Author of the publication

Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense.

, , and . NDSS, The Internet Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Just awful enough: the functional dysfunction of the something awful forums., , , and . CHI, page 2407-2410. ACM, (2014)Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains., , , , , and . IEEE Secur. Priv., 15 (2): 70-77 (2017)Connected Colors: Unveiling the Structure of Criminal Networks., , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 390-410. Springer, (2013)Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains., , , , , and . IEEE Symposium on Security and Privacy, page 691-706. IEEE Computer Society, (2016)Still Beheading Hydras: Botnet Takedowns Then and Now., , and . IEEE Trans. Dependable Secur. Comput., 14 (5): 535-549 (2017)Understanding the Privacy Implications of ECS - (Extended Abstract)., , , , and . DIMVA, volume 9721 of Lecture Notes in Computer Science, page 343-353. Springer, (2016)Understanding the prevalence and use of alternative plans in malware with network games., , , and . ACSAC, page 1-10. ACM, (2011)Automated remote repair for mobile malware., , and . ACSAC, page 413-422. ACM, (2011)Towards designing effective visualizations for DNS-based network threat analysis., , and . VizSEC, page 1-8. IEEE Computer Society, (2017)MalwareVis: entity-based visualization of malware network traces., and . VizSEC, page 41-47. ACM, (2012)