Author of the publication

JSMeter: Comparing the Behavior of JavaScript Benchmarks with Real Web Applications

, , and . Proceedings of the 2010 USENIX Conference on Web Application Development, Berkeley, CA, USA, USENIX Association, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Saving Money While Polling with InterPoll Using Power Analysis., and . HCOMP, AAAI, (2014)RePriv: Re-imagining Content Personalization and In-browser Privacy., and . IEEE Symposium on Security and Privacy, page 131-146. IEEE Computer Society, (2011)MoRePriv: mobile OS support for application personalization and privacy., , and . ACSAC, page 236-245. ACM, (2014)The Anatomy of a Cryptocurrency Pump-and-Dump Scheme., and . CoRR, (2018)Evaluating the End-User Experience of Private Browsing Mode., and . CoRR, (2018)Finding Malware on a Web Scale.. MMM-ACNS, volume 7531 of Lecture Notes in Computer Science, page 1-2. Springer, (2012)SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser., , , , , , , and . IEEE Symposium on Security and Privacy, page 431-446. IEEE Computer Society, (2015)When the Signal is in the Noise: Exploiting Diffix's Sticky Noise., , , , and . USENIX Security Symposium, page 1081-1098. USENIX Association, (2019)The Anatomy of a Cryptocurrency Pump-and-Dump Scheme., and . USENIX Security Symposium, page 1609-1625. USENIX Association, (2019)Kizzle: A Signature Compiler for Detecting Exploit Kits., , and . DSN, page 455-466. IEEE Computer Society, (2016)