Author of the publication

Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities.

, , , , and . EuroS&P, page 528-543. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feature Partitioning for Robust Tree Ensembles and their Certification in Adversarial Scenarios., , , and . CoRR, (2020)Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery., , , , and . IEEE Secur. Priv., 18 (3): 8-16 (2020)Surviving the Web: A Journey into Web Session Security., , , and . ACM Comput. Surv., 50 (1): 13:1-13:34 (2017)Verifiable Learning for Robust Tree Ensembles., , , and . CCS, page 1850-1864. ACM, (2023)You Call This Archaeology? Evaluating Web Archives for Reproducible Web Security Measurements., , , , and . CCS, page 3168-3182. ACM, (2023)Surviving the Web: A Journey into Web Session Security., , , and . WWW (Companion Volume), page 451-455. ACM, (2018)Certifying Decision Trees Against Evasion Attacks by Program Analysis., , and . ESORICS (2), volume 12309 of Lecture Notes in Computer Science, page 421-438. Springer, (2020)Language-Based Web Session Integrity., , , , and . CSF, page 107-122. IEEE, (2020)Lintent: Towards Security Type-Checking of Android Applications., , and . FMOODS/FORTE, volume 7892 of Lecture Notes in Computer Science, page 289-304. Springer, (2013)Semantically Sound Analysis of Content Security Policies., , and . FORTE, volume 11535 of Lecture Notes in Computer Science, page 293-297. Springer, (2019)