Google Scholar: https://scholar.google.com/citations?user=rlhxkecaaaaj&hl=en

Similar documents
ELIAS ATHANASOPOULOS. Education. Employment. Teaching. Computer Science Department University of Cyprus

Curriculum vitae. Panagiotis Papadopoulos. September 4, 2017

CURRICULUM VITAE. Qena, Egypt January 14 th 1976 Egypt Male Married Arabic English

Dr Efstratios BATZELIS

08:30-08:45 Welcome By Ioannis Demetriou (University of Athens) Head of the Department And. A: Microeconomics

PROMOTING THE COUNCIL OF EUROPE ONE in FIVE CAMPAIGN TO STOP SEXUAL VIOLENCE AGAINST CHILDREN EVENTS IN GREECE

Graduate Civil Engineer of Democritus University of Thrace 7.44 / 10 Very Good. 1. Computational mechanics Finite elements 2. Pattern recognition

Welcome to Crete! Crete is the home of FORTH and University of Crete. University of Crete is often ranked as #1 uni in Greece.

HARRIS ATHANASIADES CURICCULUM VITAE. Psychology, University of Ioannina, Greece

Friday, May Sessions Ι-V Banquet Hall, Parallel Sessions MC2 Hall

KYRIAKOU, NIKI PHD, INFORMATION SYSTEMS NIKI.FYI

CURRICULUM VITAE. Name : Hosny Mohamed Ibrahim Hussein. Phones : ( Mobile ) :

Issues and Achievements of Computer Science Students by Historical Data Analyses - Are We Ready for Education Big Data?

Program of the EHFCN Open House hosted by EOPYY. Athens, October

Europass Curriculum Vitae

Scalable Runtime Support for Data-Intensive Applications on the Single-Chip Cloud Computer

HOW TO BOOK YOUR CRUISE:

with international participation August 28-30, 2008, Samos Island, Greece

Research, Innovation and Entrepreneurship: A new agenda for the enhancement of structural competitiveness

Euro Par August 27 31, 2012 Rhodes Island, Greece

Odysseas G. SPILIOPOULOS Associate Prof. in Economic Law CURRICULUM VITAE (2017) Studies in Law

Daniel Guttentag, Ph.D.

Boosting Engagement of Serbian Universities in Open Science

First International Seminar. Saturday December 12 th 2015 Karolos Papoulias Conference Center University of Ioannina

Manolis Terrovitis Personal Information

Peer-to-Peer Computing for Mobile Networks. Information Discovery and Dissemination

An Architecture for Combinator Graph Reduction Philip J. Koopman Jr.

Top 10 Outbound Tourism Markets, Trips and Spending per Country To 2018

EVENT TITLE: 18 th scientific conference of the Greek Society of Regional Scientists Regional specialization and entrepreneurship

IAAPA. November 20, 2014

Tried & True Markets: France Germany UK

Coopetition. Sleeping with the Enemy or Strategic Alliances? Mike Williams Senior Consultant GainingEdge

Springer Proceedings in Business and Economics

Global Travel Trends 2005

2017 Conference Journal

Dr Hengyun (Neil) Li

2017 Digital Grid Customer Summit Session Abstracts

3 D EUROPEAN PhD SUMMER SCHOOL AND CONFERENCE ON MATHEMATICAL MODELING OF COMPLEX SYSTEMS JULY, 2013

Version number Effective date Person in charge Changes

The most innovative knowledge platform for hoteliers

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

American Indian Tourism Conference. September 13, 2017

PROS Inc. Intended positioning on the market

June TEQ Marketing Strategy 2025 Executive Summary

PRIDE OF OWNERSHIP.

June TEQ Marketing Strategy 2025 Executive Summary

Report from Marcel Meier Dog-handler sub-commission regarding the dog-handler gathering that be held by Marcel last winter.

Finding Rationality in an Irrational World: The Economics of Successful Hotel Negotiations

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

The Improvement of Airline Tickets Selling Process

Curriculum Vitae of Nikolaos Michailidis Professor, Dr. Eng.

