TUM Logo

Apostolis Zarras

Dr. Apostolis Zarras

Alumni

E-Mail:

Publications

2023   Free Willy: Prune System Calls to Enhance Software Security

ACM/SIGAPP Symposium on Applied Computing (SAC)

2021   Hybroid: Toward Android Malware Detectionand Categorization with Program Code and Network Traffic

International Security Conference (ISC 2021)

  Falcon: Malware Detection and Categorization with Network Traffic Images

ICANN - The International Conference on Artificial Neural Networks

  HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs

ICANN - The International Conference on Artificial Neural Networks

2020   Detecting and Categorizing Android Malware with Graph Neural Networks

The 36th ACM/SIGAPP Symposium On Applied Computing

2019   MANIS: Evading Malware Detection System on Graph Structure

The 35th ACM/SIGAPP Symposium On Applied Computing

2018   Learning on a Budget for User Authentication on Mobile Devices

Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2018)

  Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection

Annual Computer Security Applications Conference (ACSAC)

  Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection

IFIP International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)

  Smashing the Stack Protector for Fun and Profit

IFIP Information Security Conference & Privacy Conference (IFIP SEC)

2017   Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks

15th Annual Conference on Privacy, Security and Trust (PST)

  Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage

14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)

  Empowering Convolutional Networks for Malware Classification and Analysis

30th International Joint Conference on Neural Networks (IJCNN)

  Combating Control Flow Linearization

32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)

  Towards Automated Classification of Firmware Images and Identification of Embedded Devices

32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)

2016   Deep Learning for Classification of Malware System Call Sequences

29th Australasian Joint Conference on Artificial Intelligence (AI)

  Leveraging Internet Services to Evade Censorship

19th International Conference on Information Security (ISC)

  SKALD: A Scalable Architecture for Feature Extraction, Multi-User Analysis, and Real-Time Information Sharing

19th International Conference on Information Security (ISC)

  Adaptive Semantics-Aware Malware Classification

13th Conference on Detection of Intrusions and Malware \& Vulnerability Assessment (DIMVA)

  Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces

11th ACM Asia Conference on Computer and Communications Security (ASIACCS)

  Neuralyzer: Flexible Expiration Times for the Revocation of Online Data

6th ACM Conference on Data and Application Security and Privacy (CODASPY)

2015   Revealing the Relationship Network Behind Link Spam

13th Annual Conference on Privacy, Security and Trust (PST)

2014   The Art of False Alarms in the Game of Deception: Leveraging Fake Honeypots for Enhanced Security

48th IEEE International Carnahan Conference on Security Technology (ICCST)

  Automated Generation of Models for Fast and Precise Detection of HTTP-Based Malware

12th Annual Conference on Privacy, Security and Trust (PST)

2013   k-subscription: Privacy-preserving Microblogging Browsing through Obfuscation

29th ACM Annual Computer Security Applications Conference (ACSAC)

2012   B@bel: Leveraging Email Delivery for Spam Mitigation

21st USENIX Security Symposium

2011   Understanding Fraudulent Activities in Online Ad Exchanges

11th ACM SIGCOMM Internet Measurement Conference (IMC)