Georgios Portokalidis

Total Page:16

File Type:pdf, Size:1020Kb

Load more

Georgios Portokalidis Schaefer School of Engineering & Science, Dept. of Computer Science, Stevens Institute of Technology, NJ, USA E-mail: [email protected], Homepage: http://www.cs.stevens.edu/∼porto Professional Experience Stevens Institute of Technology, New Jersey, USA January 2013 - present Assistant Professor of Computer Science Columbia University, New York, USA March 2010 - December 2012 Postdoctoral researcher in the Network Security Lab (NSL) NICTA, Sydney, Australia August 2008 Visiting researcher in the ERTOS group at the Neville Roach Lab (NRL) Institute for Infocomm Research, Singapore May 2008 - July 2008 Visiting Researcher in the Internet Security Lab Microsoft Research at Cambridge, UK April 2007 - June 2007 Intern Intel Research at Cambridge, UK September 2004 - January 2005 Intern, working with the Xen hypervisor Leiden University, The Netherlands September 2003 - July 2004 Research assistant, working on network monitoring (FFPF), and the open kernel environment (OKE) Internet Hellas, Greece June 2001 - August 2001 Summer trainee, working on a mobile marketing platform ATLANTIS group, Greece November 1999 - February 2002 Web and application developer, system administrator UCnet University of Crete, Greece March 2000 - September 2000 Assistant system administrator E.L.K.E. University of Crete, Greece December 1999 - February 2000 Assistant system administrator Education Ph.D. Computer Science, Vrije University, The Netherlands February 2010 Thesis title: “Using Virtualisation Against Zero-Day Attacks” Promoter: Henri Bal, Advisor: Herbert Bos M.Sc. Computer Science, Leiden University, The Netherlands April 2005 Thesis title: “Zero Hour Worm Detection and Containment Using Honeypots” Advisor: Herbert Bos B.Sc. Computer Science, University of Crete, Greece July 2002 Dissertation title: “Study and Bridging of Peer-to-Peer File Sharing Systems” Advisor: Evangelos P. Markatos Georgios Portokalidis Grants and Awards Co-PI, ”MINESTRONE Task: Automatic Discovery of Rescue Points Using Static and Dynamic Analysis”, IARPA, $270,400 (September 2012 - November 2014) Best paper award at the 6th International Workshop on Security (IWSEC2011), Tokyo, Japan, November 2011 Publications Peer-reviewed Conferences and Workshops Exploiting Split Browsers for Efficiently Protecting User Data To appear in the Proceedings of the ACM Cloud Computing Security Workshop (CCSW) Raleigh, NC, USA, October 2012 Adaptive Defenses for Commodity Software through Virtual Application Partitioning To appear in the Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS) Raleigh, NC, USA, October 2012 (Acceptance rate: 18.9%) kGuard: Lightweight Kernel Protection against Return-to-user Attacks In the Proceedings of the 21st USENIX Security Symposium Bellevue, WA, USA, August 2012 (Acceptance rate: 19.4%) libdft: Practical Dynamic Data Flow Tracking for Commodity Systems Proceedings of the 8th International Conference on Virtual Execution Environments (VEE) London, UK, March 2012 (Acceptance rate: 17.8%) A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS) San Diego, CA, USA, February, 2012 (Acceptance rate: 17.8%) A Multilayer Overlay Network Architecture for Enhancing IP Services Availability Against DoS Proceedings of the 7th International Conference on Information Systems Security (ICISS) Kolkata, India, December 2011 (Acceptance rate: 22.8%) REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points (Received best paper award) Proceedings of the 6th International Workshop on Security (IWSEC2011) Tokyo, Japan, November 2011 Taint-Exchange: a Practical System for Cross-process and Cross-host Taint Tracking Proceedings of the 6th International Workshop on Security (IWSEC2011) Tokyo, Japan, November 2011 Detecting Traffic Snooping in Tor Using Decoys Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (RAID) Menlo Park, CA, USA, September 2011 (Acceptance rate: 23%) Paranoid Android: Versatile Protection For Smartphones Proceedings of the 2010 Annual Computer Security Applications Conference (ACSAC) Austin, TX, USA, December 2010 (Acceptance rate: 17%) Fast and Practical Instruction-Set Randomization for Commodity Systems Proceedings of the 2010 Annual Computer Security Applications Conference (ACSAC) Austin, TX, USA, December 2010 (Acceptance rate: 17%) 2 Georgios Portokalidis iLeak: A Lightweight System for Detecting Inadvertent Information Leaks Proceedings of the European Conference on Computer Network Defense (EC2ND) Berlin, Germany, October 2010 Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems Glasgow, Scotland, April 2008 (Acceptance rate: 