Tomohiro Kitamura. 1. Ph.D., Economics, Kobe University, March M.A., Economics, Kobe University, March 2015

aap[at]econ[dot]uoa[dot]gr EDUCATION

RPPTL CONFLICTS CALENDAR

CURRICULUM VITAE University of Idaho

SCHOOL YEAR DEGREE DATE U of U Ph.D UNAM M. S UNAM B. S. 1982

Steve Smith Director Cargo Supply Chain Management

FACTS & FIGURES ISE 2016

ISC HIGH PERFORMANCE 2018

AGENDA (DRAFT) Friday, 23 November Saturday, 24 November 2018

Analyzing the Fault Sensitivity of Secure Embedded Software

ISSUE 1, 2017 Global Travel Insights

Date of Birth: 05/01/1979 Nationality: Greek Citizenship: Greek Military Service: Fulfilled ( ) (Marine Mortar Operator)

KhatunaChapichadze. Date of Birth. March 17, Address

20/7/ /7/2017. Name Club Categ. Round 1 Round 2 Round 3 Overall 1 Papadopoulou Niki *NOV -10 F 2,00/34 2,00/34 5,00/25 357,14

CV & Publishing (2017) Labros Vasiliadis, PhD

Spring Break Just Got Cheaper

Europass Curriculum Vitae

Using Market Intelligence in the Commercial World

E-tourism Usage Patterns of Tourism Business in Chiang Mai, Thailand. Paisarn Kanchanawong, Chodok Charungkon, Songsak Poonoi

First Congress of Greek Mathematicians FCGM 2018

ENGAGING ALUMNI WORLDWIDE

Agenda. Binswanger. Food Industry Trends. Food Industry Changes. Suggestions for the Economic Development Community. Conclusion

Organized by. Technological Educational Institute Central Macedonia. Department of Supply Chain

Border Management. Making your borders more secure with APP PNR By: Jean-François Huergo

3-D GIS Applications in Aviation and Aerospace Pedagogy Dr. Rich Snow, Dr. Mary Snow, and Mario Westphal. Abstract

Nov2011-June2012 PRAGATI ENGINEERING COLLEGE SURAMPALEM COMPUTER SCIENCE & ENGINEERING VOL # 4 FROM H.O.D S DESK CYBER WAVES -NEWS LETTER

Curriculum Vitae. Maria Aivalioti Environmental Engineer, M.Sc., Ph.D. PERSONAL INFORMATION Date of birth: 7 th November 1980

INTERMEDIATE CITIES AND ENVIRONMENTAL PLANNING VOLOS, OF MAY 2008

THE GROWTH OF THE HOSPITALITY INDUSTRY IN DUBAI

International Data Links Symposium 2014

TripAdvisor Workshop Christchurch 7 June 2016

Country (A - C) Local Number Toll-Free Premium Rates

aimilia.papachristou Aimilia Papachristou Aimilia_P CV Note

Chania, No Prot: 363

Airport Networks Are Putting Your Devices & Cloud Apps at Severe Risk

Education: Teaching: Invited lectures at Universities abroad:

Optimizing trajectories over the 4DWeatherCube

A Survey of Time and Space Partitioning for Space Avionics

A collaboration for safety from Flight Data Services and IATA. World leading flight data analysis service

Volcanic Eruptions and Global Fallout

BOUTIQUE & LIFESTYLE HOTELS

Outlook for International Inbound Travel to North America - The International Marketplace: What's Happening?

Nikolaos S. Bartsotas

CURRICULUM VITAE PERIKLIS DRAKOS. Specialized Teaching Staff at the A Department of Economic Studies.

* Head of the UNESCO-ICOMOS Documentation Centre.

Big Data Processing using Parallelism Techniques Shazia Zaman MSDS 7333 Quantifying the World, 4/20/2017

6 th WHBA Summer School in Medical & Biosciences Research & Management Program May 13-21, 2017 Neo Itilo, Mani Laconia & Athens, Greece

The Impacts of the Climate Change in the Coastal Areas. The case study of South Pieria

Implementation of Real-Time Data into a Transport Simulation

Transcription:

Elias Athanasopoulos Education Faculty of Science Department of Computer Science VU University Amsterdam De Boelelaan 1081A, Room R.429 1081 HV, Amsterdam, The Netherlands i.a.athanasopoulos@vu.nl Google Scholar: https://scholar.google.com/citations?user=rlhxkecaaaaj&hl=en 2011: Ph.D. in Computer Science, University of Crete. Thesis: Modern Techniques for the Detection and Prevention of Web2.0 Attacks Advisor: Professor Evangelos P. Markatos. 2006: M.Sc. in Computer Science, University of Crete. Thesis: Using Unstructured Peer-to-Peer Systems as Denial of Service Attack Platforms Advisor: Professor Evangelos P. Markatos. Employment 2004: B.Sc. in Physics, University of Athens. 2015-now: VU University, Amsterdam, Assistant Professor. 2014-2015: FORTH, Research Scientist. 2012-2014: Columbia University, Postdoctoral Research Scientist. 2005-2011: FORTH, Research Assistant. August - October, 2007: Microsoft Research Cambridge, Research Intern. 2005-2007: Attica Media Group, Editor. 2003-2004: Liberis Media Group, IT. 2000-2002: Flash Multimedia (Flash.gr), Editor. Scholarships/Funding XHUNTER. IOF Marie Curie Fellowship (FP7-PEOPLE-2010-IOF), 2012-2015. Microsoft Research Ph.D. Scholarship Program, 100,000 e (2008-2011). Graduate Research Fellowship, FORTH, Prof. Evangelos P. Markatos, 2005-2011. Awards Dutch Cyber Security Research best paper award (for the Security and Privacy 2014 paper).

Maria M. Manassaki Bequest Scholarship, University of Crete. Given to the two best Ph.D. students of the Computer Science Department, 2009-2010. Teaching Instructor CS-457: Introduction to Information Systems Security, University of Crete, Fall 2014. CS-345: Operating Systems, University of Crete, Fall 2012. Teaching Assistant CS-345: Operating Systems, Univ. of Crete, Fall 2009, 2008 and Spring 2006. CS-558: Internet Technologies, University of Crete, Spring 2009, 2007. CS-459: Internet Measurements, University of Crete, Fall 2010. CS-556: Distributed Systems, University of Crete, Spring 2008. CS-554: Peer-to-Peer Systems, University of Crete, Fall 2007. CS-555: Parallel Systems and Grids, University of Crete, Fall 2006. CS-457: Information Systems Security, University of Crete, Fall 2005. CS-255: Software Engineering Laboratory, University of Crete, Spring 2005. Service Program Committee International Conference on Applied Cryptography and Network Security (ACNS), 2016. Passive and Active Measurement Conference (PAM), 2016. International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2015. International Conference on Trust & Trustworthy Computing (TRUST), 2014, 2015. European Workshop on System Security (EuroSec), 2015, 2016. International Workshop on Future Scenarios for Cyber Crime and Cyber Terrorism (FCCT), 2015. International Symposium on Engineering Secure Software and Systems (ESSoS), 2015. International Conference on Information Systems Security and Privacy (ICISSP), 2014. International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2014. IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), 2011. Other Publication Chair - International Symposium on Engineering Secure Software and Systems (ES- SoS), 2015. Publications - Most Important 1. The devil is in the constants: Bypassing defenses in browser JIT engines. Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, and Sotiris Ioannidis. In Proceedings of the Network and Distributed System Security Symposium (NDSS). San Diego, CA, US, February 2015. 2. PixelVault: Using GPUs for Securing Cryptographic Operations. Giorgos Vasiliadis, Elias Athanasopoulos, Michalis Polychronakis, and Sotiris Ioannidis. In Proceedings of the 21st ACM

Conference on Computer and Communications Security (CCS). Scottsdale, Arizona, US, November 2014. 3. Size Does Matter - Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard. Enes Göktaş, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, and Georgios Portokalidis. In Proceedings of the 23rd USENIX Security Symposium. San Diego, CA, US, August 2014. 4. Out Of Control: Overcoming Control-Flow Integrity. Enes Göktaş, Elias Athanasopoulos, Herbert Bos, and Georgios Portokalidis. In Proceedings of the 35th IEEE Symposium on Security and Privacy (Oakland). San Jose, CA, US, May 2014. 5. SAuth: Protecting User Accounts from Password Database Leaks. Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS). Berlin, Germany, November 2013. Publications - Journals/Magazines 1. kguard: Lightweight Kernel Protection. Vasileios P. Kemerlis, Georgios Portokalidis, Elias Athanasopoulos, and Angelos D. Keromytis. In the USENIX ;login: Magazine, vol. 37, no. 6, pp. 7-14. December 2012. 2. Understanding the Behavior of Malicious Applications in Social Networks. Andreas Makridakis, Elias Athanasopoulos, Spiros Antonatos, Demetres Antoniades, Sotiris Ioannidis, and Evangelos P. Markatos. In IEEE Network, Volume 24, Issue 5, 2010. Publications - All 1. Face/Off: Preventing Privacy Leakage From Photos in Social Networks. Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, Sotiris Ioannidis. In proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS). Denver, Co, USA. 2. Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption. Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 8th European Workshop on System Security (EUROSEC 2015). Bordeaux, France, April 2015. 3. The devil is in the constants: Bypassing defenses in browser JIT engines. Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, and Sotiris Ioannidis. In Proceedings of the Network and Distributed System Security Symposium (NDSS). San Diego, CA, US, February 2015. 4. PixelVault: Using GPUs for Securing Cryptographic Operations. Giorgos Vasiliadis, Elias Athanasopoulos, Michalis Polychronakis, and Sotiris Ioannidis. In Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS). Scottsdale, Arizona, US, November 2014. 5. Flying Memcache: Lessons Learned from Different Acceleration Strategies. Dimitris Deyannis, Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the International Symposium on Computer Architecture and High Performance Computing (SBAC- PAD). Paris, France, October 2014. 6. Size Does Matter - Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard. Enes Göktaş, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, and Georgios Portokalidis. In Proceedings of the 23rd USENIX Security Symposium. San Diego, CA, US, August 2014. 7. AndRadar: Fast Discovery of Android Applications in Alternative Markets. Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, and Sotiris Ioannidis. In Proceedings of the 11th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). Egham, UK, July 2014.

