Skip to main content

Showing 1–50 of 73 results for author: Stringhini, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.15645  [pdf, other

    cs.PF cs.DC

    An Online Probabilistic Distributed Tracing System

    Authors: M. Toslali, S. Qasim, S. Parthasarathy, F. A. Oliveira, H. Huang, G. Stringhini, Z. Liu, A. K. Coskun

    Abstract: Distributed tracing has become a fundamental tool for diagnosing performance issues in the cloud by recording causally ordered, end-to-end workflows of request executions. However, tracing in production workloads can introduce significant overheads due to the extensive instrumentation needed for identifying performance variations. This paper addresses the trade-off between the cost of tracing and… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  2. arXiv:2405.10233  [pdf, other

    cs.SI cs.CY cs.IR

    iDRAMA-Scored-2024: A Dataset of the Scored Social Media Platform from 2020 to 2023

    Authors: Jay Patel, Pujan Paudel, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn

    Abstract: Online web communities often face bans for violating platform policies, encouraging their migration to alternative platforms. This migration, however, can result in increased toxicity and unforeseen consequences on the new platform. In recent years, researchers have collected data from many alternative platforms, indicating coordinated efforts leading to offline events, conspiracy movements, hate… ▽ More

    Submitted 16 May, 2024; originally announced May 2024.

  3. arXiv:2312.12575  [pdf, other

    cs.CR

    LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks

    Authors: Saad Ullah, Mingji Han, Saurabh Pujar, Hammond Pearce, Ayse Coskun, Gianluca Stringhini

    Abstract: Large Language Models (LLMs) have been suggested for use in automated vulnerability repair, but benchmarks showing they can consistently identify security-related bugs are lacking. We thus develop SecLLMHolmes, a fully automated evaluation framework that performs the most detailed investigation to date on whether LLMs can reliably identify and reason about security-related bugs. We construct a set… ▽ More

    Submitted 13 April, 2024; v1 submitted 19 December, 2023; originally announced December 2023.

    Comments: Accepted for publication in IEEE Symposium on Security and Privacy 2024

  4. arXiv:2308.05247  [pdf, other

    cs.SI cs.CR

    TUBERAIDER: Attributing Coordinated Hate Attacks on YouTube Videos to their Source Communities

    Authors: Mohammad Hammas Saeed, Kostantinos Papadamou, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini

    Abstract: Alas, coordinated hate attacks, or raids, are becoming increasingly common online. In a nutshell, these are perpetrated by a group of aggressors who organize and coordinate operations on a platform (e.g., 4chan) to target victims on another community (e.g., YouTube). In this paper, we focus on attributing raids to their source community, paving the way for moderation approaches that take the conte… ▽ More

    Submitted 22 June, 2024; v1 submitted 9 August, 2023; originally announced August 2023.

    Comments: Accepted for publication at the 18th International AAAI Conference on Web and Social Media (ICWSM 2024). Please cite accordingly

  5. arXiv:2303.07099  [pdf, other

    cs.CY cs.SI

    Beyond Fish and Bicycles: Exploring the Varieties of Online Women's Ideological Spaces

    Authors: Utkucan Balci, Chen Ling, Emiliano De Cristofaro, Megan Squire, Gianluca Stringhini, Jeremy Blackburn

    Abstract: The Internet has been instrumental in connecting under-represented and vulnerable groups of people. Platforms built to foster social interaction and engagement have enabled historically disenfranchised groups to have a voice. One such vulnerable group is women. In this paper, we explore the diversity in online women's ideological spaces using a multi-dimensional approach. We perform a large-scale,… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

    Journal ref: Published in the Proceedings of the 15th ACM Web Science Conference 2023 (ACM WebSci 2023). Please cite the WebSci version

  6. arXiv:2212.05926  [pdf, other

    cs.CR cs.CY cs.SI

    LAMBRETTA: Learning to Rank for Twitter Soft Moderation

    Authors: Pujan Paudel, Jeremy Blackburn, Emiliano De Cristofaro, Savvas Zannettou, Gianluca Stringhini

    Abstract: To curb the problem of false information, social media platforms like Twitter started adding warning labels to content discussing debunked narratives, with the goal of providing more context to their audiences. Unfortunately, these labels are not applied uniformly and leave large amounts of false content unmoderated. This paper presents LAMBRETTA, a system that automatically identifies tweets that… ▽ More

    Submitted 12 December, 2022; originally announced December 2022.

    Comments: 44th IEEE Symposium on Security & Privacy (S&P 2023)

  7. arXiv:2211.14388  [pdf, other

    cs.CY cs.SI

    Non-Polar Opposites: Analyzing the Relationship Between Echo Chambers and Hostile Intergroup Interactions on Reddit

    Authors: Alexandros Efstratiou, Jeremy Blackburn, Tristan Caulfield, Gianluca Stringhini, Savvas Zannettou, Emiliano De Cristofaro

    Abstract: Previous research has documented the existence of both online echo chambers and hostile intergroup interactions. In this paper, we explore the relationship between these two phenomena by studying the activity of 5.97M Reddit users and 421M comments posted over 13 years. We examine whether users who are more engaged in echo chambers are more hostile when they comment on other communities. We then c… ▽ More

    Submitted 25 November, 2022; originally announced November 2022.

    Journal ref: 17th International AAAI Conference on Web and Social Media (ICWSM 2023). Please cite accordingly

  8. arXiv:2209.03463  [pdf, other

    cs.CY cs.AI cs.CR cs.SI

    Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots

    Authors: Wai Man Si, Michael Backes, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, Yang Zhang

    Abstract: Chatbots are used in many applications, e.g., automated agents, smart home assistants, interactive characters in online games, etc. Therefore, it is crucial to ensure they do not behave in undesired manners, providing offensive or toxic responses to users. This is not a trivial task as state-of-the-art chatbot models are trained on large, public datasets openly collected from the Internet. This pa… ▽ More

    Submitted 9 September, 2022; v1 submitted 7 September, 2022; originally announced September 2022.

    Journal ref: Published in ACM CCS 2022. Please cite the CCS version

  9. arXiv:2209.03050  [pdf, other

    cs.CR cs.AI

    Cerberus: Exploring Federated Prediction of Security Events

    Authors: Mohammad Naseri, Yufei Han, Enrico Mariconti, Yun Shen, Gianluca Stringhini, Emiliano De Cristofaro

    Abstract: Modern defenses against cyberattacks increasingly rely on proactive approaches, e.g., to predict the adversary's next actions based on past events. Building accurate prediction models requires knowledge from many organizations; alas, this entails disclosing sensitive information, such as network structures, security postures, and policies, which might often be undesirable or outright impossible. I… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Journal ref: Proceedings of the 29th ACM Conference on Computer and Communications Security (ACM CCS 2022)

  10. Shedding Light on the Targeted Victim Profiles of Malicious Downloaders

    Authors: François Labrèche, Enrico Mariconti, Gianluca Stringhini

    Abstract: Malware affects millions of users worldwide, impacting the daily lives of many people as well as businesses. Malware infections are increasing in complexity and unfold over a number of stages. A malicious downloader often acts as the starting point as it fingerprints the victim's machine and downloads one or more additional malware payloads. Although previous research was conducted on these malici… ▽ More

    Submitted 28 August, 2022; originally announced August 2022.

    Comments: Published in the proceedings of the 17th International Conference on Availability, Reliability and Security (ARES '22)

  11. SoK: Content Moderation in Social Media, from Guidelines to Enforcement, and Research to Practice

    Authors: Mohit Singhal, Chen Ling, Pujan Paudel, Poojitha Thota, Nihal Kumarswamy, Gianluca Stringhini, Shirin Nilizadeh

    Abstract: Social media platforms have been establishing content moderation guidelines and employing various moderation policies to counter hate speech and misinformation. The goal of this paper is to study these community guidelines and moderation practices, as well as the relevant research publications, to identify the research gaps, differences in moderation techniques, and challenges that should be tackl… ▽ More

    Submitted 1 March, 2023; v1 submitted 29 June, 2022; originally announced June 2022.

    Comments: To appear in the 8th IEEE European Symposium on Security and Privacy (EuroS&P 2023)

  12. arXiv:2204.06963  [pdf, other

    cs.LG cs.CR stat.ML

    Finding MNEMON: Reviving Memories of Node Embeddings

    Authors: Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini

    Abstract: Previous security research efforts orbiting around graphs have been exclusively focusing on either (de-)anonymizing the graphs or understanding the security and privacy issues of graph neural networks. Little attention has been paid to understand the privacy risks of integrating the output from graph embedding models (e.g., node embeddings) with complex downstream machine learning pipelines. In th… ▽ More

    Submitted 29 April, 2022; v1 submitted 14 April, 2022; originally announced April 2022.

