Publications

2020

Mittos, A., Zannettou, S., Blackburn, J., De Cristofaro, E. (2020). “And We Will Fight For Our Race!” A Measurement Study of Genetic Testing Conversations on Reddit and 4chan.
Mittos, A., Zannettou, S., Blackburn, J., De Cristofaro, E. (2020). Analyzing Genetic Testing Discourse on the Web Through the Lens of Twitter, Reddit, and 4chan. ACM Transactions on the Web,
Papasavva, A., Zannettou, S., De Cristofaro, E., Stringhini, G., Blackburn, J. (2020). Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board.
Pyrgelis, A., Troncoso, C., De Cristofaro, E. (2020). Measuring Membership Privacy on Aggregate Location Time-Series. Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS, 2 (4), doi:10.1145/3392154
Wixey, M., De Cristofaro, E., Johnson, S. (2020). On the Feasibility of Acoustic Attacks Using Commodity Smart Devices.
Zannettou, S., Caulfield, T., Bradlyn, B., De Cristofaro, E., Stringhini, G., Blackburn, J. (2020). Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter.

2019

Asghar, H.J., De Cristofaro, E., Jourjon, G., Kaafar, M.A., Mathy, L., Melis, L., ...Yu, M. (2019). Fast privacy-preserving network function outsourcing. Computer Networks, 163 doi:10.1016/j.comnet.2019.106893
Chatzakou, D., Leontiadis, I., Blackburn, J., De Cristofaro, E., Stringhini, G., Vakali, A., Kourtellis, N. (2019). Detecting cyberbullying and cyberaggression in social media. ACM Transactions on the Web, 13 (3), doi:10.1145/3343484
Hayes, J., Melis, L., Danezis, G., De Cristofaro, E. (2019). LOGAN: Membership Inference Attacks Against Generative Models.
Mariconti, E., Suarez-Tangil, G., Blackburn, J., Cristofaro, E.D., Kourtellis, N., Leontiadis, I., ...Stringhini, G. (2019). "You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks.
Melis, L., Song, C., De Cristofaro, E., Shmatikov, V. (2019). Exploiting Unintended Feature Leakage in Collaborative Learning.
Mittos, A., Malin, B., De Cristofaro, E. (2019). Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective. Proceedings on Privacy Enhancing Technologies (PoPETs), 2019 (1), doi:10.2478/popets-2019-0006
Onwuzurike, L., Mariconti, E., Andriotis, P., De Cristofaro, E., Stringhini, G., Ross, G. (2019). MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version). ACM Transactions on Privacy and Security,
Oprisanu, M.-.B., Dessimoz, C., De Cristofaro, E. (2019). How Much Does GenoGuard Really "Guard"? An Empirical Analysis of Long-Term Security for Genomic Data.
Primault, V., Lampos, V., Cox, I., De Cristofaro, E. (2019). Privacy-Preserving Crowd-Sourcing of Web Searches with Private Data Donor.
Raman, A., Joglekar, S., De Cristofaro, E., Sastry, N., Tyson, G. (2019). Challenges in the Decentralized Web: The Mastodon Case.

2018

Acs, G., Melis, L., Castelluccia, C., De Cristofaro, E. (2018). Differentially Private Mixture of Generative Neural Networks. IEEE Transactions on Knowledge and Data Engineering, doi:10.1109/TKDE.2018.2855136
Cerulli, A., De Cristofaro, E., Soriente, C. (2018). Nothing Refreshes Like a RePSI: Reactive Private Set Intersection.
Echeverria Guzman, J., De Cristofaro, E., Kourtellis, N., Leontiadis, I., Stringhini, G., Zhou, S. (2018). LOBO: Evaluation of Generalization Deficiencies in Twitter Bot Classifiers.
Ioannou, A., Blackburn, J., Stringhini, G., De Cristofaro, E., Kourtellis, N., Sirivianos, M. (2018). From risk factors to detection and intervention: a practical proposal for future work on cyberbullying. Behaviour and Information Technology, doi:10.1080/0144929X.2018.1432688
Kotonya, N., De Cristofaro, P., De Cristofaro, E. (2018). Of Wines and Reviews: Measuring and Modeling the Vivino Wine Social Network.
Melis, L., Pyrgelis, A., De Cristofaro, E. (2018). On Collaborative Predictive Blacklisting. ACM SIGCOMM Computer Communication Review, 48 (5), doi:10.1145/3310165.3310168
Onwuzurike, L., Almeida, M., Mariconti, E., Blackburn, J., Stringhini, G., De Cristofaro, E. (2018). A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis.
Perillo, A.M., De Cristofaro, E. (2018). PAPEETE: Private, Authorized, and Fast Personal Genomic Testing.
Pyrgelis, A., Troncoso, C., De Cristofaro, E. (2018). Knock Knock, Who's There? Membership Inference on Aggregate Location Data.
Zannettou, S., Blackburn, J., Sirivianos, M., Stringhini, G. (2018). Understanding Web Archiving Services and Their (Mis)Use on Social Media.
Zannettou, S., Bradlyn, B., Cristofaro, E.D., Kwak, H., Sirivianos, M., Stringhini, G., Blackburn, J. (2018). What is Gab: A Bastion of Free Speech or an Alt-Right Echo Chamber.
Zannettou, S., Caulfield, T., Blackburn, J., De Cristofaro, E., Sirivianos, M., Stringhini, G., Suarez-Tangil, G. (2018). On the Origins of Memes by Means of Fringe Web Communities.

