default search action
Iasonas Polakis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c54]Mir Masood Ali, Mohammad Ghasemisharif, Chris Kanich, Jason Polakis:
Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron Apps. USENIX Security Symposium 2024 - [c53]Ioannis Arkalakis, Michalis Diamantaris, Serafeim Moustakas, Sotiris Ioannidis, Jason Polakis, Panagiotis Ilia:
Abandon All Hope Ye Who Enter Here: A Dynamic, Longitudinal Investigation of Android's Data Safety Section. USENIX Security Symposium 2024 - [c52]Giuseppe Calderonio, Mir Masood Ali, Jason Polakis:
Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted Advertising. USENIX Security Symposium 2024 - 2023
- [c51]Alberto Carboneri, Mohammad Ghasemisharif, Soroush Karami, Jason Polakis:
When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild. ACSAC 2023: 44-55 - [c50]Mohammad Ghasemisharif, Jason Polakis:
Read Between the Lines: Detecting Tracking JavaScript with Bytecode Classification. CCS 2023: 3475-3489 - [c49]Mir Masood Ali, Binoy Chitale, Mohammad Ghasemisharif, Chris Kanich, Nick Nikiforakis, Jason Polakis:
Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors. NDSS 2023 - [c48]Kostas Drakonakis, Sotiris Ioannidis, Jason Polakis:
ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning. NDSS 2023 - [c47]Xu Lin, Frederico Araujo, Teryl Taylor, Jiyong Jang, Jason Polakis:
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses. SP 2023: 987-1004 - [e2]Jason Polakis, Erik van der Kouwe:
Proceedings of the 16th European Workshop on System Security, EUROSEC 2023, Rome, Italy, 8 May 2023. ACM 2023 [contents] - 2022
- [c46]Konstantinos Solomos, Panagiotis Ilia, Nick Nikiforakis, Jason Polakis:
Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications. CCS 2022: 2675-2688 - [c45]Jide S. Edu, Cliona Mulligan, Fabio Pierazzi, Jason Polakis, Guillermo Suarez-Tangil, Jose M. Such:
Exploring the security and privacy risks of chatbots in messaging services. IMC 2022: 581-588 - [c44]Mohammad Ghasemisharif, Chris Kanich, Jason Polakis:
Towards Automated Auditing for Account and Session Management Flaws in Single Sign-On Deployments. SP 2022: 1774-1790 - [c43]Konstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, Jason Polakis:
The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions. USENIX Security Symposium 2022: 717-733 - [c42]Soroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier J. Maso, Erik Trickel, Panagiotis Ilia, Yan Shoshitaishvili, Adam Doupé, Jason Polakis:
Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention. USENIX Security Symposium 2022: 735-752 - [c41]Xu Lin, Panagiotis Ilia, Saumya Solanki, Jason Polakis:
Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting. USENIX Security Symposium 2022: 1651-1668 - [e1]Martina Lindorfer, Jason Polakis:
EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on Systems Security, Rennes, France, April 5-8, 2022. ACM 2022, ISBN 978-1-4503-9255-6 [contents] - 2021
- [c40]Michalis Diamantaris, Serafeim Moustakas, Lichao Sun, Sotiris Ioannidis, Jason Polakis:
This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration. CCS 2021: 1065-1081 - [c39]Soroush Karami, Panagiotis Ilia, Jason Polakis:
Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage. NDSS 2021 - [c38]Konstantinos Solomos, John Kristoff, Chris Kanich, Jason Polakis:
Tales of Favicons and Caches: Persistent Tracking in Modern Browsers. NDSS 2021 - [c37]John Kristoff, Mohammad Ghasemisharif, Chris Kanich, Jason Polakis:
Plight at the End of the Tunnel - Legacy IPv6 Transition Mechanisms in the Wild. PAM 2021: 390-405 - 2020
- [j4]Markos Aivazoglou, Antonios O. Roussos, Dionisis Margaris, Costas Vassilakis, Sotiris Ioannidis, Jason Polakis, Dimitris Spiliotopoulos:
A fine-grained social network recommender system. Soc. Netw. Anal. Min. 10(1): 8 (2020) - [j3]Michalis Diamantaris, Francesco Marcantoni, Sotiris Ioannidis, Jason Polakis:
The Seven Deadly Sins of the HTML5 WebAPI: A Large-scale Study on the Risks of Mobile Sensor-based Attacks. ACM Trans. Priv. Secur. 23(4): 19:1-19:31 (2020) - [c36]Xu Lin, Panagiotis Ilia, Jason Polakis:
Fill in the Blanks: Empirical Analysis of the Privacy Threats of Browser Form Autofill. CCS 2020: 507-519 - [c35]Kostas Drakonakis, Sotiris Ioannidis, Jason Polakis:
The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws. CCS 2020: 1953-1970 - [c34]Huixin Tian, Chris Kanich, Jason Polakis, Sameer Patil:
Tech Pains: Characterizations of Lived Cybersecurity Experiences. EuroS&P Workshops 2020: 250-259 - [c33]Ioannis Agadakos, Nikolaos Agadakos, Jason Polakis, Mohamed R. Amer:
Chameleons' Oblivion: Complex-Valued Deep Neural Networks for Protocol-Agnostic RF Device Fingerprinting. EuroS&P 2020: 322-338 - [c32]Soroush Karami, Panagiotis Ilia, Konstantinos Solomos, Jason Polakis:
Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting. NDSS 2020 - [c31]Brian Kondracki, Assel Aliyeva, Manuel Egele, Jason Polakis, Nick Nikiforakis:
Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers. SP 2020: 810-824
2010 – 2019
- 2019
- [c30]Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis:
REAPER: Real-time App Analysis for Augmenting the Android Permission System. CODASPY 2019: 37-48 - [c29]Kostas Drakonakis, Panagiotis Ilia, Sotiris Ioannidis, Jason Polakis:
Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data. NDSS 2019 - [c28]Francesco Marcantoni, Michalis Diamantaris, Sotiris Ioannidis, Jason Polakis:
A Large-scale Study on the Risks of the HTML5 WebAPI for Mobile Sensor-based Attacks. WWW 2019: 3063-3071 - [i2]Kostas Drakonakis, Panagiotis Ilia, Sotiris Ioannidis, Jason Polakis:
Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data. CoRR abs/1901.00897 (2019) - [i1]Ioannis Agadakos, Nikolaos Agadakos, Jason Polakis, Mohamed R. Amer:
Deep Complex Networks for Protocol-Agnostic Radio Frequency Device Fingerprinting in the Wild. CoRR abs/1909.08703 (2019) - 2018
- [c27]Mohammad Ghasemisharif, Amrutha Ramesh, Stephen Checkoway, Chris Kanich, Jason Polakis:
O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web. USENIX Security Symposium 2018: 1475-1492 - 2017
- [j2]George Argyros, Theofilos Petsios, Suphannee Sivakorn, Angelos D. Keromytis, Iasonas Polakis:
Evaluating the Privacy Guarantees of Location Proximity Services. ACM Trans. Priv. Secur. 19(4): 12:1-12:31 (2017) - [c26]Markos Aivazoglou, Orestis Roussos, Sotiris Ioannidis, Dimitris Spiliotopoulos, Jason Polakis:
Reveal: Fine-grained Recommendations in Online Social Networks. ASONAM 2017: 417-420 - [c25]Saumya Solanki, Gautam Krishnan, Varshini Sampath, Jason Polakis:
In (Cyber)Space Bots Can Hear You Speak: Breaking Audio CAPTCHAs Using OTS Speech Recognition. AISec@CCS 2017: 69-80 - [c24]Ioannis Agadakos, Jason Polakis, Georgios Portokalidis:
Techu: Open and Privacy-Preserving Crowdsourced GPS for the Masses. MobiSys 2017: 475-487 - 2016
- [j1]Despoina Antonakaki, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, Paraskevi Fragopoulou:
Exploiting abused trending topics to identify spam campaigns in Twitter. Soc. Netw. Anal. Min. 6(1): 48:1-48:11 (2016) - [c23]Suphannee Sivakorn, Iasonas Polakis, Angelos D. Keromytis:
I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs. EuroS&P 2016: 388-403 - [c22]Suphannee Sivakorn, Iasonas Polakis, Angelos D. Keromytis:
The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information. IEEE Symposium on Security and Privacy 2016: 724-742 - [c21]Suphannee Sivakorn, Angelos D. Keromytis, Jason Polakis:
That's the Way the Cookie Crumbles: Evaluating HTTPS Enforcing Mechanisms. WPES@CCS 2016: 71-81 - 2015
- [c20]Iasonas Polakis, Panagiotis Ilia, Zacharias Tzermias, Sotiris Ioannidis, Paraskevi Fragopoulou:
Social Forensics: Searching for Needles in Digital Haystacks. BADGERS@RAID 2015: 54-66 - [c19]Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, Sotiris Ioannidis:
Face/Off: Preventing Privacy Leakage From Photos in Social Networks. CCS 2015: 781-792 - [c18]Iasonas Polakis, George Argyros, Theofilos Petsios, Suphannee Sivakorn, Angelos D. Keromytis:
Where's Wally?: Precise User Discovery Attacks in Location Proximity Services. CCS 2015: 817-828 - [c17]Iasonas Polakis, Michalis Diamantaris, Thanasis Petsas, Federico Maggi, Sotiris Ioannidis:
Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software. DIMVA 2015: 165-184 - 2014
- [b1]Iasonas Polakis:
Online social networks from a malicious perspective: novel attack techniques and defense mechanisms. University of Crete, Greece, 2014 - [c16]Iasonas Polakis, Federico Maggi, Stefano Zanero, Angelos D. Keromytis:
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned. BADGERS@ESORICS 2014: 18-29 - [c15]Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, Angelos D. Keromytis:
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication. CCS 2014: 501-512 - [c14]Despoina Antonakaki, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, Paraskevi Fragopoulou:
Think Before RT: An Experimental Study of Abusing Twitter Trends. SocInfo Workshops 2014: 402-413 - 2013
- [c13]Iasonas Polakis, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos:
The man who was there: validating check-ins in location-based services. ACSAC 2013: 19-28 - 2012
- [c12]Iasonas Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, Sotiris Ioannidis, Angelos D. Keromytis, Stefano Zanero:
All your face are belong to us: breaking Facebook's social authentication. ACSAC 2012: 399-408 - 2011
- [c11]Iasonas Polakis, Georgios Kontaxis, Sotiris Ioannidis:
CAPTCHuring Automated (Smart) Phone Attacks. SysSec@DIMVA 2011: 27-34 - [c10]Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis:
Outsourcing Malicious Infrastructure to the Cloud. SysSec@DIMVA 2011: 35-42 - [c9]Georgios Kontaxis, Iasonas Polakis, Michalis Polychronakis, Evangelos P. Markatos:
dead.drop: URL-Based Stealthy Messaging. EC2ND 2011: 17-24 - [c8]Iasonas Polakis, Georgios Kontaxis, Sotiris Ioannidis:
CAPTCHuring Automated (Smart)Phone Attacks. EC2ND 2011: 60 - [c7]Georgios Kontaxis, Demetres Antoniades, Iasonas Polakis, Evangelos P. Markatos:
An empirical study on the security of cross-domain policies in rich internet applications. EUROSEC 2011: 7 - [c6]Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis, Evangelos P. Markatos:
Detecting social network profile cloning. PerCom Workshops 2011: 295-300 - [c5]Iasonas Polakis, Georgios Kontaxis, Sotiris Ioannidis, Evangelos P. Markatos:
Dynamic Monitoring of Dark IP Address Space (Poster). TMA 2011: 193-196 - [c4]Demetres Antoniades, Iasonas Polakis, Georgios Kontaxis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos, Thomas Karagiannis:
we.b: the web of short urls. WWW 2011: 715-724 - 2010
- [c3]Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos:
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks. ESORICS 2010: 663-678 - [c2]Iasonas Polakis, Thanasis Petsas, Evangelos P. Markatos, Spyros Antonatos:
A Systematic Characterization of IM Threats using Honeypots. NDSS 2010 - [c1]Iasonas Polakis, Georgios Kontaxis, Spyros Antonatos, Eleni Gessiou, Thanasis Petsas, Evangelos P. Markatos:
Using social networks to harvest email addresses. WPES 2010: 11-20
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint