Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hiding in Plain Site: Detecting JavaScript Obfuscation through Concealed Browser API Usage., , and . Internet Measurement Conference, page 648-661. ACM, (2020)CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing., , , , , , , , , and 3 other author(s). IEEE Secur. Priv., 20 (2): 10-21 (2022)Towards Realistic and ReproducibleWeb Crawl Measurements., , , , , , , and . WWW, page 80-91. ACM / IW3C2, (2021)Mininode: Reducing the Attack Surface of Node.js Applications., and . RAID, page 121-134. USENIX Association, (2020)Revolver: An Automated Approach to the Detection of Evasive Web-based Malware., , , , and . USENIX Security Symposium, page 637-652. USENIX Association, (2013)SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations., , , and . EuroS&P, page 555-571. IEEE, (2022)Manifest V3 Unveiled: Navigating the New Era of Browser Extensions., and . CoRR, (2024)Escape from Monkey Island: Evading High-Interaction Honeyclients., , , and . DIMVA, volume 6739 of Lecture Notes in Computer Science, page 124-143. Springer, (2011)Measuring the Privacy vs. Compatibility Trade-off in Preventing Third-Party Stateful Tracking., , , , and . WWW, page 710-720. ACM, (2022)Cookie Swap Party: Abusing First-Party Cookies for Web Tracking., , , and . WWW, page 2117-2129. ACM / IW3C2, (2021)