Evangelos P. Markatos

Orcid: 0000-0003-3563-7733

Affiliations:
  • Foundation for Research & Technology - Hellas (FORTH), Heraklion, Greece
  • University of Crete, Department of Computer Science, Heraklion, Greece


According to our database1, Evangelos P. Markatos authored at least 163 papers between 1989 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Before & After: The Effect of EU's 2022 Code of Practice on Disinformation.
CoRR, 2024

Ad Laundering: How Websites Deceive Advertisers into Rendering Ads Next to Illicit Content.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Evaluating the utility of human mobility data under local differential privacy.
Proceedings of the 25th IEEE International Conference on Mobile Data Management, 2024

2023
The Devil is in the Details: Analyzing the Lucrative Ad Fraud Patterns of the Online Ad Ecosystem.
CoRR, 2023

Who Funds Misinformation? A Systematic Analysis of the Ad-related Profit Routines of Fake News Sites.
Proceedings of the ACM Web Conference 2023, 2023

The Hitchhiker's Guide to Facebook Web Tracking with Invisible Pixels and Click IDs.
Proceedings of the ACM Web Conference 2023, 2023

Practical Crowdsourcing of Wearable IoT Data with Local Differential Privacy.
Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, 2023

Not only E.T. Phones Home: Analysing the Native User Tracking of Mobile Browsers.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

FNDaaS: Content-agnostic Detection of Websites Distributing Fake News.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
CC-DRIVER: Understanding the Technical Drivers of Cybercrime.
ERCIM News, 2022

FNDaaS: Content-agnostic Detection of Fake News sites.
CoRR, 2022

Leveraging Google's Publisher-Specific IDs to Detect Website Administration.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

YouTubers Not madeForKids: Detecting Channels Sharing Inappropriate Videos Targeting Children.
Proceedings of the WebSci '22: 14th ACM Web Science Conference 2022, Barcelona, Spain, June 26, 2022

Federated Naive Bayes under Differential Privacy.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

What your Fitbit Says about You: De-anonymizing Users in Lifelogging Datasets.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Measuring the (Over)use of Service Workers for In-Page Push Advertising Purposes.
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022

How to Publish Wearables' Data: Practical Guidelines to Protect User Privacy.
Proceedings of the Challenges of Trustable AI and Added-Value on Health, 2022

I just wanted to track my steps! Blocking unwanted traffic of Fitbit devices.
Proceedings of the 12th International Conference on the Internet of Things, 2022

Towards a Realistic Decentralized Naive Bayes with Differential Privacy.
Proceedings of the E-Business and Telecommunications - 19th International Conference, 2022

OUTOPIA: private user discovery on the internet.
Proceedings of the EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on Systems Security, 2022

Towards a decentralized infrastructure for data marketplaces: narrowing the gap between academia and industry.
Proceedings of the 1st International Workshop on Data Economy, 2022

2021
YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Check-It: A plugin for detecting fake news on the web.
Online Soc. Networks Media, 2021

Stakeholder perspectives and requirements on cybersecurity in Europe.
J. Inf. Secur. Appl., 2021

Be Daring to Push your Ads Forward: Measuring the (Over)use of Service Workers for Advertising Purposes.
CoRR, 2021

User Tracking in the Post-cookie Era: How Websites Bypass GDPR Consent to Track Users.
Proceedings of the WWW '21: The Web Conference 2021, 2021

The Rise and Fall of Fake News sites: A Traffic Analysis.
Proceedings of the WebSci '21: 13th ACM Web Science Conference 2021, 2021

User Identification from Time Series of Fitness Data.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Do partner apps offer the same level of privacy protection? The case of wearable applications.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

PDS<sup>2</sup>: A user-centered decentralized marketplace for privacy preserving data processing.
Proceedings of the 37th IEEE International Conference on Data Engineering Workshops, 2021

I still See You! Inferring Fitness Data from Encrypted Traffic of Wearables.
Proceedings of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies, 2021

2020
MANDOLA: A Big-Data Processing and Visualization Platform for Monitoring and Detecting Online Hate Speech.
ACM Trans. Internet Techn., 2020

Design and Implementation of a Compressed Certificate Status Protocol.
ACM Trans. Internet Techn., 2020

