Resultado final Documents, reports (15) D4.2 Defences in the IoT - Midterm Report Activity report for the second year of the project. D2.3 Dissemination Progress report, year 3 Dissemination and communication activities report for the third year of the PROTASIS project. D3.1 Cyber Attacks - First Progress Report Activity report for the rst year of the project. D2.7 Exploitation Plan Exploitation Plan for the PROTASIS project. D3.4 Cyber Attacks - Final Report Activity report for the fourth year of the project. D2.1 Dissemination Progress report, year 1 Dissemination and communication activities report for the first year of the PROTASIS project. D1.1 Website and collaboration tools The website will be the main channel through which the general public will gain access to PROTASIS results, publications, news and new tools developed in the context of this project. As with all our other projects, we will maintain the website beyond the life of the project. For better dissemination of the information, we will also take advantage of social media such as Twitter and Facebook, as a way to aggregate and reach out to our constituency. Complementary to the website, we will employ mailing lists for communication within the consortium and with our EAB. For collaboration, we will be using SVN to maintain all the important documents and all tools developed by the consortium members. D2.5 Cyber Security Repository A repository of cybersecurity-relevant data and metadata collected and/or used during the course of PROTASIS, as well as educational materials. The repository itself will be a publicly-available website, but the content will be accessible under a policy that will be established as part of PROTASIS. D2.4 Dissemination Progress report, year 4 Dissemination and communication activities report for the fourth year of the PROTASIS project. D3.2 Cyber Attacks - Midterm Report Activity report for the second year of the project. D4.3 Defences in the IoT - Progress report Activity report for the third year of the project. D2.6 Dissemination and Communication Plan Dissemination and Communication Plan for the PROTASIS project. D4.1 Defences in the IoT - First Progress Report Activity report for the rst year of the project. D2.2 Dissemination Progress report, year 2 Dissemination and communication activities report for the second year of the PROTASIS project. D3.3 Cyber Attacks - Progress report Activity report for the third year of the project. Publicaciones Conference proceedings (32) No More Chasing Waterfalls - A Measurement Study of the Header Bidding Ad-Ecosystem Autores: Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis Publicado en: Proceedings of the Internet Measurement Conference, 2019, Page(s) 280-293, ISBN 9781450369480 Editor: ACM DOI: 10.1145/3355369.3355582 Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data Autores: Kostas Drakonakis, Panagiotis Ilia, Sotiris Ioannidis, Jason Polakis Publicado en: Proceedings 2019 Network and Distributed System Security Symposium, 2019, ISBN 1-891562-55-X Editor: Internet Society DOI: 10.14722/ndss.2019.23151 Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask Autores: Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos Markatos Publicado en: The World Wide Web Conference on - WWW '19, 2019, Page(s) 1432-1442, ISBN 9781450366748 Editor: ACM Press DOI: 10.1145/3308558.3313542 REAPER - Real-time App Analysis for Augmenting the Android Permission System Autores: Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis Publicado en: Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019, Page(s) 37-48, ISBN 9781450360999 Editor: ACM DOI: 10.1145/3292006.3300027 CCSP: A compressed certificate status protocol Autores: Antonios A. Chariton, Eirini Degkleri, Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos P. Markatos Publicado en: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, 2017, Page(s) 1-9, ISBN 978-1-5090-5336-0 Editor: IEEE DOI: 10.1109/infocom.2017.8057065 A Large-scale Analysis of Content Modification by Open HTTP Proxies Autores: Giorgos Tsirantonakis, Panagiotis Ilia, Sotiris Ioannidis, Elias Athanasopoulos, Michalis Polychronakis Publicado en: Proceedings 2018 Network and Distributed System Security Symposium, 2018, ISBN 1-891562-49-5 Editor: Internet Society DOI: 10.14722/ndss.2018.23244 If you are not paying for it, you are the product - how much do advertisers pay to reach you? Autores: Panagiotis Papadopoulos, Pablo Rodriguez Rodriguez, Nicolas Kourtellis, Nikolaos Laoutaris Publicado en: Proceedings of the 2017 Internet Measurement Conference on - IMC '17, 2017, Page(s) 142-156, ISBN 9781-450351188 Editor: ACM Press DOI: 10.1145/3131365.3131397 An Experimental Security Analysis of an Industrial Robot Controller Autores: Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, Stefano Zanero Publicado en: 2017 IEEE Symposium on Security and Privacy (SP), 2017, Page(s) 268-286, ISBN 978-1-5090-5533-3 Editor: IEEE DOI: 10.1109/sp.2017.20 The Cost of Digital Advertisement - Comparing User and Advertiser Views Autores: Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos Publicado en: Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18, 2018, Page(s) 1479-1489, ISBN 9781-450356398 Editor: ACM Press DOI: 10.1145/3178876.3186060 Exclusive - How the (synced) Cookie Monster breached my encrypted VPN session Autores: Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos Publicado en: Proceedings of the 11th European Workshop on Systems Security - EuroSec'18, 2018, Page(s) 1-6, ISBN 9781-450356527 Editor: ACM Press DOI: 10.1145/3193111.3193117 Where's Wally? - How to Privately Discover your Friends on the Internet Autores: Panagiotis Papadopoulos, Antonios A. Chariton, Elias Athanasopoulos, Evangelos P. Markatos Publicado en: Proceedings of the 2018 on Asia Conference on Computer and Communications Security - ASIACCS '18, 2018, Page(s) 425-430, ISBN 9781450355766 Editor: ACM Press DOI: 10.1145/3196494.3196496 Øpass - Zero-storage Password Management Based on Password Reminders Autores: Giannis Tzagarakis, Panagiotis Papadopoulos, Antonios A. Chariton, Elias Athanasopoulos, Evangelos P. Markatos Publicado en: Proceedings of the 11th European Workshop on Systems Security - EuroSec'18, 2018, Page(s) 1-6, ISBN 9781-450356527 Editor: ACM Press DOI: 10.1145/3193111.3193113 REAPER: Real-time App Analysis for Augmenting the Android Permission System Autores: Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis Publicado en: Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (ACM CODASPY), 2019 Editor: ACM Cookie synchronization: Everything you always wanted to know but were afraid to ask Autores: Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos Publicado en: 2019 Editor: 28th International Conference on World Wide Web Is Privacy possible without Anonymity? - The case for microblogging services Autores: Panagiotis Papadopoulos, Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos Publicado en: Proceedings of the 12th European Workshop on Systems Security - EuroSec '19, 2019, Page(s) 1-6, ISBN 9781450362740 Editor: ACM Press DOI: 10.1145/3301417.3312498 ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks Autores: Radhesh Krishnan Konoth, Marco Oliverio, Andrei Tatar, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi Publicado en: 2018 Editor: USENIX Association Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables Autores: Benjamin Kollenda, Enes Goktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, R. K. Konoth, Cristiano Giuffrida, Herbert Bos, Thorsten Holz Publicado en: 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017, Page(s) 189-200, ISBN 978-1-5386-0542-4 Editor: IEEE DOI: 10.1109/dsn.2017.58 MineSweeper - An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense Autores: Radhesh Krishnan Konoth, Emanuele Vineti, Veelasha Moonsamy, Martina Lindorfer, Christopher Kruegel, Herbert Bos, Giovanni Vigna Publicado en: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18, 2018, Page(s) 1714-1730, ISBN 9781-450356930 Editor: ACM Press DOI: 10.1145/3243734.3243858 Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure Autores: Enes Goktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, Cristiano Giuffrida Publicado en: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, Page(s) 227-242, ISBN 978-1-5386-4228-3 Editor: IEEE DOI: 10.1109/eurosp.2018.00024 It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains Autores: Florian Quinkert, Tobias Lauinger, William Robertson, Engin Kirda, Thorsten Holz Publicado en: 2019 IEEE Conference on Communications and Network Security (CNS), 2019, Page(s) 259-267, ISBN 978-1-5386-7117-7 Editor: IEEE DOI: 10.1109/cns.2019.8802671 No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem Autores: Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis Publicado en: 2019 Editor: ACM Talon: An Automated Framework for Cross-Device Tracking Detection Autores: Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis Publicado en: 2019 Editor: USENIX Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data Autores: Kostas Drakonakis, Panagiotis Ilia, Sotiris Ioannidis, Jason Polakis Publicado en: 2019 Editor: Proceedings of the Network and Distributed System Security Symposium (NDSS) Beyond content analysis - detecting targeted ads via distributed counting Autores: Costas Iordanou, Nicolas Kourtellis, Juan Miguel Carrascosa, Claudio Soriente, Ruben Cuevas, Nikolaos Laoutaris Publicado en: Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019, Page(s) 110-122, ISBN 9781-450369985 Editor: ACM DOI: 10.1145/3359989.3365428 Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots Autores: Pietro Ferretti, Marcello Pogliani, Stefano Zanero Publicado en: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy - CPS-SPC'19, 2019, Page(s) 51-61, ISBN 9781-450368315 Editor: ACM Press DOI: 10.1145/3338499.3357361 There's a Hole in that Bucket! - A Large-scale Analysis of Misconfigured S3 Buckets Autores: Andrea Continella, Mario Polino, Marcello Pogliani, Stefano Zanero Publicado en: Proceedings of the 34th Annual Computer Security Applications Conference, 2018, Page(s) 702-711, ISBN 9781450365697 Editor: ACM DOI: 10.1145/3274694.3274736 CopyCAN - An Error-Handling Protocol based Intrusion Detection System for Controller Area Network Autores: Stefano Longari, Matteo Penco, Michele Carminati, Stefano Zanero Publicado en: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy - CPS-SPC'19, 2019, Page(s) 39-50, ISBN 9781-450368315 Editor: ACM Press DOI: 10.1145/3338499.3357362 SysTaint - Assisting Reversing of Malicious Network Communications Autores: Gabriele Viglianisi, Michele Carminati, Mario Polino, Andrea Continella, Stefano Zanero Publicado en: Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop on - SSPREW-8, 2018, Page(s) 1-12, ISBN 9781-450360968 Editor: ACM Press DOI: 10.1145/3289239.3289245 The Long-Standing Privacy Debate - Mobile Websites vs Mobile Apps Autores: Elias P. Papadopoulos, Michalis Diamantaris, Panagiotis Papadopoulos, Thanasis Petsas, Sotiris Ioannidis, Evangelos P. Markatos Publicado en: Proceedings of the 26th International Conference on World Wide Web - WWW '17, 2017, Page(s) 153-162, ISBN 9781-450349130 Editor: ACM Press DOI: 10.1145/3038912.3052691 CCSP: a Compressed Certificate Status Protocol Autores: Antonis A. Chariton, Eirini Degkleri, Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos P. Markatos Publicado en: IEEE International Conference on Computer Communications (INFOCOM '17), 2017 Editor: IEEE Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation Autores: Panagiotis Papadopoulos, Panagiotis Ilia, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis, Giorgos Vasiliadis Publicado en: Proceedings 2019 Network and Distributed System Security Symposium, 2019, ISBN 1-891562-55-X Editor: Internet Society DOI: 10.14722/ndss.2019.23070 When Cyber Got Real: Challenges in Securing Cyber-Physical Systems Autores: Stefano Zanero Publicado en: 2018 IEEE SENSORS, 2018, Page(s) 1-4, ISBN 978-1-5386-4707-3 Editor: IEEE DOI: 10.1109/ICSENS.2018.8589798 Book chapters (5) ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation Autores: Pietro De Nicolao, Marcello Pogliani, Mario Polino, Michele Carminati, Davide Quarta, Stefano Zanero Publicado en: Detection of Intrusions and Malware, and Vulnerability Assessment, Issue 10885, 2018, Page(s) 351-371, ISBN 978-3-319-93410-5 Editor: Springer International Publishing DOI: 10.1007/978-3-319-93411-2_16 Incognitus: Privacy-Preserving User Interests in Online Social Networks Autores: Alexandros Kornilakis, Panagiotis Papadopoulos, Evangelos Markatos Publicado en: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Issue 11398, 2019, Page(s) 81-95, ISBN 978-3-030-12084-9 Editor: Springer International Publishing DOI: 10.1007/978-3-030-12085-6_8 Automated Measurements of Cross-Device Tracking Autores: Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis Publicado en: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Issue 11398, 2019, Page(s) 73-80, ISBN 978-3-030-12084-9 Editor: Springer International Publishing DOI: 10.1007/978-3-030-12085-6_7 Extended Abstract: Toward Systematically Exploring Antivirus Engines Autores: Davide Quarta, Federico Salvioni, Andrea Continella, Stefano Zanero Publicado en: Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings, Issue 10885, 2018, Page(s) 393-403, ISBN 978-3-319-93410-5 Editor: Springer International Publishing DOI: 10.1007/978-3-319-93411-2_18 Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking Autores: Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos Markatos Publicado en: Information Security - 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings, Issue 11723, 2019, Page(s) 277-296, ISBN 978-3-030-30214-6 Editor: Springer International Publishing DOI: 10.1007/978-3-030-30215-3_14 Peer reviewed articles (2) Security of controlled manufacturing systems in the connected factory: the case of industrial robots Autores: Marcello Pogliani, Davide Quarta, Mario Polino, Martino Vittone, Federico Maggi, Stefano Zanero Publicado en: Journal of Computer Virology and Hacking Techniques, Issue 15/3, 2019, Page(s) 161-175, ISSN 2263-8733 Editor: Journal of Computer Virology and Hacking Techniques DOI: 10.1007/s11416-019-00329-8 ReCAN – Dataset for reverse engineering of Controller Area Networks Autores: Mattia Zago, Stefano Longari, Andrea Tricarico, Michele Carminati, Manuel Gil Pérez, Gregorio Martínez Pérez, Stefano Zanero Publicado en: Data in Brief, Issue 29, 2020, Page(s) 105149, ISSN 2352-3409 Editor: Elsevier BV DOI: 10.1016/j.dib.2020.105149 Buscando datos de OpenAIRE... Se ha producido un error en la búsqueda de datos de OpenAIRE No hay resultados disponibles