Is this your profile?
Claim your Citation Index profile in order to display more information about you and gain access to Libraries services. Just create or connect your ORCID iD.
2023 journal article
WRIT: Web Request Integrity and Attestation Against Malicious Browser Extensions
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 21(4), 3082–3095.
2022 article
Measuring the Privacy vs. Compatibility Trade-off in Preventing Third-Party Stateful Tracking
PROCEEDINGS OF THE ACM WEB CONFERENCE 2022 (WWW'22), pp. 710–720.
2022 article
SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations
2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), pp. 555–571.
2022 article
yoU aRe a Liar://A Unified Framework for Cross-Testing URL Parsers
2022 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2022), pp. 51–58.
2021 article
Browserprint: An Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy
INFORMATION SECURITY (ISC 2021), Vol. 13118, pp. 161–176.
2021 article
Cookie Swap Party: Abusing First-PartyCookies for Web Tracking
PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021), pp. 2117–2129.
2021 article
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing
Zhang, P., Oest, A., Cho, H., Sun, Z., Johnson, R. C., Wardman, B., … Ahn, G.-J. (2021, December 10). IEEE SECURITY & PRIVACY.
2021 article
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases
28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021).
2021 article
Towards Realistic and Reproducible Web Crawl Measurements
PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021), pp. 80–91.
2019 article
Unnecessarily Identifiable: Quantifying the fingerprintability of browser extensions due to bloat
WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019), pp. 3244–3250.
2019 article
VisibleV8: In-browser Monitoring of JavaScript in the Wild
IMC'19: PROCEEDINGS OF THE 2019 ACM INTERNET MEASUREMENT CONFERENCE, pp. 393–405.
2019 article
Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions
DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT (DIMVA 2019), Vol. 11543, pp. 3–22.
2018 article
Mystique: Uncovering Information Leakage from Browser Extensions
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), pp. 1687–1700.
2016 article
Cloak of Visibility: Detecting When Machines Browse A Different Web
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 743–758.
2014 chapter
PExy: The Other Side of Exploit Kits
In Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 132–151).
2011 chapter
Escape from Monkey Island: Evading High-Interaction Honeyclients
In Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 124–143).
2010 chapter
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
In Computer Security – ESORICS 2010 (pp. 663–678).
2009 chapter
FleXConf: A Flexible Conference Assistant Using Context-Aware Notification Services
In Lecture Notes in Computer Science (pp. 108–117).
2009 chapter
Realistic Passive Packet Loss Measurement for High-Speed Networks
In Traffic Monitoring and Analysis (pp. 1–7).
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.