default search action
BibTeX records: Nick Nikiforakis
@inproceedings{DBLP:conf/dimva/TsouvalasN24, author = {Billy Tsouvalas and Nick Nikiforakis}, editor = {Federico Maggi and Manuel Egele and Mathias Payer and Michele Carminati}, title = {Knocking on Admin's Door: Protecting Critical Web Applications with Deception}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, {DIMVA} 2024, Lausanne, Switzerland, July 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14828}, pages = {283--306}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-64171-8\_15}, doi = {10.1007/978-3-031-64171-8\_15}, timestamp = {Sat, 20 Jul 2024 14:18:50 +0200}, biburl = {https://dblp.org/rec/conf/dimva/TsouvalasN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/WuKNB24, author = {Zhengyu Wu and Brian Kondracki and Nick Nikiforakis and Aruna Balasubramanian}, title = {Secrets are Forever: Characterizing Sensitive File Leaks on {IPFS}}, booktitle = {{IFIP} Networking Conference, {IFIP} Networking 2024, Thessaloniki, Greece, June 3-6, 2024}, pages = {522--528}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/IFIPNetworking62109.2024.10619838}, doi = {10.23919/IFIPNETWORKING62109.2024.10619838}, timestamp = {Wed, 04 Sep 2024 21:11:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/WuKNB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TsoukaladelisN24, author = {Chris Tsoukaladelis and Nick Nikiforakis}, title = {Manufactured Narratives: On the Potential of Manipulating Social Media to Politicize World Events}, booktitle = {{IEEE} Security and Privacy, {SP} 2024 - Workshops, San Francisco, CA, USA, May 23, 2024}, pages = {17--27}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/SPW63631.2024.00007}, doi = {10.1109/SPW63631.2024.00007}, timestamp = {Thu, 18 Jul 2024 17:00:03 +0200}, biburl = {https://dblp.org/rec/conf/sp/TsoukaladelisN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KondrackiN24, author = {Brian Kondracki and Nick Nikiforakis}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {Smudged Fingerprints: Characterizing and Improving the Performance of Web Application Fingerprinting}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/kondracki}, timestamp = {Mon, 22 Jul 2024 17:10:49 +0200}, biburl = {https://dblp.org/rec/conf/uss/KondrackiN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/AzadN23, author = {Babak Amin Azad and Nick Nikiforakis}, editor = {Mohamed Shehab and Maribel Fern{\'{a}}ndez and Ninghui Li}, title = {Role Models: Role-based Debloating for Web Applications}, booktitle = {Proceedings of the Thirteenth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26, 2023}, pages = {251--262}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577923.3583647}, doi = {10.1145/3577923.3583647}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/AzadN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AliCGKNP23, author = {Mir Masood Ali and Binoy Chitale and Mohammad Ghasemisharif and Chris Kanich and Nick Nikiforakis and Jason Polakis}, title = {Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/navigating-murky-waters-automated-browser-feature-testing-for-uncovering-tracking-vectors/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/AliCGKNP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LiYN23, author = {Xigao Li and Anurag Yepuri and Nick Nikiforakis}, title = {Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/double-and-nothing-understanding-and-detecting-cryptocurrency-giveaway-scams/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LiYN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JahanshahiANE23, author = {Rasoul Jahanshahi and Babak Amin Azad and Nick Nikiforakis and Manuel Egele}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Minimalist: Semi-automated Debloating of {PHP} Web Applications through Static Analysis}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5557--5573}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/jahanshahi}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/JahanshahiANE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AzadJTEN23, author = {Babak Amin Azad and Rasoul Jahanshahi and Chris Tsoukaladelis and Manuel Egele and Nick Nikiforakis}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {AnimateDead: Debloating Web Applications Using Concolic Execution}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5575--5591}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/azad}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AzadJTEN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/LiARN23, author = {Xigao Li and Babak Amin Azad and Amir Rahmati and Nick Nikiforakis}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {Scan Me If You Can: Understanding and Detecting Unwanted Vulnerability Scanning}, booktitle = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {2284--2294}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543507.3583394}, doi = {10.1145/3543507.3583394}, timestamp = {Mon, 28 Aug 2023 21:17:10 +0200}, biburl = {https://dblp.org/rec/conf/www/LiARN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/SoFN23, author = {Johnny So and Michael Ferdman and Nick Nikiforakis}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {The More Things Change, the More They Stay the Same: Integrity of Modern JavaScript}, booktitle = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {2295--2305}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543507.3583395}, doi = {10.1145/3543507.3583395}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/SoFN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SolomosINP22, author = {Konstantinos Solomos and Panagiotis Ilia and Nick Nikiforakis and Jason Polakis}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2675--2688}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560576}, doi = {10.1145/3548606.3560576}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SolomosINP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KondrackiAMN22, author = {Brian Kondracki and Babak Amin Azad and Najmeh Miramirkhani and Nick Nikiforakis}, title = {The Droid is in the Details: Environment-aware Evasion of Android Sandboxes}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-189/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/KondrackiAMN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SoMFN22, author = {Johnny So and Najmeh Miramirkhani and Michael Ferdman and Nick Nikiforakis}, title = {Domains Do