Georgios Portokalidis (gportoka)

Georgios Portokalidis

Associate Professor

Charles V. Schaefer, Jr. School of Engineering and Science

Department of Computer Science

Gateway Center S329
(201) 216-8249

Education

  • PhD (2010) Vrije Universiteit Amsterdam (Computer Science)
  • MS (2004) Leiden University (Computer Science)
  • BS (2002) University of Crete (Computer Science)

Professional Service

  • NSF Panelist
  • ACM Conference on Computer and Communications Security (CCS) Program committee member
  • 2nd International Workshop on Security in Mobile Technologies (SecMT 2021) Program committee member
  • ACM ASIA Conference on Computer and Communications Security (ASIACCS) Program committee member
  • ACM Conference on Computer and Communications Security Poster session program committee member
  • ACM Conference on Computer and Communications Security (CCS) Program Committee Member
  • International Symposium on Research in Attacks, Intrusions and Defenses Program committee member
  • Conference on Detection of Intrusions and Malware & Vulnerability Assessment Program Committee Member

Professional Societies

  • USENIX – The USENIX Association Member
  • ACM – Association for Computing Machinery Member
  • IEEE – Institute of Electrical and Electronics Engineers Member

Selected Publications

Book Chapter

  1. Enes G\"okta\cs; Athanasopoulos, E.; Bos, H.; Portokalidis, G.; Larsen, P.; Sadeghi, A. (2018). Evaluating Control-Flow Restricting Defenses. The Continuing Arms Race: Code-Reuse Attacks and Defenses (pp. 117--137). New York, NY, USA: ACM and Morgan \& Claypool.

Conference Proceeding

  1. Zhang, Y.; Kundu, A.; Portokalidis, G.; Xu, J. (2023). On the Dual Nature of Necessity in Use of Rust Unsafe Code. Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (Industry Track).
  2. Rajagopalan, V. L.; Kleftogiorgos, K.; Enes G\"okta\cs; Xu, J.; Portokalidis, G. (2023). SysPart: Automated Temporal System Call Filtering for Binaries. Proceedings of the ACM Conference on Computer and Communications Security (CCS).
    https://arxiv.org/abs/2309.05169.
  3. Mansouri, M.; Xu, J.; Portokalidis, G. (2023). Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs. Proceedings of the ACM ASIA Conference on Computer and Communications Security (ASIACCS).
  4. Zhang, Y.; Zhang, Y.; Portokalidis, G.; Xu, J. (2022). Towards Understanding the Performance of Rust (Short paper). Proceedings of the International Conference on Automated Software Engineering (ASE) -- Industry Showcase.
  5. Zhang, Y.; Pang, C.; Portokalidis, G.; Triandopoulos, N.; Xu, J. (2022). Debloating Address Sanitizer. Proceedings of the USENIX Security Symposium.
  6. Yu, R.; Del Nin, F.; Zhang, Y.; Huang, S.; Kaliyar, P.; Zatko, S.; Conti, M.; Portokalidis, G.; Xu, J. (2022). An In-Depth Analysis on Adoption of Attack Mitigations in Embedded Devices (Abstract). The Learning from Authoritative Security Experiment Results (LASER) workshop.
  7. Yu, R.; Del Nin, F.; Zhang, Y.; Huang, S.; Kaliyar, P.; Zatko, S.; Conti, M.; Portokalidis, G.; Xu, J. (2022). An In-Depth Analysis on Adoption of Attack Mitigations in Embedded Devices (invited). The Learning from Authoritative Security Experiment Results (LASER) workshop.
  8. Yu, R.; Del Nin, F.; Zhang, Y.; Huang, S.; Kaliyar, P.; Zatko, S.; Conti, M.; Portokalidis, G.; Xu, J. (2022). Building Embedded Systems Like It's 1996. Proceedings of the Network and Distributed System Security Symposium (NDSS).
  9. Liu, Y. C.; Pang, C.; Dietsch, D.; Koskinen, E.; Le, T. C.; Portokalidis, G.; Xu, J. (2021). Proving LTL Properties of Bitvector Programs and Decompiled Binaries. Proceedings of the Asian Symposium on Programming Languages and Systems (APLAS).
  10. Liu, Y.; Pang, C.; Dietsch, D.; Koskinen, E.; Le, T.; Portokalidis, G.; Xu, J. (2021). Proving LTL of Bitvector Programs and Decompiled Binaries. The 19th Asian Symposium on Programming Languages and Systems (APLAS 2021). The 19th Asian Symposium on Programming Languages and Systems (APLAS 2021).
  11. Pang, C.; Yu, R.; Xu, D.; Koskinen, E.; Portokalidis, G.; Xu, J. (2021). Towards Optimal Use of Exception Handling Information for Function Detection. Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
  12. Pang, C.; Yu, R.; Chen, Y.; Koskinen, E.; Portokalidis, G.; Mao, B.; Xu, J. (2021). SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask. Proceedings of the IEEE Symposium on Security and Privacy.
  13. Pang, C.; Yu, R.; Chen, Y.; Koskinen, E.; Portokalidis, G.; Mao, B.; Xu, J. (2021). SoK: All You Ever Wanted to Know About Binary Disassembly But Were Afraid to Ask. Hoboken: The 41st IEEE Symposium on Security and Privacy (IEEE S&P 2021).
  14. Göktas, E.; Razavi, K.; Portokalidis, G.; Bos, H.; Giuffrida, C. (2020). Speculative Probing: Hacking Blind in the Spectre Era. Proceedings of the ACM Conference on Computer and Communications Security (pp. 1871-1885).
  15. Agadakos, I.; Jin, D.; Williams-King, D.; Kemerlis, V. P.; Portokalidis, G. (2019). Nibbler: Debloating binary shared libraries. ACM International Conference Proceeding Series (pp. 70-83).
  16. Goktas, E.; Kollenda, B.; Koppe, P.; Bosman, E.; Portokalidis, G.; Holz, T.; Bos, H.; Giuffrida, C. (2018). Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018 (pp. 227-242).
  17. Agadakos, I.; Polakis, J.; Portokalidis, G. (2017). Techu: Open and privacy-preserving crowdsourced GPS for the masses. MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services (pp. 475-487).
