Publications


This page lists all my peer-reviewed publications ordered by year, linking to open-access versions of each paper. You can also visit my DBLP or my Google Scholar pages to see them in different formats.


G. Ganev, M. Nazari, R. Davison, A. Fallah Dizche, X. Wu, R. Abbey, J.G Silva, E. De Cristofaro
SMOTE and Mirrors: Exposing Privacy Leakage from Synthetic Minority Oversampling
14th International Conference on Learning Representations (ICLR 2026)
pdf

M.S.M.S. Annamalai, B. Balle, J. Hayes, G. Kaissis, E. De Cristofaro
SoK: The Hitchhiker’s Guide to Efficient, End-to-End, and Tight DP Auditing
4th IEEE Secure and Trustworthy Machine Learning Conference (IEEE SaTML 2026)
pdf

M.S.M.S. Annamalai, B. Balle, J. Hayes, E. De Cristofaro
To Shuffle or not to Shuffle: Auditing DP-SGD with Shuffling
33rd Network and Distributed System Security Symposium (NDSS 2026)
pdf

A. Galeazzi, P. Paudel, M. Conti, E. De Cristofaro, G. Stringhini
Revealing The Secret Power: How Algorithms Can Influence Content Visibility on Twitter/X
33rd Network and Distributed System Security Symposium (NDSS 2026)
pdf

G. Ganev, M.S.M.S. Annamalai, S. Mahiou, E. De Cristofaro
The Importance of Being Discrete: Measuring the Impact of Discretization in End-to-End Differentially Private Synthetic Data
32nd ACM Conference on Computer and Communications Security (ACM CCS 2025)
pdf

S. Chennoufi, Y. Han, G. Blanc, E. De Cristofaro, and C. Kiennert
PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing
30th European Symposium on Research in Computer Security (ESORICS 2025)
pdf

G. Ganev and E. De Cristofaro
The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets
46th IEEE Symposium on Security & Privacy (S&P 2025)
distinguished paper
pdf

M.S.M.S. Annamalai, I. Bilogrevic, E. De Cristofaro
Beyond the Crawl: Unmasking Browser Fingerprinting in Real User Interactions
34th The Web Conference (WWW 2025)
pdf

B. Treves, E. De Cristofaro, M. Faloutsos, Y. Dong
VIKI: Systematic Cross-Platform Profile Inference of Tech Users
17th ACM Web Science Conference (WebSci 2025)
pdf

G. Ganev, M.S.M.S. Annamalai, S. Mahiou, E. De Cristofaro
Understanding the Impact of Data Domain Extraction on Synthetic Data Privacy
Will Synthetic Data Finally Solve the Data Access Problem? (ICLR 2025 Workshop)
pdf

G. Ganev, M.S.M.S. Annamalai, E. De Cristofaro
The Elusive Pursuit of Reproducing PATE-GAN: Benchmarking, Auditing, Debugging
Transactions on Machine Learning Research (TMLR), Feb 2025
pdf

M.S.M.S. Annamalai, E. De Cristofaro
Nearly Tight Black-Box Auditing of Differentially Private Machine Learning
38th Annual Conference on Neural Information Processing Systems (NeurIPS 2024)
pdf

G. Ganev, K. Xu, E. De Cristofaro
Graphical vs. Deep Generative Models: Measuring the Impact of Differentially Private Mechanisms and Budgets on Utility
31st ACM Conference on Computer and Communications Security (ACM CCS 2024)
pdf

M.S.M.S. Annamalai, G. Ganev, E. De Cristofaro
“What do you want from theory alone?” Experimenting with Tight Auditing of Differentially Private Synthetic Data Generation
33rd USENIX Security Symposium (Usenix Security 2024)
pdf

A. Efstratiou, M. Efstratiou, S. Yudhoatmojo, J. Blackburn, E. De Cristofaro
“Here’s Your Evidence”: False Consensus in Public Twitter Discussions of COVID-19 Science
27th ACM Conference on Computer Supported Cooperative Work and Social Computing (ACM CSCW 2024)
pdf

M. Naseri, Y. Han, E. De Cristofaro
BadVFL: Backdoor Attacks in Vertical Federated Learning
45th IEEE Symposium on Security & Privacy (S&P 2024)
pdf

E. De Cristofaro
Synthetic Data: Methods, Use Cases, and Risks
IEEE Security and Privacy Magazine (Special Issue on Synthetic Realities), 2024
pdf

M.S.M.S. Annamalai, I. Bilogrevic, E. De Cristofaro
FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting
31st Network and Distributed System Security Symposium (NDSS 2024)
pdf

M. Hammas Saeed, K. Papadamou, J. Blackburn, E. De Cristofaro, G. Stringhini
TUBERAIDER: Attributing Coordinated Hate Attacks on YouTube Videos to their Source Communities
18th International AAAI Conference on Web and Social Media (ICWSM 2024)
pdf

