos Vasiliadis and Sotiris Ioannidis. In Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID), Ottawa, Ontario, Canada, September 2010.

  81. “HoneyLab: Large-scale Honeypot Deployment and Resource Sharing” Periklis Akritidis, W. Y. Chin, Evangelos Markatos, Sotiris Ioannidis, Spiros Antonatos, and Kostas Anagnostakis. In Proceedings of the 3rd International Conference on Network and Systems Security (NSS), Gold Coast, Australia, October 2009.

  82. “Regular Expression Matching on Graphics Hardware for Intrusion Detection” Giorgos Vasiliadis, Spiros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, and Sotiris Ioannidis. In Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (RAID), Saint-Malo, France, September 2009.

  83. “Gnort: High Performance Network Intrusion Detection Using Graphics Processors” Giorgos Vasiliadis, Spiros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, and Sotiris Ioannidis. In Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID), pp. 116-134, Boston, MA, USA, September 2008.

  84. “Antisocial Networks: Turning a Social Network into a Botnet” Elias Athanasopoulos, Andreas Makridakis, Spiros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, and Evangelos P. Markatos. In Proceedings of the 11th Information Security Conference (ISC), Taipei, Taiwan, September 2008.

  85. “Compromising Anonymity Using Packet Spinning” Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, and Evangelos P. Markatos. In Proceedings of the 11th Information Security Conference (ISC), Taipei, Taiwan, September 2008.

  86. “Future Threats to Future Trust” Herbert Bos, Sotiris Ioannidis, Erland Jonsson, Engin Kirda, and Christopher Kruegel. In Proceedings of the 1st International Conference Future of Trust in Computing, Berlin, Germany, July 2008.

  87. “Distributed Privacy-Preserving Policy Reconciliation” Ulrike Meyer, Susanne Wetzel, and Sotiris Ioannidis. In Proceedings of the IEEE International Conference on Communications (ICC), Glasgow, UK, June 2007.

  88. “Preserving TCP Connections Across Host Address Changes” Vassilis Prevelakis and Sotiris Ioannidis. In Proceedings of the 9th Information Security Conference (ISC), Samos, Greece, August-September 2006.

  89. “Robust Reactions to Potential Day-Zero Worms through Cooperation and Validation” Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, and Angelos D. Keromytis. In Proceedings of the 9th Information Security Conference (ISC), Samos, Greece, August-September 2006.

  90. “On the Impact of Practical P2P Incentive Mechanisms on User Behavior” Kostas Anagnostakis, Fotios Harmantzis, Sotiris Ioannidis, and Manaf Zghaibeh. In Proceedings of the NET Institute Conference, New York, NY, USA, 2006.

  91. “Managing Access Control in Large Scale Heterogeneous Networks” Angelos D. Keromytis, Kostas G. Anagnostakis, Sotiris Ioannidis, Michael Greenwald, and Jonathan M. Smith. In Proceedings of the NATO C3 Symposium on Interoperable Networks for Secure Communications (INSC), The Hague, The Netherlands, November 2003.

  92. “A Cooperative Immunization System for an Untrusting Internet” Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis, and Dekai Li. In Proceedings of the 11th IEEE International Conference on Networks (ICON), pp. 403-408, Sydney, Australia, October 2003.

  93. “TAPI: Transactions for Accessing Public Infrastructure” Matt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, and Vassilis Prevelakis. In Proceedings of the 8th IFIP Personal Wireless Communications (PWC) Conference, Venice, Italy, September 2003.

  94. “Secure and Flexible Global File Sharing” Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, and Jonathan M. Smith. In Proceedings of the USENIX Annual Technical Conference, Freenix Track, pp. 165-178, San Antonio, TX, USA, June 2003.

  95. “The STRONGMAN Architecture” Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, and Jonathan M. Smith. In Proceedings of the Third DARPA Information Survivability Conference and Exposition (DISCEX III), Washington DC, USA, April 2003.

  96. “Open Packet Monitoring on FLAME: Safety, Performance and Applications” Kostas G. Anagnostakis, Michael Greenwald, Sotiris Ioannidis, and Stefan Miltchev. In Proceedings of the 4th IFIP International Working Conference on Active Networks (IWAN), pp. 120-131, Zurich, Switzerland, December 2002.

  97. “A Study of the Relative Costs of Network Security Protocols” Stefan Miltchev, Sotiris Ioannidis, and Angelos D. Keromytis. In Proceedings of USENIX 2002 Annual Technical Conference (ATC), Freenix Track, Monterey, CA, USA, June 2002.

  98. “Fileteller: Paying and Getting Paid for File Storage” John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, and Vassilis Prevelakis. In Proceedings of Financial Cryptography (FC), Bermuda, March 2002.

  99. “Efficient Packet Monitoring for Network Management” Kostas G. Anagnostakis, Sotiris Ioannidis, Stefan Miltchev, John Ioannidis, Michael Greenwald, and Jonathan M. Smith. In Proceedings of the 8th IEEE/IFIP Network Operations and Management Symposium (NOMS), pp. 423-436, Florence, Italy, April 2002.

  100. “Practical Network Applications on a Lightweight Active Management Environment” Kostas G. Anagnostakis, Sotiris Ioannidis, Stefan Miltchev, and Jonathan M. Smith. In Proceedings of the 3rd IFIP International Working Conference on Active Networks (IWAN), pp. 101-115, Philadelphia, PA, USA, October 2001.

  101. “Building a Secure Web Browser” Sotiris Ioannidis and Steven M. Bellovin. In Proceedings of the 2001 USENIX Annual Technical Conference (ATC), Freenix Track, Boston, MA, USA, June 2001.

  102. “Implementing a Distributed Firewall” Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, and Jonathan M. Smith. In Proceedings of the ACM Computer and Communications Security (CCS), pp. 190-199, Athens, Greece, November 2000.

  103. “Scalable Resource Control in Active Networks” K. G. Anagnostakis, M. W. Hicks, S. Ioannidis, A. D. Keromytis, and J. M. Smith. In Proceedings of the 2nd IFIP International Working Conference on Active Networks (IWAN), pp. 343-357, Tokyo, Japan, October 2000.

  104. “Using Network Memory to Improve the Performance of Transaction-Based Systems” Sotiris Ioannidis, Evangelos P. Markatos, and Julia Sevaslidou. In Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA), Las Vegas, NV, USA, July 1998.

Peer-reviewed Workshop Proceedings

  1. “Modelling and Scheduling of ML Inference Workloads on CPU-GPU Integrated Architectures” Giorgos Vasiliadis, Rafael Tsirbas, and Sotiris Ioannidis. In Proceedings of the 31st International Heterogeneity in Computing Workshop (HCW), Virtual, May 2022.

  2. “A Systematic Analysis of the Event-Stream Incident” Iosif Arvanitis, Grigoris Ntousakis, Sotiris Ioannidis, and Nikos Vasilakis. In Proceedings of the 15th European Workshop on System Security (EuroSec), Renne, France, April 2022.

  3. “The THREAT-ARREST cyber ranges platform” G. Hatzivasilis, S. Ioannidis, M. Smyrlis, G. Spanoudakis, F. Frati, C. Braghin, E. Damiani, H. Koshutanski, G. Tsakirakis, T. Hildebrandt, L. Goeke, S. Pape, O. Blinder, M. Vinov, G. Leftheriotis, M. Kunc, F. Oikonomou, G. Magilo, V. Petrarolo, A. Chieti, and R. Bordianu., IEEE CSR Workshop on Cyber Ranges and Security Training (CRST), IEEE, Virtual, Greece, July, 2021.

  4. “On the Use of Programmable Metasurfaces in Vehicular Networks” Taqwa Saeed, Hamidreza Taghvaee, Ehizogie Emoyon-iredia, Waqar Aziz, Sergi Abadal, Andreas Pitsillides, Vasos Vassiliou, Christos Liaskos, Ageliki Tsioliaridou, Sotiris Ioannidis, Ian F. Akyildiz, Marios Lestas, " In Proceedings of IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Lucca, Italy, September 2021.

  5. “A pattern–driven adaptation in IoTorchestrations to guarantee SPDI properties” Manos Papoutsakis, Konstantinos Fysarakis, Emmanouil Michalodimitrakis, Eftychia Lakka, Nikolaos Petroulakis, George Spanoudakis, and Sotiris Ioannidis. In Proceedings of the International Workshop on Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), Surrey, UK, September 2020.

