What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Nick Nikiforakis
Google Scholar
55
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Lost in the Mists of Time: Expirations in DNS Footprints of Mobile Apps.
Johnny So
Iskander Sánchez-Rola
Nick Nikiforakis
2025
conf/uss
Doubly Dangerous: Evading Phishing Reporting Systems by Leveraging Email Tracking Techniques.
Anish Chand
Nick Nikiforakis
Phani Vadrevu
2024
conf/uss
Smudged Fingerprints: Characterizing and Improving the Performance of Web Application Fingerprinting.
Brian Kondracki
Nick Nikiforakis
2024
conf/sp
The Times They Are A-Changin': Characterizing Post-Publication Changes to Online News.
Chris Tsoukaladelis
Brian Kondracki
Niranjan Balasubramanian
Nick Nikiforakis
2024
conf/sp
Manufactured Narratives: On the Potential of Manipulating Social Media to Politicize World Events.
Chris Tsoukaladelis
Nick Nikiforakis
2024
conf/ndss
Like, Comment, Get Scammed: Characterizing Comment Scams on Media Platforms.
Xigao Li
Amir Rahmati
Nick Nikiforakis
2024
conf/acsac
Ready or Not, Here I Come: Characterizing the Security of Prematurely-public Web Applications.
Brian Kondracki
Michael Ferdman
Nick Nikiforakis
2024
conf/acsac
Harnessing Multiplicity: Granular Browser Extension Fingerprinting through User Configurations.
Konstantinos Solomos
Nick Nikiforakis
Jason Polakis
2023
conf/uss
Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis.
Rasoul Jahanshahi
Babak Amin Azad
Nick Nikiforakis
Manuel Egele
2023
conf/uss
AnimateDead: Debloating Web Applications Using Concolic Execution.
Babak Amin Azad
Rasoul Jahanshahi
Chris Tsoukaladelis
Manuel Egele
Nick Nikiforakis
2023
conf/ndss
Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors.
Mir Masood Ali
Binoy Chitale
Mohammad Ghasemisharif
Chris Kanich
Nick Nikiforakis
Jason Polakis
2023
conf/ndss
Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams.
Xigao Li
Anurag Yepuri
Nick Nikiforakis
2022
conf/ccs
Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications.
Konstantinos Solomos
Panagiotis Ilia
Nick Nikiforakis
Jason Polakis
2022
conf/uss
The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions.
Konstantinos Solomos
Panagiotis Ilia
Soroush Karami
Nick Nikiforakis
Jason Polakis
2022
conf/uss
Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots.
Brian Kondracki
Johnny So
Nick Nikiforakis
2022
conf/sp
Domains Do Change Their Spots: Quantifying Potential Abuse of Residual Trust.
Johnny So
Najmeh Miramirkhani
Michael Ferdman
Nick Nikiforakis
2022
conf/ndss
The Droid is in the Details: Environment-aware Evasion of Android Sandboxes.
Brian Kondracki
Babak Amin Azad
Najmeh Miramirkhani
Nick Nikiforakis
2021
conf/ccs
Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits.
Brian Kondracki
Babak Amin Azad
Oleksii Starov
Nick Nikiforakis
2021
conf/uss
Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets.
Pierre Laperdrix
Oleksii Starov
Quan Chen
Alexandros Kapravelos
Nick Nikiforakis
2021
conf/sp
Good Bot, Bad Bot: Characterizing Automated Browsing Activity.
Xigao Li
Babak Amin Azad
Amir Rahmati
Nick Nikiforakis
2021
conf/asiaccs
Click This, Not That: Extending Web Authentication with Deception.
Timothy Barron
Johnny So
Nick Nikiforakis
2021
conf/ndss
To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media.
Beliz Kaleli
Brian Kondracki
Manuel Egele
Nick Nikiforakis
Gianluca Stringhini
2020
conf/ccs
You've Changed: Detecting Malicious Browser Extensions through their Update Deltas.
Nikolaos Pantelaios
Nick Nikiforakis
Alexandros Kapravelos
2020
conf/sp
Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers.
Brian Kondracki
Assel Aliyeva
Manuel Egele
Jason Polakis
Nick Nikiforakis
2020
conf/ndss
Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies.
