Gianluca Stringhini

Orcid: 0000-0002-6162-578X

Affiliations:
  • Boston University, MA, USA


According to our database1, Gianluca Stringhini authored at least 159 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Understanding the Use of Images to Spread COVID-19 Misinformation on Twitter.
Proc. ACM Hum. Comput. Interact., April, 2023

Sliding into My DMs: Detecting Uncomfortable or Unsafe Sexual Risk Experiences within Instagram Direct Messages Grounded in the Perspective of Youth.
Proc. ACM Hum. Comput. Interact., April, 2023

Getting Meta: A Multimodal Approach for Detecting Unsafe Conversations within Instagram Direct Messages of Youth.
Proc. ACM Hum. Comput. Interact., April, 2023

Can Large Language Models Identify And Reason About Security Vulnerabilities? Not Yet.
CoRR, 2023

TUBERAIDER: Attributing Coordinated Hate Attacks on YouTube Videos to their Source Communities.
CoRR, 2023

Towards Automated Detection of Risky Images Shared by Youth on Social Media.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

Beyond Fish and Bicycles: Exploring the Varieties of Online Women's Ideological Spaces.
Proceedings of the 15th ACM Web Science Conference 2023, 2023

FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules.
Proceedings of the 32nd USENIX Security Symposium, 2023

Lambretta: Learning to Rank for Twitter Soft Moderation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Non-polar Opposites: Analyzing the Relationship between Echo Chambers and Hostile Intergroup Interactions on Reddit.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023

Enabling Privacy-preserving Multidimensional Network Telemetry with Autoencoders.
Proceedings of the IEEE International Conference on Cloud Engineering, 2023

Poster Paper: Efficient Navigation of Cloud Performance with 'nuffTrace.
Proceedings of the IEEE International Conference on Cloud Engineering, 2023

SoK: Content Moderation in Social Media, from Guidelines to Enforcement, and Research to Practice.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
Eight Years of Rider Measurement in the Android Malware Ecosystem.
IEEE Trans. Dependable Secur. Comput., 2022

A First Look at Zoombombing.
IEEE Secur. Priv., 2022

SoK: Content Moderation in Social Media, from Guidelines to Enforcement, and Research to Practice.
CoRR, 2022

Slapping Cats, Bopping Heads, and Oreo Shakes: Understanding Indicators of Virality in TikTok Short Videos.
Proceedings of the WebSci '22: 14th ACM Web Science Conference 2022, Barcelona, Spain, June 26, 2022

A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned.
Proceedings of the 31st USENIX Security Symposium, 2022

TrollMagnifier: Detecting State-Sponsored Troll Accounts on Reddit.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

There are N Impostors Among Us: Understanding the Effect of State-Sponsored Troll Accounts on Reddit Discussions.
Proceedings of the Workshop Proceedings of the 16th International AAAI Conference on Web and Social Media, 2022

A Longitudinal Study of the Gettr Social Network.
Proceedings of the Workshop Proceedings of the 16th International AAAI Conference on Web and Social Media, 2022

The Gospel according to Q: Understanding the QAnon Conspiracy from the Perspective of Canonical Information.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

"It Is Just a Flu": Assessing the Effect of Watch History on YouTube's Pseudoscientific Video Recommendations.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

Feels Bad Man: Dissecting Automated Hateful Meme Detection Through the Lens of Facebook's Challenge.
Proceedings of the Workshop Proceedings of the 16th International AAAI Conference on Web and Social Media, 2022

Instagram Data Donation: A Case Study on Collecting Ecologically Valid Social Media Data for the Purpose of Adolescent Online Risk Detection.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

Understanding the Digital Lives of Youth: Analyzing Media Shared within Safe Versus Unsafe Private Conversations on Instagram.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain Chatbots.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Finding MNEMON: Reviving Memories of Node Embeddings.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

CERBERUS: Exploring Federated Prediction of Security Events.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Shedding Light on the Targeted Victim Profiles of Malicious Downloaders.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Do Platform Migrations Compromise Content Moderation? Evidence from r/The_Donald and r/Incels.
Proc. ACM Hum. Comput. Interact., 2021

A Human-Centered Systematic Literature Review of the Computational Approaches for Online Sexual Risk Detection.
Proc. ACM Hum. Comput. Interact., 2021

"How over is it?" Understanding the Incel Community on YouTube.
Proc. ACM Hum. Comput. Interact., 2021

Dissecting the Meme Magic: Understanding Indicators of Virality in Image Memes.
Proc. ACM Hum. Comput. Interact., 2021

A Human-Centered Systematic Literature Review of Cyberbullying Detection Algorithms.
Proc. ACM Hum. Comput. Interact., 2021

"I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers.
Proc. ACM Hum. Comput. Interact., 2021

Soros, Child Sacrifices, and 5G: Understanding the Spread of Conspiracy Theories on Web Communities.
CoRR, 2021

An Early Look at the Gettr Social Network.
CoRR, 2021

An Early Look at the Parler Online Social Network.
CoRR, 2021

"Go eat a bat, Chang!": On the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19.
Proceedings of the WWW '21: The Web Conference 2021, 2021

