Nick Nikiforakis

Orcid: 0000-0002-9366-357X

According to our database1, Nick Nikiforakis authored at least 92 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The More Things Change, the More They Stay the Same: Integrity of Modern JavaScript.
Proceedings of the ACM Web Conference 2023, 2023

Scan Me If You Can: Understanding and Detecting Unwanted Vulnerability Scanning.
Proceedings of the ACM Web Conference 2023, 2023

Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis.
Proceedings of the 32nd USENIX Security Symposium, 2023

AnimateDead: Debloating Web Applications Using Concolic Execution.
Proceedings of the 32nd USENIX Security Symposium, 2023

Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Role Models: Role-based Debloating for Web Applications.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
Verba Volant, Scripta Volant: Understanding Post-publication Title Changes in News Outlets.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions.
Proceedings of the 31st USENIX Security Symposium, 2022

Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots.
Proceedings of the 31st USENIX Security Symposium, 2022

Domains Do Change Their Spots: Quantifying Potential Abuse of Residual Trust.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

The Droid is in the Details: Environment-aware Evasion of Android Sandboxes.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Where are you taking me?Understanding Abusive Traffic Distribution Systems.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets.
Proceedings of the 30th USENIX Security Symposium, 2021

Good Bot, Bad Bot: Characterizing Automated Browsing Activity.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Click This, Not That: Extending Web Authentication with Deception.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Need for Mobile Speed: A Historical Study of Mobile Web Performance.
Proceedings of the 4th Network Traffic Measurement and Analysis Conference, 2020

Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Short Paper - Taming the Shape Shifter: Detecting Anti-fingerprinting Browsers.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

Web Runner 2049: Evaluating Third-Party Anti-bot Services.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

You've Changed: Detecting Malicious Browser Extensions through their Update Deltas.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Unnecessarily Identifiable: Quantifying the fingerprintability of browser extensions due to bloat.
Proceedings of the World Wide Web Conference, 2019

Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting.
Proceedings of the 28th USENIX Security Symposium, 2019

Less is More: Quantifying the Security Benefits of Debloating Web Applications.
Proceedings of the 28th USENIX Security Symposium, 2019

Now You See It, Now You Don't: A Large-scale Analysis of Early Domain Deletions.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

Purchased Fame: Exploring the Ecosystem of Private Blog Networks.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Web Application Security (Dagstuhl Seminar 18321).
Dagstuhl Reports, 2018

Betrayed by Your Dashboard: Discovering Malicious Campaigns via Web Analytics.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Panning for gold.com: Understanding the Dynamics of Domain Dropcatching.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

PrivacyMeter: Designing and Developing a Privacy-Preserving Browser Extension.
Proceedings of the Engineering Secure Software and Systems - 10th International Symposium, 2018

2017
Online Privacy and Web Transparency (Dagstuhl Seminar 17162).
Dagstuhl Reports, 2017

By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers.
CoRR, 2017

Extended Tracking Powers: Measuring the Privacy Diffusion Enabled by Browser Extensions.
Proceedings of the 26th International Conference on World Wide Web, 2017

What's in a Name?: Understanding Profile Name Reuse on Twitter.
Proceedings of the 26th International Conference on World Wide Web, 2017

XHOUND: Quantifying the Fingerprintability of Browser Extensions.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Dial One for Scam: A Large-Scale Analysis of Technical Support Scams.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

The Wolf of Name Street: Hijacking Domains Through Their Nameservers.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms.
Proc. Priv. Enhancing Technol., 2016

Dial One for Scam: Analyzing and Detecting Technical Support Scams.
CoRR, 2016

No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells.
Proceedings of the 25th International Conference on World Wide Web, 2016

It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Why allowing profile name reuse is a bad idea.
Proceedings of the 9th European Workshop on System Security, 2016

2015
Protected Web Components: Hiding Sensitive Information in the Shadows.
IT Prof., 2015

PriVaricator: Deceiving Fingerprinters with Little White Lies.
Proceedings of the 24th International Conference on World Wide Web, 2015

Parking Sensors: Analyzing and Detecting Parked Domains.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Maneuvering Around Clouds: Bypassing Cloud-based Security Providers.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Drops for Stuff: An Analysis of Reshipping Mule Scams.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

The Clock is Still Ticking: Timing Attacks in the Modern Web.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Secure multi-execution of web scripts: Theory and practice.
J. Comput. Secur., 2014

On the Workings and Current Practices of Web-Based Device Fingerprinting.
IEEE Secur. Priv., 2014

On the effectiveness of virtualization-based security.
CoRR, 2014

Stranger danger: exploring the ecosystem of ad-based URL shortening services.
Proceedings of the 23rd International World Wide Web Conference, 2014

Large-Scale Security Analysis of the Web: Challenges and Findings.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Security Analysis of the Chinese Web: How well is it protected?
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014

Soundsquatting: Uncovering the Use of Homophones in Domain Squatting.
Proceedings of the Information Security - 17th International Conference, 2014

Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Bitsquatting: exploiting bit-flips for fun, or profit?
Proceedings of the 22nd International World Wide Web Conference, 2013

Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

A Dangerous Mix: Large-Scale Analysis of Mixed-Content Websites.
Proceedings of the Information Security, 16th International Conference, 2013

HeapSentry: Kernel-Assisted Protection against Heap Overflows.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013

TabShots: client-side detection of tabnabbing attacks.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

FPDetective: dusting the web for fingerprinters.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Recent Developments in Low-Level Software Security.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

HyperForce: Hypervisor-enForced Execution of Security-Critical Code.
Proceedings of the Information Security and Privacy Research, 2012

DEMACRO: Defense against Malicious Cross-Domain Requests.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Exploring the Ecosystem of Referrer-Anonymizing Services.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

There Is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication.
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012

Serene: Self-Reliant Client-Side Protection against Session Fixation.
Proceedings of the Distributed Applications and Interoperable Systems, 2012

You are what you include: large-scale evaluation of remote javascript inclusions.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

FlowFox: a web browser with flexible and precise information flow control.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Exposing the Lack of Privacy in File Hosting Services.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Hello rootKitty: A Lightweight Invariance-Enforcing Framework.
Proceedings of the Information Security, 14th International Conference, 2011

Abusing locality in shared web hosting.
Proceedings of the Fourth European Workshop on System Security, 2011

SessionShield: Lightweight Protection against Session Hijacking.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

RIPE: runtime intrusion prevention evaluator.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows.
Proceedings of the Information Systems Security - 6th International Conference, 2010

HProxy: Client-Side Detection of SSL Stripping Attacks.
Proceedings of the Detection of Intrusions and Malware, 2010


  Loading...