BibTeX records: Nick Nikiforakis

download as .bib file

@inproceedings{DBLP:conf/dimva/TsouvalasN24,
  author       = {Billy Tsouvalas and
                  Nick Nikiforakis},
  editor       = {Federico Maggi and
                  Manuel Egele and
                  Mathias Payer and
                  Michele Carminati},
  title        = {Knocking on Admin's Door: Protecting Critical Web Applications with
                  Deception},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 21st International Conference, {DIMVA} 2024, Lausanne, Switzerland,
                  July 17-19, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14828},
  pages        = {283--306},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-64171-8\_15},
  doi          = {10.1007/978-3-031-64171-8\_15},
  timestamp    = {Sat, 20 Jul 2024 14:18:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/TsouvalasN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/WuKNB24,
  author       = {Zhengyu Wu and
                  Brian Kondracki and
                  Nick Nikiforakis and
                  Aruna Balasubramanian},
  title        = {Secrets are Forever: Characterizing Sensitive File Leaks on {IPFS}},
  booktitle    = {{IFIP} Networking Conference, {IFIP} Networking 2024, Thessaloniki,
                  Greece, June 3-6, 2024},
  pages        = {522--528},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.23919/IFIPNetworking62109.2024.10619838},
  doi          = {10.23919/IFIPNETWORKING62109.2024.10619838},
  timestamp    = {Wed, 04 Sep 2024 21:11:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/WuKNB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TsoukaladelisN24,
  author       = {Chris Tsoukaladelis and
                  Nick Nikiforakis},
  title        = {Manufactured Narratives: On the Potential of Manipulating Social Media
                  to Politicize World Events},
  booktitle    = {{IEEE} Security and Privacy, {SP} 2024 - Workshops, San Francisco,
                  CA, USA, May 23, 2024},
  pages        = {17--27},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/SPW63631.2024.00007},
  doi          = {10.1109/SPW63631.2024.00007},
  timestamp    = {Thu, 18 Jul 2024 17:00:03 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/TsoukaladelisN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KondrackiN24,
  author       = {Brian Kondracki and
                  Nick Nikiforakis},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {Smudged Fingerprints: Characterizing and Improving the Performance
                  of Web Application Fingerprinting},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/kondracki},
  timestamp    = {Mon, 22 Jul 2024 17:10:49 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KondrackiN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AzadN23,
  author       = {Babak Amin Azad and
                  Nick Nikiforakis},
  editor       = {Mohamed Shehab and
                  Maribel Fern{\'{a}}ndez and
                  Ninghui Li},
  title        = {Role Models: Role-based Debloating for Web Applications},
  booktitle    = {Proceedings of the Thirteenth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26,
                  2023},
  pages        = {251--262},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577923.3583647},
  doi          = {10.1145/3577923.3583647},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/AzadN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AliCGKNP23,
  author       = {Mir Masood Ali and
                  Binoy Chitale and
                  Mohammad Ghasemisharif and
                  Chris Kanich and
                  Nick Nikiforakis and
                  Jason Polakis},
  title        = {Navigating Murky Waters: Automated Browser Feature Testing for Uncovering
                  Tracking Vectors},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/navigating-murky-waters-automated-browser-feature-testing-for-uncovering-tracking-vectors/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/AliCGKNP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiYN23,
  author       = {Xigao Li and
                  Anurag Yepuri and
                  Nick Nikiforakis},
  title        = {Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway
                  Scams},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/double-and-nothing-understanding-and-detecting-cryptocurrency-giveaway-scams/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LiYN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JahanshahiANE23,
  author       = {Rasoul Jahanshahi and
                  Babak Amin Azad and
                  Nick Nikiforakis and
                  Manuel Egele},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Minimalist: Semi-automated Debloating of {PHP} Web Applications through
                  Static Analysis},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5557--5573},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/jahanshahi},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/JahanshahiANE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AzadJTEN23,
  author       = {Babak Amin Azad and
                  Rasoul Jahanshahi and
                  Chris Tsoukaladelis and
                  Manuel Egele and
                  Nick Nikiforakis},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {AnimateDead: Debloating Web Applications Using Concolic Execution},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5575--5591},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/azad},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AzadJTEN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/LiARN23,
  author       = {Xigao Li and
                  Babak Amin Azad and
                  Amir Rahmati and
                  Nick Nikiforakis},
  editor       = {Ying Ding and
                  Jie Tang and
                  Juan F. Sequeda and
                  Lora Aroyo and
                  Carlos Castillo and
                  Geert{-}Jan Houben},
  title        = {Scan Me If You Can: Understanding and Detecting Unwanted Vulnerability
                  Scanning},
  booktitle    = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin,
                  TX, USA, 30 April 2023 - 4 May 2023},
  pages        = {2284--2294},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543507.3583394},
  doi          = {10.1145/3543507.3583394},
  timestamp    = {Mon, 28 Aug 2023 21:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/www/LiARN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/SoFN23,
  author       = {Johnny So and
                  Michael Ferdman and
                  Nick Nikiforakis},
  editor       = {Ying Ding and
                  Jie Tang and
                  Juan F. Sequeda and
                  Lora Aroyo and
                  Carlos Castillo and
                  Geert{-}Jan Houben},
  title        = {The More Things Change, the More They Stay the Same: Integrity of
                  Modern JavaScript},
  booktitle    = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin,
                  TX, USA, 30 April 2023 - 4 May 2023},
  pages        = {2295--2305},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543507.3583395},
  doi          = {10.1145/3543507.3583395},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/SoFN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SolomosINP22,
  author       = {Konstantinos Solomos and
                  Panagiotis Ilia and
                  Nick Nikiforakis and
                  Jason Polakis},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Escaping the Confines of Time: Continuous Browser Extension Fingerprinting
                  Through Ephemeral Modifications},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {2675--2688},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560576},
  doi          = {10.1145/3548606.3560576},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SolomosINP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KondrackiAMN22,
  author       = {Brian Kondracki and
                  Babak Amin Azad and
                  Najmeh Miramirkhani and
                  Nick Nikiforakis},
  title        = {The Droid is in the Details: Environment-aware Evasion of Android
