Author of the publication

Redefining web browser principals with a Configurable Origin Policy.

, , , , and . DSN, page 1-12. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel., , , , , and . RAID, volume 8688 of Lecture Notes in Computer Science, page 276-298. Springer, (2014)Rake: Semantics assisted network-based tracing framework., , , , and . IWQoS, page 1-9. IEEE, (2011)Poster: a path-cutting approach to blocking XSS worms in social web networks., , , and . ACM Conference on Computer and Communications Security, page 745-748. ACM, (2011)CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites., , , , , and . ACM Conference on Computer and Communications Security, page 653-665. ACM, (2016)FlowCog: Context-Aware Semantic Extraction and Analysis of Information Flow Leaks in Android Apps., , , , , , and . IEEE Trans. Mob. Comput., 22 (11): 6460-6476 (November 2023)CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph., , , , , , , and . NDSS, The Internet Society, (2023)Identity Confusion in WebView-based Mobile App-in-app Ecosystems., , , , , , , , and . USENIX Security Symposium, page 1597-1613. USENIX Association, (2022)PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation., , , , and . USENIX Security Symposium, page 1595-1612. USENIX Association, (2023)Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning., , , , , , and . USENIX Security Symposium, page 211-228. USENIX Association, (2023)Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability., , , , , , and . SP, page 1059-1076. IEEE, (2023)