  6. “Advanced Physical-layer Security as an App in Programmable Wireless Environments” Fotios Mathioudakis, Christos Liaskos, Ageliki Tsioliaridou, Shuai Nie, Andreas Pitsillides, Sotiris Ioannidis, and Ian Akyildiz. In Proceedings of the 21st IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Atlanta, Georgia, USA, May 2020.

  7. “An Enclave Assisted Snapshot-based Kernel Integrity Monitor” Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, and Sotiris Ioannidis. In Proceedings of the 3rd International Workshop on Edge Systems, Analytics and Networking (EdgeSys), Heraklion, Greece, April 2020.

  8. “Towards the Insurance of Healthcare Systems” George Hatzivasilis, Panos Chatziadam, Andreas I. Miaoudakis, Eftychia Lakka, Sotiris Ioannidis, Alessia Alessio, Michail Smyrlis, George Spanoudakis, Artsiom Yautsiukhin, Michalis Antoniou, and Nikos Stathiakis. In Proceedings of the International Workshop on Information & Operational Technology (IT & OT) security systems (IOSec), Luxembourg City, Luxemburg, September 2019.

  9. “You Shall Not Register! Detecting Privacy Leaks across Registration Forms” Manolis Chatzimpyrros, Konstantinos Solomos, and Sotiris Ioannidis. In Proceedings of the International Workshop on Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), Luxembourg City, Luxemburg, September 2019.

  10. “An Interpretable Neural Network for Configuring Programmable Wireless Environments” Christos Liaskos, Ageliki Tsioliaridou, Shuai Nie, Andreas Pitsillides, Sotiris Ioannidis, and Ian Akyildiz. In Proceedings of the 20th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes, France, July 2019.

  11. “The CE-IoT Framework for Green ICT Organizations: The interplay of CE-IoT as an enabler for green innovation and e-waste management in ICT” George Hatzivasilis, Nikos Christodoulakis, Christos Tzagkarakis, Sotiris Ioannidis, Konstantinos Fysarakis, Giorgos Demetriou, and Marios Panayiotou. In Proceedings of the 1st International Workshop on Smart Circular Economy (SmaCE), Santorini Island, Greece, May 2019.

  12. “Organizing Network Management Logic with Circular Economy Principles” Christos Liaskos, Ageliki Tsioliaridou, and Sotiris Ioannidis. In Proceedings of the 1st International Workshop on Smart Circular Economy (SmaCE), Santorini Island, Greece, May 2019.

  13. “Review of Security and Privacy for the Internet of Medical Things (IoMT)” George Hatzivasilis, Othonas Soultatos, Sotiris Ioannidis, Christos Verikoukis, Giorgos Demetriou, and Christos Tsatsoulis. In Proceedings of the 1st International Workshop on Smart Circular Economy (SmaCE), Santorini Island, Greece, May 2019.

  14. “Joint Compressed Sensing and Manipulation of Wireless Emissions with Intelligent Surfaces” Christos Liaskos, Ageliki Tsioliaridou, Alexandros Pitilakis, George Pirialakos, Odysseas Tsilipakos, Anna Tasolamprou, Nikolaos Kantartzis, Sotiris Ioannidis, Maria Kafesaki, Andreas Pitsillides, and Ian Akyildiz. In Proceedings of the International Workshop on IoT Applications and Industry 4.0 (IoTI4), Santorini, Greece, May 2019.

  15. “Towards Configurable Cloud Application Security” Kyriakos Kritikos, Manos Papoutsakis, Sotiris Ioannidis, and Kostas Magoutis. In Proceedings of the 6th Workshop of CrossCloud Infrastructures and Platforms (CrossCloud), Larnaka, Cyprus, May 2019.

  16. “Automated Measurements of Cross-Device Tracking” Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, and Nicolas Kourtellis. In Proceedings of the 3rd CIPSEC Workshop (IOSec), Heraklion, Crete, Greece, September 2018.

  17. “Enabling GPU-assisted Antivirus Protection on Android Devices through Edge Offloading” Dimitris Deyannis, Raphael Tsirbas, Giorgos Vasiliadis, Raphaelle Montella, Sokol Kosta, and Sotiris Ioannidis. In Proceedings of the 1st International Workshop on Edge Systems, Analytics and Networking (EdgeSys), Munich, Germany, June 2018.

