Personensuche
X
?
2023 IEEE Symposium on Security and Privacy (SP) ,
2
The Leaky Web: Automated Discovery of Cross-Site Informatio..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
4
You Call This Archaeology? Evaluating Web Archives for Repr..:
, In:
?
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses ,
5
Honey, I Cached our Security Tokens Re-usage of Security To..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
6
Freely Given Consent? : Studying Consent Notice of Third..:
, In:
?
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P) ,
7
Hand Sanitizers in the Wild: A Large-scale Study of Custom ..:
, In:
?
Proceedings of the 22nd ACM Internet Measurement Conference ,
8
HTML violations and where to find them : a longitudinal ..:
, In:
?
2022 IEEE Security and Privacy Workshops (SPW) ,
9
To hash or not to hash: A security assessment of CSP's unsa..:
, In:
?
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security ,
10
Careful Who You Trust: Studying the Pitfalls of Cross-Origi..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
11
12 Angry Developers - A Qualitative Study on Developers' St..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
12
DoubleX: Statically Detecting Vulnerable Data Flows in Brow..:
, In:
?
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) ,
13
SecWeb 2020 Preface:
, In:
?
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security ,
14
Assessing the Impact of Script Gadgets on CSP at Scale:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
15