Sample code for a Google Chrome browser extension that detects and report all third party domains found in a web-page…
A simple python script that allows you to use your gmail account to send automated emails from your server without…
Sample code for a Google Chrome browser extension that detects and report all third party domains found in a web-page…
A simple python script that allows you to use your gmail account to send automated emails from your server without…
@inproceedings{10.1145/3485983.3494859, author = {Gonzalez, Roberto and Soriente, Claudio and Carrascosa, Juan Miguel and Garcia-Duran, Alberto and Iordanou, Costas and Niepert, Mathias}, title = {User Profiling by Network Observers}, year = {2021}, isbn = {9781450390989}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3485983.3494859}, doi = {10.1145/3485983.3494859}, booktitle = {Proceedings of the 17th International Conference on Emerging Networking EXperiments and Technologies}, pages = {212–222}, numpages = {11}, keywords = {privacy, advertising, user profiling}, location = {Virtual Event, Germany}, series = {CoNEXT '21} }
@inproceedings{10.1145/3406522.3446011, author = {Leiva, Luis A. and Arapakis, Ioannis and Iordanou, Costas}, title = {My Mouse, My Rules: Privacy Issues of Behavioral User Profiling via Mouse Tracking}, year = {2021}, isbn = {9781450380553}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3406522.3446011}, doi = {10.1145/3406522.3446011}, abstract = {This paper aims to stir debate about a disconcerting privacy issue on web browsing that could easily emerge because of unethical practices and uncontrolled use of technology. We demonstrate how straightforward is to capture behavioral data about the users at scale, by unobtrusively tracking their mouse cursor movements, and predict user's demographics information with reasonable accuracy using five lines of code. Based on our results, we propose an adversarial method to mitigate user profiling techniques that make use of mouse cursor tracking, such as the recurrent neural net we analyze in this paper. We also release our data and a web browser extension that implements our adversarial method, so that others can benefit from this work in practice.}, booktitle = {Proceedings of the 2021 Conference on Human Information Interaction and Retrieval}, pages = {51–61}, numpages = {11}, keywords = {privacy, ethics, user profiling, mouse cursor tracking}, location = {Canberra ACT, Australia}, series = {CHIIR '21} }
@article{10.1145/3457175.3457181, author = {Laoutaris, Nikolaos and Iordanou, Costas}, title = {What Do Information Centric Networks, Trusted Execution Environments, and Digital Watermarking Have to Do with Privacy, the Data Economy, and Their Future?}, year = {2021}, issue_date = {01/31/2021}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, volume = {51}, number = {1}, issn = {0146-4833}, url = {https://doi.org/10.1145/3457175.3457181}, doi = {10.1145/3457175.3457181}, journal = {SIGCOMM Comput. Commun. Rev.}, month = mar, pages = {32–38}, numpages = {7}, keywords = {personal data management system, information centric networking, overlay network, online privacy} }
@inproceedings{10.1145/3419394.3423653, author = {Matic, Srdjan and Iordanou, Costas and Smaragdakis, Georgios and Laoutaris, Nikolaos}, title = {Identifying Sensitive URLs at Web-Scale}, year = {2020}, isbn = {9781450381383}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3419394.3423653}, doi = {10.1145/3419394.3423653}, abstract = {Several data protection laws include special provisions for protecting personal data relating to religion, health, sexual orientation, and other sensitive categories. Having a well-defined list of sensitive categories is sufficient for filing complaints manually, conducting investigations, and prosecuting cases in courts of law. Data protection laws, however, do not define explicitly what type of content falls under each sensitive category. Therefore, it is unclear how to implement proactive measures such as informing users, blocking trackers, and filing complaints automatically when users visit sensitive domains. To empower such use cases we turn to the Curlie.org crowdsourced taxonomy project for drawing training data to build a text classifier for sensitive URLs. We demonstrate that our classifier can identify sensitive URLs with accuracy above 88%, and even recognize specific sensitive categories with accuracy above 90%. We then use our classifier to search for sensitive URLs in a corpus of 1 Billion URLs collected by the Common Crawl project. We identify more than 155 millions sensitive URLs in more than 4 million domains. Despite their sensitive nature, more than 30% of these URLs belong to domains that fail to use HTTPS. Also, in sensitive web pages with third-party cookies, 87% of the third-parties set at least one persistent cookie.}, booktitle = {Proceedings of the ACM Internet Measurement Conference}, pages = {619–633}, numpages = {15}, location = {Virtual Event, USA}, series = {IMC '20} }
@inproceedings{Iordanou:2019:BCA:3359989.3365428, author = {Iordanou, Costas and Kourtellis, Nicolas and Carrascosa, Juan Miguel and Soriente, Claudio and Cuevas, Ruben and Laoutaris, Nikolaos}, title = {Beyond Content Analysis: Detecting Targeted Ads via Distributed Counting}, booktitle = {Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies}, series = {CoNEXT '19}, year = {2019}, isbn = {978-1-4503-6998-5}, location = {Orlando, Florida}, pages = {110--122}, numpages = {13}, url = {http://doi.acm.org/10.1145/3359989.3365428}, doi = {10.1145/3359989.3365428}, acmid = {3365428}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {crowdsourcing, display advertisements, distributed algorithms, security and privacy}, }
@inproceedings{Gervais2017, author = {Gervais, Arthur and Filios, Alexandros and Lenders, Vincent and Capkun, Srdjan}, year = {2017}, month = {08}, pages = {21-42}, title = {Quantifying Web Adblocker Privacy}, isbn = {978-3-319-66398-2}, doi = {10.1007/978-3-319-66399-9_2} }
@article{DBLP:journals/corr/FruchterMSB15, author = {Nathaniel Fruchter and Hsin Miao and Scott Stevenson and Rebecca Balebako}, title = {Variations in Tracking in Relation to Geographic Location}, journal = {CoRR}, volume = {abs/1506.04103}, year = {2015}, url = {http://arxiv.org/abs/1506.04103}, archivePrefix = {arXiv}, eprint = {1506.04103}, timestamp = {Mon, 13 Aug 2018 16:46:38 +0200}, biburl = {https://dblp.org/rec/bib/journals/corr/FruchterMSB15}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{8264851, author = {P. {Bangera} and S. {Gorinsky}}, booktitle = {Proc. of the IFIP Networking Conference (IFIP Networking) and Workshops}, title = {Ads versus regular contents: Dissecting the web hosting ecosystem}, year = {2017}, pages = {1-9}, keywords = {ecology;globalisation;Internet;virtual private networks;Web sites;ads;regular contents;hosted contents;web hosting ecosystem;country-specific websites;advertisements;open recursive DNS resolvers;Domain Name System resolvers;Autonomous Systems;VPN service;Virtual Private Network service;Servers;IP networks;Uniform resource locators;Virtual private networks;Internet;Organizations;Autonomous systems;Web;ad;regular content;hosting;infrastructure;autonomous system;transit hierarchy;byte volume;location;delivery performance}, doi = {10.23919/IFIPNetworking.2017.8264851}, month = {June} }
@inproceedings{Balebako2012MeasuringTE, title = {Measuring the Effectiveness of Privacy Tools for Limiting Behavioral Advertising}, author = {Rebecca Balebako and Pedro Giovanni Leon and Richard Shay and Blase Ur and Yang Wang}, booktitle = {Proc. of the W2SP Workshop}, year = {2012} }
@inproceedings{Acar:2013:FDW:2508859.2516674, author = {Acar, Gunes and Juarez, Marc and Nikiforakis, Nick and Diaz, Claudia and G\"{u}rses, Seda and Piessens, Frank and Preneel, Bart}, title = {FPDetective: Dusting the Web for Fingerprinters}, booktitle = {Proceedings of the 2013 ACM SIGSAC Conference on Computer \&\#38; Communications Security}, series = {CCS '13}, year = {2013}, isbn = {978-1-4503-2477-9}, location = {Berlin, Germany}, pages = {1129--1140}, numpages = {12}, url = {http://doi.acm.org/10.1145/2508859.2516674}, doi = {10.1145/2508859.2516674}, acmid = {2516674}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {device fingerprinting, dynamic analysis, flash, javascript, privacy, tracking, web security}, }
@inproceedings{10.1007/978-3-030-15986-3_17, author = {Dabrowski, Adrian and Merzdovnik, Georg and Ullrich, Johanna and Sendera, Gerald and Weippl, Edgar}, editor = {Choffnes, David and Barcellos, Marinho}, title = {Measuring Cookies and Web Privacy in a Post-GDPR World}, booktitle = {Passive and Active Measurement}, year = {2019}, publisher = {Springer International Publishing}, address = {Cham}, pages = {258--270}, isbn = {978-3-030-15986-3} }
