Face/off: Preventing privacy leakage from photos in social networks P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis Proceedings of the 22nd ACM SIGSAC Conference on computer and communications …, 2015 | 196 | 2015 |
I am robot:(deep) learning to break semantic image captchas S Sivakorn, I Polakis, AD Keromytis 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 388-403, 2016 | 189 | 2016 |
Detecting social network profile cloning G Kontaxis, I Polakis, S Ioannidis, EP Markatos 2011 IEEE international conference on pervasive computing and communications …, 2011 | 181 | 2011 |
we. b: The web of short URLs D Antoniades, I Polakis, G Kontaxis, E Athanasopoulos, S Ioannidis, ... Proceedings of the 20th international conference on World Wide Web, 715-724, 2011 | 153 | 2011 |
The cracked cookie jar: HTTP cookie hijacking and the exposure of private information S Sivakorn, I Polakis, AD Keromytis 2016 IEEE Symposium on Security and Privacy (SP), 724-742, 2016 | 112 | 2016 |
I’m not a human: Breaking the Google reCAPTCHA S Sivakorn, J Polakis, AD Keromytis Black Hat 14, 1-12, 2016 | 109 | 2016 |
Where's wally? precise user discovery attacks in location proximity services I Polakis, G Argyros, T Petsios, S Sivakorn, AD Keromytis Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 92 | 2015 |
O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web M Ghasemisharif, A Ramesh, S Checkoway, C Kanich, J Polakis 27th USENIX Security Symposium (USENIX Security '18), 2018 | 87 | 2018 |
Using social networks to harvest email addresses I Polakis, G Kontaxis, S Antonatos, E Gessiou, T Petsas, EP Markatos Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic …, 2010 | 73 | 2010 |
The cookie hunter: Automated black-box auditing for web authentication and authorization flaws K Drakonakis, S Ioannidis, J Polakis Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 69 | 2020 |
All your face are belong to us: Breaking facebook's social authentication I Polakis, M Lancini, G Kontaxis, F Maggi, S Ioannidis, AD Keromytis, ... Proceedings of the 28th annual computer security applications conference …, 2012 | 65 | 2012 |
A fine-grained social network recommender system M Aivazoglou, AO Roussos, D Margaris, C Vassilakis, S Ioannidis, ... Social Network Analysis and Mining 10, 1-18, 2020 | 60 | 2020 |
Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting S Karami, P Ilia, K Solomos, J Polakis Annual Network and Distributed System Security Symposium (NDSS), 2020 | 58 | 2020 |
REAPER: Real-time App Analysis for Augmenting the Android Permission System M Diamantaris, EP Papadopoulos, EP Markatos, S Ioannidis, J Polakis 9th ACM Conference on Data and Application Security and Privacy (CODASPY), 2019 | 51 | 2019 |
Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta) Data K Drakonakis, P Ilia, S Ioannidis, J Polakis 25th Network and Distributed System Security Symposium (NDSS),, 2019 | 42 | 2019 |
Tales of Favicons and Caches: Persistent Tracking in Modern Browsers K Solomos, J Kristoff, C Kanich, J Polakis Network and Distributed System Security Symposium (NDSS), 2021 | 41 | 2021 |
The man who was there: validating check-ins in location-based services I Polakis, S Volanis, E Athanasopoulos, EP Markatos Proceedings of the 29th Annual Computer Security Applications Conference, 19-28, 2013 | 40 | 2013 |
Chameleons' oblivion: Complex-valued deep neural networks for protocol-agnostic RF device fingerprinting I Agadakos, N Agadakos, J Polakis, MR Amer 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 322-338, 2020 | 35 | 2020 |
In (cyber) space bots can hear you speak: Breaking audio captchas using ots speech recognition S Solanki, G Krishnan, V Sampath, J Polakis Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security …, 2017 | 33 | 2017 |
Faces in the distorting mirror: Revisiting photo-based social authentication I Polakis, P Ilia, F Maggi, M Lancini, G Kontaxis, S Zanero, S Ioannidis, ... Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 33 | 2014 |