Change Their Spots: Quantifying Potential Abuse of Residual Trust}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {2130--2144}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833609}, doi = {10.1109/SP46214.2022.9833609}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/SoMFN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KondrackiSN22, author = {Brian Kondracki and Johnny So and Nick Nikiforakis}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {53--70}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/kondracki}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/KondrackiSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SolomosIKNP22, author = {Konstantinos Solomos and Panagiotis Ilia and Soroush Karami and Nick Nikiforakis and Jason Polakis}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {717--733}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/solomos}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SolomosIKNP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/GuoKNS22, author = {Xingzhi Guo and Brian Kondracki and Nick Nikiforakis and Steven Skiena}, editor = {Fr{\'{e}}d{\'{e}}rique Laforest and Rapha{\"{e}}l Troncy and Elena Simperl and Deepak Agarwal and Aristides Gionis and Ivan Herman and Lionel M{\'{e}}dini}, title = {Verba Volant, Scripta Volant: Understanding Post-publication Title Changes in News Outlets}, booktitle = {{WWW} '22: The {ACM} Web Conference 2022, Virtual Event, Lyon, France, April 25 - 29, 2022}, pages = {588--598}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3485447.3512219}, doi = {10.1145/3485447.3512219}, timestamp = {Thu, 23 Jun 2022 19:54:34 +0200}, biburl = {https://dblp.org/rec/conf/www/GuoKNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/BarronSN21, author = {Timothy Barron and Johnny So and Nick Nikiforakis}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {Click This, Not That: Extending Web Authentication with Deception}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {462--474}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453088}, doi = {10.1145/3433210.3453088}, timestamp = {Wed, 09 Jun 2021 15:14:39 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/BarronSN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KondrackiASN21, author = {Brian Kondracki and Babak Amin Azad and Oleksii Starov and Nick Nikiforakis}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Catching Transparent Phish: Analyzing and Detecting {MITM} Phishing Toolkits}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {36--50}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484765}, doi = {10.1145/3460120.3484765}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KondrackiASN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KaleliKENS21, author = {Beliz Kaleli and Brian Kondracki and Manuel Egele and Nick Nikiforakis and Gianluca Stringhini}, title = {To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/to-err-is-human-characterizing-the-threat-of-unintended-urls-in-social-media/}, timestamp = {Thu, 17 Jun 2021 15:42:26 +0200}, biburl = {https://dblp.org/rec/conf/ndss/KaleliKENS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiARN21, author = {Xigao Li and Babak Amin Azad and Amir Rahmati and Nick Nikiforakis}, title = {Good Bot, Bad Bot: Characterizing Automated Browsing Activity}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {1589--1605}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00079}, doi = {10.1109/SP40001.2021.00079}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/LiARN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LaperdrixSCKN21, author = {Pierre Laperdrix and Oleksii Starov and Quan Chen and Alexandros Kapravelos and Nick Nikiforakis}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2507--2524}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/laperdrix}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/LaperdrixSCKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/SzurdiLKNC21, author = {Janos Szurdi and Meng Luo and Brian Kondracki and Nick Nikiforakis and Nicolas Christin}, editor = {Jure Leskovec and Marko Grobelnik and Marc Najork and Jie Tang and Leila Zia}, title = {Where are you taking me?Understanding Abusive Traffic Distribution Systems}, booktitle = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April 19-23, 2021}, pages = {3613--3624}, publisher = {{ACM} / {IW3C2}}, year = {2021}, url = {https://doi.org/10.1145/3442381.3450071}, doi = {10.1145/3442381.3450071}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/SzurdiLKNC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PantelaiosNK20, author = {Nikolaos Pantelaios and Nick Nikiforakis and Alexandros Kapravelos}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {You've Changed: Detecting Malicious Browser Extensions through their Update Deltas}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {477--491}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3423343}, doi = {10.1145/3372297.3423343}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PantelaiosNK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/AzadSLN20, author = {Babak Amin Azad and Oleksii Starov and Pierre Laperdrix and Nick Nikiforakis}, editor = {Cl{\'{e}}mentine Maurice and Leyla Bilge and Gianluca Stringhini and Nuno Neves}, title = {Web Runner 2049: Evaluating Third-Party Anti-bot Services}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 17th International Conference, {DIMVA} 2020, Lisbon, Portugal, June 24-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12223}, pages = {135--159}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-52683-2\_7}, doi = {10.1007/978-3-030-52683-2\_7}, timestamp = {Sun, 25 Jul 2021 11:49:24 +0200}, biburl = {https://dblp.org/rec/conf/dimva/AzadSLN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/AzadSLN20a, author = {Babak Amin Azad and Oleksii Starov and Pierre Laperdrix and Nick Nikiforakis}, editor = {Cl{\'{e}}mentine Maurice and Leyla Bilge and Gianluca Stringhini and Nuno Neves}, title = {Short Paper - Taming the Shape Shifter: Detecting Anti-fingerprinting Browsers}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 17th International Conference, {DIMVA} 2020, Lisbon, Portugal, June 24-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12223}, pages = {160--170}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-52683-2\_8}, doi = {10.1007/978-3-030-52683-2\_8}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/AzadSLN20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/RothBCNS20, author = {Sebastian Roth and Timothy Barron and Stefano Calzavara and Nick Nikiforakis and Ben Stock}, title = {Complex Security Policy? {A} Longitudinal Analysis of Deployed Content Security Policies}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/complex-security-policy-a-longitudinal-analysis-of-deployed-content-security-policies/}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/RothBCNS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KondrackiAEPN20, author = {Brian Kondracki and Assel Aliyeva and Manuel Egele and Jason Polakis and Nick Nikiforakis}, title = {Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {810--824}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00077}, doi = {10.1109/SP40000.2020.00077}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/KondrackiAEPN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tma/NejatiLNB20, author = {Javad Nejati and Meng Luo and Nick Nikiforakis and Aruna Balasubramanian}, editor = {Georgios Smaragdakis and Anja Feldmann and Anna Brunstr{\"{o}}m and Gareth Tyson}, title = {Need for Mobile Speed: {A} Historical Study of Mobile Web Performance}, booktitle = {4th Network Traffic Measurement and Analysis Conference, {TMA} 2020, Berlin, Germany, June 10, 2020}, publisher = {{IFIP}}, year = {2020}, url = {http://dl.ifip.org/db/conf/tma/tma2020/tma2020-camera-paper37.pdf}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tma/NejatiLNB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GoethemMJN19, author = {Tom van Goethem and Najmeh Miramirkhani and Wouter Joosen and Nick Nikiforakis}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Purchased Fame: Exploring the Ecosystem of Private Blog Networks}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {366--378}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329830}, doi = {10.1145/3321705.3329830}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GoethemMJN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/LaperdrixABN19, author = {Pierre Laperdrix and Gildas Avoine and Benoit Baudry and Nick Nikiforakis}, editor = {Roberto Perdisci and Cl{\'{e}}mentine Maurice and Giorgio Giacinto and Magnus Almgren}, title = {Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11543}, pages = {43--66}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22038-9\_3}, doi = {10.1007/978-3-030-22038-9\_3}, timestamp = {Sun, 04 Aug 2024 19:42:33 +0200}, biburl = {https://dblp.org/rec/conf/dimva/LaperdrixABN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LuoLHN19, author = {Meng Luo and Pierre Laperdrix and Nima Honarmand and Nick Nikiforakis}, title = {Time Does Not Heal All Wounds: {A} Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/time-does-not-heal-all-wounds-a-longitudinal-analysis-of-security-mechanism-support-in-mobile-browsers/}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LuoLHN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BarronMN19, author = {Timothy Barron and Najmeh Miramirkhani and Nick Nikiforakis}, title = {Now You See It, Now You Don't: {A} Large-scale Analysis of Early Domain Deletions}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {383--397}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/barron}, timestamp = {Wed, 10 Feb 2021 22:02:04 +0100}, biburl = {https://dblp.org/rec/conf/raid/BarronMN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TrickelSKND19, author = {Erik Trickel and Oleksii Starov and Alexandros Kapravelos and Nick Nikiforakis and Adam Doup{\'{e}}}, editor = {Nadia Heninger and Patrick Traynor}, title = {Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1679--1696}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/trickel}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/TrickelSKND19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AzadLN19, author = {Babak Amin Azad and Pierre Laperdrix and Nick Nikiforakis}, editor = {Nadia Heninger and Patrick Traynor}, title = {Less is More: Quantifying the Security Benefits of Debloating Web Applications}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1697--1714}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/azad}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AzadLN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/StarovLKN19, author = {Oleksii Starov and Pierre Laperdrix and Alexandros Kapravelos and Nick Nikiforakis}, editor = {Ling Liu and Ryen W. White and Amin Mantrach and Fabrizio Silvestri and Julian J. McAuley and Ricardo Baeza{-}Yates and Leila Zia}, title = {Unnecessarily Identifiable: Quantifying the fingerprintability of browser extensions due to bloat}, booktitle = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA, May 13-17, 2019}, pages = {3244--3250}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3308558.3313458}, doi = {10.1145/3308558.3313458}, timestamp = {Sun, 22 Sep 2019 18:12:47 +0200}, biburl = {https://dblp.org/rec/conf/www/StarovLKN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/StarovN18, author = {Oleksii Starov and Nick Nikiforakis}, editor = {Mathias Payer and Awais Rashid and Jose M. Such}, title = {PrivacyMeter: Designing and Developing a Privacy-Preserving Browser Extension}, booktitle = {Engineering Secure Software and Systems - 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10953}, pages = {77--95}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-94496-8\_6}, doi = {10.1007/978-3-319-94496-8\_6}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/StarovN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/StarovZZMN18, author = {Oleksii Starov and Yuchen Zhou and Xiao Zhang and Najmeh Miramirkhani and Nick Nikiforakis}, editor = {Pierre{-}Antoine Champin and Fabien Gandon and Mounia Lalmas and Panagiotis G. Ipeirotis}, title = {Betrayed by Your Dashboard: Discovering Malicious Campaigns via Web Analytics}, booktitle = {Proceedings of the 2018 World Wide Web Conference on World Wide Web, {WWW} 2018, Lyon, France, April 23-27, 2018}, pages = {227--236}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3178876.3186089}, doi = {10.1145/3178876.3186089}, timestamp = {Fri, 16 Apr 2021 10:04:12 +0200}, biburl = {https://dblp.org/rec/conf/www/StarovZZMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/MiramirkhaniBFN18, author = {Najmeh Miramirkhani and Timothy Barron and Michael Ferdman and Nick Nikiforakis}, editor = {Pierre{-}Antoine Champin and Fabien Gandon and Mounia Lalmas and Panagiotis G. Ipeirotis}, title = {Panning for gold.com: Understanding the Dynamics of Domain Dropcatching}, booktitle = {Proceedings of the 2018 World Wide Web Conference on World Wide Web, {WWW} 2018, Lyon, France, April 23-27, 2018}, pages = {257--266}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3178876.3186092}, doi = {10.1145/3178876.3186092}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/MiramirkhaniBFN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/SrinivasanKMANA18, author = {Bharat Srinivasan and Athanasios Kountouras and Najmeh Miramirkhani and Monjur Alam and Nick Nikiforakis and Manos Antonakakis and Mustaque Ahamad}, editor = {Pierre{-}Antoine Champin and Fabien Gandon and Mounia Lalmas and Panagiotis G. Ipeirotis}, title = {Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers}, booktitle = {Proceedings of the 2018 World Wide Web Conference on World Wide Web, {WWW} 2018, Lyon, France, April 23-27, 2018}, pages = {319--328}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3178876.3186098}, doi = {10.1145/3178876.3186098}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/SrinivasanKMANA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/JohnsNVW18, author = {Martin Johns and Nick Nikiforakis and Melanie Volkamer and John Wilander}, title = {Web Application Security (Dagstuhl Seminar 18321)}, journal = {Dagstuhl Reports}, volume = {8}, number = {8}, pages = {1--17}, year = {2018}, url = {https://doi.org/10.4230/DagRep.8.8.1}, doi = {10.4230/DAGREP.8.8.1}, timestamp = {Fri, 22 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/JohnsNVW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BarronN17, author = {Timothy Barron and Nick Nikiforakis}, title = {Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {387--398}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134614}, doi = {10.1145/3134600.3134614}, timestamp = {Tue, 06 Nov 2018 16:59:23 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BarronN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuoSHN17, author = {Meng Luo and Oleksii Starov and Nima Honarmand and Nick Nikiforakis}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Hindsight: Understanding the Evolution of {UI} Vulnerabilities in Mobile Browsers}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {149--162}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133987}, doi = {10.1145/3133956.3133987}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LuoSHN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KintisMLCGPNA17, author = {Panagiotis Kintis and Najmeh Miramirkhani and Charles Lever and Yizheng Chen and Rosa Romero G{\'{o}}mez and Nikolaos Pitropakis and Nick Nikiforakis and Manos Antonakakis}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Hiding in Plain Sight: {A} Longitudinal Study of Combosquatting Abuse}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {569--586}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134002}, doi = {10.1145/3133956.3134002}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KintisMLCGPNA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VissersBGJN17, author = {Thomas Vissers and Timothy Barron and Tom van Goethem and Wouter Joosen and Nick Nikiforakis}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {The Wolf of Name Street: Hijacking Domains Through Their Nameservers}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {957--970}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133988}, doi = {10.1145/3133956.3133988}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VissersBGJN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/MerzdovnikHBNNS17, author = {Georg Merzdovnik and Markus Huber and Damjan Buhov and Nick Nikiforakis and Sebastian Neuner and Martin Schmiedecker and Edgar R. Weippl}, title = {Block Me If You Can: {A} Large-Scale Study of Tracker-Blocking Tools}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {319--333}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.26}, doi = {10.1109/EUROSP.2017.26}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/MerzdovnikHBNNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MiramirkhaniSN17, author = {Najmeh Miramirkhani and Oleksii Starov and Nick Nikiforakis}, title = {Dial One for Scam: {A} Large-Scale Analysis of Technical Support Scams}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/dial-one-scam-large-scale-analysis-technical-support-scams/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MiramirkhaniSN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/StarovN17, author = {Oleksii Starov and Nick Nikiforakis}, title = {{XHOUND:} Quantifying the Fingerprintability of Browser Extensions}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {941--956}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.18}, doi = {10.1109/SP.2017.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/StarovN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MiramirkhaniANP17, author = {Najmeh Miramirkhani and Mahathi Priya Appini and Nick Nikiforakis and Michalis Polychronakis}, title = {Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {1009--1024}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.42}, doi = {10.1109/SP.2017.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MiramirkhaniANP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/MaricontiOANENS17, author = {Enrico Mariconti and Jeremiah Onaolapo and Syed Sharique Ahmad and Nicolas Nikiforou and Manuel Egele and Nick Nikiforakis and Gianluca Stringhini}, editor = {Rick Barrett and Rick Cummings and Eugene Agichtein and Evgeniy Gabrilovich}, title = {What's in a Name?: Understanding Profile Name Reuse on Twitter}, booktitle = {Proceedings of the 26th International Conference on World Wide Web, {WWW} 2017, Perth, Australia, April 3-7, 2017}, pages = {1161--1170}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3038912.3052589}, doi = {10.1145/3038912.3052589}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/MaricontiOANENS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/StarovN17, author = {Oleksii Starov and Nick Nikiforakis}, editor = {Rick Barrett and Rick Cummings and Eugene Agichtein and Evgeniy Gabrilovich}, title = {Extended Tracking Powers: Measuring the Privacy Diffusion Enabled by Browser Extensions}, booktitle = {Proceedings of the 26th International Conference on World Wide Web, {WWW} 2017, Perth, Australia, April 3-7, 2017}, pages = {1481--1490}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3038912.3052596}, doi = {10.1145/3038912.3052596}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/StarovN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MaricontiOANENS17, author = {Enrico Mariconti and Jeremiah Onaolapo and Syed Sharique Ahmad and Nicolas Nikiforou and Manuel Egele and Nick Nikiforakis and Gianluca Stringhini}, title = {What's in a Name? Understanding Profile Name Reuse on Twitter}, journal = {CoRR}, volume = {abs/1702.04256}, year = {2017}, url = {http://arxiv.org/abs/1702.04256}, eprinttype = {arXiv}, eprint = {1702.04256}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MaricontiOANENS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-08519, author = {Panagiotis Kintis and Najmeh Miramirkhani and Charles Lever and Yizheng Chen and Rosa Romero G{\'{o}}mez and Nikolaos Pitropakis and Nick Nikiforakis and Manos Antonakakis}, title = {Hiding in Plain Sight: {A} Longitudinal Study of Combosquatting Abuse}, journal = {CoRR}, volume = {abs/1708.08519}, year = {2017}, url = {http://arxiv.org/abs/1708.08519}, eprinttype = {arXiv}, eprint = {1708.08519}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-08519.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-08331, author = {Bharat Srinivasan and Athanasios Kountouras and Najmeh Miramirkhani and Monjur Alam and Nick Nikiforakis and Manos Antonakakis and Mustaque Ahamad}, title = {By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers}, journal = {CoRR}, volume = {abs/1709.08331}, year = {2017}, url = {http://arxiv.org/abs/1709.08331}, eprinttype = {arXiv}, eprint = {1709.08331}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-08331.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/BielovaLNN17, author = {Nataliia Bielova and Nikolaos Laoutaris and Arvind Narayanan and Nick Nikiforakis}, title = {Online Privacy and Web Transparency (Dagstuhl Seminar 17162)}, journal = {Dagstuhl Reports}, volume = {7}, number = {4}, pages = {83--106}, year = {2017}, url = {https://doi.org/10.4230/DagRep.7.4.83}, doi = {10.4230/DAGREP.7.4.83}, timestamp = {Thu, 21 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/BielovaLNN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/StarovGN16, author = {Oleksii Starov and Phillipa Gill and Nick Nikiforakis}, title = {Are You Sure You Want to Contact Us? Quantifying the Leakage of {PII} via Website Contact Forms}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {1}, pages = {20--33}, year = {2016}, url = {https://doi.org/10.1515/popets-2015-0028}, doi = {10.1515/POPETS-2015-0028}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/StarovGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/MaricontiOANENS16, author = {Enrico Mariconti and Jeremiah Onaolapo and Syed Sharique Ahmad and Nicolas Nikiforou and Manuel Egele and Nick Nikiforakis and Gianluca Stringhini}, editor = {Michalis Polychronakis and Cristiano Giuffrida}, title = {Why allowing profile name reuse is a bad idea}, booktitle = {Proceedings of the 9th European Workshop on System Security, {EUROSEC} 2016, London, UK, April 18-21, 2016}, pages = {3:1--3:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2905760.2905762}, doi = {10.1145/2905760.2905762}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosec/MaricontiOANENS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/RafiqueGJHN16, author = {M. Zubair Rafique and Tom van Goethem and Wouter Joosen and Christophe Huygens and Nick Nikiforakis}, title = {It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/free-reason-exploring-ecosystem-free-live-streaming-services.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/RafiqueGJHN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/StarovDAHN16, author = {Oleksii Starov and Johannes Dahse and Syed Sharique Ahmad and Thorsten Holz and Nick Nikiforakis}, editor = {Jacqueline Bourdeau and Jim Hendler and Roger Nkambou and Ian Horrocks and Ben Y. Zhao}, title = {No Honor Among Thieves: {A} Large-Scale Analysis of Malicious Web Shells}, booktitle = {Proceedings of the 25th International Conference on World Wide Web, {WWW} 2016, Montreal, Canada, April 11 - 15, 2016}, pages = {1021--1032}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2872427.2882992}, doi = {10.1145/2872427.2882992}, timestamp = {Tue, 12 Apr 2022 14:46:29 +0200}, biburl = {https://dblp.org/rec/conf/www/StarovDAHN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MiramirkhaniSN16, author = {Najmeh Miramirkhani and Oleksii Starov and Nick Nikiforakis}, title = {Dial One for Scam: Analyzing and Detecting Technical Support Scams}, journal = {CoRR}, volume = {abs/1607.06891}, year = {2016}, url = {http://arxiv.org/abs/1607.06891}, eprinttype = {arXiv}, eprint = {1607.06891}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MiramirkhaniSN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/RyckNDPJ15, author = {Philippe De Ryck and Nick Nikiforakis and Lieven Desmet and Frank Piessens and Wouter Joosen}, title = {Protected Web Components: Hiding Sensitive Information in the Shadows}, journal = {{IT} Prof.}, volume = {17}, number = {1}, pages = {36--43}, year = {2015}, url = {https://doi.org/10.1109/MITP.2015.12}, doi = {10.1109/MITP.2015.12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/RyckNDPJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaoBNSEEKV15, author = {Shuang Hao and Kevin Borgolte and Nick Nikiforakis and Gianluca Stringhini and Manuel Egele and Michael Eubanks and Brian Krebs and Giovanni Vigna}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Drops for Stuff: An Analysis of Reshipping Mule Scams}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1081--1092}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813620}, doi = {10.1145/2810103.2813620}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HaoBNSEEKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GoethemJN15, author = {Tom van Goethem and Wouter Joosen and Nick Nikiforakis}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {The Clock is Still Ticking: Timing Attacks in the Modern Web}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1382--1393}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813632}, doi = {10.1145/2810103.2813632}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GoethemJN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VissersGJN15, author = {Thomas Vissers and Tom van Goethem and Wouter Joosen and Nick