Skip to main content

Research Repository

Advanced Search

To allow, or deny? That is the question (2020)
Conference Proceeding
Andriotis, P., & Takasu, A. (2020). To allow, or deny? That is the question. In HCI for Cybersecurity, Privacy and Trust. , (287-304). https://doi.org/10.1007/978-3-030-50309-3_20

The Android ecosystem is dynamic and diverse. Controls have been set in place to allow mobile device users to regulate exchanged data and restrict apps from accessing sensitive personal information and system resources. Modern versions of the operati... Read More about To allow, or deny? That is the question.

Emotional bots: Content-based spammer detection on social media (2019)
Conference Proceeding
Andriotis, P., & Takasu, A. (2019). Emotional bots: Content-based spammer detection on social media. https://doi.org/10.1109/WIFS.2018.8630760

Recent research indicates that a considerable amount of content on social media is generated by automated accounts. The automata present sophisticated behavior – mimicking humans– aiming at evading traditional detection methods. In this paper, we... Read More about Emotional bots: Content-based spammer detection on social media.

Permissions snapshots: Assessing users' adaptation to the Android runtime permission model (2017)
Conference Proceeding
Andriotis, P., Sasse, M. A., & Stringhini, G. (2017). Permissions snapshots: Assessing users' adaptation to the Android runtime permission model. https://doi.org/10.1109/WIFS.2016.7823922

© 2016 IEEE. The Android operating system changed its security-and privacy-related permission model recently, offering its users the ability to control resources that applications are allowed to access on their devices. This major change to the tradi... Read More about Permissions snapshots: Assessing users' adaptation to the Android runtime permission model.

A pilot study on the security of pattern screen-lock methods and soft side channel attacks (2013)
Conference Proceeding
Andriotis, P., Tryfonas, T., Oikonomou, G., & Yildiz, C. (2013). A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In L. Buttyan, A. Sadeghi, & M. Gruteser (Eds.), Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 1-6. https://doi.org/10.1145/2462096.2462098

Graphical passwords that allow a user to unlock a smartphone's screen are one of the Android operating system's features and many users prefer them instead of traditional textbased codes. A variety of attacks has been proposed against this mechanism,... Read More about A pilot study on the security of pattern screen-lock methods and soft side channel attacks.

Forensic analysis of wireless networking evidence of Android smartphones (2012)
Conference Proceeding
Andriotis, P., Oikonomou, G., & Tryfonas, T. (2012). Forensic analysis of wireless networking evidence of Android smartphones. In 2012 IEEE International Workshop on Information Forensics and Security (WIFS), (109-114). https://doi.org/10.1109/WIFS.2012.6412634

This paper introduces a method for acquiring forensic-grade evidence from Android smartphones using open source tools. We investigate in particular cases where the suspect has made use of the smartphone's Wi-Fi or Bluetooth interfaces. We discuss the... Read More about Forensic analysis of wireless networking evidence of Android smartphones.