                  Sandboxes},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-189/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/KondrackiAMN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SoMFN22,
  author       = {Johnny So and
                  Najmeh Miramirkhani and
                  Michael Ferdman and
                  Nick Nikiforakis},
  title        = {Domains Do Change Their Spots: Quantifying Potential Abuse of Residual
                  Trust},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {2130--2144},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833609},
  doi          = {10.1109/SP46214.2022.9833609},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SoMFN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KondrackiSN22,
  author       = {Brian Kondracki and
                  Johnny So and
                  Nick Nikiforakis},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Uninvited Guests: Analyzing the Identity and Behavior of Certificate
                  Transparency Bots},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {53--70},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/kondracki},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KondrackiSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SolomosIKNP22,
  author       = {Konstantinos Solomos and
                  Panagiotis Ilia and
                  Soroush Karami and
                  Nick Nikiforakis and
                  Jason Polakis},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {The Dangers of Human Touch: Fingerprinting Browser Extensions through
                  User Actions},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {717--733},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/solomos},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SolomosIKNP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/GuoKNS22,
  author       = {Xingzhi Guo and
                  Brian Kondracki and
                  Nick Nikiforakis and
                  Steven Skiena},
  editor       = {Fr{\'{e}}d{\'{e}}rique Laforest and
                  Rapha{\"{e}}l Troncy and
                  Elena Simperl and
                  Deepak Agarwal and
                  Aristides Gionis and
                  Ivan Herman and
                  Lionel M{\'{e}}dini},
  title        = {Verba Volant, Scripta Volant: Understanding Post-publication Title
                  Changes in News Outlets},
  booktitle    = {{WWW} '22: The {ACM} Web Conference 2022, Virtual Event, Lyon, France,
                  April 25 - 29, 2022},
  pages        = {588--598},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3485447.3512219},
  doi          = {10.1145/3485447.3512219},
  timestamp    = {Thu, 23 Jun 2022 19:54:34 +0200},
  biburl       = {https://dblp.org/rec/conf/www/GuoKNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/BarronSN21,
  author       = {Timothy Barron and
                  Johnny So and
                  Nick Nikiforakis},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {Click This, Not That: Extending Web Authentication with Deception},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {462--474},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453088},
  doi          = {10.1145/3433210.3453088},
  timestamp    = {Wed, 09 Jun 2021 15:14:39 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/BarronSN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KondrackiASN21,
  author       = {Brian Kondracki and
                  Babak Amin Azad and
                  Oleksii Starov and
                  Nick Nikiforakis},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Catching Transparent Phish: Analyzing and Detecting {MITM} Phishing
                  Toolkits},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {36--50},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484765},
  doi          = {10.1145/3460120.3484765},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KondrackiASN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KaleliKENS21,
  author       = {Beliz Kaleli and
                  Brian Kondracki and
                  Manuel Egele and
                  Nick Nikiforakis and
                  Gianluca Stringhini},
  title        = {To Err.Is Human: Characterizing the Threat of Unintended URLs in Social
                  Media},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/to-err-is-human-characterizing-the-threat-of-unintended-urls-in-social-media/},
  timestamp    = {Thu, 17 Jun 2021 15:42:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/KaleliKENS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiARN21,
  author       = {Xigao Li and
                  Babak Amin Azad and
                  Amir Rahmati and
                  Nick Nikiforakis},
  title        = {Good Bot, Bad Bot: Characterizing Automated Browsing Activity},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {1589--1605},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00079},
  doi          = {10.1109/SP40001.2021.00079},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LiARN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LaperdrixSCKN21,
  author       = {Pierre Laperdrix and
                  Oleksii Starov and
                  Quan Chen and
                  Alexandros Kapravelos and
                  Nick Nikiforakis},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Fingerprinting in Style: Detecting Browser Extensions via Injected
                  Style Sheets},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2507--2524},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/laperdrix},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LaperdrixSCKN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/SzurdiLKNC21,
  author       = {Janos Szurdi and
                  Meng Luo and
                  Brian Kondracki and
                  Nick Nikiforakis and
                  Nicolas Christin},
  editor       = {Jure Leskovec and
                  Marko Grobelnik and
                  Marc Najork and
                  Jie Tang and
                  Leila Zia},
  title        = {Where are you taking me?Understanding Abusive Traffic Distribution
                  Systems},
  booktitle    = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia,
                  April 19-23, 2021},
  pages        = {3613--3624},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3442381.3450071},
  doi          = {10.1145/3442381.3450071},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/SzurdiLKNC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PantelaiosNK20,
  author       = {Nikolaos Pantelaios and
                  Nick Nikiforakis and
                  Alexandros Kapravelos},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {You've Changed: Detecting Malicious Browser Extensions through their
                  Update Deltas},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {477--491},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3423343},
  doi          = {10.1145/3372297.3423343},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PantelaiosNK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/AzadSLN20,
  author       = {Babak Amin Azad and
                  Oleksii Starov and
                  Pierre Laperdrix and
                  Nick Nikiforakis},
  editor       = {Cl{\'{e}}mentine Maurice and
                  Leyla Bilge and
                  Gianluca Stringhini and
                  Nuno Neves},
  title        = {Web Runner 2049: Evaluating Third-Party Anti-bot Services},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 17th International Conference, {DIMVA} 2020, Lisbon, Portugal, June
                  24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12223},
  pages        = {135--159},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-52683-2\_7},
  doi          = {10.1007/978-3-030-52683-2\_7},
  timestamp    = {Sun, 25 Jul 2021 11:49:24 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/AzadSLN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/AzadSLN20a,
  author       = {Babak Amin Azad and
                  Oleksii Starov and
                  Pierre Laperdrix and
                  Nick Nikiforakis},
  editor       = {Cl{\'{e}}mentine Maurice and
                  Leyla Bilge and
