Oleksii Starov

Orcid: 0000-0002-2796-6345

According to our database1, Oleksii Starov authored at least 24 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Automated Generation of Behavioral Signatures for Malicious Web Campaigns.
Proceedings of the Information Security - 27th International Conference, 2024

2022
PhishInPatterns: measuring elicited user interactions at scale on phishing websites.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

2021
Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets.
Proceedings of the 30th USENIX Security Symposium, 2021

Innocent Until Proven Guilty (IUPG): Building Deep Learning Models with Embedded Robustness to Out-Of-Distribution Content.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Short Paper - Taming the Shape Shifter: Detecting Anti-fingerprinting Browsers.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

Web Runner 2049: Evaluating Third-Party Anti-bot Services.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

2019
Unnecessarily Identifiable: Quantifying the fingerprintability of browser extensions due to bloat.
Proceedings of the World Wide Web Conference, 2019

Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting.
Proceedings of the 28th USENIX Security Symposium, 2019

Detecting Malicious Campaigns in Obfuscated JavaScript with Scalable Behavioral Analysis.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

2018
Betrayed by Your Dashboard: Discovering Malicious Campaigns via Web Analytics.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

PrivacyMeter: Designing and Developing a Privacy-Preserving Browser Extension.
Proceedings of the Engineering Secure Software and Systems - 10th International Symposium, 2018

2017
Extended Tracking Powers: Measuring the Privacy Diffusion Enabled by Browser Extensions.
Proceedings of the 26th International Conference on World Wide Web, 2017

XHOUND: Quantifying the Fingerprintability of Browser Extensions.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Dial One for Scam: A Large-Scale Analysis of Technical Support Scams.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms.
Proc. Priv. Enhancing Technol., 2016

Dial One for Scam: Analyzing and Detecting Technical Support Scams.
CoRR, 2016

No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells.
Proceedings of the 25th International Conference on World Wide Web, 2016

Measuring and Mitigating AS-level Adversaries Against Tor.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
On the Privacy Practices of Just Plain Sites.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

2013
Evaluation of t-wise Approach for Testing Logical Expressions in Software.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Cloud Testing for Mobile Software Systems - Concept and Prototyping.
Proceedings of the ICSOFT 2013, 2013

Integrated TaaS platform for mobile development: Architecture solutions.
Proceedings of the 8th International Workshop on Automation of Software Test, 2013


  Loading...