Detecting social network profile cloning G Kontaxis, I Polakis, S Ioannidis, EP Markatos Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 …, 2011 | 180 | 2011 |
we. b: The web of short URLs D Antoniades, I Polakis, G Kontaxis, E Athanasopoulos, S Ioannidis, ... Proceedings of the 20th international conference on World wide web, 715-724, 2011 | 151 | 2011 |
SAuth: protecting user accounts from password database leaks G Kontaxis, E Athanasopoulos, G Portokalidis, AD Keromytis Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 75 | 2013 |
Using social networks to harvest email addresses I Polakis, G Kontaxis, S Antonatos, E Gessiou, T Petsas, EP Markatos Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010 | 73 | 2010 |
All your face are belong to us: breaking Facebook's social authentication I Polakis, M Lancini, G Kontaxis, F Maggi, S Ioannidis, AD Keromytis, ... Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 64 | 2012 |
Privacy-preserving social plugins G Kontaxis, M Polychronakis, AD Keromytis, EP Markatos Proceedings of the 21st USENIX Security Symposium (August 2012), 2012 | 54 | 2012 |
Tracking Protection in Firefox For Privacy and Performance G Kontaxis, M Chew | 45* | |
Minimizing information disclosure to third parties in social login platforms G Kontaxis, M Polychronakis, EP Markatos International Journal of Information Security 11 (5), 321-332, 2012 | 42 | 2012 |
Faces in the distorting mirror: Revisiting photo-based social authentication I Polakis, P Ilia, F Maggi, M Lancini, G Kontaxis, S Zanero, S Ioannidis, ... Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 32 | 2014 |
An empirical study on the security of cross-domain policies in rich internet applications G Kontaxis, D Antoniades, I Polakis, EP Markatos Proceedings of the Fourth European Workshop on System Security, 7, 2011 | 19 | 2011 |
SudoWeb: Minimizing information disclosure to third parties in single sign-on platforms G Kontaxis, M Polychronakis, EP Markatos International Conference on Information Security, 197-212, 2011 | 17 | 2011 |
Methods, systems, and media for authenticating users using multiple services AD Keromytis, E Athanasopoulos, G Kontaxis, G Portokalidis US Patent App. 15/032,940, 2014 | 13* | 2014 |
Outsourcing Malicious Infrastructure to the Cloud G Kontaxis, I Polakis, S Ioannidis SysSec Workshop (SysSec), 2011 First, 35-42, 2011 | 5 | 2011 |
Protecting Insecure Communications with Topology-aware Network Tunnels G Kontaxis, AD Keromytis Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 3 | 2016 |
dead. drop: URL-based Stealthy Messaging G Kontaxis, I Polakis, M Polychronakis, EP Markatos Proc. 7th European Conf. Comput. Network Defense (EC2ND), 17-24, 2011 | 3 | 2011 |