Author of the publication

Spoiled Onions: Exposing Malicious Tor Exit Relays.

, , , , , , and . Privacy Enhancing Technologies, volume 8555 of Lecture Notes in Computer Science, page 304-331. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam., , , , and . IEEE Internet Comput., 15 (3): 28-34 (2011)Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications., , , , , , and . NDSS, The Internet Society, (2012)Exploiting social networking sites for spam., , , , and . ACM Conference on Computer and Communications Security, page 693-695. ACM, (2010)Cheap and automated socio-technical attacks based on social networking sites., , , and . AISec, page 61-64. ACM, (2010)An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata., , , , and . Electron. Mark., 24 (2): 113-124 (2014)Tor HTTP Usage and Information Leakage., , and . Communications and Multimedia Security, volume 6109 of Lecture Notes in Computer Science, page 245-255. Springer, (2010)Appinspect: large-scale evaluation of social networking apps., , , and . COSN, page 143-154. ACM, (2013)Covert computation: hiding code in code for obfuscation purposes., , , , , , and . AsiaCCS, page 529-534. ACM, (2013)SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting., , , , , and . ARES, page 255-261. IEEE Computer Society, (2013)Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems., , , and . ARES, page 174-179. IEEE Computer Society, (2015)