Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

12 Angry Developers - A Qualitative Study on Developers' Struggles with CSP., , , , and . CCS, page 3085-3103. ACM, (2021)Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies., , , , and . NDSS, The Internet Society, (2020)Reduced parasite burden in feral honeybee colonies, , , , , , and . Ecological Solutions and Evidence, (July 2023)A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web., , , , and . USENIX Security Symposium, page 683-697. USENIX Association, (2020)Honey, I Cached our Security Tokens Re-usage of Security Tokens in the Wild., , and . RAID, page 714-726. ACM, (2023)The Security Lottery: Measuring Client-Side Web Security Inconsistencies., , , , and . USENIX Security Symposium, page 2047-2064. USENIX Association, (2022)To hash or not to hash: A security assessment of CSP's unsafe-hashes expression., , and . SP (Workshops), page 1-12. IEEE, (2022)ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices., , , , and . AsiaCCS, page 391-402. ACM, (2019)Assessing the Impact of Script Gadgets on CSP at Scale., , and . AsiaCCS, page 420-431. ACM, (2020)How to deploy security mechanisms online (consistently).. Saarland University, Saarbrücken, Germany, (2023)