publications && (reports & misc. documents)

::publications

  1. Iskander Sanchez-Rola and Leyla Bilge, Norton Research Group; Davide Balzarotti, EURECOM; Armin Buescher, Crosspoint Labs; Petros Efstathopoulos, Norton Research Group. Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages. In Proceedings of the 32nd USENIX Security Symposium, 2023.

  2. EM Kornaropoulos and Petros Efstathopoulos, Norton Research Group. The case of adversarial inputs for secure similarity approximation protocols. In Proceedings of the 4th IEEE European Symposium on Security and Privacy (EuroS&P), 2019.

  3. K. Ashwin Kumar and Petros Efstathopoulos, Symantec Research Labs. Utility-Driven Graph Summarization. In Proceedings of the VLDB Endowment, Volume 12, 2018-2019.

  4. Matteo Dell'Amico, Leyla Bilge, K. Ashwin Kumar, Petros Efstathopoulos, and Pierre-Antoine Vervier, Symantec Research Labs. Lean On Me: Mining Internet Service Dependencies From Large-scale Dns Data. . In Proceedings of the 2017 Annual Computer Security Applications Conference (ACSAC'17), Orlando, FL, USA, December 2017.

  5. Ashwin Narayan, Vuk Markovic, Natalia Postawa, Anna King, Alejandro Morales, K. Ashwin Kumar and Petros Efstathopoulos. Efficient Routing for Cost Effective Scale-out Data Architectures. . In Proceedings of the IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'16), London, UK, September 2016. paper.

  6. Mingwei Zhang, Daniel Marino and Petros Efstathopoulos. Harbormaster: Policy Enforcement for Containers. . In Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science (CloudCom'15), Vancoucer, Canada, November 2015.

  7. Christy Vaughn, Hongtao Sun, Onyebuchi Ekenta, Caleb Miller, Medha Bhadkamkar, Petros Efstathopoulos and Erim Kardes. Soothsayer: Predicting Capacity Usage in Backup Storage Systems.. In Proceedings of the IEEE 23rd International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'15), Atlanta, USA, October 2015.

  8. Tai-Ching Li, Huy Hang, Michalis Faloutsos, and Petros Efstathopoulos. TrackAdvisor: Taking back browsing privacy from Third-Party Trackers. . In Proceedings of the Passive and Active Measurement Conference (PAM), New York, USA, March 2015.

  9. Kartik Nayak, Daniel Marino, Petros Efstathopoulos, Tudor Dumitras. Some Vulnerabilities Are Different Than Others: Studying Vulnerabilities and Attack Surfaces in the Wild. In Proceedings of the 17thInternational Symposium on research in Attacks, Intrusions and Defenses (RAID'14), Gothenburgh, Sweden, September 2014.

  10. Tudor Dumitras and Petros Efstathopoulos. Ask WINE: Are We Safer Today? (Evaluating Operating System Security through Bid Data Analysis). In Proceedings of the 5thUSENIX Workshop on Large-Scale Exploits and Emerging Threats (LEET'12), San Jose, CA, USA, April 2012. paper.

  11. Petros Efstathopoulos. File Routing Middleware for Cloud Deduplication. In Proceedings of the 2nd Internationl Workshop on Cloud Computing Platforms - CloudCP 2012, Bern, Switzerland, April 2012.

  12. Tudor Dumitras and Petros Efstathopoulos. The Provenance of WINE. In Proceedings of the 9th European Dependable Computing Conference - EDCC 2012, Sibiu, Romania, May 2012. paper.

  13. Fanglu Guo and Petros Efstathopoulos. Building a High-performance Deduplication System.. In Proceedings of the 2011 USENIX Annual Technical Conference, Portland, OR, June 2011. Best Paper Award. paper.

  14. Petros Efstathopoulos and Fanglu Guo. Rethinking Deduplication Scalability. In Proceedings of the 2nd USENIX Workshop on Hot Topics in Storage and File Systems, Boston, MA, June 2010. paper.

