default search action
Panagiotis Ilia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Ioannis Arkalakis, Michalis Diamantaris, Serafeim Moustakas, Sotiris Ioannidis, Jason Polakis, Panagiotis Ilia:
Abandon All Hope Ye Who Enter Here: A Dynamic, Longitudinal Investigation of Android's Data Safety Section. USENIX Security Symposium 2024 - 2022
- [c22]Konstantinos Solomos, Panagiotis Ilia, Nick Nikiforakis, Jason Polakis:
Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications. CCS 2022: 2675-2688 - [c21]Konstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, Jason Polakis:
The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions. USENIX Security Symposium 2022: 717-733 - [c20]Soroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier J. Maso, Erik Trickel, Panagiotis Ilia, Yan Shoshitaishvili, Adam Doupé, Jason Polakis:
Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention. USENIX Security Symposium 2022: 735-752 - [c19]Xu Lin, Panagiotis Ilia, Saumya Solanki, Jason Polakis:
Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting. USENIX Security Symposium 2022: 1651-1668 - 2021
- [c18]Soroush Karami, Panagiotis Ilia, Jason Polakis:
Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage. NDSS 2021 - [c17]Quan Chen, Panagiotis Ilia, Michalis Polychronakis, Alexandros Kapravelos:
Cookie Swap Party: Abusing First-Party Cookies for Web Tracking. WWW 2021: 2117-2129 - 2020
- [j1]Michalis Pachilakis, Antonios A. Chariton, Panagiotis Papadopoulos, Panagiotis Ilia, Eirini Degkleri, Evangelos P. Markatos:
Design and Implementation of a Compressed Certificate Status Protocol. ACM Trans. Internet Techn. 20(4): 34:1-34:25 (2020) - [c16]Xu Lin, Panagiotis Ilia, Jason Polakis:
Fill in the Blanks: Empirical Analysis of the Privacy Threats of Browser Form Autofill. CCS 2020: 507-519 - [c15]Soroush Karami, Panagiotis Ilia, Konstantinos Solomos, Jason Polakis:
Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting. NDSS 2020 - [c14]Konstantinos Solomos, Panagiotis Ilia, Nicolas Kourtellis:
Clash of the Trackers: Measuring the Evolution of the Online Tracking Ecosystem. TMA 2020
2010 – 2019
- 2019
- [c13]Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos P. Markatos:
Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking. ISC 2019: 277-296 - [c12]Kostas Drakonakis, Panagiotis Ilia, Sotiris Ioannidis, Jason Polakis:
Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data. NDSS 2019 - [c11]Panagiotis Papadopoulos, Panagiotis Ilia, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis, Giorgos Vasiliadis:
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation. NDSS 2019 - [c10]Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis:
TALON: An Automated Framework for Cross-Device Tracking Detection. RAID 2019: 227-241 - [i5]Kostas Drakonakis, Panagiotis Ilia, Sotiris Ioannidis, Jason Polakis:
Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data. CoRR abs/1901.00897 (2019) - [i4]Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis:
Clash of the Trackers: Measuring the Evolution of the Online Tracking Ecosystem. CoRR abs/1907.12860 (2019) - 2018
- [c9]Giorgos Tsirantonakis, Panagiotis Ilia, Sotiris Ioannidis, Elias Athanasopoulos, Michalis Polychronakis:
A Large-scale Analysis of Content Modification by Open HTTP Proxies. NDSS 2018 - [c8]Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis:
Automated Measurements of Cross-Device Tracking. IOSec@RAID 2018: 73-80 - [i3]Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos P. Markatos:
Truth in Web Mining: Measuring the Profitability and Cost of Cryptominers as a Web Monetization Model. CoRR abs/1806.01994 (2018) - [i2]Panagiotis Papadopoulos, Panagiotis Ilia, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis, Giorgos Vasiliadis:
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation. CoRR abs/1810.00464 (2018) - [i1]Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis:
Cross-Device Tracking: Systematic Method to Detect and Measure CDT. CoRR abs/1812.11393 (2018) - 2017
- [c7]Panagiotis Ilia, Barbara Carminati, Elena Ferrari, Paraskevi Fragopoulou, Sotiris Ioannidis:
SAMPAC: Socially-Aware collaborative Multi-Party Access Control. CODASPY 2017: 71-82 - [c6]Antonios A. Chariton, Eirini Degkleri, Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos P. Markatos:
CCSP: A compressed certificate status protocol. INFOCOM 2017: 1-9 - 2016
- [c5]Antonios A. Chariton, Eirini Degkleri, Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos P. Markatos:
DCSP: performant certificate revocation a DNS-based approach. EUROSEC 2016: 1:1-1:6 - 2015
- [c4]Iasonas Polakis, Panagiotis Ilia, Zacharias Tzermias, Sotiris Ioannidis, Paraskevi Fragopoulou:
Social Forensics: Searching for Needles in Digital Haystacks. BADGERS@RAID 2015: 54-66 - [c3]Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, Sotiris Ioannidis:
Face/Off: Preventing Privacy Leakage From Photos in Social Networks. CCS 2015: 781-792 - 2014
- [c2]Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, Angelos D. Keromytis:
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication. CCS 2014: 501-512 - 2013
- [c1]Panagiotis Ilia, George C. Oikonomou, Theo Tryfonas:
Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks. WISTP 2013: 34-49
Coauthor Index
aka: Jason Polakis
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint