Skip to main content

Showing 51–73 of 73 results for author: Stringhini, G

.
  1. arXiv:1803.10133  [pdf, other

    cs.CR cs.AI cs.SI

    You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information

    Authors: Beatrice Perez, Mirco Musolesi, Gianluca Stringhini

    Abstract: Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world. Yet, surprisingly, metadata are often still catergorized as non-sensitive. Indeed, in the past, researchers and practitioners have mainly focused on the problem of the identification of a user from the content of a message. In this paper, we use Twitter as a case study… ▽ More

    Submitted 14 May, 2018; v1 submitted 27 March, 2018; originally announced March 2018.

    Comments: 11 pages, 13 figures. Published in the Proceedings of the 12th International AAAI Conference on Web and Social Media (ICWSM 2018). June 2018. Stanford, CA, USA

  2. arXiv:1803.03448  [pdf, other

    cs.CR

    A Family of Droids -- Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis

    Authors: Lucky Onwuzurike, Mario Almeida, Enrico Mariconti, Jeremy Blackburn, Gianluca Stringhini, Emiliano De Cristofaro

    Abstract: Following the increasing popularity of mobile ecosystems, cybercriminals have increasingly targeted them, designing and distributing malicious apps that steal information or cause harm to the device's owner. Aiming to counter them, detection techniques based on either static or dynamic analysis that model Android malware, have been proposed. While the pros and cons of these analysis techniques are… ▽ More

    Submitted 13 July, 2018; v1 submitted 9 March, 2018; originally announced March 2018.

    Comments: A preliminary version of this paper appears in the Proceedings of 16th Annual Conference on Privacy, Security and Trust (PST 2018). This is the full version

  3. What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?

    Authors: Savvas Zannettou, Barry Bradlyn, Emiliano De Cristofaro, Haewoon Kwak, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn

    Abstract: Over the past few years, a number of new "fringe" communities, like 4chan or certain subreddits, have gained traction on the Web at a rapid pace. However, more often than not, little is known about how they evolve or what kind of activities they attract, despite recent research has shown that they influence how false information reaches mainstream communities. This motivates the need to monitor th… ▽ More

    Submitted 13 March, 2018; v1 submitted 14 February, 2018; originally announced February 2018.

    Comments: To appear in 3rd Cybersafety Workshop (WWW Companion, 2018)

  4. arXiv:1802.00393  [pdf, other

    cs.SI

    Large Scale Crowdsourcing and Characterization of Twitter Abusive Behavior

    Authors: Antigoni-Maria Founta, Constantinos Djouvas, Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Gianluca Stringhini, Athena Vakali, Michael Sirivianos, Nicolas Kourtellis

    Abstract: In recent years, offensive, abusive and hateful language, sexism, racism and other types of aggressive and cyberbullying behavior have been manifesting with increased frequency, and in many online social media platforms. In fact, past scientific work focused on studying these forms in popular media, such as Facebook and Twitter. Building on such work, we present an 8-month study of the various for… ▽ More

    Submitted 15 April, 2018; v1 submitted 1 February, 2018; originally announced February 2018.

    Comments: crowdsourcing, abusive behavior, hate speech, Twitter, aggression, bullying

    MSC Class: 68T06 ACM Class: K.4.2

  5. arXiv:1801.10396  [pdf, other

    cs.CY cs.DL cs.SI

    Understanding Web Archiving Services and Their (Mis)Use on Social Media

    Authors: Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini

    Abstract: Web archiving services play an increasingly important role in today's information ecosystem, by ensuring the continuing availability of information, or by deliberately caching content that might get deleted or removed. Among these, the Wayback Machine has been proactively archiving, since 2001, versions of a large number of Web pages, while newer services like archive.is allow users to create on-d… ▽ More

    Submitted 9 April, 2018; v1 submitted 31 January, 2018; originally announced January 2018.

