Follow
Panagiotis Ilia
Title
Cited by
Cited by
Year
Face/off: Preventing privacy leakage from photos in social networks
P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1882015
Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting
S Karami, P Ilia, K Solomos, J Polakis
Network and Distributed System Security Symposium (NDSS), 2020
472020
A Large-scale Analysis of Content Modification by Open HTTP Proxies
G Tsirantonakis, P Ilia, S Ioannidis, E Athanasopoulos, M Polychronakis
Network and Distributed System Security Symposium (NDSS), 2018
472018
Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking
P Papadopoulos, P Ilia, E Markatos
International Conference on Information Security, 277-296, 2019
41*2019
Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta) Data
K Drakonakis, P Ilia, S Ioannidis, J Polakis
Network and Distributed System Security Symposium (NDSS), 2019
402019
SAMPAC: socially-aware collaborative multi-party access control
P Ilia, B Carminati, E Ferrari, P Fragopoulou, S Ioannidis
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
402017
Cookie Swap Party: Abusing First-Party Cookies for Web Tracking
Q Chen, P Ilia, M Polychronakis, A Kapravelos
Proceedings of the Web Conference 2021, 2117-2129, 2021
392021
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation
P Papadopoulos, P Ilia, M Polychronakis, EP Markatos, S Ioannidis, ...
Network and Distributed System Security Symposium (NDSS), 2019
382019
Faces in the distorting mirror: Revisiting photo-based social authentication
I Polakis, P Ilia, F Maggi, M Lancini, G Kontaxis, S Zanero, S Ioannidis, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
302014
Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage
S Karami, P Ilia, J Polakis
Network and Distributed System Security Symposium (NDSS), 2021
282021
Fill in the Blanks: Empirical Analysis of the Privacy Threats of Browser Form Autofill
X Lin, P Ilia, J Polakis
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
272020
TALON: An Automated Framework for Cross-Device Tracking Detection
K Solomos, P Ilia, S Ioannidis, N Kourtellis
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
24*2019
Phish in Sheep’s Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting
X Lin, P Ilia, S Solanki, J Polakis
31st USENIX Security Symposium (USENIX Security 22), 2022
192022
CCSP: a Compressed Certificate Status Protocol
AA Chariton, E Degkleri, P Papadopoulos, P Ilia, EP Markatos
INFOCOM 2017-IEEE Conference on Computer Communications, IEEE, 1-9, 2017
192017
DCSP: Performant Certificate Revocation a DNS-based approach
AA Chariton, E Degkleri, P Papadopoulos, P Ilia, EP Markatos
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
172016
The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions
K Solomos, P Ilia, S Karami, N Nikiforakis, J Polakis
31st USENIX Security Symposium (USENIX Security 22), 2022
162022
Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications
K Solomos, P Ilia, N Nikiforakis, J Polakis
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
122022
Cryptographic key exchange in IPv6-based low power, lossy networks
P Ilia, G Oikonomou, T Tryfonas
Information Security Theory and Practice. Security of Mobile and Cyber …, 2013
112013
Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention
S Karami, F Kalantari, M Zaeifi, XJ Maso, E Trickel, P Ilia, Y Shoshitaishvili, ...
31st USENIX Security Symposium (USENIX Security 22), 2022
92022
Design and Implementation of a Compressed Certificate Status Protocol
M Pachilakis, AA Chariton, P Papadopoulos, P Ilia, E Degkleri, ...
ACM Transactions on Internet Technology (TOIT) 20 (4), 1-25, 2020
62020
The system can't perform the operation now. Try again later.
Articles 1–20