Sotiris Ioannidis Research Interests Education Employment Summary
Sotiris Ioannidis Research Interests Education Employment Summary
Sotiris Ioannidis Research Interests Education Employment Summary
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Sotiris</strong> <strong>Ioannidis</strong><br />
Institute of Computer Science Department<br />
Foundation for <strong>Research</strong> and Technology<br />
N. Plastira 100<br />
Vassilika Vouton, GR-700 13 Heraklion, Crete, Greece<br />
sotiris@ics.forth.gr www.ics.forth.gr/~sotiris<br />
<strong>Research</strong> <strong>Interests</strong><br />
Network and Host Security, Privacy, Security Policy, Distributed Systems.<br />
<strong>Education</strong><br />
University of Pennsylvania, USA<br />
Ph.D. in Computer and Information Science, February 2005<br />
Thesis: “ Security Policy Consistency and Distributed Evaluation in Heterogeneous Environments”<br />
Advisor: Jonathan M. Smith<br />
Committee: Matt A. Blaze, Steve M. Bellovin, Honghui Lu, and Michael B. Greenwald<br />
University of Rochester, USA<br />
M.Sc. in Computer Science, June 1998<br />
Advisor: Sandhya Dwarkadas<br />
University of Crete, Greece<br />
M.Sc. in Computer Science, June 1996<br />
Advisors: Evangelos Markatos, Christos Nikolaou<br />
B.Sc. in Mathematics, June 1994<br />
<strong>Employment</strong> <strong>Summary</strong><br />
Distributed Computing Systems Lab<br />
Institute of Computer Science, FORTH, Greece<br />
Associate <strong>Research</strong>er.<br />
Computer Science Department, University of Crete, Greece<br />
Adjunct Professor.<br />
October 2007 – Present<br />
October 2007 – Present<br />
Stevens Institute of Technology, USA February 2005 – June 2007<br />
<strong>Research</strong> Scholar in the Computer Science Department<br />
University of Pennsylvania, USA January 1999 – January 2005<br />
<strong>Research</strong> assistant in the Distributed Systems Laboratory<br />
AT&T Labs - <strong>Research</strong>, Network Services <strong>Research</strong> Center, USA May 2001 – September 2001<br />
Internship<br />
AT&T Labs - <strong>Research</strong>, Network Services <strong>Research</strong> Center, USA May 2000 – September 2000<br />
Internship
AT&T Labs - <strong>Research</strong>, Network Services <strong>Research</strong> Center, USA May 1999 – September 1999<br />
Internship<br />
IBM Poughkeepsie, Hardware Development Group, USA July 1998 – August 1998<br />
Internship<br />
University of Rochester, USA September 1996 – December 1998<br />
<strong>Research</strong> assistant in the Systems Group<br />
Institute of Computer Science, FORTH, Greece June 1994 – August 1996<br />
<strong>Research</strong> assistant with the Distributed Systems Group<br />
Computer Center, University of Crete, Greece September 1991 – May 1994<br />
Systems Operator and Administrator<br />
Courses Created/Taught<br />
Instructor, University of Crete, “CSE4881: Secure Systems,” Summer 2010 (exchange students course)<br />
Instructor, University of Crete, “CS455: Cybersecurity Lab,” Spring 2010<br />
Instructor, University of Crete, “CS557: Secure Systems,” Fall 2009<br />
Instructor, University of Crete, “CSE4881: Secure Systems,” Summer 2009 (exchange students course)<br />
Instructor, University of Crete, “CS455: Cybersecurity Lab,” Spring 2008<br />
Instructor, University of Crete, “CS455: Cybersecurity Lab,” Spring 2009<br />
Instructor, University of Crete, “CS557: Secure Systems,” Fall 2008<br />
Instructor, University of Crete, “CS455: Cybersecurity Lab,” Spring 2008<br />
Instructor, University of Crete, “CS557: Secure Systems,” Fall 2007<br />
Instructor, Stevens Institute of Technology, “CS465/765: Secure Systems,” Spring 2007<br />
Instructor, Stevens Institute of Technology, “CS465/765: Secure Systems,” Spring 2006<br />
Honors and Awards<br />
- Marie Curie Fellow, 2008-2013<br />
- USENIX Travel Grant, 2004<br />
- Graduate <strong>Research</strong> Fellowship, CIS Department, University of Pennsylvania, 1999-2005<br />