2017

Acs, G., Melis, L., Castelluccia, C., Cristofaro, E.D. (2017). Differentially Private Mixture of Generative Neural Networks.
Chatzakou, D., Kourtellis, N., Blackburn, J., Cristofaro, E.D., Stringhini, G., Vakali, A. (2017). Mean Birds: Detecting Aggression and Bullying on Twitter..
Chatzakou, D., Kourtellis, N., Blackburn, J., Cristofaro, E.D., Stringhini, G., Vakali, A. (2017). Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying..
Chatzakou, D., Kourtellis, N., Blackburn, J., Cristofaro, E.D., Stringhini, G., Vakali, A. (2017). Hate is not Binary: Studying Abusive Behavior of #GamerGate on Twitter..
Chatzakou, D., Kourtellis, N., Blackburn, J., Cristofaro, E.D., Stringhini, G., Vakali, A. (2017). Detecting Aggressors and Bullies on Twitter..
Farooqi, S., Ikram, M., De Cristofaro, E., Friedman, A., Jourjon, G., Kaafar, M.A., ...Zaffar, F. (2017). Characterizing Key Stakeholders in an Online Black-Hat Marketplace. PROCEEDINGS OF THE 2017 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), 17-27. doi:10.1109/ECRIME.2017.7945050
Hayes, J., Melis, L., Danezis, G., Cristofaro, E.D. (2017). LOGAN: Evaluating Privacy Leakage of Generative Models Using Generative Adversarial Networks. .
Hine, G., Onaolapo, J., De Cristofaro, E., Kourtellis, N., Leontiadis, I., Samaras, R., ...Blackburn, J. (2017). Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and its Effects on the Web.
Mariconti, E., Onwuzurike, L., Andriotis, P., Cristofaro, E.D., Ross, G.J., Stringhini, G. (2017). MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models..
Onwuzurike, L., Ikram, M., Farooqi, S., De Cristofaro, E., Friedman, A., Jourjon, G., ...Shafiq, M.A. (2017). Measuring, Characterizing, and Detecting Facebook Like Farms. ACM Transactions on Privacy and Security,
Pyrgelis, A., Troncoso, C., De Cristofaro, E. (2017). What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy.
Sajadmanesh, S., Jafarzadeh, S., Ossia, S.A., Rabiee, H.R., Haddadi, H., Mejova, Y., ...Stringhini, G. (2017). Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web..
Zannettou, S., Caulfield, T., De Cristofaro, E., Kourtellis, N., Leontiadis, I., Sirivianos, M., ...Blackburn, J. (2017). The web centipede: Understanding how web communities influence each other through the lens of mainstream and alternative news sources.

2016

Asghar, H., Melis, L., Soldani, C., De Cristofaro, E., Kaafar, M.A., Mathy, L. (2016). SplitBox: Toward Efficient Private Network Function Virtualization.
De Cristofaro, E., Liang, K., Zhang, Y. (2016). Privacy-Preserving Genetic Relatedness Test.
Haddadi, H., Nithyanand, R., Khattak, S., Javed, M., Vallina-Rodriguez, N., Falahrastegar, M., ...Murdoch, S.J. (2016). The Adblocking Tug-of-War. USENIX ;login:,
Krol, K., Rahman, M.S., Parkin, S., De Cristofaro, E., Vasserman, E. (2016). An Exploratory Study of User Perceptions of Payment Methods in the UK and the US.
Melis, L., Asghar, H., De Cristofaro, E., Kaafar, M.A. (2016). Private Processing of Outsourced Network Functions: Feasibility and Constructions.
Melis, L., Danezis, G., Cristofaro, E.D. (2016). Efficient Private Statistics with Succinct Sketches.
Nithyanand, R., Khattak, S., Javed, M., Vallina-Rodriguez, N., Falahrastegar, M., Powles, J.E., ...Murdoch, S.J. (2016). Adblocking and Counter Blocking: A Slice of the Arms Race.
Onwuzurike, L., De Cristofaro, E. (2016). Experimental Analysis of Popular Smartphone Apps Offering Anonymity, Ephemerality, and End-to-End Encryption.
Pyrgelis, A., De Cristofaro, E., Ross, G. (2016). Privacy-Friendly Mobility Analytics using Aggregate Location Data.

