Author of the publication

Revolver: An Automated Approach to the Detection of Evasive Web-based Malware.

, , , , and . USENIX Security Symposium, page 637-652. USENIX Association, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks., , , , and . ESORICS, volume 6345 of Lecture Notes in Computer Science, page 663-678. Springer, (2010)Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy., , , , , and . ISC, volume 13118 of Lecture Notes in Computer Science, page 161-176. Springer, (2021)Automatic Discovery of Emerging Browser Fingerprinting Techniques., and . WWW, page 2178-2188. ACM, (2023)ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions., , , , , , , , and . USENIX Security Symposium, page 6983-7000. USENIX Association, (2023)Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets., , , , and . USENIX Security Symposium, page 2507-2524. USENIX Association, (2021)Characterizing the Security of Github CI Workflows., , , , , , and . USENIX Security Symposium, page 2747-2763. USENIX Association, (2022)Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting., , , , , and . IEEE Symposium on Security and Privacy, page 541-555. IEEE Computer Society, (2013)You've Changed: Detecting Malicious Browser Extensions through their Update Deltas., , and . ACM Conference on Computer and Communications Security, page 477-491. ACM, (2020)There's No Trick, Its Just a Simple Trick: A Web-Compat and Privacy Improving Approach to Third-party Web Storage., , , , and . CoRR, (2020)PExy: The Other Side of Exploit Kits., , , , and . DIMVA, volume 8550 of Lecture Notes in Computer Science, page 132-151. Springer, (2014)