- Graduate <strong>Research</strong> Scholarship, CS Department, University of Rochester, 1996-1998<br />
- Graduate <strong>Research</strong> Fellowship, ICS-FORTH, Greece, 1994-1996<br />
- Erasmus Fellowship, 1993<br />
- Undergraduate Scholarship, State Scholarships Foundation, Greece, 1990-1992<br />
Editor<br />
- Proceedings of the 3 rd European Conference on Computer Network Defense. Lecture Notes in Electrical<br />
Engineering, December 2008.<br />
Grants – Principal Investigator<br />
●<br />
2010, TRACER: Vulnerability Detection and Reinforcement of Security in Legacy Applications
and Systems, funded by the General Secretariat for <strong>Research</strong> and Technology, Total requested:<br />
EUR 640,000, FORTH requested: EUR 120,000 (in negotiations)<br />
● 2008, Study on: Resilience Features of IPv6, DNSSEC and MPLS and Deployment Scenarios,<br />
funded by ENISA, Total: EUR 4,500<br />
● 2008-2013, PASS: Privacy Architectures for System Services, funded by Marie Curie<br />
International Reintegration Grants FP7-PEOPLE-2007-4-3-IRG, FORTH: EUR 100,000<br />
● 2008-2010, FORWARD: Managing Emerging Threats in ICT Infrastructure, funded by FP7/ICT/<br />
CA, Total: EUR 890,000 FORTH: EUR 143,950<br />
● 2006-2008, Kanon: Security Policies for Collaborative Heterogeneous Distributed Systems,<br />
funded by the General Secretariat for <strong>Research</strong> and Technology, ENTER 2005, EUR 70,200<br />
Grants – Contributor<br />
● 2010-2014, SysSec: A European Network of Excellence in Managing Threats and Vulnerabilities<br />
in the Future Internet: Europe for the World, funded by the European Commission, Total: EUR<br />
2,946,029 FORTH: EUR 603,000 (<strong>Sotiris</strong> <strong>Ioannidis</strong> Workpackage Leader, Evangelos Markatos<br />
PI)<br />
● 2010-2012, i-Code: Real-time Malicious Code Identification, funded by the European<br />
Commission, Total: EUR 753,895 FORTH: EUR 209,000 (<strong>Sotiris</strong> <strong>Ioannidis</strong> Workpackage Leader,<br />
Evangelos Markatos PI)<br />
● 2006, Sun Equipment Grant, $24,658, (with Susanne Wetzel)<br />
Publications<br />
Thesis<br />
T1. <strong>Sotiris</strong> <strong>Ioannidis</strong>, “ Security Policy Consistency and Distributed Evaluation in Heterogeneous
Systems”, University of Pennsylvania, 2005.<br />
Book Chapters<br />
B1. Jonathan M. Smith, Michael B. Greenwald, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Angelos D. Keromytis, Ben Laurie,<br />
Douglas Maughan, Dale Rahn, Jason L. Wright, “ Experiences Enhancing Open Source Security in the<br />
POSSE Project”, in Free/Open Source Software Development, ed. Stefan Koch, IGP, December 2003.<br />
B2. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Athanasios E. Papathanasiou, Grigorios I. Magklis, Evangelos P. Markatos,<br />
Dionisios N. Pnevmatikatos, and Julia Sevaslidou, “ On using Reliable Network RAM in Networks of<br />
Workstations”, in Cluster Computing, pp. 109-121, Chapter 10, 2001, ISBN 1-59033-113-3, Nova Science<br />
Publishers, USA, 2001.<br />
Journal Publications<br />
J1. Andreas Makridakis, Elias Athanasopoulos, Spiros Antonatos, Demetres Antoniades, <strong>Sotiris</strong> <strong>Ioannidis</strong>,<br />
Evangelos P. Markatos, “Understanding the Behavior of Malicious Applications in Social Networks”,<br />
in IEEE Network Special Issue on Online Social Networks, September/October 2010.<br />
J2. Stefan Miltchev, Jonathan M. Smith, Vassilis Prevelakis, Angelos D. Keromytis, <strong>Sotiris</strong><br />
<strong>Ioannidis</strong>, “Decentralized Access Control in Distributed File Systems”, in ACM Computing Surveys, vol.<br />
40, no. 3, September 2008.<br />
J3. K. G. Anagnostakis, M. B. Greenwald, S. <strong>Ioannidis</strong>, Angelos Keromytis, “COVERAGE: Detecting<br />
and Reacting to Worm Epidemics Using Cooperation and Validation”, in Springer International<br />
Journal of Information Security (IJIS), Special Issue, 2007.<br />
J4. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Steven M. Bellovin, John <strong>Ioannidis</strong>, Angelos D. Keromytis, Kostas Anagnostakis,<br />
Jonathan M. Smith, “Virtual Private Services: Coordinated Policy Enforcement for Distributed<br />
Applications”, in International Journal of Network Security, Vol. 4, No. 1, 2007, pp. 69-80, January 2007.<br />
J5. K. G. Anagnostakis, M. B. Greenwald, S. <strong>Ioannidis</strong>, D. Li, J. M. Smith, “Flexible Network<br />
Monitoring with FLAME”, in Computer Networks Journal (Special Issue on Active Networks - Elsevier<br />
Science), Vol. 50, No. 14, pp. 2548-2563, October 2006.<br />
J6. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Umit Rencuzogullari, Robert Stets, Sandhya Dwarkadas, “ CRAUL: Compiler<br />
and Run-Time Integration for Adaptation Under Load”, in Journal of Scientific Programming, pp.<br />
261-273, Spring1999.<br />
J7. Dionisios Pnevmatikatos, Evangelos P. Markatos, Gregory Maglis, <strong>Sotiris</strong> <strong>Ioannidis</strong>, “On using<br />
Network RAM as a non-volatile Buffer”, in Cluster Computing, Special Issue on I/O in Shared-Storage<br />
Clusters, 2(4), pp. 295-303, Baltzer Science Publishers, 1999.<br />
J8. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Athanasios E. Papathanasiou, Grigorios I. Magklis, Evangelos P. Markatos, Dionisios<br />
N. Pnevmatikatos, Julia Sevaslidou, “On using Reliable Network RAM in Networks of Workstations”,<br />
in Special Issue on High Performance Computing on Clusters Parallel and Distributed Computing<br />
Practices (PDCP), Vol. 2, No. 2, Nova Science Publishers, USA, February 1999.<br />
J9. N. Hardavellas, G. C. Hunt, S. <strong>Ioannidis</strong>, R. Stets, S. Dwarkadas, L. Kontothanassis, M. L. Scott,<br />
“Efficient Use of Memory Mapped Interfaces for Shared Memory Computing”, in IEEE Technical<br />
Committee on Computer Architecture (TCCA) Newsletter Special Issue, pp. 28-33, March 1997.<br />
Conference Publications<br />
C1. Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Evangelos P.
Markatos, “D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks”, in Proceedings of the 15th<br />
European Symposium on <strong>Research</strong> in Computer Security (ESORICS), Athens, Greece, September 2010.<br />
C2. Giorgos Vasiliadis, <strong>Sotiris</strong> <strong>Ioannidis</strong>, “GrAVity: A Massively Parallel Antivirus Engine”, in<br />
Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID),<br />
Ottawa, Ontario, Canada, September 2010.<br />
C3. Periklis Akritidis, W. Y. Chin, Evangelos Markatos, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Spiros Antonatos, Kostas<br />
Anagnostakis, “HoneyLab: Large-scale Honeypot Deployment and Resource Sharing”, in Proceedings<br />
of the 3rd International Conference on Network and Systems Security (NSS), Gold Coast, Australia,<br />
October 2009.<br />
C4. Eleni Gessiou, Alexandros Lambrinidis, <strong>Sotiris</strong> <strong>Ioannidis</strong>, “A Greek (Privacy) Tragedy: The<br />
Introduction of Social Security Numbers in Greece”, in Proceedings of the 8th ACM CCS Workshop on<br />
Privacy in the Electronic Society (WPES), Chicago, Illinois, USA, November 2009.<br />
C5. Giorgos Vasiliadis, Spiros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, <strong>Sotiris</strong><br />
<strong>Ioannidis</strong>, “Regular Expression Matching on Graphics Hardware for Intrusion Detection”, in<br />
Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (RAID),<br />
Saint-Malo, France, September 2009.<br />
C6. Lazaros Koromilas, George Chinis, Irini Fundulaki, <strong>Sotiris</strong> <strong>Ioannidis</strong>, “Controlling Access to XML<br />
Documents over XML Native and Relational Databases”, in Proceedings of the 6th VLDB Workshop on<br />
Secure Data Management (SDM), Lyon, France, August 2009.<br />
C7. Giorgos Vasiliadis, Spiros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, <strong>Sotiris</strong><br />
<strong>Ioannidis</strong>, “Gnort: High Performance Network Intrusion Detection Using Graphics Processors”,<br />
in Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID),<br />
Boston, MA, USA, September 2008.<br />
C8. E. Athanasopoulos, A. Makridakis, S. Antonatos, D. Antoniades, S. <strong>Ioannidis</strong>, K. G. Anagnostakis,<br />
E. P. Markatos, “Antisocial Networks: Turning a Social Network into a Botnet”, in Proceedings of the<br />
11th Infomation Security Conference (ISC), Taipei, Taiwan, September 2008.<br />
C9. Vasilis Pappas, Elias Athanasopoulos, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Evangelos P. Markatos, “Compromising<br />
Anonymity Using Packet Spinning”, in Proceedings of the 11th Information Security Conference (ISC),<br />
Taipei, Taiwan, September 2008.<br />
C10. Herbert Bos, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Erland Jonsson, Engin Kirda, Chris Kruegel, “Future Threats to<br />
Future Trust”, in Proceedings of the Future of Trust in Computing Conference, Berlin, Germany, July<br />
2008.<br />
C11. S. Antonatos, M. Athanatos, G. Kondaxis, J. Velegrakis, N. Hatzibodozis, S. <strong>Ioannidis</strong>, E. P.<br />
Markatos, “Honey@home: A New Approach to Large-Scale Threat Monitoring”, in Proceedings of the<br />
1st WOMBAT Workshop, Amsterdam, The Netherlands, April 2008.<br />
C12. Peter I. Politopoulos, Evangelos P. Markatos, <strong>Sotiris</strong> <strong>Ioannidis</strong>, “Evaluation of Compression of<br />
Remote Network Monitoring Data Streams”, in Proceedings of the 6th IEEE Workshop on End-to-End<br />
Monitoring Techniques and Services (E2EMon), Salvador, Bahia, Brazil, April 2008.<br />
C13. Nikos Nikiforakis, Demetres Antoniades, Evangelos P. Markatos, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Arne Olesbo,<br />
“When AppMon met Stager”, in Proceedings of the 6th IEEE Workshop on End-to-End Monitoring<br />
Techniques and Services (E2EMon) (short paper), Salvador, Bahia, Brazil, April 2008.<br />
C14. Stelios Sidiroglou, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Angelos Keromytis, “Band-aid Patching”, in Proceedings of the<br />
USENIX 3rd Workshop on Hot Topics in System Dependability (HotDep) (short paper), Edimburgh, UK,
June 2007.<br />
C15. Jonathan Voris, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Susanne Wetzel, Ulrike Meyer, “Performance Evaluation of a<br />
Privacy-Preserving Policy Reconciliation Protocol”, in Proceedings of the IEEE Workshop on Policies<br />
for Distributed Systems and Net-works (Policy), Rome, Italy, June 2007.<br />
C16. Ulrike Meyer, Susanne Wetzel, <strong>Sotiris</strong> <strong>Ioannidis</strong>, “Distributed Privacy-Preserving Policy<br />
Reconciliation”, in Proceedings of the IEEE International Conference on Communications (ICC),<br />
Glasgow, UK, June 2007.<br />
C17. Vasilis Prevelakis, <strong>Sotiris</strong> <strong>Ioannidis</strong>, “Preserving TCP Connections Across Host Address<br />
Changes”, in Proceedings of the 9th Information Security Conference (ISC), Samos, Greece, August-<br />
September 2006.<br />
C18. K. G. Anagnostakis, M. B. Greenwald, S. <strong>Ioannidis</strong>, Angelos Keromytis, “Robust Reactions<br />
to Potential Day-Zero Worms through Cooperation and Validation”, in Proceedings of the 9th<br />
Information Security Conference (ISC), Samos, Greece, August-September 2006.<br />
C19. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Stelios Sidiroglou, Angelos Keromytis, “Privacy as an Operating System<br />
Service”, in Proceedings of the USENIX 1st Workshop on Hot Topics in Security (HotSec), Vancouver,<br />
BC, Canada, July 2006.<br />
C20. A. D. Keromytis, K. Anagnostakis, S. <strong>Ioannidis</strong>, M. Greenwald, J. M. Smith, “Managing Access<br />
Control in Large Scale Heterogeneous Networks”, in Proceedings of the NATO C3 Symposium on<br />
Interoperable Networks for Secure Communications (INSC), The Hague, Netherlands, November 2003.<br />
C21. K. G. Anagnostakis, M. B. Greenwald, S. <strong>Ioannidis</strong>, A. D. Keromytis, D. Li, “A Cooperative<br />
Immunization System for an Untrusting Internet”, in Proceedings of the 11th IEEE International<br />
Conference on Networks (ICON), pp. 403-408, Sydney, Australia, October 2003.<br />
C22. Matt Blaze, John <strong>Ioannidis</strong>, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Angelos D. Keromytis, Pekka Nikander, Vassilis<br />
Prevelakis, “TAPI: Transactions for Accessing Public Infrastructure”, in Proceedings of the 8th IFIP<br />
Personal Wireless Communications (PWC) Conference, Venice, Italy, September 2003.<br />
C23. Stefan Miltchev, Vassilis Prevelakis, <strong>Sotiris</strong> <strong>Ioannidis</strong>, John <strong>Ioannidis</strong>, Angelos D. Keromytis,<br />
Jonathan M. Smith, “Secure and Flexible Global File Sharing”, in Proceedings of the USENIX Annual<br />
Technical Conference, Freenix Track, pp. 165 - 178, San Antonio, TX, June 2003.<br />
C24. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Steven M. Bellovin, John <strong>Ioannidis</strong>, Angelos D. Keromytis, Jonathan M.<br />
Smith, “Design and Implementation of Virtual Private Services”, in Proceedings of the IEEE<br />
International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises<br />
(WETICE), Workshop on Enterprise Security, Special Session on Trust Management in Collaborative<br />
Global Computing, Linz, Austria, June 2003.<br />
C25. Alexander Levine, Vassilis Prevelakis, John <strong>Ioannidis</strong>, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Angelos D.<br />
Keromytis, “WebDAVA: An Administrator-Free Approach To Web File-Sharing”, in Proceedings of<br />
the IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises<br />
(WETICE), Workshop on Distributed and Mobile Collaboration, Linz, Austria, June 2003.<br />
C26. Angelos D. Keromytis, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Michael B. Greenwald, Jonathan M. Smith, “The<br />
STRONGMAN Architecture”, in Proceedings of the Third DARPA Information Survivability Conference<br />
and Exposition (DISCEX III), Washington DC, April 2003.<br />
C27. K. G. Anagnostakis, M. Greenwald, S. <strong>Ioannidis</strong>, S. Miltchev, “Open Packet Monitoring on<br />
FLAME: Safety, Performance and Applications”, in Proceedings of the 4th IFIP International Working<br />
Conference on Active Networks (IWAN), pp. 120-131, Zurich, Switzerland, December 2002.
C28. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Steven M. Bellovin, Jonathan M. Smith, “ Sub-Operating Systems: A New<br />
Approach to Application Security”, in Proceedings of the ACM SIGOPS European Workshop, France,<br />
September 2002.<br />
C29. Stefan Miltchev, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Angelos Keromytis, “A Study of the Relative Costs of Network<br />
Security Proto-cols”, in Proceedings of USENIX 2002 Annual Technical Conference, Freenix Track,<br />
Monterey, CA, June 2002.<br />
C30. S. <strong>Ioannidis</strong>, K. G. Anagnostakis, J. <strong>Ioannidis</strong>, A. D. Keromytis, “xPF: Packet Filtering for Low-<br />
Cost Network Monitoring”, in Proceedings of the IEEE Workshop on High-Performance Switching and<br />
Routing (HPSR), pp. 121-126, Kobe, Japan, May 2002.<br />
C31. John <strong>Ioannidis</strong>, <strong>Sotiris</strong> <strong>Ioannidis</strong>, Angelos D. Keromytis, Vassilis Prevelakis, “Fileteller: Paying and<br />
Getting Paid for File Storage”, in Proceedings of Financial Cryptography (FC), Bermuda, March 2002.<br />
C32. K. G. Anagnostakis, S. <strong>Ioannidis</strong>, S. Miltchev, J. <strong>Ioannidis</strong>, M. Greenwald, J. M. Smith, “Efficient<br />
Packet Monitoring for Network Management”, in Proceedings of the 8th IEEE/IFIP Network<br />
Operations and Management Symposium (NOMS), pp. 423-436, Florence, Italy, April 2002.<br />
C33. K. G. Anagnostakis, S. <strong>Ioannidis</strong>, S. Miltchev, J. M. Smith, “Practical Network Applications on a<br />
Lightweight Active Management Environment”, in Proceedings of the 3rd IFIP International Working<br />
Conference on Active Networks (IWAN), pp. 101-115, Philadelphia, USA, October 2001.<br />