  18. Agadakos, I.; Hallgren, P.; Damopoulos, D.; Sabelfeld, A.; Portokalidis, G. (2016). Location-enhanced Authentication using the IoT. Proceedings of the Annual Computer Security Applications Conference (ACSAC) (pp. 251--264).
  19. Agadakos, I.; Hallgren, P.; Damopoulos, D.; Sabelfeld, A.; Portokalidis, G. (2016). Location-enhanced authentication using the IoT because you cannot be in two places at once. ACM International Conference Proceeding Series (vol. 5-9-December-2016, pp. 251-264).
  20. Oikonomopoulos, A.; Kollenda, B.; Giuffrida, C.; Athanasopoulos, E.; Enes G\"okta\cs; Portokalidis, G.; Bos, H.; Gawlik, R. (2016). Bypassing CLANG's Safestack for Fun and Profit. Black Hat Europe.
    https://www.blackhat.com/eu-16/briefings/schedule/index.html#bypassing-clangs-safestack-for-fun-and-profit-4965.
  21. Enes G\"okta\cs; Gawlik, R.; Kollenda, B.; Athanasopoulos, E.; Portokalidis, G.; Giuffrida, C.; Bos, H. (2016). Undermining Entropy-based Information Hiding (And What to do About it). Proceedings of the USENIX Security Symposium (pp. 105--119).
  22. Athanasopoulos, E.; Kemerlis, V. P.; Portokalidis, G.; Keromytis, A. D. (2016). NaCLDroid: Native code isolation for android applications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (vol. 9878 LNCS, pp. 422-439).
  23. Haller, I.; Göktąs, E.; Athanasopoulos, E.; Portokalidis, G.; Bos, H. (2015). ShrinkWrap: VTable protection without loose ends. ACM International Conference Proceeding Series (vol. 7-11-December-2015, pp. 341-350).
  24. Vogt, D.; Miraglia, A.; Portokalidis, G.; Bos, H.; Tanenbaum, A.; Giuffrida, C. (2015). Speculative memory checkpointing. Middleware 2015 - Proceedings of the 16th Annual Middleware Conference (pp. 197-209).
  25. Athanasakis, M.; Athanasopoulos, E.; Polychronakis, M.; Portokalidis, G.; Ioannidis, S. (2015). The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines. Proceedings of the Network and Distributed System Security Symposium (NDSS).
  26. Ladakis, E.; Vasiliadis, G.; Polychronakis, M.; Ioannidis, S.; Portokalidis, G. (2015). GPU-disasm: A GPU-based x86 disassembler. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (vol. 9290, pp. 472-489).
  27. Yang, Q.; Damopoulos, D.; Portokalidis, G. (2015). WYSISNWIV: What you scan is not what I visit. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (vol. 9404, pp. 317-338).
  28. Enes G\"okta\cs; Athanasopoulos, E.; Polychronakis, M.; Bos, H.; Portokalidis, G. (2014). Size Does Matter - Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard. Proceedings of the USENIX Security Symposium (pp. 417--432).
  29. Chakravarty, S.; Barbera, M. V.; Portokalidis, G.; Polychronakis, M.; Keromytis, A. D. (2014). On the effectiveness of traffic analysis against anonymity networks using flow records. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (vol. 8362 LNCS, pp. 247-257).
  30. Göktaş, E.; Athanasopoulos, E.; Bos, H.; Portokalidis, G. (2014). Out of control: Overcoming control-flow integrity. Proceedings - IEEE Symposium on Security and Privacy (pp. 575-589).
  31. Damopoulos, D.; Kambourakis, G.; Portokalidis, G. (2014). The best of both worlds. A framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones. Proceedings of the 7th European Workshop on System Security, EuroSec 2014.
  32. Kontaxis, G.; Athanasopoulos, E.; Portokalidis, G.; Keromytis, A. D. (2013). SAuth: Protecting user accounts from password database leaks. Proceedings of the ACM Conference on Computer and Communications Security (pp. 187-198).
  33. Jee, K.; Kemerlis, V. P.; Keromytis, A. D.; Portokalidis, G. (2013). ShadowReplica: Efficient parallelization of dynamic data flow tracking. Proceedings of the ACM Conference on Computer and Communications Security (pp. 235-246).
  34. Zavou, A.; Pappas, V.; Kemerlis, V. P.; Polychronakis, M.; Portokalidis, G.; Keromytis, A. D. (2013). Cloudopsy: An autopsy of data flows in the cloud. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (vol. 8030 LNCS, pp. 366-375).
  35. Zavou, A.; Portokalidis, G.; Keromytis, A. D. (2012). Self-Healing Multitier Architectures Using Cascading Rescue Points. Proceedings of the Annual Computer Security Applications Conference (ACSAC) (pp. 379--388).
  36. Geneiatakis, D.; Portokalidis, G.; Kemerlis, V. P.; Keromytis, A. D. (2012). Adaptive Defenses for Commodity Software through Virtual Application Partitioning. Proceedings of the ACM Conference on Computer and Communications Security (CCS) (pp. 133--144).
  37. Zavou, A.; Athanasopoulos, E.; Portokalidis, G.; Keromytis, A. D. (2012). Exploiting Split Browsers for Efficiently Protecting User Data. Proceedings of The ACM Cloud Computing Security Workshop (CCSW) (pp. 37--42).
  38. Kemerlis, V. P.; Portokalidis, G.; Keromytis, A. D. (2012). kGuard: Lightweight Kernel Protection against Return-to-user Attacks. Proceedings of the USENIX Security Symposium (pp. 459--474).
  39. Kemerlis, V. P.; Portokalidis, G.; Jee, K.; Keromytis, A. D. (2012). libdft: Practical Dynamic Data Flow Tracking for Commodity Systems. Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE) (pp. 121--132).
  40. Jee, K.; Portokalidis, G.; Kemerlis, V. P.; Ghosh, S.; August, D. I.; Keromytis, A. D. (2012). A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware. Proceedings of the Annual Network and Distributed System Security Symposium (NDSS).
  41. Geneiatakis, D.; Portokalidis, G.; Keromytis, A. D. (2011). A Multilayer Overlay Network Architecture for Enhancing IP Service Availability Against DoS. Proceedings of the International Conference on Information Systems Security (ICISS) (pp. 322--336).
  42. Portokalidis, G.; Keromytis, A. D. (2011). Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution. Proceedings of the ARO Workshop on Moving Target Defense (pp. 49--76).
  43. Portokalidis, G.; Keromytis, A. D. (2011). REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points. Proceedings of the International Workshop on Security (IWSEC) (pp. 16--32).
  44. Zavou, A.; Portokalidis, G.; Keromytis, A. D. (2011). Taint-Exchange: a Generic System for Cross-process and Cross-host Taint Tracking. Proceedings of the International Workshop on Security (IWSEC) (pp. 113--128).
  45. Chakravarty, S.; Portokalidis, G.; Polychronakis, M.; Keromytis, A. D. (2011). Detecting Traffic Snooping in Tor Using Decoys. Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID) (pp. 222--241).
  46. Portokalidis, G.; Keromytis, A. D. (2010). Fast and Practical Instruction-Set Randomization for Commodity Systems. Proceedings of the Annual Computer Security Applications Conference (ACSAC) (pp. 41--48).
  47. Portokalidis, G.; Homburg, P.; Anagnostakis, K.; Bos, H. (2010). Paranoid Android: Versatile Protection For Smartphones. Proceedings of the Annual Computer Security Applications Conference (ACSAC) (pp. 347--356).
  48. Kemerlis, V. P.; Pappas, V.; Portokalidis, G.; Keromytis, A. D. (2010). iLeak: a Lightweight System for Detecting Inadvertent Information Leaks. Proceedings of the European Conference on Computer Network Defense (EC2ND) (pp. 21--28).
  49. Portokalidis, G.; Bos, H. (2008). Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits. Proceedings of the ACM SIGOPS/EuroSys European Conference on Computer Systems (pp. 287--299).
  50. Portokalidis, G.; Slowinska, A.; Bos, H. (2006). Argos: Emulated Hardware Support to Fingerprint Zero-Day Attacks by Means of Dynamic Data Flow Analysis. Proceedings of the Annual Conference of the Advanced School for Computing and Imaging (ASCI).
  51. Portokalidis, G.; Slowinska, A.; Bos, H. (2006). Argos: an Emulator for Fingerprinting Zero-Day Attacks. Proceedings of ACM SIGOPS EUROSYS (pp. 15--27).
  52. Portokalidis, G.; Slowinska, A.; Bos, H. (2006). Argos: Securing IP Communications Against Zero-Day Attacks. Proceedings of NLUUG Unix Users Group Annual Conference (pp. 15--27).
  53. Bos, H.; de Bruijn, W.; Cristea, M.; Nguyen, T.; Portokalidis, G. (2004). FFPF: Fairly Fast Packet Filters. Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI) (pp. 347--363).