The EuroSys 2020 Online Conference: Experience and lessons learned.
CoRR, 2020

Beyond Black and White: Combining the Benefits of Regular and Incognito Browsing Modes.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Do You Know Who Is Talking to Your Wearable Smartband?
Proceedings of the Integrated Citizen Centered Digital Health and Social Care - Citizens as Data Producers and Service co-Creators, 2020

2019
The coin that never sleeps. The privacy preserving usage of Bitcoin in a longitudinal analysis as a speculative asset.
CoRR, 2019

Measuring ad value without bankrupting user privacy.
CoRR, 2019

Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask.
Proceedings of the World Wide Web Conference, 2019

Check-It: A plugin for Detecting and Reducing the Spread of Fake News and Misinformation on the Web.
Proceedings of the 2019 IEEE/WIC/ACM International Conference on Web Intelligence, 2019

Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking.
Proceedings of the Information Security - 22nd International Conference, 2019

No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem.
Proceedings of the Internet Measurement Conference, 2019

Is Privacy possible without Anonymity?: The case for microblogging services.
Proceedings of the 12th European Workshop on Systems Security, 2019

REAPER: Real-time App Analysis for Augmenting the Android Permission System.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Truth in Web Mining: Measuring the Profitability and Cost of Cryptominers as a Web Monetization Model.
CoRR, 2018

The Cost of Digital Advertisement: Comparing User and Advertiser Views.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Incognitus: Privacy-Preserving User Interests in Online Social Networks.
Proceedings of the Information and Operational Technology Security Systems, 2018

Øpass: Zero-storage Password Management Based on Password Reminders.
Proceedings of the 11th European Workshop on Systems Security, 2018

Exclusive: How the (synced) Cookie Monster breached my encrypted VPN session.
Proceedings of the 11th European Workshop on Systems Security, 2018

Where's Wally?: How to Privately Discover your Friends on the Internet.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Measurement, Modeling, and Analysis of the Mobile App Ecosystem.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2017

The Long-Standing Privacy Debate: Mobile Websites vs Mobile Apps.
Proceedings of the 26th International Conference on World Wide Web, 2017

CCSP: A compressed certificate status protocol.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

No Sugar but All the Taste! Memory Encryption Without Architectural Support.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
LEoNIDS: A Low-Latency and Energy-Efficient Network-Level Intrusion Detection System.
IEEE Trans. Emerg. Top. Comput., 2016

SENTER: A Network of the European Centres of Excellence in Cyber Crime Research, Training, and Education.
ERCIM News, 2016

Mandola: Monitoring and Detecting Online Hate Speech.
ERCIM News, 2016

Provable Network Activity for Protecting Users Against False Accusation.
Proceedings of the Information Security Theory and Practice, 2016

DCSP: performant certificate revocation a DNS-based approach.
Proceedings of the 9th European Workshop on System Security, 2016

2015
European Cyber-Security Research and Innovation.
ERCIM News, 2015

2014
Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks.
IEEE J. Sel. Areas Commun., 2014

2013
ITA: Innocuous Topology Awareness for Unstructured P2P Networks.
IEEE Trans. Parallel Distributed Syst., 2013

Rise of the planet of the apps: a systematic study of the mobile app ecosystem.
Proceedings of the 2013 Internet Measurement Conference, 2013

Scap: stream-oriented network traffic capture and analysis for high-speed networks.
Proceedings of the 2013 Internet Measurement Conference, 2013

The man who <i>was</i> there: validating check-ins in location-based services.
Proceedings of the Annual Computer Security Applications Conference, 2013

k-subscription: privacy-preserving microblogging browsing through obfuscation.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Minimizing information disclosure to third parties in social login platforms.
Int. J. Inf. Sec., 2012

i-Code: Real-Time Malicious Code Identification.
ERCIM News, 2012

SysSec: Managing Threats and Vulnerabilities in the Future Internet.
ERCIM News, 2012

Improving the performance of passive network monitoring applications with memory locality enhancements.
Comput. Commun., 2012

Privacy-Preserving Social Plugins.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Tolerating Overload Attacks Against Packet Capturing Systems.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

Digging up social structures from documents on the web.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
we.b: the web of short urls.
Proceedings of the 20th International Conference on World Wide Web, 2011

Dynamic Monitoring of Dark IP Address Space (Poster).
Proceedings of the Traffic Monitoring and Analysis - Third International Workshop, 2011

Detecting social network profile cloning.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms.
Proceedings of the Information Security, 14th International Conference, 2011

Combining static and dynamic analysis for the detection of malicious documents.
Proceedings of the Fourth European Workshop on System Security, 2011

An empirical study on the security of cross-domain policies in rich internet applications.
Proceedings of the Fourth European Workshop on System Security, 2011

dead.drop: URL-Based Stealthy Messaging.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011

2010
Understanding the behavior of malicious applications in social networks.
IEEE Netw., 2010

Using social networks to harvest email addresses.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

xJS: Practical XSS Prevention for Web Application Development.
Proceedings of the USENIX Conference on Web Application Development, 2010

MOR: Monitoring and Measurements through the Onion Router.
Proceedings of the Passive and Active Measurement, 11th International Conference, 2010

A Systematic Characterization of IM Threats using Honeypots.
Proceedings of the Network and Distributed System Security Symposium, 2010

RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage.
Proceedings of the MASCOTS 2010, 2010

An Architecture for Enforcing JavaScript Randomization in Web2.0 Applications.
Proceedings of the Information Security - 13th International Conference, 2010

Improving the accuracy of network intrusion detection systems under load using selective packet discarding.
Proceedings of the Third European Workshop on System Security, 2010

D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks.
Proceedings of the Computer Security, 2010

Comprehensive shellcode detection using runtime heuristics.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Hash-Based Overlay Partitioning in Unstructured Peer-to-Peer Systems.
Parallel Process. Lett., 2009

On looking FORWARD.
ERCIM News, 2009

Real-world Detection of Polymorphic Attacks.
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009

Regular Expression Matching on Graphics Hardware for Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Imbuing Unstructured P2P Systems with Non-Intrusive Topology Awareness.
Proceedings of the Proceedings P2P 2009, 2009

HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing.
Proceedings of the Third International Conference on Network and System Security, 2009

Realistic Passive Packet Loss Measurement for High-Speed Networks.
Proceedings of the Traffic Monitoring and Analysis, First International Workshop, 2009

One-click hosting services: a file-sharing hideout.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

2008
Gnort: High Performance Network Intrusion Detection Using Graphics Processors.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Topnet: A Network-aware top(1).
Proceedings of the 22nd Large Installation System Administration Conference, 2008

Compromising Anonymity Using Packet Spinning.
Proceedings of the Information Security, 11th International Conference, 2008

Antisocial Networks: Turning a Social Network into a Botnet.
Proceedings of the Information Security, 11th International Conference, 2008

Real-world polymorphic attack detection using network-level emulation.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

2007
Network-level polymorphic shellcode detection using emulation.
J. Comput. Virol., 2007

Failure Management in Grids: the Case of the EGEE Infrastructure.
Parallel Process. Lett., 2007

Defending against hitlist worms using network address space randomization.
Comput. Networks, 2007

Flexible and high-performance anonymization of NetFlow records using anontool.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Emulation-Based Detection of Non-self-contained Polymorphic Shellcode.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

Improving the Performance of Passive Network Monitoring Applications using Locality Buffering.
Proceedings of the 15th International Symposium on Modeling, 2007

GAS: Overloading a File Sharing Network as an Anonymizing System.
Proceedings of the Advances in Information and Computer Security, 2007

2006
An Active Splitter Architecture for Intrusion Detection and Prevention.
IEEE Trans. Dependable Secur. Comput., 2006

DiMAPI: An Application Programming Interface for Distributed Network Monitoring.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

A Generic Anonymization Framework for Network Traffic.
Proceedings of IEEE International Conference on Communications, 2006

Divide et Impera: Partitioning Unstructured Peer-to-Peer Systems to Improve Resource Location.
Proceedings of the Achievements in European Research on Grid Systems: CoreGRID Integration Workshop 2006, 2006

Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Detecting Targeted Attacks Using Shadow Honeypots.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Design and Implementation of a High-Performance Network Intrusion Prevention System.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Efficient content-based detection of zero-day worms.
Proceedings of IEEE International Conference on Communications, 2005

2004
Generating realistic workloads for network intrusion detection systems.
Proceedings of the Fourth International Workshop on Software and Performance, 2004

Performance Analysis of Content Matching Intrusion Detection Systems.
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004

Design of an application programming interface for IP network monitoring.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Topic 3: Scheduling and Load Balancing.
Proceedings of the Euro-Par 2004 Parallel Processing, 2004

