Sotiris Ioannidis

Institute of Computer Science (ICS)

Foundation for Research and Technology - Hellas (FORTH)

N. Plastira 100

Vassilika Vouton, GR-700 13

Heraklion, Crete, Greece

sotiris@ics.forth.gr www.ics.forth.gr/~sotiris

Research Interests

Security, privacy, systems, and networks.

Education

University of Pennsylvania

Ph.D. in Computer and Information Science, February 2005

Advisor:  Jonathan M. Smith

Committee:  Steven M. Bellovin, Matt A. Blaze, Michael B. Greenwald, and Honghui Lu

University of Rochester

M.Sc. in Computer Science, June 1998

Advisor:  Sandhya Dwarkadas

University of Crete

M.Sc. in Computer Science, June 1996

Advisor:  Christos Nikolaou

Co-advisor: Evangelos Markatos

B.Sc. in Mathematics, June 1994

Positions Held

Foundation for Research and Technology - Hellas

Institute of Computer Science

Research Director

March 2017 - Present

Principal Researcher

October 2010 – February 2017

Associate Researcher

October 2007 – September 2010

University of Crete

Computer Science Department

Adjunct Associate Professor

February 2011– February 2014

Adjunct Assistant Professor

October 2007 – January 2011

Stevens Institute of Technology

Computer Science Department

Research Scholar

February 2005 – June 2007

University of Pennsylvania

Computer and Information Science Department

Research Assistant, Distributed Systems Laboratory

January 1999 – January 2005

AT&T Labs - Research

Network Services Research Center

Internship

May – September 1999, 2000, 2001

IBM Poughkeepsie

Hardware Development Group

Internship

July 1998 – August 1998

University of Rochester

Computer Science Department

Research Assistant, Systems Group

September 1996 – December 1998

Foundation for Research and Technology - Hellas

Institute of Computer Science

Research Assistant, Distributed Systems Group

June 1994 – August 1996

University of Crete

Computer Center

Systems Operator and Administrator

September 1991 – May 1994

Teaching

Courses created

Honors and Awards

Grants – Principal Investigator

                                                   

Funded by the European Commission (ICT-16-2017) (Budget 4,997,035.00)

Duration: 2018-2020

Coordinator

Funded by the European Commission (CEF-2016-3) (Budget 998,310 Euros)

Duration: 2017-2019

Coordinator

Funded by the European Commission (H2020-DS-2016-2017/DS-05-2016) (Budget 499,812.50 Euros)

Duration: 2017-2019

Funded by the European Commission (H2020-DS-2016-2017/H2020-DS-SC7-2016) (Budget 5,683,820 Euros)

Duration: 2017-2020

Funded by the European Commission (H2020-FETOPEN-1-2016-2017) (Budget 5,748,000 Euros) (Joint project with FORTH-IESL, PI for FORTH-IESL Costas Soukoulis)

Duration: 2017-2020

Coordinator

Funded by the European Commission (H2020-ICT-2016-1/ICT-06-2016) (Budget 4,173,850 Euros)

Duration: 2017-2019

Funded by the European Commission (H2020-DS-2015-1/DS-3-2015) (Budget 7,017,235 Euros)

Duration: 2016-2019

Funded by the Greek Research and Technology Network (GRNET) (Budget 49,200 Euros)

Duration: 2015-2016

Coordinator

Funded by the European Commission (H2020-ICT-2014-1/ICT-32-2014) (Budget 3,105,762.50 Euros)

Duration: 2015-2017

Coordinator

Funded by the General Secretariat for Research and Technology, Program “Αριστεία ΙΙ”, Excellence Award, Investigator Driven Research (Budget 236,000 Euros)

Duration: 2014-2015

Coordinator

Funded by the European Commission (FP7-ICT-2013-10) (Budget 886,557 Euros)

Duration: 2013-2016

Funded by the European Commission and Japanese Ministry of Internal Affairs and Communications (FP7-ICT-2013-EU-Japan) (Budget 2,171,167 Euros)

Duration: 2013-2016

Funded by the European Commission (FP7-ICT-2011-8) (Budget 10,707,039 Euros)

Duration: 2012-2015

Funded by the European Commission (FP7-ICT-2011-7) (Budget 466,529 Euros)

Duration: 2011-2013

Coordinator

Funded by JLS/2010/ISEC/AG/INT (Budget 750,000 Euros)

Duration: 2011-2014

Funded by the General Secretariat for Research and Technology (Budget 546,700 Euros)

Duration: 2011-2014

Funded by ENISA (Budget 4,500 Euros)

Duration: 2008

Coordinator

Funded by the European Commission, Marie Curie International Reintegration Grants (FP7-PEOPLE-2007-4-3-IRG) (Budget 100,000 Euros)

Duration: 2008-2012

Coordinator

Funded by the European Commission (FP7/ICT/CA) (Budget 890,000 Euros)

Duration: 2008-2011

Funded by the General Secretariat for Research and Technology (ENTER 2005) (Budget 70,200 Euros)

Coordinator

Grants – CoPI

Funded by the European Commission (MSCA-RISE-2016) (Budget 1,647,000 Euros)

Duration: 2017-2020

Coordinator

Funded by the European Commission (H2020-ICT-2014-2/ICT-14-2014) (Budget 6,344,331 Euros)

Duration: 2015-2018

Funded by the European Commission (H2020-ICT-2014-1/ICT-7-2014) (Budget 2,023,800 Euros)

Duration: 2015-2017

Coordinator

Funded by the European Commission (Budget 2,946,029 Euros)

Duration: 2010-2014

Coordinator

Funded by the European Commission (Budget 753,895 Euros)

Duration: 2010-2012

Coordinator

Funded by Sun Microsystems Inc. (Budget 24,658 USD)

Duration: 2006

Professional Activities

Advisory Board

Editor

Evaluator (funding calls)

Evaluator (projects)

General Chair

Local Organizing Committee Member

Program Chair

 

