Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure multi-execution of web scripts: Theory and practice., , , and . Journal of Computer Security, 22 (4): 469-509 (2014)Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse., , , and . NDSS, The Internet Society, (2015)Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers., , , , , , and . WWW, page 319-328. ACM, (2018)A Dangerous Mix: Large-Scale Analysis of Mixed-Content Websites., , , and . ISC, volume 7807 of Lecture Notes in Computer Science, page 354-363. Springer, (2013)Exploring the Ecosystem of Referrer-Anonymizing Services., , , and . Privacy Enhancing Technologies, volume 7384 of Lecture Notes in Computer Science, page 259-278. Springer, (2012)RIPE: runtime intrusion prevention evaluator., , , , and . ACSAC, page 41-50. ACM, (2011)Serene: Self-Reliant Client-Side Protection against Session Fixation., , , , and . DAIS, volume 7272 of Lecture Notes in Computer Science, page 59-72. Springer, (2012)FPDetective: dusting the web for fingerprinters., , , , , , and . ACM Conference on Computer and Communications Security, page 1129-1140. ACM, (2013)TabShots: client-side detection of tabnabbing attacks., , , and . AsiaCCS, page 447-456. ACM, (2013)Hello rootKitty: A lightweight invariance-enforcing framework., , , and . CoRR, (2014)