Works (57)

Updated: January 17th, 2026 05:05

2025 article

Research Directions in Software Supply Chain Security

Williams, L., Benedetti, G., Hamer, S., Paramitha, R., Rahman, I., Tamanna, M., … Enck, W. (2025, January 27). ACM Transactions on Software Engineering and Methodology, Vol. 34.

By: L. Williams n, G. Benedetti*, S. Hamer n, R. Paramitha*, I. Rahman n, M. Tamanna n, G. Tystahl n, N. Zahan n ...

author keywords: Software security; Software supply chain security; Open source security
topics (OpenAlex): Information and Cyber Security; Advanced Malware Detection Techniques; Software Engineering Research
Sources: Web Of Science, NC State University Libraries, ORCID
Added: January 27, 2025

2025 article

Same Script, Different Behavior: Characterizing Divergent JavaScript Execution Across Different Device Platforms

Zafar, A., Su, J., Datta, S., Kapravelos, A., & Das, A. (2025, November 19).

By: A. Zafar n, J. Su n, S. Datta n, A. Kapravelos n & A. Das n

topics (OpenAlex): Software Testing and Debugging Techniques; Software Engineering Research; Logic, programming, and type systems
Source: ORCID
Added: November 22, 2025

2024 article

Automated Generation of Behavioral Signatures for Malicious Web Campaigns

Sarker, S., Melicher, W., Starov, O., Das, A., & Kapravelos, A. (2024, October 17). Lecture Notes in Computer Science, Vol. 15258, pp. 226–245.

By: S. Sarker n, W. Melicher*, O. Starov*, A. Das n & A. Kapravelos n

topics (OpenAlex): Spam and Phishing Detection; Advanced Malware Detection Techniques; Network Security and Intrusion Detection
Sources: Web Of Science, ORCID, NC State University Libraries
Added: March 10, 2025

2024 article

JSHint: Revealing API Usage to Improve Detection of Malicious JavaScript

Sarker, S., Schulz, K., Nahapetyan, A., Das, A., & Kapravelos, A. (2024, October 17). Lecture Notes in Computer Science, Vol. 15258, pp. 205–225.

By: S. Sarker n, K. Schulz n, A. Nahapetyan n, A. Das n & A. Kapravelos n

topics (OpenAlex): Spam and Phishing Detection; Advanced Malware Detection Techniques; Web Application Security Vulnerabilities
Sources: Web Of Science, ORCID, NC State University Libraries
Added: March 10, 2025

2024 article

On SMS Phishing Tactics and Infrastructure

Nahapetyan, A., Prasad, S., Childs, K., Oest, A., Ladwig, Y., Kapravelos, A., & Reaves, B. (2024, May 19). 45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, pp. 1–16.

By: A. Nahapetyan n, S. Prasad n, K. Childs n, A. Oest*, Y. Ladwig*, A. Kapravelos n, B. Reaves n

topics (OpenAlex): Spam and Phishing Detection; User Authentication and Security Systems; Internet Traffic Analysis and Secure E-voting
Sources: Web Of Science, NC State University Libraries
Added: December 2, 2024

2023 article

Automatic Discovery of Emerging Browser Fingerprinting Techniques

Su, J., & Kapravelos, A. (2023, April 26).

By: J. Su n & A. Kapravelos n

topics (OpenAlex): Spam and Phishing Detection; Internet Traffic Analysis and Secure E-voting; Advanced Malware Detection Techniques
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: ORCID
Added: September 25, 2025

2023 article

WRIT: Web Request Integrity and Attestation Against Malicious Browser Extensions

Vasiliadis, G., Karampelas, A., Shevtsov, A., Papadopoulos, P., Ioannidis, S., & Kapravelos, A. (2023, October 6). IEEE Transactions on Dependable and Secure Computing, Vol. 21, pp. 3082–3095.

By: G. Vasiliadis*, A. Karampelas*, A. Shevtsov*, P. Papadopoulos*, S. Ioannidis* & A. Kapravelos n

author keywords: Remote attestation; trust and provenance; web integrity; Remote attestation; trust and provenance; web integrity
topics (OpenAlex): Advanced Malware Detection Techniques; Web Application Security Vulnerabilities; Security and Verification in Computing
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 5, 2024

2022 conference paper

Characterizing the Security of Github CI Workflows

Proceedings of the USENIX Security Symposium.

