Skip to main content

Showing 1–12 of 12 results for author: Lykousas, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.01899  [pdf, other

    cs.CR cs.AI cs.SE

    The potential of LLM-generated reports in DevSecOps

    Authors: Nikolaos Lykousas, Vasileios Argyropoulos, Fran Casino

    Abstract: Alert fatigue is a common issue faced by software teams using the DevSecOps paradigm. The overwhelming number of warnings and alerts generated by security and code scanning tools, particularly in smaller teams where resources are limited, leads to desensitization and diminished responsiveness to security warnings, potentially exposing systems to vulnerabilities. This paper explores the potential o… ▽ More

    Submitted 2 October, 2024; originally announced October 2024.

    Comments: Published in AIESE 2024 (International Conference on AI empowered Software Engineering)

  2. arXiv:2404.19715  [pdf, other

    cs.CR

    Assessing LLMs in Malicious Code Deobfuscation of Real-world Malware Campaigns

    Authors: Constantinos Patsakis, Fran Casino, Nikolaos Lykousas

    Abstract: The integration of large language models (LLMs) into various pipelines is increasingly widespread, effectively automating many manual tasks and often surpassing human capabilities. Cybersecurity researchers and practitioners have recognised this potential. Thus, they are actively exploring its applications, given the vast volume of heterogeneous data that requires processing to identify anomalies,… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  3. arXiv:2307.00892  [pdf, other

    cs.SE cs.CR

    Tales from the Git: Automating the detection of secrets on code and assessing developers' passwords choices

    Authors: Nikolaos Lykousas, Constantinos Patsakis

    Abstract: Typical users are known to use and reuse weak passwords. Yet, as cybersecurity concerns continue to rise, understanding the password practices of software developers becomes increasingly important. In this work, we examine developers' passwords on public repositories. Our dedicated crawler collected millions of passwords from public GitHub repositories; however, our focus is on their unique charac… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

    Comments: Presented at DevSecOps Research and Opportunities @ IEEE EuroS&P 2023

  4. arXiv:2303.12429  [pdf, other

    cs.CR

    Man vs the machine: The Struggle for Effective Text Anonymisation in the Age of Large Language Models

    Authors: Constantinos Patsakis, Nikolaos Lykousas

    Abstract: The collection and use of personal data are becoming more common in today's data-driven culture. While there are many advantages to this, including better decision-making and service delivery, it also poses significant ethical issues around confidentiality and privacy. Text anonymisation tries to prune and/or mask identifiable information from a text while keeping the remaining content intact to a… ▽ More

    Submitted 22 March, 2023; originally announced March 2023.

  5. arXiv:2105.11805  [pdf, other

    cs.CR

    The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces

    Authors: Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis

    Abstract: Cybercrime is continuously growing in numbers and becoming more sophisticated. Currently, there are various monetisation and money laundering methods, creating a huge, underground economy worldwide. A clear indicator of these activities is online marketplaces which allow cybercriminals to trade their stolen assets and services. While traditionally these marketplaces are available through the dark… ▽ More

    Submitted 25 May, 2021; originally announced May 2021.

  6. arXiv:2103.16143  [pdf, other

    cs.CR

    Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents

    Authors: Fran Casino, Nikolaos Totosis, Theodoros Apostolopoulos, Nikolaos Lykousas, Constantinos Patsakis

    Abstract: Many malware campaigns use Microsoft (MS) Office documents as droppers to download and execute their malicious payload. Such campaigns often use these documents because MS Office is installed in billions of devices and that these files allow the execution of arbitrary VBA code. Recent versions of MS Office prevent the automatic execution of VBA macros, so malware authors try to convince users into… ▽ More

    Submitted 30 March, 2021; originally announced March 2021.

  7. arXiv:2009.11952  [pdf, other

    cs.SI

    Inside the x-rated world of "premium" social media accounts

    Authors: Nikolaos Lykousas, Fran Casino, Constantinos Patsakis

    Abstract: During the last few years, there has been an upsurge of social media influencers who are part of the adult entertainment industry, referred to as Performers. To monetize their online presence, Performers often engage in practices which violate community guidelines of social media, such as selling subscriptions for accessing their private "premium" social media accounts, where they distribute adult… ▽ More

    Submitted 24 September, 2020; originally announced September 2020.

    Comments: Accepted in SocInfo 2020

  8. Intercepting Hail Hydra: Real-Time Detection of Algorithmically Generated Domains

    Authors: Fran Casino, Nikolaos Lykousas, Ivan Homoliak, Constantinos Patsakis, Julio Hernandez-Castro

    Abstract: A crucial technical challenge for cybercriminals is to keep control over the potentially millions of infected devices that build up their botnets, without compromising the robustness of their attacks. A single, fixed C&C server, for example, can be trivially detected either by binary or traffic analysis and immediately sink-holed or taken-down by security researchers or law enforcement. Botnets of… ▽ More

    Submitted 2 August, 2021; v1 submitted 6 August, 2020; originally announced August 2020.

    Comments: The dataset of this paper can be found in https://zenodo.org/record/3965397

    Journal ref: Journal of Network and Computer Applications 190 (2021): 103135

  9. arXiv:2004.08205  [pdf, other

    cs.SI cs.CL

    Large-scale analysis of grooming in modern social networks

    Authors: Nikolaos Lykousas, Constantinos Patsakis

    Abstract: Social networks are evolving to engage their users more by providing them with more functionalities. One of the most attracting ones is streaming. Users may broadcast part of their daily lives to thousands of others world-wide and interact with them in real-time. Unfortunately, this feature is reportedly exploited for grooming. In this work, we provide the first in-depth analysis of this problem f… ▽ More

    Submitted 16 April, 2020; originally announced April 2020.

    Comments: Pre-print. Under Review. arXiv admin note: text overlap with arXiv:1911.08370 by other authors

  10. arXiv:1912.03552  [pdf, other

    cs.CR

    Unravelling Ariadne's Thread: Exploring the Threats of Decentalised DNS

    Authors: Constantinos Patsakis, Fran Casino, Nikolaos Lykousas, Vasilios Katos

    Abstract: The current landscape of the core Internet technologies shows considerable centralisation with the big tech companies controlling the vast majority of traffic and services. This has sparked a wide range of decentralisation initiatives with perhaps the most profound and successful being the blockchain technology. In the past years, a core Internet infrastructure, domain name system (DNS), is being… ▽ More

    Submitted 7 December, 2019; originally announced December 2019.

  11. arXiv:1901.04856  [pdf, other

    cs.SI cs.HC

    Sharing emotions at scale: The Vent dataset

    Authors: Nikolaos Lykousas, Costantinos Patsakis, Andreas Kaltenbrunner, Vicenç Gómez

    Abstract: The continuous and increasing use of social media has enabled the expression of human thoughts, opinions, and everyday actions publicly at an unprecedented scale. We present the Vent dataset, the largest annotated dataset of text, emotions, and social connections to date. It comprises more than 33 millions of posts by nearly a million of users together with their social connections. Each post has… ▽ More

    Submitted 24 March, 2019; v1 submitted 15 January, 2019; originally announced January 2019.

    Comments: 9 pages, 12 figures, 2 tables. Accepted at the 13th International AAAI Conference on Web and Social Media (ICWSM 2019)

  12. arXiv:1806.10577  [pdf, other

    cs.SI

    Adult content in Social Live Streaming Services: Characterizing deviant users and relationships

    Authors: Nikolaos Lykousas, Vicenç Gómez, Constantinos Patsakis

    Abstract: Social Live Stream Services (SLSS) exploit a new level of social interaction. One of the main challenges in these services is how to detect and prevent deviant behaviors that violate community guidelines. In this work, we focus on adult content production and consumption in two widely used SLSS, namely Live.me and Loops Live, which have millions of users producing massive amounts of video content… ▽ More

    Submitted 27 June, 2018; originally announced June 2018.

    Comments: 8 pages, 4 figures, 5 tables. IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining