Alexandros Kapravelos Jueckstock, J., Snyder, P., Sarker, S., Kapravelos, A., & Livshits, B. (2022). Measuring the Privacy vs. Compatibility Trade-off in Preventing Third-Party Stateful Tracking. PROCEEDINGS OF THE ACM WEB CONFERENCE 2022 (WWW'22), pp. 710–720. https://doi.org/10.1145/3485447.3512231 Subramani, K., Jueckstock, J., Kapravelos, A., & Perdisci, R. (2022). SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations. 2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), pp. 555–571. https://doi.org/10.1109/EuroSP53844.2022.00041 Ajmani, D. K., Koishybayev, I., & Kapravelos, A. (2022). yoU aRe a Liar://A Unified Framework for Cross-Testing URL Parsers. 2022 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2022), pp. 51–58. https://doi.org/10.1109/SPW54247.2022.9833883 Akhavani, S. A., Jueckstock, J., Su, J., Kapravelos, A., Kirda, E., & Lu, L. (2021). Browserprint: An Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy. INFORMATION SECURITY (ISC 2021), Vol. 13118, pp. 161–176. https://doi.org/10.1007/978-3-030-91356-4_9 Chen, Q., Ilia, P., Polychronakis, M., & Kapravelos, A. (2021). Cookie Swap Party: Abusing First-PartyCookies for Web Tracking. PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021), pp. 2117–2129. https://doi.org/10.1145/3442381.3449837 Zhang, P., Oest, A., Cho, H., Sun, Z., Johnson, R. C., Wardman, B., … Ahn, G.-J. (2021, December 10). CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing. IEEE SECURITY & PRIVACY. https://doi.org/10.1109/MSEC.2021.3129992 Dinh, S. T., Cho, H., Martin, K., Oest, A., Zeng, K., Kapravelos, A., … Shoshitaishvili, Y. (2021). Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases. 28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021). https://doi.org/10.14722/ndss.2021.24224 Jueckstock, J., Sarker, S., Snyder, P., Beggs, A., Papadopoulos, P., Varvello, M., … Kapravelos, A. (2021). Towards Realistic and Reproducible Web Crawl Measurements. PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021), pp. 80–91. https://doi.org/10.1145/3442381.3450050 Starov, O., Laperdrix, P., Kapravelos, A., & Nikiforakis, N. (2019). Unnecessarily Identifiable: Quantifying the fingerprintability of browser extensions due to bloat. WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019), pp. 3244–3250. https://doi.org/10.1145/3308558.3313458 Jueckstock, J., & Kapravelos, A. (2019). VisibleV8: In-browser Monitoring of JavaScript in the Wild. IMC'19: PROCEEDINGS OF THE 2019 ACM INTERNET MEASUREMENT CONFERENCE, pp. 393–405. https://doi.org/10.1145/3355369.3355599 Beggs, A., & Kapravelos, A. (2019). Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT (DIMVA 2019), Vol. 11543, pp. 3–22. https://doi.org/10.1007/978-3-030-22038-9_1 Chen, Q., & Kapravelos, A. (2018). Mystique: Uncovering Information Leakage from Browser Extensions. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), pp. 1687–1700. https://doi.org/10.1145/3243734.3243823 Invernizzi, L., Thomas, K., Kapravelos, A., Comanescu, O., Picod, J.-M., & Bursztein, E. (2016). Cloak of Visibility: Detecting When Machines Browse A Different Web. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 743–758. https://doi.org/10.1109/sp.2016.50 De Maio, G., Kapravelos, A., Shoshitaishvili, Y., Kruegel, C., & Vigna, G. (2014). PExy: The Other Side of Exploit Kits. In Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 132–151). https://doi.org/10.1007/978-3-319-08509-8_8 Kapravelos, A., Cova, M., Kruegel, C., & Vigna, G. (2011). Escape from Monkey Island: Evading High-Interaction Honeyclients. In Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 124–143). https://doi.org/10.1007/978-3-642-22424-9_8 Kapravelos, A., Polakis, I., Athanasopoulos, E., Ioannidis, S., & Markatos, E. P. (2010). D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks. In Computer Security – ESORICS 2010 (pp. 663–678). https://doi.org/10.1007/978-3-642-15497-3_40 Armenatzoglou, N., Marketakis, Y., Kriara, L., Apostolopoulos, E., Papavasiliou, V., Kampas, D., … Antoniou, G. (2009). FleXConf: A Flexible Conference Assistant Using Context-Aware Notification Services. In Lecture Notes in Computer Science (pp. 108–117). https://doi.org/10.1007/978-3-642-05290-3_20 Friedl, A., Ubik, S., Kapravelos, A., Polychronakis, M., & Markatos, E. P. (2009). Realistic Passive Packet Loss Measurement for High-Speed Networks. In Traffic Monitoring and Analysis (pp. 1–7). https://doi.org/10.1007/978-3-642-01645-5_1