@inproceedings{Sorensen:2019:BAG:3308558.3313524, author = {S{\o}rensen, Jannick and Kosta, Sokol}, title = {Before and After GDPR: The Changes in Third Party Presence at Public and Private European Websites}, booktitle = {The World Wide Web Conference}, series = {WWW '19}, year = {2019}, isbn = {978-1-4503-6674-8}, location = {San Francisco, CA, USA}, pages = {1590--1600}, numpages = {11}, url = {http://doi.acm.org/10.1145/3308558.3313524}, doi = {10.1145/3308558.3313524}, acmid = {3313524}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {GDPR, General Data Protection Regulation, Public Services, Third-Party web server, Tracker, Web measurement}, }
@inproceedings{PapadopoulosKM19, author = {Panagiotis Papadopoulos and Nicolas Kourtellis and Evangelos P. Markatos}, title = {Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask}, booktitle = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA, May 13-17, 2019}, pages = {1432--1442}, year = {2019}, crossref = {DBLP:conf/www/2019}, url = {https://doi.org/10.1145/3308558.3313542}, doi = {10.1145/3308558.3313542}, timestamp = {Thu, 16 May 2019 13:26:46 +0200}, biburl = {https://dblp.org/rec/bib/conf/www/PapadopoulosKM19}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{10.1007/978-3-030-01446-9_23, author = {Helsloot, Leon J. and Tillem, Gamze and Erkin, Zekeriya}, editor = {Baek, Joonsang and Susilo, Willy and Kim, Jongkil}, title = {BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing}, booktitle = {Provable Security}, year = {2018}, publisher = {Springer International Publishing}, address = {Cham}, pages = {397--405}, isbn = {978-3-030-01446-9} }
@inproceedings{8267662, author = {L. J. {Helsloot} and G. {Tillem} and Z. {Erkin}}, booktitle = {2017 IEEE Workshop on Information Forensics and Security (WIFS)}, title = {AHEad: Privacy-preserving online behavioural advertising using homomorphic encryption}, year = {2017}, pages = {1-6}, keywords = {advertising data processing;cryptography;data privacy;Internet;learning (artificial intelligence);AHEad;privacy-preserving online behavioural advertising;homomorphic encryption;Online advertising;publishers;free web content;advertisements;widespread data collection;privacy-preserving protocol;encrypted form;machine learning method;advertising systems;detailed user profiles;user privacy;Advertising;Protocols;Encryption;Privacy;Companies;Data privacy}, doi = {10.1109/WIFS.2017.8267662}, ISSN = {2157-4774}, month = {Dec} }
@inproceedings{8002896, author = {R. {Gonzalez} and L. {Jiang} and M. {Ahmed} and M. {Marciel} and R. {Cuevas} and H. {Metwalley} and S. {Niccolini}}, booktitle = {2017 Network Traffic Measurement and Analysis Conference (TMA)}, title = {The cookie recipe: Untangling the use of cookies in the wild}, year = {2017}, pages = {1-9}, keywords = {computer network security;data privacy;online front-ends;transport protocols;Web services;cookie recipe;HTTP cookies;online users;Web browsing;block all design;Web services;online advertising ecosystem;network traces;HTTP requests;privacy preserving tools;Tools;Privacy;Browsers;Ecosystems;Europe;Advertising;Web pages}, doi = {10.23919/TMA.2017.8002896}, month = {June} }
@inproceedings{Bashir:2018:TCC:3278532.3278573, author = {Bashir, Muhammad Ahmad and Arshad, Sajjad and Kirda, Engin and Robertson, William and Wilson, Christo}, title = {How Tracking Companies Circumvented Ad Blockers Using WebSockets}, booktitle = {Proceedings of the Internet Measurement Conference 2018}, series = {IMC '18}, year = {2018}, isbn = {978-1-4503-5619-0}, location = {Boston, MA, USA}, pages = {471--477}, numpages = {7}, url = {http://doi.acm.org/10.1145/3278532.3278573}, doi = {10.1145/3278532.3278573}, acmid = {3278573}, publisher = {ACM}, address = {New York, NY, USA} }
@article { DiffusionofUserTrackingDataintheOnlineAdvertisingEcosystem, author = {Muhammad Ahmad Bashir and Christo Wilson}, title = {Diffusion of User Tracking Data in the Online Advertising Ecosystem}, journal = {Proceedings on Privacy Enhancing Technologies}, year = {2018}, volume = {2018}, number = {4}, pages = {85 - 103}, url = {https://content.sciendo.com/view/journals/popets/2018/4/article-p85.xml} }
@inproceedings{10.1007/978-3-319-30505-9_4, author = {Kalavri, Vasiliki and Blackburn, Jeremy and Varvello, Matteo and Papagiannaki, Konstantina}, editor = {Karagiannis, Thomas and Dimitropoulos, Xenofontas}, title = {Like a Pack of Wolves: Community Structure of Web Trackers}, booktitle = {Passive and Active Measurement}, year = {2016}, publisher = {Springer International Publishing}, address = {Cham}, pages = {42--54}, isbn = {978-3-319-30505-9} }