    Comments: Proceedings of the 12th International AAAI Conference on Web and Social Media (ICWSM 2018)

  6. arXiv:1801.09288  [pdf, other

    cs.SI

    Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web

    Authors: Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn

    Abstract: Over the past couple of years, anecdotal evidence has emerged linking coordinated campaigns by state-sponsored actors with efforts to manipulate public opinion on the Web, often around major political events, through dedicated accounts, or "trolls." Although they are often involved in spreading disinformation on social media, there is little understanding of how these trolls operate, what type of… ▽ More

    Submitted 4 March, 2019; v1 submitted 28 January, 2018; originally announced January 2018.

    Comments: A preliminary version of this paper appears in the 4th Workshop on The Fourth Workshop on Computational Methods in Online Misbehavior (CyberSafety 2019) -- WWW'19 Companion Proceedings. This is the full version

  7. arXiv:1801.08115  [pdf, other

    cs.CR

    Eight Years of Rider Measurement in the Android Malware Ecosystem: Evolution and Lessons Learned

    Authors: Guillermo Suarez-Tangil, Gianluca Stringhini

    Abstract: Despite the growing threat posed by Android malware, the research community is still lacking a comprehensive view of common behaviors and trends exposed by malware families active on the platform. Without such view, the researchers incur the risk of develo** systems that only detect outdated threats, missing the most recent ones. In this paper, we conduct the largest measurement of Android malwa… ▽ More

    Submitted 19 March, 2020; v1 submitted 24 January, 2018; originally announced January 2018.

    Comments: A shorter version of this paper appears in IEEE Transactions on Dependable and Secure Computing. This is a more detailed version, extended from the pre-print

  8. arXiv:1711.07477  [pdf, other

    cs.CR cs.AI

    MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)

    Authors: Lucky Onwuzurike, Enrico Mariconti, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, Gianluca Stringhini

    Abstract: As Android has become increasingly popular, so has malware targeting it, thus pushing the research community to propose different detection techniques. However, the constant evolution of the Android ecosystem, and of malware itself, makes it hard to design robust tools that can operate for long periods of time without the need for modifications or costly re-training. Aiming to address this issue,… ▽ More

    Submitted 2 March, 2019; v1 submitted 20 November, 2017; originally announced November 2017.

    Comments: A preliminary version of this paper appears in the Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017) [arXiv:1612.04433]. This is the extended version, to appear in the ACM Transactions on Privacy and Security (ACM TOPS)

  9. arXiv:1708.09058  [pdf, other

    cs.CR cs.SI

    POISED: Spotting Twitter Spam Off the Beaten Paths

    Authors: Shirin Nilizadeh, Francois Labreche, Alireza Sedighian, Ali Zand, Jose Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna

    Abstract: Cybercriminals have found in online social networks a propitious medium to spread spam and malicious content. Existing techniques for detecting spam include predicting the trustworthiness of accounts and analyzing the content of these messages. However, advanced attackers can still successfully evade these defenses. Online social networks bring people who have personal connections or share commo… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

  10. arXiv:1705.06947  [pdf, other

    cs.SI cs.CY

    The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources

    Authors: Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn

    Abstract: As the number and the diversity of news outlets on the Web grow, so does the opportunity for "alternative" sources of information to emerge. Using large social networks like Twitter and Facebook, misleading, false, or agenda-driven information can quickly and seamlessly spread online, deceiving people or influencing their opinions. Also, the increased engagement of tightly knit communities, such a… ▽ More

    Submitted 30 September, 2017; v1 submitted 19 May, 2017; originally announced May 2017.

    Comments: To appear in the 17th ACM Internet Measurement Conference (IMC 2017)

  11. arXiv:1705.03345  [pdf, other

    cs.SI cs.CR

    Hate is not Binary: Studying Abusive Behavior of #GamerGate on Twitter

    Authors: Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali

    Abstract: Over the past few years, online bullying and aggression have become increasingly prominent, and manifested in many different forms on social media. However, there is little work analyzing the characteristics of abusive users and what distinguishes them from typical social media users. In this paper, we start addressing this gap by analyzing tweets containing a great large amount of abusiveness. We… ▽ More

    Submitted 9 May, 2017; originally announced May 2017.

    Comments: In 28th ACM Conference on Hypertext and Social Media (ACM HyperText 2017)

  12. arXiv:1704.07759  [pdf, other

    cs.CY cs.CL

    Email Babel: Does Language Affect Criminal Activity in Compromised Webmail Accounts?