  18. “Towards Model-Driven Application Security across Clouds” Manos Papoutsakis, Kyriakos Kritikos, Kostas Magoutis, and Sotiris Ioannidis. In Proceedings of the 5th Workshop on CrossCloud Infrastructures and Platforms (CrossCloud), Porto, Portugal, April 2018.

  19. “Social Forensics: Searching for Needles in Digital Haystacks” Iasonas Polakis, Panagiotis Ilia, Zacharias Tzermias, Sotiris Ioannidis, and Paraskevi Fragopoulou. In Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns on Security (BADGERS), Kyoto, Japan, November 2015.

  20. “Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption” Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 8th European Workshop on System Security (EuroSec), Bordeaux, France, April 2015.

  21. “A Tool for Monitoring and Maintaining System Trustworthiness at Runtime” Abigail Goldsteen, Micha Moffie, Torsten Bandyszak, Nazila Gol Mahammadi, Xiaoyu Chen, Symeon Meichanetzoglou, Sotiris Ioannidis, and Panos Chatziadam. In Proceedings of the 1st International Workshop on Requirements for Self-Adaptive and Cyber Physical Systems (RESACS), March 2015.

  22. “Think before RT: An Experimental Study of Abusing Twitter Trends” Despoina Antonakaki, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, and Paraskevi Fragopoulou. In Proceedings of the 1st Workshop on Social Influence (SI), Barcelona, Spain, November 2014.

  23. “Rage Against the Virtual Machine: Hindering Dynamic Analysis of Mobile Malware” Thanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Michalis Polychronakis, and Sotiris Ioannidis. In Proceedings of the 7th European Workshop on System Security (EuroSec), Amsterdam, The Netherlands, April 2014.

  24. “Practical Information Flow for Legacy Web Applications” Georgios Chinis, Polyvios Pratikakis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 8th International Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems (ICOOOLPS), pp. 17-28, Montpellier, France, July 2013.

  25. “You Can Type, but You Can't Hide: A Stealthy GPU-based Keylogger” Evangelos Ladakis, Lazaros Koromilas, Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. In Proceedings of the 6th European Workshop on System Security (EuroSec), Prague, Czech Republic, April 2013.

  26. “CensMon: A Web Censorship Monitor” Andreas Sfakianakis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 1st USENIX Workshop on Free and Open Communications on the Internet (FOCI), co-located with the 20th USENIX Security Symposium, San Francisco, CA, USA, August 2011.

  27. “CAPTCHuring Automated (Smart) Phone Attacks” Iasonas Polakis, Georgios Kontaxis, and Sotiris Ioannidis. In Proceedings of the 1st Workshop on Systems Security (SysSec), co-located with the 8th conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Amsterdam, Netherlands, July 2011.

  28. “Outsourcing Malicious Infrastructure to the Cloud” Georgios Kontaxis, Iasonas Polakis, and Sotiris Ioannidis. In Proceedings of the 1st Workshop on Systems Security (SysSec), co-located with the 8th conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Amsterdam, Netherlands, July 2011.

  29. “Dynamic Monitoring of Dark IP Address Space” Iasonas Polakis, Giorgos Kontaxis, Sotiris Ioannidis, and Evangelos Markatos. In Proceedings of the 3rd COST International Workshop on Traffic Monitoring and Analysis (TMA), Vienna, Austria, April 2011 (short paper and poster).

  30. “Detecting Social Network Profile Cloning” Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis, and Evangelos Markatos. In Workshop Proceedings of the 9th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Seattle, WA, USA, March 2011.

  31. “A Greek (Privacy) Tragedy: The Introduction of Social Security Numbers in Greece” Eleni Gessiou, Alexandros Labrinidis, and Sotiris Ioannidis. In Proceedings of the 8th ACM CCS Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA, November 2009.

  32. “Controlling Access to XML Documents over XML Native and Relational Databases” Lazaros Koromilas, George Chinis, Irini Fundulaki and Sotiris Ioannidis. In Proceedings of the 6th VLDB Workshop on Secure Data Management (SDM), Lyon, France, August 2009.

  33. “Honey@home: A New Approach to Large-Scale Threat Monitoring” Sotiris Antonatos, Manos Athanatos, Georgios Kontaxis, John Velegrakis, Nikos Hatzibodozis, Sotiris Ioannidis, and Evangelos P. Markatos. In Proceedings of the 1st WOMBAT Workshop on Information Security Threats Data Collection and Sharing (WISTDCS), Amsterdam, the Netherlands, April 2008.