2015

Ayday, E., De Cristofaro, E., Hubaux, J.-.P., Tsudik, G. (2015). Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?. COMPUTER, 48 (2), 58-66. doi:10.1109/MC.2015.59
De Cristofaro, E., Malin, B. (Eds.), (2015). Proceedings of the 2nd International Workshop on Genome Privacy and Security (GenoPri'15). .
Freudiger, J., De Cristofaro, E., Brito, A. (2015). Controlled Data Sharing for Collaborative Predictive Blacklisting.
Krol, K., Philippou, E., De Cristofaro, E., Sasse, M.A. (2015). "They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking.
Nagy, M., Bui, T., De Cristofaro, E., Asokan, N., Ott, J., Sadeghi, A.R. (2015). How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
Onwuzurike, L., De Cristofaro, E. (2015). Danger is my middle name: Experimenting with SSL Vulnerabilities in Android Apps.

2014

(2014). Privacy Enhancing Technologies: 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings. 8555
Beato, F., De Cristofaro, E., Rasmussen, K.B. (2014). Undetectable Communication: The Online Social Networks Case.
Bilogrevic, I., Freudiger, J., De Cristofaro, E., Uzun, E. (2014). What’s the Gist? Privacy-Preserving Aggregation of User Profiles.
Blundo, C., De Cristofaro, E., Gasti, P. (2014). EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity. Journal of Computer Security, 22 355-381.
Chaabane, A., Chen, T., Cunche, M., De Cristofaro, E., Friedman, A., Kafaar, M.-.A. (2014). Censorship in the Wild: Analyzing Internet Filtering in Syria.
Danezis, G., Cristofaro, E.D. (2014). Fast and Private Genomic Testing for Disease Susceptibility.
Danezis, G., De Cristofaro, E. (2014). Simpler protocols for privacy-preserving disease susceptibility testing.
De Cristofaro, E. (2014). An Exploratory Ethnographic Study of Issues and Concerns with Whole Genome Sequencing.
De Cristofaro, E. (2014). Genomic Privacy and the Rise of a New Research Community. IEEE Security & Privacy, 12 80-83.
De Cristofaro, E., Du, H., Freudiger, J., Norcie, G. (2014). A Comparative Usability Study of Two-Factor Authentication.
De Cristofaro, E., Friedman, A., Jourjon, G., Kaafar, M.A., Shafiq, M.Z. (2014). Paying for Likes? Understanding Facebook Like Fraud Using Honeypots.

2013

Cardenas, A., Chow, R., De Cristofaro, E. (2013). Data Handling in the Smart Grid: Do We Know Enough?. In Critical Infrastructure Protection VII. (pp. 21-32). Springer Berlin Heidelberg.
De Cristofaro, E., Faber, S., Tsudik, G. (2013). Secure Genomic Testing with Size-and Position-Hiding Private Substring Matching.
De Cristofaro, E., Soriente, C. (2013). Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI). IEEE Transactions on Information Forensics and Security (TIFS), 8 (8),
De Cristofaro, E., Soriente, C. (2013). Participatory privacy: Enabling privacy in participatory sensing. IEEE Network, 27 32-36.
De Cristofaro, E., Wright, M. (Eds.), (2013). Privacy Enhancing Technologies13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013, Proceedings. Springer.
Nagy, M., De Cristofaro, E., Dmitrienko, A., Asokan, N., Sadeghi, A.-.R. (2013). Do I know you?–Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
Norcie, G., De Cristofaro, E., Bellotti, V. (2013). Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles.

