Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Vasileios P. Kemerlis is active.

Publication


Featured researches published by Vasileios P. Kemerlis.


virtual execution environments | 2012

libdft: practical dynamic data flow tracking for commodity systems

Vasileios P. Kemerlis; Georgios Portokalidis; Kangkook Jee; Angelos D. Keromytis

Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they propagate during program execution. DFT has been repeatedly implemented by a variety of tools for numerous purposes, including protection from zero-day and cross-site scripting attacks, detection and prevention of information leaks, and for the analysis of legitimate and malicious software. We present libdft, a dynamic DFT framework that unlike previous work is at once fast, reusable, and works with commodity software and hardware. libdft provides an API for building DFT-enabled tools that work on unmodified binaries, running on common operating systems and hardware, thus facilitating research and rapid prototyping. We explore different approaches for implementing the low-level aspects of instruction-level data tracking, introduce a more efficient and 64-bit capable shadow memory, and identify (and avoid) the common pitfalls responsible for the excessive performance overhead of previous studies. We evaluate libdft using real applications with large codebases like the Apache and MySQL servers, and the Firefox web browser. We also use a series of benchmarks and utilities to compare libdft with similar systems. Our results indicate that it performs at least as fast, if not faster, than previous solutions, and to the best of our knowledge, we are the first to evaluate the performance overhead of a fast dynamic DFT implementation in such depth. Finally, libdft is freely available as open source software.


computer and communications security | 2015

The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications

Yossef Oren; Vasileios P. Kemerlis; Simha Sethumadhavan; Angelos D. Keromytis

We present a micro-architectural side-channel attack that runs entirely in the browser. In contrast to previous work in this genre, our attack does not require the attacker to install software on the victims machine; to facilitate the attack, the victim needs only to browse to an untrusted webpage that contains attacker-controlled content. This makes our attack model highly scalable, and extremely relevant and practical to todays Web, as most desktop browsers currently used to access the Internet are affected by such side channel threats. Our attack, which is an extension to the last-level cache attacks of Liu et al., allows a remote adversary to recover information belonging to other processes, users, and even virtual machines running on the same physical host with the victim web browser. We describe the fundamentals behind our attack, and evaluate its performance characteristics. In addition, we show how it can be used to compromise user privacy in a common setting, letting an attacker spy after a victim that uses private browsing. Defending against this side channel is possible, but the required countermeasures can exact an impractical cost on benign uses of the browser.


IEEE Communications Magazine | 2011

Wireless community networks: an alternative approach for nomadic broadband network access

Pantelis A. Frangoudis; George C. Polyzos; Vasileios P. Kemerlis

Low-cost wireless LAN equipment operating in unlicensed spectrum has revolutionized local area communications, introducing novel schemes for open wireless connectivity and even new business models. The ease of deployment of Wi-Fi has made it ubiquitous in densely populated urban areas, and it was just a matter of time before wireless communities emerged. Using inexpensive wireless technology to communicate, autonomous wireless internetworks have been built, offering a variety of broadband services. Based on our own experience participating in one of the largest wireless communities worldwide, the Athens Wireless Metropolitan Network, we attempt to explain their structure and mechanisms, study the reasons for their emergence and growth, and predict their future evolution. We expect that future wireless communities will be oriented toward providing broadband access to nomadic users. To this end, we have proposed that wireless network access be shared in a peer-to-peer, reciprocal manner. Thus, ubiquitous broadband Internet access can be achieved at a low cost, at least in metropolitan areas where there is abundant wireless coverage, providing an inexpensive alternative to broadband cellular services.


modeling, analysis, and simulation on computer and telecommunication systems | 2009

A BitTorrent module for the OMNeT++ simulator

Konstantinos V. Katsaros; Vasileios P. Kemerlis; Charilaos Stais; George Xylomenos

In the past few years numerous P2P file-sharing and content distribution systems have been designed, implemented, and evaluated via simulations, real world measurements, and mathematical analysis. Yet, only few of them have stood the test of time and gained wide user acceptance. BitTorrent is the one that holds the lions share among them and the reasons behind its success have been studied to a great extent with interesting results. Nevertheless, even though P2P content distribution remains one of the most active research areas, little progress has been made towards the study of the BitTorrent protocol (and its variations), in a fully controllable and realistic simulation environment. In this paper we describe and analyze a full-featured and extensible implementation of BitTorrent for the OMNeT++ simulation platform. Moreover, since we aim at realistic simulations, we present our enhancements on a popular conversion tool for practical Internet topologies, as well as our churn generator that is based on the analysis of real BitTorrent traces. Finally, we set forth the results from the evaluation of our prototype implementation regarding resource demands under different simulation scenarios.


computer and communications security | 2013

ShadowReplica: efficient parallelization of dynamic data flow tracking

Kangkook Jee; Vasileios P. Kemerlis; Angelos D. Keromytis; Georgios Portokalidis

Dynamic data flow tracking (DFT) is a technique broadly used in a variety of security applications that, unfortunately, exhibits poor performance, preventing its adoption in production systems. We present ShadowReplica, a new and efficient approach for accelerating DFT and other shadow memory-based analyses, by decoupling analysis from execution and utilizing spare CPU cores to run them in parallel. Our approach enables us to run a heavyweight technique, like dynamic taint analysis (DTA), twice as fast, while concurrently consuming fewer CPU cycles than when applying it in-line. DFT is run in parallel by a second shadow thread that is spawned for each application thread, and the two communicate using a shared data structure. We avoid the problems suffered by previous approaches, by introducing an off-line application analysis phase that utilizes both static and dynamic analysis methodologies to generate optimized code for decoupling execution and implementing DFT, while it also minimizes the amount of information that needs to be communicated between the two threads. Furthermore, we use a lock-free ring buffer structure and an N-way buffering scheme to efficiently exchange data between threads and maintain high cache-hit rates on multi-core CPUs. Our evaluation shows that ShadowReplica is on average ~2.3× faster than in-line DFT (~2.75× slowdown over native execution) when running the SPEC CPU2006 benchmark, while similar speed ups were observed with command-line utilities and popular server software. Astoundingly, ShadowReplica also reduces the CPU cycles used up to 30%.