18%) Argos: Emulated Hardware Support to Fingerprint Zero-Day Attacks by Means of Dynamic Data Flow Analysis Proceedings of the 12th Annual Conference of the Advanced School for Computing and Imaging Belgium, 2006 Argos: an Emulator for Fingerprinting Zero-Day Attacks Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems Leuven, Belgium, April 2006 (Acceptance rate: 20%) FFPF: Fairly Fast Packet Filters Proceedings of the 6th Symposium on Operating Systems Design & Implementation (OSDI) San Francisco, CA, USA, December 2004 (Acceptance rate: 14%) Journals SweetBait: Zero-Hour Worm Detection and Containment Using Low- and High-Interaction Honeypots Elsevier Computer Networks: The International Journal of Computer and Telecommunications Networking (Volume 51, Issue 5, Pages 1256-1274, April 2007) Invited Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution Proceedings of the ARO Workshop on Moving Target Defense, Fairfax, VA, USA October 2010 Argos: Securing IP Communications Against Zero-Day Attacks Proceedings of NLUUG Unix Users Group Annual Conference, The Netherlands, 2006 Technical Reports libdft: Practical Dynamic Data Flow Tracking for Commodity Systems Technical Report CUCS-044-11, Columbia University, New York, USA, October 2011 Protecting Smart Phones by Means of Execution Replication Technical Report IR-CS-054, Vrije Universiteit Amsterdam, September 2009 Multi-tier intrusion detection by means of replayable virtual machines Technical Report IR-CS-047, Vrije Universiteit Amsterdam, August 2008 Prospector: a Protocol-Specific Detector of Polymorphic Buffer Overflows Technical report IR-CS-023, Vrije Universiteit Amsterdam, June 2006 Argos: an x86 Emulator for Fingerprinting Zero-Day Attacks by Means of Dynamic Data Flow Analysis Technical report IR-CS-017, Vrije Universiteit Amsterdam, October 2005 SweetBait: Zero-Hour Worm Detection and Containment Using Honeypots Technical report IR-ICS-015, Vrije Universiteit Amsterdam, May 2005 Packet Monitoring at High Speed with FFPF Technical report 2004-01, LIACS, Leiden University, 2004 Study and Bridging of Peer-to-Peer File Sharing Systems Technical report 312, ICS-FORTH, Heraklion, Crete, Greece, October 2002 3 Georgios Portokalidis Invited Talks Paranoid Android: Versatile Protection For Smartphones AT&T Security Research Center, New York, NY, USA, December 2011 Heavyweight Protection for Lightweight Devices Internet Research Group, Telefonica Research, Barcelona, Spain, May 2009 Argos: an Emulator for Fingerprinting Zero-Day Attacks Invited talk IBM Research, Z¨urich, Switzerland, July, 2006 Professional Activities Program Committees 2012 Annual Computer Security Applications Conference (ACSAC28) 7th European Conference on Computer Network Defense (EC2ND 2011) 9th International Conference on Cryptology And Network Security (CANS 2010) ACM EuroSys 2010 Conference (Shadow PC) Ph.D. Thesis Committee Service Asia Slowinska, ”Using Information Flow Tracking to Protect Legacy Binaries”, Vrije Universiteit Ams- terdam Other Chair, ICT-FORWARD panel on “Future Threats: Mobile Personal Devices”. In the context of the 2009 European Workshop on System Security (EUROSEC09) Panelist, ICT-FORWARD panel on “Future and Emerging Threats in Information and Communication Technology Infrastructures”. In the context of the 2008 European Conference on Computer and Network Defense (EC2ND) Teaching Practical courses at Vrije Universiteit Spring 2006, 2007, 2009 Designed a practical course for teaching the basics of security to secondary school kids. The practical involves the use of a bootable DVD which runs linux, and includes a set of developed tools that demonstrate how an Internet worm spreads, and enables the students to perform attacks in an isolated environment, as part of a “last man standing” game. The practical has been a success, and resulted in a deal to freely distribute the DVD in secondary schools in the Netherlands, in conjunction with a syllabus written by Prof. Herbert Bos. Tutorial on Information Flow Tracking European Conference on Computer Network Defense (EC2ND), Dublin, Ireland, December 2008 Student Supervisions Columbia University (co-supervised with Prof. Angelos Keromytis) Sambuddho Chakravarty, PhD student. Expected graduation: June 2013 Kangkook Jee, PhD student. Expected graduation: June 2014 Vasileios P. Kemerlis, PhD student. Expected graduation: June 2014 Angelika Zavou, PhD student. Expected graduation: June 2013 Muhammad Ali Akbar, MSc Student. Graduated: January 2012 4 Georgios Portokalidis Vrije Universiteit (co-supervised with Prof. Herbert Bos) Erik
Recommended publications
  • Hierarchical Data Storage and Processing on the Edge of the Network

    Hierarchical Data Storage and Processing on the Edge of the Network

    Hierarchical Data Storage And Processing on the Edge of the Network by Seyed Hossein Mortazavi A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Computer Science University of Toronto c Copyright 2020 by Seyed Hossein Mortazavi Abstract Hierarchical Data Storage And Processing on the Edge of the Network Seyed Hossein Mortazavi Doctor of Philosophy Graduate Department of Computer Science University of Toronto 2020 Current wireless mobile networks are not able to support next generation applications that require low latency or produce large volumes of data that can overwhelm the network. Examples include video analysis applications, wearable devices, safety critical applications and intelligent smart city systems. The use of servers on the wide-area cloud, however, is also not an option as these applications require low response times, or involve processing of large volumes of data from many devices. To address these challenges, edge computing proposes the addition of computation and storage capabilities to the edge of the network [30, 19]. This thesis generalizes edge computing into a hierarchical cloud architecture deployed over the geographic span of a network. The vision supports scalable processing by providing storage and computation along a succession of datacenters positioned between the end device and the traditional wide area cloud datacenter. I develop a new deployment and execution platform called CloudPath based on the Function as a Service (FaaS) model that supports code and data mobility and distribution by enforcing a clear separation between computation and state. In CloudPath applications will be composed of a collection of light-weight stateless event handlers that can be implemented using high level languages, such as Java.
  • Report on the PIONIER Project “Programming Parallel And

    Report on the PIONIER Project “Programming Parallel And

    Report on the PIONIER project ªProgramming Parallel and Distributed Computer Systemsº (January 1993 - June 1998) Henri E. Bal Department of Mathematics and Computer Science Vrije Universiteit, Amsterdam 1. Introduction This report summarizes the research results of the project “Programming Parallel and Distributed Computer Systems,” which took place at the department of Mathematics and Computer Science of the Vrije Universiteit during 1 January 1993 to 30 June 1998. This project was funded by the Nether- lands Organization for Scientific Research (NWO) through a PIONIER grant (PGS 62-382) awarded to Henri Bal. Parallel (or high-performance) computing is being used more and more often for solving com- putationally intensive problems. Unfortunately, developing correct, portable, and efficient parallel software is a difficult task, which limits further acceptance of parallel computing. The goals of the PIONIER project are to ease the task of parallel programming as much as possible, while also achiev- ing good performance and high portability of parallel programs. These three goals (ease of use, per- formance, and portability) are often conflicting, but all are crucial to the success of parallel program- ming. Our research followed three directions: to find the right level of abstraction (or model) for a parallel language, to study efficient and portable implementation techniques for parallel languages, and to evaluate all our ideas (about models and their implementation) using realistic applications. The research therefore has aspects of: - Programming language design and programming models. - Systems software (compilers, runtime systems, communication software). - Parallel applications. A distinguishing feature of our research program is that we pay considerable attention to each of these areas.
  • Call for Papers Papers

    Call for Papers Papers

    apers Papers P Call for GENERAL CHAIR http://www.hpdc.org/2012/ Dick Epema, Delft University of Technology The ACM International Symposium on High‐Performance Parallel and Distributed Computing (HPDC) PROGRAM CO‐CHAIRS is the premier annual conference on the design, the implementation, the evaluation, and the use of Thilo Kielmann, Vrije Universiteit Matei Ripeanu, University of British Columbia parallel and distributed systems for high‐end computing. HPDC’12 will take place in Delft, the Netherlands, a historical, picturesque city that is less than one hour away from Amsterdam‐Schiphol POSTERS CHAIR airport. The conference will be held on June 20‐22 (Wednesday to Friday), with affiliated workshops Ana Varbanescu, Delft Univ. of Technology and Vrije Univ. taking place on June 18‐19 (Monday and Tuesday). WORKSHOPS CHAIR Alexandru Iosup, Delft University of Technology SCOPE AND TOPICS SPONSORSHIP CHAIR Submissions are welcomed on all forms of high‐performance parallel and distributed computing, Jack Lange, University of Pittsburgh including but not limited to clusters, clouds, grids, utility computing, data‐intensive computing, and massively multicore systems. Submissions that explore solutions to estimate and reduce the energy PUBLICITY CO‐CHAIRS Gabriel Antoniu, INRIA footprint of such systems are particularly encouraged. All papers will be evaluated for their Naoya Maruyama, Tokyo Institute of Technology originality, potential impact, correctness, quality of presentation, appropriate presentation of Ioan Raicu, Illinois Institute of Technology and Argonne NL related work, and relevance to the conference, with a strong preference for rigorous results obtained in operational parallel and distributed systems. STEERING COMMITTEE Henri Bal, Vrije Universiteit The topics of interest of the conference include, but are not limited to, the following, in the context Andrew A.
  • Curriculum Vitae of Andrew S. Tanenbaum Full Name Address

    Curriculum Vitae of Andrew S. Tanenbaum Full Name Address

    Curriculum Vitae of Andrew S. Tanenbaum Full Name Andrew Stuart Tanenbaum Address Dept. of Computer Science Faculty of Sciences Vrije Universiteit De Boelelaan 1081A 1081 HV Amsterdam, The Netherlands Telephone Numbers/Email +31 20 444-7780 (voice) [email protected] (email) Date and Place of Birth 16 March 1944, New York City Citizenship US Education Ph. D., University of California, Berkeley, 1971 S. B., M.I.T., 1965 White Plains High School, White Plains, N.Y., 1961 Employment March 2014 - present: Professor emeritus and guest professor, Vrije Universiteit June 1973 - March 2014: Vrije Universiteit, Amsterdam Sep. 1971 - June 1973: Vrije Universiteit, Amsterdam (half time) Oct. 1971 - June 1973: Mathematisch Centrum, Amsterdam (half time) Extended Visits to Unversities and Research Laboratories Consultant to Bell Laboratories, Murray Hill, NJ, July-Aug. 1983. Consultant to Bell Laboratories, Murray Hill, NJ, Aug. 1980. Consultant to Bell Laboratories, Murray Hill, NJ, June-Aug 1979. Visiting Scholar, University of Guelph, Ontario, Jan. 1979. Research Interests Dependable and secure operating systems Distributed and parallel systems Computer and Internet security -2- Courses Taught Computer Networks Computer Organization Distributed Systems Grant Proposal Writing Operating Systems Programming Languages Memberships ACM (Fellow) IEEE Computer Society (Fellow) Sigma Xi Professional Activities Scientific Director, Advanced School for Computing and Imaging Member, Editorial Board, The Computer Journal Referee for Communications of the ACM Referee
  • Scalable Cluster Technologies for Mission-Critical Enterprise Computing

    Scalable Cluster Technologies for Mission-Critical Enterprise Computing

    Scalable Cluster Technologies for Mission-Critical Enterprise Computing Werner H.P. Vogels VRIJE UNIVERSITEIT Scalable Cluster Technologies for Mission-Critical Enterprise Computing ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Vrije Universiteit Amsterdam, op gezag van de rector magnificus prof.dr. T. Sminia, in het openbaar te verdedigen ten overstaan van de promotiecommissie van de faculteit der Exacte Wetenschappen op dinsdag 11 november 2003 om 13.45 uur in het aula van de universiteit, De Boelelaan 1105 door Werner Hans Peter Vogels geboren te Ermelo promotoren: prof.dr.ir. H.E. Bal prof.dr. A.S. Tanenbaum In rememberance of those who would have loved to read about this work Rob & Trees Cor van den Biggelaar Alje van der Laan Wilhelmus Vogels Copyright © 2003 by Werner H.P. Vogels This work is licensed under the Creative Commons Attribution-NoDerivs- NonCommercial License. To view a copy of this license, visit http: //creativecommons.org/licenses/by-nd-nc/1.0 or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. ISBN: 1-4116-0166-1 Chapter 2 has been published in the Proceedings of the 15th ACM Symposium on Operating Systems Principles, Copper Mountain, CO, December 1995. Chapter 3 has been published in IEEE Computer, Volume 31 Number 11, November 1998. Chapter 4 has been published in the Proceedings of the 8th IEEE Hot Interconnets Symposium, Stanford, CA, August 2000. Chapter 5 has been published in Proceedings of the 8th ACM SIGOPS European Workshop, Sintra, Portugal, September 1998. Chapter 6 has been published in Proceedings of the 2nd International Enterprise Distributed Object Computing Conference, San Diego, November, 1998.