                  Gianluca Stringhini and
                  Nuno Neves},
  title        = {Short Paper - Taming the Shape Shifter: Detecting Anti-fingerprinting
                  Browsers},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 17th International Conference, {DIMVA} 2020, Lisbon, Portugal, June
                  24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12223},
  pages        = {160--170},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-52683-2\_8},
  doi          = {10.1007/978-3-030-52683-2\_8},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/AzadSLN20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/RothBCNS20,
  author       = {Sebastian Roth and
                  Timothy Barron and
                  Stefano Calzavara and
                  Nick Nikiforakis and
                  Ben Stock},
  title        = {Complex Security Policy? {A} Longitudinal Analysis of Deployed Content
                  Security Policies},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/complex-security-policy-a-longitudinal-analysis-of-deployed-content-security-policies/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/RothBCNS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KondrackiAEPN20,
  author       = {Brian Kondracki and
                  Assel Aliyeva and
                  Manuel Egele and
                  Jason Polakis and
                  Nick Nikiforakis},
  title        = {Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving
                  Mobile Browsers},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {810--824},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00077},
  doi          = {10.1109/SP40000.2020.00077},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KondrackiAEPN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tma/NejatiLNB20,
  author       = {Javad Nejati and
                  Meng Luo and
                  Nick Nikiforakis and
                  Aruna Balasubramanian},
  editor       = {Georgios Smaragdakis and
                  Anja Feldmann and
                  Anna Brunstr{\"{o}}m and
                  Gareth Tyson},
  title        = {Need for Mobile Speed: {A} Historical Study of Mobile Web Performance},
  booktitle    = {4th Network Traffic Measurement and Analysis Conference, {TMA} 2020,
                  Berlin, Germany, June 10, 2020},
  publisher    = {{IFIP}},
  year         = {2020},
  url          = {http://dl.ifip.org/db/conf/tma/tma2020/tma2020-camera-paper37.pdf},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tma/NejatiLNB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GoethemMJN19,
  author       = {Tom van Goethem and
                  Najmeh Miramirkhani and
                  Wouter Joosen and
                  Nick Nikiforakis},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Purchased Fame: Exploring the Ecosystem of Private Blog Networks},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {366--378},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329830},
  doi          = {10.1145/3321705.3329830},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GoethemMJN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/LaperdrixABN19,
  author       = {Pierre Laperdrix and
                  Gildas Avoine and
                  Benoit Baudry and
                  Nick Nikiforakis},
  editor       = {Roberto Perdisci and
                  Cl{\'{e}}mentine Maurice and
                  Giorgio Giacinto and
                  Magnus Almgren},
  title        = {Morellian Analysis for Browsers: Making Web Authentication Stronger
                  with Canvas Fingerprinting},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden,
                  June 19-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11543},
  pages        = {43--66},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22038-9\_3},
  doi          = {10.1007/978-3-030-22038-9\_3},
  timestamp    = {Sun, 04 Aug 2024 19:42:33 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/LaperdrixABN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LuoLHN19,
  author       = {Meng Luo and
                  Pierre Laperdrix and
                  Nima Honarmand and
                  Nick Nikiforakis},
  title        = {Time Does Not Heal All Wounds: {A} Longitudinal Analysis of Security-Mechanism
                  Support in Mobile Browsers},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/time-does-not-heal-all-wounds-a-longitudinal-analysis-of-security-mechanism-support-in-mobile-browsers/},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LuoLHN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BarronMN19,
  author       = {Timothy Barron and
                  Najmeh Miramirkhani and
                  Nick Nikiforakis},
  title        = {Now You See It, Now You Don't: {A} Large-scale Analysis of Early Domain
                  Deletions},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {383--397},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/barron},
  timestamp    = {Wed, 10 Feb 2021 22:02:04 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/BarronMN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TrickelSKND19,
  author       = {Erik Trickel and
                  Oleksii Starov and
                  Alexandros Kapravelos and
                  Nick Nikiforakis and
                  Adam Doup{\'{e}}},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Everyone is Different: Client-side Diversification for Defending Against
                  Extension Fingerprinting},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1679--1696},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/trickel},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/TrickelSKND19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AzadLN19,
  author       = {Babak Amin Azad and
                  Pierre Laperdrix and
                  Nick Nikiforakis},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Less is More: Quantifying the Security Benefits of Debloating Web
                  Applications},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1697--1714},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/azad},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AzadLN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/StarovLKN19,
  author       = {Oleksii Starov and
                  Pierre Laperdrix and
                  Alexandros Kapravelos and
                  Nick Nikiforakis},
  editor       = {Ling Liu and
                  Ryen W. White and
                  Amin Mantrach and
                  Fabrizio Silvestri and
                  Julian J. McAuley and
                  Ricardo Baeza{-}Yates and
                  Leila Zia},
  title        = {Unnecessarily Identifiable: Quantifying the fingerprintability of
                  browser extensions due to bloat},
  booktitle    = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA,
                  May 13-17, 2019},
  pages        = {3244--3250},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3308558.3313458},
  doi          = {10.1145/3308558.3313458},
  timestamp    = {Sun, 22 Sep 2019 18:12:47 +0200},
  biburl       = {https://dblp.org/rec/conf/www/StarovLKN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/StarovN18,
  author       = {Oleksii Starov and
                  Nick Nikiforakis},
  editor       = {Mathias Payer and
                  Awais Rashid and
                  Jose M. Such},
  title        = {PrivacyMeter: Designing and Developing a Privacy-Preserving Browser
                  Extension},
  booktitle    = {Engineering Secure Software and Systems - 10th International Symposium,
                  ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10953},
  pages        = {77--95},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-94496-8\_6},
  doi          = {10.1007/978-3-319-94496-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/StarovN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/StarovZZMN18,
  author       = {Oleksii Starov and
                  Yuchen Zhou and
                  Xiao Zhang and
                  Najmeh Miramirkhani and
                  Nick Nikiforakis},
  editor       = {Pierre{-}Antoine Champin and
                  Fabien Gandon and
                  Mounia Lalmas and
