Nick Nikiforakis
Orcid: 0000-0002-9366-357X
According to our database1,
Nick Nikiforakis
authored at least 101 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Smudged Fingerprints: Characterizing and Improving the Performance of Web Application Fingerprinting.
Proceedings of the 33rd USENIX Security Symposium, 2024
Manufactured Narratives: On the Potential of Manipulating Social Media to Politicize World Events.
Proceedings of the IEEE Security and Privacy, 2024
The Times They Are A-Changin': Characterizing Post-Publication Changes to Online News.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IFIP Networking Conference, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the ACM Web Conference 2023, 2023
Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
2022
Verba Volant, Scripta Volant: Understanding Post-publication Title Changes in News Outlets.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Proceedings of the 4th Network Traffic Measurement and Analysis Conference, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Unnecessarily Identifiable: Quantifying the fingerprintability of browser extensions due to bloat.
Proceedings of the World Wide Web Conference, 2019
Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Proceedings of the Engineering Secure Software and Systems - 10th International Symposium, 2018
2017
By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers.
CoRR, 2017
Extended Tracking Powers: Measuring the Privacy Diffusion Enabled by Browser Extensions.
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms.
Proc. Priv. Enhancing Technol., 2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 9th European Workshop on System Security, 2016
2015
IT Prof., 2015
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEEE Secur. Priv., 2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012
Proceedings of the Distributed Applications and Interoperable Systems, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the Fourth European Workshop on System Security, 2011
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the Information Systems Security - 6th International Conference, 2010
Proceedings of the Detection of Intrusions and Malware, 2010