Vasileios P. Kemerlis (e-mail)

Network Security Lab
Department of Computer Science
Columbia University

450 Computer Science Building
1214 Amsterdam Avenue, M.C. 0401
New York, NY 10027, USA
BSD Daemon Copyright 1988 by Marshall Kirk McKusick
I am was on the academic job market this year.
I'll be joining Brown University as an Assistant Professor in Fall '15.
[Curriculum Vitae]

Publications

Conference Papers

  1. V. P. Kemerlis, M. Polychronakis, and A. D. Keromytis. "ret2dir: Rethinking Kernel Isolation". 23rd USENIX Security Symposium (USENIX Sec). San Diego, CA, USA, August 2014. [Software]
  2. K. Jee, V. P. Kemerlis, A. D. Keromytis, and G. Portokalidis. "ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking". 20th ACM Computer and Communications Security Conference (CCS). Berlin, Germany, October 2013.
  3. V. Pappas, V. P. Kemerlis, A. Zavou, M. Polychronakis, and A. D. Keromytis. "CloudFence: Data Flow Tracking as a Cloud Service". 16th International Symposium on Recent Advances in Intrusion Detection (RAID). Saint Lucia, October 2013.
  4. M. V. Barbera, V. P. Kemerlis, V. Pappas, and A. D. Keromytis. "CellFlood: Attacking Tor Onion Routers on the Cheap". 18th European Symposium on Research in Computer Security (ESORICS). Egham, UK, September 2013.
  5. A. Zavou, V. Pappas, V. P. Kemerlis, M. Polychronakis, G. Portokalidis, and A. D. Keromytis. "Cloudopsy: an Autopsy of Data Flows in the Cloud". 15th International Conference on Human-Computer Interaction (HCI). Las Vegas, NV, USA, July 2013.
  6. D. Geneiatakis, G. Portokalidis, V. P. Kemerlis, and A. D. Keromytis. "Adaptive Defenses for Commodity Software through Virtual Application Partitioning". 19th ACM Computer and Communications Security Conference (CCS). Raleigh, NC, USA, October 2012. [Software]
  7. V. P. Kemerlis, G. Portokalidis, and A. D. Keromytis. "kGuard: Lightweight Kernel Protection against Return-to-user Attacks". 21st USENIX Security Symposium (USENIX Sec). Bellevue, WA, USA, August 2012. [Software]
  8. E. Athanasopoulos, V. P. Kemerlis, M. Polychronakis, and E. P. Markatos. "ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches". 10th International Conference on Applied Cryptography and Network Security (ACNS). Singapore, June 2012.
  9. V. P. Kemerlis, G. Portokalidis, K. Jee, and A. D. Keromytis. "libdft: Practical Dynamic Data Flow Tracking for Commodity Systems". 8th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE). London, UK, March 2012. [Software]
  10. K. Jee, G. Portokalidis, V. P. Kemerlis, S. Ghosh, D. I. August, and A. D. Keromytis. "A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware". 19th ISOC Symposium on Network and Distributed System Security (NDSS). San Diego, CA, USA, February 2012.
  11. V. P. Kemerlis, V. Pappas, G. Portokalidis, and A. D. Keromytis. "iLeak: A Lightweight System for Detecting Inadvertent Information Leaks". 6th European Conference on Computer Network Defense (EC2ND). Berlin, Germany, October 2010.
  12. B. M. Bowen, P. Prabhu, V. P. Kemerlis, S. Sidiroglou, A. D. Keromytis, and S. J. Stolfo. "BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection". 13th International Symposium on Recent Advances in Intrusion Detection (RAID). Ottawa, Canada, September 2010.
  13. B. M. Bowen, V. P. Kemerlis, P. Prabhu, A. D. Keromytis, and S. J. Stolfo. "Automating the Injection of Believable Decoys to Detect Snooping". 3rd ACM Conference on Wireless Network Security (WiSec). Hoboken, NJ, USA, March 2010 (short paper).
  14. K. Katsaros, V. P. Kemerlis, C. Stais, and G. Xylomenos. "A BitTorrent Module for the OMNeT++ Simulator". 17th IEEE/ACM International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS). London, UK, September 2009. [Software]
  15. A. Kosmopoulos, I. Karamichali, V. P. Kemerlis, and G. C. Polyzos. "Fueling Game Development in Mobile P2P Environments". 18th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). Athens, Greece, September 2007.
  16. P. A. Frangoudis, V. P. Kemerlis, D. C. Paraskevaidis, E. C. Efstathiou, and G. C. Polyzos. "Experimental Evaluation of Community-Based WLAN Voice and Data Services". 3rd ICST International Mobile Multimedia Communications Conference (MobiMedia). Nafpaktos, Greece, August 2007.
  17. E. G. Giannopoulou, V. P. Kemerlis, M. Polemis, J. Papaparaskevas, A. C. Vatopoulos, and M. Vazirgiannis. "A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance". 20th IEEE International Symposium on Computer-Based Medical Systems (CBMS). Maribor, Slovenia, June 2007.
  18. E. C. Efstathiou, F. A. Elianos, P. A. Frangoudis, V. P. Kemerlis, D. C. Paraskevaidis, E. C. Stefanis, and G. C. Polyzos. "Public Infrastructures for Internet Access in Metropolitan Areas". 1st ICST International Conference on Access Networks (AccessNets). Athens, Greece, September 2006 (invited paper). [Software]
  19. V. P. Kemerlis, E. C. Stefanis, G. Xylomenos, and G. C. Polyzos. "Throughput Unfairness in TCP over WiFi". 3rd IFIP Conference on Wireless On Demand Network Systems and Services (WONS). Les Ménuires, France, January 2006.

Workshop Papers

  1. G. Xylomenos, K. Katsaros, and V. P. Kemerlis. "Peer Assisted Content Distribution over Router Assisted Overlay Multicast". 1st Euro-NF Workshop on Future Internet Architecture (FIA). Paris, France, November 2008.

Journal Papers

  1. V. P. Kemerlis, G. Portokalidis, E. Athanasopoulos, and A. D. Keromytis. "kGuard: Lightweight Kernel Protection". USENIX ;login: Magazine, 37(6), December 2012.
  2. B. M. Bowen, V. P. Kemerlis, P. Prabhu, A. D. Keromytis, and S. J. Stolfo. "A System for Generating and Injecting Indistinguishable Network Decoys". Journal of Computer Security (JCS), 20(2-3), January 2012.
  3. P. A. Frangoudis, G. C. Polyzos, and V. P. Kemerlis. "Wireless Community Networks: An Alternative Approach for Broadband Nomadic Network Access". IEEE Communications Magazine, 49(5), May 2011.

Demos

  1. E. C. Efstathiou, F. A. Elianos, P. A. Frangoudis, V. P. Kemerlis, D. C. Paraskevaidis, G. C. Polyzos, and E. C. Stefanis. "Practical Incentive Techniques for Wireless Community Networks". 4th ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys). Uppsala, Sweden, June 2006.
  2. E. C. Efstathiou, F. A. Elianos, P. A. Frangoudis, V. P. Kemerlis, D. C. Paraskevaidis, G. C. Polyzos, and E. C. Stefanis. "The Peer-to-Peer Wireless Network Confederation Scheme". 25th IEEE International Conference on Computer Communications (INFOCOM). Barcelona, Spain, April 2006.
  3. E. C. Efstathiou, F. A. Elianos, P. A. Frangoudis, V. P. Kemerlis, D. C. Paraskevaidis, G. C. Polyzos, and E. C. Stefanis. "The Peer-to-Peer Wireless Network Confederation Scheme: Protocols, Algorithms, and Services". 2nd ICST International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom). Barcelona, Spain, March 2006.