"Is it a Qoincidence?": An Exploratory Study of QAnon on Voat.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Understanding the Effect of Deplatforming on Social Networks.
Proceedings of the WebSci '21: 13th ACM Web Science Conference 2021, 2021

SocialHEISTing: Understanding Stolen Facebook Accounts.
Proceedings of the 30th USENIX Security Symposium, 2021

e-Game of FAME: Automatic Detection of FAke MEmes.
Proceedings of the 2021 Truth and Trust Online Conference (TTO 2021), 2021

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

JABBIC Lookups: A Backend Telemetry-Based System for Malware Triage.
Proceedings of the Security and Privacy in Communication Networks, 2021

Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Understanding Worldwide Private Information Collection on Android.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Understanding the Use of Fauxtography on Social Media.
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021

The Evolution of the Manosphere across the Web.
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021

You Don't Know How I Feel: Insider-Outsider Perspective Gaps in Cyberbullying Risk Detection.
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021

A Large Open Dataset from the Parler Social Network.
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021

AppJitsu: Investigating the Resiliency of Android Applications.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

ANDRuspex: Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

The shady economy: Understanding the difference in trading activity from underground forums in different layers of the Web.
Proceedings of the APWG Symposium on Electronic Crime Research, 2021

MOSafely: Building an Open-Source HCAI Community to Make the Internet a Safer Place for Youth.
Proceedings of the Companion Publication of the 2021 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2021

A Multi-Platform Analysis of Political News Discussion and Sharing on Web Communities.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Automatically Dismantling Online Dating Fraud.
IEEE Trans. Inf. Forensics Secur., 2020

Pseudoscientific Content on YouTube: Assessing the Effects of Watch History on the Recommendation Algorithm.
CoRR, 2020

Does Platform Migration Compromise Content Moderation? Evidence from r/The_Donald and r/Incels.
CoRR, 2020

"Is it a Qoincidence?": A First Step Towards Understanding and Characterizing the QAnon Movement on Voat.co.
CoRR, 2020

"Go eat a bat, Chang!": An Early Look on the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19.
CoRR, 2020

Understanding the Incel Community on YouTube.
CoRR, 2020

From Pick-Up Artists to Incels: A Data-Driven Sketch of the Manosphere.
CoRR, 2020

Measuring and Characterizing Hate Speech on News Websites.
Proceedings of the WebSci '20: 12th ACM Conference on Web Science, 2020

Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020

Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020

Disturbed YouTube for Kids: Characterizing and Detecting Inappropriate Videos Targeting Young Children.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020

Examining the Impact of Social Distance on the Reaction to a Tragedy. A Case Study on Sulli's Death.
Proceedings of the Workshop Proceedings of the 14th International AAAI Conference on Web and Social Media, 2020

A Measurement Study on the Advertisements Displayed to Web Users Coming from the Regular Web and from Tor.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Libspector : Context-Aware Large-Scale Network Traffic Analysis of Android Applications.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Detecting Cyberbullying and Cyberaggression in Social Media.
ACM Trans. Web, 2019

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version).
ACM Trans. Priv. Secur., 2019

"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks.
Proc. ACM Hum. Comput. Interact., 2019

Cybersafety Threats - from Deception to Aggression (Dagstuhl Seminar 19302).
Dagstuhl Reports, 2019

Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime.
CoRR, 2019

Disturbed YouTube for Kids: Characterizing and Detecting Disturbing Content on YouTube.
CoRR, 2019

Characterizing the Use of Images by State-Sponsored Troll Accounts on Twitter.
CoRR, 2019

Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

PYTHIA: a Framework for the Automated Analysis of Web Hosting Environments.
Proceedings of the World Wide Web Conference, 2019

Who Watches the Watchmen: Exploring Complaints on the Web.
Proceedings of the World Wide Web Conference, 2019

Fatal attraction: identifying mobile devices through electromagnetic emissions.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Who Let The Trolls Out?: Towards Understanding State-Sponsored Trolls.
Proceedings of the 11th ACM Conference on Web Science, 2019

ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks.
Proceedings of the 28th USENIX Security Symposium, 2019

Master of Sheets: A Tale of Compromised Cloud Documents.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

A Qualitative Evaluation of Two Different Law Enforcement Approaches on Dark Net Markets.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

BorderPatrol: Securing BYOD using Fine-Grained Contextual Information.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

On the Perils of Leaking Referrers in Online Collaboration Services.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Studying users' adaptation to Android's run-time fine-grained access control system.
J. Inf. Secur. Appl., 2018

A Family of Droids: Analyzing Behavioral Model based Android Malware Detection via Static and Dynamic Analysis.
CoRR, 2018

Eight Years of Rider Measurement in the Android Malware Ecosystem: Evolution and Lessons Learned.
CoRR, 2018

From risk factors to detection and intervention: a practical proposal for future work on cyberbullying.
Behav. Inf. Technol., 2018