    Authors: Emeric Bernard-Jones, Jeremiah Onaolapo, Gianluca Stringhini

    Abstract: We set out to understand the effects of differing language on the ability of cybercriminals to navigate webmail accounts and locate sensitive information in them. To this end, we configured thirty Gmail honeypot accounts with English, Romanian, and Greek language settings. We populated the accounts with email messages in those languages by subscribing them to selected online newsletters. We hid em… ▽ More

    Submitted 25 April, 2017; originally announced April 2017.

  13. arXiv:1702.07784  [pdf, other

    cs.SI cs.AI cs.CY

    Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying

    Authors: Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali

    Abstract: Over the past few years, online aggression and abusive behaviors have occurred in many different forms and on a variety of platforms. In extreme cases, these incidents have evolved into hate, discrimination, and bullying, and even materialized into real-world threats and attacks against individuals or groups. In this paper, we study the Gamergate controversy. Started in August 2014 in the online g… ▽ More

    Submitted 24 February, 2017; originally announced February 2017.

    Comments: WWW Cybersafety Workshop 2017

  14. arXiv:1702.06877  [pdf, other

    cs.CY cs.SI

    Mean Birds: Detecting Aggression and Bullying on Twitter

    Authors: Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali

    Abstract: In recent years, bullying and aggression against users on social media have grown significantly, causing serious consequences to victims of all demographics. In particular, cyberbullying affects more than half of young social media users worldwide, and has also led to teenage suicides, prompted by prolonged and/or coordinated digital harassment. Nonetheless, tools and technologies for understandin… ▽ More

    Submitted 12 May, 2017; v1 submitted 22 February, 2017; originally announced February 2017.

  15. arXiv:1702.04256  [pdf, other

    cs.SI

    What's in a Name? Understanding Profile Name Reuse on Twitter

    Authors: Enrico Mariconti, Jeremiah Onaolapo, Syed Sharique Ahmad, Nicolas Nikiforou, Manuel Egele, Nick Nikiforakis, Gianluca Stringhini

    Abstract: Users on Twitter are commonly identified by their profile names. These names are used when directly addressing users on Twitter, are part of their profile page URLs, and can become a trademark for popular accounts, with people referring to celebrities by their real name and their profile name, interchangeably. Twitter, however, has chosen to not permanently link profile names to their correspondin… ▽ More

    Submitted 14 February, 2017; originally announced February 2017.

    Comments: International World Wide Web Conference 2017

  16. arXiv:1612.04433  [pdf, other

    cs.CR

    MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models

    Authors: Enrico Mariconti, Lucky Onwuzurike, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, Gianluca Stringhini

    Abstract: The rise in popularity of the Android platform has resulted in an explosion of malware threats targeting it. As both Android malware and the operating system itself constantly evolve, it is very challenging to design robust malware mitigation techniques that can operate for long periods of time without the need for modifications or costly re-training. In this paper, we present MaMaDroid, an Androi… ▽ More

    Submitted 20 November, 2017; v1 submitted 13 December, 2016; originally announced December 2016.

    Comments: This paper appears in the Proceedings of 24th Network and Distributed System Security Symposium (NDSS 2017). Some experiments have been slightly updated in this version

  17. arXiv:1610.08469  [pdf, other

    cs.CY cs.AI cs.SI

    Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web

    Authors: Sina Sajadmanesh, Sina Jafarzadeh, Seyed Ali Osia, Hamid R. Rabiee, Hamed Haddadi, Yelena Mejova, Mirco Musolesi, Emiliano De Cristofaro, Gianluca Stringhini

    Abstract: Food and nutrition occupy an increasingly prevalent space on the web, and dishes and recipes shared online provide an invaluable mirror into culinary cultures and attitudes around the world. More specifically, ingredients, flavors, and nutrition information become strong signals of the taste preferences of individuals and civilizations. However, there is little understanding of these palate variet… ▽ More

    Submitted 25 April, 2017; v1 submitted 26 October, 2016; originally announced October 2016.