8. Out Of Control: Overcoming Control-Flow Integrity. Enes Göktaş, Elias Athanasopoulos, Herbert Bos, and Georgios Portokalidis. In Proceedings of the 35th IEEE Symposium on Security and Privacy (Oakland). San Jose, CA, US, May 2014. 9. The man who was there: Fortifying the Economy of Location-Based Services. Iasonas Polakis, Stamatis Volanis, Elias Athanasopoulos, and Evangelos P. Markatos. In Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC). New Orleans, LA, US, December 2013. 10. SAuth: Protecting User Accounts from Password Database Leaks. Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS). Berlin, Germany, November 2013. 11. Practical Information Flow for Legacy Web Applications. Georgios Chinis, Polyvios Pratikakis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the International Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems (ICOOOLPS), co-located with ECOOP. Montpellier, France, July 2013. 12. kguard: Lightweight Kernel Protection. Vasileios P. Kemerlis, Georgios Portokalidis, Elias Athanasopoulos, and Angelos D. Keromytis. In the USENIX ;login: Magazine, vol. 37, no. 6, pp. 7-14. December 2012. 13. Digging up Social Structures from Documents on the Web. Eleni Gessiou, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos, and Sotiris Ioannidis. In Proceedings of the IEEE Global Communications Conference (GLOBECOM). Anaheim, California, USA, December 2012. 14. Exploiting Split Browsers for Efficiently Protecting User Data. Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis. In Proceedings of the ACM Cloud Computing Security Workshop (CCSW). Raleigh, NC, USA, October 2012. 15. ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches. Elias Athanasopoulos, Vasileios P. Kemerlis, Michalis Polychronakis, and Evangelos P. Markatos. In Proceedings of the 10th International Conference on Applied Cryptography and Network Security (ACNS). Singapore, June 2012. 16. Towards a Universal Data Provenance Framework using Dynamic Instrumentation. Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, and Sotiris Ioannidis. In Proceedings of the 27th IFIP International Information Security and Privacy Conference (IFIP SEC). Heraklion, Crete, Greece, June 2012. 17. CensMon: A Web Censorship Monitor. Andreas Sfakianakis, Elias Athanasopoulos, and Sotiris Ioannidis. In Proceedings of the 1st USENIX Workshop on Free and Open Communications on the Internet (FOCI), co-located with USENIX Security. San Francisco, CA, US, August 2011. 18. we.b: The Web of Short URLs. Demetris Antoniades, Iasonas Polakis, Giorgos Kontaxis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos, and Thomas Karagiannis. In Proceedings of the 20th International World Wide Web Conference (WWW). Hyderabad, India, March 2011. 19. Understanding the Behavior of Malicious Applications in Social Networks. Andreas Makridakis, Elias Athanasopoulos, Spiros Antonatos, Demetres Antoniades, Sotiris Ioannidis, and Evangelos P. Markatos. In IEEE Network, Volume 24, Issue 5, 2010. 20. An Architecture For Enforcing JavaScript Randomization in Web2.0 Applications (short paper). Elias Athanasopoulos, Antonis Krithinakis, and Evangelos P. Markatos. In Proceedings of the 13th Information Security Conference (ISC). Boca Raton, Florida, October 2010. 21. D(e i)aling with VoIP: Robust Prevention of DIAL Attacks. Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, and Evangelos P. Markatos. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS). Athens, Greece, September 2010. 22. xjs: Practical XSS Prevention for Web Application Development. Elias Athanasopoulos, Vasilis Pappas, Antonis Krithinakis, Spyros Ligouras, and Evangelos P. Markatos. In Proceedings of the 1st USENIX Conference on Web Application Development (WebApps). June 2010, Boston, Massachusetts.

23. Isolating JavaScript in Dynamic Code Environments. Antonis Krithinakis, Elias Athanasopoulos, and Evangelos P. Markatos. In Proceedings of the 1st Workshop on Analysis and Programming Languages for Web Applications and Cloud Applications (APLWACA), co-located with PLDI. June 2010, Toronto, Canada. 24. Elias Athanasopoulos, Antonis Krithinakis, and Evangelos P. Markatos. Hunting Cross-Site Scripting Attacks in the Network. In Proceedings of the 4th Workshop on Web 2.0 Security & Privacy (W2SP). May 2010, Oakland, California. 25. Code-Injection Attacks in Browsers Supporting Policies. Elias Athanasopoulos, Vasilis Pappas, and Evangelos P. Markatos. In Proceedings of the Third Workshop on Web 2.0 Security & Privacy (W2SP). May 2009, Oakland, California. 26. WISDOM: Security-Aware Fibres. Elias Athanasopoulos, Antonis Krithinakis, Georgios Kopidakis, Graeme Maxwell, Alistair Poustie, Bob Manning, Rod Webb, Martin Koyabe, Carla Di Cairano-Gilfedder. In Proceedings of the 2nd ACM European Workshop on System Security (EUROSEC). March 2009, Nuremberg, Germany. 27. WSIM: A software platform to simulate all-optical security operations. Antonis Krithinakis, Lubomir Stroetmann, Elias Athanasopoulos, Georgios Kopidakis, Evangelos P. Markatos. In Proceedings of the 2nd European Conference on Computer Network Defense (EC2ND). December 2008, Dublin, Ireland. 28. Topnet: A Network-aware top(1). Antonis Theocharides, Demetres Antoniades, Michalis Polychronakis, Elias Athanasopoulos, and Evangelos P. Markatos. In Proceedings of the 22nd USENIX Large Installation Systems Administration (LISA) Conference. November 2008, San Diego, CA. 29. Antisocial Networks: Turning a Social Network into a Botnet. Elias Athanasopoulos, Andreas Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, and Evangelos P.Markatos. In Proceedings of the 11th Information Security Conference (ISC 2008). September 2008, Taipei, Taiwan. 30. Compromising Anonymity Using Packet Spinning. Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, and Evangelos P. Markatos. In Proceedings of the 11th Information Security Conference (ISC 2008). September 2008, Taipei, Taiwan. 31. GAS: Overloading a File Sharing Network as an Anonymizing System. Elias Athanasopoulos, Mema Roussopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos. In Proceedings of the 2nd International Workshop on Security (IWSEC 2007). October 2007, Nara, Japan. 32. Alice, what did you do last time? Fighting Phishing Using Past Activity Tests. Nikos Nikiforakis, Andreas Makridakis, Elias Athanasopoulos, and Evangelos P. Markatos. In Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND). October 2007, Heraklion, Greece. 33. Enhanced CAPTCHAs: Using Animation To Tell Humans And Computers Apart. Elias Athanasopoulos and Spiros Antonatos. In Proceedings of the 10th IFIP Open Conference on Communications and Multimedia Security (CMS 06). October 2006, Heraklion, Crete. 34. Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network that Never Forgets. Elias Athanasopoulos, Kostas G. Anagnostakis and Evangelos P. Markatos. In Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06). June 2006, Singapore. 35. A Feedback-based Approach to Reduce Duplicate Messages in Unstructured Peer-to-Peer Networks. Charis Papadakis, Paraskevi Fragopoulou, Elias Athanasopoulos, Marios Dikaiakos, Alexandros Labrinidis, Evangelos Markatos. In Proceedings of the CoreGRID Integration Workshop. November 2005, Pisa, Italy.

Publications - Physics 1. ruby-root: Extending ROOT s functionality with a Ruby interpreter interface: Elias Athanasopoulos, Diploma Thesis. Supervisor: Dr. George Tzanakos. 2. NuMI-Note-COMP-992, 2003-11-18: MINOS 4 Plane Prototype Offline Analysis Framework. (Costas Andreopoulos, Elias Athanasopoulos, Bruce Baller, Albero Marchionni and George Tzanakos) 3. NuMI-Note-COMP-993, 2003-11-18: Spatial Tessellation Techniques for the MINOS Magnetic Field (Costas Andreopoulos, Elias Athanasopoulos and George Tzanakos)