Works (18)

Updated: April 5th, 2024 09:31

2022 article

Measuring the Privacy vs. Compatibility Trade-off in Preventing Third-Party Stateful Tracking

PROCEEDINGS OF THE ACM WEB CONFERENCE 2022 (WWW'22), pp. 710โ€“720.

By: J. Jueckstock n, P. Snyder, S. Sarker n, A. Kapravelos n & B. Livshitsโ€‰*

co-author countries: United Kingdom of Great Britain and Northern Ireland ๐Ÿ‡ฌ๐Ÿ‡ง
author keywords: browsers; cookies; compatibility; breakage; tracking; privacy; measurement; crawling
Source: Web Of Science
Added: October 31, 2022

2022 article

SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations

2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), pp. 555โ€“571.

By: K. Subramani, J. Jueckstock n, A. Kapravelos n & R. Perdisci*

Source: Web Of Science
Added: September 26, 2022

2022 article

yoU aRe a Liar://A Unified Framework for Cross-Testing URL Parsers

2022 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2022), pp. 51โ€“58.

By: D. Ajmani n, I. Koishybayev n & A. Kapravelos n

author keywords: URL; parser; spoofing; web security; SSRF
Source: Web Of Science
Added: September 26, 2022

2021 article

Browserprint: An Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy

INFORMATION SECURITY (ISC 2021), Vol. 13118, pp. 161โ€“176.

By: S. Akhavani*, J. Jueckstock n, J. Su n, A. Kapravelos n, E. Kirdaโ€‰* & L. Luโ€‰*

author keywords: Browser security; Fingerprinting; Privacy; Web security
Source: Web Of Science
Added: March 28, 2022

2021 article

Cookie Swap Party: Abusing First-PartyCookies for Web Tracking

PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021), pp. 2117โ€“2129.

By: Q. Chen n, P. Iliaโ€‰*, M. Polychronakis* & A. Kapravelos n

Source: Web Of Science
Added: March 14, 2022

2021 article

CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing

Zhang, P., Oest, A., Cho, H., Sun, Z., Johnson, R. C., Wardman, B., โ€ฆ Ahn, G.-J. (2021, December 10). IEEE SECURITY & PRIVACY.

co-author countries: Korea (Republic of) ๐Ÿ‡ฐ๐Ÿ‡ท
author keywords: Phishing; Codes; Browsers; Security; Crawlers; Visualization; Internet
Source: Web Of Science
Added: January 3, 2022

2021 article

Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases

28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021).

co-author countries: Korea (Republic of) ๐Ÿ‡ฐ๐Ÿ‡ท
Source: Web Of Science
Added: August 30, 2021

2021 article

Towards Realistic and Reproducible Web Crawl Measurements

PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021), pp. 80โ€“91.

By: J. Jueckstock n, S. Sarker n, P. Snyder, A. Beggs n, P. Papadopoulosโ€‰*, M. Varvelloโ€‰*, B. Livshitsโ€‰*, A. Kapravelos n

co-author countries: United Kingdom of Great Britain and Northern Ireland ๐Ÿ‡ฌ๐Ÿ‡ง
Source: Web Of Science
Added: January 10, 2022

2019 article

Unnecessarily Identifiable: Quantifying the fingerprintability of browser extensions due to bloat

WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019), pp. 3244โ€“3250.

By: O. Starov*, P. Laperdrix*, A. Kapravelos n & N. Nikiforakisโ€‰*

Source: Web Of Science
Added: September 30, 2019

2019 article

VisibleV8: In-browser Monitoring of JavaScript in the Wild

IMC'19: PROCEEDINGS OF THE 2019 ACM INTERNET MEASUREMENT CONFERENCE, pp. 393โ€“405.

By: J. Jueckstock n & A. Kapravelos n

Source: Web Of Science
Added: March 30, 2020

2019 article

Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions

DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT (DIMVA 2019), Vol. 11543, pp. 3โ€“22.

By: A. Beggs n & A. Kapravelos n

author keywords: Browser extensions; Javascript; Browser security
Source: Web Of Science
Added: January 6, 2020

2018 article

Mystique: Uncovering Information Leakage from Browser Extensions

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), pp. 1687โ€“1700.

By: Q. Chen n & A. Kapravelos n

author keywords: Privacy; Browser Extensions; JavaScript; Taint Analysis; Information Flow
Source: Web Of Science
Added: April 9, 2019

2016 article

Cloak of Visibility: Detecting When Machines Browse A Different Web

2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 743โ€“758.

By: L. Invernizzi*, K. Thomasโ€‰*, A. Kapravelos n, O. Comanescu*, J. Picod* & E. Bursztein*

Source: Web Of Science
Added: August 6, 2018

2014 chapter

PExy: The Other Side of Exploit Kits

In Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 132โ€“151).

By: G. De Maio*, A. Kapravelos*, Y. Shoshitaishviliโ€‰*, C. Kruegelโ€‰* & G. Vignaโ€‰*

co-author countries: Italy ๐Ÿ‡ฎ๐Ÿ‡น
Source: Crossref
Added: August 28, 2020

2011 chapter

Escape from Monkey Island: Evading High-Interaction Honeyclients

In Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 124โ€“143).

By: A. Kapravelos*, M. Cova*, C. Kruegelโ€‰* & G. Vignaโ€‰*

co-author countries: United Kingdom of Great Britain and Northern Ireland ๐Ÿ‡ฌ๐Ÿ‡ง
Source: Crossref
Added: August 28, 2020

2010 chapter

D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks

In Computer Security โ€“ ESORICS 2010 (pp. 663โ€“678).

By: A. Kapravelos*, I. Polakis*, E. Athanasopoulos, S. Ioannidisโ€‰* & E. Markatosโ€‰*

co-author countries: Greece ๐Ÿ‡ฌ๐Ÿ‡ท
Source: Crossref
Added: August 28, 2020

2009 chapter

FleXConf: A Flexible Conference Assistant Using Context-Aware Notification Services

In Lecture Notes in Computer Science (pp. 108โ€“117).

By: N. Armenatzoglou*, Y. Marketakisโ€‰*, L. Kriaraโ€‰*, E. Apostolopoulos*, V. Papavasiliou*, D. Kampas*, A. Kapravelos*, E. Kartsonakis* ...

co-author countries: Greece ๐Ÿ‡ฌ๐Ÿ‡ท
Source: Crossref
Added: August 28, 2020

2009 chapter

Realistic Passive Packet Loss Measurement for High-Speed Networks

In Traffic Monitoring and Analysis (pp. 1โ€“7).

By: A. Friedl*, S. Ubik*, A. Kapravelos*, M. Polychronakis* & E. Markatosโ€‰*

co-author countries: Czechia ๐Ÿ‡จ๐Ÿ‡ฟ Greece ๐Ÿ‡ฌ๐Ÿ‡ท
Source: Crossref
Added: August 28, 2020

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Scienceยฉ and InCitesยฉ (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.