@inproceedings{Leung:2016:YUA:2987443.2987456, author = {Leung, Christophe and Ren, Jingjing and Choffnes, David and Wilson, Christo}, title = {Should You Use the App for That?: Comparing the Privacy Implications of App- and Web-based Online Services}, booktitle = {Proceedings of the 2016 Internet Measurement Conference}, series = {IMC '16}, year = {2016}, isbn = {978-1-4503-4526-2}, location = {Santa Monica, California, USA}, pages = {365--372}, numpages = {8}, url = {http://doi.acm.org/10.1145/2987443.2987456}, doi = {10.1145/2987443.2987456}, acmid = {2987456}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {advertising, analytics, app, app vs web, app-vs-web, application, appvsweb, domains, leak, leaks, measurement, mobile, online, personally identifiable information, pii, privacy, tracking, web, website}, }
@inproceedings{Papadopoulos:2017:YPY:3131365.3131397, author = {Papadopoulos, Panagiotis and Kourtellis, Nicolas and Rodriguez, Pablo Rodriguez and Laoutaris, Nikolaos}, title = {If You Are Not Paying for It, You Are the Product: How Much Do Advertisers Pay to Reach You?}, booktitle = {Proceedings of the 2017 Internet Measurement Conference}, series = {IMC '17}, year = {2017}, isbn = {978-1-4503-5118-8}, location = {London, United Kingdom}, pages = {142--156}, numpages = {15}, url = {http://doi.acm.org/10.1145/3131365.3131397}, doi = {10.1145/3131365.3131397}, acmid = {3131397}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {RTB auctions, ad transparency, cost of advertising, pricing dynamics, user privacy}, }
@inproceedings{6974715, author = {C. {Iordanou} and V. {Soteriou} and K. {Aisopos}}, booktitle = {2014 IEEE 32nd International Conference on Computer Design (ICCD)}, title = {Hermes: Architecting a top-performing fault-tolerant routing algorithm for Networks-on-Chips}, year = {2014}, volume = {}, number = {}, pages = {424-431}, keywords = {fault tolerance;integrated circuit reliability;multiprocessing systems;network routing;network-on-chip;resource allocation;full-system chip multiprocessor simulations;prereconfigured escape path selection;fault-free paths;load-balancing routing;deadlock-free hybrid routing algorithm;faulty link counts;fault-tolerant routing algorithm;Hermes;faulty communication links;multicore chip;wearout;NoC;networks-on-chips;Routing;Ports (Computers);System recovery;Broadcasting;Topology;Registers;Multicore processing;Network-on-chip;chip multi-processor;fault-tolerance;routing algorithm;reliability}, doi = {10.1109/ICCD.2014.6974715}, ISSN = {1063-6404}, month = {Oct} }
@inproceedings{Papaodyssefs:2015:WIT:2834050.2834105, author = {Papaodyssefs, Fotios and Iordanou, Costas and Blackburn, Jeremy and Laoutaris, Nikolaos and Papagiannaki, Konstantina}, title = {Web Identity Translator: Behavioral Advertising and Identity Privacy with WIT}, booktitle = {Proceedings of the 14th ACM Workshop on Hot Topics in Networks}, series = {HotNets-XIV}, year = {2015}, isbn = {978-1-4503-4047-2}, location = {Philadelphia, PA, USA}, pages = {3:1--3:7}, articleno = {3}, numpages = {7}, url = {http://doi.acm.org/10.1145/2834050.2834105}, doi = {10.1145/2834050.2834105}, acmid = {2834105}, publisher = {ACM}, address = {New York, NY, USA}, }
@inproceedings{Iordanou:2018:TCB:3278532.3278561, author = {Iordanou, Costas and Smaragdakis, Georgios and Poese, Ingmar and Laoutaris, Nikolaos}, title = {Tracing Cross Border Web Tracking}, booktitle = {Proceedings of the Internet Measurement Conference 2018}, series = {IMC '18}, year = {2018}, isbn = {978-1-4503-5619-0}, location = {Boston, MA, USA}, pages = {329--342}, numpages = {14}, url = {http://doi.acm.org/10.1145/3278532.3278561}, doi = {10.1145/3278532.3278561}, acmid = {3278561}, publisher = {ACM}, address = {New York, NY, USA}, }
@inproceedings{Iordanou:2017:FPB:3098822.3098850, author = {Iordanou, Costas and Soriente, Claudio and Sirivianos, Michael and Laoutaris, Nikolaos}, title = {Who is Fiddling with Prices?: Building and Deploying a Watchdog Service for E-commerce}, booktitle = {Proceedings of the Conference of the ACM Special Interest Group on Data Communication}, series = {SIGCOMM '17}, year = {2017}, isbn = {978-1-4503-4653-5}, location = {Los Angeles, CA, USA}, pages = {376--389}, numpages = {14}, url = {http://doi.acm.org/10.1145/3098822.3098850}, doi = {10.1145/3098822.3098850}, acmid = {3098850}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {Online Price Discrimination}, }