Program Committee Member

Publicity Chair

Steering Committee Member

Student Supervision

  1. Markos Aivazoglou-Vonatsos, B.Sc. (2015), University of Crete
  2. Fanourios Alevizakis, B.Sc. (ongoing) University of Crete
  3. Marios Argyriou, B.Sc. (2013), University of Crete
  4. Michalis Athanasakis, B.Sc. (2013), M.Sc. (2016), University of Crete
  5. Giorgos Chinis, B.Sc. (2009), M.Sc. (2012), University of Crete
  6. Giorgos Christou, B.Sc. (2014), M.Sc. (2017), Ph.D. (ongoing), University of Crete
  7. Nikolaos Christoulakis, B.Sc. (ongoing), University of Crete
  8. Socratis Dafnis, B.Sc (2012), University of Crete
  9. Dimitris Deyannis, B.Sc. (2014), M.Sc. (2017), Ph.D. (ongoing), University of Crete
  10. Ilias Diamantakos, B.Sc. (2013), University of Crete
  11. Michalis Diamantaris B.Sc. (2014), M.Sc. (2017), Ph.D. (ongoing), University of Crete
  12. Eleni Gessiou, B.Sc. (2009), M.Sc. (2011), University of Crete
  13. Konstantinos Kalogiannis, B.Sc. (2017), University of Crete
  14. Konstantinos Kleftogiorgos, B.Sc. (2015), M.Sc. (ongoing), University of Crete
  15. Lazaros Koromilas, B.Sc. (2009), M.Sc. (2012), Ph.D. (ongoing), University of Crete
  16. Evangelos Ladakis, B.Sc. (2013), M.Sc. (2015), University of Crete
  17. Constantinos Lebesis, B.Sc. (2016), University of Crete
  18. Konstantinos Livanos, B.Sc. (2016), University of Crete
  19. Laertis Loutsis, M.Sc. (2014), University of Crete
  20. Lefteris Pachis, B.Sc. (2016), University of Crete
  21. Evangelia Papadogiannaki, B.Sc. (2014), M.Sc. (2017), PhD (ongoing), University of  Crete
  22. Panagiotis-Elias Papadopoulos, B.Sc. (2015), M.Sc (ongoing), University of Crete
  23. Kostas Plelis, B.Sc. (2013), M.Sc. (2017), University of Crete
  24. Antonios-Orestis Roussos, B.Sc. (2105), University of Crete
  25. Angelos Sinogiorgos, B.Sc. (2016), M.Sc. (ongoing), University of Crete
  26. Andreas Sfakianakis, M.Sc. (2012), University of Crete
  27. Alexander Shevtsov, B.Sc. (2016), M.Sc. (ongoing), University of Crete
  28. Konstantinos Solomos, B.Sc. (2016), M.Sc. (ongoing), University of Crete
  29. Nikos Toulios, B.Sc. (2013), University of Crete
  30. Giorgos Tsirantonakis, B.Sc. (2015), M.Sc. (2017), University of Crete
  31. Rafael Tsirbas, B.Sc. (2017), M.Sc. (ongoing), University of Crete
  32. Giorgos Vasiliadis, M.Sc. (2008), Ph.D. (2014), University of Crete
  33. Stamatis Volanis, M.Sc. (2014), University of Crete
  34. Giannis Voyatzis B.Sc. (2014), University of Crete

Publications

Theses

  1. “Security Policy Consistency and Distributed Evaluation in Heterogeneous Systems”

Sotiris Ioannidis. Ph.D. Thesis, University of Pennsylvania, February 2005.

  1. “Using the Remote Main Memory in a Workstation Cluster for Reliability and Performance in Transactional Based Systems”

Sotiris Ioannidis. M.Sc. Thesis, University of Crete, August 1996.

Book Editor

                                        

  1. Proceedings of the 21st European Symposium on Research on Computer Security (ESORICS).

Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows (Eds.). Heraklion, Greece, September 26-30, 2016, Lecture Notes in Computer Science, Springer 2016.

  1. Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

Mihai Christodorescu and Sotiris Ioannidis (Eds.). Wroclaw, Poland, September 11, 2014, IEEE Computer Society. ISBN: 978-1-4799-8308-7.

  1. Proceedings of the 7th on Trust and Trustworthy Computing (TRUST).

Thorsten Holz and Sotiris Ioannidis (Eds.). Heraklion, Crete, June 30 – July 2, 2014. ISBN: 978-3-319-08592-0 (Print) 978-3-319-08593-7 (Online).

  1. Proceedings of the 4th European Conference on Computer Network Defense

Liam Meany, Kostas Anagnostakis, and Sotiris Ioannidis (Eds.). Dublin, Ireland, 11-12 December, 2008. ISBN: 978-0-7695-3479-4.

  1. Proceedings of the 3rd European Conference on Computer Network Defense

Vasilios Siris, Sotiris Ioannidis, Kostas Anagnostakis, and Panos Trimintzios (Eds.). Heraklion, Greece, 2007. ISBN: 978-3-319-45740-6 (Print) 978-3-319-45741-3 (Online).

Book Chapters

  1. “Security Concerns in Cooperative Intelligent Transport Systems”

Konstantinos Fysarakis, Ioannis Askoxylakis, Vasilios Katos, Sotiris Ioannidis, and Louis Marinos. In Intrusion Detection and Prevention for Mobile Ecosystems. Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, and Dimitrios Damopoulos (editors), pp. 487–522, Chapter 16. Taylor & Francis Group, 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742 CRC Press 2017. Print ISBN: 978-1-138-03357-3. eBook ISBN: 978-1-315-30582-0

  1. “Experiences Enhancing Open Source Security in the POSSE Project”

Jonathan M. Smith, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis, Ben Laurie, Douglas Maughan, Dale Rahn, and Jason L. Wright. In Free/Open Source Software Development, Stefan Koch (editor), pp. 242-257. Idea Group Publishing, 2004. Also republished in Global Information Technologies: Concepts, Methodologies, Tools, and Applications, Felix B. Tan (editor), pp. 1587-1598. Idea Group Publishing, 2007.

  1. “On using Reliable Network RAM in Networks of Workstations”

Sotiris Ioannidis, Athanasios E. Papathanasiou, Grigorios I. Magklis, Evangelos P. Markatos, Dionisios N. Pnevmatikatos, and Julia Sevaslidou. In Cluster Computing, pp. 109-121, Chapter 10, 2001, ISBN 1-59033-113-3, Nova Science Publishers. USA, 2001.

Journal Publications

  1. “Social media analysis during political turbulence”

Despoina Antonakaki, Dimitris Spiliotopoulos, Christos V. Samaras, Polyvios Pratikakis, Sotiris Ioannidis, and Paraskevi Fragopoulou. PLOS ONE, (Accepted).

  1. “Computing and Communications for the Software-Defined Metamaterial Paradigm: A Context Analysis”

Sergi Abadal, Christos Liaskos, Ageliki Tsioliaridou, Sotiris Ioannidis, Andreas Pitsillides, Josep Solé-Pareta, Albert Cabellos-Aparicio, and Eduard Alarcon. IEEE Access, 2017.

  1. “Packet Routing in 3D Nanonetworks: A Lightweight, Linear-path Scheme”

Aggeliki Tsioliaridou, Christos Liaskos, Eugen Dedu, and Sotiris Ioannidis. In Nano Communications Networks (Elsevier), 2017.

  1. “Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware Architectures”

Eva Papadogiannaki Giorgos Vasiliadis, Lazaros Koromilas,and Sotiris Ioannidis. In IEEE/ACM Transactions on Networking, 2017.

  1. “Design and Implementation of a Stateful Network Packet Processing Framework for GPUs”

Giorgos Vasiliadis, Lazaros Koromilas, Michalis Polychronakis, and Sotiris Ioannidis. In IEEE/ACM Transactions on Networking, 2017.

  1. “Exploiting abused trending topics to identify spam campaigns in Twitter”

Despoina Antonakaki, Iasonas Polakis, Ilias Athanasopoulos, Sotiris Ioannidis, and Paraskevi Fragopoulou. In Social Network Analysis and Mining, vol. 6, no. 1, pp. 1-11, December, 2016.

  1. “Lightweight, Self-tuning Data Dissemination for Dense Nanonetworks”

Aggeliki Tsioliaridou, Christos Liaskos, Sotiris Ioannidis, and Andreas Pitsillides. In Nano Communications Networks, Special issue on Electromagnetic Communications in Nano-scale (Elsevier), 2015.

  1. Design and Development of Software Defined Metamaterials for Nanonetworks” Christos Liaskos, Aggeliki Tsioliaridou, Andreas Pitsillides, Ian Akyildiz, Nikolaos Kantartzis, Antonios Lalas, Xenofontas Dimitropoulos, Sotiris Ioannidis, Maria Kafesaki, and Costas Soukoulis. In IEEE Circuits and Systems Magazine, vol. 15, no. 4, pp. 12-25, November 2015.
  2. “GPU-Assisted Malware”

Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. In International Journal of Information Security (IJIS), vol. 14, no. 3, pp. 289-297, June 2015.

  1. Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data”

Panagiotis Andriotis, Zacharias Tzermias, Anthi Mparmpaki, Sotiris Ioannidis, and George Oikonomou. In International Journal of Digital Crime and Forensics (IJDCF), vol. 5, no. 4, pp. 34-54, IGI Global, 2013.

  1. “Understanding the Behavior of Malicious Applications in Social Networks”

Andreas Makridakis, Elias Athanasopoulos, Spiros Antonatos, Demetres Antoniades, Sotiris Ioannidis, and Evangelos P. Markatos. In IEEE Network, vol. 24, no. 5, pp. 14-19, September/October 2010.

  1. “Decentralized Access Control in Distributed File Systems”

Stefan Miltchev, Jonathan M. Smith, Vassilis Prevelakis, Angelos D. Keromytis, and Sotiris Ioannidis. In ACM Computing Surveys, vol. 40, no. 3, September 2008.

  1. “COVERAGE: Detecting and Reacting to Worm Epidemics Using Cooperation and Validation”

Kostas Anagnostakis, Michael Greenwald, S. Ioannidis, and Angelos D. Keromytis. In Springer International Journal of Information Security (IJIS), Special Issue, 2007.

  1. “Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications”

Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Kostas Anagnostakis, and Jonathan M. Smith. In International Journal of Network Security, Vol. 4, No. 1, 2007, pp. 69-80, January 2007.

  1. “Flexible Network Monitoring with FLAME”

K. G. Anagnostakis, M. B. Greenwald, S. Ioannidis, D. Li, and J. M. Smith. In Computer Networks Journal  (Special Issue on Active Networks  - Elsevier Science), Vol. 50, No. 14, pp. 2548-2563, October 2006.

  1. “CRAUL:  Compiler and Run-Time Integration for Adaptation Under Load”

Sotiris Ioannidis, Umit Rencuzogullari, Robert Stets, and Sandhya Dwarkadas. In Journal of Scientific Programming, pp. 261-273, Spring 1999.

  1. “On using Network RAM as a non-volatile Buffer”

Dionisios Pnevmatikatos, Evangelos P. Markatos, Gregory Magklis, and Sotiris Ioannidis. In Cluster Computing, Special Issue on I/O in Shared-Storage Clusters, 2(4), pp. 295-303, Baltzer Science Publishers, 1999.

  1. “On using Reliable Network RAM in Networks of Workstations”

Sotiris Ioannidis, Athanasios E. Papathanasiou, Grigorios I. Magklis, Evangelos P. Markatos, Dionisios N. Pnevmatikatos, and Julia Sevaslidou. In Special Issue on High Performance Computing on Clusters Parallel and Distributed Computing Practices (PDCP), Vol. 2, No. 2, Nova Science Publishers, USA, February 1999.

  1. “Efficient Use of Memory Mapped Interfaces for Shared Memory Computing”

N. Hardavellas, G. C. Hunt, S. Ioannidis, R. Stets, S. Dwarkadas, L. Kontothanassis, and M. L. Scott. In IEEE Technical Committee on Computer Architecture (TCCA) Newsletter Special Issue, pp. 28-33, March 1997.

Conference Publications

  1. “A language agnostic framework for analysis of political content in OSNs”

Despoina Antonakaki, Dimitris Spiliotopoulos, Polyvios Pratikakis, Sotiris Ioannidis, and Paraskevi Fragopoulou. In the 4th ACM-W Europe Celebration of Women in Computing (womENcourage), Barcelona, Spain, September 2017 (poster and short paper).

  1. “No sugar but all the taste! Memory Encryption without Architectural Support”

Panagiotis Papadopoulos, George Christou, Giorgos Vasiliadis, Evangelos Markatos and Sotiris Ioannidis. In Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), Oslo, Norway, September 2017.

  1. “Reveal: Fine-grained Recommendations in Online Social Networks”

Markos Aivazoglou, Antonios Roussos, Sotiris Ioannidis, Dimitris Spiliotopoulos, and Jason Polakis. In Proceedings of the 9th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Sydney, Australia, July 2017.

  1. “The Socket Store: An App Model for the Application-Network Interaction

Aggeliki Tsioliaridou, Christos Liaskos, and Sotiris Ioannidis. In Proceedings of the 22nd IEEE Symposium on Computers and Communication (ISCC), Heraklion, Greece, July 2017.

  1. “The Long-Standing Privacy Debate: Mobile Websites vs. Mobile Apps”

Elias Papadopoulos, Michalis Diamantaris, Panagiotis Papadopoulos, Thanasis Petsas, Sotiris Ioannidis, and Evangelos Markatos. In Proceedings of the 26th International World Wide Web Conference (WWW), Perth, Australia, April 2017 (Best Paper Honorable Mention Award).

  1. “SAMPAC: Socially-Aware collaborative Multi-Party Access Control”

Panagiotis Ilia, Barbara Carminati, Elena Ferrari, Paraskevi Fragopoulou, and Sotiris Ioannidis. In Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY), Scottsdale, AZ, USA, March 2017.

  1. “On the Effectiveness of Snapshot-based Kernel Integrity Monitors”

Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 19th International Symposium on Research on Attacks, Intrusions, and Defenses (RAID), Evry, France, September 2016.

  1. “An Efficient Scheduling Approach for Concurrent Packet Processing Applications on Heterogeneous Systems”

Eva Papadogiannaki and Sotiris Ioannidis. In the 3rd ACM-W Europe Celebration of Women in Computing (womENcourage), Linz, Austria, September 2016 (poster and short paper).

  1. “Stateless Linear-path Routing for 3D Nanonetworks”

Aggeliki Tsioliaridiou, Christos Liaskos, Eugen Dedu, and Sotiris Ioannidis. In Proceedings of the 3rd ACM International Conference on Nanoscale Computing and Communications (NanoCom), New York City, NY, USA, September 2016.

  1. “Investigating the complete corpus of Referendum and Elections tweets”

Despoina Antonakaki, Dimitris Spiliotopoulos, Christos Samaras, Sotiris Ioannidis and Paraskevi Fragopoulou. In Proceedings of the 8th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), San Francisco, CA, USA, August 2016.

  1. “Usability Evaluation of Accessible Complex Graphs”

Dimitris Spiliotopoulos, Despoina Antonakaki, Sotiris Ioannidis, and Paraskevi Fragopoulou. Proceedings of the 15th International Conference on Computers Helping People with Special Needs (ICCHP), Linz, Austria, July 2016.

  1. Motivation Effect of Social Media Posts about Well-being and Healthy Living”

Dimitris Spiliotopoulos, Despoina Antonakaki, Sotiris Ioannidis, and Paraskevi Fragopoulou. Proceedings of the 9th International Conference on Pervasive Technologies Related to Assistive Environments (PETRA), Corfu, Greece, June 2016.

  1. “N3: Addressing and Routing in 3D Nanonetworks”

Angeliki Tsioliaridou, Christos Liaskos, Lefteris Pachis, Sotiris Ioannidis, and Andreas Pitsillides. In Proceedings of the International Conference on Telecommunications (ICT), Thessaloniki, Greece , May 2016 (Best Paper Award).

  1. A Deployable Routing System for Nanonetworks”

Christos Liaskos, Angeliki Tsioliaridou, Sotiris Ioannidis, Nikolaos Kantartzis, and Andreas Pitsillides. In Proceedings of the IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia , May 2016.

  1. “HCFI: Hardware-enforced Control Flow Integrity”

Nick Christoulakis, George Christou, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY), New Orleans, LA, USA, March 2016 (Outstanding Paper Award).

  1. “Secure Software-Hardware Architectures for Robust Computing Systems”

Elias Athanasopoulos, Martin Boehner, Sotiris Ioannidis, Cristiano Giuffrida, Dmitry Pidan, Vassilis Prevelakis, Ioannis Sourdis, Christos Strydis, and John Thomson. In Proceedings of 6th International Conference on e-Democracy - Citizen Rights in the  World of the New Computing Paradigms, Athens, Greece, December 2015.

  1. “Social Forensics: Searching for Needles in Digital Haystacks”

Iasonas Polakis, Panagiotis Ilia, Zacharias Tzermias, Sotiris Ioannidis, and Paraskevi Fragopoulou. In Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns on Security (BADGERS), Kyoto, Japan, November 2015.

  1. “Face/Off: Preventing Privacy Leakage From Photos in Social Networks”

Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. In Proceedings of the 22nd ACM/SIGSAC Conference on Computer and Communications Security (CCS), Denver, CO, USA, November 2015.

  1. “Trust and Trustworthiness Maintenance: From Architecture to Evaluation”

Micha Moffie, Abigail Goldsteen, Willis Chen, Thorsten Weyer, Sotiris Ioannidis, and Costas Kalogiros. In Proceedings of the 8th International Conference on Trust and Trustworthy Computing (TRUST), Heraklion, Crete, Greece, September 2015 (poster and short paper).

  1. “Enhancing the Trustworthiness of Service On-demand Systems via Smart Vote Filtering”

Christos V. Samaras, Aggeliki Tsioliaridou, Christos Liaskos, Dimitris Spiliotopoulos, and Sotiris Ioannidis. In Proceedings of the 8th International Conference on Trust and Trustworthy Computing (TRUST), Heraklion, Crete, Greece, September 2015.

  1. “GPU-Disasm: A GPU based x86 Disassembler”

Evangelos Ladakis, Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis, and Georgios Portokalidis. Proceedings of the 18th Information Security Conference (ISC), Trondheim, Norway, September 2015.

  1. “CORONA: A Coordinate and Routing system for Nanonetworks”

Aggeliki Tsioliaridiou, Christos Liaskos, Sotiris Ioannidis, and Andreas Pitsilides. In Proceedings of the 2nd ACM International Conference on Nanoscale Computing and Communications (NanoCom), Boston, Massachusetts, USA, September 2015.

  1. “Revealing the Relationship Network Behind Link Spam”

Apostolis Zarras, Antonis Papadogiannakis, Sotiris Ioannidis and Thorsten Holz. In Proceedings of the 13th Conference on Privacy, Security and Trust (PST), Izmir, Turkey, July 2015.

  1. “Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software”

Iasonas Polakis, Michalis Diamantaris, Thanasis Petsas, Federico Maggi, and Sotiris Ioannidis. In Proceedings of the 12th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Milano, Italy, July 2015.

  1. “Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption”

Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 8th European Workshop on System Security (EuroSec), Bordeaux, France, April 2015.

  1. “A Tool for Monitoring and Maintaining System Trustworthiness at Runtime”

Abigail Goldsteen, Micha Moffie, Torsten Bandyszak, Nazila Gol Mahammadi, Xiaoyu Chen, Symeon Meichanetzoglou, Sotiris Ioannidis, and Panos Chatziadam. In Proceedings of the 1st International Workshop on Requirements for Self-Adaptive and Cyber Physical Systems (RESACS), March 2015.

  1. “The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines”

Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Giorgos Portokalidis, and Sotiris Ioannidis. In Proceedings of the Network and Distributed Systems Security (NDSS) Symposium, San Diego, USA, February 2015.

  1. “Think before RT: An Experimental Study of Abusing Twitter Trends”

Despoina Antonakaki, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, and Paraskevi Fragopoulou. In Proceedings of the 1st Workshop on Social Influence (SI), Barcelona, Spain, November 2014.

  1. PixelVault: Using GPUs for Securing Cryptographic Operations”

Giorgos Vasiliadis, Elias Athanasopoulos, Michalis Polychronakis, and Sotiris Ioannidis. In Proceedings of the 21st ACM/SIGSAC Conference on Computer and Communications Security (CCS), Scottsdale, AZ, USA, November 2014.

  1. “Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication”

Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, and Angelos Keromytis. In Proceedings of the 21st ACM/SIGSAC Conference on Computer and Communications Security (CCS), Scottsdale, AZ, USA, November 2014.

  1. “Flying Memcache: Lessons Learned from Different Acceleration Strategies”

Dimitris Deyannis, Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 2014 IEEE Symposium on Computer Architecture and High Performance Computing (SBAC-PAD), Paris, France, October 2014.

  1. “Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware Architectures”

Lazaros Koromilas, Giorgos Vasiliadis, Ioannis Manousakis, and Sotiris Ioannidis. In Proceedings of the 2014 ACM/IEEE Symposium on Architectures for Networking and Communication Systems (ANCS), Marina del Rey, CA, USA, October 2014.

  1. “Securing Legacy Code with the TRACER Platform”

Kostantinos Stroggylos, Dimitris Mitropoulos, Zacharias Tzermias, Panagiotis Papadopoulos, Fotios Rafailidis, Diomidis Spinellis,  Sotiris Ioannidis, and Panagiotis Katsaros. In Proceedings of the 18th Panhellenic Conference on Informatics (PCI), Athens, Greece, October 2014.

  1. GASPP: A GPU-Accelerated Stateful Packet Processing Framework

Giorgos Vasiliadis, Lazaros Koromilas, Michalis Polychronakis, and Sotiris Ioannidis. In Proceedings of the 2014 USENIX Annual Technical Conference (ATC), Philadelphia, PA, USA, June 2014.

  1. “TRACER: A Platform for Securing Legacy Code”

Kostantinos Stroggylos, Dimitris Mitropoulos, Zacharias Tzermias, Panagiotis Papadopoulos, Fotios Rafailidis, Diomidis Spinellis, Sotiris Ioannidis, and Panagiotis Katsaros. In Proceedings of the 7th International Conference on Trust and Trustworthy Computing (TRUST), Heraklion, Crete, Greece, June 2014.        

  1. “AndRadar: Fast Discovery of Android Applications in Alternative Markets”

Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, and Sotiris Ioannidis. In Proceedings of the 11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), London, UK, July 2014.

  1. “Privacy Risks from Public Data Sources”

Zacharias Tzermias, Vassilis Prevelakis, and Sotiris Ioannidis. In Proceedings of the 29th IFIP International Information Security and Privacy Conference (SEC), Marrakech, Morocco, June 2014.

  1. “Rage Against the Virtual Machine: Hindering Dynamic Analysis of Mobile Malware”

Thanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Michalis Polychronakis, and Sotiris Ioannidis. In Proceedings of the 7th European Workshop on System Security (EuroSec), Amsterdam, The Netherlands, April 2014.

  1. “ASIST: Architectural Support for Instruction Set Randomization”

Antonis Papadogiannakis, Laertis Loutsis, Vassilis Papaefstathiou, and Sotiris Ioannidis. In Proceedings of the 20th ACM/SIGSAC Conference on Computer and Communications Security (CCS), Berlin, Germany, November 2013.

  1. “Practical Information Flow for Legacy Web Applications”

Georgios Chinis, Polyvios Pratikakis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 8th International Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems (ICOOOLPS), pp. 17-28, Montpellier, France, July 2013.

  1. “You Can Type, but You Can't Hide: A Stealthy GPU-based Keylogger”

Evangelos Ladakis, Lazaros Koromilas, Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. In Proceedings of the 6th European Workshop on System Security (EuroSec), Prague, Czech Republic, April 2013.

  1. “All Your Face Are Belong to Us: Breaking Facebook's Social Authentication”

Jason Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, Sotiris Ioannidis, Angelos D. Keromytis, and Stefano Zanero. In Proceedings of  the 28th Annual Computer Security Applications Conference (ACSAC), Orlando, FL, USA, December 2012.

  1. “Digging up Social Structures from Documents on the Web”

Eleni Gessiou, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos, and Sotiris Ioannidis. In Proceedings of 2012 IEEE Communication and Information System Security Symposium (Globecom CISS), Anaheim, CA, USA, December 2012.

  1. “Towards a Universal Data Provenance Framework using Dynamic Instrumentation”

Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, and Sotiris Ioannidis. In Proceedings of the 27th IFIP International Information Security and Privacy Conference (SEC), Heraklion, Crete, Greece, June 2012.

  1. “Parallelization and Characterization of Pattern Matching using GPUs”

Giorgos Vasiliadis, Michalis Polychronakis and Sotiris Ioannidis. In Proceedings of the 2011 IEEE International Symposium on Workload Characterization (IISWC), Austin, TX, USA, November 2011.

  1. “MIDeA: A Multi-Parallel Intrusion Detection Architecture”

Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. In Proceedings of the 18th ACM/SIGSAC Conference on Computer and Communications Security (CCS), Chicago, IL, USA, October 2011.

  1. “IRILD: An Information Retrieval Based Method for Information Leak Detection”

Eleni Gessiou, Quang Hieu Vu, and Sotiris Ioannidis. In Proceedings of the 7th European Conference on Computer and Network Defense (EC2ND), Goteborg, Sweden, September 2011.

  1. “CensMon: A Web Censorship Monitor”

Andreas Sfakianakis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 1st USENIX Workshop on Free and Open Communications on the Internet (FOCI), co-located with the 20th USENIX Security Symposium, San Francisco, CA, USA, August 2011.

  1. “CAPTCHuring Automated (Smart) Phone Attacks”

Iasonas Polakis, Georgios Kontaxis, and Sotiris Ioannidis. In Proceedings of the 1st Workshop on Systems Security (SysSec), co-located with the 8th conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Amsterdam, Netherlands, July 2011.

  1. “Outsourcing Malicious Infrastructure to the Cloud”

Georgios Kontaxis, Iasonas Polakis, and Sotiris Ioannidis. In Proceedings of the 1st Workshop on Systems Security (SysSec), co-located with the 8th conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Amsterdam, Netherlands, July 2011.

  1. “Dynamic Monitoring of Dark IP Address Space”

Iasonas Polakis, Giorgos Kontaxis, Sotiris Ioannidis, and Evangelos Markatos. In Proceedings of the 3rd COST International Workshop on Traffic Monitoring and Analysis (TMA), Vienna, Austria, April 2011 (poster and short paper).

  1. “we.b: The Web of Short URLs”

Demetres Antoniades, Iasonas Polakis, Giorgos Kontaxis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos Markatos, and Thomas Karagiannis. In Proceedings of the 20th International World Wide Web Conference (WWW), Hyderabad, India, March 2011.