recent advances in intrusion detection | 2013

CloudFence: Data Flow Tracking as a Cloud Service

Vasilis Pappas; Vasileios P. Kemerlis; Angeliki Zavou; Michalis Polychronakis; Angelos D. Keromytis

The risk of unauthorized private data access is among the primary concerns for users of cloud-based services. For the common setting in which the infrastructure provider and the service provider are different, users have to trust their data to both parties, although they interact solely with the latter. In this paper we propose CloudFence, a framework for cloud hosting environments that provides transparent, fine-grained data tracking capabilities to both service providers, as well as their users. CloudFence allows users to independently audit the treatment of their data by third-party services, through the intervention of the infrastructure provider that hosts these services. CloudFence also enables service providers to confine the use of sensitive data in well-defined domains, offering additional protection against inadvertent information leakage and unauthorized access. The results of our evaluation demonstrate the ease of incorporating CloudFence on existing real-world applications, its effectiveness in preventing a wide range of security breaches, and its modest performance overhead on real settings.


recent advances in intrusion detection | 2010

BotSwindler: tamper resistant injection of believable decoys in VM-based hosts for crimeware detection

Brian M. Bowen; Pratap V. Prabhu; Vasileios P. Kemerlis; Stelios Sidiroglou; Angelos D. Keromytis; Salvatore J. Stolfo

We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementation of BotSwindler relies upon an out-of-host software agent that drives user-like interactions in a virtual machine, seeking to convince malware residing within the guest OS that it has captured legitimate credentials. To aid in the accuracy and realism of the simulations, we propose a low overhead approach, called virtual machine verification, for verifying whether the guest OS is in one of a predefined set of states.We present results from experiments with real credential-collecting malware that demonstrate the injection of monitored financial bait for detecting compromises. Additionally, using a computational analysis and a user study, we illustrate the believability of the simulations and we demonstrate that they are sufficiently human-like. Finally, we provide results from performance measurements to show our approach does not impose a performance burden.


european symposium on research in computer security | 2013

CellFlood: Attacking Tor Onion Routers on the Cheap

Marco Valerio Barbera; Vasileios P. Kemerlis; Vasilis Pappas; Angelos D. Keromytis

In this paper, we introduce a new Denial-of-Service attack against Tor Onion Routers and we study its feasibility and implications. In particular, we exploit a design flaw in the way Tor software builds virtual circuits and demonstrate that an attacker needs only a fraction of the resources required by a network DoS attack for achieving similar damage. We evaluate the effects of our attack on real Tor routers and we propose an estimation methodology for assessing the resources needed to attack any publicly accessible Tor node. Finally, we present the design and implementation of an effective solution to the problem that relies on cryptographic client puzzles, and we present results from its performance and effectiveness evaluation.


Archive | 2012

CloudFence: Enabling Users to Audit the Use of their Cloud-Resident Data

Vasilis Pappas; Vasileios P. Kemerlis; Angeliki Zavou; Michalis Polychronakis; Angelos D. Keromytis

One of the primary concerns of users of cloud-based services and applications is the risk of unauthorized access to their private information. For the common setting in which the infrastructure provider and the online service provider are different, end users have to trust their data to both parties, although they interact solely with the service provider. This paper presents CloudFence, a framework that allows users to independently audit the treatment of their private data by third-party online services, through the intervention of the cloud provider that hosts these services. CloudFence is based on a fine-grained data flow tracking platform exposed by the cloud provider to both developers of cloud-based applications, as well as their users. Besides data auditing for end users, CloudFence allows service providers to confine the use of sensitive data in well-defined domains using data tracking at arbitrary granularity, offering additional protection against inadvertent leaks and unauthorized access. The results of our experimental evaluation with real-world applications, including an e-store platform and a cloud-based backup service, demonstrate that CloudFence requires just a few changes to existing application code, while it can detect and prevent a wide range of security breaches, ranging from data leakage attacks using SQL injection, to personal data disclosure due to missing or erroneously implemented access control checks.


electronic commerce | 2010

iLeak: A Lightweight System for Detecting Inadvertent Information Leaks

Vasileios P. Kemerlis; Vasilis Pappas; Georgios Portokalidis; Angelos D. Keromytis

Data loss incidents, where data of sensitive nature are exposed to the public, have become too frequent and have caused damages of millions of dollars to companies and other organizations. Repeatedly, information leaks occur over the Internet, and half of the time they are accidental, caused by user negligence, misconfiguration of software, or inadequate understanding of an application’s functionality. This paper presents iLeak, a lightweight, modular system for detecting inadvertent information leaks. Unlike previous solutions, iLeak builds on components already present in modern computers. In particular, we employ system tracing facilities and data indexing services, and combine them in a novel way to detect data leaks. Our design consists of three components: uaudits are responsible for capturing the information that exits the system, while Inspectors use the indexing service to identify if the transmitted data belong to files that contain potentially sensitive information. The Trail Gateway handles the communication and synchronization of uaudits and Inspectors. We implemented iLeak on Mac OS X using DTrace and the Spotlight indexing service. Finally, we show that iLeak is indeed lightweight, since it only incurs 4% overhead on protected applications.

Collaboration


Dive into the Vasileios P. Kemerlis's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Georgios Portokalidis

Stevens Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

George C. Polyzos

Athens University of Economics and Business

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge