Author of the publication

Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks.

, , , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 582-601. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites., , , , , and . ACM Conference on Computer and Communications Security, page 653-665. ACM, (2016)Poster: a path-cutting approach to blocking XSS worms in social web networks., , , and . ACM Conference on Computer and Communications Security, page 745-748. ACM, (2011)FlowCog: Context-Aware Semantic Extraction and Analysis of Information Flow Leaks in Android Apps., , , , , , and . IEEE Trans. Mob. Comput., 22 (11): 6460-6476 (November 2023)Rake: Semantics assisted network-based tracing framework., , , , and . IWQoS, page 1-9. IEEE, (2011)Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel., , , , , and . RAID, volume 8688 of Lecture Notes in Computer Science, page 276-298. Springer, (2014)CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph., , , , , , , and . NDSS, The Internet Society, (2023)PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation., , , , and . USENIX Security Symposium, page 1595-1612. USENIX Association, (2023)Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning., , , , , , and . USENIX Security Symposium, page 211-228. USENIX Association, (2023)Identity Confusion in WebView-based Mobile App-in-app Ecosystems., , , , , , , , and . USENIX Security Symposium, page 1597-1613. USENIX Association, (2022)Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability., , , , , , and . SP, page 1059-1076. IEEE, (2023)