2012

Blundo, C., De Cristofaro, E., Gasti, P. (2012). EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity..
Chaabane, A., De Cristofaro, E., Kaafar, M.-.A., Uzun, E. (2012). Privacy in Content-Oriented Networking: Threats and Countermeasures. Computer Communication Review, 43 25-33.
De Cristofaro, E., Di Pietro, R. (2012). Adversaries and countermeasures in privacy-enhanced Urban sensing systems. IEEE Systems Journal, Special Issue on Security and Privacy of Complex Systems,
De Cristofaro, E., Di Pietro, R. (2012). Preserving Query Privacy in Urban Sensing Systems.
De Cristofaro, E., Faber, S., Gasti, P., Tsudik, G. (2012). GenoDroid: Are Privacy-Preserving Genomic Tests Ready for Prime Time?.
De Cristofaro, E., Gasti, P., Tsudik, G. (2012). Fast and Private Computation of Cardinality of Set Intersection and Union.
De Cristofaro, E., Soriente, C., Tsudik, G., Williams, A. (2012). Tweeting with Hummingbird: Privacy in Large-Scale Micro-Blogging OSNs.. IEEE Data Eng. Bull., 35 93-100.
De Cristofaro, E., Soriente, C., Tsudik, G., Williams, A. (2012). Hummingbird: Privacy at the time of Twitter.
De Cristofaro, E., Tsudik, G. (2012). Experimenting with Fast Private Set Intersection.
Mishari, M.A., De Cristofaro, E., El Defrawy, K., Tsudik, G. (2012). Harvesting SSL Certificate Data to Identify Web-Fraud. International Journal of Network Security (IJSN),

2011

Ateniese, G., De Cristofaro, E., Tsudik, G. (2011). (If) size matters: size-hiding private set intersection.
Baldi, P., Baronio, R., De Cristofaro, E., Gasti, P., Tsudik, G. (2011). Countering GATTACA: efficient and secure testing of fully-sequenced human genomes.
Castelluccia, C., De Cristofaro, E., Francillon, A., Kaafar, M.-.A. (2011). EphPub: Toward Robust Ephemeral Publishing.
De Cristofaro, E., Durussel, A., Aad, I. (2011). Reclaiming privacy for smartphone applications.
De Cristofaro, E., Lu, Y., Tsudik, G. (2011). Efficient techniques for privacy-preserving sharing of sensitive information.
De Cristofaro, E., Soriente, C. (2011). PEPSI—privacy-enhanced participatory sensing infrastructure.

2010

Auletta, V., Blundo, C., De Caro, A., De Cristofaro, E., Persiano, G., Visconti, I. (2010). Increasing privacy threats in the cyberspace: the case of Italian e-passports.
Castelluccia, C., De Cristofaro, E., Perito, D. (2010). Private information disclosure from web searches.
De Cristofaro, E., Kim, J. (2010). Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization. IEEE Security & Privacy, 8 18-24.
De Cristofaro, E., Kim, J., Tsudik, G. (2010). Linear-complexity private set intersection protocols secure in malicious model.
De Cristofaro, E., Tsudik, G. (2010). Practical private set intersection protocols with linear complexity.

2009

Auletta, V., Blundo, C., De Cristofaro, E. (2009). HTTP over Bluetooth: a J2ME experience. International Journal On Advances in Telecommunications, 1 57-66.
De Cristofaro, E., Bohli, J.-.M., Westhoff, D. (2009). FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks.
De Cristofaro, E., Ding, X., Tsudik, G. (2009). Privacy-preserving querying in sensor networks.
De Cristofaro, E., Jarecki, S., Kim, J., Tsudik, G. (2009). Privacy-preserving policy-based information transfer.

2008

Blundo, C., Cristofaro, E.D., Galdi, C., Persiano, G. (2008). Validating Orchestration of Web Services with BPEL and Aggregate Signatures.
Blundo, C., De Cristofaro, E., Del Sorbo, A., Galdi, C., Persiano, G. (2008). A distributed implementation of the certified information access service.

2007

Auletta, V., Blundo, C., De Cristofaro, E. (2007). A J2ME transparent middleware to support HTTP connections over Bluetooth.
Blundo, C., De Cristofaro, E. (2007). A Bluetooth-based JXME infrastructure.
De Cristofaro, E. (2007). A secure and privacy-protecting aggregation scheme for sensor networks.

2006

Auletta, V., Blundo, C., De Cristofaro, E., Raimato, G. (2006). A Lightweight Framework for Web Services Invocation over Bluetooth.
Auletta, V., Blundo, C., De Cristofaro, E., Raimato, G. (2006). Performance evaluation of web services invocation over Bluetooth.