  1. “Detecting Social Network Profile Cloning”

Giorgos Kontaxis, Iasonas Polakis, Sotiris Ioannidis, and Evangelos Markatos. In Workshop Proceedings of the 9th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Seattle, WA, USA, March 2011.

  1. “Security and Privacy Architectures for Biomedical Cloud Computing”

Vasiliki Danilatou and Sotiris Ioannidis. In Proceedings of the 10th IEEE International Conference on Information Technology and Applications in Biomedicine (ITAB), Corfu, Greece, November 2010.

  1. “GPU-assisted Malware”

Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. In Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software (MALWARE),  Nancy, France, October 2010.

  1. “D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks”

Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, and Evangelos P. Markatos. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS), Athens, Greece, September 2010.

  1. “GrAVity: A Massively Parallel Antivirus Engine”

Giorgos Vasiliadis and Sotiris Ioannidis. In Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID), Ottawa, Ontario, Canada, September 2010.

  1. “HoneyLab: Large-scale Honeypot Deployment and Resource Sharing”

Periklis Akritidis, W. Y. Chin, Evangelos Markatos, Sotiris Ioannidis, Spiros Antonatos, and Kostas Anagnostakis. In Proceedings of the 3rd International Conference on Network and Systems Security (NSS), Gold Coast, Australia, October 2009.

  1. “A Greek (Privacy) Tragedy: The Introduction of Social Security Numbers in Greece”

Eleni Gessiou, Alexandros Lambrinidis, and Sotiris Ioannidis. In Proceedings of the 8th ACM CCS Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA, November 2009.

  1. “Regular Expression Matching on Graphics Hardware for Intrusion Detection”

Giorgos Vasiliadis, Spiros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, and Sotiris Ioannidis. In Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (RAID), Saint-Malo, France, September 2009.

  1. “Controlling Access to XML Documents over XML Native and Relational Databases”

Lazaros Koromilas, George Chinis, Irini Fundulaki and Sotiris Ioannidis. In Proceedings of the 6th VLDB Workshop on Secure Data Management (SDM), Lyon, France, August 2009.

  1. “Gnort: High Performance Network Intrusion Detection Using Graphics Processors”

Giorgos Vasiliadis, Spiros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, and Sotiris Ioannidis. In Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID), pp. 116-134, Boston, MA, USA, September 2008.

  1. “Antisocial Networks: Turning a Social Network into a Botnet”

E. Athanasopoulos, A. Makridakis, S. Antonatos, D. Antoniades, S. Ioannidis, K. G. Anagnostakis, and E. P. Markatos. In Proceedings of the 11th Information Security Conference (ISC), Taipei, Taiwan, September 2008.

  1. “Compromising Anonymity Using Packet Spinning”

Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, and Evangelos P. Markatos. In Proceedings of the 11th Information Security Conference (ISC), Taipei, Taiwan, September 2008.

  1. “Future Threats to Future Trust”

Herbert Bos, Sotiris Ioannidis, Erland Jonsson, Engin Kirda, and Christopher Kruegel. In Proceedings of the 1st International Conference Future of Trust in Computing, Berlin, Germany, July 2008.

  1. “Honey@home: A New Approach to Large-Scale Threat Monitoring”

S. Antonatos, M. Athanatos, G. Kontaxis, J. Velegrakis, N. Hatzibodozis, S. Ioannidis, and E. P. Markatos. In Proceedings of the 1st WOMBAT Workshop, Amsterdam, the Netherlands, April 2008.

  1. “Evaluation of Compression of Remote Network Monitoring Data Streams”

Peter I. Politopoulos, Evangelos P. Markatos, and Sotiris Ioannidis. In Proceedings of the 6th IEEE Workshop on End-to-End Monitoring Techniques and Services (E2EMon), Salvador, Bahia, Brazil, April 2008.

  1. “When AppMon met Stager”

Nikos Nikiforakis, Demetres Antoniades, Evangelos P. Markatos, Sotiris Ioannidis, and Arne Olesbo. In Proceedings of the  6th  IEEE  Workshop on End-to-End  Monitoring  Techniques  and  Services (E2EMon), Salvador, Bahia, Brazil, April 2008.

  1. “Band-aid Patching”

Stelios Sidiroglou, Sotiris Ioannidis, and Angelos D. Keromytis. In Proceedings of the USENIX 3rd Workshop on Hot Topics in System Dependability (HotDep) (short paper), Edinburgh, UK, June 2007.

  1. “Performance Evaluation of a Privacy-Preserving Policy Reconciliation Protocol”

Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel, and Ulrike Meyer. In Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks (Policy), Rome, Italy, June 2007.

  1. “Distributed Privacy-Preserving Policy Reconciliation”

Ulrike Meyer, Susanne Wetzel, and Sotiris Ioannidis. In Proceedings of the IEEE International Conference on Communications (ICC), Glasgow, UK, June 2007.

  1. “Preserving TCP Connections Across Host Address Changes”

Vassilis Prevelakis and Sotiris Ioannidis. In Proceedings of the 9th Information Security Conference (ISC), Samos, Greece, August-September 2006.

  1. “Robust Reactions to Potential Day-Zero Worms through Cooperation and Validation”

Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis and Angelos D. Keromytis. In Proceedings of the 9th Information Security Conference (ISC), Samos, Greece, August-September 2006.

  1. “Privacy as an Operating System Service”

Sotiris Ioannidis, Stelios Sidiroglou and Angelos D. Keromytis. In Proceedings of the USENIX 1st Workshop on Hot Topics in Security (HotSec), Vancouver, BC, Canada, July 2006.

  1. “On the Impact of Practical P2P Incentive Mechanisms on User Behavior”

Kostas Anagnostakis, Fotios Harmantzis, Sotiris Ioannidis, and Manaf Zghaibeh. In Proceedings of the NET Institute Conference, New York, NY, USA, 2006.

  1. “Managing Access Control in Large Scale Heterogeneous Networks”

A. D. Keromytis, K. G. Anagnostakis, S. Ioannidis, M. Greenwald, and J. M. Smith. In Proceedings of the NATO C3 Symposium on Interoperable Networks for Secure Communications (INSC), the Hague, the Netherlands, November 2003.

  1. “A Cooperative Immunization System for an Untrusting Internet”

K. G. Anagnostakis, M. B. Greenwald, S. Ioannidis, A. D. Keromytis, and D. Li. In Proceedings of the 11th IEEE International Conference on Networks (ICON), pp. 403-408, Sydney, Australia, October 2003.

