Iasonas Polakis
Orcid: 0000-0001-5034-0730
According to our database1,
Iasonas Polakis
authored at least 59 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted Advertising.
Proceedings of the 33rd USENIX Security Symposium, 2024
Abandon All Hope Ye Who Enter Here: A Dynamic, Longitudinal Investigation of Android's Data Safety Section.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild.
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting.
Proceedings of the 31st USENIX Security Symposium, 2022
Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention.
Proceedings of the 31st USENIX Security Symposium, 2022
Towards Automated Auditing for Account and Session Management Flaws in Single Sign-On Deployments.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
The Seven Deadly Sins of the HTML5 WebAPI: A Large-scale Study on the Risks of Mobile Sensor-based Attacks.
ACM Trans. Priv. Secur., 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Chameleons' Oblivion: Complex-Valued Deep Neural Networks for Protocol-Agnostic RF Device Fingerprinting.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Fill in the Blanks: Empirical Analysis of the Privacy Threats of Browser Form Autofill.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Deep Complex Networks for Protocol-Agnostic Radio Frequency Device Fingerprinting in the Wild.
CoRR, 2019
A Large-scale Study on the Risks of the HTML5 WebAPI for Mobile Sensor-based Attacks.
Proceedings of the World Wide Web Conference, 2019
Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web.
Proceedings of the 27th USENIX Security Symposium, 2018
2017
ACM Trans. Priv. Secur., 2017
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
In (Cyber)Space Bots Can Hear You Speak: Breaking Audio CAPTCHAs Using OTS Speech Recognition.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017
2016
Soc. Netw. Anal. Min., 2016
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015
2014
Online social networks from a malicious perspective: novel attack techniques and defense mechanisms
PhD thesis, 2014
Proceedings of the Social Informatics - SocInfo 2014 International Workshops, Barcelona, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014
2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the 20th International Conference on World Wide Web, 2011
Proceedings of the Traffic Monitoring and Analysis - Third International Workshop, 2011
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011
An empirical study on the security of cross-domain policies in rich internet applications.
Proceedings of the Fourth European Workshop on System Security, 2011
Proceedings of the Seventh European Conference on Computer Network Defense, 2011
Proceedings of the First SysSec Workshop 2011, 2011
Proceedings of the First SysSec Workshop 2011, 2011
2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the Computer Security, 2010