Publications

SocialHEISTing: Understanding Stolen Facebook Accounts. Jeremiah Onaolapo, Nektarios Leontiadis, Despoina Magka, Gianluca Stringhini. USENIX Security 2021, Vancouver, B.C., Canada.
[Paper]

Master of Sheets: A Tale of Compromised Cloud Documents. Jeremiah Onaolapo, Martin Lazarov, Gianluca Stringhini. EuroS&P WACCO 2019, Stockholm, Sweden.
[Paper] [Slides]

Under and Over the Surface: A Comparison of the Use of Leaked Account Credentials in the Dark and Surface Web. Adrian Bermudez Villalva, Jeremiah Onaolapo, Gianluca Stringhini, Mirco Musolesi. Crime Science Journal 2018.
[Paper]

BABELTOWER: How Language Affects Criminal Activity in Stolen Webmail Accounts. Emeric Bernard-Jones, Jeremiah Onaolapo, Gianluca Stringhini. TheWebConf (WWW) CyberSafety 2018, Lyon, France.
[Paper] [Slides]

The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity. Enrico Mariconti, Jeremiah Onaolapo, Gordon Ross, Gianluca Stringhini. USENIX CSET 2017, Vancouver, Canada.
[Paper]

Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effect on the Web. Gabriel Emile Hine, Jeremiah Onaolapo, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Riginos Samaras, Gianluca Stringhini, Jeremy Blackburn. ICWSM 2017, Montreal, Canada.
/* Best paper nominee */
[Paper] [Blog] /// Press coverage: Sky News, MIT Technology Review, Nature, The Conversation, BoingBoing, The New European, BoingBoing, La Repubblica, Ansa, La Repubblica, Motherboard, The Independent, La Stampa, Motherboard, Pacific Standard.

All Your Cards Are Belong to Us: Understanding Online Carding Forums. Andreas Haslebacher, Jeremiah Onaolapo, Gianluca Stringhini. eCrime 2017, Scottsdale, USA.
/* Best paper award */
[Paper] [Blog] [Slides]

What's in a Name? Understanding Profile Name Reuse on Twitter. Enrico Mariconti, Jeremiah Onaolapo, Sharique Ahmad, Nicolas Nikiforou, Manuel Egele, Nick Nikiforakis, Gianluca Stringhini. TheWebConf (WWW) 2017, Perth, Australia.
[Paper]

Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable. Gibson Mba, Jeremiah Onaolapo, Gianluca Stringhini, Lorenzo Cavallaro. TheWebConf (WWW) CyberSafety 2017, Perth, Australia.
[Paper] [Slides]

What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild. Jeremiah Onaolapo, Enrico Mariconti, Gianluca Stringhini. IMC 2016, Santa Monica, USA.
/* CSAW Europe 2017 finalist */
[Paper] [Blog] [Slides] [Code] [Dataset] /// Press coverage: BBC News, Huffington Post, The State of Security, Breachful.

What's Your Major Threat? On the Differences Between the Network Behavior of Targeted and Commodity Malware. Enrico Mariconti, Jeremiah Onaolapo, Gordon Ross, Gianluca Stringhini. ARES WMA 2016, Salzburg, Austria.
[Paper] [Dataset]

Honey Sheets: What Happens to Leaked Google Spreadsheets? Martin Lazarov, Jeremiah Onaolapo, Gianluca Stringhini. USENIX CSET 2016, Austin, USA.
[Paper] [Slides] [Dataset]

Why Allowing Profile Name Reuse Is a Bad Idea. Enrico Mariconti, Jeremiah Onaolapo, Syed Sharique Ahmad, Nicolas Nikiforou, Manuel Egele, Nick Nikiforakis, Gianluca Stringhini. EUROSEC 2016, London, UK.
[Paper]

Harvesting Wild Honey from Webmail Beehives. Jeremiah Onaolapo, Enrico Mariconti, Gianluca Stringhini. ESSoSDS 2016, London, UK.
[Paper]

A Methodology to Assess Malware Causality in Network Activities. Enrico Mariconti, Jeremiah Onaolapo, Gordon Ross, Gianluca Stringhini. ESSoSDS 2016, London, UK.
[Paper]


PhD Thesis

Honeypot Boulevard: Understanding Malicious Activity via Decoy Accounts. Jeremiah Onaolapo. University College London (UCL), 2019.
[Thesis]