Zum Hauptinhalt springen

Showing 1–6 of 6 results for author: Vadrevu, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.04582  [pdf, other

    cs.DB

    The Ubiquitous Skiplist: A Survey of What Cannot be Skipped About the Skiplist and its Applications in Big Data Systems

    Authors: Venkata Sai Pavan Kumar Vadrevu, Lu Xing, Walid G. Aref

    Abstract: Skiplists have become prevalent in systems. The main advantages of skiplists are their simplicity and ease of implementation, and the ability to support operations in the same asymptotic complexities as their tree-based counterparts. In this survey, we explore skiplists and their many variants. We highlight many scenarios of how skiplists are useful and fit well in these usage scenarios. We study… ▽ More

    Submitted 22 May, 2024; v1 submitted 7 March, 2024; originally announced March 2024.

  2. arXiv:2401.09824  [pdf, other

    cs.CR

    Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams

    Authors: Bhupendra Acharya, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Hoang Dai Nguyen, Adam Oest, Phani Vadrevu, Thorsten Holz

    Abstract: The mainstream adoption of cryptocurrencies has led to a surge in wallet-related issues reported by ordinary users on social media platforms. In parallel, there is an increase in an emerging fraud trend called cryptocurrency-based technical support scam, in which fraudsters offer fake wallet recovery services and target users experiencing wallet-related issues. In this paper, we perform a compre… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

  3. arXiv:2401.05569  [pdf, other

    cs.CR cs.LG

    SENet: Visual Detection of Online Social Engineering Attack Campaigns

    Authors: Irfan Ozen, Karthika Subramani, Phani Vadrevu, Roberto Perdisci

    Abstract: Social engineering (SE) aims at deceiving users into performing actions that may compromise their security and privacy. These threats exploit weaknesses in human's decision making processes by using tactics such as pretext, baiting, impersonation, etc. On the web, SE attacks include attack classes such as scareware, tech support scams, survey scams, sweepstakes, etc., which can result in sensitive… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

  4. arXiv:2304.09983  [pdf

    cs.DB

    Tutorial: The Ubiquitous Skiplist, its Variants, and Applications in Modern Big Data Systems

    Authors: Venkata Sai Pavan Kumar Vadrevu, Lu Xing, Walid G. Aref

    Abstract: The Skiplist, or skip list, originally designed as an in-memory data structure, has attracted a lot of attention in recent years as a main-memory component in many NoSQL, cloud-based, and big data systems. Unlike the B-tree, the skiplist does not need complex rebalancing mechanisms, but it still shows expected logarithmic performance. It supports a variety of operations, including insert, point re… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

  5. arXiv:2107.14201  [pdf, other

    cs.CR

    A Study of Feasibility and Diversity of Web Audio Fingerprints

    Authors: Shekhar Chalise, Phani Vadrevu

    Abstract: Prior measurement studies on browser fingerprinting have unfortunately largely excluded Web Audio API-based fingerprinting in their analysis. We address this issue by conducting the first systematic study of effectiveness of web audio fingerprinting mechanisms. We focus on studying the feasibility and diversity properties of web audio fingerprinting. Along with 3 known audio fingerprinting vectors… ▽ More

    Submitted 29 July, 2021; originally announced July 2021.

    Comments: 15 pages, 21 figures

  6. Measuring Abuse in Web Push Advertising

    Authors: Karthika Subramani, Xingzi Yuan, Omid Setayeshfar, Phani Vadrevu, Kyu Hyung Lee, Roberto Perdisci

    Abstract: The rapid growth of online advertising has fueled the growth of ad-blocking software, such as new ad-blocking and privacy-oriented browsers or browser extensions. In response, both ad publishers and ad networks are constantly trying to pursue new strategies to keep up their revenues. To this end, ad networks have started to leverage the Web Push technology enabled by modern web browsers. As web… ▽ More

    Submitted 15 February, 2020; originally announced February 2020.

    Journal ref: IMC '20: ACM Internet Measurement Conference October, 2020