Author of the publication

Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies.

, , and . USENIX Security Symposium, page 679-694. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies., , and . USENIX Security Symposium, page 679-694. USENIX Association, (2017)Scamdog Millionaire: Detecting E-commerce Scams in the Wild., , , , and . ACSAC, page 29-43. ACM, (2023)The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services., , and . WWW, page 1251-1260. ACM, (2017)Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control., , , , , , and . AsiaCCS, page 340-351. ACM, (2019)SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model., , , , and . AsiaCCS, page 784-798. ACM, (2022)Tracking Users Like There is No Tomorrow: Privacy on the Current Internet., , , and . CISIS-ICEUTE, volume 369 of Advances in Intelligent Systems and Computing, page 473-483. Springer, (2015)Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships., , , , and . SP, page 1990-2004. IEEE, (2022)BakingTimer: privacy analysis of server-side request processing time., , and . ACSAC, page 478-488. ACM, (2019)Knockin' on Trackers' Door: Large-Scale Automatic Analysis of Web Tracking., and . DIMVA, volume 10885 of Lecture Notes in Computer Science, page 281-302. Springer, (2018)Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web., , , , and . WWW, page 395-406. ACM / IW3C2, (2020)