Sebastian Roth
Timothy Barron
Stefano Calzavara
Nick Nikiforakis
Ben Stock
2019
conf/ccs
Purchased Fame: Exploring the Ecosystem of Private Blog Networks.
Tom van Goethem
Najmeh Miramirkhani
Wouter Joosen
Nick Nikiforakis
2019
conf/uss
Less is More: Quantifying the Security Benefits of Debloating Web Applications.
Babak Amin Azad
Pierre Laperdrix
Nick Nikiforakis
2019
conf/uss
Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting.
Erik Trickel
Oleksii Starov
Alexandros Kapravelos
Nick Nikiforakis
Adam Doupé
2019
conf/ndss
Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers.
Meng Luo
Pierre Laperdrix
Nima Honarmand
Nick Nikiforakis
2017
conf/ccs
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse.
Panagiotis Kintis
Najmeh Miramirkhani
Charles Lever
Yizheng Chen
Rosa Romero Gómez
Nikolaos Pitropakis
Nick Nikiforakis
Manos Antonakakis
2017
conf/ccs
Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers.
Meng Luo
Oleksii Starov
Nima Honarmand
Nick Nikiforakis
2017
conf/ccs
The Wolf of Name Street: Hijacking Domains Through Their Nameservers.
Thomas Vissers
Timothy Barron
Tom van Goethem
Wouter Joosen
Nick Nikiforakis
2017
conf/sp
XHOUND: Quantifying the Fingerprintability of Browser Extensions.
Oleksii Starov
Nick Nikiforakis
2017
conf/sp
Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts.
Najmeh Miramirkhani
Mahathi Priya Appini
Nick Nikiforakis
Michalis Polychronakis
2017
conf/eurosp
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools.
Georg Merzdovnik
Markus Huber
Damjan Buhov
Nick Nikiforakis
Sebastian Neuner
Martin Schmiedecker
Edgar R. Weippl
2017
conf/ndss
Dial One for Scam: A Large-Scale Analysis of Technical Support Scams.
Najmeh Miramirkhani
Oleksii Starov
Nick Nikiforakis
2017
conf/acsac
Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior.
Timothy Barron
Nick Nikiforakis
2016
journals/popets
Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms.
Oleksii Starov
Phillipa Gill
Nick Nikiforakis
2016
conf/ndss
It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services.
M. Zubair Rafique
Tom van Goethem
Wouter Joosen
Christophe Huygens
Nick Nikiforakis
2015
conf/ccs
The Clock is Still Ticking: Timing Attacks in the Modern Web.
Tom van Goethem
Wouter Joosen
Nick Nikiforakis
2015
conf/ccs
Maneuvering Around Clouds: Bypassing Cloud-based Security Providers.
Thomas Vissers
Tom van Goethem
Wouter Joosen
Nick Nikiforakis
2015
conf/ccs
Drops for Stuff: An Analysis of Reshipping Mule Scams.
Shuang Hao
Kevin Borgolte
Nick Nikiforakis
Gianluca Stringhini
Manuel Egele
Michael Eubanks
Brian Krebs
Giovanni Vigna
2015
conf/ndss
Parking Sensors: Analyzing and Detecting Parked Domains.
Thomas Vissers
Wouter Joosen
Nick Nikiforakis
2015
conf/ndss
Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse.
Pieter Agten
Wouter Joosen
Frank Piessens
Nick Nikiforakis
2014
conf/ccs
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets.
Steven Van Acker
Nick Nikiforakis
Lieven Desmet
Frank Piessens
Wouter Joosen
2014
conf/ccs
Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals.
Tom van Goethem
Frank Piessens
Wouter Joosen
Nick Nikiforakis
2013
conf/ccs
TabShots: client-side detection of tabnabbing attacks.
Philippe De Ryck
Nick Nikiforakis
Lieven Desmet
Wouter Joosen
2013
conf/ccs
FPDetective: dusting the web for fingerprinters.
Gunes Acar
Marc Juarez
Nick Nikiforakis
Claudia Díaz
Seda F. Gürses
Frank Piessens
Bart Preneel
2013
conf/sp
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting.
