Search for persons
X
?
2023 IEEE Symposium on Security and Privacy (SP) ,
1
The Leaky Web: Automated Discovery of Cross-Site Informatio..:
, In:
?
Proceedings of the 39th Annual Computer Security Applications Conference ,
2
From Attachments to SEO: Click Here to Learn More about Cli..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
3
It's (DOM) Clobbering Time: Attack Techniques, Prevalence, ..:
, In:
?
4
Detection of Intrusions and Malware, and Vulnerability Asse..
Lecture Notes in Computer Science, 13358
?
2022 IEEE Symposium on Security and Privacy (SP) ,
5
The State of the SameSite: Studying the Usage, Effectivenes..:
, In:
?
24th International Symposium on Research in Attacks, Intrusions and Defenses ,
6
Where We Stand (or Fall): An Analysis of CSRF Defenses in W..:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
7
Black Widow: Blackbox Data-driven Web Scanning:
, In:
?
2020 IEEE Symposium on Security and Privacy (SP) ,
9
Automatic Uncovering of Hidden Behaviors From Input Validat..:
, In:
?
Proceedings of the 35th Annual ACM Symposium on Applied Computing ,
10
Raccoon : automated verification of guarded race conditi..:
, In:
?
2020 IEEE Security and Privacy Workshops (SPW) ,
11
SentiNet: Detecting Localized Universal Attacks Against Dee..:
, In:
?
2019 IEEE Symposium on Security and Privacy (SP) ,
12
Fidelius: Protecting User Secrets from Compromised Browsers:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
13
AdVersarial : Perceptual Ad Blocking meets Adversarial M..:
, In:
?
2018 IEEE European Symposium on Security and Privacy (EuroS&P) ,
14
Formally Reasoning about the Cost and Efficacy of Securing ..:
, In:
?
Proceedings of the 26th International Conference on World Wide Web ,
15