Refereed Conference Proceedings

  1. Arkalakis, I., Diamantaris, M., Moustakas, S., Ioannidis, S., Polakis, J., & Ilia, P. (2024). Abandon All Hope Ye Who Enter Here: A Dynamic, Longitudinal Investigation of Android’s Data Safety Section. 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024.
  2. Solomos, K., Ilia, P., Karami, S., Nikiforakis, N., & Polakis, J. (2022). The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions. 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, 717–733.
  3. Lin, X., Ilia, P., Solanki, S., & Polakis, J. (2022). Phish in Sheep’s Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting. 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, 1651–1668.
  4. Karami, S., Kalantari, F., Zaeifi, M., Maso, X. J., Trickel, E., Ilia, P., Shoshitaishvili, Y., Doupé, A., & Polakis, J. (2022). Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention. 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, 735–752.
  5. Solomos, K., Ilia, P., Nikiforakis, N., & Polakis, J. (2022). Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, 2675–2688.
  6. Karami, S., Ilia, P., & Polakis, J. (2021). Awakening the Web’s Sleeper Agents: Misusing Service Workers for Privacy Leakage. 28th Annual Network and Distributed System Security Symposium, NDSS 2021, Virtually, February 21-25, 2021.
  7. Chen, Q., Ilia, P., Polychronakis, M., & Kapravelos, A. (2021). Cookie Swap Party: Abusing First-Party Cookies for Web Tracking. WWW ’21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April 19-23, 2021, 2117–2129.
  8. Karami, S., Ilia, P., Solomos, K., & Polakis, J. (2020). Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting. 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020.
  9. Solomos, K., Ilia, P., Ioannidis, S., & Kourtellis, N. (2020). Clash of the Trackers: Measuring the Evolution of the Online Tracking Ecosystem. 4th Network Traffic Measurement and Analysis Conference, TMA 2020, Berlin, Germany, June 10, 2020. arXiv:1907.12860.
  10. Lin, X., Ilia, P., & Polakis, J. (2020). Fill in the Blanks: Empirical Analysis of the Privacy Threats of Browser Form Autofill. CCS ’20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020, 507–519.
  11. Drakonakis, K., Ilia, P., Ioannidis, S., & Polakis, J. (2019). Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data. 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019.
  12. Solomos, K., Ilia, P., Ioannidis, S., & Kourtellis, N. (2019). TALON: An Automated Framework for Cross-Device Tracking Detection. 22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019, Chaoyang District, Beijing, China, September 23-25, 2019, 227–241.
  13. Papadopoulos, P., Ilia, P., Polychronakis, M., Markatos, E. P., Ioannidis, S., & Vasiliadis, G. (2019). Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation. 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019.
  14. Papadopoulos, P., Ilia, P., & Markatos, E. P. (2019). Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking. Information Security - 22nd International Conference, ISC 2019, New York City, NY, USA, September 16-18, 2019, Proceedings, 11723, 277–296.
  15. Tsirantonakis, G., Ilia, P., Ioannidis, S., Athanasopoulos, E., & Polychronakis, M. (2018). A Large-scale Analysis of Content Modification by Open HTTP Proxies. 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018.
  16. Solomos, K., Ilia, P., Ioannidis, S., & Kourtellis, N. (2018). Automated Measurements of Cross-Device Tracking. Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, 11398, 73–80.
  17. Ilia, P., Carminati, B., Ferrari, E., Fragopoulou, P., & Ioannidis, S. (2017). SAMPAC: Socially-Aware collaborative Multi-Party Access Control. Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, 71–82.
  18. Chariton, A. A., Degkleri, E., Papadopoulos, P., Ilia, P., & Markatos, E. P. (2017). CCSP: A compressed certificate status protocol. 2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, May 1-4, 2017, 1–9.
  19. Chariton, A. A., Degkleri, E., Papadopoulos, P., Ilia, P., & Markatos, E. P. (2016). DCSP: performant certificate revocation a DNS-based approach. Proceedings of the 9th European Workshop on System Security.
  20. Ilia, P., Polakis, I., Athanasopoulos, E., Maggi, F., & Ioannidis, S. (2015). Face/Off: Preventing Privacy Leakage From Photos in Social Networks. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 781–792.
  21. Polakis, I., Ilia, P., Tzermias, Z., Ioannidis, S., & Fragopoulou, P. (2015). Social Forensics: Searching for Needles in Digital Haystacks. 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@RAID 2015, Kyoto, Japan, November 5, 2015, 54–66.
  22. Polakis, I., Ilia, P., Maggi, F., Lancini, M., Kontaxis, G., Zanero, S., Ioannidis, S., & Keromytis, A. D. (2014). Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, 501–512.
  23. Ilia, P., Oikonomou, G. C., & Tryfonas, T. (2013). Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks. Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings, 7886, 34–49.

Refereed Journal Articles

  1. Pachilakis, M., Chariton, A. A., Papadopoulos, P., Ilia, P., Degkleri, E., & Markatos, E. P. (2020). Design and Implementation of a Compressed Certificate Status Protocol. ACM Transactions on Internet Technology (TOIT), 20(4), 34:1–34:25.