Panagiotis Ilia

Orcid: 0000-0002-8609-1008

According to our database1, Panagiotis Ilia authored at least 26 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions.
Proceedings of the 31st USENIX Security Symposium, 2022

Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting.
Proceedings of the 31st USENIX Security Symposium, 2022

Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention.
Proceedings of the 31st USENIX Security Symposium, 2022

Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Cookie Swap Party: Abusing First-Party Cookies for Web Tracking.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Design and Implementation of a Compressed Certificate Status Protocol.
ACM Trans. Internet Techn., 2020

Clash of the Trackers: Measuring the Evolution of the Online Tracking Ecosystem.
Proceedings of the 4th Network Traffic Measurement and Analysis Conference, 2020

Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Fill in the Blanks: Empirical Analysis of the Privacy Threats of Browser Form Autofill.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Clash of the Trackers: Measuring the Evolution of the Online Tracking Ecosystem.
CoRR, 2019

TALON: An Automated Framework for Cross-Device Tracking Detection.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking.
Proceedings of the Information Security - 22nd International Conference, 2019

2018
Cross-Device Tracking: Systematic Method to Detect and Measure CDT.
CoRR, 2018

Truth in Web Mining: Measuring the Profitability and Cost of Cryptominers as a Web Monetization Model.
CoRR, 2018

Automated Measurements of Cross-Device Tracking.
Proceedings of the Information and Operational Technology Security Systems, 2018

A Large-scale Analysis of Content Modification by Open HTTP Proxies.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
CCSP: A compressed certificate status protocol.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

SAMPAC: Socially-Aware collaborative Multi-Party Access Control.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
DCSP: performant certificate revocation a DNS-based approach.
Proceedings of the 9th European Workshop on System Security, 2016

2015
Face/Off: Preventing Privacy Leakage From Photos in Social Networks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Social Forensics: Searching for Needles in Digital Haystacks.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

2014
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks.
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013


  Loading...