C34. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Steven M. Bellovin, “Building a Secure Web Browser”, in Proceedings of<br />
USENIX Annual Technical Conference, Freenix Track, Boston, June 2001.<br />
C35. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith, “Implementing<br />
a Distributed Firewall”, in Proceedings of the ACM Computer and Communications Security (CCS), pp.<br />
190-199, Athens, Greece, November 2000.<br />
C36. K. G. Anagnostakis, M. W. Hicks, S. <strong>Ioannidis</strong>, A. D. Keromytis, J. M. Smith, “ Scalable Resource<br />
Control in Active Networks”, in Proceedings of the 2nd IFIP International Working Conference on<br />
Active Networks (IWAN), pp. 343-357, Tokyo, Japan, October 2000.<br />
C37. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Evangelos P. Markatos, Julia Sevaslidou, “Using Network Memory to Improve<br />
the Performance of Transaction-Based Systems”, in Proceedings of International Conference on<br />
Parallel and Distributed Processing Techniques and Applications (PDPTA), Las Vegas, NV, July 1998.<br />
C38. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Sandhya Dwarkadas, “Compiler and Run-Time Support for Adaptive Load<br />
Balancing in Soft-ware Distributed Shared Memory Systems”, in Proceedings of the ACM Fourth<br />
Workshop on Languages, Compilers, and Run-time Systems for Scalable Computers (LCR), pp. 107-122,<br />
Pittsburg, PA, May 1998.<br />
Articles (non peer reviewed)<br />
A1. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Evangelos Markatos, Engin Kirda, Christopher Kruegel, “Drivers of Emerging and<br />
Future Threats in ICT Infrastructures”, in ENISA Quarterly, Vol. 5, No. 3, July-September 2009.<br />
A2. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Evangelos Markatos, Christopher Kruegel, “On looking FORWARD”, in ERCIM<br />
News, No. 76, January 2009<br />
A3. <strong>Sotiris</strong> <strong>Ioannidis</strong>, Evangelos Markatos, Engin Kirda, Christopher Kruegel, “Tracing the Changing
Nature of Cyberattacks”, in ENISA Quarterly, Vol. 4, No. 4, October-December 2008.<br />
Selected Invited Talks<br />
1. “Cloud Computing Threats (real and perceived)”, Free and Open Source Software Workshop,<br />
University of Crete, May 2010.<br />
2. “Web Security,” W3C Workshop, Foundation for <strong>Research</strong> and Technology – Hellas, September<br />
2009.<br />
3. “Gnort: High Performance Intrusion Detection Using Graphics Processors,” AIT Workshop on<br />
Practical aspects of security (PRACSE), June 2009.<br />
4. “Security and Privacy in a Networked and Mobile World,” FIDIS Interdisciplinary Doctoral<br />
Consortium, June 2008.<br />
5. “Consistent Security Policy Evaluation,” Stevens, Columbia, and IBM <strong>Research</strong>, Security and<br />
Privacy Day, November 2005.<br />
6. “Consistent Security Policy for Decentralized Systems,” Institute of Computer Science, Foundation<br />
for <strong>Research</strong> and Technology Hellas, February 2004.<br />
7. “Abstraction, Specification and Enforcement of Security Policies for Decentralized Systems,”<br />
TACL Seminar, Princeton University, November 2003.<br />
8. “Consistent Security Policy for Decentralized Systems,” Rutgers University, July 2003.<br />
9. “Abstraction, Specification and Enforcement of Security Policies for Decentralized Systems,”<br />
Secure Systems <strong>Research</strong> Department, AT&T Labs <strong>Research</strong>, September 2002.<br />
10. “Fine-Grain Policy-Based Access Control for Distributed Systems,” SDL–LCS Seminar Series,<br />
Carnegie-Mellon University, April 2002.<br />
Student Supervision<br />
1. Frey Kuo, Ph.D. student at UPenn, working on FLAME<br />
2. Dekai Li, Ph.D. student at UPenn, working on FLAME<br />
3. Brian Zima, M.Sc. student at UPenn, working on Web Browser security<br />
4. Thomas Langan, M.Sc. student at UPenn, working on CANON<br />
5. Ryan Marone, B.E. student at Stevens Tech, Technogenesis project on Cybersecurity<br />
6. Matt Keyser, B.E. student at Stevens Tech, Technogenesis project on Cybersecurity