  1. “TAPI: Transactions for Accessing Public Infrastructure”

Matt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, and Vassilis Prevelakis. In Proceedings of the 8th IFIP Personal Wireless Communications (PWC) Conference, Venice, Italy, September 2003.

  1. “Secure and Flexible Global File Sharing”

Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, and Jonathan M. Smith. In Proceedings of the USENIX Annual Technical Conference, Freenix Track, pp. 165-178, San Antonio, TX, USA, June 2003.

  1. “Design and Implementation of Virtual Private Services”

Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, and Jonathan M. Smith. In Proceedings of the IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Enterprise Security, Special Session on Trust Management in Collaborative Global Computing, Linz, Austria, June 2003.

  1. “WebDAVA: An Administrator-Free Approach To Web File-Sharing”

Alexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis and Angelos D. Keromytis. In Proceedings of the IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Distributed and Mobile Collaboration, Linz, Austria, June 2003.

  1. “The STRONGMAN Architecture”

Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, and Jonathan M. Smith. In Proceedings of the Third DARPA Information Survivability Conference and Exposition (DISCEX III), Washington DC, USA, April 2003.

  1. “Open Packet Monitoring on FLAME: Safety, Performance and Applications”

K. G. Anagnostakis, M. Greenwald, S. Ioannidis, and S. Miltchev. In Proceedings of the 4th IFIP International Working Conference on Active Networks (IWAN), pp. 120-131, Zurich, Switzerland, December 2002.

  1. “Sub-Operating Systems: A New Approach to Application Security”

Sotiris Ioannidis, Steven M. Bellovin, and Jonathan M. Smith. In Proceedings of the ACM SIGOPS European Workshop, Saint-Emilion, France, September 2002.

  1. “A Study of the Relative Costs of Network Security Protocols”

Stefan Miltchev, Sotiris Ioannidis, and Angelos D. Keromytis. In Proceedings of USENIX 2002 Annual Technical Conference (ATC), Freenix Track, Monterey, CA, USA, June 2002.

  1. “xPF: Packet Filtering for Low-Cost Network Monitoring”

S. Ioannidis, K. G. Anagnostakis, J. Ioannidis, and A. D. Keromytis. In Proceedings of the IEEE Workshop on High-Performance Switching and Routing (HPSR), pp. 121-126, Kobe, Japan, May 2002.

  1. “Fileteller: Paying and Getting Paid for File Storage”

John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, and Vassilis Prevelakis. In Proceedings of Financial Cryptography (FC), Bermuda, March 2002.

  1. “Efficient Packet Monitoring for Network Management”

K. G. Anagnostakis, S. Ioannidis, S. Miltchev, J. Ioannidis, M. Greenwald, and J. M. Smith. In Proceedings of the 8th IEEE/IFIP Network Operations and Management Symposium (NOMS), pp. 423-436, Florence, Italy, April 2002.

  1. “Practical Network Applications on a Lightweight Active Management Environment”

K. G. Anagnostakis, S. Ioannidis, S. Miltchev, and J. M. Smith. In Proceedings of the 3rd IFIP International Working Conference on Active Networks (IWAN), pp. 101-115, Philadelphia, PA, USA, October 2001.

  1. “Building a Secure Web Browser”

Sotiris Ioannidis and Steven M. Bellovin. In Proceedings of the 2001 USENIX Annual Technical Conference (ATC), Freenix Track, Boston, MA, USA, June 2001.

  1. “Implementing a Distributed Firewall”

Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, and Jonathan M. Smith. In Proceedings of the ACM Computer and Communications Security (CCS), pp. 190-199, Athens, Greece, November 2000.

  1. “Scalable Resource Control in Active Networks”

K. G. Anagnostakis, M. W. Hicks, S. Ioannidis, A. D. Keromytis, and J. M. Smith. In Proceedings of the 2nd IFIP International Working Conference on Active Networks (IWAN), pp.  343-357, Tokyo, Japan, October 2000.

  1. “Using Network Memory to Improve the Performance of Transaction-Based Systems”

Sotiris Ioannidis, Evangelos P. Markatos, and Julia Sevaslidou. In Proceedings of International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA), Las Vegas, NV, USA, July 1998.

  1. “Compiler and Run-Time Support for Adaptive Load Balancing in Software Distributed Shared Memory Systems”

Sotiris Ioannidis and Sandhya Dwarkadas. In Proceedings of the ACM Fourth Workshop on Languages, Compilers, and Run-Time Systems for Scalable Computers (LCR), pp. 107-122, Pittsburg, PA, USA, May 1998.

Articles and White Papers

  1. “Evolving Twitter: an experimental analysis of graph properties of the social graph”

Despoina Antonakaki, Sotiris Ioannidis, and Paraskevi Fragopoulou. arXiv preprint arXiv:1510.01091, 2015.

  1. “Testing for common sense (violations) in airline pricing or how complexity asymmetry defeated you and the web”

Symeon Meichanetzoglou, Sotiris Ioannidis, and Nikolaos Laoutaris. arXiv preprint arXiv:1509.05382, 2015.

  1. Operational Trustworthiness Enabling Technologies - The OPTET Project”

Costas Kalogiros, Vasilis Tountopoulos, Sotiris Ioannidis, Sebastien Keller, and Pascal Bisson. In ERCIM News, No. 102, July 2015.

  1. “i-Code: Real-Time Malicious Code Identification”

Stefano Zanero, Sotiris Ioannidis, and Evangelos P. Markatos. ERCIM News 2012(90):2012

  1. “New Advances on Privacy-Preserving Policy Reconciliation”

Ulrike Meyer, Susanne Wetzel, and Sotiris Ioannidis. IACR eprint, Volume 64, Issue 201, 2010.

  1. “Drivers of Emerging and Future Threats in ICT Infrastructures”

Sotiris Ioannidis, Evangelos Markatos, Engin Kirda, and Christopher Kruegel. In ENISA Quarterly, Vol. 5, No. 3, July-September 2009.

  1. “Anticipating Security Threats to a Future Internet”

Herbert Bos, Erland Jonsson, Edita Djambazova, Sotiris Ioannidis, Kiril Dimitrov, Engin Kirda, and Christopher Kruegel. Future Internet Assembly. March 2009.

  1. “On looking FORWARD”

Sotiris Ioannidis, Evangelos Markatos, and Christopher Kruegel. In ERCIM News, No. 76, January 2009.

  1. “Tracing the Changing Nature of Cyberattacks”

Sotiris Ioannidis, Evangelos Markatos, Engin Kirda, and Christopher Kruegel. In ENISA Quarterly, Vol. 4, No. 4, October-December 2008.

Visionary Reports, Roadmaps, and Studies

  1. “The Red Book: A Roadmap for Systems Security Research”

SysSec Consortium, August 2013.

