Author of the publication

The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions.

, , , , and . USENIX Security Symposium, page 717-733. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stranger danger: exploring the ecosystem of ad-based URL shortening services., , , , , , , , and . WWW, page 51-62. ACM, (2014)You've Changed: Detecting Malicious Browser Extensions through their Update Deltas., , and . ACM Conference on Computer and Communications Security, page 477-491. ACM, (2020)Short Paper - Taming the Shape Shifter: Detecting Anti-fingerprinting Browsers., , , and . DIMVA, volume 12223 of Lecture Notes in Computer Science, page 160-170. Springer, (2020)Domains Do Change Their Spots: Quantifying Potential Abuse of Residual Trust., , , and . SP, page 2130-2144. IEEE, (2022)Why allowing profile name reuse is a bad idea., , , , , , and . EUROSEC, page 3:1-3:6. ACM, (2016)AnimateDead: Debloating Web Applications Using Concolic Execution., , , , and . USENIX Security Symposium, page 5575-5591. USENIX Association, (2023)The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions., , , , and . USENIX Security Symposium, page 717-733. USENIX Association, (2022)Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits., , , and . CCS, page 36-50. ACM, (2021)You are what you include: large-scale evaluation of remote javascript inclusions., , , , , , , and . CCS, page 736-747. ACM, (2012)Hello rootKitty: A Lightweight Invariance-Enforcing Framework., , , and . ISC, volume 7001 of Lecture Notes in Computer Science, page 213-228. Springer, (2011)