7. Ilya Chalyt, B.Sc. student at Stevens Tech, Stevens Cybersecurity contest<br />
8. Nick Egebo, B.Sc. student at Stevens Tech, Stevens Cybersecurity contest<br />
9. Chris Gamio, B.Sc. student at Stevens Tech, Technogenesis project on Cybersecurity<br />
10. Sean M. Freeman, B.Sc. student at Stevens Tech, Technogenesis project on Cybersecurity<br />
11. Jonathan Voris, M.Sc. student at Stevens Tech, working on Privacy-Preserving Policy Reconciliation<br />
12. John Hite, B.Sc. student at Stevens Tech, working on Wireless Vulenerabilities.<br />
13. Gary Brown, B.Sc. student at Stevens Institute of Technology Technogenesis project on Cybersecurity<br />
14. Daniel Ready, B.Sc. student at Stevens Institute of Technology Technogenesis project on Cybersecurity<br />
15. Eleni Gessiou, M.Sc. student at the University of Crete, project PASS.<br />
16. Giorgos Vasiliadis, Ph.D. student at the University of Crete, project Gnort.<br />
Professional Activities<br />
Program Chair: European Conference on Computer Network Defense (EC2ND), 2008.<br />
Program Chair: ENISA-FORTH Network and Information Security Summer School, 2008.<br />
Program Chair: European Conference on Computer Network Defense (EC2ND), 2007.<br />
Steering Committee: European Conference on Computer Network Defense (EC2ND), 2011.<br />
Steering Committee: European Conference on Computer Network Defense (EC2ND), 2010.<br />
Steering Committee: European Conference on Computer Network Defense (EC2ND), 2009.<br />
Program Committee: IEEE International Conference on Communications (ICC), 2011.<br />
Program Committee: International Workshop on SEcurity and SOCial Networks (SESOC), 2010.<br />
Program Committee: European Workshop on System Security (EuroSec), 2010.<br />
Program Committee: European Conference on Computer Network Defense (EC2ND), 2010.<br />
Program Committee: Workshop in Information Security Theory and Practices (WISTP), 2010.<br />
Program Committee: European Conference on Computer Network Defense (EC2ND), 2009. Program Committee:<br />
ACM Conference on Computer and Communications Security (CCS), 2009.<br />
Program Committee: Workshop in Information Security Theory and Practices (WISTP), 2009.<br />
Program Committee: IEEE International Workshop on Security, Privacy and Authentication in Wireless Networks<br />
(SPAWN), 2009.<br />
Program Committee: International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking<br />
and Communications (SecPriWiMob), 2009.<br />
Program Committee: International Workshop on Foundations and Techniques for Open Source Software Certification<br />
(OpenCert), 2009.
Program Committee: ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics (CSI-KDD), 2009.<br />
Program Committee: Information Security Conference (ISC), 2009. Program Committee: International Symposium On<br />
Recent Advances In Intrusion Detection (RAID), 2009.<br />
Program Committee: European Workshop on System Security (EuroSec), 2009. Program Committee: Workshop on<br />
Open Source Software for Computer and Network Forensics (OSSCoNF), 2008.<br />
Program Committee: International Workshop on Security in Opportunistic and SOCial Networks (SOSOC), 2008.<br />
Program Committee: New Technologies, Mobility and Security (NTMS), 2008.<br />
Program Committee: European Workshop on System Security (EuroSec), 2008.<br />
Program Committee: IEEE International Wireless Communications and Mobile Computing Conference (IWCMC),<br />
2008.<br />
Program Committee: Workshop in Information Security Theory and Practices (WISTP), 2008.<br />
Program Committee: International Conference on Distributed Computing Systems (ICDCS) (Security Track), 2007.<br />
Program Committee: Workshop on Automated Self-Healing (WASH), 2006. Program Committee: WWW 2006<br />
Conference (Security, Privacy and Ethics track).<br />
Program Committee: Applied Cryptography and Network Security, 2005.<br />
Program Committee: Usenix Security Conference, 2004.<br />
References<br />
Available upon request