Jason (Iasonas) Polakis
Jason (Iasonas) Polakis
Email verificata su uic.edu - Home page
TitoloCitata daAnno
we. b: The web of short URLs
D Antoniades, I Polakis, G Kontaxis, E Athanasopoulos, S Ioannidis, ...
Proceedings of the 20th international conference on World Wide Web, 715-724, 2011
1162011
Detecting social network profile cloning
G Kontaxis, I Polakis, S Ioannidis, EP Markatos
2011 IEEE international conference on pervasive computing and communications …, 2011
1072011
Face/off: Preventing privacy leakage from photos in social networks
P Ilia, I Polakis, E Athanasopoulos, F Maggi, S Ioannidis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
742015
I am robot:(deep) learning to break semantic image captchas
S Sivakorn, I Polakis, AD Keromytis
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 388-403, 2016
602016
Where's wally?: Precise user discovery attacks in location proximity services
I Polakis, G Argyros, T Petsios, S Sivakorn, AD Keromytis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
502015
Using social networks to harvest email addresses
I Polakis, G Kontaxis, S Antonatos, E Gessiou, T Petsas, EP Markatos
Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic …, 2010
502010
The cracked cookie jar: HTTP cookie hijacking and the exposure of private information
S Sivakorn, I Polakis, AD Keromytis
2016 IEEE Symposium on Security and Privacy (SP), 724-742, 2016
342016
All your face are belong to us: breaking Facebook's social authentication
I Polakis, M Lancini, G Kontaxis, F Maggi, S Ioannidis, AD Keromytis, ...
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
322012
The man who was there: validating check-ins in location-based services
I Polakis, S Volanis, E Athanasopoulos, EP Markatos
Proceedings of the 29th Annual Computer Security Applications Conference, 19-28, 2013
302013
A systematic characterization of IM threats using honeypots
S Antonatos, I Polakis, T Petsas, EP Markatos
ISOC Network and Distributed System Security Symposium (NDSS), 2010
212010
I’m not a human: Breaking the Google reCAPTCHA
S Sivakorn, J Polakis, AD Keromytis
Black Hat, 2016
192016
Faces in the distorting mirror: Revisiting photo-based social authentication
I Polakis, P Ilia, F Maggi, M Lancini, G Kontaxis, S Zanero, S Ioannidis, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
152014
Powerslave: Analyzing the energy consumption of mobile antivirus software
I Polakis, M Diamantaris, T Petsas, F Maggi, S Ioannidis
International Conference on Detection of Intrusions and Malware, and …, 2015
142015
An empirical study on the security of cross-domain policies in rich internet applications
G Kontaxis, D Antoniades, I Polakis, EP Markatos
Proceedings of the Fourth European Workshop on System Security, 7, 2011
132011
Techu: Open and privacy-preserving crowdsourced gps for the masses
I Agadakos, J Polakis, G Portokalidis
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
102017
Exploiting abused trending topics to identify spam campaigns in Twitter
D Antonakaki, I Polakis, E Athanasopoulos, S Ioannidis, P Fragopoulou
Social Network Analysis and Mining 6 (1), 48, 2016
102016
That's the Way the Cookie Crumbles: Evaluating HTTPS Enforcing Mechanisms
S Sivakorn, AD Keromytis, J Polakis
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016
92016
D (e| i) aling with VoIP: Robust Prevention of DIAL Attacks
A Kapravelos, I Polakis, E Athanasopoulos, S Ioannidis, EP Markatos
European Symposium on Research in Computer Security, 663-678, 2010
82010
Evaluating the privacy guarantees of location proximity services
G Argyros, T Petsios, S Sivakorn, AD Keromytis, J Polakis
ACM Transactions on Privacy and Security (TOPS) 19 (4), 12, 2017
62017
Captchuring automated (smart) phone attacks
I Polakis, G Kontaxis, S Ioannidis
2011 First SysSec Workshop, 27-34, 2011
52011
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20