Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Panayiotis Mavrommatis is active.

Publication


Featured researches published by Panayiotis Mavrommatis.


ACM Queue | 2009

Cybercrime 2.0: when the cloud turns dark

Niels Provos; Moheeb Abu Rajab; Panayiotis Mavrommatis

Web-based malware attacks are more insidious than ever. What can be done to stem the tide?


International Journal on Software Tools for Technology Transfer | 2009

Automated implementation of complex distributed algorithms specified in the IOA language

Chryssis Georgiou; Nancy A. Lynch; Panayiotis Mavrommatis; Joshua A. Tauber

IOA is a formal language for describing Input/Output automata that serves both as a formal specification language and as a programming language (Garland et al. in http://theory.lcs.mit.edu/tds/ioa/manual.ps, 2004). The IOA compiler automatically translates IOA specifications into Java code that runs on a set of workstations communicating via the Message Passing Interface. This paper describes the process of compiling IOA specifications and our experiences running several distributed algorithms, ranging from simple ones such as the Le Lann, Chang and Roberts (LCR) leader election in a ring algorithm to that of Gallager, Humblet and Spira (GHS) for minimum-weight spanning tree formation in an arbitrary graph (Humblet et al. in ACM Trans Program Lang Syst 5(1):66–77, 1983). Our IOA code for all the algorithms is derived from their Input/Output automaton descriptions that have already been formally proved correct. The successful implementation of these algorithms is significant for two reasons: (a) it is an indication of the capabilities of the IOA compiler and of its advanced state of development, and (b) to the best of our knowledge, these are the first complex, distributed algorithms implemented in an automated way that have been formally and rigorously proved correct. Thus, this work shows that it is possible to formally specify, prove correct, and implement complex distributed algorithms using a common formal methodology.


usenix security symposium | 2008

All your iFRAMEs point to Us

Niels Provos; Panayiotis Mavrommatis; Moheeb Abu Rajab; Fabian Monrose


conference on workshop on hot topics in understanding botnets | 2007

The ghost in the browser analysis of web-based malware

Niels Provos; Dean McNamee; Panayiotis Mavrommatis; Ke Wang; Nagendra Modadugu


Archive | 2008

Intrusive software management

Niels Provos; Yunkai Zhou; Clayton Woodward Bavor; Eric L. Davis; Mark Palatucci; Kamal P. Nigam; Christopher K. Monson; Panayiotis Mavrommatis; Rachel Nakauchi


computer and communications security | 2012

Manufacturing compromise: the emergence of exploit-as-a-service

Chris Grier; Lucas Ballard; Juan Caballero; Neha Chachra; Christian Dietrich; Kirill Levchenko; Panayiotis Mavrommatis; Damon McCoy; Antonio Nappa; Andreas Pitsillidis; Niels Provos; M. Zubair Rafique; Moheeb Abu Rajab; Christian Rossow; Kurt Thomas; Vern Paxson; Stefan Savage; Geoffrey M. Voelker


networked systems design and implementation | 2008

Ghost turns zombie: exploring the life cycle of web-based malware

Michalis Polychronakis; Panayiotis Mavrommatis; Niels Provos


Archive | 2012

Protecting users from undesirable content

Michael G. Morrissey; Richard Cannings; Joseph Benjamin Gruver; Angana Ghosh; Jonathan Bruce Larimer; Andrew Devron Stadler; Panayiotis Mavrommatis; Niels Provos; Adrian Ludwig


usenix conference on large scale exploits and emergent threats | 2010

The nocebo effect on the web: an analysis of fake anti-virus distribution

Moheeb Abu Rajab; Lucas Ballard; Panayiotis Mavrommatis; Niels Provos; Xin Zhao


network and distributed system security symposium | 2013

CAMP: Content-Agnostic Malware Protection.

Moheeb Abu Rajab; Lucas Ballard; Noé Lutz; Panayiotis Mavrommatis; Niels Provos

Collaboration


Dive into the Panayiotis Mavrommatis's collaboration.

Researchain Logo
Decentralizing Knowledge