Alexandros Kapravelos

ORCID: 0000-0002-8839-8521
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Spam and Phishing Detection
  • Web Application Security Vulnerabilities
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Security and Verification in Computing
  • Privacy, Security, and Data Protection
  • Information and Cyber Security
  • Web Data Mining and Analysis
  • Software Engineering Research
  • Cybercrime and Law Enforcement Studies
  • Supply Chain Resilience and Risk Management
  • Network Traffic and Congestion Control
  • User Authentication and Security Systems
  • Privacy-Preserving Technologies in Data
  • Software-Defined Networks and 5G
  • Logic, programming, and type systems
  • Digital and Cyber Forensics
  • Adversarial Robustness in Machine Learning
  • Software Testing and Debugging Techniques
  • Digital Rights Management and Security
  • Hate Speech and Cyberbullying Detection
  • Wireless Networks and Protocols
  • Mobile Crowdsensing and Crowdsourcing
  • Context-Aware Activity Recognition Systems

North Carolina State University
2016-2025

Institute of Electrical and Electronics Engineers
2022

Regional Municipality of Niagara
2022

IEEE Computer Society
2022

University of Cambridge
2019

Solutions Inc. (Japan)
2019

Arizona State University
2019

Google (United States)
2019

University of California, Santa Barbara
2011-2015

Foundation for Research and Technology Hellas
2010

The web has become an essential part of our society and is currently the main medium information delivery. Billions users browse on a daily basis, there are single websites that have reached over one billion user accounts. In this environment, ability to track their online habits can be very lucrative for advertising companies, yet intrusive privacy users. paper, we examine how web-based device fingerprinting works Internet. By analyzing code three popular browser-fingerprinting providers,...

10.1109/sp.2013.43 article EN IEEE Symposium on Security and Privacy 2013-05-01

JavaScript is used by web developers to enhance the interactivity of their sites, offload work users' browsers and improve sites' responsiveness user-friendliness, making pages feel behave like traditional desktop applications. An important feature JavaScript, ability combine multiple libraries from local remote sources into same page, under namespace. While this enables creation more advanced applications, it also allows for a malicious provider steal data other scripts page itself. Today,...

10.1145/2382196.2382274 article EN Proceedings of the ACM Conference on Computer and Communications Security 2012-10-15

Reusable software libraries, frameworks, and components, such as those provided by open-source ecosystems third-party suppliers, accelerate digital innovation. However, recent years have shown almost exponential growth in attackers leveraging these artifacts to launch supply chain attacks. Past well-known attacks include the SolarWinds, log4j, xz utils incidents. Supply are considered three major attack vectors: through vulnerabilities malware accidentally or intentionally injected into...

10.1145/3714464 article EN ACM Transactions on Software Engineering and Methodology 2025-01-27

Online advertising drives the economy of World Wide Web. Modern websites any size and popularity include advertisements to monetize visits from their users. To this end, they assign an area web page company (so called ad exchange) that will use it display promotional content. By doing this, website owner implicitly trusts offer legitimate content not put site's visitors at risk falling victims malware campaigns other scams.

10.1145/2663716.2663719 article EN 2014-11-05

Today, web injection manifests in many forms, but fundamentally occurs when malicious and unwanted actors tamper directly with browser sessions for their own profit. In this work we illuminate the scope negative impact of one these ad injection, which users have ads imposed on them addition to, or different from, those that websites originally sent them. We develop a multi-staged pipeline identifies wild captures its distribution revenue chains. find has entrenched itself as cross-browser...

10.1109/sp.2015.17 article EN IEEE Symposium on Security and Privacy 2015-05-01

The contentious battle between web services and miscreants involved in blackhat search engine optimization malicious advertisements has driven the underground to develop increasingly sophisticated techniques that hide true nature of sites. These cloaking hinder effectiveness security crawlers potentially expose Internet users harmful content. In this work, we study spectrum target browser, network, or contextual cues detect organic visitors. As a starting point, investigate capabilities ten...

10.1109/sp.2016.50 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2016-05-01

Phishing is a critical threat to Internet users. Although an extensive ecosystem serves protect users, phishing websites are growing in sophistication, and they can slip past the ecosystem's detection systems—and subsequently cause real-world damage—with help of evasion techniques. Sophisticated client-side techniques, known as cloaking, leverage JavaScript enable complex interactions between potential victims website, thus be particularly effective slowing or entirely preventing automated...

10.1109/sp40001.2021.00021 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2021-05-01

Browser extensions are small JavaScript, CSS and HTML programs that run inside the browser with special privileges. These programs, often written by third parties, operate on pages is visiting, giving user a programmatic way to configure browser. The privacy implications arise allowing privileged third-party code execute users' not well understood. In this paper, we develop taint analysis framework for use it perform large scale study of in regard their practices. We first present hybrid...