  15. Kevin Butler and Petros Efstathopoulos. U Can't Touch This: Block-Level Protection for Portable Storage. In Proceedings of the 2009 International Workshop on Software Support for Portable Storage, Grenoble, France, October 2009. paper.

  16. Petros Efstathopoulos and Eddie Kohler. Manageable Fine-Grained Information Flow . In Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, Glasgow, UK, April 2008. paper.

  17. Steve VanDeBogart, Petros Efstathopoulos, Maxwell Krohn, Cliff Frey, David Ziegler, Eddie Kohler, David Mazières, Frans Kaashoek, and Robert Morris. Labels and Event Processes in the Asbestos Operating System. ACM Transactions on Computer Systems 25(4), November 2007, pages 11:1-11:43. paper.

  18. Micah Brodsky, Petros Efstathopoulos, Frans Kaashoek, Eddie Kohler, Maxwell Krohn, David Mazieres, Robert Morris, Steve VanDeBogart and Alexander Yip. Toward Secure Services from Untrusted Developers. CSAIL Technical Reports, Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory. paper.

  19. Petros Efstathopoulos, Maxwell Krohn, Steve VanDeBogart, Cliff Frey, David Ziegler, Eddie Kohler, David Mazières, Frans Kaashoek, and Robert Morris. Labels and Event Processes in the Asbestos Operating System. In Proceedings of the 20th ACM Symposium on Operating Systems Principles - SOSP'05, Brighton, UK, October 2005. ACM. paper.

  20. Maxwell Krohn, Petros Efstathopoulos, Cliff Frey, Frans Kaashoek, Eddie Kohler, David Mazières, Robert Morris, Michelle Osborne, Steve VanDeBogart, and David Ziegler. Make Least Privilege a Right (Not a Privilege). In Proceedings of the 10th Workshop on Hot Topics in Operating Systems, Santa Fe, NM, June 2005. paper.


::patents

  1. System and Methods for Evaluating Security Posture of Smart Home Devices .
    Yuqiong Sun, Xueqing Wang, Susanta Nanda, and Petros Efstathopouloss.
    U.S. Patent filed in March 2019 by Symantec Corporation.

  2. Privacy Leakage Zoomability for Unstructured Data .
    Ashwin Kayyoor and Petros Efstathopoulos.
    U.S. Patent filed in December 2018 by Symantec Corporation.

  3. Generate Accurate IoT Device Fingerprints Without IoT Device .
    Yuqiong Sun, Xueqing Wang, Susanta Nanda, Yun Shen, Pierre-Antoine Vervier, and Petros Efstathopoulos.
    U.S. Patent filed in December 2018 by Symantec Corporation.

  4. Using Personalized Notifications to Improve User-Based Cyber Risk Communications .
    Johann Roturier and Petros Efstathopoulos.
    U.S. Patent filed in December 2018 by Symantec Corporation.

  5. Trust But Verify: an Offline Exection Environment to Ensure User Safety and Privacy .
    Daniel Kats, David Silva, Petros Efstathopoulos, and Daniel Marino.
    U.S. Patent filed in December 2018 by Symantec Corporation.

  6. Gopster: Synthetic Identity Profile Creation Using Learned Fuzzing .
    Daniel Kats, Petros Efstathopoulos, and Christopher Gates.
    U.S. Patent filed in November 2018 by Symantec Corporation.

  7. Real-time Detection and Quantification of Privacy Leaks from Linguistic Features .
    Ashwin Kayyoor and Petros Efstathopoulos.
    U.S. Patent filed in September 2018 by Symantec Corporation.

  8. Classification Using Projection of Graphs Into Summarized Spaces .
    Petros Efstathopoulos and Ashwin Kayyoor.
    U.S. Patent filed in September 2018 by Symantec Corporation.

  9. ε: distributed rule evaluation within a customer pool .
    Daniel Kats, Kevin Roundy, Chris Gates, Petros Efstathopoulos, and Aleatha Parker-Wood.
    U.S. Patent filed in June 2018 by Symantec Corporation.

  10. Utility Driven Graph Summarization .
    Ashwin Kayyoor and Petros Efstathopoulos.
    U.S. Patent filed in April 2018 by Symantec Corporation.

  11. Measuring Utility of a Perturbed Graph .
    Ashwin Kayyoor and Petros Efstathopoulos.
    U.S. Patent filed in September 2017 by Symantec Corporation.

  12. Forecasting security incidents for enterprise customers using a time-series analysis on outside-in and internal telemetry data .
    Yufei Han, Yun Shen, Leyla Bilge, Pierre-Antoine Vervier, Petros Efstathopou.
    U.S. Patent filed in July 2017 by Symantec Corporation.

  13. Koh: identity verification facilitator for companies and individuals .
    Daniel Kats and Petros Efstathopoulos.
    U.S. Patent filed in July 2017 by Symantec Corporation.

  14. Method to prepare accurate ground truth datasets for machine learning-based cyber threat solutions .
    Leyla Bilge and Petros Efstathopoulos.
    U.S. Patent filed in July 2017 by Symantec Corporation.

  15. Predicting non-PE code attacks to Web portals by establishing sub-resource risk/reputation metrics for third-party JavaScript .
    David Silva and Petros Efstathopoulos.
    U.S. Patent filed in July 2017 by Symantec Corporation.

  16. Telemetry-based risk estimation in the public cloud .
    Daniel Kats and Petros Efstathopoulos.
    U.S. Patent filed in July 2017 by Symantec Corporation.

  17. Assessing risk and exposure after host compromise in a datacenter or cloud .
    Petros Efstathopoulos and Daniel Kats.
    U.S. Patent filed in September 2016 by Symantec Corporation.

  18. Privacy-preserving similarity detection system that can defend against offline attacks .
    Evgenios Kornaropoulos and Petros Efstathopoulos.
    U.S. Patent filed in September 2016 by Symantec Corporation.

  19. Sharing Sensitive Enterprise Graph Data using Multi-Level Graph Summarization with Varying Data Utility and Privacy using Fidelity Knobs .
    Ashwin Kayyoor, Susanta Nanda, and Petros Efstathopoulos.
    U.S. Patent filed in July 2016 by Symantec Corporation.

  20. Virtualizing IoT devices using shadow proxy images .
    Petros Efstathopoulos.
    U.S. Patent filed in October 2015 by Symantec Corporation.

  21. Sharing Sensitive Enterprise Graph Data using Multi-Level Graph Summarization with Varying Data Utility and Privacy using Fidelity Knobs .
    Ashwin Kayyoor, Susanta Nanda, and Petros Efstathopoulos.
    U.S. Patent filed in October 2015 by Symantec Corporation.

  22. Quantitative Security Improvement System based on Crowdsourcing .
    Amit Mital, Carey Nachenberg, and Petros Efstathopoulos.
    U.S. Patent filed in February 2015 by Symantec Corporation.

  23. System and Method of Constructing Dynamic Namespaces in the Internet of Things .
    EK Lee, Anans Kashyap, and Petros Efstathopoulos.
    U.S. Patent filed in October 2015 by Symantec Corporation.

  24. Detect When Application Container is Running in Untrusted Environment .
    Brian Witten, Sanjay Sawhney, and Petros Efstathopoulos.
    U.S. Patent filed in April 2015 by Symantec Corporation.

  25. Strong, Flexible Security for Application Container Servers .
    Daniel Marino, Petros Efstathopoulos, and Mingwei Zhang.
    U.S. Patent filed in April 2015 by Symantec Corporation.

  26. Location-Aware Encryption Service for the Cloud .
    Petros Efstathopoulos.
    U.S. Patent filed in April 2015 by Symantec Corporation.

  27. A Telemetry Collection Cloud Platform aiming to Crowd-Source Security Best Practices .
    Petros Efstathopoulos.
    U.S. Patent filed in February 2015 by Symantec Corporation.

