Jason Polakis
YOU?
Author Swipe
View article: Lost in Translation: Exploring the Risks of Web-to-Cross-platform Application Migration
Lost in Translation: Exploring the Risks of Web-to-Cross-platform Application Migration Open
The cross-platform application-development paradigm alleviates a major challenge of native application development, namely the need to re-implement the codebase for each target platform, and streamlines the deployment of applications to di…
View article: Dredging the River Styx: Fortifying the Web through Robust and Real-Time Script Attribution
Dredging the River Styx: Fortifying the Web through Robust and Real-Time Script Attribution Open
The modern web ecosystem relies heavily on the inclusion of third-party scripts as they offer useful, and often necessary, functionality. This inclusion leads to the "blending" of code from different origins, which has significant ramifica…
View article: SoK: Advances and Open Problems in Web Tracking
SoK: Advances and Open Problems in Web Tracking Open
Web tracking is a pervasive and opaque practice that enables personalized advertising, retargeting, and conversion tracking. Over time, it has evolved into a sophisticated and invasive ecosystem, employing increasingly complex techniques t…
View article: ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning
ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning Open
Black-box web vulnerability scanners are invaluable for security researchers and practitioners. Despite recent approaches tackling some of the inherent limitations of scanners, many have not sufficiently evolved alongside web browsers and …
View article: Escaping the Confines of Time
Escaping the Confines of Time Open
Browser fingerprinting continues to proliferate across the web. Critically, popular fingerprinting libraries have started incorporating extension-fingerprinting capabilities, thus exacerbating the privacy loss they can induce. In this pape…
View article: This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration
This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration Open
Mobile sensors have transformed how users interact with modern smartphones and enhance their overall experience. However, the absence of sufficient access control for protecting these sensors enables a plethora of threats. As prior work ha…
View article: Tales of Favicons and Caches: Persistent Tracking in Modern Browsers
Tales of Favicons and Caches: Persistent Tracking in Modern Browsers Open
Statement from the NDSS 2021 Program Committee: NDSS is devoted to ethical principles and encourages the research community to ensure its work protects the privacy, security, and safety of users and others involved.While the NDSS 2021 PC a…
View article: Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage
Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage Open
Service workers are a powerful technology supported by all major modern browsers that can improve users' browsing experience by offering capabilities similar to those of native applications. While they are gaining significant traction in t…
View article: The Seven Deadly Sins of the HTML5 WebAPI
The Seven Deadly Sins of the HTML5 WebAPI Open
Modern smartphone sensors can be leveraged for providing novel functionality and greatly improving the user experience. However, sensor data can be misused by privacy-invasive or malicious entities. Additionally, a wide range of other atta…
View article: Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers
Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers Open
Mobile browsers have become one of the main mediators of our online activities. However, as web pages continue to increase in size and streaming media on-the-go has become commonplace, mobile data plan constraints remain a significant conc…
View article: Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting
Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting Open
With users becoming increasingly privacy-aware and browser vendors incorporating anti-tracking mechanisms, browser fingerprinting has garnered significant attention.Accordingly, prior work has proposed techniques for identifying browser ex…
View article: Deep Complex Networks for Protocol-Agnostic Radio Frequency Device Fingerprinting in the Wild
Deep Complex Networks for Protocol-Agnostic Radio Frequency Device Fingerprinting in the Wild Open
Researchers have demonstrated various techniques for fingerprinting and identifying devices. Previous approaches have identified devices from their network traffic or transmitted signals while relying on software or operating system specif…
View article: A Large-scale Study on the Risks of the HTML5 WebAPI for Mobile Sensor-based Attacks
A Large-scale Study on the Risks of the HTML5 WebAPI for Mobile Sensor-based Attacks Open
Smartphone sensors can be leveraged by malicious apps for a plethora of different attacks, which can also be deployed by malicious websites through the HTML5 WebAPI. In this paper we provide a comprehensive evaluation of the multifaceted t…
View article: Please Forget Where I Was Last Summer: The Privacy Risks of Public\n Location (Meta)Data
Please Forget Where I Was Last Summer: The Privacy Risks of Public\n Location (Meta)Data Open
The exposure of location data constitutes a significant privacy risk to users\nas it can lead to de-anonymization, the inference of sensitive information, and\neven physical threats. In this paper we present LPAuditor, a tool that conducts…
View article: Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data
Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data Open
The exposure of location data constitutes a significant privacy risk to users as it can lead to de-anonymization, the inference of sensitive information, and even physical threats. In this paper we present LPAuditor, a tool that conducts a…
View article: Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data
Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data Open
The exposure of location data constitutes a significant privacy risk to users as it can lead to de-anonymization, the inference of sensitive information, and even physical threats.In this paper we present LPAuditor, a tool that conducts a …
View article: That's the Way the Cookie Crumbles
That's the Way the Cookie Crumbles Open
Recent incidents have once again brought the topic of encryption to public discourse, while researchers continue to demonstrate attacks that highlight the difficulty of implementing encryption even without the presence of "backdoors". Howe…