Author of the publication

Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.

, , , , , , , , , , , and . IEEE Symposium on Security and Privacy, page 151-167. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hiding in Plain Site: Detecting JavaScript Obfuscation through Concealed Browser API Usage., , and . Internet Measurement Conference, page 648-661. ACM, (2020)CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing., , , , , , , , , and 3 other author(s). IEEE Secur. Priv., 20 (2): 10-21 (2022)Revolver: An Automated Approach to the Detection of Evasive Web-based Malware., , , , and . USENIX Security Symposium, page 637-652. USENIX Association, (2013)Mininode: Reducing the Attack Surface of Node.js Applications., and . RAID, page 121-134. USENIX Association, (2020)Towards Realistic and ReproducibleWeb Crawl Measurements., , , , , , , and . WWW, page 80-91. ACM / IW3C2, (2021)SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations., , , and . EuroS&P, page 555-571. IEEE, (2022)You've Changed: Detecting Malicious Browser Extensions through their Update Deltas., , and . ACM Conference on Computer and Communications Security, page 477-491. ACM, (2020)There's No Trick, Its Just a Simple Trick: A Web-Compat and Privacy Improving Approach to Third-party Web Storage., , , , and . CoRR, (2020)PExy: The Other Side of Exploit Kits., , , , and . DIMVA, volume 8550 of Lecture Notes in Computer Science, page 132-151. Springer, (2014)S3C2 Summit 2023-02: Industry Secure Supply Chain Summit., , , , , , and . CoRR, (2023)