S
Stylianos Sidiroglou
Researcher at Columbia University
Publications - 14
Citations - 1397
Stylianos Sidiroglou is an academic researcher from Columbia University. The author has contributed to research in topics: Software development & Legacy system. The author has an hindex of 11, co-authored 14 publications receiving 1397 citations.
Papers
More filters
Patent
Methods, systems, and media for detecting covert malware
Brian M. Bowen,Pratap Prabhu,Vasileios P. Kemerlis,Stylianos Sidiroglou,Salvatore J. Stolfo,Angelos D. Keromytis +5 more
TL;DR: In this article, a method for detecting covert malware in a computing environment is provided, the method comprising: generating simulated user activity outside of the computing environment; conveying the simulated user activities to an application inside the environment; and determining whether a decoy corresponding to the simulated users' activity has been accessed by an unauthorized entity.
Patent
Systems and methods for detecting and inhibiting attacks using honeypots
TL;DR: In this paper, an anomaly detection component monitors the received traffic and routes the traffic either to the protected application or to a honeypot, where the honeypot shares all state information with the application.
Proceedings ArticleDOI
Detecting targeted attacks using shadow honeypots
Kostas G. Anagnostakis,Stylianos Sidiroglou,Periklis Akritidis,K. Xinidis,Evangelos P. Markatos,Angelos D. Keromytis +5 more
TL;DR: It is shown that despite a considerable overhead in the instrumentation of the shadow honeypot (up to 20% for Apache), the overall impact on the system is diminished by the ability to minimize the rate of false-positives.
Patent
Methods and systems for repairing applications
TL;DR: In this paper, computer implemented methods and systems are provided that allow an application to automatically recover from software failures and attacks using one or more sensors, failures may be detected in the application In response to detecting the failure, the portion of the application's code that caused the failure is isolated using the input vectors that caused a failure, information regarding the failure (e.g., the type of failure), a core dump file (eg, stack trace), etc.
Journal ArticleDOI
Ubiquitous computing in home networks
TL;DR: This work develops a system based on the Session Initiation Protocol (SIP), with Bluetooth devices for location sensing and the Service Location Protocol (SLP) for service discovery, and introduces context-aware location information to augment device discovery and bind user communication.