Skip to main content

Showing 1–11 of 11 results for author: Suarez-Tangil, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.02205  [pdf, other

    cs.SI cs.AI

    A Holistic Indicator of Polarization to Measure Online Sexism

    Authors: Vahid Ghafouri, Jose Such, Guillermo Suarez-Tangil

    Abstract: The online trend of the manosphere and feminist discourse on social networks requires a holistic measure of the level of sexism in an online community. This indicator is important for policymakers and moderators of online communities (e.g., subreddits) and computational social scientists, either to revise moderation strategies based on the degree of sexism or to match and compare the temporal sexi… ▽ More

    Submitted 29 June, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

  2. arXiv:2311.08879  [pdf, other

    cs.HC

    Voice App Developer Experiences with Alexa and Google Assistant: Juggling Risks, Liability, and Security

    Authors: William Seymour, Noura Abdi, Kopo M. Ramokapane, Jide Edu, Guillermo Suarez-Tangil, Jose Such

    Abstract: Voice applications (voice apps) are a key element in Voice Assistant ecosystems such as Amazon Alexa and Google Assistant, as they provide assistants with a wide range of capabilities that users can invoke with a voice command. Most voice apps, however, are developed by third parties - i.e., not by Amazon/Google - and they are included in the ecosystem through marketplaces akin to smartphone app s… ▽ More

    Submitted 15 November, 2023; originally announced November 2023.

    Comments: To be presented at USENIX Security 2024

  3. arXiv:2308.14608  [pdf, other

    cs.LG cs.CL cs.CY cs.SI

    AI in the Gray: Exploring Moderation Policies in Dialogic Large Language Models vs. Human Answers in Controversial Topics

    Authors: Vahid Ghafouri, Vibhor Agarwal, Yong Zhang, Nishanth Sastry, Jose Such, Guillermo Suarez-Tangil

    Abstract: The introduction of ChatGPT and the subsequent improvement of Large Language Models (LLMs) have prompted more and more individuals to turn to the use of ChatBots, both for information and assistance with decision-making. However, the information the user is after is often not formulated by these ChatBots objectively enough to be provided with a definite, globally accepted answer. Controversial t… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

  4. arXiv:2304.05232  [pdf, other

    cs.SI cs.LG

    Lady and the Tramp Nextdoor: Online Manifestations of Economic Inequalities in the Nextdoor Social Network

    Authors: Waleed Iqbal, Vahid Ghafouri, Gareth Tyson, Guillermo Suarez-Tangil, Ignacio Castro

    Abstract: From health to education, income impacts a huge range of life choices. Earlier research has leveraged data from online social networks to study precisely this impact. In this paper, we ask the opposite question: do different levels of income result in different online behaviors? We demonstrate it does. We present the first large-scale study of Nextdoor, a popular location-based social network. We… ▽ More

    Submitted 26 April, 2023; v1 submitted 11 April, 2023; originally announced April 2023.

    Comments: The Paper is accepted for publication in ICWSM 2023

  5. SkillVet: Automated Traceability Analysis of Amazon Alexa Skills

    Authors: Jide S Edu, Xavier Ferrer-Aran, Jose M Such, Guillermo Suarez-Tangil

    Abstract: Third-party software, or skills, are essential components in Smart Personal Assistants (SPA). The number of skills has grown rapidly, dominated by a changing environment that has no clear business model. Skills can access personal information and this may pose a risk to users. However, there is little information about how this ecosystem works, let alone the tools that can facilitate its study. In… ▽ More

    Submitted 14 January, 2022; v1 submitted 3 March, 2021; originally announced March 2021.

    Comments: 17 pages, 8 figures. A shorter version of this paper appears in IEEE Transactions on Dependable and Secure Computing. This is the extended version

  6. arXiv:1905.12593  [pdf, other

    cs.CR cs.CY cs.SI

    Automatically Dismantling Online Dating Fraud

    Authors: Guillermo Suarez-Tangil, Matthew Edwards, Claudia Peersman, Gianluca Stringhini, Awais Rashid, Monica Whitty

    Abstract: Online romance scams are a prevalent form of mass-marketing fraud in the West, and yet few studies have addressed the technical or data-driven responses to this problem. In this type of scam, fraudsters craft fake profiles and manually interact with their victims. Because of the characteristics of this type of fraud and of how dating sites operate, traditional detection methods (e.g., those used i… ▽ More

    Submitted 30 May, 2019; v1 submitted 29 May, 2019; originally announced May 2019.

  7. Smart Home Personal Assistants: A Security and Privacy Review

    Authors: Jide S. Edu, Jose M. Such, Guillermo Suarez-Tangil

    Abstract: Smart Home Personal Assistants (SPA) are an emerging innovation that is changing the way in which home users interact with the technology. However, there are a number of elements that expose these systems to various risks: i) the open nature of the voice channel they use, ii) the complexity of their architecture, iii) the AI features they rely on, and iv) their use of a wide-range of underlying te… ▽ More

    Submitted 17 August, 2020; v1 submitted 13 March, 2019; originally announced March 2019.

    Comments: Accepted for publication in ACM Computing Surveys

    Report number: vol 53 no 6

    Journal ref: ACM Comput. Surv. 53, 6, Article 116 (December 2020), 36 pages

  8. arXiv:1901.00846  [pdf, other

    cs.CR

    A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted Wealth

    Authors: Sergio Pastrana, Guillermo Suarez-Tangil

    Abstract: Illicit crypto-mining leverages resources stolen from victims to mine cryptocurrencies on behalf of criminals. While recent works have analyzed one side of this threat, i.e.: web-browser cryptojacking, only commercial reports have partially covered binary-based crypto-mining malware. In this paper, we conduct the largest measurement of crypto-mining malware to date, analyzing approximately 4.5 mil… ▽ More

    Submitted 25 September, 2019; v1 submitted 3 January, 2019; originally announced January 2019.

    Comments: A shorter version of this paper appears in the Proceedings of 19th ACM Internet Measurement Conference (IMC 2019). This is the full version

  9. arXiv:1805.12512  [pdf, other

    cs.SI cs.CY

    On the Origins of Memes by Means of Fringe Web Communities

    Authors: Savvas Zannettou, Tristan Caulfield, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, Guillermo Suarez-Tangil

    Abstract: Internet memes are increasingly used to sway and manipulate public opinion. This prompts the need to study their propagation, evolution, and influence across the Web. In this paper, we detect and measure the propagation of memes across multiple Web communities, using a processing pipeline based on perceptual hashing and clustering techniques, and a dataset of 160M images from 2.6B posts gathered f… ▽ More

    Submitted 22 September, 2018; v1 submitted 31 May, 2018; originally announced May 2018.

    Comments: A shorter version of this paper appears in the Proceedings of 18th ACM Internet Measurement Conference (IMC 2018). This is the full version

  10. arXiv:1805.08168  [pdf, other

    cs.CY cs.CR cs.SI

    "You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks

    Authors: Enrico Mariconti, Guillermo Suarez-Tangil, Jeremy Blackburn, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Jordi Luque Serrano, Gianluca Stringhini

    Abstract: Video sharing platforms like YouTube are increasingly targeted by aggression and hate attacks. Prior work has shown how these attacks often take place as a result of "raids," i.e., organized efforts by ad-hoc mobs coordinating from third-party communities. Despite the increasing relevance of this phenomenon, however, online services often lack effective countermeasures to mitigate it. Unlike well-… ▽ More

    Submitted 23 August, 2019; v1 submitted 21 May, 2018; originally announced May 2018.

    Journal ref: 22nd ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2019)

  11. arXiv:1801.08115  [pdf, other

    cs.CR

    Eight Years of Rider Measurement in the Android Malware Ecosystem: Evolution and Lessons Learned

    Authors: Guillermo Suarez-Tangil, Gianluca Stringhini

    Abstract: Despite the growing threat posed by Android malware, the research community is still lacking a comprehensive view of common behaviors and trends exposed by malware families active on the platform. Without such view, the researchers incur the risk of develo** systems that only detect outdated threats, missing the most recent ones. In this paper, we conduct the largest measurement of Android malwa… ▽ More

    Submitted 19 March, 2020; v1 submitted 24 January, 2018; originally announced January 2018.

    Comments: A shorter version of this paper appears in IEEE Transactions on Dependable and Secure Computing. This is a more detailed version, extended from the pre-print