What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jason Polakis
Google Scholar
28
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
Lost in Translation: Exploring the Risks of Web-to-Cross-platform Application Migration.
Claudio Paloscia
Kostas Solomos
Mir Masood Ali
Jason Polakis
2025
conf/eurosp
Dredging the River Styx: Fortifying the Web through Robust and Real-Time Script Attribution.
Kostas Drakonakis
Sotiris Ioannidis
Jason Polakis
2024
conf/uss
Abandon All Hope Ye Who Enter Here: A Dynamic, Longitudinal Investigation of Android's Data Safety Section.
Ioannis Arkalakis
Michalis Diamantaris
Serafeim Moustakas
Sotiris Ioannidis
Jason Polakis
Panagiotis Ilia
2024
conf/uss
Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron Apps.
Mir Masood Ali
Mohammad Ghasemisharif
Chris Kanich
Jason Polakis
2024
conf/uss
Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted Advertising.
Giuseppe Calderonio
Mir Masood Ali
Jason Polakis
2024
conf/acsac
Harnessing Multiplicity: Granular Browser Extension Fingerprinting through User Configurations.
Konstantinos Solomos
Nick Nikiforakis
Jason Polakis
2023
conf/ccs
Read Between the Lines: Detecting Tracking JavaScript with Bytecode Classification.
Mohammad Ghasemisharif
Jason Polakis
2023
conf/sp
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses.
Xu Lin
Frederico Araujo
Teryl Taylor
Jiyong Jang
Jason Polakis
2023
conf/ndss
Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors.
Mir Masood Ali
Binoy Chitale
Mohammad Ghasemisharif
Chris Kanich
Nick Nikiforakis
Jason Polakis
2023
conf/ndss
ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning.
Kostas Drakonakis
Sotiris Ioannidis
Jason Polakis
2023
conf/acsac
When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild.
Alberto Carboneri
Mohammad Ghasemisharif
Soroush Karami
Jason Polakis
2022
conf/ccs
Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications.
Konstantinos Solomos
Panagiotis Ilia
Nick Nikiforakis
Jason Polakis
2022
conf/uss
The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions.
Konstantinos Solomos
Panagiotis Ilia
Soroush Karami
Nick Nikiforakis
Jason Polakis
2022
conf/uss
Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention.
Soroush Karami
Faezeh Kalantari
Mehrnoosh Zaeifi
Xavier J. Maso
Erik Trickel
Panagiotis Ilia
Yan Shoshitaishvili
Adam Doupé
Jason Polakis
2022
conf/uss
Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting.
Xu Lin
Panagiotis Ilia
Saumya Solanki
Jason Polakis
2022
conf/sp
Towards Automated Auditing for Account and Session Management Flaws in Single Sign-On Deployments.
Mohammad Ghasemisharif
Chris Kanich
Jason Polakis
2021
conf/ccs
This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration.
Michalis Diamantaris
Serafeim Moustakas
Lichao Sun
Sotiris Ioannidis
Jason Polakis
2021
conf/ndss
Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage.
Soroush Karami
Panagiotis Ilia
Jason Polakis
2021
conf/ndss
Tales of Favicons and Caches: Persistent Tracking in Modern Browsers.
Konstantinos Solomos
John Kristoff
Chris Kanich
Jason Polakis
2020
conf/ccs
The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws.
Kostas Drakonakis
Sotiris Ioannidis
Jason Polakis
2020
conf/ccs
Fill in the Blanks: Empirical Analysis of the Privacy Threats of Browser Form Autofill.
Xu Lin
Panagiotis Ilia
Jason Polakis
2020
conf/sp
Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers.
Brian Kondracki
Assel Aliyeva
Manuel Egele
Jason Polakis
Nick Nikiforakis
2020
conf/eurosp
Chameleons' Oblivion: Complex-Valued Deep Neural Networks for Protocol-Agnostic RF Device Fingerprinting.
Ioannis Agadakos
Nikolaos Agadakos
Jason Polakis
Mohamed R. Amer
2020
conf/eurosp
Tech Pains: Characterizations of Lived Cybersecurity Experiences.
Huixin Tian
Chris Kanich
Jason Polakis
Sameer Patil
2020
conf/ndss
Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting.
Soroush Karami
Panagiotis Ilia
Konstantinos Solomos
Jason Polakis
2019
conf/ndss
Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data.
Kostas Drakonakis
Panagiotis Ilia
Sotiris Ioannidis
Jason Polakis
2018
conf/uss
O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web.
Mohammad Ghasemisharif
Amrutha Ramesh
Stephen Checkoway
Chris Kanich
Jason Polakis
2017
conf/ccs
In (Cyber)Space Bots Can Hear You Speak: Breaking Audio CAPTCHAs Using OTS Speech Recognition.
Saumya Solanki
Gautam Krishnan
Varshini Sampath
Jason Polakis
Coauthors
Adam Doupé
(1)
Alberto Carboneri
(1)
Amrutha Ramesh
(1)
Assel Aliyeva
(1)
Binoy Chitale
(1)
Brian Kondracki
(1)
Chris Kanich
(6)
Claudio Paloscia
(1)
Erik Trickel
(1)
Faezeh Kalantari
(1)
Frederico Araujo
(1)
Gautam Krishnan
(1)
Giuseppe Calderonio
(1)
Huixin Tian
(1)
Ioannis Agadakos
(1)
Ioannis Arkalakis
(1)
Jason Polakis
(28)
Jiyong Jang
(1)
John Kristoff
(1)
Konstantinos Solomos
(5)
Kostas Drakonakis
(4)
Kostas Solomos
(1)
Lichao Sun
(1)
Manuel Egele
(1)
Mehrnoosh Zaeifi
(1)
Michalis Diamantaris
(2)
Mir Masood Ali
(4)
Mohamed R. Amer
(1)
Mohammad Ghasemisharif
(6)
Nick Nikiforakis
(5)
Nikolaos Agadakos
(1)
Panagiotis Ilia
(9)
Sameer Patil
(1)
Saumya Solanki
(2)
Serafeim Moustakas
(2)
Soroush Karami
(5)
Sotiris Ioannidis
(6)
Stephen Checkoway
(1)
Teryl Taylor
(1)
Varshini Sampath
(1)
Xavier J. Maso
(1)
Xu Lin
(3)
Yan Shoshitaishvili
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to