Apostolis Zarras


I am an assistant professor at the Delft University of Technology. Previously, I was an assistant professor at Maastricht University and, before that, a postdoctoral researcher at the Technical University of Munich. I received my PhD degree in IT Security from the Ruhr-University Bochum. I also hold a M.Sc. and B.Sc. in Computer Science from the University of Crete. My research interests include systems, network, and web security. My work focuses on developing new security paradigms, architectures, and software for secure and trustworthy ICT and IoT systems, as well as investigating malicious activities such as the ones that take place on the dark web and its underground markets.

Contact Information

Visiting Address:
Van Mourik Broekmanweg 6
2628 XE Delft, The Netherlands

Postal Address:
Postbox 5031
2600 GA Delft, The Netherlands

  ln.tfledut (ta) sarraz.a

     

Projects



HEIR: A Secure Healthcare Environment for Informatics Resilience

HEIR will facilitate vulnerability assessment, status monitoring and real time threat hunting based on trustworthiness logic, comprising forensics services and a SIEM module providing intelligent realtime security, privacy and data protection warnings to all stakeholders in the healthcare ecosystem.

PREVISION: Prediction and Visual Intelligence for Security Information

PREVISION will provide law enforcement agencies with advanced, almost-real-time, analytical support for multiple Big Data streams (coming from various data sources). The project will allow for building dynamic and self-learning knowledge graphs that will help investigators become more aware in these fields and better address hybrid security threats, i.e. threats that combine physical and cyber attacks.

Teaching

Current Academic Year

Past Academic Years

Service

Program Commitee Member

  • International Conference on Security and Privacy for Communication Networks (SecureComm): 2021
  • International Conference on Emerging Security Information, Systems and Technologies (SECURWARE): 2021
  • International Conference on Internet Monitoring and Protection (ICIMP): 2018, 2019, 2020, 2021
  • Software Engineering and Advanced Applications (SEAA): 2018, 2019, 2020, 2021
  • International Workshop on Information & Operational Technology Security Systems (IOSec): 2019
  • European Workshop on System Security (EuroSec): 2013

Journal Reviewer

  • ACM Transactions on Privacy and Security (TOPS)
  • IEEE Transactions on Information Forensics & Security (T-IFS)
  • Computers & Security
  • Neural Computing and Applications (NCAA)
  • ACM Transactions on Intelligent Systems and Technology (TIST)
  • IET Information Security (IET-IFS)
  • Frontiers in Big Data

