Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks., , , and . NDSS, The Internet Society, (2019)Measuring login webpage security., , and . SAC, page 1753-1760. ACM, (2017)You are what you include: large-scale evaluation of remote javascript inclusions., , , , , , , and . CCS, page 736-747. ACM, (2012)Discovering Browser Extensions via Web Accessible Resources., , and . CODASPY, page 329-336. ACM, (2017)FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications., , , , and . AsiaCCS, page 12-13. ACM, (2012)Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right., , , and . CODASPY, page 253-262. ACM, (2015)Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets., , , , and . AsiaCCS, page 525-530. ACM, (2014)Exposing the Lack of Privacy in File Hosting Services., , , , and . LEET, USENIX Association, (2011)Isolating and Restricting Client-Side JavaScript ; Isoleren en beperken van JavaScript aan de cliëntzijde.. Katholieke Universiteit Leuven, Belgium, (2015)base-search.net (ftunivleuven:oai:lirias.kuleuven.be:123456789/472918).Bitsquatting: exploiting bit-flips for fun, or profit?, , , , , and . WWW, page 989-998. International World Wide Web Conferences Steering Committee / ACM, (2013)