  34. “Evaluation of Compression of Remote Network Monitoring Data Streams” Peter I. Politopoulos, Evangelos P. Markatos, and Sotiris Ioannidis. In Proceedings of the 6th IEEE Workshop on End-to-End Monitoring Techniques and Services (E2EMon), Salvador, Bahia, Brazil, April 2008.

  35. “When AppMon met Stager” Nikos Nikiforakis, Demetres Antoniades, Evangelos P. Markatos, Sotiris Ioannidis, and Arne Olesbo. In Proceedings of the 6th IEEE Workshop on End-to-End Monitoring Techniques and Services (E2EMon), Salvador, Bahia, Brazil, April 2008.

  36. “Band-aid Patching” Stelios Sidiroglou, Sotiris Ioannidis, and Angelos D. Keromytis. In Proceedings of the USENIX 3rd Workshop on Hot Topics in System Dependability (HotDep), Edinburgh, UK, June 2007 (short paper).

  37. “Performance Evaluation of a Privacy-Preserving Policy Reconciliation Protocol” Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel, and Ulrike Meyer. In Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks (Policy), Rome, Italy, June 2007.

  38. “Privacy as an Operating System Service” Sotiris Ioannidis, Stelios Sidiroglou and Angelos D. Keromytis. In Proceedings of the USENIX 1st Workshop on Hot Topics in Security (HotSec), Vancouver, BC, Canada, July 2006.

  39. “Design and Implementation of Virtual Private Services” Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, and Jonathan M. Smith. In Proceedings of the IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Enterprise Security, Special Session on Trust Management in Collaborative Global Computing, Linz, Austria, June 2003.

  40. “WebDAVA: An Administrator-Free Approach To Web File-Sharing” Alexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, and Angelos D. Keromytis. In Proceedings of the IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Distributed and Mobile Collaboration, Linz, Austria, June 2003.

  41. “Sub-Operating Systems: A New Approach to Application Security” Sotiris Ioannidis, Steven M. Bellovin, and Jonathan M. Smith. In Proceedings of the ACM SIGOPS European Workshop, Saint-Emilion, France, September 2002.

  42. “xPF: Packet Filtering for Low-Cost Network Monitoring” Sotiris Ioannidis, Kostas G. Anagnostakis, John Ioannidis, and Angelos D. Keromytis. In Proceedings of the IEEE Workshop on High-Performance Switching and Routing (HPSR), pp. 121-126, Kobe, Japan, May 2002.

  43. “Compiler and Run-Time Support for Adaptive Load Balancing in Software Distributed Shared Memory Systems” Sotiris Ioannidis and Sandhya Dwarkadas. In Proceedings of the ACM Fourth Workshop on Languages, Compilers, and Run-Time Systems for Scalable Computers (LCR), pp. 107-122, Pittsburgh, PA, USA, May 1998.

Posters in Conferences

  1. “Discovery and classification of Twitter bots” Despoina Antonakaki, Maria Oikonomidou, Alexander Shevtsov, Polyvios Pratikakis, Sotiris Ioannidis, and Paraskevi Fragopoulou. In the 6th ACM-W Europe Celebration of Women in Computing (womENcourage), Rome, Italy, September 2019 (poster).

  2. “High performance encrypted network traffic inspection using hardware accelerators” Eva Papadogiannaki and Sotiris Ioannidis. In the 6th ACM-W Europe Celebration of Women in Computing (womENcourage), Rome, Italy, September 2019 (poster).

  3. “A Routing Protocol for Mobile Peer-to-Peer Nano-Networks” Ageliki Tsioliaridou, Fanouris Alevizakis, and Sotiris Ioannidis. In the 6th ACM-W Europe Celebration of Women in Computing (womENcourage), Rome, Italy, September 2019 (poster).

  4. “High performance encrypted network traffic inspection using hardware accelerators” Eva Papadogiannaki, Giorgos Vasiliadis, and Sotiris Ioannidis. In the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT2018), Heraklion, Crete, Greece, December 2018 (poster).

