Georgios Portokalidis (gportoka)

Georgios Portokalidis

Associate Professor

Gateway Center S329
(201) 216-8249

Education

  • PhD (2010) Vrije Universiteit Amsterdam (Computer Science)
  • MS (2004) Leiden University (Computer Science)
  • BS (2002) University of Crete (Computer Science)

Professional Service

  • NSF Panelist
  • ACM Conference on Computer and Communications Security (CCS) Program committee member
  • 2nd International Workshop on Security in Mobile Technologies (SecMT 2021) Program committee member
  • ACM ASIA Conference on Computer and Communications Security (ASIACCS) Program committee member
  • ACM Conference on Computer and Communications Security Poster session program committee member
  • ACM Conference on Computer and Communications Security (CCS) Program Committee Member
  • International Symposium on Research in Attacks, Intrusions and Defenses Program committee member
  • Conference on Detection of Intrusions and Malware & Vulnerability Assessment Program Committee Member

Professional Societies

  • USENIX – The USENIX Association Member
  • ACM – Association for Computing Machinery Member
  • IEEE – Institute of Electrical and Electronics Engineers Member

Selected Publications

Conference Proceeding

  1. Zhang, Y.; Zhang, Y.; Portokalidis, G.; Xu, J. (2022). Towards Understanding the Performance of Rust (Short paper). Proceedings of the International Conference on Automated Software Engineering (ASE) -- Industry Showcase.
  2. Zhang, Y.; Pang, C.; Portokalidis, G.; Triandopoulos, N.; Xu, J. (2022). Debloating Address Sanitizer. Proceedings of the USENIX Security Symposium.
  3. Yu, R.; Del Nin, F.; Zhang, Y.; Huang, S.; Kaliyar, P.; Zatko, S.; Conti, M.; Portokalidis, G.; Xu, J. (2022). An In-Depth Analysis on Adoption of Attack Mitigations in Embedded Devices (Abstract). The Learning from Authoritative Security Experiment Results (LASER) workshop.
  4. Yu, R.; Del Nin, F.; Zhang, Y.; Huang, S.; Kaliyar, P.; Zatko, S.; Conti, M.; Portokalidis, G.; Xu, J. (2022). Building Embedded Systems Like It's 1996. Proceedings of the Network and Distributed System Security Symposium (NDSS).
  5. Liu, Y.; Pang, C.; Dietsch, D.; Koskinen, E.; Le, T.; Portokalidis, G.; Xu, J. (2021). Proving LTL of Bitvector Programs and Decompiled Binaries. The 19th Asian Symposium on Programming Languages and Systems (APLAS 2021). The 19th Asian Symposium on Programming Languages and Systems (APLAS 2021).
  6. Pang, C.; Yu, R.; Xu, D.; Koskinen, E.; Portokalidis, G.; Xu, J. (2021). Towards Optimal Use of Exception Handling Information for Function Detection. Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
  7. Pang, C.; Yu, R.; Chen, Y.; Koskinen, E.; Portokalidis, G.; Mao, B.; Xu, J. (2021). SoK: All You Ever Wanted to Know About Binary Disassembly But Were Afraid to Ask. Hoboken: The 41st IEEE Symposium on Security and Privacy (IEEE S&P 2021).
  8. Göktas, E.; Razavi, K.; Portokalidis, G.; Bos, H.; Giuffrida, C. (2020). Speculative Probing: Hacking Blind in the Spectre Era. Proceedings of the ACM Conference on Computer and Communications Security (pp. 1871-1885).
  9. Agadakos, I.; Jin, D.; Williams-King, D.; Kemerlis, V. P.; Portokalidis, G. (2019). Nibbler: Debloating binary shared libraries. ACM International Conference Proceeding Series (pp. 70-83).
  10. Goktas, E.; Kollenda, B.; Koppe, P.; Bosman, E.; Portokalidis, G.; Holz, T.; Bos, H.; Giuffrida, C. (2018). Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018 (pp. 227-242).
  11. Agadakos, I.; Polakis, J.; Portokalidis, G. (2017). Techu: Open and privacy-preserving crowdsourced GPS for the masses. MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services (pp. 475-487).
  12. Agadakos, I.; Hallgren, P.; Damopoulos, D.; Sabelfeld, A.; Portokalidis, G. (2016). Location-enhanced authentication using the IoT because you cannot be in two places at once. ACM International Conference Proceeding Series (vol. 5-9-December-2016, pp. 251-264).
  13. Athanasopoulos, E.; Kemerlis, V. P.; Portokalidis, G.; Keromytis, A. D. (2016). NaCLDroid: Native code isolation for android applications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (vol. 9878 LNCS, pp. 422-439).
  14. Haller, I.; Göktąs, E.; Athanasopoulos, E.; Portokalidis, G.; Bos, H. (2015). ShrinkWrap: VTable protection without loose ends. ACM International Conference Proceeding Series (vol. 7-11-December-2015, pp. 341-350).
  15. Vogt, D.; Miraglia, A.; Portokalidis, G.; Bos, H.; Tanenbaum, A.; Giuffrida, C. (2015). Speculative memory checkpointing. Middleware 2015 - Proceedings of the 16th Annual Middleware Conference (pp. 197-209).
  16. Ladakis, E.; Vasiliadis, G.; Polychronakis, M.; Ioannidis, S.; Portokalidis, G. (2015). GPU-disasm: A GPU-based x86 disassembler. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (vol. 9290, pp. 472-489).
  17. Yang, Q.; Damopoulos, D.; Portokalidis, G. (2015). WYSISNWIV: What you scan is not what I visit. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (vol. 9404, pp. 317-338).
  18. Chakravarty, S.; Barbera, M. V.; Portokalidis, G.; Polychronakis, M.; Keromytis, A. D. (2014). On the effectiveness of traffic analysis against anonymity networks using flow records. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (vol. 8362 LNCS, pp. 247-257).
  19. Göktaş, E.; Athanasopoulos, E.; Bos, H.; Portokalidis, G. (2014). Out of control: Overcoming control-flow integrity. Proceedings - IEEE Symposium on Security and Privacy (pp. 575-589).
  20. Damopoulos, D.; Kambourakis, G.; Portokalidis, G. (2014). The best of both worlds. A framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones. Proceedings of the 7th European Workshop on System Security, EuroSec 2014.
  21. Kontaxis, G.; Athanasopoulos, E.; Portokalidis, G.; Keromytis, A. D. (2013). SAuth: Protecting user accounts from password database leaks. Proceedings of the ACM Conference on Computer and Communications Security (pp. 187-198).
  22. Jee, K.; Kemerlis, V. P.; Keromytis, A. D.; Portokalidis, G. (2013). ShadowReplica: Efficient parallelization of dynamic data flow tracking. Proceedings of the ACM Conference on Computer and Communications Security (pp. 235-246).
  23. Zavou, A.; Pappas, V.; Kemerlis, V. P.; Polychronakis, M.; Portokalidis, G.; Keromytis, A. D. (2013). Cloudopsy: An autopsy of data flows in the cloud. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (vol. 8030 LNCS, pp. 366-375).

Editorial, Journal

  1. Athanasopoulos, E.; Portokalidis, G.; Lindorfer, M. (2020). Guest editorial: Security on mobile and IoT devices. IET Information Security (4 ed., vol. 14, pp. 367).
  2. Karopoulos, G.; Portokalidis, G.; Domingo-Ferrer, J.; Lin, Y. D.; Geneiatakis, D.; Kambourakis, G. (2015). Security and privacy in unified communications: Challenges and solutions. Computer Communications (vol. 68, pp. 1-3).

Journal Article

  1. Agadakos, I.; Demarinis, N.; Jin, D.; Williams-King, K.; Alfajardo, J.; Shteinfeld, B.; Williams-King, D.; Kemerlis, V. P.; Portokalidis, G. (2020). Large-Scale Debloating of Binary Shared Libraries. Digital Threats: Research and Practice (DTRAP) (4 ed., vol. 1, pp. 1--28).
    https://dl.acm.org/doi/pdf/10.1145/3414997.
  2. Chakravarty, S.; Portokalidis, G.; Polychronakis, M.; Keromytis, A. D. (2015). Detection and analysis of eavesdropping in anonymous communication networks. International Journal of Information Security (3 ed., vol. 14, pp. 205-220).