    Comments: To Appear in the 29th ACM Conference on Computer and Communications Security (CCS), November 7-11, 2022

  13. arXiv:2202.08492  [pdf, other

    cs.CY cs.CV

    Feels Bad Man: Dissecting Automated Hateful Meme Detection Through the Lens of Facebook's Challenge

    Authors: Catherine Jennifer, Fatemeh Tahmasbi, Jeremy Blackburn, Gianluca Stringhini, Savvas Zannettou, Emiliano De Cristofaro

    Abstract: Internet memes have become a dominant method of communication; at the same time, however, they are also increasingly being used to advocate extremism and foster derogatory beliefs. Nonetheless, we do not have a firm understanding as to which perceptual aspects of memes cause this phenomenon. In this work, we assess the efficacy of current state-of-the-art multimodal machine learning models toward… ▽ More

    Submitted 17 February, 2022; originally announced February 2022.

  14. arXiv:2112.00443  [pdf, other

    cs.CR cs.CY cs.SI

    TROLLMAGNIFIER: Detecting State-Sponsored Troll Accounts on Reddit

    Authors: Mohammad Hammas Saeed, Shiza Ali, Jeremy Blackburn, Emiliano De Cristofaro, Savvas Zannettou, Gianluca Stringhini

    Abstract: Growing evidence points to recurring influence campaigns on social media, often sponsored by state actors aiming to manipulate public opinion on sensitive political topics. Typically, campaigns are performed through instrumented accounts, known as troll accounts; despite their prominence, however, little work has been done to detect these accounts in the wild. In this paper, we present TROLLMAGNIF… ▽ More

    Submitted 1 December, 2021; originally announced December 2021.

  15. arXiv:2111.02452  [pdf, other

    cs.CY cs.CV

    Slap** Cats, Bop** Heads, and Oreo Shakes: Understanding Indicators of Virality in TikTok Short Videos

    Authors: Chen Ling, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini

    Abstract: Short videos have become one of the leading media used by younger generations to express themselves online and thus a driving force in sha** online culture. In this context, TikTok has emerged as a platform where viral videos are often posted first. In this paper, we study what elements of short videos posted on TikTok contribute to their virality. We apply a mixed-method approach to develop a c… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

  16. arXiv:2111.02187  [pdf, other

    cs.SI cs.CY

    Soros, Child Sacrifices, and 5G: Understanding the Spread of Conspiracy Theories on Web Communities

    Authors: Pujan Paudel, Jeremy Blackburn, Emiliano De Cristofaro, Savvas Zannettou, Gianluca Stringhini

    Abstract: This paper presents a multi-platform computational pipeline geared to identify social media posts discussing (known) conspiracy theories. We use 189 conspiracy claims collected by Snopes, and find 66k posts and 277k comments on Reddit, and 379k tweets discussing them. Then, we study how conspiracies are discussed on different Web communities and which ones are particularly influential in driving t… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

  17. arXiv:2108.05876  [pdf, other

    cs.CY cs.SI

    An Early Look at the Gettr Social Network

    Authors: Pujan Paudel, Jeremy Blackburn, Emiliano De Cristofaro, Savvas Zannettou, Gianluca Stringhini

    Abstract: This paper presents the first data-driven analysis of Gettr, a new social network platform launched by former US President Donald Trump's team. Among other things, we find that users on the platform heavily discuss politics, with a focus on the Trump campaign in the US and Bolsonaro's in Brazil. Activity on the platform has steadily been decreasing since its launch, although a core of verified use… ▽ More

    Submitted 12 August, 2021; originally announced August 2021.

  18. arXiv:2108.04754  [pdf, other

    cs.CR

    A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned

    Authors: Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini

    Abstract: We study the temporal dynamics of potentially harmful apps (PHAs) on Android by leveraging 8.8M daily on-device detections collected among 11.7M customers of a popular mobile security product between 2019 and 2020. We show that the current security model of Android, which limits security products to run as regular apps and prevents them from automatically removing malicious apps opens a significan… ▽ More

    Submitted 10 August, 2021; originally announced August 2021.

  19. arXiv:2104.11145  [pdf, other

    cs.CY

    "I'm a Professor, which isn't usually a dangerous job": Internet-Facilitated Harassment and its Impact on Researchers

    Authors: Periwinkle Doerfler, Andrea Forte, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn, Damon McCoy

    Abstract: While the Internet has dramatically increased the exposure that research can receive, it has also facilitated harassment against scholars. To understand the impact that these attacks can have on the work of researchers, we perform a series of systematic interviews with researchers including academics, journalists, and activists, who have experienced targeted, Internet-facilitated harassment. We pr… ▽ More

    Submitted 22 April, 2021; v1 submitted 22 April, 2021; originally announced April 2021.

  20. Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown

    Authors: Colin C. Ife, Yun Shen, Steven J. Murdoch, Gianluca Stringhini

    Abstract: The malware and botnet phenomenon is among the most significant threats to cybersecurity today. Consequently, law enforcement agencies, security companies, and researchers are constantly seeking to disrupt these malicious operations through so-called takedown counter-operations. Unfortunately, the success of these takedowns is mixed. Furthermore, very little is understood as to how botnets and mal… ▽ More

    Submitted 7 July, 2021; v1 submitted 4 April, 2021; originally announced April 2021.

    Comments: 14 pages, to appear in RAID 2021 conference

  21. arXiv:2103.05476  [pdf, other

    cs.CR

    ANDRUSPEX : Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices

    Authors: Yun Shen, Gianluca Stringhini

    Abstract: Android's security model severely limits the capabilities of anti-malware software. Unlike commodity anti-malware solutions on desktop systems, their Android counterparts run as sandboxed applications without root privileges and are limited by Android's permission system. As such, PHAs on Android are usually willingly installed by victims, as they come disguised as useful applications with hidden… ▽ More

    Submitted 10 March, 2021; v1 submitted 9 March, 2021; originally announced March 2021.

    Comments: Accepted to appear in the Proceedings of the 2021 IEEE European Symposium on Security and Privacy (EUROS&P)

  22. arXiv:2103.03631  [pdf, other

    cs.CY cs.SI

    A Multi-Platform Analysis of Political News Discussion and Sharing on Web Communities

    Authors: Yu** Wang, Savvas Zannettou, Jeremy Blackburn, Barry Bradlyn, Emiliano De Cristofaro, Gianluca Stringhini

    Abstract: The news ecosystem has become increasingly complex, encompassing a wide range of sources with varying levels of trustworthiness, and with public commentary giving different spins to the same stories. In this paper, we present a multi-platform measurement of this ecosystem. We compile a list of 1,073 news websites and extract posts from four Web communities (Twitter, Reddit, 4chan, and Gab) that co… ▽ More

    Submitted 5 March, 2021; originally announced March 2021.

  23. arXiv:2102.12869  [pdf, other

    cs.CR

    Understanding Worldwide Private Information Collection on Android

    Authors: Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini

    Abstract: Mobile phones enable the collection of a wealth of private information, from unique identifiers (e.g., email addresses), to a user's location, to their text messages. This information can be harvested by apps and sent to third parties, which can use it for a variety of purposes. In this paper we perform the largest study of private information collection (PIC) on Android to date. Leveraging an ano… ▽ More

    Submitted 25 February, 2021; originally announced February 2021.

  24. arXiv:2101.08750  [pdf, other

    cs.CY cs.SI

    The Gospel According to Q: Understanding the QAnon Conspiracy from the Perspective of Canonical Information

    Authors: Antonis Papasavva, Max Aliapoulios, Cameron Ballard, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, Jeremy Blackburn

    Abstract: The QAnon conspiracy theory claims that a cabal of (literally) blood-thirsty politicians and media personalities are engaged in a war to destroy society. By interpreting cryptic "drops" of information from an anonymous insider calling themself Q, adherents of the conspiracy theory believe that Donald Trump is leading them in an active fight against this cabal. QAnon has been covered extensively by… ▽ More

    Submitted 29 April, 2022; v1 submitted 21 January, 2021; originally announced January 2021.

    Journal ref: Published in the Proceedings of the 16th International AAAI Conference on Web and Social Media (ICWSM 2022). Please cite accordingly

  25. arXiv:2101.06535  [pdf, other

    cs.HC cs.CY cs.SI

    Dissecting the Meme Magic: Understanding Indicators of Virality in Image Memes

    Authors: Chen Ling, Ihab AbuHilal, Jeremy Blackburn, Emiliano De Cristofaro, Savvas Zannettou, Gianluca Stringhini

    Abstract: Despite the increasingly important role played by image memes, we do not yet have a solid understanding of the elements that might make a meme go viral on social media. In this paper, we investigate what visual elements distinguish image memes that are highly viral on social media from those that do not get re-shared, across three dimensions: composition, subjects, and target audience. Drawing fro… ▽ More

    Submitted 16 January, 2021; originally announced January 2021.

    Comments: To appear at the 24th ACM Conference on Computer-Supported Coop- erative Work and Social Computing (CSCW 2021)

  26. arXiv:2101.03820  [pdf, other

    cs.SI cs.CY physics.soc-ph

    An Early Look at the Parler Online Social Network

    Authors: Max Aliapoulios, Emmi Bevensee, Jeremy Blackburn, Barry Bradlyn, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou

    Abstract: Parler is as an "alternative" social network promoting itself as a service that allows to "speak freely and express yourself openly, without fear of being deplatformed for your views." Because of this promise, the platform become popular among users who were suspended on mainstream social networks for violating their terms of service, as well as those fearing censorship. In particular, the service… ▽ More

    Submitted 18 February, 2021; v1 submitted 11 January, 2021; originally announced January 2021.

    Journal ref: Proceedings of the International AAAI Conference on Web and Social Media, 15(1), 943--951 (2021)

  27. arXiv:2010.11638  [pdf, other

    cs.CY cs.SI

    "It is just a flu": Assessing the Effect of Watch History on YouTube's Pseudoscientific Video Recommendations

    Authors: Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Michael Sirivianos

    Abstract: The role played by YouTube's recommendation algorithm in unwittingly promoting misinformation and conspiracy theories is not entirely understood. Yet, this can have dire real-world consequences, especially when pseudoscientific content is promoted to users at critical times, such as the COVID-19 pandemic. In this paper, we set out to characterize and detect pseudoscientific misinformation on YouTu… ▽ More

    Submitted 12 October, 2021; v1 submitted 22 October, 2020; originally announced October 2020.

    Comments: To appear at the 16th International Conference on Web and Social Media (ICWSM 2022). Please cite the ICWSM version

  28. Do Platform Migrations Compromise Content Moderation? Evidence from r/The_Donald and r/Incels

    Authors: Manoel Horta Ribeiro, Shagun Jhaver, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Robert West

    Abstract: When toxic online communities on mainstream platforms face moderation measures, such as bans, they may migrate to other platforms with laxer policies or set up their own dedicated websites. Previous work suggests that within mainstream platforms, community-level moderation is effective in mitigating the harm caused by the moderated communities. It is, however, unclear whether these results also ho… ▽ More

    Submitted 20 August, 2021; v1 submitted 20 October, 2020; originally announced October 2020.

    Comments: This paper has been accepted at CSCW 2021, please cite accordingly

  29. arXiv:2009.11792  [pdf, other

    cs.CY

    Understanding the Use of Fauxtography on Social Media

    Authors: Yu** Wang, Fatemeh Tahmasbi, Jeremy Blackburn, Barry Bradlyn, Emiliano De Cristofaro, David Magerman, Savvas Zannettou, Gianluca Stringhini

    Abstract: Despite the influence that image-based communication has on online discourse, the role played by images in disinformation is still not well understood. In this paper, we present the first large-scale study of fauxtography, analyzing the use of manipulated or misleading images in news discussion on online communities. First, we develop a computational pipeline geared to detect fauxtography, and ide… ▽ More

    Submitted 25 September, 2020; v1 submitted 24 September, 2020; originally announced September 2020.

  30. arXiv:2009.04885  [pdf, other

    cs.CY

    "Is it a Qoincidence?": An Exploratory Study of QAnon on Voat

    Authors: Antonis Papasavva, Jeremy Blackburn, Gianluca Stringhini, Savvas Zannettou, Emiliano De Cristofaro

    Abstract: Online fringe communities offer fertile grounds for users seeking and sharing ideas fueling suspicion of mainstream news and conspiracy theories. Among these, the QAnon conspiracy theory emerged in 2017 on 4chan, broadly supporting the idea that powerful politicians, aristocrats, and celebrities are closely engaged in a global pedophile ring. Simultaneously, governments are thought to be controlle… ▽ More

    Submitted 14 February, 2021; v1 submitted 10 September, 2020; originally announced September 2020.

    Journal ref: Published in the Proceedings of 30th The Web Conference (WWW 2021). Please cite the WWW version

  31. arXiv:2009.03822  [pdf, other

    cs.CY

    A First Look at Zoombombing

    Authors: Chen Ling, Utkucan Balcı, Jeremy Blackburn, Gianluca Stringhini

    Abstract: Online meeting tools like Zoom and Google Meet have become central to our professional, educational, and personal lives. This has opened up new opportunities for large scale harassment. In particular, a phenomenon known as zoombombing has emerged, in which aggressors join online meetings with the goal of disrupting them and harassing their participants. In this paper, we conduct the first data-dri… ▽ More

    Submitted 8 September, 2020; originally announced September 2020.

    Comments: First two authors equally contributed

  32. arXiv:2005.07926  [pdf, other

    cs.SI cs.CY

    Measuring and Characterizing Hate Speech on News Websites

    Authors: Savvas Zannettou, Mai ElSherief, Elizabeth Belding, Shirin Nilizadeh, Gianluca Stringhini

    Abstract: The Web has become the main source for news acquisition. At the same time, news discussion has become more social: users can post comments on news articles or discuss news articles on other platforms like Reddit. These features empower and enable discussions among the users; however, they also act as the medium for the dissemination of toxic discourse and hate speech. The research community lacks… ▽ More

    Submitted 16 May, 2020; originally announced May 2020.

    Comments: Accepted at WebSci'20

  33. arXiv:2004.04046  [pdf, other

    cs.SI cs.CY

    "Go eat a bat, Chang!": On the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19

    Authors: Fatemeh Tahmasbi, Leonard Schild, Chen Ling, Jeremy Blackburn, Gianluca Stringhini, Yang Zhang, Savvas Zannettou

    Abstract: The outbreak of the COVID-19 pandemic has changed our lives in unprecedented ways. In the face of the projected catastrophic consequences, many countries have enacted social distancing measures in an attempt to limit the spread of the virus. Under these conditions, the Web has become an indispensable medium for information acquisition, communication, and entertainment. At the same time, unfortunat… ▽ More

    Submitted 3 March, 2021; v1 submitted 8 April, 2020; originally announced April 2020.

    Comments: This is the full version of the paper, with same title, appearing in the Proceedings of the 30th The Web Conference (WWW 2021). Please cite the WWW version

  34. "How over is it?" Understanding the Incel Community on YouTube

    Authors: Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Michael Sirivianos

    Abstract: YouTube is by far the largest host of user-generated video content worldwide. Alas, the platform has also come under fire for hosting inappropriate, toxic, and hateful content. One community that has often been linked to sharing and publishing hateful and misogynistic content are the Involuntary Celibates (Incels), a loosely defined movement ostensibly focusing on men's issues. In this paper, we s… ▽ More

    Submitted 23 August, 2021; v1 submitted 22 January, 2020; originally announced January 2020.

    Comments: To appear at the 24th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2021). Please cite the CSCW version

  35. arXiv:2001.07600  [pdf, other

    cs.CY

    The Evolution of the Manosphere Across the Web

    Authors: Manoel Horta Ribeiro, Jeremy Blackburn, Barry Bradlyn, Emiliano De Cristofaro, Gianluca Stringhini, Summer Long, Stephanie Greenberg, Savvas Zannettou

    Abstract: In this paper, we present a large-scale characterization of the Manosphere, a conglomerate of Web-based misogynist movements roughly focused on "men's issues," which has seen significant growth over the past years. We do so by gathering and analyzing 28.8M posts from 6 forums and 51 subreddits. Overall, we paint a comprehensive picture of the evolution of the Manosphere on the Web, showing the lin… ▽ More

    Submitted 8 April, 2021; v1 submitted 21 January, 2020; originally announced January 2020.

    Comments: To appear at the 15th International AAAI Conference on Web and Social Media (ICWSM 2021) -- please cite accordingly

  36. arXiv:2001.07487  [pdf, other

    cs.CY cs.SI

    Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board

    Authors: Antonis Papasavva, Savvas Zannettou, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn

    Abstract: This paper presents a dataset with over 3.3M threads and 134.5M posts from the Politically Incorrect board (/pol/) of the imageboard forum 4chan, posted over a period of almost 3.5 years (June 2016-November 2019). To the best of our knowledge, this represents the largest publicly available 4chan dataset, providing the community with an archive of posts that have been permanently deleted from 4chan… ▽ More

    Submitted 1 April, 2020; v1 submitted 21 January, 2020; originally announced January 2020.

    Journal ref: Published at the 14th International AAAI Conference on Web and Social Media (ICWSM 2020). Please cite the ICWSM version

  37. arXiv:1910.06380  [pdf, other

    cs.CR cs.CY cs.HC

    Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime

    Authors: Colin C. Ife, Toby Davies, Steven J. Murdoch, Gianluca Stringhini

    Abstract: Cybercrime is a complex phenomenon that spans both technical and human aspects. As such, two disjoint areas have been studying the problem from separate angles: the information security community and the environmental criminology one. Despite the large body of work produced by these communities in the past years, the two research efforts have largely remained disjoint, with researchers on one side… ▽ More

    Submitted 14 July, 2022; v1 submitted 14 October, 2019; originally announced October 2019.

  38. arXiv:1907.08873  [pdf, other

    cs.SI cs.CY cs.IR

    Detecting Cyberbullying and Cyberaggression in Social Media

    Authors: Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali, Nicolas Kourtellis

    Abstract: Cyberbullying and cyberaggression are increasingly worrisome phenomena affecting people across all demographics. More than half of young social media users worldwide have been exposed to such prolonged and/or coordinated digital harassment. Victims can experience a wide range of emotions, with negative consequences such as embarrassment, depression, isolation from other community members, which em… ▽ More

    Submitted 20 July, 2019; originally announced July 2019.

    Comments: To appear in ACM Transactions on the Web (TWEB)

  39. arXiv:1905.12593  [pdf, other

    cs.CR cs.CY cs.SI

    Automatically Dismantling Online Dating Fraud

    Authors: Guillermo Suarez-Tangil, Matthew Edwards, Claudia Peersman, Gianluca Stringhini, Awais Rashid, Monica Whitty

    Abstract: Online romance scams are a prevalent form of mass-marketing fraud in the West, and yet few studies have addressed the technical or data-driven responses to this problem. In this type of scam, fraudsters craft fake profiles and manually interact with their victims. Because of the characteristics of this type of fraud and of how dating sites operate, traditional detection methods (e.g., those used i… ▽ More

    Submitted 30 May, 2019; v1 submitted 29 May, 2019; originally announced May 2019.

  40. arXiv:1905.12590  [pdf, other

    cs.CR cs.LG

    ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks

    Authors: Yun Shen, Gianluca Stringhini

    Abstract: Despite the fact that cyberattacks are constantly growing in complexity, the research community still lacks effective tools to easily monitor and understand them. In particular, there is a need for techniques that are able to not only track how prominently certain malicious actions, such as the exploitation of specific vulnerabilities, are exploited in the wild, but also (and more importantly) how… ▽ More

    Submitted 29 May, 2019; originally announced May 2019.

    Journal ref: 2019 USENIX Security Symposium

  41. Tiresias: Predicting Security Events Through Deep Learning

    Authors: Yun Shen, Enrico Mariconti, Pierre-Antoine Vervier, Gianluca Stringhini

    Abstract: With the increased complexity of modern computer attacks, there is a need for defenders not only to detect malicious activity as it happens, but also to predict the specific steps that will be taken by an adversary when performing an attack. However this is still an open research problem, and previous research in predicting malicious events only looked at binary outcomes (e.g., whether an attack w… ▽ More

    Submitted 24 May, 2019; originally announced May 2019.

    Journal ref: ACM SIGSAC Conference on Computer and Communications Security (CCS), 2018

  42. Pythia: a Framework for the Automated Analysis of Web Hosting Environments

    Authors: Srdjan Matic, Gareth Tyson, Gianluca Stringhini

    Abstract: A common approach when setting up a website is to utilize third party Web hosting and content delivery networks. Without taking this trend into account, any measurement study inspecting the deployment and operation of websites can be heavily skewed. Unfortunately, the research community lacks generalizable tools that can be used to identify how and where a given website is hosted. Instead, a numbe… ▽ More

    Submitted 13 May, 2019; v1 submitted 16 March, 2019; originally announced March 2019.

  43. Who Watches the Watchmen: Exploring Complaints on the Web

    Authors: Damilola Ibosiola, Ignacio Castro, Gianluca Stringhini, Steve Uhlig, Gareth Tyson

    Abstract: Under increasing scrutiny, many web companies now offer bespoke mechanisms allowing any third party to file complaints (e.g., requesting the de-listing of a URL from a search engine). While this self-regulation might be a valuable web governance tool, it places huge responsibility within the hands of these organisations that demands close examination. We present the first large-scale study of web… ▽ More

    Submitted 29 June, 2019; v1 submitted 15 February, 2019; originally announced February 2019.

    Comments: The Web Conference 2019

  44. arXiv:1901.07046  [pdf, other

    cs.SI cs.CY

    Disturbed YouTube for Kids: Characterizing and Detecting Inappropriate Videos Targeting Young Children

    Authors: Kostantinos Papadamou, Antonis Papasavva, Savvas Zannettou, Jeremy Blackburn, Nicolas Kourtellis, Ilias Leontiadis, Gianluca Stringhini, Michael Sirivianos

    Abstract: A large number of the most-subscribed YouTube channels target children of a very young age. Hundreds of toddler-oriented channels on YouTube feature inoffensive, well-produced, and educational videos. Unfortunately, inappropriate content that targets this demographic is also common. YouTube's algorithmic recommendation system regrettably suggests inappropriate content because some of it mimics or… ▽ More

    Submitted 16 September, 2021; v1 submitted 21 January, 2019; originally announced January 2019.

    Comments: Published at the 14th International Conference on Web and Social Media (ICWSM 2020). Please cite the ICWSM version

  45. arXiv:1901.05997  [pdf, other

    cs.SI cs.CY

    Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter

    Authors: Savvas Zannettou, Tristan Caulfield, Barry Bradlyn, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn

    Abstract: State-sponsored organizations are increasingly linked to efforts aimed to exploit social media for information warfare and manipulating public opinion. Typically, their activities rely on a number of social network accounts they control, aka trolls, that post and interact with other users disguised as "regular" users. These accounts often use images and memes, along with textual content, in order… ▽ More

    Submitted 21 November, 2019; v1 submitted 17 January, 2019; originally announced January 2019.

    Comments: To appear at the 14th International AAAI Conference on Web and Social Media (ICWSM 2020). Please cite accordingly

    Journal ref: Proceedings of the International AAAI Conference on Web and Social Media, 14(1), 774-785 (2020)

  46. arXiv:1811.03130  [pdf, other

    cs.SI cs.CY

    Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls

    Authors: Savvas Zannettou, Tristan Caulfield, William Setzer, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn

    Abstract: Recent evidence has emerged linking coordinated campaigns by state-sponsored actors to manipulate public opinion on the Web. Campaigns revolving around major political events are enacted via mission-focused "trolls." While trolls are involved in spreading disinformation on social media, there is little understanding of how they operate, what type of content they disseminate, how their strategies e… ▽ More

    Submitted 10 February, 2019; v1 submitted 7 November, 2018; originally announced November 2018.

  47. arXiv:1809.09684  [pdf, other

    cs.CR cs.SI

    LOBO -- Evaluation of Generalization Deficiencies in Twitter Bot Classifiers

    Authors: Juan Echeverría, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Gianluca Stringhini, Shi Zhou

    Abstract: Botnets in online social networks are increasingly often affecting the regular flow of discussion, attacking regular users and their posts, spamming them with irrelevant or offensive content, and even manipulating the popularity of messages and accounts. Researchers and cybercriminals are involved in an arms race, and new and updated botnets designed to defeat current detection systems are constan… ▽ More

    Submitted 25 September, 2018; originally announced September 2018.

    Journal ref: Proceedings of the 2018 Annual Computer Security Ap- plications Conference (ACSAC 2018)

  48. arXiv:1805.12512  [pdf, other

    cs.SI cs.CY

    On the Origins of Memes by Means of Fringe Web Communities

    Authors: Savvas Zannettou, Tristan Caulfield, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, Guillermo Suarez-Tangil

    Abstract: Internet memes are increasingly used to sway and manipulate public opinion. This prompts the need to study their propagation, evolution, and influence across the Web. In this paper, we detect and measure the propagation of memes across multiple Web communities, using a processing pipeline based on perceptual hashing and clustering techniques, and a dataset of 160M images from 2.6B posts gathered f… ▽ More

    Submitted 22 September, 2018; v1 submitted 31 May, 2018; originally announced May 2018.

    Comments: A shorter version of this paper appears in the Proceedings of 18th ACM Internet Measurement Conference (IMC 2018). This is the full version

  49. arXiv:1805.08168  [pdf, other

    cs.CY cs.CR cs.SI

    "You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks

    Authors: Enrico Mariconti, Guillermo Suarez-Tangil, Jeremy Blackburn, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Jordi Luque Serrano, Gianluca Stringhini

    Abstract: Video sharing platforms like YouTube are increasingly targeted by aggression and hate attacks. Prior work has shown how these attacks often take place as a result of "raids," i.e., organized efforts by ad-hoc mobs coordinating from third-party communities. Despite the increasing relevance of this phenomenon, however, online services often lack effective countermeasures to mitigate it. Unlike well-… ▽ More

    Submitted 23 August, 2019; v1 submitted 21 May, 2018; originally announced May 2018.

    Journal ref: 22nd ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2019)

  50. arXiv:1804.02679  [pdf, other

    cs.CY

    Movie Pirates of the Caribbean: Exploring Illegal Streaming Cyberlockers

    Authors: Damilola Ibosiola, Benjamin Steer, Alvaro Garcia-Recuero, Gianluca Stringhini, Steve Uhlig, Gareth Tyson

    Abstract: Online video piracy (OVP) is a contentious topic, with strong proponents on both sides of the argument. Recently, a number of illegal websites, called streaming cyberlockers, have begun to dominate OVP. These websites specialise in distributing pirated content, underpinned by third party indexing services offering easy-to-access directories of content. This paper performs the first exploration of… ▽ More

    Submitted 8 April, 2018; originally announced April 2018.

    Comments: 10 pages, 9 figures, Video streaming, Cyberlockers, Piracy