Publications

  1. Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic
    Mohammad Reza Norouzian, Peng Xu, Claudia Eckert, and Apostolis Zarras
    Proceedings of the Information Security Conference (ISC), 2021
  2. Falcon: Malware Detection and Categorization with Network Traffic Images
    Peng Xu, Claudia Eckert, and Apostolis Zarras
    Proceedings of the International Conference on Artificial Neural Networks (ICANN), 2021
  3. HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs
    Peng Xu, Youyi Zhang, Claudia Eckert, and Apostolis Zarras
    Proceedings of the International Conference on Artificial Neural Networks (ICANN), 2021
  4. Detecting and Categorizing Android Malware with Graph Neural Networks
    Peng Xu, Claudia Eckert, and Apostolis Zarras
    Proceedings of the ACM/SIGAPP Symposium On Applied Computing (SAC), 2021
  5. MANIS: Evading Malware Detection System on Graph Structure
    Peng Xu, Bojan Kolosnjaji, Claudia Eckert, and Apostolis Zarras
    Proceedings of the ACM/SIGAPP Symposium On Applied Computing (SAC), 2020
  6. Can Today's Machine Learning Pass Image-Based Turing Tests?
    Apostolis Zarras, Ilias Gerostathopoulos, and Daniel Méndez Fernández
    Proceedings of the Information Security Conference (ISC), 2019
  7. Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection
    Sergej Proskurin, Tamas Lengyel, Marius Momeu, Claudia Eckert, and Apostolis Zarras
    Proceedings of the ACM Annual Computer Security Applications Conference (ACSAC), 2018
    Outstanding Paper Award
  8. Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection
    Sergej Proskurin, Julian Kirsch, and Apostolis Zarras
    Proceedings of the International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), 2018
  9. Smashing the Stack Protector for Fun and Profit
    Bruno Bierbaumer, Julian Kirsch, Thomas Kittel, Aurélien Francillon, and Apostolis Zarras
    Proceedings of the International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), 2018
  10. Learning on a Budget for User Authentication on Mobile Devices
    Bojan Kolosnjaji, Antonia Hüfner, Claudia Eckert, and Apostolis Zarras
    Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2018
  11. Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks
    Apostolis Zarras and Federico Maggi
    Proceedings of the Annual Conference on Privacy, Security and Trust (PST), 2017
  12. Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage
    George Webster, Bojan Kolosnjaji, Christian von Pentz, Julian Kirsch, Zachary Hanif, Apostolis Zarras, and Claudia Eckert
    Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 2017
  13. Towards Automated Classification of Firmware Images and Identification of Embedded Devices
    Andrei Costin, Apostolis Zarras, and Aurélien Francillon
    Proceedings of the International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), 2017
  14. Combating Control Flow Linearization
    Julian Kirsch, Clemens Jonischkeit, Thomas Kittel, Apostolis Zarras, and Claudia Eckert
    Proceedings of the International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), 2017
  15. Empowering Convolutional Networks for Malware Classification and Analysis
    Bojan Kolosnjaji, Ghadir Eraisha, George Webster, Apostolis Zarras, and Claudia Eckert
    Proceedings of the International Joint Conference on Neural Networks (IJCNN), 2017
  16. Deep Learning for Classification of Malware System Call Sequences
    Bojan Kolosnjaji, Apostolis Zarras, George Webster, and Claudia Eckert
    Proceedings of the Australasian Joint Conference on Artificial Intelligence (AI), 2016
  17. Leveraging Internet Services to Evade Censorship
    Apostolis Zarras
    Proceedings of the Information Security Conference (ISC), 2016
  18. SKALD: A Scalable Architecture for Feature Extraction, Multi-User Analysis, and Real-Time Information Sharing
    George Webster, Zachary Hanif, Andre Ludwig, Tamas Lengyel, Apostolis Zarras, and Claudia Eckert
    Proceedings of the Information Security Conference (ISC), 2016
  19. Adaptive Semantics-Aware Malware Classification
    Bojan Kolosnjaji, Apostolis Zarras, Tamas Lengyel, George Webster, and Claudia Eckert
    Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 2016
  20. Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
    Andrei Costin, Apostolis Zarras, and Aurélien Francillon
    Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS), 2016
  21. Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
    Apostolis Zarras, Katharina Kohls, Markus Dürmuth, and Christina Pöpper
    Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2016
    Outstanding Paper Award
  22. Revealing the Relationship Network Behind Link Spam
    Apostolis Zarras, Antonis Papadogiannakis, Sotiris Ioannidis, and Thorsten Holz
    Proceedings of the Annual Conference on Privacy, Security and Trust (PST), 2015
  23. The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements
    Apostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna
    Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC), 2014
  24. The Art of False Alarms in the Game of Deception: Leveraging Fake Honeypots for Enhanced Security
    Apostolis Zarras
    Proceedings of the IEEE International Carnahan Conference on Security Technology (ICCST), 2014
  25. Automated Generation of Models for Fast and Precise Detection of HTTP-Based Malware
    Apostolis Zarras, Antonis Papadogiannakis, Robert Gawlik, and Thorsten Holz
    Proceedings of the Annual Conference on Privacy, Security and Trust (PST), 2014
  26. k-subscription: Privacy-preserving Microblogging Browsing through Obfuscation
    Panagiotis Papadopoulos, Antonis Papadogiannakis, Michalis Polychronakis, Apostolis Zarras, Thorsten Holz, and Evangelos P. Markatos
    Proceedings of the ACM Annual Computer Security Applications Conference (ACSAC), 2013
  27. B@bel: Leveraging Email Delivery for Spam Mitigation
    Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna
    Proceedings of the USENIX Security Symposium, 2012
  28. Understanding Fraudulent Activities in Online Ad Exchanges
    Brett Stone-Gross, Ryan Stevens, Apostolis Zarras, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna
    Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC), 2011