20.01.2014 Views

Sotiris Ioannidis Research Interests Education Employment Summary

Sotiris Ioannidis Research Interests Education Employment Summary

Sotiris Ioannidis Research Interests Education Employment Summary

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Sotiris</strong> <strong>Ioannidis</strong><br />

Institute of Computer Science Department<br />

Foundation for <strong>Research</strong> and Technology<br />

N. Plastira 100<br />

Vassilika Vouton, GR-700 13 Heraklion, Crete, Greece<br />

sotiris@ics.forth.gr www.ics.forth.gr/~sotiris<br />

<strong>Research</strong> <strong>Interests</strong><br />

Network and Host Security, Privacy, Security Policy, Distributed Systems.<br />

<strong>Education</strong><br />

University of Pennsylvania, USA<br />

Ph.D. in Computer and Information Science, February 2005<br />

Thesis: “ Security Policy Consistency and Distributed Evaluation in Heterogeneous Environments”<br />

Advisor: Jonathan M. Smith<br />

Committee: Matt A. Blaze, Steve M. Bellovin, Honghui Lu, and Michael B. Greenwald<br />

University of Rochester, USA<br />

M.Sc. in Computer Science, June 1998<br />

Advisor: Sandhya Dwarkadas<br />

University of Crete, Greece<br />

M.Sc. in Computer Science, June 1996<br />

Advisors: Evangelos Markatos, Christos Nikolaou<br />

B.Sc. in Mathematics, June 1994<br />

<strong>Employment</strong> <strong>Summary</strong><br />

Distributed Computing Systems Lab<br />

Institute of Computer Science, FORTH, Greece<br />

Associate <strong>Research</strong>er.<br />

Computer Science Department, University of Crete, Greece<br />

Adjunct Professor.<br />

October 2007 – Present<br />

October 2007 – Present<br />

Stevens Institute of Technology, USA February 2005 – June 2007<br />

<strong>Research</strong> Scholar in the Computer Science Department<br />

University of Pennsylvania, USA January 1999 – January 2005<br />

<strong>Research</strong> assistant in the Distributed Systems Laboratory<br />

AT&T Labs - <strong>Research</strong>, Network Services <strong>Research</strong> Center, USA May 2001 – September 2001<br />

Internship<br />

AT&T Labs - <strong>Research</strong>, Network Services <strong>Research</strong> Center, USA May 2000 – September 2000<br />

Internship


AT&T Labs - <strong>Research</strong>, Network Services <strong>Research</strong> Center, USA May 1999 – September 1999<br />

Internship<br />

IBM Poughkeepsie, Hardware Development Group, USA July 1998 – August 1998<br />

Internship<br />

University of Rochester, USA September 1996 – December 1998<br />

<strong>Research</strong> assistant in the Systems Group<br />

Institute of Computer Science, FORTH, Greece June 1994 – August 1996<br />

<strong>Research</strong> assistant with the Distributed Systems Group<br />

Computer Center, University of Crete, Greece September 1991 – May 1994<br />

Systems Operator and Administrator<br />

Courses Created/Taught<br />

Instructor, University of Crete, “CSE4881: Secure Systems,” Summer 2010 (exchange students course)<br />

Instructor, University of Crete, “CS455: Cybersecurity Lab,” Spring 2010<br />

Instructor, University of Crete, “CS557: Secure Systems,” Fall 2009<br />

Instructor, University of Crete, “CSE4881: Secure Systems,” Summer 2009 (exchange students course)<br />

Instructor, University of Crete, “CS455: Cybersecurity Lab,” Spring 2008<br />

Instructor, University of Crete, “CS455: Cybersecurity Lab,” Spring 2009<br />

Instructor, University of Crete, “CS557: Secure Systems,” Fall 2008<br />

Instructor, University of Crete, “CS455: Cybersecurity Lab,” Spring 2008<br />

Instructor, University of Crete, “CS557: Secure Systems,” Fall 2007<br />

Instructor, Stevens Institute of Technology, “CS465/765: Secure Systems,” Spring 2007<br />

Instructor, Stevens Institute of Technology, “CS465/765: Secure Systems,” Spring 2006<br />

Honors and Awards<br />

- Marie Curie Fellow, 2008-2013<br />

- USENIX Travel Grant, 2004<br />

- Graduate <strong>Research</strong> Fellowship, CIS Department, University of Pennsylvania, 1999-2005<br />