  5. “Efficient Scheduling for Concurrently Executed Network Packet Processing Applications on Heterogeneous Hardware Architectures” Giannis Giakoumakis, Eva Papadogiannaki, Giorgos Vasiliadis, and Sotiris Ioannidis. In the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT 2018), Heraklion, Crete, Greece, December 2018 (poster).

  6. “Andromeda: A Trusted Execution Framework for Android Based on Secure Enclaves” Dimitris Karnikis and Sotiris Ioannidis. In the International Conference on Parallel Architectures and Compilation Techniques (PACT), ACM SRC Poster Session, Limassol, Cyprus, November 2018 (poster).

  7. “GHammer: A GPGPU Rowhammering Attack” Georgios Anagnopoulos and Sotiris Ioannidis. In the International Conference on Parallel Architectures and Compilation Techniques (PACT), ACM SRC Poster Session, Limassol, Cyprus, November 2018 (poster).

  8. “A Large-scale Analysis of Content Modification by Open HTTP Proxies” Giorgos Tsirantonakis, Panagiotis Ilia, Sotiris Ioannidis, Elias Athanasopoulos, Michalis Polychronakis. In Security and Privacy (CySeP) Summer School, Stockholm, Sweden, June 2018 (poster).

  9. “A language agnostic framework for analysis of political content in OSNs” Despoina Antonakaki, Dimitris Spiliotopoulos, Polyvios Pratikakis, Sotiris Ioannidis, and Paraskevi Fragopoulou. In the 4th ACM-W Europe Celebration of Women in Computing (womENcourage), Barcelona, Spain, September 2017 (abstract and poster).

  10. “An Efficient Scheduling Approach for Concurrent Packet Processing Applications on Heterogeneous Systems” Eva Papadogiannaki and Sotiris Ioannidis. In the 3rd ACM-W Europe Celebration of Women in Computing (womENcourage), Linz, Austria, September 2016 (abstract and poster).

Visionary Reports, Roadmaps, White Papers, and Studies

  1. “The Red Book: A Roadmap for Systems Security Research” SysSec Consortium, August 2013.

  2. “Flying 2.0 Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology” Alessandro Bassi, Jim Clarke, France Charles de Couessin, Sotiris Ioannidis, Eleni Kosta, Paul McCarthy, Huang Ming-Yuh, Eurico Neves, Dennis Nilsson, Milan Petkovic, Pawel Rotter, Markus Tieman, and David Wright. Publisher ENISA, April 2010

  3. “White Book: Emerging ICT Threats” FORWARD Consortium, January 2010.

  4. “Anticipating Security Threats to a Future Internet” Herbert Bos, Erland Jonsson, Edita Djambazova, Sotiris Ioannidis, Kiril Dimitrov, Engin Kirda, and Christopher Kruegel. Future Internet Assembly, March 2009.

  5. “Resilience Features of IPv6, DNSSEC, and MPLS” Sotiris Ioannidis, George Apostolopoulos, Kostas Anagnostakis, Nikolaos Nikiforakis, Andreas Makridakis, and Charalampos Gkikas, with the collaboration of ENISA, STA staff. Publisher ENISA, 2009.

Articles

  1. “Cyber-Ranges as a Mean of Security Culture Establishment” George Hatzivasilis, Konstantinos Fysarakis, and Sotiris Ioannidis. In ERCIM News, No. 121, April 2020.

  2. “Smart End-to-end Massive IoT Interoperability, Connectivity and Security” Nikolaos Petroulakis, Konstantinos Fysarakis, Sotiris Ioannidis, George Spanoudakis, and Vivek Kulkarni. In ERCIM News, No. 119, October 2019.

  3. “Operational Trustworthiness Enabling Technologies - The OPTET Project” Costas Kalogiros, Vasilis Tountopoulos, Sotiris Ioannidis, Sebastien Keller, and Pascal Bisson. In ERCIM News, No. 102, July 2015.

  4. “i-Code: Real-Time Malicious Code Identification” Stefano Zanero, Sotiris Ioannidis, and Evangelos P. Markatos. ERCIM News, No. 90, July 2012.

  5. “Drivers of Emerging and Future Threats in ICT Infrastructures” Sotiris Ioannidis, Evangelos Markatos, Engin Kirda, and Christopher Kruegel. In ENISA Quarterly, Vol. 5, No. 3, July-September 2009.

  6. “On looking FORWARD” Sotiris Ioannidis, Evangelos Markatos, and Christopher Kruegel. In ERCIM News, No. 76, January 2009.