2003
E<sup>2</sup>xB: A Domain-Specific String Matching Algorithm for Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Code Generation for Packet Header Intrusion Analysis on the IXP1200 Network Processor.
Proceedings of the Software and Compilers for Embedded Systems, 7th International Workshop, 2003

SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks.
Proceedings of the Management of Multimedia Networks and Services, 2003

An Active Traffic Splitter Architecture for Intrusion Detection.
Proceedings of the 11th International Workshop on Modeling, 2003

2002
Web-conscious storage management for web proxies.
IEEE/ACM Trans. Netw., 2002

Tracing a Large-Scale Peer to Peer System: An Hour in the Life of Gnutella.
Proceedings of the 2nd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2002), 2002

2001
On caching search engine query results.
Comput. Commun., 2001

1999
On Using Reliable Network RAM in Networks of Workstations.
Parallel Distributed Comput. Pract., 1999

Adaptive and Reliable Paging to Remote Main Memory.
J. Parallel Distributed Comput., 1999

The Remote Enqueue Operation on Networks of Workstations.
Informatica (Slovenia), 1999

On using network RAM as a non-volatile buffer.
Clust. Comput., 1999

The Network RamDisk: Using remote memory on heterogeneous NOWs.
Clust. Comput., 1999

Secondary Storage Management for Web Proxies.
Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems, 1999

1998
PaperFinder: A Tool for Scalable Search of Digital Libraries.
Proceedings of WebNet 98, 1998

Lightweight Transactions on Networks of Workstations.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

The Remote Enqueue Operation on Networks of Workstations.
Proceedings of the Network-Based Parallel Computing: Communication, 1998

1997
Visualizing Working Sets.
ACM SIGOPS Oper. Syst. Rev., 1997

Telegraphos: A Substrate for High-Performance Computing on Workstation Clusters.
J. Parallel Distributed Comput., 1997

Execution of Compute-Intensive Applications into Parallel Machines.
Inf. Sci., 1997

User-Level DMA without Operating System Kernel Modification.
Proceedings of the 3rd IEEE Symposium on High-Performance Computer Architecture (HPCA '97), 1997

ATLAS: A Single-Chip ATM Switch for NOWs.
Proceedings of the Communication and Architectural Support for Network-Based Parallel Computing, 1997

1996
Main Memory Caching of Web Documents.
Comput. Networks, 1996

Implementation of a Reliable Remote Memory Pager.
Proceedings of the USENIX Annual Technical Conference, 1996

Issues in Reliable Network Memory Paging.
Proceedings of the MASCOTS '96, 1996

Using Remote Memory to Avoid Disk Thrashing: A Simulation Study.
Proceedings of the MASCOTS '96, 1996

Telegraphos: High-Performance Networking for Parallel Processing on Workstation Clusters.
Proceedings of the Second International Symposium on High-Performance Computer Architecture, 1996

1994
Using Processor Affinity in Loop Scheduling on Shared-Memory Multiprocessors.
IEEE Trans. Parallel Distributed Syst., 1994

Using Reference Counters in Update-Based Coherent Memory.
Proceedings of the PARLE '94: Parallel Architectures and Languages Europe, 1994

Trace-Driven Simulation of Data-Alignment and Ohter Factors Affecting Update and Invalidate Based Coherent Memory.
Proceedings of the MASCOTS '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31, 1994

1993
How Architecture Evolution Influences the Scheduling Discipline used in Shared-Memory Multiprocessors.
Proceedings of the Parallel Computing: Trends and Applications, 1993

1992
Shared Memory vs. Message Passing in Shared-Memory Multiprocessors.
Proceedings of the Fourth IEEE Symposium on Parallel and Distributed Processing, 1992

Load Balancing vs. Locality Management in Shared-Memory Multiprocessors.
Proceedings of the 1992 International Conference on Parallel Processing, 1992

1991
The effects of multiprogramming on barrier synchronization.
Proceedings of the Third IEEE Symposium on Parallel and Distributed Processing, 1991

Multiprogramming on multiprocessors.
Proceedings of the Third IEEE Symposium on Parallel and Distributed Processing, 1991

First-Class User-Level Theads.
Proceedings of the Thirteenth ACM Symposium on Operating System Principles, 1991

1989
Implementation Issues for the Psyche Multiprocessor Operating System.
Comput. Syst., 1989


  Loading...