- Graduate <strong>Research</strong> Scholarship, CS Department, University of Rochester, 1996-1998<br />

- Graduate <strong>Research</strong> Fellowship, ICS-FORTH, Greece, 1994-1996<br />

- Erasmus Fellowship, 1993<br />

- Undergraduate Scholarship, State Scholarships Foundation, Greece, 1990-1992<br />

Editor<br />

- Proceedings of the 3 rd European Conference on Computer Network Defense. Lecture Notes in Electrical<br />

Engineering, December 2008.<br />

Grants – Principal Investigator<br />

●<br />

2010, TRACER: Vulnerability Detection and Reinforcement of Security in Legacy Applications


and Systems, funded by the General Secretariat for <strong>Research</strong> and Technology, Total requested:<br />

EUR 640,000, FORTH requested: EUR 120,000 (in negotiations)<br />

● 2008, Study on: Resilience Features of IPv6, DNSSEC and MPLS and Deployment Scenarios,<br />

funded by ENISA, Total: EUR 4,500<br />

● 2008-2013, PASS: Privacy Architectures for System Services, funded by Marie Curie<br />

International Reintegration Grants FP7-PEOPLE-2007-4-3-IRG, FORTH: EUR 100,000<br />

● 2008-2010, FORWARD: Managing Emerging Threats in ICT Infrastructure, funded by FP7/ICT/<br />

CA, Total: EUR 890,000 FORTH: EUR 143,950<br />

● 2006-2008, Kanon: Security Policies for Collaborative Heterogeneous Distributed Systems,<br />

funded by the General Secretariat for <strong>Research</strong> and Technology, ENTER 2005, EUR 70,200<br />

Grants – Contributor<br />

● 2010-2014, SysSec: A European Network of Excellence in Managing Threats and Vulnerabilities<br />

in the Future Internet: Europe for the World, funded by the European Commission, Total: EUR<br />

2,946,029 FORTH: EUR 603,000 (<strong>Sotiris</strong> <strong>Ioannidis</strong> Workpackage Leader, Evangelos Markatos<br />

PI)<br />

● 2010-2012, i-Code: Real-time Malicious Code Identification, funded by the European<br />

Commission, Total: EUR 753,895 FORTH: EUR 209,000 (<strong>Sotiris</strong> <strong>Ioannidis</strong> Workpackage Leader,<br />

Evangelos Markatos PI)<br />

● 2006, Sun Equipment Grant, $24,658, (with Susanne Wetzel)<br />

Publications<br />

Thesis<br />

T1. <strong>Sotiris</strong> <strong>Ioannidis</strong>, “ Security Policy Consistency and Distributed Evaluation in Heterogeneous


Systems”, University of Pennsylvania, 2005.<br />

Book Chapters<br />

B1. Jonathan M. Smith, Michael B. Greenwald, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Angelos D. Keromytis, Ben Laurie,<br />

Douglas Maughan, Dale Rahn, Jason L. Wright, “ Experiences Enhancing Open Source Security in the<br />

POSSE Project”, in Free/Open Source Software Development, ed. Stefan Koch, IGP, December 2003.<br />

B2. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Athanasios E. Papathanasiou, Grigorios I. Magklis, Evangelos P. Markatos,<br />

Dionisios N. Pnevmatikatos, and Julia Sevaslidou, “ On using Reliable Network RAM in Networks of<br />

Workstations”, in Cluster Computing, pp. 109-121, Chapter 10, 2001, ISBN 1-59033-113-3, Nova Science<br />

Publishers, USA, 2001.<br />

Journal Publications<br />

J1. Andreas Makridakis, Elias Athanasopoulos, Spiros Antonatos, Demetres Antoniades, <strong>Sotiris</strong> <strong>Ioannidis</strong>,<br />

Evangelos P. Markatos, “Understanding the Behavior of Malicious Applications in Social Networks”,<br />

in IEEE Network Special Issue on Online Social Networks, September/October 2010.<br />

J2. Stefan Miltchev, Jonathan M. Smith, Vassilis Prevelakis, Angelos D. Keromytis, <strong>Sotiris</strong><br />

<strong>Ioannidis</strong>, “Decentralized Access Control in Distributed File Systems”, in ACM Computing Surveys, vol.<br />