J. Patel, P. Paudel, E. De Cristofaro, G. Stringhini, J. Blackburn
iDRAMA-Scored-2024: A Dataset of the Scored Social Media Platform from 2020 to 2023
18th International AAAI Conference on Web and Social Media, Dataset Paper (ICWSM 2024)
pdf

P. Paudel, J. Blackburn, E. De Cristofaro, G. Stringhini, S. Zannettou
Lambretta: Learning to Rank for Twitter Soft Moderation
44th IEEE Symposium on Security & Privacy (S&P 2023)
pdf

A. Efstratiou, J. Blackburn, T. Caulfield, G. Stringhini, S. Zannettou, E. De Cristofaro
Non-Polar Opposites: Analyzing the Relationship Between Echo Chambers and Hostile Intergroup Interactions on Reddit
17th International AAAI Conference on Web and Social Media (ICWSM 2023)
pdf

S. Baskoro Yudhoatmojo, E. De Cristofaro, J. Blackburn
Understanding the Use of e-Prints on Reddit and 4chan’s Politically Incorrect Board
15th ACM Web Science Conference 2023 (WebSci 2023)
best paper
pdf

U. Balci, C. Ling, E. De Cristofaro, M. Squire, G. Stringhini, J. Blackburn
Beyond Fish and Bicycles: Exploring the Varieties of Online Women’s Ideological Spaces
15th ACM Web Science Conference 2023 (WebSci 2023)
pdf

M. Naseri, Y. Han, E. Mariconti, Y. Shen, G. Stringhini, E. De Cristofaro
CERBERUS: Exploring Federated Prediction of Security Events
29th ACM Conference on Computer and Communications Security (ACM CCS 2022)
pdf

W. Man Si, J. Blackburn, E. De Cristofaro, G. Stringhini, S. Zannettou, Y. Zhang
Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots
29th ACM Conference on Computer and Communications Security (ACM CCS 2022)
honorable mention
pdf
media coverage: FastCompany

A. Efstratiou and E. De Cristofaro
Adherence to Misinformation on Social Media Through Socio-Cognitive and Group-Based Processes
25th ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW 2022)
pdf

G. Ganev, B. Oprisanu, E. De Cristofaro
Robin Hood and Matthew Effects – Differential Privacy Has Disparate Impact on Synthetic Data
39th International Conference on Machine Learning (ICML 2022)
pdf

Y. Liu, R. Wen, X. He, A. Salem, Z. Zhang, M. Backes, E. De Cristofaro, M. Fritz, Y. Zhang
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models
31st USENIX Security Symposium (Usenix Security 2022)
pdf

M. Hammas Saeed, S. Ali, J. Blackburn, E. De Cristofaro, S. Zannettou, and G. Stringhini
TROLLMAGNIFIER: Detecting State-Sponsored Troll Accounts on Reddit
43rd IEEE Symposium on Security & Privacy (S&P 2022)
pdf
media coverage: Wired

C. Ling, J. Blackburn, E. De Cristofaro, G. Stringhini
Slapping Cats, Bopping Heads, and Oreo Shakes: Understanding Indicators of Virality in TikTok Short Videos
14th ACM Web Science Conference (ACM WebSci 2022)
pdf

H. Bin Zia, A. Raman, I. Castro, I. Anaobi, E. De Cristofaro, N. Sastry, G. Tyson
Toxicity in the Decentralized Web and the Potential for Model Sharing
ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS 2022)
pdf

B. Oprisanu, G. Ganev, E. De Cristofaro
On Utility and Privacy in Synthetic Genomic Data
29th Network and Distributed System Security Symposium (NDSS 2022)
pdf

M. Naseri, J. Hayes, E. De Cristofaro
Local and Central Differential Privacy for Robustness and Privacy in Federated Learning
29th Network and Distributed System Security Symposium (NDSS 2022)
pdf

A. Papasavva, M. Aliapoulios, C. Ballard, E. De Cristofaro, S. Zannettou, and J. Blackburn
The Gospel According to Q: Understanding the QAnon Conspiracy from the Perspective of Canonical Information
16th International AAAI Conference on Web and Social Media (ICWSM 2022)
pdf
media coverage: New Scientist

K. Papadamou, S. Zannettou, J. Blackburn, E. De Cristofaro, G. Stringhini, and M. Sirivianos
“It is just a flu”: Assessing the Effect of Watch History on YouTube’s Pseudoscientific Video Recommendations
16th International AAAI Conference on Web and Social Media (ICWSM 2022)
pdf

A. Ishaku, I. Castro, A. Raman, H. Bin Zia, E. De Cristofaro, N. Sastry, G. Tyson
Exploring Content Moderation in the Decentralised Web: The Pleroma Case
17th International Conference on emerging Networking EXperiments and Technologies (ACM CoNext 2021)
pdf

