| [USENIX Sec'26] |
When AIOps Become "AI Oops": Subverting LLM-driven IT Operations via
Telemetry Manipulation,
|
|
Dario Pasquini, Evgenios M. Kornaropoulos, Giuseppe Ateniese, Omer Akgul, Athanasios Theocharis, Petros Efstathopoulos, 35th USENIX Security
Symposium (USENIX Sec’26) |
| [ACM CCS'25] |
Exposing Privacy Risks in Anonymizing Clinical Data:
Combinatorial Refinement Attacks on k-Anonymity Without Auxiliary Information,
|
|
Somiya Chhillar, Mary K. Righi, Rebecca E. Sutter, Evgenios M. Kornaropoulos, 32nd ACM Conference on Computer and
Communications Security (CCS’25) |
| [USENIX Sec'25] |
LLMmap: Fingerprinting For Large Language Models,
|
|
Dario Pasquini, Evgenios M. Kornaropoulos, Giuseppe Ateniese, 34th USENIX Security Symposium (USENIX Sec’25) |
| [ACM CCS'24] |
AITIA: Efficient Secure Computation of Bivariate Causal Discovery,
|
|
Truong Son Nguyen, Lun Wang, Evgenios M. Kornaropoulos, Ni Trieu, 31st ACM Conference on Computer and Communications Security (CCS’24) |
| [IEEE S&P'24] |
Breach Extraction Attacks: Exposing and Addressing the Leakage
in Second Generation Compromised Credential Checking Services, |
|
Dario Pasquini, Danilo Francati, Giuseppe Ateniese, Evgenios M. Kornaropoulos, 45th IEEE Symposium on Security and
Privacy (Oakland'24) |
|
Finalist for the “Best
Cryptographic Attack” category at Pwnie Awards 2024
|
| [VLDB'24] |
Algorithmic Complexity Attacks on Dynamic Learned
Indexes, |
|
Rui Yang, Evgenios M. Kornaropoulos, Yue Cheng, 50th International Conference on Very Large Databases (VLDB'24) |
| [ACM SIGMOD'22] |
The Price of Tailoring the Index to Your Data: Poisoning Attacks on Learned Index Structures, |
|
Evgenios M. Kornaropoulos, Silei Ren, and Roberto Tamassia, 48th ACM International Conference on Management of Data (SIGMOD'22) |
|
Additional Material: Slides |
[ACM CCS'22] |
Leakage Inversion: Towards Quantifying Privacy in Searchable Encryption, |
|
Evgenios M. Kornaropoulos, Nathaniel Moyer, Charalampos Papamanthou, Alexandros Psomas , 29th ACM Conference on Computer and Communications Security (CCS’22) |
| [NeurIPS'21] |
Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams, |
|
Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, and David Wagner, 35th Conference on Neural Information Processing Systems (NeurIPS'21) |
|
Additional Material: Video |
| [IEEE S&P'21] |
Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks, |
|
Evgenios M. Kornaropoulos, Charalampos Papamanthou, and Roberto Tamassia, 42th IEEE Symposium on Security and Privacy (Oakland'21) |
|
Additional Material: Video, Slides
|
| [IEEE S&P'20] |
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution, |
|
Evgenios M. Kornaropoulos, Charalampos Papamanthou, and Roberto Tamassia,
41st IEEE Symposium on Security and Privacy (Oakland'20) |
|
Additional Material: Video, Closed-Form for High-Order Jackknife Estimators, Slides
|
| [IEEE S&P'19] |
Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage, |
|
Evgenios M. Kornaropoulos, Charalampos Papamanthou, and Roberto Tamassia, 40th IEEE Symposium on Security and Privacy (Oakland'19) |
|
Additional Material: Video, Slides
|
[IEEE EuroS&P'19] |
The Case of Adversarial Inputs for
Secure Similarity Approximation Protocols, |
|
Evgenios M. Kornaropoulos and Petros Efstathopoulos,
4th IEEE European Symposium on Security and Privacy (IEEE EuroS&P'19) |
| [IEEE EuroS&P'17] |
Auditable Data Structures, |
|
Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, and Roberto Tamassia
2nd IEEE European Symposium on Security and Privacy (IEEE EuroS&P'17) |
| [ESORICS'16] |
More Practical and Secure History-Independent Hash Tables, |
|
Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, and Roberto Tamassia, 21st European Symposium on Research in Computer Security (ESORICS'16) |
| [COCOA'15] |
Optimizing Static and Adaptive Probing Schedules for Rapid Event Detection, |
|
Ahmad Mahmoody, Evgenios M. Kornaropoulos, and Eli Upfal, 9th Conference on Combinatorial Optimization and Applications (COCOA'15) |
| [ACM WSDM'14] |
Fast Approximation of Betweenness Centrality Through Sampling, |
|
Matteo Riondato and Evgenios M. Kornaropoulos, 7th International ACM Conference on Web Search and Web Data Mining (WSDM'14) |
| [GD'12] |
Weak Dominance Drawings for Directed Acyclic Graphs, |
|
Evgenios M. Kornaropoulos and Ioannis G. Tollis, 20th International Symposium on Graph Drawing (GD'12) |
| [GD'12] |
DAGView: An Approach for Visualizing Large Graphs, |
|
Evgenios M. Kornaropoulos and Ioannis G. Tollis, 20th International Symposium on Graph Drawing (GD'12) |
| [GD'11] |
Overloaded Orthogonal Drawings, |
|
Evgenios M. Kornaropoulos and Ioannis G. Tollis, 19th International Symposium on Graph Drawing (GD'11) |
| [IEEE SSP'09] |
A Novel kNN Classifier for Acoustic Vehicle Classification based on Alpha-Stable Statistical Modeling, |
|
Evgenios M. Kornaropoulos and Panagiotis Tsakalides, 15th Workshop on Statistical Signal Processing (SSP ’09) |