Stelios Sidiroglou-Douskos
Stelios Sidiroglou-Douskos
Research Scientist at MIT CSAIL
Verified email at csail.mit.edu - Homepage
TitleCited byYear
Managing performance vs. accuracy trade-offs with loop perforation
S Sidiroglou-Douskos, S Misailovic, H Hoffmann, M Rinard
Proceedings of the 19th ACM SIGSOFT symposium and the 13th European …, 2011
4372011
Automatically patching errors in deployed software
JH Perkins, S Kim, S Larsen, S Amarasinghe, J Bachrach, M Carbin, ...
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
3902009
Dynamic knobs for responsive power-aware computing
H Hoffmann, S Sidiroglou, M Carbin, S Misailovic, A Agarwal, M Rinard
Proceedings of the sixteenth international conference on Architectural …, 2011
3552011
Detecting targeted attacks using shadow honeypots
KG Anagnostakis, S Sidiroglou, P Akritidis, K Xinidis, E Markatos, ...
2742005
Methods, systems, and media for detecting covert malware
BM Bowen, PV Prabhu, VP Kemerlis, S Sidiroglou, SJ Stolfo, ...
US Patent 8,528,091, 2013
2682013
Building a reactive immune system for software services
S Sidiroglou, ME Locasto, SW Boyd, AD Keromytis
2352005
Quality of service profiling
S Misailovic, S Sidiroglou, H Hoffmann, M Rinard
Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010
2332010
Systems and methods for detecting and inhibiting attacks using honeypots
S Sidiroglou, AD Keromytis, KG Anagnostakis
US Patent 7,904,959, 2011
2302011
Assure: automatic software self-healing using rescue points
S Sidiroglou, O Laadan, C Perez, N Viennot, J Nieh, AD Keromytis
ACM SIGARCH Computer Architecture News 37 (1), 37-48, 2009
2012009
Control jujutsu: On the weaknesses of fine-grained control flow integrity
I Evans, F Long, U Otgonbaatar, H Shrobe, M Rinard, H Okhravi, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1692015
Countering network worms through automatic patch generation
S Sidiroglou, AD Keromytis
IEEE Security & Privacy 3 (6), 41-49, 2005
1502005
Missing the point (er): On the effectiveness of code pointer integrity
I Evans, S Fingeret, J Gonzalez, U Otgonbaatar, T Tang, H Shrobe, ...
2015 IEEE Symposium on Security and Privacy, 781-796, 2015
1382015
Ubiquitous computing in home networks
H Schulzrinne, X Wu, S Sidiroglou, S Berger
IEEE Communications Magazine 41 (11), 128-135, 2003
1382003
Using code perforation to improve performance, reduce energy consumption, and respond to failures
H Hoffmann, S Misailovic, S Sidiroglou, A Agarwal, M Rinard
1312009
Methods and systems for repairing applications
AD Keromytis, M Locasto, S Sidiroglou
US Patent 7,490,268, 2009
1132009
A network worm vaccine architecture
S Sidiroglou, AD Keromytis
WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling …, 2003
1062003
Automatic error elimination by horizontal code transfer across multiple applications
S Sidiroglou-Douskos, E Lahtinen, F Long, M Rinard
Proceedings of the 36th ACM SIGPLAN Conference on Programming Language …, 2015
1032015
A dynamic mechanism for recovering from buffer overflow attacks
S Sidiroglou, G Giovanidis, AD Keromytis
International Conference on Information Security, 1-15, 2005
932005
Methods, media and systems for detecting anomalous program executions
SJ Stolfo, AD Keromytis, S Sidiroglou
US Patent 8,074,115, 2011
902011
Software self-healing using collaborative application communities
ME Locasto, S Sidiroglou, AD Keromytis
842006
The system can't perform the operation now. Try again later.
Articles 1–20