Georgios Portokalidis

Associate Professor

School: School of Engineering and Science

Department: Computer Science

Building: Gateway Center

Room: S329

Phone: (201) 216-8311

Fax: (201) 216-8249

Email: gportoka@stevens.edu

Website

Education
  • PhD (2010) Vrije Universiteit Amsterdam (Computer Science)
  • MS (2004) Leiden University (Computer Science)
  • BS (2002) University of Crete (Computer Science)
Institutional Service
  • CAREER Club Member
  • Junior faculty mentoring committee Member
  • CS department system administrator search committee Chair
  • PhD committee Member
  • Stevens Cyber-Defense Team Member
  • Faculty hiring Member
  • Cybersecurity curriculum committee Member
  • Communications committee Chair
  • Faculty search committee Member
Professional Service
  • ACM Conference on Computer and Communications Security (CCS) Program committee member
  • 2nd International Workshop on Security in Mobile Technologies (SecMT 2021) Program committee member
  • ACM ASIA Conference on Computer and Communications Security (ASIACCS) Program committee member
  • ACM Conference on Computer and Communications Security Poster session program committee member
  • ACM Conference on Computer and Communications Security (CCS) Program Committee Member
  • International Symposium on Research in Attacks, Intrusions and Defenses Program committee member
  • Conference on Detection of Intrusions and Malware & Vulnerability Assessment Program Committee Member
Professional Societies
  • USENIX – The USENIX Association Member
  • ACM – Association for Computing Machinery Member
  • IEEE – Institute of Electrical and Electronics Engineers Member
Selected Publications
Conference Proceeding
  1. Pang, C.; Yu, R.; Xu, D.; Koskinen, E.; Portokalidis, G.; Xu, J. (2021). Towards Optimal Use of Exception Handling Information for Function Detection. Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
  2. Göktas, E.; Razavi, K.; Portokalidis, G.; Bos, H.; Giuffrida, C. (2020). Speculative Probing: Hacking Blind in the Spectre Era. Proceedings of the ACM Conference on Computer and Communications Security (pp. 1871-1885).
  3. Agadakos, I.; Jin, D.; Williams-King, D.; Kemerlis, V. P.; Portokalidis, G. (2019). Nibbler: Debloating binary shared libraries. ACM International Conference Proceeding Series (pp. 70-83).
  4. Goktas, E.; Kollenda, B.; Koppe, P.; Bosman, E.; Portokalidis, G.; Holz, T.; Bos, H.; Giuffrida, C. (2018). Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018 (pp. 227-242).
  5. Agadakos, I.; Polakis, J.; Portokalidis, G. (2017). Techu: Open and privacy-preserving crowdsourced GPS for the masses. MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services (pp. 475-487).
  6. Agadakos, I.; Hallgren, P.; Damopoulos, D.; Sabelfeld, A.; Portokalidis, G. (2016). Location-enhanced authentication using the IoT because you cannot be in two places at once. ACM International Conference Proceeding Series (vol. 5-9-December-2016, pp. 251-264).
  7. Athanasopoulos, E.; Kemerlis, V. P.; Portokalidis, G.; Keromytis, A. D. (2016). NaCLDroid: Native code isolation for android applications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (vol. 9878 LNCS, pp. 422-439).
  8. Haller, I.; Göktąs, E.; Athanasopoulos, E.; Portokalidis, G.; Bos, H. (2015). ShrinkWrap: VTable protection without loose ends. ACM International Conference Proceeding Series (vol. 7-11-December-2015, pp. 341-350).
  9. Vogt, D.; Miraglia, A.; Portokalidis, G.; Bos, H.; Tanenbaum, A.; Giuffrida, C. (2015). Speculative memory checkpointing. Middleware 2015 - Proceedings of the 16th Annual Middleware Conference (pp. 197-209).
  10. Ladakis, E.; Vasiliadis, G.; Polychronakis, M.; Ioannidis, S.; Portokalidis, G. (2015). GPU-disasm: A GPU-based x86 disassembler. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (vol. 9290, pp. 472-489).
  11. Yang, Q.; Damopoulos, D.; Portokalidis, G. (2015). WYSISNWIV: What you scan is not what I visit. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (vol. 9404, pp. 317-338).
  12. Chakravarty, S.; Barbera, M. V.; Portokalidis, G.; Polychronakis, M.; Keromytis, A. D. (2014). On the effectiveness of traffic analysis against anonymity networks using flow records. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (vol. 8362 LNCS, pp. 247-257).
  13. Göktaş, E.; Athanasopoulos, E.; Bos, H.; Portokalidis, G. (2014). Out of control: Overcoming control-flow integrity. Proceedings - IEEE Symposium on Security and Privacy (pp. 575-589).
  14. Damopoulos, D.; Kambourakis, G.; Portokalidis, G. (2014). The best of both worlds. A framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones. Proceedings of the 7th European Workshop on System Security, EuroSec 2014.
  15. Kontaxis, G.; Athanasopoulos, E.; Portokalidis, G.; Keromytis, A. D. (2013). SAuth: Protecting user accounts from password database leaks. Proceedings of the ACM Conference on Computer and Communications Security (pp. 187-198).
  16. Jee, K.; Kemerlis, V. P.; Keromytis, A. D.; Portokalidis, G. (2013). ShadowReplica: Efficient parallelization of dynamic data flow tracking. Proceedings of the ACM Conference on Computer and Communications Security (pp. 235-246).
  17. Zavou, A.; Pappas, V.; Kemerlis, V. P.; Polychronakis, M.; Portokalidis, G.; Keromytis, A. D. (2013). Cloudopsy: An autopsy of data flows in the cloud. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (vol. 8030 LNCS, pp. 366-375).
Editorial, Journal
  1. Athanasopoulos, E.; Portokalidis, G.; Lindorfer, M. (2020). Guest editorial: Security on mobile and IoT devices. IET Information Security (4 ed., vol. 14, pp. 367).
  2. Karopoulos, G.; Portokalidis, G.; Domingo-Ferrer, J.; Lin, Y. D.; Geneiatakis, D.; Kambourakis, G. (2015). Security and privacy in unified communications: Challenges and solutions. Computer Communications (vol. 68, pp. 1-3).
Journal Article
  1. Agadakos, I.; Demarinis, N.; Jin, D.; Williams-King, K.; Alfajardo, J.; Shteinfeld, B.; Williams-King, D.; Kemerlis, V. P.; Portokalidis, G. (2020). Large-Scale Debloating of Binary Shared Libraries. Digital Threats: Research and Practice (DTRAP) (4 ed., vol. 1, pp. 1--28).
    https://dl.acm.org/doi/pdf/10.1145/3414997.
  2. Chakravarty, S.; Portokalidis, G.; Polychronakis, M.; Keromytis, A. D. (2015). Detection and analysis of eavesdropping in anonymous communication networks. International Journal of Information Security (3 ed., vol. 14, pp. 205-220).