Skip to main content

Showing 1–10 of 10 results for author: Kapravelos, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.13175  [pdf, other

    cs.CR

    FV8: A Forced Execution JavaScript Engine for Detecting Evasive Techniques

    Authors: Nikolaos Pantelaios, Alexandros Kapravelos

    Abstract: Evasion techniques allow malicious code to never be observed. This impacts significantly the detection capabilities of tools that rely on either dynamic or static analysis, as they never get to process the malicious code. The dynamic nature of JavaScript, where code is often injected dynamically, makes evasions particularly effective. Yet, we lack tools that can detect evasive techniques in a chal… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

    Comments: Usenix Security Symposium 2024 -- DOI To Be Announced soon

  2. arXiv:2405.08762  [pdf, other

    cs.CR

    S3C2 Summit 2024-03: Industry Secure Supply Chain Summit

    Authors: Greg Tystahl, Yasemin Acar, Michel Cukier, William Enck, Christian Kastner, Alexandros Kapravelos, Dominik Wermke, Laurie Williams

    Abstract: Supply chain security has become a very important vector to consider when defending against adversary attacks. Due to this, more and more developers are keen on improving their supply chains to make them more robust against future threats. On March 7th, 2024 researchers from the Secure Software Supply Chain Center (S3C2) gathered 14 industry leaders, developers and consumers of the open source eco… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

    Comments: This is our WIP paper on the Summit. More versions will be released soon

  3. Manifest V3 Unveiled: Navigating the New Era of Browser Extensions

    Authors: Nikolaos Pantelaios, Alexandros Kapravelos

    Abstract: Introduced over a decade ago, Chrome extensions now exceed 200,000 in number. In 2020, Google announced a shift in extension development with Manifest Version 3 (V3), aiming to replace the previous Version 2 (V2) by January 2023. This deadline was later extended to January 2025. The company's decision is grounded in enhancing three main pillars: privacy, security, and performance. This paper prese… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

    Report number: 10.14722/madweb.2024.23080

    Journal ref: 10.14722/madweb.2024.23080

  4. arXiv:2308.06850  [pdf, other

    cs.CR

    S3C2 Summit 2023-06: Government Secure Supply Chain Summit

    Authors: William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie Williams

    Abstract: Recent years have shown increased cyber attacks targeting less secure elements in the software supply chain and causing fatal damage to businesses and organizations. Past well-known examples of software supply chain attacks are the SolarWinds or log4j incidents that have affected thousands of customers and businesses. The US government and industry are equally interested in enhancing software supp… ▽ More

    Submitted 13 August, 2023; originally announced August 2023.

    Comments: arXiv admin note: text overlap with arXiv:2307.16557, arXiv:2307.15642

  5. arXiv:2307.16557  [pdf, other

    cs.CR

    S3C2 Summit 2023-02: Industry Secure Supply Chain Summit

    Authors: Trevor Dunlap, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kastner, Laurie Williams

    Abstract: Recent years have shown increased cyber attacks targeting less secure elements in the software supply chain and causing fatal damage to businesses and organizations. Past well-known examples of software supply chain attacks are the SolarWinds or log4j incidents that have affected thousands of customers and businesses. The US government and industry are equally interested in enhancing software supp… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

    Comments: arXiv admin note: text overlap with arXiv:2307.15642

  6. arXiv:2307.15642  [pdf, other

    cs.CR

    S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit

    Authors: Mindy Tran, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kastner, Laurie Williams

    Abstract: Recent years have shown increased cyber attacks targeting less secure elements in the software supply chain and causing fatal damage to businesses and organizations. Past well-known examples of software supply chain attacks are the SolarWinds or log4j incidents that have affected thousands of customers and businesses. The US government and industry are equally interested in enhancing software supp… ▽ More

    Submitted 28 July, 2023; originally announced July 2023.

  7. arXiv:2111.07153  [pdf, other

    cs.CR

    Categorizing Service Worker Attacks and Mitigations

    Authors: Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci

    Abstract: Service Workers (SWs) are a powerful feature at the core of Progressive Web Apps, namely web applications that can continue to function when the user's device is offline and that have access to device sensors and capabilities previously accessible only by native applications. During the past few years, researchers have found a number of ways in which SWs may be abused to achieve different maliciou… ▽ More

    Submitted 13 November, 2021; originally announced November 2021.

  8. arXiv:2011.01267  [pdf, other

    cs.CR

    There's No Trick, Its Just a Simple Trick: A Web-Compat and Privacy Improving Approach to Third-party Web Storage

    Authors: Jordan Jueckstock, Peter Snyder, Shaown Sarker, Alexandros Kapravelos, Benjamin Livshits

    Abstract: While much current web privacy research focuses on browser fingerprinting, the boring fact is that the majority of current third-party web tracking is conducted using traditional, persistent-state identifiers. One possible explanation for the privacy community's focus on fingerprinting is that to date browsers have faced a lose-lose dilemma when dealing with third-party stateful identifiers: block… ▽ More

    Submitted 2 November, 2020; originally announced November 2020.

  9. arXiv:2005.11910  [pdf, other

    cs.CR

    Improving Web Content Blocking With Event-Loop-Turn Granularity JavaScript Signatures

    Authors: Quan Chen, Peter Snyder, Ben Livshits, Alexandros Kapravelos

    Abstract: Content blocking is an important part of a performant, user-serving, privacy respecting web. Most content blockers build trust labels over URLs. While useful, this approach has well understood shortcomings. Attackers may avoid detection by changing URLs or domains, bundling unwanted code with benign code, or inlining code in pages. The common flaw in existing approaches is that they evaluate code… ▽ More

    Submitted 24 May, 2020; originally announced May 2020.

  10. arXiv:1905.08767  [pdf, other

    cs.NI

    The Blind Men and the Internet: Multi-Vantage Point Web Measurements

    Authors: Jordan Jueckstock, Shaown Sarker, Peter Snyder, Panagiotis Papadopoulos, Matteo Varvello, Benjamin Livshits, Alexandros Kapravelos

    Abstract: In this paper, we design and deploy a synchronized multi-vantage point web measurement study to explore the comparability of web measurements across vantage points (VPs). We describe in reproducible detail the system with which we performed synchronized crawls on the Alexa top 5K domains from four distinct network VPs: research university, cloud datacenter, residential network, and Tor gateway pro… ▽ More

    Submitted 21 May, 2019; originally announced May 2019.