Browsing by author "Van Goethem, Tom"
Now showing items 1-20 of 23
-
A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs
Franken, Gertjan; Van Goethem, Tom; Desmet, Lieven; Joosen, Wouter (2023) -
A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints
Le Pochat, Victor; Van Hamme, Tim; Maroofi, Sourena; Van Goethem, Tom; Preuveneers, Davy; Duda, Andrzej; Korczynski, Maciej; Joosen, Wouter (2020) -
A smörgåsbord of typos: exploring international keyboard layout typosquatting
Le Pochat, Victor; Van Goethem, Tom; Joosen, Wouter (2019) -
An Audit of Facebook's Political Ad Policy Enforcement
Le Pochat, Victor; Edelson, Laura; Van Goethem, Tom; Joosen, Wouter; Mccoy, Damon; Lauinger, Tobias (2022) -
Automated feature extraction for website fingerprinting through deep learning
Rimmer, Vera; Preuveneers, Davy; Juarez, Marc; Van Goethem, Tom; Joosen, Wouter (2017) -
Automated website fingerprinting through deep learning
Rimmer, Vera; Preuveneers, Davy; Juarez, Marc; Van Goethem, Tom; Joosen, Wouter (2018) -
Evaluating the long-term effects of parameters on the characteristics of the Tranco top sites ranking
Le Pochat, Victor; Van Goethem, Tom; Joosen, Wouter (2019) -
Exposing cookie policy flaws through an extensive evaluation of browsers and their extensions
Franken, Gertjan; Van Goethem, Tom; Joosen, Wouter (2019) -
Helping hands: Measuring the impact of a large threat intelligence sharing community
Bouwman, Xander; Le Pochat, Victor; Foremski, Pawel; Van Goethem, Tom; Ganan, Carlos H.; Moura, Giovane C. M.; Tajalizadehkhoob, Samaneh; Joosen, Wouter; van Eeten, Michel (2022) -
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting
Tajalizadehkhoob, Samaneh; Van Goethem, Tom; Korczynski, Maciej; Noroozian, Arman; Boehme, Rainer; Moore, Tyler; Joosen, Wouter; Van Eeten, Michel (2017) -
Idea: Visual analytics for web security
Le Pochat, Victor; Van Goethem, Tom; Joosen, Wouter (2018) -
Mobile friendly or attacker friendly?: A large-scale security evaluation of mobile-first websites
Van Goethem, Tom; Le Pocat, Victor; Joosen, Wouter (2019) -
One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions
Van Goethem, Tom; Joosen, Wouter (2017) -
Reading between the lines: An extensive evaluation of the security and privacy implications of EPUB reading systems
Franken, Gertjan; Van Goethem, Tom; Joosen, Wouter (2021) -
Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection
Van Goethem, Tom; Sanchez-Rola, Iskander; Joosen, Wouter (2023) -
SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model
Van Goethem, Tom; Franken, Gertjan; Sanchez-Rola, Iskander; Dworken, David; Joosen, Wouter (2022) -
The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion
Dimova, Yana; Acar, Gunes; Olejnik, Lukasz; Joosen, Wouter; Van Goethem, Tom (2021) -
The Wolf of Name Street: Hijacking Domains Through Their Nameservers
Vissers, Thomas; Barro, Timothy; Van Goethem, Tom; Joosen, Wouter; Nikiforakis, Nick (2017) -
Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers
Vanderlinden, Vik; Van Goethem, Tom; Vanhoef, Mathy (2024) -
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections
Van Goethem, Tom; Popper, Christina; Joosen, Wouter; Vanhoef, Mathy (2020)