40, no. 3, September 2008.<br />

J3. K. G. Anagnostakis, M. B. Greenwald, S. <strong>Ioannidis</strong>, Angelos Keromytis, “COVERAGE: Detecting<br />

and Reacting to Worm Epidemics Using Cooperation and Validation”, in Springer International<br />

Journal of Information Security (IJIS), Special Issue, 2007.<br />

J4. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Steven M. Bellovin, John <strong>Ioannidis</strong>, Angelos D. Keromytis, Kostas Anagnostakis,<br />

Jonathan M. Smith, “Virtual Private Services: Coordinated Policy Enforcement for Distributed<br />

Applications”, in International Journal of Network Security, Vol. 4, No. 1, 2007, pp. 69-80, January 2007.<br />

J5. K. G. Anagnostakis, M. B. Greenwald, S. <strong>Ioannidis</strong>, D. Li, J. M. Smith, “Flexible Network<br />

Monitoring with FLAME”, in Computer Networks Journal (Special Issue on Active Networks - Elsevier<br />

Science), Vol. 50, No. 14, pp. 2548-2563, October 2006.<br />

J6. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Umit Rencuzogullari, Robert Stets, Sandhya Dwarkadas, “ CRAUL: Compiler<br />

and Run-Time Integration for Adaptation Under Load”, in Journal of Scientific Programming, pp.<br />

261-273, Spring1999.<br />

J7. Dionisios Pnevmatikatos, Evangelos P. Markatos, Gregory Maglis, <strong>Sotiris</strong> <strong>Ioannidis</strong>, “On using<br />

Network RAM as a non-volatile Buffer”, in Cluster Computing, Special Issue on I/O in Shared-Storage<br />

Clusters, 2(4), pp. 295-303, Baltzer Science Publishers, 1999.<br />

J8. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Athanasios E. Papathanasiou, Grigorios I. Magklis, Evangelos P. Markatos, Dionisios<br />

N. Pnevmatikatos, Julia Sevaslidou, “On using Reliable Network RAM in Networks of Workstations”,<br />

in Special Issue on High Performance Computing on Clusters Parallel and Distributed Computing<br />

Practices (PDCP), Vol. 2, No. 2, Nova Science Publishers, USA, February 1999.<br />

J9. N. Hardavellas, G. C. Hunt, S. <strong>Ioannidis</strong>, R. Stets, S. Dwarkadas, L. Kontothanassis, M. L. Scott,<br />

“Efficient Use of Memory Mapped Interfaces for Shared Memory Computing”, in IEEE Technical<br />

Committee on Computer Architecture (TCCA) Newsletter Special Issue, pp. 28-33, March 1997.<br />

Conference Publications<br />

C1. Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Evangelos P.


Markatos, “D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks”, in Proceedings of the 15th<br />

European Symposium on <strong>Research</strong> in Computer Security (ESORICS), Athens, Greece, September 2010.<br />

C2. Giorgos Vasiliadis, <strong>Sotiris</strong> <strong>Ioannidis</strong>, “GrAVity: A Massively Parallel Antivirus Engine”, in<br />

Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID),<br />

Ottawa, Ontario, Canada, September 2010.<br />

C3. Periklis Akritidis, W. Y. Chin, Evangelos Markatos, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Spiros Antonatos, Kostas<br />

Anagnostakis, “HoneyLab: Large-scale Honeypot Deployment and Resource Sharing”, in Proceedings<br />

of the 3rd International Conference on Network and Systems Security (NSS), Gold Coast, Australia,<br />

October 2009.<br />

C4. Eleni Gessiou, Alexandros Lambrinidis, <strong>Sotiris</strong> <strong>Ioannidis</strong>, “A Greek (Privacy) Tragedy: The<br />

Introduction of Social Security Numbers in Greece”, in Proceedings of the 8th ACM CCS Workshop on<br />

Privacy in the Electronic Society (WPES), Chicago, Illinois, USA, November 2009.<br />

C5. Giorgos Vasiliadis, Spiros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, <strong>Sotiris</strong><br />

<strong>Ioannidis</strong>, “Regular Expression Matching on Graphics Hardware for Intrusion Detection”, in<br />

Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (RAID),<br />

Saint-Malo, France, September 2009.<br />

C6. Lazaros Koromilas, George Chinis, Irini Fundulaki, <strong>Sotiris</strong> <strong>Ioannidis</strong>, “Controlling Access to XML<br />

Documents over XML Native and Relational Databases”, in Proceedings of the 6th VLDB Workshop on<br />

