Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Lucky Onwuzurike is active.

Publication


Featured researches published by Lucky Onwuzurike.


wireless network security | 2015

Danger is my middle name: experimenting with SSL vulnerabilities in Android apps

Lucky Onwuzurike; Emiliano De Cristofaro

This paper presents a measurement study of information leakage and SSL vulnerabilities in popular Android apps. We perform static and dynamic analysis on 100 apps, downloaded at least 10M times, that request full network access. Our experiments show that, although prior work has drawn a lot of attention to SSL implementations on mobile platforms, several popular apps (32/100) accept all certificates and all hostnames, and four actually transmit sensitive data unencrypted. We set up an experimental testbed simulating man-in-the-middle attacks and find that many apps (up to 91% when the adversary has a certificate installed on the victims device) are vulnerable, allowing the attacker to access sensitive information, including credentials, files, personal details, and credit card numbers. Finally, we provide a few recommendations to app developers and highlight several open research problems.


arXiv: Cryptography and Security | 2017

Measuring, Characterizing, and Detecting Facebook Like Farms

Muhammad Ikram; Lucky Onwuzurike; Shehroze Farooqi; Emiliano De Cristofaro; Arik Friedman; Guillaume Jourjon; Mohammed Ali Kaafar; M. Zubair Shafiq

Online social networks offer convenient ways to reach out to large audiences. In particular, Facebook pages are increasingly used by businesses, brands, and organizations to connect with multitudes of users worldwide. As the number of likes of a page has become a de-facto measure of its popularity and profitability, an underground market of services artificially inflating page likes (“like farms”) has emerged alongside Facebook’s official targeted advertising platform. Nonetheless, besides a few media reports, there is little work that systematically analyzes Facebook pages’ promotion methods. Aiming to fill this gap, we present a honeypot-based comparative measurement study of page likes garnered via Facebook advertising and from popular like farms. First, we analyze likes based on demographic, temporal, and social characteristics and find that some farms seem to be operated by bots and do not really try to hide the nature of their operations, while others follow a stealthier approach, mimicking regular users’ behavior. Next, we look at fraud detection algorithms currently deployed by Facebook and show that they do not work well to detect stealthy farms that spread likes over longer timespans and like popular pages to mimic regular users. To overcome their limitations, we investigate the feasibility of timeline-based detection of like farm accounts, focusing on characterizing content generated by Facebook accounts on their timelines as an indicator of genuine versus fake social activity. We analyze a wide range of features extracted from timeline posts, which we group into two main categories: lexical and non-lexical. We find that like farm accounts tend to re-share content more often, use fewer words and poorer vocabulary, and more often generate duplicate comments and likes compared to normal users. Using relevant lexical and non-lexical features, we build a classifier to detect like farms accounts that achieves a precision higher than 99% and a 93% recall.


wireless network security | 2016

POSTER: Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps

Lucky Onwuzurike; Emiliano De Cristofaro

As social networking takes to the mobile world, smartphone apps provide users with ever-changing ways to interact with each other. Over the past couple of years, an increasing number of apps have entered the market offering end-to-end encryption, self-destructing messages, or some degree of anonymity. However, little work thus far has examined the properties they offer. We present a taxon- omy of 18 of these apps: we first look at the features they promise in their appeal to broaden their reach and focus on 8 of the more popular ones. We present a technical evaluation, based on static and dynamic analysis, and identify a number of gaps between the claims and reality of their promises.


network and distributed system security symposium | 2017

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models.

Enrico Mariconti; Lucky Onwuzurike; Panagiotis Andriotis; Emiliano De Cristofaro; Gordon J. Ross; Gianluca Stringhini


arXiv: Social and Information Networks | 2015

Combating Fraud in Online Social Networks: Detecting Stealthy Facebook Like Farms

Muhammad Ikram; Lucky Onwuzurike; Shehroze Farooqi; Emiliano De Cristofaro; Arik Friedman; Guillaume Jourjon; Mohammad Ali Kaafar; M. Zubair Shafiq


arXiv: Cryptography and Security | 2015

Experimental Analysis of Popular Smartphone Apps Offering Anonymity, Ephemerality, and End-to-End Encryption

Lucky Onwuzurike; Emiliano De Cristofaro


arXiv: Cryptography and Security | 2018

A Family of Droids -- Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis

Lucky Onwuzurike; Mario Almeida; Enrico Mariconti; Jeremy Blackburn; Gianluca Stringhini; Emiliano De Cristofaro


arXiv: Cryptography and Security | 2018

A Family of Droids: Analyzing Behavioral Model based Android Malware Detection via Static and Dynamic Analysis.

Lucky Onwuzurike; Mario Almeida; Enrico Mariconti; Jeremy Blackburn; Gianluca Stringhini; Emiliano De Cristofaro


Archive | 2017

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version).

Lucky Onwuzurike; Enrico Mariconti; Panagiotis Andriotis; Emiliano De Cristofaro; Gordon J. Ross; Gianluca Stringhini


arXiv: Social and Information Networks | 2015

Spying on Spammers: Tracking Like Farm Accounts on Facebook.

Muhammad Ikram; Lucky Onwuzurike; Emiliano De Cristofaro; Arik Friedman; Guillaume Jourjon; Mohamed Ali Kâafar; M. Zubair Shafiq

Collaboration


Dive into the Lucky Onwuzurike's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Muhammad Ikram

Commonwealth Scientific and Industrial Research Organisation

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge