Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Discovery of Emerging Browser Fingerprinting Techniques., and . WWW, page 2178-2188. ACM, (2023)ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions., , , , , , , , and . USENIX Security Symposium, page 6983-7000. USENIX Association, (2023)Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets., , , , and . USENIX Security Symposium, page 2507-2524. USENIX Association, (2021)Characterizing the Security of Github CI Workflows., , , , , , and . USENIX Security Symposium, page 2747-2763. USENIX Association, (2022)Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy., , , , , and . ISC, volume 13118 of Lecture Notes in Computer Science, page 161-176. Springer, (2021)D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks., , , , and . ESORICS, volume 6345 of Lecture Notes in Computer Science, page 663-678. Springer, (2010)Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting., , , , , and . IEEE Symposium on Security and Privacy, page 541-555. IEEE Computer Society, (2013)Introduction to the ACSAC'19 Special Issue - Vol. 2., , , , , and . DTRAP, 2 (1): 1:1-1:2 (2021)Escape from Monkey Island: Evading High-Interaction Honeyclients., , , and . DIMVA, volume 6739 of Lecture Notes in Computer Science, page 124-143. Springer, (2011)Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions., and . DIMVA, volume 11543 of Lecture Notes in Computer Science, page 3-22. Springer, (2019)
OSZAR »