Secure Data Management (SDM), Lyon, France, August 2009.<br />

C7. Giorgos Vasiliadis, Spiros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, <strong>Sotiris</strong><br />

<strong>Ioannidis</strong>, “Gnort: High Performance Network Intrusion Detection Using Graphics Processors”,<br />

in Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID),<br />

Boston, MA, USA, September 2008.<br />

C8. E. Athanasopoulos, A. Makridakis, S. Antonatos, D. Antoniades, S. <strong>Ioannidis</strong>, K. G. Anagnostakis,<br />

E. P. Markatos, “Antisocial Networks: Turning a Social Network into a Botnet”, in Proceedings of the<br />

11th Infomation Security Conference (ISC), Taipei, Taiwan, September 2008.<br />

C9. Vasilis Pappas, Elias Athanasopoulos, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Evangelos P. Markatos, “Compromising<br />

Anonymity Using Packet Spinning”, in Proceedings of the 11th Information Security Conference (ISC),<br />

Taipei, Taiwan, September 2008.<br />

C10. Herbert Bos, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Erland Jonsson, Engin Kirda, Chris Kruegel, “Future Threats to<br />

Future Trust”, in Proceedings of the Future of Trust in Computing Conference, Berlin, Germany, July<br />

2008.<br />

C11. S. Antonatos, M. Athanatos, G. Kondaxis, J. Velegrakis, N. Hatzibodozis, S. <strong>Ioannidis</strong>, E. P.<br />

Markatos, “Honey@home: A New Approach to Large-Scale Threat Monitoring”, in Proceedings of the<br />

1st WOMBAT Workshop, Amsterdam, The Netherlands, April 2008.<br />

C12. Peter I. Politopoulos, Evangelos P. Markatos, <strong>Sotiris</strong> <strong>Ioannidis</strong>, “Evaluation of Compression of<br />

Remote Network Monitoring Data Streams”, in Proceedings of the 6th IEEE Workshop on End-to-End<br />

Monitoring Techniques and Services (E2EMon), Salvador, Bahia, Brazil, April 2008.<br />

C13. Nikos Nikiforakis, Demetres Antoniades, Evangelos P. Markatos, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Arne Olesbo,<br />

“When AppMon met Stager”, in Proceedings of the 6th IEEE Workshop on End-to-End Monitoring<br />

Techniques and Services (E2EMon) (short paper), Salvador, Bahia, Brazil, April 2008.<br />

C14. Stelios Sidiroglou, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Angelos Keromytis, “Band-aid Patching”, in Proceedings of the<br />

USENIX 3rd Workshop on Hot Topics in System Dependability (HotDep) (short paper), Edimburgh, UK,


June 2007.<br />

C15. Jonathan Voris, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Susanne Wetzel, Ulrike Meyer, “Performance Evaluation of a<br />

Privacy-Preserving Policy Reconciliation Protocol”, in Proceedings of the IEEE Workshop on Policies<br />

for Distributed Systems and Net-works (Policy), Rome, Italy, June 2007.<br />

C16. Ulrike Meyer, Susanne Wetzel, <strong>Sotiris</strong> <strong>Ioannidis</strong>, “Distributed Privacy-Preserving Policy<br />

Reconciliation”, in Proceedings of the IEEE International Conference on Communications (ICC),<br />

Glasgow, UK, June 2007.<br />

C17. Vasilis Prevelakis, <strong>Sotiris</strong> <strong>Ioannidis</strong>, “Preserving TCP Connections Across Host Address<br />

Changes”, in Proceedings of the 9th Information Security Conference (ISC), Samos, Greece, August-<br />

September 2006.<br />

C18. K. G. Anagnostakis, M. B. Greenwald, S. <strong>Ioannidis</strong>, Angelos Keromytis, “Robust Reactions<br />

to Potential Day-Zero Worms through Cooperation and Validation”, in Proceedings of the 9th<br />

Information Security Conference (ISC), Samos, Greece, August-September 2006.<br />

C19. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Stelios Sidiroglou, Angelos Keromytis, “Privacy as an Operating System<br />

Service”, in Proceedings of the USENIX 1st Workshop on Hot Topics in Security (HotSec), Vancouver,<br />

BC, Canada, July 2006.<br />

C20. A. D. Keromytis, K. Anagnostakis, S. <strong>Ioannidis</strong>, M. Greenwald, J. M. Smith, “Managing Access<br />

Control in Large Scale Heterogeneous Networks”, in Proceedings of the NATO C3 Symposium on<br />

Interoperable Networks for Secure Communications (INSC), The Hague, Netherlands, November 2003.<br />

C21. K. G. Anagnostakis, M. B. Greenwald, S. <strong>Ioannidis</strong>, A. D. Keromytis, D. Li, “A Cooperative<br />

Immunization System for an Untrusting Internet”, in Proceedings of the 11th IEEE International<br />

Conference on Networks (ICON), pp. 403-408, Sydney, Australia, October 2003.<br />

C22. Matt Blaze, John <strong>Ioannidis</strong>, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Angelos D. Keromytis, Pekka Nikander, Vassilis<br />

Prevelakis, “TAPI: Transactions for Accessing Public Infrastructure”, in Proceedings of the 8th IFIP<br />

Personal Wireless Communications (PWC) Conference, Venice, Italy, September 2003.<br />

C23. Stefan Miltchev, Vassilis Prevelakis, <strong>Sotiris</strong> <strong>Ioannidis</strong>, John <strong>Ioannidis</strong>, Angelos D. Keromytis,<br />

Jonathan M. Smith, “Secure and Flexible Global File Sharing”, in Proceedings of the USENIX Annual<br />

Technical Conference, Freenix Track, pp. 165 - 178, San Antonio, TX, June 2003.<br />

C24. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Steven M. Bellovin, John <strong>Ioannidis</strong>, Angelos D. Keromytis, Jonathan M.<br />

Smith, “Design and Implementation of Virtual Private Services”, in Proceedings of the IEEE<br />

International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises<br />

(WETICE), Workshop on Enterprise Security, Special Session on Trust Management in Collaborative<br />

Global Computing, Linz, Austria, June 2003.<br />

C25. Alexander Levine, Vassilis Prevelakis, John <strong>Ioannidis</strong>, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Angelos D.<br />

Keromytis, “WebDAVA: An Administrator-Free Approach To Web File-Sharing”, in Proceedings of<br />

the IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises<br />

(WETICE), Workshop on Distributed and Mobile Collaboration, Linz, Austria, June 2003.<br />

C26. Angelos D. Keromytis, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Michael B. Greenwald, Jonathan M. Smith, “The<br />

STRONGMAN Architecture”, in Proceedings of the Third DARPA Information Survivability Conference<br />

and Exposition (DISCEX III), Washington DC, April 2003.<br />

C27. K. G. Anagnostakis, M. Greenwald, S. <strong>Ioannidis</strong>, S. Miltchev, “Open Packet Monitoring on<br />

FLAME: Safety, Performance and Applications”, in Proceedings of the 4th IFIP International Working<br />

Conference on Active Networks (IWAN), pp. 120-131, Zurich, Switzerland, December 2002.


C28. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Steven M. Bellovin, Jonathan M. Smith, “ Sub-Operating Systems: A New<br />

Approach to Application Security”, in Proceedings of the ACM SIGOPS European Workshop, France,<br />

September 2002.<br />

C29. Stefan Miltchev, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Angelos Keromytis, “A Study of the Relative Costs of Network<br />

Security Proto-cols”, in Proceedings of USENIX 2002 Annual Technical Conference, Freenix Track,<br />

Monterey, CA, June 2002.<br />

C30. S. <strong>Ioannidis</strong>, K. G. Anagnostakis, J. <strong>Ioannidis</strong>, A. D. Keromytis, “xPF: Packet Filtering for Low-<br />

Cost Network Monitoring”, in Proceedings of the IEEE Workshop on High-Performance Switching and<br />

Routing (HPSR), pp. 121-126, Kobe, Japan, May 2002.<br />

C31. John <strong>Ioannidis</strong>, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Angelos D. Keromytis, Vassilis Prevelakis, “Fileteller: Paying and<br />

Getting Paid for File Storage”, in Proceedings of Financial Cryptography (FC), Bermuda, March 2002.<br />

C32. K. G. Anagnostakis, S. <strong>Ioannidis</strong>, S. Miltchev, J. <strong>Ioannidis</strong>, M. Greenwald, J. M. Smith, “Efficient<br />

Packet Monitoring for Network Management”, in Proceedings of the 8th IEEE/IFIP Network<br />

Operations and Management Symposium (NOMS), pp. 423-436, Florence, Italy, April 2002.<br />

C33. K. G. Anagnostakis, S. <strong>Ioannidis</strong>, S. Miltchev, J. M. Smith, “Practical Network Applications on a<br />

Lightweight Active Management Environment”, in Proceedings of the 3rd IFIP International Working<br />

Conference on Active Networks (IWAN), pp. 101-115, Philadelphia, USA, October 2001.<br />

C34. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Steven M. Bellovin, “Building a Secure Web Browser”, in Proceedings of<br />

USENIX Annual Technical Conference, Freenix Track, Boston, June 2001.<br />

C35. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith, “Implementing<br />

a Distributed Firewall”, in Proceedings of the ACM Computer and Communications Security (CCS), pp.<br />

190-199, Athens, Greece, November 2000.<br />

C36. K. G. Anagnostakis, M. W. Hicks, S. <strong>Ioannidis</strong>, A. D. Keromytis, J. M. Smith, “ Scalable Resource<br />

Control in Active Networks”, in Proceedings of the 2nd IFIP International Working Conference on<br />

Active Networks (IWAN), pp. 343-357, Tokyo, Japan, October 2000.<br />

C37. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Evangelos P. Markatos, Julia Sevaslidou, “Using Network Memory to Improve<br />

the Performance of Transaction-Based Systems”, in Proceedings of International Conference on<br />

Parallel and Distributed Processing Techniques and Applications (PDPTA), Las Vegas, NV, July 1998.<br />

C38. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Sandhya Dwarkadas, “Compiler and Run-Time Support for Adaptive Load<br />

Balancing in Soft-ware Distributed Shared Memory Systems”, in Proceedings of the ACM Fourth<br />

Workshop on Languages, Compilers, and Run-time Systems for Scalable Computers (LCR), pp. 107-122,<br />

Pittsburg, PA, May 1998.<br />

Articles (non peer reviewed)<br />

A1. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Evangelos Markatos, Engin Kirda, Christopher Kruegel, “Drivers of Emerging and<br />

Future Threats in ICT Infrastructures”, in ENISA Quarterly, Vol. 5, No. 3, July-September 2009.<br />

A2. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Evangelos Markatos, Christopher Kruegel, “On looking FORWARD”, in ERCIM<br />

News, No. 76, January 2009<br />

A3. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Evangelos Markatos, Engin Kirda, Christopher Kruegel, “Tracing the Changing


Nature of Cyberattacks”, in ENISA Quarterly, Vol. 4, No. 4, October-December 2008.<br />

Selected Invited Talks<br />

1. “Cloud Computing Threats (real and perceived)”, Free and Open Source Software Workshop,<br />

University of Crete, May 2010.<br />

2. “Web Security,” W3C Workshop, Foundation for <strong>Research</strong> and Technology – Hellas, September<br />

2009.<br />

3. “Gnort: High Performance Intrusion Detection Using Graphics Processors,” AIT Workshop on<br />

Practical aspects of security (PRACSE), June 2009.<br />

4. “Security and Privacy in a Networked and Mobile World,” FIDIS Interdisciplinary Doctoral<br />

Consortium, June 2008.<br />

5. “Consistent Security Policy Evaluation,” Stevens, Columbia, and IBM <strong>Research</strong>, Security and<br />

Privacy Day, November 2005.<br />

6. “Consistent Security Policy for Decentralized Systems,” Institute of Computer Science, Foundation<br />

for <strong>Research</strong> and Technology Hellas, February 2004.<br />

7. “Abstraction, Specification and Enforcement of Security Policies for Decentralized Systems,”<br />

TACL Seminar, Princeton University, November 2003.<br />

8. “Consistent Security Policy for Decentralized Systems,” Rutgers University, July 2003.<br />

9. “Abstraction, Specification and Enforcement of Security Policies for Decentralized Systems,”<br />

Secure Systems <strong>Research</strong> Department, AT&T Labs <strong>Research</strong>, September 2002.<br />

10. “Fine-Grain Policy-Based Access Control for Distributed Systems,” SDL–LCS Seminar Series,<br />