Nikiforakis}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Maneuvering Around Clouds: Bypassing Cloud-based Security Providers}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1530--1541}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813633}, doi = {10.1145/2810103.2813633}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VissersGJN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AgtenJPN15, author = {Pieter Agten and Wouter Joosen and Frank Piessens and Nick Nikiforakis}, title = {Seven Months' Worth of Mistakes: {A} Longitudinal Study of Typosquatting Abuse}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/seven-months-worth-mistakes-longitudinal-study-typosquatting-abuse}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AgtenJPN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/VissersJN15, author = {Thomas Vissers and Wouter Joosen and Nick Nikiforakis}, title = {Parking Sensors: Analyzing and Detecting Parked Domains}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/parking-sensors-analyzing-and-detecting-parked-domains}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/VissersJN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/NikiforakisJL15, author = {Nick Nikiforakis and Wouter Joosen and Benjamin Livshits}, editor = {Aldo Gangemi and Stefano Leonardi and Alessandro Panconesi}, title = {PriVaricator: Deceiving Fingerprinters with Little White Lies}, booktitle = {Proceedings of the 24th International Conference on World Wide Web, {WWW} 2015, Florence, Italy, May 18-22, 2015}, pages = {820--830}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2736277.2741090}, doi = {10.1145/2736277.2741090}, timestamp = {Tue, 27 Dec 2022 09:06:31 +0100}, biburl = {https://dblp.org/rec/conf/www/NikiforakisJL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/NikiforakisKJKPV14, author = {Nick Nikiforakis and Alexandros Kapravelos and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna}, title = {On the Workings and Current Practices of Web-Based Device Fingerprinting}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {28--36}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.160}, doi = {10.1109/MSP.2013.160}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/NikiforakisKJKPV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GroefDNP14, author = {Willem De Groef and Dominique Devriese and Nick Nikiforakis and Frank Piessens}, title = {Secure multi-execution of web scripts: Theory and practice}, journal = {J. Comput. Secur.}, volume = {22}, number = {4}, pages = {469--509}, year = {2014}, url = {https://doi.org/10.3233/JCS-130495}, doi = {10.3233/JCS-130495}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GroefDNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AckerNDPJ14, author = {Steven {Van Acker} and Nick Nikiforakis and Lieven Desmet and Frank Piessens and Wouter Joosen}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {525--530}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590311}, doi = {10.1145/2590296.2590311}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AckerNDPJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GoethemPJN14, author = {Tom van Goethem and Frank Piessens and Wouter Joosen and Nick Nikiforakis}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {918--929}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660279}, doi = {10.1145/2660267.2660279}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GoethemPJN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/NikiforakisBDPJ14, author = {Nick Nikiforakis and Marco Balduzzi and Lieven Desmet and Frank Piessens and Wouter Joosen}, editor = {Sherman S. M. Chow and Jan Camenisch and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Soundsquatting: Uncovering the Use of Homophones in Domain Squatting}, booktitle = {Information Security - 17th International Conference, {ISC} 2014, Hong Kong, China, October 12-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8783}, pages = {291--308}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13257-0\_17}, doi = {10.1007/978-3-319-13257-0\_17}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/NikiforakisBDPJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/ChenNDH14, author = {Ping Chen and Nick Nikiforakis and Lieven Desmet and Christophe Huygens}, editor = {Ehab Al{-}Shaer and Krishna Kant}, title = {Security Analysis of the Chinese Web: How well is it protected?}, booktitle = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {3--9}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665936.2665938}, doi = {10.1145/2665936.2665938}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/ChenNDH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/GoethemCNDJ14, author = {Tom van Goethem and Ping Chen and Nick Nikiforakis and Lieven Desmet and Wouter Joosen}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Large-Scale Security Analysis of the Web: Challenges and Findings}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {110--126}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_8}, doi = {10.1007/978-3-319-08593-7\_8}, timestamp = {Wed, 25 Sep 2019 18:21:56 +0200}, biburl = {https://dblp.org/rec/conf/trust/GoethemCNDJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/NikiforakisMSRJKPVZ14, author = {Nick Nikiforakis and Federico Maggi and Gianluca Stringhini and M. Zubair Rafique and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna and Stefano Zanero}, editor = {Chin{-}Wan Chung and Andrei Z. Broder and Kyuseok Shim and Torsten Suel}, title = {Stranger danger: exploring the ecosystem of ad-based {URL} shortening services}, booktitle = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic of Korea, April 7-11, 2014}, pages = {51--62}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2566486.2567983}, doi = {10.1145/2566486.2567983}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/NikiforakisMSRJKPVZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GadaletaNMJ14, author = {Francesco Gadaleta and Nick Nikiforakis and Jan Tobias M{\"{u}}hlberg and Wouter Joosen}, title = {HyperForce: Hypervisor-enForced Execution of Security-Critical Code}, journal = {CoRR}, volume = {abs/1405.5648}, year = {2014}, url = {http://arxiv.org/abs/1405.5648}, eprinttype = {arXiv}, eprint = {1405.5648}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GadaletaNMJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GadaletaNYJ14, author = {Francesco Gadaleta and Nick Nikiforakis