Author of the publication

Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks.

, , , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 582-601. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SpellBound: Defending Against Package Typosquatting., , , , and . CoRR, (2020)Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security., , , , and . AsiaCCS, page 8-9. ACM, (2012)Understanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface., , , , , , and . IEEE Trans. Mob. Comput., 17 (11): 2675-2688 (2018)WebShield: Enabling Various Web Defense Techniques without Client Side Modifications., , , , , , and . NDSS, The Internet Society, (2011)Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks., , , , and . EuroS&P, page 480-495. IEEE, (2019)Measurements in OLPC mesh networks., , and . WiOpt, page 1-6. IEEE, (2009)AppsPlayground: automatic security analysis of smartphone applications., , and . CODASPY, page 209-220. ACM, (2013)Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android., , , , and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 256-276. Springer, (2015)Redefining web browser principals with a Configurable Origin Policy., , , , and . DSN, page 1-12. IEEE Computer Society, (2013)All your Google and Facebook logins are belong to us: A case for single sign-off., and . IC3, page 416-421. IEEE Computer Society, (2015)