10.1145/3243734.3243823 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

Modern web security and privacy research depends on accurate measurement of an often evasive hostile web. No longer just a network static, hyperlinked documents, the modern is alive with JavaScript (JS) loaded from third parties unknown trustworthiness. Dynamic analysis potentially JS currently presents cruel dilemma: use heavyweight in-browser solutions that prove impossible to maintain, or lightweight inline are detectable by which cannot match scope coverage provided systems. We present...

10.1145/3355369.3355599 article EN 2019-10-18

As a step towards protecting user privacy, most web browsers perform some form of third-party HTTP cookie blocking or periodic deletion by default, while users typically have the option to select even stricter policies. result, trackers shifted their efforts work around these restrictions and retain improve extent tracking capability.

10.1145/3442381.3449837 article EN 2021-04-19

JavaScript runtime systems include some specialized programming interfaces, called binding layers.Binding layers translate data representations between and unsafe low-level languages, such as C C++, by converting different types.Due to the wide adoption of (and engines) in entire computing ecosystem, discovering bugs is critical.Nonetheless, existing fuzzers cannot adequately fuzz due two major challenges: Generating syntactically semantically correct test cases reducing size input space for...

10.14722/ndss.2021.24224 article EN 2021-01-01

In this paper, we conduct the largest to-date analysis of browser extensions, by investigating 922,684 different extension versions collected in past six years, and using data to discover malicious extensions. We propose a two-stage system that first identifies extensions based on anomalous ratings locates code was added benign order make it malicious. encode these deltas according APIs they abuse search our historical dataset for other similar which have not yet been flagged, neither users...

10.1145/3372297.3423343 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2020-10-30

Accurate web measurement is critical for understanding and improving security privacy online. Such measurements implicitly assume that automated crawls generalize to typical user experience. But anecdotal evidence suggests the behaves differently when seen via well-known endpoints or automation frameworks, various reasons. Our work improves state of by investigating how key differ using naive crawling tool defaults vs. careful attempts match "real" users across Tranco top 25k domains. We...

10.1145/3442381.3450050 article EN 2021-04-19

Content blocking is an important part of a per-formant, user-serving, privacy respecting web. Current content blockers work by building trust labels over URLs. While useful, this approach has many well understood shortcomings. Attackers may avoid detection changing URLs or domains, bundling unwanted code with benign code, inlining in pages.The common flaw existing approaches that they evaluate based on its delivery mechanism, not behavior. In we address problem system for generating...

10.1109/sp40001.2021.00007 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2021-05-01

Cyber attacks leveraging or targeting the software supply chain, such as SolarWinds and Log4j incidents, affected thousands of businesses their customers, drawing attention from both industry government stakeholders. To foster open dialogue, facilitate mutual sharing, discuss shared challenges encountered by stakeholders in securing researchers NSF-supported Secure Software Supply Chain Center (S3C2) organize Summits with This paper summarizes Industry Summit held on November 16, 2023, which...

10.48550/arxiv.2408.16529 preprint EN arXiv (Cornell University) 2024-08-29

In this paper, we investigate to what extent the page modifications that make browser extensions fingerprintable are necessary for their operation. We characterize completely unnecessary extension's functionality as extension bloat. By analyzing 58,034 from Google Chrome store, discovered 5.7% of them were unnecessarily identifiable because To protect users against fingerprinting due bloat, describe design and implementation an in-browser mechanism provides coarse-grained access control on...

10.1145/3308558.3313458 article EN 2019-05-13

By analyzing the code of three popular browser-fingerprinting providers, authors reveal techniques that allow websites to track users without client-side identifiers. They expose questionable practices, such as circumvention HTTP proxies discover a user's real IP address and installation intrusive browser plug-ins. In addition, they measure adoption fingerprinting on Web evaluate user-agent-spoofing extensions, showing current commercial approaches can bypass extensions take advantage their...

10.1109/msp.2013.160 article EN IEEE Security & Privacy 2014-01-31

In this paper, we perform a large-scale measurement study of JavaScript obfuscation browser APIs in the wild. We rely on simple, but powerful observation: if dynamic analysis script's behavior (specifically, how it interacts with APIs) reveals API feature usage that cannot be reconciled static source code, then is obfuscated. To quantify and test observation, create hybrid platform using instrumented Chromium to log all accesses by scripts executed when user visits page. filter access traces...

10.1145/3419394.3423616 article EN 2020-10-23
Coming Soon ...