What is Gab: A Bastion of Free Speech or an Alt-Right Echo Chamber.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

BABELTOWER: How Language Affects Criminal Activity in Stolen Webmail Accounts.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

On the Origins of Memes by Means of Fringe Web Communities.
Proceedings of the Internet Measurement Conference 2018, 2018

Understanding Web Archiving Services and Their (Mis)Use on Social Media.
Proceedings of the Twelfth International Conference on Web and Social Media, 2018

You Are Your Metadata: Identification and Obfuscation of Social Media Users Using Metadata Information.
Proceedings of the Twelfth International Conference on Web and Social Media, 2018

Movie Pirates of the Caribbean: Exploring Illegal Streaming Cyberlockers.
Proceedings of the Twelfth International Conference on Web and Social Media, 2018

Large Scale Crowdsourcing and Characterization of Twitter Abusive Behavior.
Proceedings of the Twelfth International Conference on Web and Social Media, 2018

Tiresias: Predicting Security Events Through Deep Learning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

LOBO: Evaluation of Generalization Deficiencies in Twitter Bot Classifiers.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Towards Detecting Compromised Accounts on Social Networks.
IEEE Trans. Dependable Secur. Comput., 2017

International comparison of bank fraud reimbursement: customer perceptions and contractual terms.
J. Cybersecur., 2017

Email Babel: Does Language Affect Criminal Activity in Compromised Webmail Accounts?
CoRR, 2017

Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF).
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

What's in a Name?: Understanding Profile Name Reuse on Twitter.
Proceedings of the 26th International Conference on World Wide Web, 2017

Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Detecting Aggressors and Bullies on Twitter.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Mean Birds: Detecting Aggression and Bullying on Twitter.
Proceedings of the 2017 ACM on Web Science Conference, 2017

The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

The web centipede: understanding how web communities influence each other through the lens of mainstream and alternative news sources.
Proceedings of the 2017 Internet Measurement Conference, 2017

Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

Hate is not Binary: Studying Abusive Behavior of #GamerGate on Twitter.
Proceedings of the 28th ACM Conference on Hypertext and Social Media, 2017

A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

All your cards are belong to us: Understanding online carding forums.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

POISED: Spotting Twitter Spam Off the Beaten Paths.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

PayBreak: Defense Against Cryptographic Ransomware.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Ex-Ray: Detection of History-Leaking Browser Extensions.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Marmite: Spreading Malicious File Reputation Through Download Graphs.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Class-based Prediction Errors to Detect Hate Speech with Out-of-vocabulary Words.
Proceedings of the First Workshop on Abusive Language Online, 2017

2016
A Longitudinal Measurement Study of 4chan's Politically Incorrect Forum and its Effect on the Web.
CoRR, 2016

Permissions snapshots: Assessing users' adaptation to the Android runtime permission model.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Honey Sheets: What Happens to Leaked Google Spreadsheets?
Proceedings of the 9th Workshop on Cyber Security Experimentation and Test, 2016

What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Are Payment Card Contracts Unfair? (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

Why allowing profile name reuse is a bad idea.
Proceedings of the 9th European Workshop on System Security, 2016

What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Master of Puppets: Analyzing And Attacking A Botnet For Fun And Profit.
CoRR, 2015

EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services.
Proceedings of the 24th USENIX Security Symposium, 2015

On the threats to Cloud-based online service users (and what we can do about them).
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

That Ain't You: Blocking Spearphishing Through Behavioral Modelling.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

Quit Playing Games with My Heart: Understanding Online Dating Scams.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

Drops for Stuff: An Analysis of Reshipping Mule Scams.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Stepping Up the Cybersecurity Game: Protecting Online Services from Malicious Activity.
PhD thesis, 2014

That Ain't You: Detecting Spearphishing Emails Before They Are Sent.
CoRR, 2014

Stranger danger: exploring the ecosystem of ad-based URL shortening services.
Proceedings of the 23rd International World Wide Web Conference, 2014

The Tricks of the Trade: What Makes Spam Campaigns Successful?
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements.
Proceedings of the 2014 Internet Measurement Conference, 2014

The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared?
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014

2013
Two years of short URLs internet measurement: security threats and countermeasures.
Proceedings of the 22nd International World Wide Web Conference, 2013

COMPA: Detecting Compromised Accounts on Social Networks.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Follow the green: growth and dynamics in twitter follower markets.
Proceedings of the 2013 Internet Measurement Conference, 2013

Shady paths: leveraging surfing crowds to detect malicious web pages.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Poultry markets: on the underground economy of twitter followers.
Comput. Commun. Rev., 2012

B@bel: Leveraging Email Delivery for Spam Mitigation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

2011
BOTMAGNIFIER: Locating Spambots on the Internet.
Proceedings of the 20th USENIX Security Symposium, 2011

The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Hit 'em where it hurts: a live security exercise on cyber situational awareness.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Travelling Information For Intrusion Prevention Systems.
Proceedings of the 2010 International Conference on Security & Management, 2010

Detecting spammers on social networks.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010


  Loading...