By: I. Koishybayev, A. Nahapetyan, R. Zachariah, S. Muralee, B. Reaves, A. Kapravelos, A. Machiry

Source: ORCID
Added: September 25, 2025

2022 article

Measuring the Privacy vs. Compatibility Trade-off in Preventing Third-Party Stateful Tracking

Jueckstock, J., Snyder, P., Sarker, S., Kapravelos, A., & Livshits, B. (2022, April 25). Proceedings of the ACM Web Conference 2022.

By: J. Jueckstock n, P. Snyder, S. Sarker n, A. Kapravelos n & B. Livshits*

author keywords: browsers; cookies; compatibility; breakage; tracking; privacy; measurement; crawling
topics (OpenAlex): Privacy, Security, and Data Protection; Information and Cyber Security; User Authentication and Security Systems
TL;DR: It is found that making third-party storage partitioned by first-party, and lifetimes by site-session achieves the best privacy and compatibility trade-off. (via Semantic Scholar)
Source: Web Of Science
Added: October 31, 2022

2022 conference paper

Measuring the Privacy vs. Compatibility Trade-off in Preventing Third-Party Stateful Tracking

Proceedings of The Web Conference (WWW).

By: J. Jueckstock, P. Snyder, S. Sarker, A. Kapravelos & B. Livshits

Source: ORCID
Added: September 25, 2025

2022 article

SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations

Subramani, K., Jueckstock, J., Kapravelos, A., & Perdisci, R. (2022, June 1).

By: K. Subramani, J. Jueckstock n, A. Kapravelos n & R. Perdisci*

topics (OpenAlex): Advanced Malware Detection Techniques; Web Application Security Vulnerabilities; Network Security and Intrusion Detection
TL;DR: Measurements show that it should be feasible to implement and enforce stricter SW security policies without a significant impact on most legitimate production SWs and explore new abuse paths that have not previously been considered. (via Semantic Scholar)
Source: Web Of Science
Added: September 26, 2022

2022 conference paper

SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations

Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P).

By: K. Subramani, J. Jueckstock, A. Kapravelos & R. Perdisci

Source: ORCID
Added: September 25, 2025

2022 conference paper

yoU aRe a Liar://A Unified Framework for Cross-Testing URL Parsers

Proceedings of the IEEE SecWeb Workshop.

By: D. Ajmani, I. Koishybayev & A. Kapravelos

Source: ORCID
Added: September 25, 2025

2022 article

yoU aRe a Liar://A Unified Framework for Cross-Testing URL Parsers

Ajmani, D. K., Koishybayev, I., & Kapravelos, A. (2022, May 1).

By: D. Ajmani n, I. Koishybayev n & A. Kapravelos n

author keywords: URL; parser; spoofing; web security; SSRF
topics (OpenAlex): Spam and Phishing Detection; Web Application Security Vulnerabilities; Advanced Malware Detection Techniques
TL;DR: A framework that unifies the testing suites of 8 URL parsers from popular web-related projects and highlights the inconsistencies between them is designed, identifying categories of inconsistencies and highlighting the need for a comprehensive implementation standard to be developed and enforced at the earliest. (via Semantic Scholar)
Source: Web Of Science
Added: September 26, 2022

2021 conference paper

Browserprint: An Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy

Proceedings of the Information Security Conference (ISC).

By: S. Akhavani, J. Jueckstock, J. Su, A. Kapravelos, E. Kirda & L. Lu

Source: ORCID
Added: September 25, 2025

2021 article

Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy

Akhavani, S. A., Jueckstock, J., Su, J., Kapravelos, A., Kirda, E., & Lu, L. (2021, January 1). Lecture Notes in Computer Science.

By: S. Akhavani*, J. Jueckstock n, J. Su n, A. Kapravelos n, E. Kirda* & L. Lu*

author keywords: Browser security; Fingerprinting; Privacy; Web security
topics (OpenAlex): Privacy, Security, and Data Protection; Advanced Malware Detection Techniques; Spam and Phishing Detection
TL;DR: The results show an alarming trend that browsers are becoming more fingerprintable over time because newer versions contain more fingerprintable APIs compared to older ones. (via Semantic Scholar)
Source: Web Of Science
Added: March 28, 2022

2021 article

Cookie Swap Party: Abusing First-Party Cookies for Web Tracking

Chen, Q., Ilia, P., Polychronakis, M., & Kapravelos, A. (2021, April 19).

By: Q. Chen n, P. Ilia*, M. Polychronakis* & A. Kapravelos n

topics (OpenAlex): Internet Traffic Analysis and Secure E-voting; Privacy, Security, and Data Protection; Spam and Phishing Detection
TL;DR: A dynamic data flow tracking system based on Chromium is proposed to track the leakage of first-party cookies to third parties, and a large-scale study of the Alexa top 10K websites finds that 97.72% of the websites have first- party cookies that are set by third-party JavaScript, and that on 57.66% of these websites there is at least one such cookie that contains a unique user identifier that is diffused to multiple third parties. (via Semantic Scholar)
Source: Web Of Science
Added: March 14, 2022

2021 conference paper

Cookie Swap Party: Abusing First-Party Cookies for Web Tracking

Proceedings of the The Web Conference (WWW).

By: Q. Chen, P. Ilia, M. Polychronakis & A. Kapravelos

Source: ORCID
Added: September 25, 2025

2021 article

CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing

Zhang, P., Oest, A., Cho, H., Sun, Z., Johnson, R. C., Wardman, B., … Ahn, G.-J. (2021, December 13). IEEE Security & Privacy.

By: P. Zhang*, A. Oest, H. Cho*, Z. Sun*, R. Johnson*, B. Wardman*, S. Sarker n, A. Kapravelos n ...

author keywords: Phishing; Codes; Browsers; Security; Crawlers; Visualization; Internet
topics (OpenAlex): Spam and Phishing Detection; Advanced Malware Detection Techniques; Internet Traffic Analysis and Secure E-voting
Source: Web Of Science
Added: January 3, 2022

2021 conference paper

CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing

Proceedings of the IEEE Symposium on Security and Privacy.

By: P. Zhang, A. Oest, H. Cho, Z. Sun, R. Johnson, B. Wardman, S. Sarker, A. Kapravelos ...

Source: ORCID
Added: September 25, 2025

2021 conference paper

Detecting Filter List Evasion With Event-Loop-Turn Granularity JavaScript Signatures

Proceedings of the IEEE Symposium on Security and Privacy.

By: Q. Chen, P. Snyder, B. Livshits & A. Kapravelos

Source: ORCID
Added: September 25, 2025

2021 conference paper

Favocado: Fuzzing Binding Code of JavaScript Engines Using Semantically Correct Test Cases

Proceedings of the Network and Distributed System Security Symposium (NDSS).

Alexandros Kapravelos

Source: ORCID
Added: September 25, 2025

2021 article

Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases

Dinh, S. T., Cho, H., Martin, K., Oest, A., Zeng, K., Kapravelos, A., … Shoshitaishvili, Y. (2021, January 1).

By: S. Dinh*, H. Cho*, K. Martin n, A. Oest*, K. Zeng*, A. Kapravelos n, G. Ahn*, T. Bao* ...

topics (OpenAlex): Software Testing and Debugging Techniques; Advanced Malware Detection Techniques; Web Application Security Vulnerabilities
TL;DR: Favocado is proposed, a novel fuzzing approach that focuses on fuzzing binding layers of JavaScript runtime systems and can generate syntactically and semantically correct JavaScript test cases through the use of extracted semantic information and careful maintaining of execution states. (via Semantic Scholar)
Source: Web Of Science
Added: August 30, 2021

2021 conference paper

Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets

Proceedings of the USENIX Security Symposium.

By: P. Laperdrix, O. Starov, Q. Chen, A. Kapravelos & N. Nikiforakis

Source: ORCID
Added: September 25, 2025

2021 conference paper

Towards Realistic and Reproducible Web Crawl Measurements

Proceedings of the The Web Conference (WWW).

By: J. Jueckstock, S. Sarker, P. Snyder, A. Beggs, P. Papadopoulos, M. Varvello, B. Livshits, A. Kapravelos

Source: ORCID
Added: September 25, 2025

2021 article

Towards Realistic and ReproducibleWeb Crawl Measurements

Jueckstock, J., Sarker, S., Snyder, P., Beggs, A., Papadopoulos, P., Varvello, M., … Kapravelos, A. (2021, April 19).

By: J. Jueckstock n, S. Sarker n, P. Snyder, A. Beggs n, P. Papadopoulos*, M. Varvello*, B. Livshits*, A. Kapravelos n

topics (OpenAlex): Advanced Malware Detection Techniques; Web Data Mining and Analysis; Network Security and Intrusion Detection
TL;DR: This work improves the state of web privacy and security by investigating how key measurements differ when using naive crawling tool defaults vs. careful attempts to match “real” users across the Tranco top 25k web domains. (via Semantic Scholar)
Source: Web Of Science
Added: January 10, 2022

2020 conference paper

Hiding in Plain Site: Detecting JavaScript Obfuscation through Concealed Browser API Usage

Proceedings of the ACM Internet Measurement Conference (IMC).

By: S. Sarker, J. Jueckstock & A. Kapravelos

Source: ORCID
Added: September 25, 2025

2020 conference paper

Mininode: Reducing the Attack Surface of Node.js Applications

Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID).

By: I. Koishybayev & A. Kapravelos

Source: ORCID
Added: September 25, 2025

2020 conference paper

You’ve Changed: Detecting Malicious Browser Extensions through their Update Deltas

Proceedings of the ACM Conference on Computer and Communications Security (CCS).

By: N. Pantelaios, N. Nikiforakis & A. Kapravelos

Source: ORCID
Added: September 25, 2025

2019 conference paper

Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting

Proceedings of the USENIX Security Symposium.

By: E. Trickel, O. Starov, A. Kapravelos, N. Nikiforakis & A. Doupe

Source: ORCID
Added: September 25, 2025

2019 article

Unnecessarily Identifiable: Quantifying the fingerprintability of browser extensions due to bloat

Starov, O., Laperdrix, P., Kapravelos, A., & Nikiforakis, N. (2019, May 13).

topics (OpenAlex): Spam and Phishing Detection; Advanced Malware Detection Techniques; Web Application Security Vulnerabilities
TL;DR: To protect users against unnecessary extension fingerprinting due to bloat, the design and implementation of an in-browser mechanism that provides coarse-grained access control for extensions on all websites are described. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: September 30, 2019

2019 conference paper

Unnecessarily Identifiable: Quantifying the fingerprintability of browser extensions due to bloat

Proceedings of the World Wide Web Conference (WWW).

By: O. Starov, P. Laperdrix, A. Kapravelos & N. Nikiforakis

Source: ORCID
Added: September 25, 2025

2019 article

VisibleV8

Jueckstock, J., & Kapravelos, A. (2019, October 18). (Vol. 10). Vol. 10.

By: J. Jueckstock n & A. Kapravelos n

topics (OpenAlex): Web Application Security Vulnerabilities; Advanced Malware Detection Techniques; Security and Verification in Computing
TL;DR: VisibleV8 is a dynamic analysis framework hosted inside V8, the JS engine of the Chrome browser, that logs native function or property accesses during any JS execution and consistently outperforms equivalent inline instrumentation, and it intercepts accesses impossible to instrument inline. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: March 30, 2020

2019 conference paper

VisibleV8: In-browser Monitoring of JavaScript in the Wild

Proceedings of the ACM Internet Measurement Conference (IMC).

By: J. Jueckstock & A. Kapravelos

Source: ORCID
Added: September 25, 2025

2019 article

Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions

Beggs, A., & Kapravelos, A. (2019, January 1). Lecture Notes in Computer Science.

By: A. Beggs n & A. Kapravelos n

author keywords: Browser extensions; Javascript; Browser security
topics (OpenAlex): Web Application Security Vulnerabilities; Advanced Malware Detection Techniques; Web Data Mining and Analysis
TL;DR: The abuse of browser extensions that achieve installations via suspicious methods is explored and 1,097 unlisted browser extensions ranging from internal directory lookup tools to hidden Google Docs extensions that pose a serious threat to their 127 million users are found. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: January 6, 2020

2019 conference paper

Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions

Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA).

By: A. Beggs & A. Kapravelos

Source: ORCID
Added: September 25, 2025

2018 article

Mystique

Chen, Q., & Kapravelos, A. (2018, October 15). (Vol. 10). Vol. 10.

By: Q. Chen n & A. Kapravelos n

author keywords: Privacy; Browser Extensions; JavaScript; Taint Analysis; Information Flow
topics (OpenAlex): Advanced Malware Detection Techniques; Web Application Security Vulnerabilities; Security and Verification in Computing
TL;DR: A taint analysis framework for browser extensions is developed and used to perform a large scale study of extensions in regard to their privacy practices, and the need for countermeasures to safeguard against misbehaving extensions that abuse their privileges is emphasized. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: April 9, 2019

2018 conference paper

Mystique: Uncovering Information Leakage from Browser Extensions

Proceedings of the ACM Conference on Computer and Communications Security (CCS).

By: Q. Chen & A. Kapravelos

Source: ORCID
Added: September 25, 2025

2016 conference paper

Cloak of Visibility: Detecting When Machines Browse A Different Web

Proceedings of the IEEE Symposium on Security and Privacy.

By: L. Invernizzi, K. Thomas, A. Kapravelos, O. Comanescu, J. Picod & E. Bursztein

Source: ORCID
Added: September 25, 2025

2016 article

Cloak of Visibility: Detecting When Machines Browse a Different Web

Invernizzi, L., Thomas, K., Kapravelos, A., Comanescu, O., Picod, J.-M., & Bursztein, E. (2016, May 1).

By: L. Invernizzi*, K. Thomas*, A. Kapravelos n, O. Comanescu*, J. Picod* & E. Bursztein*

topics (OpenAlex): Spam and Phishing Detection; Web Data Mining and Analysis; Advanced Malware Detection Techniques
TL;DR: This study provides the first broad perspective of cloaking as it affects Google Search and Google Ads and underscores the minimum capabilities necessary of security crawlers to bypass the state of the art in mobile, rDNS, and IP cloaking. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 conference paper

Ad Injection at Scale: Assessing Deceptive Advertisement Modifications

Proceedings of the IEEE Symposium on Security and Privacy.

By: K. Thomas, E. Bursztein, C. Grier, G. Go, N. Jagpal, A. Kapravelos, D. Mccoy, A. Nappa ...

Source: ORCID
Added: September 25, 2025

2014 conference paper

Hulk: Eliciting Malicious Behavior in Browser Extensions

Proceedings of the USENIX Security Symposium. Presented at the USENIX.

By: A. Kapravelos, C. Grier, N. Chachra, C. Kruegel, G. Vigna & V. Paxson

Source: ORCID
Added: September 25, 2025

2014 chapter

PExy: The Other Side of Exploit Kits

In Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 132–151).

By: G. De Maio*, A. Kapravelos*, Y. Shoshitaishvili*, C. Kruegel* & G. Vigna*

topics (OpenAlex): Spam and Phishing Detection; Advanced Malware Detection Techniques; Web Application Security Vulnerabilities
TL;DR: The drive-by download scene has changed dramatically in the last few years and what was a disorganized ad-hoc generation of malicious pages by individuals has evolved into sophisticated, easily extensible frameworks that incorporate multiple exploits at the same time and are highly configurable. (via Semantic Scholar)
Source: Crossref
Added: August 28, 2020

2014 conference paper

PExy: The other side of Exploit Kits

Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA).

By: G. De Maio, A. Kapravelos, Y. Shoshitaishvili, C. Kruegel & G. Vigna

Source: ORCID
Added: September 25, 2025

2014 conference paper

The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements

Proceedings of the Internet Measurement Conference (IMC).

By: A. Zarras, A. Kapravelos, G. Stringhini, T. Holz, C. Kruegel & G. Vigna

Source: ORCID
Added: September 25, 2025

2013 conference paper

Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting

Proceedings of the IEEE Symposium on Security and Privacy.

By: N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens & G. Vigna

Source: ORCID
Added: September 25, 2025

2013 conference paper

Revolver: An Automated Approach to the Detection of Evasive Web-based Malware

Proceedings of the USENIX Security Symposium.

By: A. Kapravelos, Y. Shoshitaishvili, M. Cova, C. Kruegel & G. Vigna

Source: ORCID
Added: September 25, 2025

2012 conference paper

You Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions

Proceedings of the ACM Conference on Computer and Communications Security (CCS).

By: N. Nikiforakis, L. Invernizzi, A. Kapravelos, S. Van Acker, W. Joosen, C. Kruegel, F. Piessens, G. Vigna

Source: ORCID
Added: September 25, 2025

2011 chapter

Escape from Monkey Island: Evading High-Interaction Honeyclients

In Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 124–143).

By: A. Kapravelos*, M. Cova*, C. Kruegel* & G. Vigna*

topics (OpenAlex): Advanced Malware Detection Techniques; Spam and Phishing Detection; Network Security and Intrusion Detection
TL;DR: This paper examines the security model that high-interaction honeyclients use and evaluates their weaknesses in practice, and presents a number of possible attacks that evade the detection of these tools, while successfully attacking regular visitors of malicious web pages. (via Semantic Scholar)
Source: Crossref
Added: August 28, 2020

2011 conference paper

Escape from Monkey Island: Evading High-Interaction Honeyclients

Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA).

By: A. Kapravelos, M. Cova, C. Kruegel & G. Vigna

Source: ORCID
Added: September 25, 2025

2010 chapter

D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks

In Computer Security – ESORICS 2010 (pp. 663–678).

By: A. Kapravelos*, I. Polakis*, E. Athanasopoulos, S. Ioannidis* & E. Markatos*

topics (OpenAlex): Network Security and Intrusion Detection; Internet Traffic Analysis and Secure E-voting; IPv6, Mobility, Handover, Networks, Security
TL;DR: The nature of the attack is such that anyone can launch a Dial attack towards any telephone device, and the attack has zero financial cost, requires negligible computational resources and cannot be traced back to the attacker. (via Semantic Scholar)
Source: Crossref
Added: August 28, 2020

2010 conference paper

D(e|i)aling with VoIP: Robust Prevention of Dial Attacks

Proceedings of the European Symposium on Research in Computer Security (ESORICS).

By: A. Kapravelos, J. Polakis, E. Athanasopoulos, S. Ioannidis & E. Markatos

Source: ORCID
Added: September 25, 2025

2009 conference paper

FleXConf: A Flexible Conference Assistant Using Context-Aware Notification Services

Proceedings of the IEEE Workshop on Context Aware Mobile Systems (CAMS).

By: N. Armenatzoglou, Y. Marketakis, L. Kriara, E. Apostolopoulos, V. Papavasiliou, D. Kampas, A. Kapravelos, E. Kartsonakis ...

Source: ORCID
Added: September 25, 2025

2009 chapter

FleXConf: A Flexible Conference Assistant Using Context-Aware Notification Services

In Lecture Notes in Computer Science (pp. 108–117).

By: N. Armenatzoglou*, Y. Marketakis*, L. Kriara*, E. Apostolopoulos*, V. Papavasiliou*, D. Kampas*, A. Kapravelos*, E. Kartsonakis* ...

topics (OpenAlex): Context-Aware Activity Recognition Systems; Personal Information Management and User Behavior; Mobile Crowdsensing and Crowdsourcing
TL;DR: FlexConf is presented, a semantics-based system that supports location-based, personalized notification services for the assistance of conference attendees and its special features include an ontology-based representation model, rule-based context-aware reasoning, and a novel positioning system for indoor environments. (via Semantic Scholar)
Source: Crossref
Added: August 28, 2020

2009 chapter

Realistic Passive Packet Loss Measurement for High-Speed Networks

In Traffic Monitoring and Analysis (pp. 1–7).

By: A. Friedl*, S. Ubik*, A. Kapravelos*, M. Polychronakis* & E. Markatos*

topics (OpenAlex): Network Traffic and Congestion Control; Software-Defined Networks and 5G; Advanced Optical Network Technologies
TL;DR: Experimental results suggest that the proposed approach measures packet loss with 100% accuracy for network speeds as high as 12 Gbit/s, while traditional ICMP-based approaches were usually much less accurate. (via Semantic Scholar)
Source: Crossref
Added: August 28, 2020

2009 conference paper

Realistic Passive Packet Loss Measurement for High-Speed Networks

Proceedings of the International Workshop on Traffic Monitoring and Analysis (TMA).

By: A. Friedl, S. Ubik, A. Kapravelos, M. Polychronakis & E. Markatos

Source: ORCID
Added: September 25, 2025

2006 conference paper

Passive end-to-end packet loss estimation for grid traffic monitoring

Proceedings of the CoreGRID Integration Workshop.

By: A. Papadogiannakis, A. Kapravelos, M. Polychronakis, E. Markatos & A. Ciuffoletti

Source: ORCID
Added: September 25, 2025

Employment

Updated: February 9th, 2023 13:07

2022 - present

North Carolina State University Raleigh, North Carolina, US
Associate Professor Computer Science

2016 - 2022

NC State University Raleigh, NC, US
Assistant Professor Computer Science

Education

Updated: August 4th, 2020 21:43

2010 - 2015

University of California Santa Barbara Santa Barbara, CA, US
Ph.D. Computer Science

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2026) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.