publications
Peer-reviewed Conference and Workshop Publications
2026
- ICSE’26PyXray: Practical Cross-Language Call Graph Construction through Object Layout AnalysisIn Proceedings of the 48th International Conference on Software Engineering, April 2026
2025
2024
- ESEM’24Broken Agreement: The Evolution of Solidity Error HandlingIn Proceedings of the 18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 257–268, October 2024
- ECOC’24Field Demonstration of a Fully Managed, L1 Encrypted 3-node Network with Hybrid Relayed-QKD and Centralized Symmetric Classical Key Management.In Proceedings of the 50th European Conference on Optical Communications, September 2024
- ICSE’24Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?In Proceedings of the IEEE/ACM 45th Internationa Conference on Software Engineering, pp. 705–717, IEEE, May 2024
2023
- CAMAD’23Providing Security Assurance & Hardening for Open Source Software / Hardware: The SecOPERA approachIn Proceedings of the IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, pp. 80-86, November 2023
- SBC’23Smart Contract and DeFi Security: Insights from Tool Evaluations and Practitioner SurveysIn The Science of Blockchain Conference 2023, September 2023
2022
2021
2020
2019
2018
2016
2015
- MSR’15Generating the Blueprints of the Java EcosystemIn Proceedings of the 2015 International Working Conference on Mining Software Repositories: Data Showcase Track, pp. 510–513, IEEE, 2015
2014
- BADGERS’14The Vulnerability Dataset of a Large Software EcosystemIn Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 69–74, IEEE, September 2014
- PCI’14Securing Legacy Code with the TRACER PlatformIn Proceedings of 18th Panhellenic Conference on Informatics, pp. 1–6, ACM, 2014
- TRUST’14TRACER: A Platform for Securing Legacy CodeIn Proceedings of 7th International Conference on Trust & Trustworthy Computing: Poster Presentation Track, pp. 218–219, Springer, June 2014
- MSR’14The Bug Catalog of the Maven EcosystemIn Proceedings of the 2014 International Working Conference on Mining Software Repositories: Data Showcase Track, pp. 372–365, ACM, June 2014
2013
- OASIcs’13Improving the Quality of APIs through the Analysis of Software Crash ReportsIn 2013 Imperial College Computing Student Workshop, pp. 57–64, Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, 2013
- LASER’13Dismal Code: Studying the Evolution of Security BugsIn Proceedings of the 2013 Learning from Authoritative Security Experiment Results Workshop, pp. 37–48, Usenix Association, October 2013
2012
- PCI’12Measuring the Occurrence of Security-Related Bugs through Software EvolutionIn Proceedings of 16th Panhellenic Conference on Informatics, pp. 117–122, IEEE, 2012
2010
- PCI’10Cyberdiversity: Measures and Initial ResultsIn Proceedings of 14th Panhellenic Conference on Informatics, pp. 135–140, IEEE, September 2010
2009
- MCIS’09Fortifying Applications against XPath Injection AttacksIn Proceedings of the 4th Mediterranean Conference on Information Systems, September 2009
- PCI’09Securing E-voting against MITM AttacksIn Proceedings of the 13th Pan-Hellenic Conference on Informatics, September 2009
2007
- PCI’07Countering SQL Injection Attacks with a Database DriverIn Proceedings of the 11th Pan-Hellenic Conference on Informatics, pp. 105–115, New Technologies Publications, May 2007
Peer-reviewed Journal Articles
2020
2019
- TDSC’19Defending Against Web Application Attacks: Approaches, Challenges and ImplicationsIEEE Transactions on Dependable and Secure Computing, Vol. 16, No. 2, pp. 188–203, March 2019
2018
- IEEE Annals’18Aspects of the History of Computing in Modern GreeceIEEE Annals of the History of Computing, Vol. 40, No. 1, pp. 47–60, May 2018
2017
- PeerJ’17Fatal Injection: A Survey of Modern Code Injection Attack CountermeasuresPeerJ Computer Science, 3:e136, November 2017
2016
- TOPS’16How to Train your Browser: Preventing XSS Attacks Using Contextual Script FingerprintsACM Transactions on Privacy and Security, Vol. 19, No. 1, pp. 1–31, July 2016
2015
- CoLa’15A Type-Safe Embedding of SQL into Java Using the Extensible Compiler Framework J%Computer Languages, Systems & Structures, Vol. 41, pp. 1–20, April 2015
- EMSE’15Charting the API Minefield Using Software Telemetry DataEmpirical Software Engineering, Vol. 20, No. 6, pp. 1785–1830, December 2015
2011
- IMCS’11Countering Code Injection Attacks: A Unified ApproachInformation Management and Computer Security, Vol. 19, No. 3, pp. 177–194, 2011
2009
- CoSe’09SDriver: Location-Specific Signatures Prevent SQL Injection AttacksComputers & Security, Vol. 28, No. 3–4, pp. 121–129, May 2009
Book Chapters
2021
- ISSC’21Secure Software TechnologiesIn Information and System Security in the Cyberspace, NewTech Pub, 2021
2016
- ECST’16Securing SoftwareIn Encyclopedia of Computer Science and Technology, Second Edition, CRC Press, Taylor and Francis Group, 2016
Magazine Articles
2024
- CONNECT’24GRNET’s Platform for Running Digital Public ServicesCONNECT, The Magazine from the GÉANT, June 2024
- ;login’24AppStack: An Agile Platform for Running Digital Public ServicesUSENIX ;login: Magazine, March 2024
2017
- XRDS’17How 1 Million App Calls Can Tell You a Bit About MalwareXRDS: Crossroads, The ACM Magazine for Students, Vol. 24, No. 1, pp. 17–19, 2017
2016
- ;login’16
2015
- XRDS’15On the Evolution of Security BugsXRDS: Crossroads, The ACM Magazine for Students, Vol. 21, No. 3, pp. 18–19, 2015
2013
- XRDS’13Security Bugs in Large Software EcosystemsXRDS: Crossroads, The ACM Magazine for Students, Vol. 20, No. 2, pp. 15–16, 2013
- XRDS’13Data Security in the Cloud EnvironmentXRDS: Crossroads, The ACM Magazine for Students, Vol. 19, No. 3, pp. 11–11, 2013
2012
- XRDS’12Fatal Injection: the Server’s SideXRDS: Crossroads, The ACM Magazine for Students, Vol. 19, No. 2, pp. 12–14, 2012
- XRDS’12How Secure is Your Software?XRDS: Crossroads, The ACM Magazine for Students, Vol. 19, No. 1, pp. 11–13, 2012
- XRDS’12Better Safe than Sorry: Backup your BackupsXRDS: Crossroads, The ACM Magazine for Students, Vol. 18, No. 2, pp. 6–6, 2012