  7. “Tracing the Changing Nature of Cyberattacks” Sotiris Ioannidis, Evangelos Markatos, Engin Kirda, and Christopher Kruegel. In ENISA Quarterly, Vol. 4, No. 4, October-December 2008.

Archive (arXiv) Publications

  1. “Analysis of Twitter and YouTube during USelections 2020” Alexander Shevtsov, Maria Oikonomidou, Despoina Antonakaki, Polyvios Pratikakis, and Sotiris Ioannidis. arXiv preprint arXiv:2010.0818, 2020.

  2. “Clash of the trackers: measuring the evolutions of the online tracking ecosystem” Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, and Nicolas Kourtelis. arXiv preprint arXiv:1907.12860, 2019.

  3. “Privacy Risks from Public Data Sources” Vassilis Prevelakis, Sotiris Ioannidis, Panagiotis Papadopoulos, and Zacharias Tzermias. arXiv preprint arXiv:1711.09260, 2017.

  4. “Evolving Twitter: an experimental analysis of graph properties of the social graph” Despoina Antonakaki, Sotiris Ioannidis, and Paraskevi Fragopoulou. arXiv preprint arXiv:1510.01091, 2015.

  5. “Testing for common sense (violations) in airline pricing or how complexity asymmetry defeated you and the web” Symeon Meichanetzoglou, Sotiris Ioannidis, and Nikolaos Laoutaris. arXiv preprint arXiv:1509.05382, 2015.

  6. “New Advances on Privacy-Preserving Policy Reconciliation” Ulrike Meyer, Susanne Wetzel, and Sotiris Ioannidis. IACR Cryptology ePrint Archive, Volume 64, Issue 201, January 2010.

Technical Reports

  1. “Building Software Defined Materials with Nanonetworks” Christos Liaskos, Ageliki Tsioliaridou, Andreas Pitsillides, Nikolaos Kantartzis, Antonios Lalas, Xenofon Dimitropoulos, Sotiris Ioannidis, Maria Kafesaki, Costas Soukoulis. Technical Report 447, FORTH-ICS, September 2014.

  2. “Practical Information Flow for Legacy Web Applications” Georgios Chinis, Polyvios Pratikakis, Elias Athanasopoulos, and Sotiris Ioannidis. Technical Report 428, FORTH-ICS, April 2012.

  3. “IRILD: an Information Retrieval based method for Information Leak Detection” Eleni Gessiou, Quang Hieu Vu, and Sotiris Ioannidis. Technical Report 413, FORTH-ICS, 2011.

  4. “Digging up Social Structures from Documents on the Web” Eleni Gessiou, Elias Athanasopoulos, and Sotiris Ioannidis. Technical Report 412, FORTH-ICS, 2011.

  5. “Digital is calling the Analog: Robust Prevention of Dial Attacks” Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, and Evangelos P. Markatos. Technical Report 399, FORTH-ICS, October 2011.

  6. “Decentralized Access Control in Networked File Systems” Stefan Miltchev, Jonathan M. Smith, Vassilis Prevelakis, Angelos D. Keromytis, and Sotiris Ioannidis. Technical Report, Department of Computer and Information Science, University of Pennsylvania, 2006.

  7. “Sub-Operating Systems: A New Approach to Application Security” Sotiris Ioannidis and Steven M. Bellovin. Technical Report MS-CIS-01-06, Department of Computer and Information Science, University of Pennsylvania, 2001.

  8. “Scalable Security Policy Mechanisms” Angelos Keromytis, Sotiris Ioannidis, Michael B. Greenwald, and Jonathan M. Smith. Technical Report MS-CIS-01-05, Department of Computer and Information Science, University of Pennsylvania, 2001.

  9. “On Using Network RAM as a non-volatile Buffer” Dionisios Pnevmatikatos, Evangelos P. Markatos, Gregory Magklis, and Sotiris Ioannidis. Technical Report 227, FORTH-ICS, August 1998.

  10. “On Using Network Memory to Improve the Performance of Transaction-Based Systems” Sotiris Ioannidis, Evangelos P. Markatos, and Julia Sevaslidou. Technical Report 190, FORTH-ICS, July 1997.

Selected Invited Talks

  1. “#elections analysis in OSNs” InfoLaw Conference, March 2021.