Carnegie-Mellon University, April 2002.<br />

Student Supervision<br />

1. Frey Kuo, Ph.D. student at UPenn, working on FLAME<br />

2. Dekai Li, Ph.D. student at UPenn, working on FLAME<br />

3. Brian Zima, M.Sc. student at UPenn, working on Web Browser security<br />

4. Thomas Langan, M.Sc. student at UPenn, working on CANON<br />

5. Ryan Marone, B.E. student at Stevens Tech, Technogenesis project on Cybersecurity<br />

6. Matt Keyser, B.E. student at Stevens Tech, Technogenesis project on Cybersecurity


7. Ilya Chalyt, B.Sc. student at Stevens Tech, Stevens Cybersecurity contest<br />

8. Nick Egebo, B.Sc. student at Stevens Tech, Stevens Cybersecurity contest<br />

9. Chris Gamio, B.Sc. student at Stevens Tech, Technogenesis project on Cybersecurity<br />

10. Sean M. Freeman, B.Sc. student at Stevens Tech, Technogenesis project on Cybersecurity<br />

11. Jonathan Voris, M.Sc. student at Stevens Tech, working on Privacy-Preserving Policy Reconciliation<br />

12. John Hite, B.Sc. student at Stevens Tech, working on Wireless Vulenerabilities.<br />

13. Gary Brown, B.Sc. student at Stevens Institute of Technology Technogenesis project on Cybersecurity<br />

14. Daniel Ready, B.Sc. student at Stevens Institute of Technology Technogenesis project on Cybersecurity<br />

15. Eleni Gessiou, M.Sc. student at the University of Crete, project PASS.<br />

16. Giorgos Vasiliadis, Ph.D. student at the University of Crete, project Gnort.<br />

Professional Activities<br />

Program Chair: European Conference on Computer Network Defense (EC2ND), 2008.<br />

Program Chair: ENISA-FORTH Network and Information Security Summer School, 2008.<br />

Program Chair: European Conference on Computer Network Defense (EC2ND), 2007.<br />

Steering Committee: European Conference on Computer Network Defense (EC2ND), 2011.<br />

Steering Committee: European Conference on Computer Network Defense (EC2ND), 2010.<br />

Steering Committee: European Conference on Computer Network Defense (EC2ND), 2009.<br />

Program Committee: IEEE International Conference on Communications (ICC), 2011.<br />

Program Committee: International Workshop on SEcurity and SOCial Networks (SESOC), 2010.<br />

Program Committee: European Workshop on System Security (EuroSec), 2010.<br />

Program Committee: European Conference on Computer Network Defense (EC2ND), 2010.<br />

Program Committee: Workshop in Information Security Theory and Practices (WISTP), 2010.<br />

Program Committee: European Conference on Computer Network Defense (EC2ND), 2009. Program Committee:<br />

ACM Conference on Computer and Communications Security (CCS), 2009.<br />

Program Committee: Workshop in Information Security Theory and Practices (WISTP), 2009.<br />

Program Committee: IEEE International Workshop on Security, Privacy and Authentication in Wireless Networks<br />

(SPAWN), 2009.<br />

Program Committee: International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking<br />

and Communications (SecPriWiMob), 2009.<br />

Program Committee: International Workshop on Foundations and Techniques for Open Source Software Certification<br />

(OpenCert), 2009.


Program Committee: ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics (CSI-KDD), 2009.<br />

Program Committee: Information Security Conference (ISC), 2009. Program Committee: International Symposium On<br />

Recent Advances In Intrusion Detection (RAID), 2009.<br />

Program Committee: European Workshop on System Security (EuroSec), 2009. Program Committee: Workshop on<br />

Open Source Software for Computer and Network Forensics (OSSCoNF), 2008.<br />

Program Committee: International Workshop on Security in Opportunistic and SOCial Networks (SOSOC), 2008.<br />

Program Committee: New Technologies, Mobility and Security (NTMS), 2008.<br />

Program Committee: European Workshop on System Security (EuroSec), 2008.<br />

Program Committee: IEEE International Wireless Communications and Mobile Computing Conference (IWCMC),<br />

2008.<br />

Program Committee: Workshop in Information Security Theory and Practices (WISTP), 2008.<br />

Program Committee: International Conference on Distributed Computing Systems (ICDCS) (Security Track), 2007.<br />

Program Committee: Workshop on Automated Self-Healing (WASH), 2006. Program Committee: WWW 2006<br />

Conference (Security, Privacy and Ethics track).<br />

Program Committee: Applied Cryptography and Network Security, 2005.<br />

Program Committee: Usenix Security Conference, 2004.<br />

References<br />

Available upon request

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!