Repository logo Institutional repository
  • Communities & Collections
  • Scientific publicationsOpen knowledge
Search repository
High contrast
  1. Home
  2. Browse by Author

Browsing by Author "Van Goethem, Tom"

Filter results by typing the first few letters
Now showing 1 - 20 of 23
  • Results per page
  • Sort Options
  • Loading...
    Thumbnail Image
    Publication

    A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs

    Franken, Gertjan
    ;
    Van Goethem, Tom
    ;
    Desmet, Lieven
    ;
    Joosen, Wouter  
    Proceedings paper
    2023, 32nd USENIX Security Symposium, AUG 09-11, 2023, p.3673-3690
  • Loading...
    Thumbnail Image
    Publication

    A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints

    Le Pochat, Victor
    ;
    Van Hamme, Tim
    ;
    Maroofi, Sourena
    ;
    Van Goethem, Tom
    ;
    Preuveneers, Davy
    Proceedings paper
    2020, 27th Annual Network and Distributed System Security Symposium (NDSS), FEB 23-26, 2020
  • Loading...
    Thumbnail Image
    Publication

    A smörgåsbord of typos: exploring international keyboard layout typosquatting

    Le Pochat, Victor
    ;
    Van Goethem, Tom
    ;
    Joosen, Wouter  
    Proceedings paper
    2019, 4th International Workshop on Traffic Measurments for Cybersecurity, 25/05/2018, p.187-192
  • Loading...
    Thumbnail Image
    Publication

    An Audit of Facebook's Political Ad Policy Enforcement

    Le Pochat, Victor
    ;
    Edelson, Laura
    ;
    Van Goethem, Tom
    ;
    Joosen, Wouter  
    ;
    Mccoy, Damon
    Proceedings paper
    2022, 31st USENIX Security Symposium, AUG 10-12, 2022, p.607-624
  • Loading...
    Thumbnail Image
    Publication

    Automated feature extraction for website fingerprinting through deep learning

    Rimmer, Vera
    ;
    Preuveneers, Davy
    ;
    Juarez, Marc
    ;
    Van Goethem, Tom
    ;
    Joosen, Wouter  
    Journal article
    2017, CORR, p.1708.06376
  • Loading...
    Thumbnail Image
    Publication

    Automated website fingerprinting through deep learning

    Rimmer, Vera
    ;
    Preuveneers, Davy
    ;
    Juarez, Marc
    ;
    Van Goethem, Tom
    ;
    Joosen, Wouter  
    Proceedings paper
    2018, Network and Distributed Systems Security - NDSS, 18/02/2018
  • Loading...
    Thumbnail Image
    Publication

    Evaluating the long-term effects of parameters on the characteristics of the Tranco top sites ranking

    Le Pochat, Victor
    ;
    Van Goethem, Tom
    ;
    Joosen, Wouter  
    Proceedings paper
    2019, 12th USENIX Workshop on Cyber Security Experimentation and Test, 12/08/2019
  • Loading...
    Thumbnail Image
    Publication

    Exposing cookie policy flaws through an extensive evaluation of browsers and their extensions

    Franken, Gertjan
    ;
    Van Goethem, Tom
    ;
    Joosen, Wouter  
    Journal article
    2019, IEEE Security and Privacy Magazine, (17) 4, p.25-34
  • Loading...
    Thumbnail Image
    Publication

    Helping hands: Measuring the impact of a large threat intelligence sharing community

    Bouwman, Xander
    ;
    Le Pochat, Victor
    ;
    Foremski, Pawel
    ;
    Van Goethem, Tom
    ;
    Ganan, Carlos H.
    Proceedings paper
    2022, 31st USENIX Security Symposium, AUG 10-12, 2022, p.1149-1165
  • Loading...
    Thumbnail Image
    Publication

    Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting

    Tajalizadehkhoob, Samaneh
    ;
    Van Goethem, Tom
    ;
    Korczynski, Maciej
    ;
    Noroozian, Arman
    Proceedings paper
    2017, CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 30/10/2017, p.553-567
  • Loading...
    Thumbnail Image
    Publication

    Idea: Visual analytics for web security

    Le Pochat, Victor
    ;
    Van Goethem, Tom
    ;
    Joosen, Wouter  
    Proceedings paper
    2018, ESSoS 2018: Engineering Secure Software and Systems, 26/06/2018, p.124-132
  • Loading...
    Thumbnail Image
    Publication

    Mobile friendly or attacker friendly?: A large-scale security evaluation of mobile-first websites

    Van Goethem, Tom
    ;
    Le Pocat, Victor
    ;
    Joosen, Wouter  
    Proceedings paper
    2019, Asia CCS '19 Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 9/07/2019, p.206-2013
  • Loading...
    Thumbnail Image
    Publication

    One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions

    Van Goethem, Tom
    ;
    Joosen, Wouter  
    Proceedings paper
    2017, 11th USENIX Workshop on Offensive Technologies - WOOT, 14/08/2017, p.1-12
  • Loading...
    Thumbnail Image
    Publication

    Reading between the lines: An extensive evaluation of the security and privacy implications of EPUB reading systems

    Franken, Gertjan
    ;
    Van Goethem, Tom
    ;
    Joosen, Wouter  
    Proceedings paper
    2021, 2021 IEEE Symposium on Security and Privacy, 23/05/2021, p.247-264
  • Loading...
    Thumbnail Image
    Publication

    Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection

    Van Goethem, Tom
    ;
    Sanchez-Rola, Iskander
    ;
    Joosen, Wouter  
    Proceedings paper
    2023, 44th IEEE Security and Privacy Workshops (SPW), MAY 22-25, 2023, p.371-383
  • Loading...
    Thumbnail Image
    Publication

    SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model

    Van Goethem, Tom
    ;
    Franken, Gertjan
    ;
    Sanchez-Rola, Iskander
    ;
    Dworken, David
    ;
    Joosen, Wouter  
    Proceedings paper
    2022, 17th ACM ASIA Conference on Computer and Communications Security 2022 (ACM ASIACCS), MAY 30-JUN 03, 2022, p.784-798
  • Loading...
    Thumbnail Image
    Publication

    The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion

    Dimova, Yana
    ;
    Acar, Gunes
    ;
    Olejnik, Lukasz
    ;
    Joosen, Wouter  
    ;
    Van Goethem, Tom
    Proceedings paper
    2021, Privacy Enhancing Technologies Symposium - PETS, p.394-412
  • Loading...
    Thumbnail Image
    Publication

    The Wolf of Name Street: Hijacking Domains Through Their Nameservers

    Vissers, Thomas
    ;
    Barro, Timothy
    ;
    Van Goethem, Tom
    ;
    Joosen, Wouter  
    ;
    Nikiforakis, Nick
    Proceedings paper
    2017, CCS '17. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 30/10/2017, p.957-970
  • Loading...
    Thumbnail Image
    Publication

    Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers

    Vanderlinden, Vik
    ;
    Van Goethem, Tom
    ;
    Vanhoef, Mathy
    Proceedings paper
    2024, 28th European Symposium on Research in Computer Security (ESORICS), SEP 25-29, 2023, p.3-22
  • Loading...
    Thumbnail Image
    Publication

    Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections

    Van Goethem, Tom
    ;
    Popper, Christina
    ;
    Joosen, Wouter  
    ;
    Vanhoef, Mathy
    Proceedings paper
    2020, 29th USENIX Security Symposium, AUG 12-14, 2020, p.1985-2002
  • «
  • 1 (current)
  • 2
  • »

Follow imec on

VimeoLinkedInFacebook

The repository

  • Contact us
  • Policy
  • About imec
Privacy statement | Cookie settings