                  Panagiotis G. Ipeirotis},
  title        = {Betrayed by Your Dashboard: Discovering Malicious Campaigns via Web
                  Analytics},
  booktitle    = {Proceedings of the 2018 World Wide Web Conference on World Wide Web,
                  {WWW} 2018, Lyon, France, April 23-27, 2018},
  pages        = {227--236},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3178876.3186089},
  doi          = {10.1145/3178876.3186089},
  timestamp    = {Fri, 16 Apr 2021 10:04:12 +0200},
  biburl       = {https://dblp.org/rec/conf/www/StarovZZMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/MiramirkhaniBFN18,
  author       = {Najmeh Miramirkhani and
                  Timothy Barron and
                  Michael Ferdman and
                  Nick Nikiforakis},
  editor       = {Pierre{-}Antoine Champin and
                  Fabien Gandon and
                  Mounia Lalmas and
                  Panagiotis G. Ipeirotis},
  title        = {Panning for gold.com: Understanding the Dynamics of Domain Dropcatching},
  booktitle    = {Proceedings of the 2018 World Wide Web Conference on World Wide Web,
                  {WWW} 2018, Lyon, France, April 23-27, 2018},
  pages        = {257--266},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3178876.3186092},
  doi          = {10.1145/3178876.3186092},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/MiramirkhaniBFN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/SrinivasanKMANA18,
  author       = {Bharat Srinivasan and
                  Athanasios Kountouras and
                  Najmeh Miramirkhani and
                  Monjur Alam and
                  Nick Nikiforakis and
                  Manos Antonakakis and
                  Mustaque Ahamad},
  editor       = {Pierre{-}Antoine Champin and
                  Fabien Gandon and
                  Mounia Lalmas and
                  Panagiotis G. Ipeirotis},
  title        = {Exposing Search and Advertisement Abuse Tactics and Infrastructure
                  of Technical Support Scammers},
  booktitle    = {Proceedings of the 2018 World Wide Web Conference on World Wide Web,
                  {WWW} 2018, Lyon, France, April 23-27, 2018},
  pages        = {319--328},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3178876.3186098},
  doi          = {10.1145/3178876.3186098},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/SrinivasanKMANA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/JohnsNVW18,
  author       = {Martin Johns and
                  Nick Nikiforakis and
                  Melanie Volkamer and
                  John Wilander},
  title        = {Web Application Security (Dagstuhl Seminar 18321)},
  journal      = {Dagstuhl Reports},
  volume       = {8},
  number       = {8},
  pages        = {1--17},
  year         = {2018},
  url          = {https://doi.org/10.4230/DagRep.8.8.1},
  doi          = {10.4230/DAGREP.8.8.1},
  timestamp    = {Fri, 22 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/JohnsNVW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BarronN17,
  author       = {Timothy Barron and
                  Nick Nikiforakis},
  title        = {Picky Attackers: Quantifying the Role of System Properties on Intruder
                  Behavior},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {387--398},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134614},
  doi          = {10.1145/3134600.3134614},
  timestamp    = {Tue, 06 Nov 2018 16:59:23 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BarronN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuoSHN17,
  author       = {Meng Luo and
                  Oleksii Starov and
                  Nima Honarmand and
                  Nick Nikiforakis},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Hindsight: Understanding the Evolution of {UI} Vulnerabilities in
                  Mobile Browsers},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {149--162},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133987},
  doi          = {10.1145/3133956.3133987},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LuoSHN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KintisMLCGPNA17,
  author       = {Panagiotis Kintis and
                  Najmeh Miramirkhani and
                  Charles Lever and
                  Yizheng Chen and
                  Rosa Romero G{\'{o}}mez and
                  Nikolaos Pitropakis and
                  Nick Nikiforakis and
                  Manos Antonakakis},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Hiding in Plain Sight: {A} Longitudinal Study of Combosquatting Abuse},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {569--586},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134002},
  doi          = {10.1145/3133956.3134002},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KintisMLCGPNA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VissersBGJN17,
  author       = {Thomas Vissers and
                  Timothy Barron and
                  Tom van Goethem and
                  Wouter Joosen and
                  Nick Nikiforakis},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {The Wolf of Name Street: Hijacking Domains Through Their Nameservers},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {957--970},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133988},
  doi          = {10.1145/3133956.3133988},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VissersBGJN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/MerzdovnikHBNNS17,
  author       = {Georg Merzdovnik and
                  Markus Huber and
                  Damjan Buhov and
                  Nick Nikiforakis and
                  Sebastian Neuner and
                  Martin Schmiedecker and
                  Edgar R. Weippl},
  title        = {Block Me If You Can: {A} Large-Scale Study of Tracker-Blocking Tools},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {319--333},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.26},
  doi          = {10.1109/EUROSP.2017.26},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/MerzdovnikHBNNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MiramirkhaniSN17,
  author       = {Najmeh Miramirkhani and
                  Oleksii Starov and
                  Nick Nikiforakis},
  title        = {Dial One for Scam: {A} Large-Scale Analysis of Technical Support Scams},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/dial-one-scam-large-scale-analysis-technical-support-scams/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/MiramirkhaniSN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/StarovN17,
  author       = {Oleksii Starov and
                  Nick Nikiforakis},
  title        = {{XHOUND:} Quantifying the Fingerprintability of Browser Extensions},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {941--956},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.18},
  doi          = {10.1109/SP.2017.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/StarovN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MiramirkhaniANP17,
  author       = {Najmeh Miramirkhani and
                  Mahathi Priya Appini and
                  Nick Nikiforakis and
                  Michalis Polychronakis},
  title        = {Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear
                  Artifacts},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {1009--1024},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.42},
  doi          = {10.1109/SP.2017.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MiramirkhaniANP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/MaricontiOANENS17,
  author       = {Enrico Mariconti and
                  Jeremiah Onaolapo and
                  Syed Sharique Ahmad and
                  Nicolas Nikiforou and
                  Manuel Egele and
                  Nick Nikiforakis and
                  Gianluca Stringhini},
  editor       = {Rick Barrett and
                  Rick Cummings and
                  Eugene Agichtein and
                  Evgeniy Gabrilovich},
  title        = {What's in a Name?: Understanding Profile Name Reuse on Twitter},
  booktitle    = {Proceedings of the 26th International Conference on World Wide Web,
                  {WWW} 2017, Perth, Australia, April 3-7, 2017},