Editorial, Journal

  1. Athanasopoulos, E.; Portokalidis, G.; Lindorfer, M. (2020). Guest editorial: Security on mobile and IoT devices. IET Information Security (4 ed., vol. 14, pp. 367).
  2. Karopoulos, G.; Portokalidis, G.; Domingo-Ferrer, J.; Lin, Y. D.; Geneiatakis, D.; Kambourakis, G. (2015). Security and privacy in unified communications: Challenges and solutions. Computer Communications (vol. 68, pp. 1-3).

Journal Article

  1. Agadakos, I.; Demarinis, N.; Jin, D.; Williams-King, K.; Alfajardo, J.; Shteinfeld, B.; Williams-King, D.; Kemerlis, V. P.; Portokalidis, G. (2020). Large-Scale Debloating of Binary Shared Libraries. Digital Threats: Research and Practice (DTRAP) (4 ed., vol. 1, pp. 1--28).
    https://dl.acm.org/doi/pdf/10.1145/3414997.
  2. Chakravarty, S.; Portokalidis, G.; Polychronakis, M.; Keromytis, A. D. (2015). Detection and analysis of eavesdropping in anonymous communication networks. International Journal of Information Security (3 ed., vol. 14, pp. 205-220).
  3. Kemerlis, V. P.; Portokalidis, G.; Athanasopoulos, E.; Keromytis, A. D. (2012). kGuard: Lightweight Kernel Protection. USENIX;login: Magazine (6 ed., vol. 37, pp. 7--14).
  4. Portokalidis, G.; Bos, H. (2007). SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots. Elsevier Journal on Computer Networks, Special Issue on Security through Self-Protecting and Self-Healing Systems (5 ed., vol. 51, pp. 1256--1274).

Technical Report

  1. Chakravarty, S.; Barbera, M. V.; Portokalidis, G.; Polychronakis, M.; Keromytis, A. D. (2013). On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records (CUCS-019-13 ed.). New York, NY, USA: Columbia University.
  2. Kemerlis, V. P.; Portokalidis, G.; Jee, K.; Keromytis, A. D. (2011). libdft: Practical Dynamic Data Flow Tracking for Commodity Systems (CUCS-044-11 ed.). New York, NY, USA: Columbia University.
  3. Chakravarty, S.; Portokalidis, G.; Polychronakis, M.; Keromytis, A. D. (2011). Detecting Traffic Snooping in Anonymity Networks Using Decoys (CUCS-005-11 ed.). New York, NY, USA: Columbia University.
  4. Portokalidis, G.; Homburg, P.; Anagnostakis, K.; Bos, H. (2009). Protecting Smart Phones by Means of Execution Replication (IR-CS-054 ed.). Amsterdam, The Netherlands: Vrije Universiteit.
  5. Folkerts, A.; Portokalidis, G.; Bos, H. (2008). Multi-tier intrusion detection by means of replayable virtual machines (IR-CS-047 ed.). Amsterdam, The Netherlands: Vrije Universiteit.
  6. Slowinska, A.; Portokalidis, G.; Bos, H. (2006). Prospector: a Protocol-Specific Detector of Polymorphic Buffer Overflows (IR-CS-023 ed.). Amsterdam, The Netherlands: Vrije Universiteit.
  7. Portokalidis, G.; Slowinska, A.; Bos, H. (2005). Argos: an x86 Emulator for Fingerprinting Zero-Day Attacks by Means of Dynamic Data Flow Analysis (IR-CS-017 ed.). Amsterdam, The Netherlands: Vrije Universiteit.
  8. Portokalidis, G.; Bos, H. (2005). SweetBait: Zero-Hour Worm Detection and Containment Using Honeypots (IR-CS-015 ed.). Amsterdam, The Netherlands: Vrije Universiteit.
  9. Portokalidis, G.; Bos, H. (2004). Packet Monitoring at High Speed with FFPF (2004-01 ed.). Leiden, The Netherlands: LIACS, Leiden University.
  10. Portokalidis, G.; Markatos, E. P.; Marazakis, M. (2002). Study and Bridging of Peer-to-Peer File Sharing Systems (312 ed.). Heraklion, Crete, Greece: ICS-FORTH.

Working Paper

    patent

    1. Keromytis, A. D.; Athanasopoulos, E.; Kontaxis, G.; Portokalidis, G. (2019). Methods, Systems, and Media for Authenticating Users Using Multiple Services.
      https://patents.google.com/patent/US10367797B2/en.