POSIX abstractions in modern operating systems: The old, the new, and the missing V Atlidakis, J Andrus, R Geambasu, D Mitropoulos, J Nieh Proceedings of the Eleventh European Conference on Computer Systems, 1-17, 2016 | 42 | 2016 |
SDriver: Location-specific signatures prevent SQL injection attacks D Mitropoulos, D Spinellis computers & security 28 (3-4), 121-129, 2009 | 38 | 2009 |
The bug catalog of the maven ecosystem D Mitropoulos, V Karakoidas, P Louridas, G Gousios, D Spinellis Proceedings of the 11th Working Conference on Mining Software Repositories …, 2014 | 34 | 2014 |
Defending against web application attacks: approaches, challenges and implications D Mitropoulos, P Louridas, M Polychronakis, AD Keromytis IEEE Transactions on Dependable and Secure Computing 16 (2), 188-203, 2017 | 32 | 2017 |
VulinOSS: a dataset of security vulnerabilities in open-source systems A Gkortzis, D Mitropoulos, D Spinellis Proceedings of the 15th International Conference on Mining Software …, 2018 | 22 | 2018 |
Charting the API minefield using software telemetry data M Kechagia, D Mitropoulos, D Spinellis Empirical Software Engineering 20 (6), 1785-1830, 2015 | 20 | 2015 |
Dismal code: Studying the evolution of security bugs D Mitropoulos, V Karakoidas, P Louridas, G Gousios, D Spinellis {LASER} 2013 ({LASER} 2013), 37-48, 2013 | 19 | 2013 |
How to train your browser: Preventing XSS attacks using contextual script fingerprints D Mitropoulos, K Stroggylos, D Spinellis, AD Keromytis ACM Transactions on Privacy and Security (TOPS) 19 (1), 1-31, 2016 | 17 | 2016 |
Measuring the occurrence of security-related bugs through software evolution D Mitropoulos, G Gousios, D Spinellis 2012 16th Panhellenic Conference on Informatics, 117-122, 2012 | 17 | 2012 |
Countering code injection attacks: a unified approach D Mitropoulos, V Karakoidas, P Louridas, D Spinellis Information Management & Computer Security, 2011 | 15 | 2011 |
Fortifying Applications Against Xpath Injection Attacks. D Mitropoulos, V Karakoidas, D Spinellis MCIS 2009, 4th, 2009 | 15 | 2009 |
A type-safe embedding of SQL into Java using the extensible compiler framework J% V Karakoidas, D Mitropoulos, P Louridas, D Spinellis Computer Languages, Systems & Structures 41, 1-20, 2015 | 13 | 2015 |
Fatal injection: a survey of modern code injection attack countermeasures D Mitropoulos, D Spinellis PeerJ Computer Science 3, e136, 2017 | 9 | 2017 |
Blogs M Kay, D Mitropoulos, W Richter, L Oehlberg, L Rosen XRDS: Crossroads, The ACM Magazine for Students 19 (1), 11-13, 2012 | 9 | 2012 |
Generating the blueprints of the Java ecosystem V Karakoidas, D Mitropoulos, P Louridas, G Gousios, D Spinellis 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 510-513, 2015 | 7 | 2015 |
Countering SQL injection attacks with a database driver D Mitropoulos, D Spinellis Current trends in informatics: 11th panhellenic conference on informatics …, 2007 | 6 | 2007 |
Time present and time past: analyzing the evolution of JavaScript code in the wild D Mitropoulos, P Louridas, V Salis, D Spinellis 2019 IEEE/ACM 16th International Conference on Mining Software Repositories …, 2019 | 5 | 2019 |
Cyberdiversity: Measures and initial results K Kravvaritis, D Mitropoulos, D Spinellis 2010 14th Panhellenic Conference on Informatics, 135-140, 2010 | 4 | 2010 |
Securing e-voting against MITM attacks D Mitropoulos, D Spinellis 13th Panhellenic Conference on Informatics, Corfu Island, 2009 | 4 | 2009 |
Practical fault detection in puppet programs T Sotiropoulos, D Mitropoulos, D Spinellis Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 2 | 2020 |