Author of the publication

Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting.

, , , , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (2): 1334-1349 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Incentivized Mobile App Installs on Google Play Store., , , , , and . Internet Measurement Conference, page 696-709. ACM, (2020)Blind In/On-Path Attacks and Applications to VPNs., , , , and . USENIX Security Symposium, page 3129-3146. USENIX Association, (2021)Log: It's Big, It's Heavy, It's Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem., , , , , , and . USENIX Security Symposium, page 2115-2132. USENIX Association, (2023)Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API., , and . EuroS&P, page 832-846. IEEE, (2023)Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting., , , , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (2): 1334-1349 (2021)Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls., , , , , , , , and . CoRR, (2023)Challenges in inferring privacy properties of smart devices: towards scalable multi-vantage point testing methods., , , , , , , and . StudentWorkshop@CoNEXT, page 26-28. ACM, (2022)In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes., , , , , , , , , and 1 other author(s). IMC, page 437-456. ACM, (2023)Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls., , , , , , , , , and . ICWSM, page 1082-1095. AAAI Press, (2024)An Analysis of Pre-installed Android Software., , , , and . CoRR, (2019)