  pages        = {1161--1170},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3038912.3052589},
  doi          = {10.1145/3038912.3052589},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/MaricontiOANENS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/StarovN17,
  author       = {Oleksii Starov and
                  Nick Nikiforakis},
  editor       = {Rick Barrett and
                  Rick Cummings and
                  Eugene Agichtein and
                  Evgeniy Gabrilovich},
  title        = {Extended Tracking Powers: Measuring the Privacy Diffusion Enabled
                  by Browser Extensions},
  booktitle    = {Proceedings of the 26th International Conference on World Wide Web,
                  {WWW} 2017, Perth, Australia, April 3-7, 2017},
  pages        = {1481--1490},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3038912.3052596},
  doi          = {10.1145/3038912.3052596},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/StarovN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MaricontiOANENS17,
  author       = {Enrico Mariconti and
                  Jeremiah Onaolapo and
                  Syed Sharique Ahmad and
                  Nicolas Nikiforou and
                  Manuel Egele and
                  Nick Nikiforakis and
                  Gianluca Stringhini},
  title        = {What's in a Name? Understanding Profile Name Reuse on Twitter},
  journal      = {CoRR},
  volume       = {abs/1702.04256},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.04256},
  eprinttype    = {arXiv},
  eprint       = {1702.04256},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MaricontiOANENS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-08519,
  author       = {Panagiotis Kintis and
                  Najmeh Miramirkhani and
                  Charles Lever and
                  Yizheng Chen and
                  Rosa Romero G{\'{o}}mez and
                  Nikolaos Pitropakis and
                  Nick Nikiforakis and
                  Manos Antonakakis},
  title        = {Hiding in Plain Sight: {A} Longitudinal Study of Combosquatting Abuse},
  journal      = {CoRR},
  volume       = {abs/1708.08519},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.08519},
  eprinttype    = {arXiv},
  eprint       = {1708.08519},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-08519.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-08331,
  author       = {Bharat Srinivasan and
                  Athanasios Kountouras and
                  Najmeh Miramirkhani and
                  Monjur Alam and
                  Nick Nikiforakis and
                  Manos Antonakakis and
                  Mustaque Ahamad},
  title        = {By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical
                  Support Scammers},
  journal      = {CoRR},
  volume       = {abs/1709.08331},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.08331},
  eprinttype    = {arXiv},
  eprint       = {1709.08331},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-08331.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/BielovaLNN17,
  author       = {Nataliia Bielova and
                  Nikolaos Laoutaris and
                  Arvind Narayanan and
                  Nick Nikiforakis},
  title        = {Online Privacy and Web Transparency (Dagstuhl Seminar 17162)},
  journal      = {Dagstuhl Reports},
  volume       = {7},
  number       = {4},
  pages        = {83--106},
  year         = {2017},
  url          = {https://doi.org/10.4230/DagRep.7.4.83},
  doi          = {10.4230/DAGREP.7.4.83},
  timestamp    = {Thu, 21 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/BielovaLNN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/StarovGN16,
  author       = {Oleksii Starov and
                  Phillipa Gill and
                  Nick Nikiforakis},
  title        = {Are You Sure You Want to Contact Us? Quantifying the Leakage of {PII}
                  via Website Contact Forms},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2016},
  number       = {1},
  pages        = {20--33},
  year         = {2016},
  url          = {https://doi.org/10.1515/popets-2015-0028},
  doi          = {10.1515/POPETS-2015-0028},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/StarovGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/MaricontiOANENS16,
  author       = {Enrico Mariconti and
                  Jeremiah Onaolapo and
                  Syed Sharique Ahmad and
                  Nicolas Nikiforou and
                  Manuel Egele and
                  Nick Nikiforakis and
                  Gianluca Stringhini},
  editor       = {Michalis Polychronakis and
                  Cristiano Giuffrida},
  title        = {Why allowing profile name reuse is a bad idea},
  booktitle    = {Proceedings of the 9th European Workshop on System Security, {EUROSEC}
                  2016, London, UK, April 18-21, 2016},
  pages        = {3:1--3:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2905760.2905762},
  doi          = {10.1145/2905760.2905762},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosec/MaricontiOANENS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/RafiqueGJHN16,
  author       = {M. Zubair Rafique and
                  Tom van Goethem and
                  Wouter Joosen and
                  Christophe Huygens and
                  Nick Nikiforakis},
  title        = {It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming
                  Services},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/free-reason-exploring-ecosystem-free-live-streaming-services.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/RafiqueGJHN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/StarovDAHN16,
  author       = {Oleksii Starov and
                  Johannes Dahse and
                  Syed Sharique Ahmad and
                  Thorsten Holz and
                  Nick Nikiforakis},
  editor       = {Jacqueline Bourdeau and
                  Jim Hendler and
                  Roger Nkambou and
                  Ian Horrocks and
                  Ben Y. Zhao},
  title        = {No Honor Among Thieves: {A} Large-Scale Analysis of Malicious Web
                  Shells},
  booktitle    = {Proceedings of the 25th International Conference on World Wide Web,
                  {WWW} 2016, Montreal, Canada, April 11 - 15, 2016},
  pages        = {1021--1032},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2872427.2882992},
  doi          = {10.1145/2872427.2882992},
  timestamp    = {Tue, 12 Apr 2022 14:46:29 +0200},
  biburl       = {https://dblp.org/rec/conf/www/StarovDAHN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MiramirkhaniSN16,
  author       = {Najmeh Miramirkhani and
                  Oleksii Starov and
                  Nick Nikiforakis},
  title        = {Dial One for Scam: Analyzing and Detecting Technical Support Scams},
  journal      = {CoRR},
  volume       = {abs/1607.06891},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.06891},
  eprinttype    = {arXiv},
  eprint       = {1607.06891},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MiramirkhaniSN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/RyckNDPJ15,
  author       = {Philippe De Ryck and
                  Nick Nikiforakis and
                  Lieven Desmet and
                  Frank Piessens and
                  Wouter Joosen},
  title        = {Protected Web Components: Hiding Sensitive Information in the Shadows},
  journal      = {{IT} Prof.},
  volume       = {17},
  number       = {1},
  pages        = {36--43},
  year         = {2015},
  url          = {https://doi.org/10.1109/MITP.2015.12},
  doi          = {10.1109/MITP.2015.12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/RyckNDPJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaoBNSEEKV15,
  author       = {Shuang Hao and
                  Kevin Borgolte and
                  Nick Nikiforakis and
                  Gianluca Stringhini and
                  Manuel Egele and
                  Michael Eubanks and
                  Brian Krebs and
                  Giovanni Vigna},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Drops for Stuff: An Analysis of Reshipping Mule Scams},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1081--1092},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813620},
  doi          = {10.1145/2810103.2813620},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HaoBNSEEKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GoethemJN15,
  author       = {Tom van Goethem and
                  Wouter Joosen and
                  Nick Nikiforakis},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {The Clock is Still Ticking: Timing Attacks in the Modern Web},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1382--1393},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813632},
  doi          = {10.1145/2810103.2813632},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GoethemJN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VissersGJN15,
  author       = {Thomas Vissers and
                  Tom van Goethem and
                  Wouter Joosen and
                  Nick Nikiforakis},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Maneuvering Around Clouds: Bypassing Cloud-based Security Providers},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1530--1541},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813633},
  doi          = {10.1145/2810103.2813633},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VissersGJN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AgtenJPN15,
  author       = {Pieter Agten and
                  Wouter Joosen and
                  Frank Piessens and
                  Nick Nikiforakis},
  title        = {Seven Months' Worth of Mistakes: {A} Longitudinal Study of Typosquatting
                  Abuse},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/seven-months-worth-mistakes-longitudinal-study-typosquatting-abuse},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AgtenJPN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/VissersJN15,
  author       = {Thomas Vissers and
                  Wouter Joosen and
                  Nick Nikiforakis},
  title        = {Parking Sensors: Analyzing and Detecting Parked Domains},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/parking-sensors-analyzing-and-detecting-parked-domains},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/VissersJN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/NikiforakisJL15,
  author       = {Nick Nikiforakis and
                  Wouter Joosen and
                  Benjamin Livshits},
  editor       = {Aldo Gangemi and
                  Stefano Leonardi and
                  Alessandro Panconesi},
  title        = {PriVaricator: Deceiving Fingerprinters with Little White Lies},
  booktitle    = {Proceedings of the 24th International Conference on World Wide Web,
                  {WWW} 2015, Florence, Italy, May 18-22, 2015},
  pages        = {820--830},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2736277.2741090},
  doi          = {10.1145/2736277.2741090},
  timestamp    = {Tue, 27 Dec 2022 09:06:31 +0100},
  biburl       = {https://dblp.org/rec/conf/www/NikiforakisJL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/NikiforakisKJKPV14,
  author       = {Nick Nikiforakis and
                  Alexandros Kapravelos and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna},
  title        = {On the Workings and Current Practices of Web-Based Device Fingerprinting},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {28--36},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.160},
  doi          = {10.1109/MSP.2013.160},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/NikiforakisKJKPV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GroefDNP14,
  author       = {Willem De Groef and
                  Dominique Devriese and
                  Nick Nikiforakis and
                  Frank Piessens},
  title        = {Secure multi-execution of web scripts: Theory and practice},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {469--509},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-130495},
  doi          = {10.3233/JCS-130495},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GroefDNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AckerNDPJ14,
  author       = {Steven {Van Acker} and
                  Nick Nikiforakis and
                  Lieven Desmet and
                  Frank Piessens and
                  Wouter Joosen},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {Monkey-in-the-browser: malware and vulnerabilities in augmented browsing
                  script markets},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {525--530},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590311},
  doi          = {10.1145/2590296.2590311},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AckerNDPJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GoethemPJN14,
  author       = {Tom van Goethem and
                  Frank Piessens and
                  Wouter Joosen and
                  Nick Nikiforakis},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {918--929},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660279},
  doi          = {10.1145/2660267.2660279},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GoethemPJN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/NikiforakisBDPJ14,
  author       = {Nick Nikiforakis and
                  Marco Balduzzi and
                  Lieven Desmet and
                  Frank Piessens and
                  Wouter Joosen},
  editor       = {Sherman S. M. Chow and
                  Jan Camenisch and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Soundsquatting: Uncovering the Use of Homophones in Domain Squatting},
  booktitle    = {Information Security - 17th International Conference, {ISC} 2014,
                  Hong Kong, China, October 12-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8783},
  pages        = {291--308},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13257-0\_17},
  doi          = {10.1007/978-3-319-13257-0\_17},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/NikiforakisBDPJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/ChenNDH14,
  author       = {Ping Chen and
                  Nick Nikiforakis and
                  Lieven Desmet and
                  Christophe Huygens},
  editor       = {Ehab Al{-}Shaer and
                  Krishna Kant},
  title        = {Security Analysis of the Chinese Web: How well is it protected?},
  booktitle    = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence
                  and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  pages        = {3--9},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665936.2665938},
  doi          = {10.1145/2665936.2665938},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/ChenNDH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/GoethemCNDJ14,
  author       = {Tom van Goethem and
                  Ping Chen and
                  Nick Nikiforakis and
                  Lieven Desmet and
                  Wouter Joosen},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Large-Scale Security Analysis of the Web: Challenges and Findings},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {110--126},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_8},
  doi          = {10.1007/978-3-319-08593-7\_8},
  timestamp    = {Wed, 25 Sep 2019 18:21:56 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/GoethemCNDJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/NikiforakisMSRJKPVZ14,
  author       = {Nick Nikiforakis and
                  Federico Maggi and
                  Gianluca Stringhini and
                  M. Zubair Rafique and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna and
                  Stefano Zanero},
  editor       = {Chin{-}Wan Chung and
                  Andrei Z. Broder and
                  Kyuseok Shim and
                  Torsten Suel},
  title        = {Stranger danger: exploring the ecosystem of ad-based {URL} shortening
                  services},
  booktitle    = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic
                  of Korea, April 7-11, 2014},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2566486.2567983},
  doi          = {10.1145/2566486.2567983},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/NikiforakisMSRJKPVZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GadaletaNMJ14,
  author       = {Francesco Gadaleta and
                  Nick Nikiforakis and
                  Jan Tobias M{\"{u}}hlberg and
                  Wouter Joosen},
  title        = {HyperForce: Hypervisor-enForced Execution of Security-Critical Code},
  journal      = {CoRR},
  volume       = {abs/1405.5648},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.5648},
  eprinttype    = {arXiv},
  eprint       = {1405.5648},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GadaletaNMJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GadaletaNYJ14,
  author       = {Francesco Gadaleta and
                  Nick Nikiforakis and
                  Yves Younan and
                  Wouter Joosen},
  title        = {Hello rootKitty: {A} lightweight invariance-enforcing framework},
  journal      = {CoRR},
  volume       = {abs/1405.5651},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.5651},
  eprinttype    = {arXiv},
  eprint       = {1405.5651},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GadaletaNYJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GadaletaSNPJ14,
  author       = {Francesco Gadaleta and
                  Raoul Strackx and
                  Nick Nikiforakis and
                  Frank Piessens and
                  Wouter Joosen},
  title        = {On the effectiveness of virtualization-based security},
  journal      = {CoRR},
  volume       = {abs/1405.6058},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.6058},
  eprinttype    = {arXiv},
  eprint       = {1405.6058},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GadaletaSNPJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RyckNDJ13,
  author       = {Philippe De Ryck and
                  Nick Nikiforakis and
                  Lieven Desmet and
                  Wouter Joosen},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {TabShots: client-side detection of tabnabbing attacks},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {447--456},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484371},
  doi          = {10.1145/2484313.2484371},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RyckNDJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AcarJNDGPP13,
  author       = {Gunes Acar and
                  Marc Juarez and
                  Nick Nikiforakis and
                  Claudia D{\'{\i}}az and
                  Seda F. G{\"{u}}rses and
                  Frank Piessens and
                  Bart Preneel},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {FPDetective: dusting the web for fingerprinters},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1129--1140},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516674},
  doi          = {10.1145/2508859.2516674},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AcarJNDGPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/NikiforakisPJ13,
  author       = {Nick Nikiforakis and
                  Frank Piessens and
                  Wouter Joosen},
  editor       = {Konrad Rieck and
                  Patrick Stewin and
                  Jean{-}Pierre Seifert},
  title        = {HeapSentry: Kernel-Assisted Protection against Heap Overflows},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 10th International Conference, {DIMVA} 2013, Berlin, Germany, July
                  18-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7967},
  pages        = {177--196},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39235-1\_11},
  doi          = {10.1007/978-3-642-39235-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/NikiforakisPJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChenNHD13,
  author       = {Ping Chen and
                  Nick Nikiforakis and
                  Christophe Huygens and
                  Lieven Desmet},
  editor       = {Yvo Desmedt},
  title        = {A Dangerous Mix: Large-Scale Analysis of Mixed-Content Websites},
  booktitle    = {Information Security, 16th International Conference, {ISC} 2013, Dallas,
                  Texas, USA, November 13-15, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7807},
  pages        = {354--363},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-27659-5\_25},
  doi          = {10.1007/978-3-319-27659-5\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ChenNHD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NikiforakisKJKPV13,
  author       = {Nick Nikiforakis and
                  Alexandros Kapravelos and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna},
  title        = {Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {541--555},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.43},
  doi          = {10.1109/SP.2013.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/NikiforakisKJKPV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/NikiforakisAMDPJ13,
  author       = {Nick Nikiforakis and
                  Steven {Van Acker} and
                  Wannes Meert and
                  Lieven Desmet and
                  Frank Piessens and
                  Wouter Joosen},
  editor       = {Daniel Schwabe and
                  Virg{\'{\i}}lio A. F. Almeida and
                  Hartmut Glaser and
                  Ricardo Baeza{-}Yates and
                  Sue B. Moon},
  title        = {Bitsquatting: exploiting bit-flips for fun, or profit?},
  booktitle    = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro,
                  Brazil, May 13-17, 2013},
  pages        = {989--998},
  publisher    = {International World Wide Web Conferences Steering Committee / {ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488388.2488474},
  doi          = {10.1145/2488388.2488474},
  timestamp    = {Sun, 22 Sep 2019 18:15:38 +0200},
  biburl       = {https://dblp.org/rec/conf/www/NikiforakisAMDPJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AckerNDJP12,
  author       = {Steven {Van Acker} and
                  Nick Nikiforakis and
                  Lieven Desmet and
                  Wouter Joosen and
                  Frank Piessens},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {FlashOver: automated discovery of cross-site scripting vulnerabilities
                  in rich internet applications},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {12--13},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414462},
  doi          = {10.1145/2414456.2414462},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AckerNDJP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NikiforakisIKAJKPV12,
  author       = {Nick Nikiforakis and
                  Luca Invernizzi and
                  Alexandros Kapravelos and
                  Steven {Van Acker} and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {You are what you include: large-scale evaluation of remote javascript
                  inclusions},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {736--747},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382274},
  doi          = {10.1145/2382196.2382274},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NikiforakisIKAJKPV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GroefDNP12,
  author       = {Willem De Groef and
                  Dominique Devriese and
                  Nick Nikiforakis and
                  Frank Piessens},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {FlowFox: a web browser with flexible and precise information flow
                  control},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {748--759},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382275},
  doi          = {10.1145/2382196.2382275},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GroefDNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dais/RyckNDPJ12,
  author       = {Philippe De Ryck and
                  Nick Nikiforakis and
                  Lieven Desmet and
                  Frank Piessens and
                  Wouter Joosen},
  editor       = {Karl M. G{\"{o}}schka and
                  Seif Haridi},
  title        = {Serene: Self-Reliant Client-Side Protection against Session Fixation},
  booktitle    = {Distributed Applications and Interoperable Systems - 12th {IFIP} {WG}
                  6.1 International Conference, {DAIS} 2012, Stockholm, Sweden, June
                  13-16, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7272},
  pages        = {59--72},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30823-9\_5},
  doi          = {10.1007/978-3-642-30823-9\_5},
  timestamp    = {Tue, 21 Mar 2023 20:54:01 +0100},
  biburl       = {https://dblp.org/rec/conf/dais/RyckNDPJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/NoormanNP12,
  author       = {Job Noorman and
                  Nick Nikiforakis and
                  Frank Piessens},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {There Is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {105--120},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_8},
  doi          = {10.1007/978-3-642-34210-3\_8},
  timestamp    = {Sat, 19 Oct 2019 20:02:02 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/NoormanNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/NikiforakisAPJ12,
  author       = {Nick Nikiforakis and
                  Steven {Van Acker} and
                  Frank Piessens and
                  Wouter Joosen},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Matthew K. Wright},
  title        = {Exploring the Ecosystem of Referrer-Anonymizing Services},
  booktitle    = {Privacy Enhancing Technologies - 12th International Symposium, {PETS}
                  2012, Vigo, Spain, July 11-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7384},
  pages        = {259--278},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31680-7\_14},
  doi          = {10.1007/978-3-642-31680-7\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/NikiforakisAPJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LekiesNTPJ12,
  author       = {Sebastian Lekies and
                  Nick Nikiforakis and
                  Walter Tighzert and
                  Frank Piessens and
                  Martin Johns},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {{DEMACRO:} Defense against Malicious Cross-Domain Requests},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {254--273},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_13},
  doi          = {10.1007/978-3-642-33338-5\_13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LekiesNTPJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/GadaletaNMJ12,
  author       = {Francesco Gadaleta and
                  Nick Nikiforakis and
                  Jan Tobias M{\"{u}}hlberg and
                  Wouter Joosen},
  editor       = {Dimitris Gritzalis and
                  Steven Furnell and
                  Marianthi Theoharidou},
  title        = {HyperForce: Hypervisor-enForced Execution of Security-Critical Code},
  booktitle    = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information
                  Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece,
                  June 4-6, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {376},
  pages        = {126--137},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30436-1\_11},
  doi          = {10.1007/978-3-642-30436-1\_11},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/GadaletaNMJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/AgtenNSGP12,
  author       = {Pieter Agten and
                  Nick Nikiforakis and
                  Raoul Strackx and
                  Willem De Groef and
                  Frank Piessens},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Recent Developments in Low-Level Software Security},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_1},
  doi          = {10.1007/978-3-642-30955-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/AgtenNSGP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WilanderNYKJ11,
  author       = {John Wilander and
                  Nick Nikiforakis and
                  Yves Younan and
                  Mariam Kamkar and
                  Wouter Joosen},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {{RIPE:} runtime intrusion prevention evaluator},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076739},
  doi          = {10.1145/2076732.2076739},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WilanderNYKJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/NikiforakisMYJJ11,
  author       = {Nick Nikiforakis and
                  Wannes Meert and
                  Yves Younan and
                  Martin Johns and
                  Wouter Joosen},
  editor       = {{\'{U}}lfar Erlingsson and
                  Roel J. Wieringa and
                  Nicola Zannone},
  title        = {SessionShield: Lightweight Protection against Session Hijacking},
  booktitle    = {Engineering Secure Software and Systems - Third International Symposium,
                  ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6542},
  pages        = {87--100},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19125-1\_7},
  doi          = {10.1007/978-3-642-19125-1\_7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/NikiforakisMYJJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/NikiforakisJJ11,
  author       = {Nick Nikiforakis and
                  Wouter Joosen and
                  Martin Johns},
  editor       = {Engin Kirda and
                  Steven Hand},
  title        = {Abusing locality in shared web hosting},
  booktitle    = {Proceedings of the Fourth European Workshop on System Security, EUROSEC'11,
                  April 10, 2011, Salzburg, Austria},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1972551.1972553},
  doi          = {10.1145/1972551.1972553},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosec/NikiforakisJJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GadaletaNYJ11,
  author       = {Francesco Gadaleta and
                  Nick Nikiforakis and
                  Yves Younan and
                  Wouter Joosen},
  editor       = {Xuejia Lai and
                  Jianying Zhou and
                  Hui Li},
  title        = {Hello rootKitty: {A} Lightweight Invariance-Enforcing Framework},
  booktitle    = {Information Security, 14th International Conference, {ISC} 2011, Xi'an,
                  China, October 26-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7001},
  pages        = {213--228},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24861-0\_15},
  doi          = {10.1007/978-3-642-24861-0\_15},
  timestamp    = {Tue, 20 Aug 2024 07:54:44 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/GadaletaNYJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/NikiforakisBAJB11,
  author       = {Nick Nikiforakis and
                  Marco Balduzzi and
                  Steven {Van Acker} and
                  Wouter Joosen and
                  Davide Balzarotti},
  editor       = {Christopher Kruegel},
  title        = {Exposing the Lack of Privacy in File Hosting Services},
  booktitle    = {4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '11, Boston, MA, USA, March 29, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/leet11/exposing-lack-privacy-file-hosting-services},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/leet/NikiforakisBAJB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/NikiforakisYJ10,
  author       = {Nick Nikiforakis and
                  Yves Younan and
                  Wouter Joosen},
  editor       = {Christian Kreibich and
                  Marko Jahnke},
  title        = {HProxy: Client-Side Detection of {SSL} Stripping Attacks},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  7th International Conference, {DIMVA} 2010, Bonn, Germany, July 8-9,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6201},
  pages        = {200--218},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14215-4\_12},
  doi          = {10.1007/978-3-642-14215-4\_12},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/NikiforakisYJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/AckerNPYP10,
  author       = {Steven {Van Acker} and
                  Nick Nikiforakis and
                  Pieter Philippaerts and
                  Yves Younan and
                  Frank Piessens},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {ValueGuard: Protection of Native Applications against Data-Only Buffer
                  Overflows},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_12},
  doi          = {10.1007/978-3-642-17714-9\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/AckerNPYP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}