Folgen
Panagiotis Ilia
Titel
Zitiert von
Zitiert von
Jahr
Face/off: Preventing privacy leakage from photos in social networks
P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1492015
Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking
P Papadopoulos, P Ilia, E Markatos
International Conference on Information Security, 277-296, 2019
34*2019
SAMPAC: socially-aware collaborative multi-party access control
P Ilia, B Carminati, E Ferrari, P Fragopoulou, S Ioannidis
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
332017
A Large-scale Analysis of Content Modification by Open HTTP Proxies
G Tsirantonakis, P Ilia, S Ioannidis, E Athanasopoulos, M Polychronakis
Network and Distributed System Security Symposium (NDSS), 2018
322018
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation
P Papadopoulos, P Ilia, M Polychronakis, EP Markatos, S Ioannidis, ...
Network and Distributed System Security Symposium (NDSS), 2019
312019
Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta) Data
K Drakonakis, P Ilia, S Ioannidis, J Polakis
Network and Distributed System Security Symposium (NDSS), 2019
282019
Faces in the distorting mirror: Revisiting photo-based social authentication
I Polakis, P Ilia, F Maggi, M Lancini, G Kontaxis, S Zanero, S Ioannidis, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
262014
Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting
S Karami, P Ilia, K Solomos, J Polakis
Network and Distributed System Security Symposium (NDSS), 2020
232020
Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage
S Karami, P Ilia, J Polakis
Network and Distributed System Security Symposium (NDSS), 2021
162021
TALON: An Automated Framework for Cross-Device Tracking Detection
K Solomos, P Ilia, S Ioannidis, N Kourtellis
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
16*2019
CCSP: a Compressed Certificate Status Protocol
AA Chariton, E Degkleri, P Papadopoulos, P Ilia, EP Markatos
INFOCOM 2017-IEEE Conference on Computer Communications, IEEE, 1-9, 2017
162017
DCSP: Performant Certificate Revocation a DNS-based approach
AA Chariton, E Degkleri, P Papadopoulos, P Ilia, EP Markatos
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
152016
Cookie Swap Party: Abusing First-Party Cookies for Web Tracking
Q Chen, P Ilia, M Polychronakis, A Kapravelos
Proceedings of the Web Conference 2021, 2117-2129, 2021
112021
Fill in the Blanks: Empirical Analysis of the Privacy Threats of Browser Form Autofill
X Lin, P Ilia, J Polakis
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
102020
Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks
P Ilia, G Oikonomou, T Tryfonas
IFIP International Workshop on Information Security Theory and Practices, 34-49, 2013
92013
Design and Implementation of a Compressed Certificate Status Protocol
M Pachilakis, AA Chariton, P Papadopoulos, P Ilia, E Degkleri, ...
ACM Transactions on Internet Technology (TOIT) 20 (4), 1-25, 2020
32020
Social Forensics: Searching for Needles in Digital Haystacks
I Polakis, P Ilia, Z Tzermias, S Ioannidis, P Fragopoulou
2015 4th International Workshop on Building Analysis Datasets and Gathering …, 2015
22015
Automated Measurements of Cross-Device Tracking
K Solomos, P Ilia, S Ioannidis, N Kourtellis
International Workshop on Information and Operational Technology Security …, 2018
12018
The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions
K Solomos, P Ilia, S Karami, N Nikiforakis, J Polakis
31st USENIX Security Symposium (USENIX Security 22), 2022
2022
Phish in Sheep’s Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting
X Lin, P Ilia, S Solanki, J Polakis
31st USENIX Security Symposium (USENIX Security 22), 2022
2022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20