Publications
Journal Papers
Thwarting Code-Reuse and Side-Channel Attacks in Embedded Systems
Rodothea-Myrsini Tsoupidi, Elena Tsoubitsyna, and Panagiotis Papadimitratos, Computers & Security 133 (2023). [Code, arXiv, ScienceDirect]Constraint-based Diversification of JOP Gadgets
Rodothea Myrsini Tsoupidi, Roberto Castañeda Lozano, and Benoit Baudry, Journal of Artificial Intelligence Research 72 (2021). [Code, arXiv]
Conference Papers
Securing Optimized Code Against Power Side Channels
Rodothea Myrsini Tsoupidi, Roberto Castañeda Lozano, Elena Troubitsyna, and Panagiotis Papadimitratos, 2023 IEEE Computer Security Foundations Symposium, CSF ’23. [Code]Vivienne: Relational Verification of Cryptographic Implementations in WebAssembly
Rodothea Myrsini Tsoupidi, Musard Balliu, and Benoit Baudry, 2021 IEEE Cybersecurity Development (SecDev), SecDev ’21. [Code]Constraint-Based Software Diversification for Efficient Mitigation of Code-Reuse Attacks
Rodothea Myrsini Tsoupidi, Roberto Castañeda Lozano, and Benoit Baudry, Twenty-Sixth International Conference on Principles and Practice of Constraint Programming, CP ’20, Best Paper Award (Applications Track). [Code, Video]TarMiner: automatic extraction of miRNA targets from literature
Rodothea-Myrsini Tsoupidi, Ilias Kanellos, Thanasis Vergoulis, Ioannis S. Vlachos, Artemis G. Hatzigeorgiou, and Theodore Dalamagas, Twenty-Seventh International Conference on Scientific and Statistical Database Management, SSDBM ’15
Theses
Generating Optimized and Secure Binary Code
Rodothea Myrsini Tsoupidi, KTH Royal Institute of Technology, Sweden, Ph.D. thesis. [DiVa]Two-phase WCET analysis for cache-based symmetric multiprocessor systems
Rodothea Myrsini Tsoupidi, KTH Royal Institute of Technology, Sweden, Master thesis. [Code]