and Yves Younan and Wouter Joosen}, title = {Hello rootKitty: {A} lightweight invariance-enforcing framework}, journal = {CoRR}, volume = {abs/1405.5651}, year = {2014}, url = {http://arxiv.org/abs/1405.5651}, eprinttype = {arXiv}, eprint = {1405.5651}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GadaletaNYJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GadaletaSNPJ14, author = {Francesco Gadaleta and Raoul Strackx and Nick Nikiforakis and Frank Piessens and Wouter Joosen}, title = {On the effectiveness of virtualization-based security}, journal = {CoRR}, volume = {abs/1405.6058}, year = {2014}, url = {http://arxiv.org/abs/1405.6058}, eprinttype = {arXiv}, eprint = {1405.6058}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GadaletaSNPJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RyckNDJ13, author = {Philippe De Ryck and Nick Nikiforakis and Lieven Desmet and Wouter Joosen}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {TabShots: client-side detection of tabnabbing attacks}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {447--456}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484371}, doi = {10.1145/2484313.2484371}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RyckNDJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AcarJNDGPP13, author = {Gunes Acar and Marc Juarez and Nick Nikiforakis and Claudia D{\'{\i}}az and Seda F. G{\"{u}}rses and Frank Piessens and Bart Preneel}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {FPDetective: dusting the web for fingerprinters}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1129--1140}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516674}, doi = {10.1145/2508859.2516674}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AcarJNDGPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/NikiforakisPJ13, author = {Nick Nikiforakis and Frank Piessens and Wouter Joosen}, editor = {Konrad Rieck and Patrick Stewin and Jean{-}Pierre Seifert}, title = {HeapSentry: Kernel-Assisted Protection against Heap Overflows}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, {DIMVA} 2013, Berlin, Germany, July 18-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7967}, pages = {177--196}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39235-1\_11}, doi = {10.1007/978-3-642-39235-1\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/NikiforakisPJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ChenNHD13, author = {Ping Chen and Nick Nikiforakis and Christophe Huygens and Lieven Desmet}, editor = {Yvo Desmedt}, title = {A Dangerous Mix: Large-Scale Analysis of Mixed-Content Websites}, booktitle = {Information Security, 16th International Conference, {ISC} 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7807}, pages = {354--363}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-27659-5\_25}, doi = {10.1007/978-3-319-27659-5\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/ChenNHD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NikiforakisKJKPV13, author = {Nick Nikiforakis and Alexandros Kapravelos and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna}, title = {Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {541--555}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.43}, doi = {10.1109/SP.2013.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/NikiforakisKJKPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/NikiforakisAMDPJ13, author = {Nick Nikiforakis and Steven {Van Acker} and Wannes Meert and Lieven Desmet and Frank Piessens and Wouter Joosen}, editor = {Daniel Schwabe and Virg{\'{\i}}lio A. F. Almeida and Hartmut Glaser and Ricardo Baeza{-}Yates and Sue B. Moon}, title = {Bitsquatting: exploiting bit-flips for fun, or profit?}, booktitle = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro, Brazil, May 13-17, 2013}, pages = {989--998}, publisher = {International World Wide Web Conferences Steering Committee / {ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488388.2488474}, doi = {10.1145/2488388.2488474}, timestamp = {Sun, 22 Sep 2019 18:15:38 +0200}, biburl = {https://dblp.org/rec/conf/www/NikiforakisAMDPJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AckerNDJP12, author = {Steven {Van Acker} and Nick Nikiforakis and Lieven Desmet and Wouter Joosen and Frank Piessens}, editor = {Heung Youl Youm and Yoojae Won}, title = {FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {12--13}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414462}, doi = {10.1145/2414456.2414462}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AckerNDJP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NikiforakisIKAJKPV12, author = {Nick Nikiforakis and Luca Invernizzi and Alexandros Kapravelos and Steven {Van Acker} and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {You are what you include: large-scale evaluation of remote javascript inclusions}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {736--747}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382274}, doi = {10.1145/2382196.2382274}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NikiforakisIKAJKPV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GroefDNP12, author = {Willem De Groef and Dominique Devriese and Nick Nikiforakis and Frank Piessens}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {FlowFox: a web browser with flexible and precise information flow control}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {748--759}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382275}, doi = {10.1145/2382196.2382275}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GroefDNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dais/RyckNDPJ12, author = {Philippe De Ryck and Nick Nikiforakis and Lieven Desmet and Frank Piessens and Wouter Joosen}, editor = {Karl M. G{\"{o}}schka and Seif Haridi}, title = {Serene: Self-Reliant Client-Side Protection against Session Fixation}, booktitle = {Distributed Applications and Interoperable Systems - 12th {IFIP} {WG} 6.1 International Conference, {DAIS} 2012, Stockholm, Sweden, June 13-16, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7272}, pages = {59--72}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30823-9\_5}, doi = {10.1007/978-3-642-30823-9\_5}, timestamp = {Tue, 21 Mar 2023 20:54:01 +0100}, biburl = {https://dblp.org/rec/conf/dais/RyckNDPJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/NoormanNP12, author = {Job Noorman and Nick Nikiforakis and Frank