Author of the publication

Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms.

, , and . Proc. Priv. Enhancing Technol., 2016 (1): 20-33 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring and mitigating AS-level adversaries against Tor., , , , and . CoRR, (2015)Short Paper - Taming the Shape Shifter: Detecting Anti-fingerprinting Browsers., , , and . DIMVA, volume 12223 of Lecture Notes in Computer Science, page 160-170. Springer, (2020)Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits., , , and . CCS, page 36-50. ACM, (2021)Dial One for Scam: Analyzing and Detecting Technical Support Scams., , and . CoRR, (2016)Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting., , , , and . USENIX Security Symposium, page 1679-1696. USENIX Association, (2019)Dial One for Scam: A Large-Scale Analysis of Technical Support Scams., , and . NDSS, The Internet Society, (2017)Web Runner 2049: Evaluating Third-Party Anti-bot Services., , , and . DIMVA, volume 12223 of Lecture Notes in Computer Science, page 135-159. Springer, (2020)Innocent Until Proven Guilty (IUPG): Building Deep Learning Models with Embedded Robustness to Out-Of-Distribution Content., , , and . SP (Workshops), page 49-55. IEEE, (2021)Detecting Malicious Campaigns in Obfuscated JavaScript with Scalable Behavioral Analysis., , and . IEEE Symposium on Security and Privacy Workshops, page 218-223. IEEE, (2019)On the Privacy Practices of Just Plain Sites., , , , and . WPES@CCS, page 1-10. ACM, (2015)