Browsing by Author "Van Goethem, Tom"
- Results per page
- Sort Options
Publication A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs
Proceedings paper2023, 32nd USENIX Security Symposium, AUG 09-11, 2023, p.3673-3690Publication A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints
;Le Pochat, Victor ;Van Hamme, Tim ;Maroofi, Sourena ;Van Goethem, TomPreuveneers, DavyProceedings paper2020, 27th Annual Network and Distributed System Security Symposium (NDSS), FEB 23-26, 2020Publication A smörgåsbord of typos: exploring international keyboard layout typosquatting
Proceedings paper2019, 4th International Workshop on Traffic Measurments for Cybersecurity, 25/05/2018, p.187-192Publication An Audit of Facebook's Political Ad Policy Enforcement
Proceedings paper2022, 31st USENIX Security Symposium, AUG 10-12, 2022, p.607-624Publication Automated feature extraction for website fingerprinting through deep learning
Journal article2017, CORR, p.1708.06376Publication Automated website fingerprinting through deep learning
Proceedings paper2018, Network and Distributed Systems Security - NDSS, 18/02/2018Publication Evaluating the long-term effects of parameters on the characteristics of the Tranco top sites ranking
Proceedings paper2019, 12th USENIX Workshop on Cyber Security Experimentation and Test, 12/08/2019Publication Exposing cookie policy flaws through an extensive evaluation of browsers and their extensions
Journal article2019, IEEE Security and Privacy Magazine, (17) 4, p.25-34Publication Helping hands: Measuring the impact of a large threat intelligence sharing community
;Bouwman, Xander ;Le Pochat, Victor ;Foremski, Pawel ;Van Goethem, TomGanan, Carlos H.Proceedings paper2022, 31st USENIX Security Symposium, AUG 10-12, 2022, p.1149-1165Publication Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting
;Tajalizadehkhoob, Samaneh ;Van Goethem, Tom ;Korczynski, MaciejNoroozian, ArmanProceedings paper2017, CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 30/10/2017, p.553-567Publication Idea: Visual analytics for web security
Proceedings paper2018, ESSoS 2018: Engineering Secure Software and Systems, 26/06/2018, p.124-132Publication Mobile friendly or attacker friendly?: A large-scale security evaluation of mobile-first websites
Proceedings paper2019, Asia CCS '19 Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 9/07/2019, p.206-2013Publication One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions
;Van Goethem, TomProceedings paper2017, 11th USENIX Workshop on Offensive Technologies - WOOT, 14/08/2017, p.1-12Publication Reading between the lines: An extensive evaluation of the security and privacy implications of EPUB reading systems
Proceedings paper2021, 2021 IEEE Symposium on Security and Privacy, 23/05/2021, p.247-264Publication Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection
Proceedings paper2023, 44th IEEE Security and Privacy Workshops (SPW), MAY 22-25, 2023, p.371-383Publication SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model
Proceedings paper2022, 17th ACM ASIA Conference on Computer and Communications Security 2022 (ACM ASIACCS), MAY 30-JUN 03, 2022, p.784-798Publication The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion
Proceedings paper2021, Privacy Enhancing Technologies Symposium - PETS, p.394-412Publication The Wolf of Name Street: Hijacking Domains Through Their Nameservers
Proceedings paper2017, CCS '17. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 30/10/2017, p.957-970Publication Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers
;Vanderlinden, Vik ;Van Goethem, TomVanhoef, MathyProceedings paper2024, 28th European Symposium on Research in Computer Security (ESORICS), SEP 25-29, 2023, p.3-22Publication Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections
Proceedings paper2020, 29th USENIX Security Symposium, AUG 12-14, 2020, p.1985-2002