
Marinos Tsantekidis- Doctor of Philosophy
- Project Manager at AEGIS IT Research
Marinos Tsantekidis
- Doctor of Philosophy
- Project Manager at AEGIS IT Research
About
17
Publications
1,009
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
67
Citations
Introduction
I am a project manager/software engineer at AEGIS IT RESEARCH. I hold a Ph.D. from the Institute of Computer and Network Engineering at TU Braunschweig - Germany, where I worked under the supervision of Prof. Vassilis Prevelakis. I received my Master of Science degree in Digital Systems Security from the University of Piraeus, Greece in 2015 and my Bachelor of Science degree in Computer Science from the Technological Educational Institute of Thessaloniki, Greece in 2011.
Current institution
AEGIS IT Research
Current position
- Project Manager
Publications
Publications (17)
As digital technologies become more pervasive in society and the economy, cybersecurity incidents become more frequent and impactful. According to the NIS and NIS2 Directives, EU Member States and their Operators of Essential Services must establish a minimum baseline set of cybersecurity capabilities and engage in cross-border coordination and coo...
It is often useful for a code component (e.g., a library) to be able to maintain information that is hidden from the rest of the program (e.g., private keys used for signing, or usage counters used for behavioral monitoring of the program). In this paper, we present an extension to a previously developed mechanism for controlling access to librarie...
Recently, significant developments were introduced within the vehicular domain, making the modern vehicle a network of a multitude of embedded systems communicating with each other, while adhering to safety-critical and secure systems specifications. Many technologies have been integrated within modern vehicles to give them the capability to intera...
The ability to analyze software systems without access to the source code, offers many advantages including the detection of vulnerabilities so that they may be fixed before an adversary can exploit them in a zero day attack. This type of analysis also has an important role in education as it allows students to use their imagination and creativity...
The ability to monitor when user code invokes a library function offers numerous advantages. For example, during black-box testing of code, high-level control-flow integrity (CFI) checking, run-time access-control policy enforcement and so on. However, for this technique to be useful it must be efficient and able to function even when the target ap...
Modern vehicles are increasingly equipped with highly automated control systems both for driving and for passenger comfort. An integral part of these systems are the communication channels that allow the on-board systems to interact with passenger devices (e.g. tablets), ITS systems (e.g. roadside units), and other vehicles. These advances have sig...
Our system allows access control policies to be implemented at the library call level. Calls to libraries are monitored and their arguments examined to ensure that they comply with the security policy associated with the running program. Wrappers for libraries are automatically created, so that calls to external functions in the library are vectore...
We propose a system that allows policy to be implemented at the library call level. Under our scheme, calls to libraries are monitored and their arguments examined to ensure that they comply with the security policy associated with the running program. Our system automatically creates wrappers for libraries so that calls to external functions in th...