Nick Nikiforakis
Alexandros Kapravelos
Wouter Joosen
Christopher Kruegel
Frank Piessens
Giovanni Vigna
2012
conf/ccs
FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications.
Steven Van Acker
Nick Nikiforakis
Lieven Desmet
Wouter Joosen
Frank Piessens
2012
conf/ccs
FlowFox: a web browser with flexible and precise information flow control.
Willem De Groef
Dominique Devriese
Nick Nikiforakis
Frank Piessens
2012
conf/ccs
You are what you include: large-scale evaluation of remote javascript inclusions.
Nick Nikiforakis
Luca Invernizzi
Alexandros Kapravelos
Steven Van Acker
Wouter Joosen
Christopher Kruegel
Frank Piessens
Giovanni Vigna
2012
conf/sec
HyperForce: Hypervisor-enForced Execution of Security-Critical Code.
Francesco Gadaleta
Nick Nikiforakis
Jan Tobias Mühlberg
Wouter Joosen
2011
conf/acsac
RIPE: runtime intrusion prevention evaluator.
John Wilander
Nick Nikiforakis
Yves Younan
Mariam Kamkar
Wouter Joosen
2010
conf/iciss
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows.
Steven Van Acker
Nick Nikiforakis
Pieter Philippaerts
Yves Younan
Frank Piessens
Coauthors
Adam Doupé
(1)
Alexandros Kapravelos
(5)
Amir Rahmati
(2)
Anish Chand
(1)
Anurag Yepuri
(1)
Assel Aliyeva
(1)
Babak Amin Azad
(6)
Bart Preneel
(1)
Beliz Kaleli
(1)
Ben Stock
(1)
Binoy Chitale
(1)
Brian Kondracki
(8)
Brian Krebs
(1)
Charles Lever
(1)
Chris Kanich
(1)
Chris Tsoukaladelis
(3)
Christophe Huygens
(1)
Christopher Kruegel
(2)
Claudia Díaz
(1)
Damjan Buhov
(1)
Dominique Devriese
(1)
Edgar R. Weippl
(1)
Erik Trickel
(1)
Francesco Gadaleta
(1)
Frank Piessens
(9)
Georg Merzdovnik
(1)
Gianluca Stringhini
(2)
Giovanni Vigna
(3)
Gunes Acar
(1)
Iskander Sánchez-Rola
(1)
Jan Tobias Mühlberg
(1)
Jason Polakis
(5)
John Wilander
(1)
Johnny So
(4)
Kevin Borgolte
(1)
Konstantinos Solomos
(3)
Lieven Desmet
(3)
Luca Invernizzi
(1)
M. Zubair Rafique
(1)
Mahathi Priya Appini
(1)
Manos Antonakakis
(1)
Manuel Egele
(5)
Marc Juarez
(1)
Mariam Kamkar
(1)
Markus Huber
(1)
Martin Schmiedecker
(1)
Meng Luo
(2)
Michael Eubanks
(1)
Michael Ferdman
(2)
Michalis Polychronakis
(1)
Mir Masood Ali
(1)
Mohammad Ghasemisharif
(1)
Najmeh Miramirkhani
(6)
Nick Nikiforakis
(55)
Nikolaos Pantelaios
(1)
Nikolaos Pitropakis
(1)
Nima Honarmand
(2)
Niranjan Balasubramanian
(1)
Oleksii Starov
(7)
Panagiotis Ilia
(2)
Panagiotis Kintis
(1)
Phani Vadrevu
(1)
Philippe De Ryck
(1)
Phillipa Gill
(1)
Pierre Laperdrix
(3)
Pieter Agten
(1)
Pieter Philippaerts
(1)
Quan Chen
(1)
Rasoul Jahanshahi
(2)
Rosa Romero Gómez
(1)
Sebastian Neuner
(1)
Sebastian Roth
(1)
Seda F. Gürses
(1)
Shuang Hao
(1)
Soroush Karami
(1)
Stefano Calzavara
(1)
Steven Van Acker
(4)
Thomas Vissers
(3)
Timothy Barron
(4)
Tom van Goethem
(6)
Willem De Groef
(1)
Wouter Joosen
(15)
Xigao Li
(3)
Yizheng Chen
(1)
Yves Younan
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to