Y. Wang, S. Zannettou, J. Blackburn, B. Bradlyn, E. De Cristofaro, and G. Stringhini
A Multi-Platform Analysis of Political News Discussion and Sharing on Web Communities
2021 IEEE International Conference on Big Data (IEEE BigData 2021)
pdf

E. De Cristofaro
A Critical Overview of Privacy in Machine Learning
IEEE Security & Privacy Magazine, Volume 19, Issue 4, July-August 2021
pdf

P. Doerfler, A. Forte, E. De Cristofaro, G. Stringhini, J. Blackburn, and D. McCoy
“I’m a Professor, which isn’t usually a dangerous job”: Internet-Facilitated Harassment and its Impact on Researchers
24th ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW 2021)
impact recognition award
pdf

M. Horta Ribeiro, S. Jhaver, S. Zannettou, J. Blackburn, E. De Cristofaro, G. Stringhini, and R. West
Do Platform Migrations Compromise Content Moderation? Evidence from r/The_Donald and r/Incels
24th ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW 2021)
honorable mention
pdf video
media coverage: WaPo, El Pais, The Brink, Wired

K. Papadamou, S. Zannettou, J. Blackburn, E. De Cristofaro, G. Stringhini, and M. Sirivianos
“How over is it?” Understanding the Incel Community on YouTube
24th ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW 2021)
pdf video

C. Ling, I. AbuHilal, J. Blackburn, E. De Cristofaro, S. Zannettou, G. Stringhini
Dissecting the Meme Magic: Understanding Indicators of Virality in Image Memes
24th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2021)
pdf video
media coverage: Input Mag

S. Ali, M. Hammas Saeed, E. Aldreabi, J. Blackburn, E. De Cristofaro, S. Zannettou, and G. Stringhini
Understanding the Effect of Deplatforming on Social Networks
13th ACM Web Science Conference (ACM WebSci 2021)
pdf

A. Papasavva, J. Blackburn, G. Stringhini, S. Zannettou, and E. De Cristofaro
“Is it a Qoincidence?”: An Exploratory Study of QAnon on Voat
30th The Web Conference (WWW 2021)
pdf video
media coverage: Wired, Echosec, The Daily Beast

M. Aliapoulios, E. Bevensee, J. Blackburn, E. De Cristofaro, G. Stringhini, and S. Zannettou
A Large Open Dataset from the Parler Social Network
15th International AAAI Conference on Web and Social Media (ICWSM 2021)
pdf
media coverage: USA Today, The Conversation, Business Insider-1, Business Insider-2

M. Horta Ribeiro, J. Blackburn, B. Bradlyn, E. De Cristofaro, G. Stringhini, S. Long, S. Greenberg, and S. Zannettou
The Evolution of the Manosphere Across the Web
15th International AAAI Conference on Web and Social Media (ICWSM 2021)
pdf
media coverage: Newsweek, MIT Tech, Daily Mail

Y. Wang, F. Tahmasbi, J. Blackburn, B. Bradlyn, E. De Cristofaro, D. Magerman, S. Zannettou, and G. Stringhini
Understanding the Use of Fauxtography on Social Media
15th International AAAI Conference on Web and Social Media (ICWSM 2021)
pdf video

A. Mittos, S. Zannettou, J. Blackburn, and E. De Cristofaro
Analyzing Genetic Testing Discourse on the Web Through the Lens of Twitter, Reddit, and 4chan
ACM Transactions on the Web (TWEB), Volume 13, Issue 4, August 2020
pdf

A. Pyrgelis, C. Troncoso, and E. De Cristofaro
Measuring Membership Privacy on Aggregate Location Time-Series
ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS 2020)
pdf video

M. Wixey, S. Johnson, and E. De Cristofaro
On the Feasibility of Acoustic Attacks Using Commodity Smart Devices
IEEE Workshop on the Internet of Safe Things (co-located with IEEE S&P 2020)
pdf

A. Papasavva, S. Zannettou, E. De Cristofaro, G. Stringhini, J. Blackburn
Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board
14th International AAAI Conference on Web and Social Media (ICWSM 2020)
pdf video

S. Zannettou, B. Bradlyn, T. Caulfield, E. De Cristofaro, G. Stringhini, and J. Blackburn
Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter
14th International AAAI Conference on Web and Social Media (ICWSM 2020)
pdf

A. Mittos, S. Zannettou, J. Blackburn, and E. De Cristofaro
“And We Will Fight For Our Race! A Measurement Study of Genetic Testing Conversations on Reddit and 4chan
14th International AAAI Conference on Web and Social Media (ICWSM 2020)
pdf video
media coverage: The Times, StatNews

E. Mariconti, G. Suarez-Tangil, J. Blackburn, E. De Cristofaro, N. Kourtellis, I. Leontiadis, J. Luque Serrano, and G. Stringhini
“You Know What to Do”: Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks
22nd ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2019)
pdf

B. Oprisanu, C. Dessimoz, and E. De Cristofaro
How Much Does GenoGuard Really Guard? An Empirical Analysis of Long-Term Security for Genomic Data
18th ACM CCS Workshop on Privacy in the Electronic Society (WPES 2019)
pdf

A. Raman, S. Joglekar, E. De Cristofaro, N. Sastry, G. Tyson
Challenges in the Decentralized Web: The Mastodon Case
19th ACM Internet Measurement Conference (IMC 2019)
pdf video

H. Jameel Asghar, E. De Cristofaro, G. Jourjon, D. Kaafar, L. Mathy, L. Melis, C. Russell, and M. Yu
Fast Privacy-Preserving Network Function Outsourcing
Computer Networks, Vol. 163, 2019
pdf

D. Chatzakou, I. Leontiadis, J. Blackburn, E. De Cristofaro, G. Stringhini, A. Vakali, and N. Kourtellis
Detecting Cyberbullying and Cyberaggression in Social Media
ACM Transactions on the Web (TWEB), Vol. 13, No. 3, 2019
pdf
media coverage: The Register, BBC, NewsBusters, SkyNews

L. Melis, C. Song, E. De Cristofaro, and V. Shmatikov
Exploiting Unintended Feature Leakage in Collaborative Learning
40th IEEE Symposium on Security & Privacy (S&P 2019)
pdf video

V. Primault, V. Lampos, I. Cox, and E. De Cristofaro
Privacy-Preserving Crowd-Sourcing of Web Searches with Private Data Donor
28th The Web Conference (WWW 2019)
pdf

S. Zannettou, T. Caulfield, E. De Cristofaro, M. Sirivianos, G. Stringhini, and J. Blackburn
Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter & Their Influence on the Web
4th WebConf Workshop on CyberSafety, Online Harassment, and Misinformation (CyberSafety 2019)
best paper
pdf

L. Onwuzurike, E. Mariconti, P. Andriotis, E. De Cristofaro, G. Ross, and G. Stringhini
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
ACM Transactions on Privacy and Security (ACM TOPS), Volume 22, Issue 2, April 2019
pdf

J. Hayes, L. Melis, G. Danezis, E. De Cristofaro
LOGAN: Membership Inference Attacks Against Generative Models
Proceedings on Privacy Enhancing Technologies, Vol. 2019, Issue 1 (PoPETS 2019)
pdf

A. Mittos, B. Malin, and E. De Cristofaro
Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective
Proceedings on Privacy Enhancing Technologies, Vol. 2019, Issue 1 (PoPETS 2019)
pdf

J. Echeverria, E. De Cristofaro, N. Kourtellis, I. Leontiadis, G. Stringhini, S. Zhou
LOBO – Evaluation of Generalization Deficiencies in Twitter Bot Classifiers
34th Annual Computer Security Applications Conference (ACSAC 2018)
pdf

L. Melis, A. Pyrgelis, E. De Cristofaro
On Collaborative Predictive Blacklisting
ACM SIGCOMM’s Computer Communication Review (CCR), Vol. 48, No. 5, Oct. 2018
pdf

S. Zannettou, T. Caulfield, J. Blackburn, E. De Cristofaro, M. Sirivianos, G. Stringhini, and G. Suarez-Tangil
On the Origins of Memes by Means of Fringe Web Communities
18th ACM Internet Measurement Conference (IMC 2018)
distinguished paper
pdf code
media coverage: BBC TrendingBBC NewsMIT Technology ReviewCBS NewsThe IndependentVICEBusiness InsiderThe Daily DotQuartzEl PaisMotherJonesInfoWarsThinkprogressIflscienceHornetBellingcat

G. Acs, L. Melis, C. Castelluccia, E. De Cristofaro (Extended Version)
Differentially Private Mixture of Generative Neural Networks
IEEE Transactions on Knowledge and Data Engineering (TKDE 2018)
pdf

N. Kotonya, P. De Cristofaro, E. De Cristofaro
Of Wines and Reviews: Measuring and Modeling the Vivino Wine Social Network
IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2018)
pdf

L. Onwuzurike, M. Almeida, E. Mariconti, J. Blackburn, G. Stringhini, E. De Cristofaro
A Family of Droids–Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis
16th Annual Conference on Privacy, Security and Trust 16th Annual Conference on Privacy, Security and Trust (PST 2018)
pdf

A. Cerulli, E. De Cristofaro, C. Soriente
Nothing Refreshes Like a RePSI: Reactive Private Set Intersection
16th International Conference on Applied Cryptography and Network Security (ACNS 2018)
pdf

A. Massimo Perillo and E. De Cristofaro
PAPEETE: Private, Authorized, and Fast Personal Genomic Testing
15th International Conference on Security and Cryptography (SECRYPT 2018)
pdf

S. Zannettou, J. Blackburn, E. De Cristofaro, M. Sirivianos, G. Stringhini
Understanding Web Archiving Services and Their (Mis)Use on Social Media
12th International AAAI Conference on Web and Social Media (ICWSM 2018)
pdf

B. Oprisanu and E. De Cristofaro
AnoniMME: Bringing Anonymity to the Matchmaker Exchange Platform for Rare Disease Gene Discovery
26th ISCB Conference on Intelligent Systems for Molecular Biology (ISMB 2018)
pdf

S. Zannettou, B. Bradlyn, E. De Cristofaro, H. Kwak, M. Sirivianos, G. Stringhini, J. Blackburn
What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?
3rd WWW Workshop on Computational Methods for CyberSafety (CyberSafety 2018)
pdf

A. Pyrgelis, C. Troncoso, E. De Cristofaro
Knock Knock, Who’s There? Membership Inference on Aggregate Location Data
25th Network and Distributed System Security Symposium (NDSS 2018)
distinguished paper INRIA-CNIL privacy protection award runner-up
pdf blog video

G. Acs, L. Melis, C. Castelluccia, E. De Cristofaro
Differentially Private Mixture of Generative Neural Networks
17th IEEE International Conference on Data Mining (ICDM 2017)
pdf

S. Zannettou, T. Caulfield, E. De Cristofaro, N. Kourtellis, I. Leontiadis, M. Sirivianos, G. Stringhini, J. Blackburn
The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources
17th ACM Internet Measurement Conference (IMC 2017)
pdf blog
media coverage: NatureThe AtlanticLa Repubblica (in Italian)Ansa (in Italian)Sky NewsHacker NewsBoingBoingPhys.orgNaked Security

M. Ikram, L. Onwuzurike, S. Farooqi, E. De Cristofaro, A. Friedman, G. Jourjon, D. Kaafar, M. Zubair Shafiq
Measuring, Characterizing, and Detecting Facebook Like Farms
ACM Transactions on Privacy and Security, Vol. 20, No. 4 (ACM TOPS 2017)

A. Pyrgelis, C. Troncoso, E. De Cristofaro
What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy
Proceedings on Privacy Enhancing Technologies, Vol. 2017, Issue 4 (PoPETS 2017)
pdf

D. Chatzakou, N. Kourtellis, J. Blackburn, E. De Cristofaro, G. Stringhini, A. Vakali
Mean Birds: Detecting Aggression and Bullying on Twitter
9th International ACM Web Science Conference (ACM WebSci 2017), also appeared as a poster at WWW 2017
pdf

G. Hine, J. Onaolapo, E. De Cristofaro, N. Kourtellis, I. Leontiadis, G. Stringhini, J. Blackburn
Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan’s Politically Incorrect Forum and Its Effects on the Web
11th International AAAI Conference on Web and Social Media (ICWSM 2017)
best paper runner-up
pdf blog
media coverage: NatureMotherboardThe IndependentThe ConversationMIT Technology ReviewViceLa Stampa (in Italian)La Repubblica (in Italian)BoingBoingPacific Standard

D. Chatzakou, N. Kourtellis, J. Blackburn, E. De Cristofaro, G. Stringhini, A. Vakali
Hate is not binary: Studying abusive behavior of #GamerGate on Twitter
28th ACM Conference on Hypertext and Social Media (ACM HyperText 2017)
pdf

S. Farooqi, M. Ikram, E. De Cristofaro, A. Friedman, G. Jourjon, D. Kaafar, M. Zubair Shafiq, F. Zaffar
Characterizing Key Stakeholders in an Online Black-Hat Marketplace
12th IEEE/APWG Symposium on Electronic Crime Research (eCrime 2017)
pdf

D. Chatzakou, N. Kourtellis, J. Blackburn, E. De Cristofaro, G. Stringhini, A. Vakali
Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying
2nd WWW Workshop on Computational Methods for CyberSafety (CyberSafety 2017)
pdf

S. Sajadmanesh, S. Jafarzadeh, S. Ali Ossia, H.R. Rabiee, H. Haddadi, Y. Mejova, M. Musolesi, E. De Cristofaro, G. Stringhini
Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web
26th International World Wide Web Conference Web Science Track (WWW 2017)
pdf
media coverage: MIT Tech ReviewThe IndependentReachMDFrance 24 (in French)Sciences et Avenir (in French)NEXO (in Portoguese)

E. Mariconti, L. Onwuzurike, P. Andriotis, E. De Cristofaro, G. Ross, G. Stringhini
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models
24th Network and Distributed System Security Symposium (NDSS 2017)
CSAW Europe Applied Research Award, 2nd place (out of 128 papers)
pdf blog code
media coverage: The Morning Paper

H. Haddadi, R. Nithyanand, S. Khattak, M. Javed, N. Vallina-Rodriguez, M. Falahrastegar, J.E. Powles, E. De Cristofaro, S.J. Murdoch
The Adblocking Tug-of-War
USENIX ;login: Magazine, Winter 2016, Vol. 41, No. 4 (;login: 2016)
pdf

A. Pyrgelis, E. De Cristofaro, G.J. Ross
Privacy-Friendly Mobility Analytics using Aggregate Location Data
24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL 2016)
pdf

E. De Cristofaro, K. Liang, Y. Zhang
Privacy-Preserving Genetic Relatedness Test
3rd International Workshop on Genome Privacy and Security (GenoPri 2016)
pdf

R. Nithyanand, S. Khattak, M. Javed, N. Vallina-Rodriguez, M. Falahrastegar, J.E. Powles, E. De Cristofaro, H. Haddadi, S.J. Murdoch
Ad-Blocking and Counter Blocking: A Slice of the Arms Races
6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 2016)
pdf

H. Jameel Asghar, L. Melis, C. Soldani, E. De Cristofaro, D. Kaafar, L. Mathy
SplitBox: Toward Efficient Private Network Function Virtualization
3rd ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization (HotMiddleBox 2016)
pdf

L. Melis, G. Danezis, E. De Cristofaro
Efficient Private Statistics with Succinct Sketches
23rd Network and Distributed System Security Symposium (NDSS 2016)
2017 data protection by design award (from Catalan data protection authority)
pdf blog

L. Onwuzurike and E. De Cristofaro
Experimental Analysis of Popular Smartphone Apps Offering Anonymity, Ephemerality, and End-to-End Encryption
1st NDSS Workshop on Understanding and Enhancing Online Privacy (UEOP 2016)
pdf

K. Krol, M. Sajidur Rahman, S. Parkin, E. De Cristofaro and E. Vasserman
An Exploratory Study of User Perceptions of Payment Methods in the UK and the US
10th NDSS Workshop on Usable Security (USEC 2016)
pdf

L. Melis, H. Jameel Asghar, E. De Cristofaro, D. Kaafar
Private Processing of Outsourced Network Functions: Feasibility and Constructions
1st ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDNNFVSEC 2016)
pdf

J. Freudiger, E. De Cristofaro, A. Brito
Controlled Data Sharing for Collaborative Predictive Blacklisting
12th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2015)
pdf

M. Nagy, T. Bui, E. De Cristofaro, N. Asokan, J. Ott, A. Sadeghi
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL
8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2015)
pdf

L. Onwuzurike and E. De Cristofaro
Danger is my middle name: Experimenting with SSL Vulnerabilities in Android Apps
8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2015)
pdf

E. Ayday, E. De Cristofaro, J. Hubaux, G. Tsudik
Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare
IEEE Computer Magazine, Vol. 48, No. 2, February 2015
Accepted in August 2013, also presented as a poster at Usenix Security 2013
editor version author version

K. Krol, E. Philippou, E. De Cristofaro, M. Angela Sasse
“They brought in the horrible key ring thing” – Analysing the Usability of Two-Factor Authentication in UK Online Banking
9th NDSS Workshop on Usable Security (USEC 2015)
pdf

A. Chaabane, T. Chen, M. Cunche, E. De Cristofaro, A. Friedman, D. Kaafar
Censorship in the Wild: Analyzing Web Filtering in Syria
14th ACM Internet Measurement Conference (IMC 2014)
best paper runner-up
pdf
media coverage: The Register, MIT Tech ReviewBoing BoingACM Tech NewsPhysics CentralMotherboardThe Conversation

E. De Cristofaro, A. Friedman, G. Jourjon, D. Kaafar, M. Zubair Shafiq
Paying for Likes? Understanding Facebook Like Fraud Using Honeypots
14th ACM Internet Measurement Conference (IMC 2014)
pdf
media coverage: MIT Tech ReviewPacific StandardThe TelegraphACM Tech NewsYahoo FinanceZero HedgeMedia PostThe New Republic

G. Danezis and E. De Cristofaro
Fast and Private Genomic Testing for Disease Susceptibility
13th ACM CCS Workshop on Privacy in the Electronic Society (WPES 2014)
(A preliminary version, titled “Simpler Protocols for Privacy-Preserving Disease Susceptibility Testing”, appeared in GenoPri 2014)
pdf

I. Bilogrevic, E. De Cristofaro, J. Freudiger, E. Uzun
What’s the Gist? Privacy-Preserving Aggregation of User Profiles
19th European Symposium on Research in Computer Security (ESORICS 2014)
pdf

F. Beato, E. De Cristofaro, K. Bonne Rasmussen
Undetectable Communication: The Online Social Networks Case
12th IEEE Annual Conference on Privacy, Security and Trust (PST 2014)
pdf

E. De Cristofaro
Genomic Privacy and the Rise of a New Research Community
IEEE Security & Privacy Magazine, Vol. 12, No. 2, March-April 2014
pdf
media coverage: DNA Digest

E. De Cristofaro
An Exploratory Ethnographic Study of Issues and Concerns with Whole Genome Sequencing
8th NDSS Workshop on Usable Security (USEC 2014)
pdf

E. De Cristofaro, H. Du, J. Freudiger, G. Norcie
Two-Factor or not Two-Factor? A Comparative Usability Study of Two-Factor Authentication 
8th NDSS Workshop on Usable Security (USEC 2014)
pdf

C. Blundo, E. De Cristofaro, P. Gasti
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity (Extended Version)
Journal of Computer Security, Vol. 22, No. 3, 2014
pdf

M. Nagy, E. De Cristofaro, A. Dmitrienko, N. Asokan, A. Sadeghi
Do I Know You? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
29th Annual Computer Security Applications Conference (ACSAC 2013)
pdf

E. De Cristofaro, C. Soriente
Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI)
IEEE Transactions on Information Forensics and Security (TIFS), Vol. 8, No. 12, 2013
pdf

E. De Cristofaro, S. Faber, G. Tsudik
Secure Genomic Testing with Size- and Position-Hiding Private Substring Matching
12th ACM CCS Workshop on Privacy in the Electronic Society (WPES 2013)
pdf

A. Chaabane, E. De Cristofaro, D. Kaafar, E. Uzun
Privacy in Content-Oriented Networking: Threats and Countermeasures
ACM SIGCOMM Computer Communication Review (CCR), Vol. 43, Issue 3, July 2013.
Also invited to be presented at SIGCOMM 2013 as one of the two “Best CCR Papers”
pdf

G. Norcie, E. De Cristofaro, V. Bellotti
Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles
7th Financial Cryptography and Data Security Workshop on Usable Security (USEC 2013)
pdf
media coverage: MIT Tech Review

E. De Cristofaro and C. Soriente
Participatory Privacy: Enabling Privacy in Participatory Sensing
IEEE Network. Vol. 27, No. 1, Jan 2013
pdf

A.A. Cardenas, R. Chow, E. De Cristofaro
Data Handling in the Smart Grid: Do We Know Enough?
Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (CIP 2013)

E. De Cristofaro, M. Manulis, B. Poettering
Private Discovery of Common Social Contacts (Extended Version)
International Journal of Information Security (IJIS), Vol. 12, No. 1, 2013
ACNS 2011 Selected Papers Special Issue
pdf

E. De Cristofaro, C. Soriente, G. Tsudik, A. Williams
Tweeting with Hummingbird: Privacy in Large-Scale Micro-Blogging OSNs
IEEE Data Engineering Bulletin. Vol. 35, Number 4, December 2012
pdf

E. De Cristofaro, P. Gasti, G. Tsudik
Fast and Private Computation of Cardinality of Set Intersection and Union
11th International Conference on Cryptology and Network Security (CANS 2012)
pdf

E. De Cristofaro, S. Faber, P. Gasti, G. Tsudik
GenoDroid: Are Privacy-Preserving Genomic Tests Ready for Prime Time?
11th ACM CCS Workshop on Privacy in the Electronic Society (WPES 2012)
pdf code
media coverage: NewScientistMIT Tech ReviewFierce Mobile HealthcarePBS SoCalPrivacy SurgeonOC RegistereWeekIEEE Computer SocietyAbout.com

C. Blundo, E. De Cristofaro, P. Gasti
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity
7th ESORICS Workshop on Data Privacy Management (DPM 2012)
pdf

E. De Cristofaro and G. Tsudik
Experimenting with Fast Private Set Intersection
5th International Conference on Trust and Trustworthy Computing (TRUST 2012)
pdf code

E. De Cristofaro, C. Soriente, G. Tsudik, A. Williams
Hummingbird: Privacy at the time of Twitter
33rd IEEE Symposium on Security and Privacy (S&P 2012)
pdf

E. De Cristofaro and R. Di Pietro
Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems
IEEE Systems Journal, Special Issue on Security and Privacy in Complex Systems, 2012
pdf

E. De Cristofaro and R. Di Pietro
Preserving Query Privacy in Urban Sensing Systems
13th International Conference on Distributed Computing and Networking (ICDCN 2012)

M. Almishari, E. De Cristofaro, K. Eldefrawy, G. Tsudik
Harvesting SSL Certificate Data to Identify Web-Fraud
International Journal of Network Security (IJSN), Vol. 14, No. 6, 2012
pdf

E. De Cristofaro
Sharing Sensitive Information with Privacy
PhD Dissertation, University of California, Irvine, 2011
pdf

P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti, G. Tsudik
Countering GATTACA: Efficient and Secure Testing of Fully-Sequenced Human Genomes
18th ACM Conference on Computer and Communications Security (CCS 2011)
pdf
media coverage: MIT Technology ReviewNewScientistKurzweilai

C. Castelluccia, E. De Cristofaro, A. Francillon, D. Kaafar
EphPub: Toward Robust Ephemeral Publishing
19th IEEE Conference on Network Protocols (ICNP 2011)
pdf code

E. De Cristofaro, Y. Lu, G. Tsudik
Efficient Techniques for Privacy-preserving Sharing of Sensitive Information
4th International Conference on Trust and Trustworthy Computing (TRUST 2011)
pdf

E. De Cristofaro, M. Manulis, B. Poettering
Private Discovery of Common Social Contacts
9th International Conference on Applied Cryptography and Network Security (ACNS 2011)
pdf

E. De Cristofaro, A. Durussel, I. Aad
Reclaiming Privacy for Smartphone Applications
9th IEEE Conference on Pervasive Computing and Communications (PerCom 2011)
pdf

E. De Cristofaro and C. Soriente
PEPSI: Privacy-Enhanced Participatory Sensing Infrastructure
4th ACM Conference on Wireless Security (WiSec 2011)
pdf

G. Ateniese, E. De Cristofaro, G. Tsudik
(If) Size Matters: Size-Hiding Private Set Intersection
14th IACR Conference on Practice and Theory of Public Key Cryptography (PKC 2011)
pdf

E. De Cristofaro, J. Kim, G. Tsudik
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
16th IACR Conference on the Theory and Application of Cryptology (Asiacrypt 2010)
pdf

E. De Cristofaro and J. Kim
Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization
IEEE Magazine on Security and Privacy, Vol. 8, No. 4, 2010
pdf

C. Castelluccia, E. De Cristofaro, D. Perito
Private Information Disclosure from Web Searches
10th Privacy Enhancing Technology Symposium (PETS 2010)
pdf
media coverage: MIT TechSlashdotACM NewsThe Register

E. De Cristofaro and G. Tsudik
Practical Private Set Intersection Protocols with Linear Complexity
Financial Cryptography and Data Security, 14th International Conference (FC 2010)
pdf code

V. Auletta, C. Blundo, A. De Caro, E. De Cristofaro, G. Persiano, I. Visconti
Increasing Privacy Threats in the Cyberspace: the Case of Italian E-Passports
1st International Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC 2010)

E. De Cristofaro, S. Jarecki, J. Kim, G. Tsudik
Privacy-preserving Policy-based Information Transfer
9th Privacy Enhancing Technologies Symposium (PETS 2009)
pdf

E. De Cristofaro, J. Bohli, D. Westhoff
FAIR: Fuzzy-based Aggregation providing In-network Resilience for real-time Sensor Networks
2nd ACM Symposium on Wireless Network Security (WiSec 2009)
pdf

E. De Cristofaro, X. Ding, G. Tsudik
Privacy-Preserving Querying in Sensor Networks
18th IEEE Conference on Computer Communications and Networks (ICCCN 2009)
pdf

C. Blundo, E. De Cristofaro, C. Galdi, G. Persiano
A Distributed Implementation of the Certified Information Access Service
13th European Symposium on Research in Computer Security (ESORICS 2008)
pdf

C. Blundo, E. De Cristofaro, A. Del Sorbo, C. Galdi, G. Persiano
Validating Orchestration of Web Services with BPEL and Aggregate Signatures
6th IEEE Conference on Web Services (ECOWS 2008)

E. De Cristofaro
A Secure and Privacy-Protecting Aggregation Scheme for Sensor Networks
8th IEEE Symposium on a World of Wireless, Mobile, and Multimedia Networks (WoWMoM 2007)

C. Blundo and E. De Cristofaro
A Bluetooth-based JXME infrastructure
International Symposium on Distributed Objects, Middleware, and Applications (DOA 2007)

V. Auletta, C. Blundo, E. De Cristofaro
A J2ME transparent middleware to support HTTP connections over Bluetooth
2nd IEEE Conference on Systems and Networks Communications (ICSNC 2007)

V. Auletta, C. Blundo, E. De Cristofaro, G. Raimato
A Lightweight Framework for Web Services Invocation over Bluetooth
14th IEEE International Conference on Web Services (ICWS 2006)

V. Auletta, C. Blundo, E. De Cristofaro, G. Raimato
Performance Evaluation of Web Services invocation over Bluetooth
9th ACM Conference on Modeling, Analysis, Simulation of Wireless and Mobile Systems (MSWiM 2006)