  1. Flying 2.0 Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology”

Alessandro Bassi, Jim Clarke, France Charles de Couessin, Sotiris Ioannidis, Eleni Kosta, Paul McCarthy, Huang Ming-Yuh, Eurico Neves, Dennis Nilsson, Milan Petkovic, Pawel Rotter, Markus Tieman, and David Wright. Publisher ENISA, April 2010

  1. “White Book: Emerging ICT Threats”

Forward Consortium, January 2010.

  1. “Resilience Features of IPv6, DNSSEC, and MPLS”

Sotiris Ioannidis, George Apostolopoulos, Kostas Anagnostakis, Nikolaos Nikiforakis, Andreas Makridakis, and Charalampos Gkikas, with the collaboration of ENISA, STA staff. Publisher ENISA, 2009.

Technical Reports

  1. “Building Software Defined Materials with Nanonetworks”

Christos Liaskos, Aggeliki Tsioliaridou, Andreas Pitsilides, Nikolaos Kantartzis, Antonios Lalas, Xenofon Dimitropoulos, Sotiris  Ioannidis, Maria Kafesaki, Costas Soukoulis. Technical Report 447, FORTH-ICS, September 2014.

  1. “Practical Information Flow for Legacy Web Applications”

Georgios Chinis, Polyvios Pratikakis, Elias Athanasopoulos, and Sotiris Ioannidis. Technical Report 428, FORTH-ICS, April 2012.

  1. “IRILD: an Information Retrieval based method for Information Leak Detection”

Eleni Gessiou, Quang Hieu Vu, and Sotiris Ioannidis. Technical Report 413, FORTH-ICS, 2011.

  1. “Digging up Social Structures from Documents on the Web”

Eleni Gessiou, Elias Athanasopoulos, and Sotiris Ioannidis. Technical Report 412, FORTH-ICS, 2011.

  1. “Digital is calling the Analog: Robust Prevention of Dial Attacks”

Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, and Evangelos P. Markatos. Technical Report 399, FORTH-ICS, October 2011.

  1. “Decentralized Access Control in Networked File Systems”

Stefan Miltchev, Jonathan M. Smith, Vassilis Prevelakis, Angelos D. Keromytis, and Sotiris Ioannidis. Technical Report, Department of Computer and Information Science, University of Pennsylvania, 2006.

  1. “Sub-Operating Systems: A New Approach to Application Security”

Sotiris Ioannidis and Steven M. Bellovin. Technical Report MS-CIS-01-06, Department of Computer and Information Science, University of Pennsylvania, 2001.

  1. “Scalable Security Policy Mechanisms”

Angelos Keromytis, Sotiris Ioannidis, Michael B. Greenwald, and Jonathan M. Smith. Technical Report MS-CIS-01-05, Department of Computer and Information Science, University of Pennsylvania, 2001.

  1. “On Using Network RAM as a non-volatile Buffer”

Dionisios Pnevmatikatos, Evangelos P. Markatos, Gregory Magklis, and Sotiris Ioannidis. Technical Report 227, FORTH-ICS, August 1998.

  1. On Using Network Memory to Improve the Performance of Transaction-Based Systems”

Sotiris Ioannidis, Evangelos P. Markatos, and Julia Sevaslidou. Technical Report 190, FORTH-ICS, July 1998.

Selected Invited Talks

  1. “Security Applications of GPUs”

International Symposium on Secure Virtual Infrastructures, Cloud and Trusted Computing (CTC), Rhodes, Greece, October 2016 (Keynote).

  1. “Security Applications of GPUs”

International Conference on Information Security Theory and Practice (WISTP), Heraklion, Greece, October 2016 (Keynote).

  1. “Security Applications of GPUs”

International Conference on Cryptology and Network Security (CANS), Heraklion, Greece, October 2014 (Keynote).

  1. “The Cost of Cyber-Insecurity”

International Conference “Safety & Security in Cyber Space: Building up trust in the EU”, Hellenic Presidency of the Council of the European Union, Athens, Greece, March 2014.

  1. “Emerging Threats and Actors”

BIC Workshop on the cross domain coordination of International Cooperation and technical themes in Trustworthy ICT and INCO, Brussels, Belgium, June 2012.

  1. “Systems Security Research at the Distributed Computing Systems Lab”

Chalmers University of Technology,  Goteborg, Sweden, April 2012.

  1. “Challenges and Directions for Security in Networked Systems”

4th EU-Japan Symposium on Next Generation Networks and the Future Internet, Tokyo, Japan, 19th January 2012 (Keynote).

  1. “Future Threats in Networked Systems”

Network and Information Security Ideas Workshop, European Commission, Brussels, Belgium, 22nd September 2011.

  1. “WOMBAT: Worldwide Observatory of Malicious Behaviors and Attack Threats”

BIC Building International Collaboration for Trustworthy ICT, Workshop on Systems Security (SysSec), Amsterdam, Netherlands, July 2011.

  1. “Privacy-preserving Policies, Protocols and Architectures”

International Workshop on Policies for the Future Internet (POFI), Pisa, Italy, June 2011.

  1. “GPU-Assisted Malware”

AIT Workshop on Practical aspects of security (PRACSE), October 2010.

  1. “Cloud Computing Threats (real and perceived)”

Free and Open Source Software Workshop, University of Crete, May 2010.

  1. “Privacy as a System Service”

HIDE EU Project Privacy Enhancing Technologies Working Group, London 2009.

  1. “Web Security”

W3C Workshop, Foundation for Research and Technology – Hellas, September 2009.

  1. “Gnort: High Performance Intrusion Detection Using Graphics Processors”

AIT Workshop on Practical aspects of security (PRACSE), June 2009.

  1. Security and Privacy in a Networked and Mobile World

FIDIS Interdisciplinary Doctoral Consortium, June 2008.

  1. “Consistent Security Policy Evaluation”

Stevens, Columbia, and IBM Research, Security and Privacy Day, November 2005.

  1. “Consistent Security Policy for Decentralized Systems”

Institute of Computer Science, Foundation for Research and Technology Hellas, February 2004.

  1. “Abstraction, Specification and Enforcement of Security Policies for Decentralized Systems”

TACL Seminar, Princeton University, November 2003.

  1. “Consistent Security Policy for Decentralized Systems”

Rutgers University, July 2003.

  1. “Abstraction, Specification and Enforcement of Security Policies for Decentralized Systems”

Secure Systems Research Department, AT&T Labs Research, September 2002.

  1. “Fine-Grain Policy-Based Access Control for Distributed Systems”

SDL–LCS Seminar Series, Carnegie-Mellon University, April 2002.