  2. “Designing H/W systems for security and high performance” CyBureau - The Institute for Cyber Policy Studies, January 2021.

  3. “CONCORDIA: A Cybersecurity Competence Network with leading research, innovation, industrial and public competence” 35th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), Maribor, Slovenia, September 2020.

  4. “Designing H/W systems for security and high performance” 5th Computing Systems Research Day, National Technical University of Athens, Athens, January 2020.

  5. “Data sharing between industry and research” Data Science Conference 5.0, Belgrade, Serbia, November 2019 (Keynote).

  6. “Designing H/W systems for security and high performance” School of Electrical and Computer Engineering, Technical University of Crete, Chania, July 2019.

  7. “Security Applications of GPUs” 14th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE), Heraklion, Greece, May 2019 (Keynote).

  8. “Application of Blockchain Technologies in the Healthcare Sector” Athens Medical Leadership and Innovation Conference (AMLI), Athens, Greece, 23-25 November 2018.

  9. “Security Applications of GPUs” International Symposium on Secure Virtual Infrastructures, Cloud and Trusted Computing (CTC), Rhodes, Greece, October 2016 (Keynote).

  10. “Security Applications of GPUs” International Conference on Information Security Theory and Practice (WISTP), Heraklion, Greece, October 2016 (Keynote).

  11. “Security Applications of GPUs” International Conference on Cryptology and Network Security (CANS), Heraklion, Greece, October 2014 (Keynote).

  12. “The Cost of Cyber-Insecurity” International Conference “Safety & Security in Cyber Space: Building up trust in the EU”, Hellenic Presidency of the Council of the European Union, Athens, Greece, March 2014.

  13. “Emerging Threats and Actors” BIC Workshop on the cross domain coordination of International Cooperation and technical themes in Trustworthy ICT and INCO, Brussels, Belgium, June 2012.

  14. “Systems Security Research at the Distributed Computing Systems Lab” Chalmers University of Technology, Goteborg, Sweden, April 2012.

  15. “Challenges and Directions for Security in Networked Systems” 4th EU-Japan Symposium on Next Generation Networks and the Future Internet, Tokyo, Japan, 19th January 2012 (Keynote).

  16. “Future Threats in Networked Systems” Network and Information Security Ideas Workshop, European Commission, Brussels, Belgium, 22nd September 2011.

  17. “WOMBAT: Worldwide Observatory of Malicious Behaviors and Attack Threats” BIC Building International Collaboration for Trustworthy ICT, Workshop on Systems Security (SysSec), Amsterdam, Netherlands, July 2011.

  18. “Privacy-preserving Policies, Protocols and Architectures” International Workshop on Policies for the Future Internet (POFI), Pisa, Italy, June 2011.

  19. “GPU-Assisted Malware” AIT Workshop on Practical aspects of security (PRACSE), October 2010.

  20. “Cloud Computing Threats (real and perceived)” Free and Open Source Software Workshop, University of Crete, May 2010.

  21. “Privacy as a System Service” HIDE EU Project Privacy Enhancing Technologies Working Group, London 2009.

  22. “Web Security” W3C Workshop, Foundation for Research and Technology – Hellas, September 2009.

  23. “Gnort: High Performance Intrusion Detection Using Graphics Processors” AIT Workshop on Practical aspects of security (PRACSE), Athens, June 2009.

  24. “Security and Privacy in a Networked and Mobile World” FIDIS Interdisciplinary Doctoral Consortium, June 2008.

  25. “Consistent Security Policy Evaluation” Stevens, Columbia, and IBM Research, Security and Privacy Day, November 2005.

  26. “Consistent Security Policy for Decentralized Systems” Institute of Computer Science, Foundation for Research and Technology Hellas, February 2004.

  27. “Abstraction, Specification and Enforcement of Security Policies for Decentralized Systems” TACL Seminar, Princeton University, November 2003.

  28. “Consistent Security Policy for Decentralized Systems” Rutgers University, July 2003.

  29. “Abstraction, Specification and Enforcement of Security Policies for Decentralized Systems” Secure Systems Research Department, AT&T Labs Research, September 2002.

  30. “Fine-Grain Policy-Based Access Control for Distributed Systems” SDL–LCS Seminar Series, Carnegie-Mellon University, April 2002.