  28. Application Super-Containers: Deployment Platform Reconnaissance and Application Container Wrapping .
    Sanjay Sawhney, Petros Efstathopoulos, and Daniel Marino.
    U.S. Patent filed in November 2014 by Symantec Corporation.

  29. Providing Reverse Discovery, Data Sharing/Flow Analysis, and DLP Services by Leveraging Deduplication Metadata .
    Petros Efstathopoulos, and Sharada Sundaram.
    U.S. Patent filed in February 2013 by Symantec Corporation.

  30. Third-Party Tracker Detection Techniques For Consumer Web-Privacy and Identity Protection .
    Petros Efstathopoulos, and Tai-Ching Li.
    U.S. Patent filed in February 2013 by Symantec Corporation.

  31. Systems and Methods to Mitigate Information Disclosure .
    Kevin Roundy, Petros Efstathopoulos, and Darren Shou.
    U.S. Patent filed in January 2013 by Symantec Corporation.

  32. Global, Field-Measurable Security Metrics for Detection and Reputation Engines .
    Tudor Dumitras, and Petros Efstathopoulos.
    U.S. Patent filed in April 2013 by Symantec Corporation.

  33. Cloud Deduplication Using File Routing Middleware .
    Petros Efstathopoulos, and Fanglu Guo.
    U.S. Patent filed in October 2011 by Symantec Corporation.

  34. Verify Client Request Validity by Challenging the Clients from the Servers .
    Petros Efstathopoulos.
    U.S. Patent filed in December 2011 by Symantec Corporation.

  35. Maintaining Arbitrarily Good Restore Throughput by Making Pseudo-full Backup at the Container Level .
    Fanglu Guo, Petros Efstathopoulos, Xianbo Zhang, Sanjay Sawhney, and Weibao Wu.
    U.S. Patent filed in October 2011 by Symantec Corporation.

  36. Using Solid State Drives for High Performance Deduplication Indexing .
    Petros Efstathopoulos, and Fanglu Guo.
    U.S. Patent filed in May 2010 by Symantec Corporation.

  37. A host validation mechanism for preserving integrity of portable storage data .
    Petros Efstathopoulos, Kevin Butler, Dharmesh Shah, and Bruce Montague.
    U.S. Patent filed in January 2010 by Symantec Corporation.

  38. Progressive sampling for deduplication indexing .
    Petros Efstathopoulos, Fanglu Guo, and Dharmesh Shah.
    U.S. Patent filed in November 2009 by Symantec Corporation.

  39. Improving reference update efficiency in deduplication systems by adding an intermediate object .
    Fanglu Guo, Weibao Wu, Tzicker Chiueh, and Petros Efstathopoulos.
    U.S. Patent filed in October 2009 by Symantec Corporation.

  40. Request batching and asynchronous request execution for deduplication servers .
    Petros Efstathopoulos.
    U.S. Patent filed in September 2009 by Symantec Corporation.


::thesis, reports and misc documents

  • Petros Efstathopouls. Policy Management and Decentralized Debugging in the Asbestos Operating System. PhD thesis, University of California, Los Angeles, October 2008. pdf.

  • Petros Efstathopoulos. Practical Study of a Defense Against Low-Rate TCP-Targeted DoS Attack. Appeared at the 4th International Conference for Internet Technology and Secured Transactions, London, UK, October 2009. paper.

  • Petros Efstathopoulos, Mike Mammarella, Alex Warth. The Meta Google Maps "Hack". Web Information Management (UCLA, CS246), Fall 2005. paper.

  • Petros Efstathopoulos, Vassilis Pappas. SPAM : State Profiling and Analyzing Module - An approach to DoS attack detection. Advanced Operating Systems (UCLA, CS239), Fall 2002. report.
    A not so important extension : Active-SPAM.

  • Petros Efstathopoulos. Design and Implementation of a Memory-Based Filesystem for a Cluster of Workstations. Diploma Thesis, National Technical University of Athens, Greece 2001. pdf (in Greek).
  •  

     
    $HOME # finger pefstath this section contains projects known to the State of California to cause serious trouble to grad students mostly silly contact info