    Comments: In the Web Science Track of 26th International World Wide Web Conference (WWW 2017)

  18. arXiv:1610.03452  [pdf, other

    cs.SI cs.CY cs.HC physics.soc-ph

    Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web

    Authors: Gabriel Emile Hine, Jeremiah Onaolapo, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Riginos Samaras, Gianluca Stringhini, Jeremy Blackburn

    Abstract: The discussion-board site 4chan has been part of the Internet's dark underbelly since its inception, and recent political events have put it increasingly in the spotlight. In particular, /pol/, the "Politically Incorrect" board, has been a central figure in the outlandish 2016 US election season, as it has often been linked to the alt-right movement and its rhetoric of hate and racism. However, 4c… ▽ More

    Submitted 1 October, 2017; v1 submitted 11 October, 2016; originally announced October 2016.

    Comments: A shorter version of this paper appears in the Proceedings of the 11th International AAAI Conference on Web and Social Media (ICWSM'17). Please cite the ICWSM'17 paper. Corresponding author: [email protected]

  19. arXiv:1607.00801  [pdf, other

    cs.CR

    Honey Sheets: What Happens to Leaked Google Spreadsheets?

    Authors: Martin Lazarov, Jeremiah Onaolapo, Gianluca Stringhini

    Abstract: Cloud-based documents are inherently valuable, due to the volume and nature of sensitive personal and business content stored in them. Despite the importance of such documents to Internet users, there are still large gaps in the understanding of what cybercriminals do when they illicitly get access to them by for example compromising the account credentials they are associated with. In this paper,… ▽ More

    Submitted 4 July, 2016; originally announced July 2016.

  20. arXiv:1607.00117  [pdf, other

    cs.CR cs.CY cs.SI

    All Your Cards Are Belong To Us: Understanding Online Carding Forums

    Authors: Andreas Haslebacher, Jeremiah Onaolapo, Gianluca Stringhini

    Abstract: Underground online forums are platforms that enable trades of illicit services and stolen goods. Carding forums, in particular, are known for being focused on trading financial information. However, little evidence exists about the sellers that are present on carding forums, the precise types of products they advertise, and the prices buyers pay. Existing literature mainly focuses on the organisat… ▽ More

    Submitted 24 January, 2017; v1 submitted 1 July, 2016; originally announced July 2016.

  21. arXiv:1511.06090  [pdf, other

    cs.CR

    Master of Puppets: Analyzing And Attacking A Botnet For Fun And Profit

    Authors: Genki Saito, Gianluca Stringhini

    Abstract: A botnet is a network of compromised machines (bots), under the control of an attacker. Many of these machines are infected without their owners' knowledge, and botnets are the driving force behind several misuses and criminal activities on the Internet (for example spam emails). Depending on its topology, a botnet can have zero or more command and control (C&C) servers, which are centralized mach… ▽ More

    Submitted 19 November, 2015; originally announced November 2015.

  22. arXiv:1509.03531  [pdf, ps, other

    cs.CR cs.SI

    Towards Detecting Compromised Accounts on Social Networks

    Authors: Manuel Egele, Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna

    Abstract: Compromising social network accounts has become a profitable course of action for cybercriminals. By hijacking control of a popular media or business account, attackers can distribute their malicious messages or disseminate fake information to a large user base. The impacts of these incidents range from a tarnished reputation to multi-billion dollar monetary losses on financial markets. In our pre… ▽ More

    Submitted 11 September, 2015; originally announced September 2015.

    Journal ref: TDSC-2014-10-0271.R1

  23. arXiv:1410.6629  [pdf, other

    cs.CR

    That Ain't You: Detecting Spearphishing Emails Before They Are Sent

    Authors: Gianluca Stringhini, Olivier Thonnard

    Abstract: One of the ways in which attackers try to steal sensitive information from corporations is by sending spearphishing emails. This type of emails typically appear to be sent by one of the victim's coworkers, but have instead been crafted by an attacker. A particularly insidious type of spearphishing emails are the ones that do not only claim to come from a trusted party, but were actually sent from… ▽ More

    Submitted 24 October, 2014; originally announced October 2014.