关注
Jason Polakis
Jason Polakis
其他姓名Iasonas Polakis
在 uic.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Face/off: Preventing privacy leakage from photos in social networks
P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis
Proceedings of the 22nd ACM SIGSAC Conference on computer and communications …, 2015
1942015
Detecting social network profile cloning
G Kontaxis, I Polakis, S Ioannidis, EP Markatos
2011 IEEE international conference on pervasive computing and communications …, 2011
1832011
I am robot:(deep) learning to break semantic image captchas
S Sivakorn, I Polakis, AD Keromytis
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 388-403, 2016
1812016
we. b: The web of short URLs
D Antoniades, I Polakis, G Kontaxis, E Athanasopoulos, S Ioannidis, ...
Proceedings of the 20th international conference on World Wide Web, 715-724, 2011
1512011
The cracked cookie jar: HTTP cookie hijacking and the exposure of private information
S Sivakorn, I Polakis, AD Keromytis
2016 IEEE Symposium on Security and Privacy (SP), 724-742, 2016
1082016
I’m not a human: Breaking the Google reCAPTCHA
S Sivakorn, J Polakis, AD Keromytis
Black Hat 14, 1-12, 2016
1032016
Where's wally? precise user discovery attacks in location proximity services
I Polakis, G Argyros, T Petsios, S Sivakorn, AD Keromytis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
892015
O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web
M Ghasemisharif, A Ramesh, S Checkoway, C Kanich, J Polakis
27th USENIX Security Symposium (USENIX Security '18), 2018
832018
Using social networks to harvest email addresses
I Polakis, G Kontaxis, S Antonatos, E Gessiou, T Petsas, EP Markatos
Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic …, 2010
742010
The cookie hunter: Automated black-box auditing for web authentication and authorization flaws
K Drakonakis, S Ioannidis, J Polakis
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
642020
All your face are belong to us: Breaking facebook's social authentication
I Polakis, M Lancini, G Kontaxis, F Maggi, S Ioannidis, AD Keromytis, ...
Proceedings of the 28th annual computer security applications conference …, 2012
632012
A fine-grained social network recommender system
M Aivazoglou, AO Roussos, D Margaris, C Vassilakis, S Ioannidis, ...
Social Network Analysis and Mining 10, 1-18, 2020
582020
Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting
S Karami, P Ilia, K Solomos, J Polakis
Annual Network and Distributed System Security Symposium (NDSS), 2020
522020
REAPER: Real-time App Analysis for Augmenting the Android Permission System
M Diamantaris, EP Papadopoulos, EP Markatos, S Ioannidis, J Polakis
9th ACM Conference on Data and Application Security and Privacy (CODASPY), 2019
452019
Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta) Data
K Drakonakis, P Ilia, S Ioannidis, J Polakis
25th Network and Distributed System Security Symposium (NDSS),, 2019
402019
The man who was there: validating check-ins in location-based services
I Polakis, S Volanis, E Athanasopoulos, EP Markatos
Proceedings of the 29th Annual Computer Security Applications Conference, 19-28, 2013
392013
Tales of Favicons and Caches: Persistent Tracking in Modern Browsers
K Solomos, J Kristoff, C Kanich, J Polakis
Network and Distributed System Security Symposium (NDSS), 2021
372021
Chameleons' oblivion: Complex-valued deep neural networks for protocol-agnostic RF device fingerprinting
I Agadakos, N Agadakos, J Polakis, MR Amer
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 322-338, 2020
322020
In (cyber) space bots can hear you speak: Breaking audio captchas using ots speech recognition
S Solanki, G Krishnan, V Sampath, J Polakis
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security …, 2017
322017
That's the Way the Cookie Crumbles: Evaluating HTTPS Enforcing Mechanisms
S Sivakorn, AD Keromytis, J Polakis
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016
322016
系统目前无法执行此操作,请稍后再试。
文章 1–20