Jeremiah Onaolapo

Jeremiah Onaolapo

ku.ca.lcu.sc TA opaloanO.J


University College London
Dept. of Computer Science
Gower Street, London WC1E 6BT
United Kingdom

Research interests

Honeypots, malicious activity in online accounts, social network security, online scams, botnet activity, et al.

About me

I am a PhD student under the supervision of Gianluca Stringhini in the Information Security Group of the Computer Science department at University College London (UCL). Before joining UCL, I was in the Department of Electrical and Information Engineering at Covenant University, Nigeria.

In addition to my research tasks, I assist Gianluca Stringhini and Emiliano De Cristofaro in lab sessions for Computer Security II, a module in the UCL MSc in Information Security degree. In the past, I also Nicolas Courtois in Applied Cryptography lab sessions. I co-supervise some student projects alongside Gianluca, the main supervisor.

On the arty side of things, I enjoy sketching and doodling interesting subjects, like this pine cone, Aladdin's lamp, and this vintage microphone. I also sketched a comic panel for a cybersecurity visualization competition.

Recent publications

Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effect on the Web. Gabriel Emile Hine, Jeremiah Onaolapo, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Riginos Samaras, Gianluca Stringhini, Jeremy Blackburn. ICWSM 2017, Montreal.
[PDF] [Blog]

All Your Cards Are Belong To Us: Understanding Online Carding Forums. Andreas Haslebacher, Jeremiah Onaolapo, Gianluca Stringhini. eCrime 2017, Scottsdale.
[PDF]

What's in a Name? Understanding Profile Name Reuse on Twitter. Enrico Mariconti, Jeremiah Onaolapo, Sharique Ahmad, Nicolas Nikiforou, Manuel Egele, Nick Nikiforakis, Gianluca Stringhini. WWW 2017, Perth.
[PDF]

Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable. Gibson Mba, Jeremiah Onaolapo, Gianluca Stringhini, Lorenzo Cavallaro. WWW CyberSafety Workshop 2017, Perth.
[PDF]

What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild. Jeremiah Onaolapo, Enrico Mariconti, Gianluca Stringhini. IMC 2016, Santa Monica.
[PDF] [Blog] [Slides] [Code]

What's your major threat? On the differences between the network behavior of targeted and commodity malware. Enrico Mariconti, Jeremiah Onaolapo, Gordon Ross, Gianluca Stringhini. ARES WMA 2016, Salzburg.
[PDF]

Honey Sheets: What Happens To Leaked Google Spreadsheets? Martin Lazarov, Jeremiah Onaolapo, Gianluca Stringhini. USENIX CSET 2016, Austin.
[PDF] [Slides]

Why Allowing Profile Name Reuse Is A Bad Idea. Enrico Mariconti, Jeremiah Onaolapo, Syed Sharique Ahmad, Nicolas Nikiforou, Manuel Egele, Nick Nikiforakis, Gianluca Stringhini. EUROSEC 2016, London.
[PDF]

Harvesting Wild Honey from Webmail Beehives. Jeremiah Onaolapo, Enrico Mariconti, Gianluca Stringhini. ESSoSDS 2016, London.
[PDF]

A Methodology To Assess Malware Causality In Network Activities. Enrico Mariconti, Jeremiah Onaolapo, Gordon Ross, Gianluca Stringhini. ESSoSDS 2016, London.
[PDF]

Technical reports

A Longitudinal Measurement Study of 4chan's Politically Incorrect Forum and Its Effect on the Web Gabriel Emile Hine, Jeremiah Onaolapo, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Riginos Samaras, Gianluca Stringhini, Jeremy Blackburn. arXiv preprint:1610.03452, 2016, Online.
[PDF] [Blog]