Author of the publication

We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy.

, , , , , and . NDSS, The Internet Society, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-layer Access Control for SDN-Based Telco Clouds, , , and . Secure IT Systems, Springer, (2015)SDN-Guard: Protecting SDN Controllers Against SDN Rootkits, , , , and . Third IEEE International Workshop on Security in NFV-SDN, (2017)More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models., , , , , and . CoRR, (2023)Be the Phisher - Understanding Users' Perception of Malicious Domains., , , and . AsiaCCS, page 263-276. ACM, (2020)Safety, Liveness, and Information Flow: Dependability Revisited., , , , and . ARCS Workshops, volume P-81 of LNI, page 56-65. GI, (2006)GRIMOIRE: Synthesizing Structure while Fuzzing., , , , , , and . USENIX Security Symposium, page 1985-2002. USENIX Association, (2019)AntiFuzz: Impeding Fuzzing Audits of Binary Executables., , , and . USENIX Security Symposium, page 1931-1947. USENIX Association, (2019)Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing., , , , , , , , and . USENIX Security Symposium, page 1239-1256. USENIX Association, (2022)Loki: Hardening Code Obfuscation Against Automated Attacks., , , , , , and . USENIX Security Symposium, page 3055-3073. USENIX Association, (2022)No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning., , , , , and . USENIX Security Symposium, page 5109-5126. USENIX Association, (2023)