Piessens}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {There Is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {105--120}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_8}, doi = {10.1007/978-3-642-34210-3\_8}, timestamp = {Sat, 19 Oct 2019 20:02:02 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/NoormanNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/NikiforakisAPJ12, author = {Nick Nikiforakis and Steven {Van Acker} and Frank Piessens and Wouter Joosen}, editor = {Simone Fischer{-}H{\"{u}}bner and Matthew K. Wright}, title = {Exploring the Ecosystem of Referrer-Anonymizing Services}, booktitle = {Privacy Enhancing Technologies - 12th International Symposium, {PETS} 2012, Vigo, Spain, July 11-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7384}, pages = {259--278}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31680-7\_14}, doi = {10.1007/978-3-642-31680-7\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/NikiforakisAPJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LekiesNTPJ12, author = {Sebastian Lekies and Nick Nikiforakis and Walter Tighzert and Frank Piessens and Martin Johns}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {{DEMACRO:} Defense against Malicious Cross-Domain Requests}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {254--273}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_13}, doi = {10.1007/978-3-642-33338-5\_13}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LekiesNTPJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/GadaletaNMJ12, author = {Francesco Gadaleta and Nick Nikiforakis and Jan Tobias M{\"{u}}hlberg and Wouter Joosen}, editor = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou}, title = {HyperForce: Hypervisor-enForced Execution of Security-Critical Code}, booktitle = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {376}, pages = {126--137}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30436-1\_11}, doi = {10.1007/978-3-642-30436-1\_11}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/GadaletaNMJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/AgtenNSGP12, author = {Pieter Agten and Nick Nikiforakis and Raoul Strackx and Willem De Groef and Frank Piessens}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Recent Developments in Low-Level Software Security}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {1--16}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_1}, doi = {10.1007/978-3-642-30955-7\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/wistp/AgtenNSGP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WilanderNYKJ11, author = {John Wilander and Nick Nikiforakis and Yves Younan and Mariam Kamkar and Wouter Joosen}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {{RIPE:} runtime intrusion prevention evaluator}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {41--50}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076739}, doi = {10.1145/2076732.2076739}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WilanderNYKJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/NikiforakisMYJJ11, author = {Nick Nikiforakis and Wannes Meert and Yves Younan and Martin Johns and Wouter Joosen}, editor = {{\'{U}}lfar Erlingsson and Roel J. Wieringa and Nicola Zannone}, title = {SessionShield: Lightweight Protection against Session Hijacking}, booktitle = {Engineering Secure Software and Systems - Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6542}, pages = {87--100}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19125-1\_7}, doi = {10.1007/978-3-642-19125-1\_7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/NikiforakisMYJJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/NikiforakisJJ11, author = {Nick Nikiforakis and Wouter Joosen and Martin Johns}, editor = {Engin Kirda and Steven Hand}, title = {Abusing locality in shared web hosting}, booktitle = {Proceedings of the Fourth European Workshop on System Security, EUROSEC'11, April 10, 2011, Salzburg, Austria}, pages = {2}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1972551.1972553}, doi = {10.1145/1972551.1972553}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosec/NikiforakisJJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/GadaletaNYJ11, author = {Francesco Gadaleta and Nick Nikiforakis and Yves Younan and Wouter Joosen}, editor = {Xuejia Lai and Jianying Zhou and Hui Li}, title = {Hello rootKitty: {A} Lightweight Invariance-Enforcing Framework}, booktitle = {Information Security, 14th International Conference, {ISC} 2011, Xi'an, China, October 26-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7001}, pages = {213--228}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24861-0\_15}, doi = {10.1007/978-3-642-24861-0\_15}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/isw/GadaletaNYJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/NikiforakisBAJB11, author = {Nick Nikiforakis and Marco Balduzzi and Steven {Van Acker} and Wouter Joosen and Davide Balzarotti}, editor = {Christopher Kruegel}, title = {Exposing the Lack of Privacy in File Hosting Services}, booktitle = {4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '11, Boston, MA, USA, March 29, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/leet11/exposing-lack-privacy-file-hosting-services}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/leet/NikiforakisBAJB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/NikiforakisYJ10, author = {Nick Nikiforakis and Yves Younan and Wouter Joosen}, editor = {Christian Kreibich and Marko Jahnke}, title = {HProxy: Client-Side Detection of {SSL} Stripping Attacks}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 7th International Conference, {DIMVA} 2010, Bonn, Germany, July 8-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6201}, pages = {200--218}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14215-4\_12}, doi = {10.1007/978-3-642-14215-4\_12}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/NikiforakisYJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/AckerNPYP10, author = {Steven {Van Acker} and Nick Nikiforakis and Pieter Philippaerts and Yves Younan and Frank Piessens}, editor = {Somesh Jha and Anish Mathuria}, title = {ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {156--170}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_12}, doi = {10.1007/978-3-642-17714-9\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/AckerNPYP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.