Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation V Le Pochat, T Van Goethem, S Tajalizadehkhoob, M Korczyński, ... Proceedings of the 26th Network and Distributed System Security Symposium …, 2019 | 687 | 2019 |
Automated Website Fingerprinting through Deep Learning V Rimmer, D Preuveneers, M Juarez, T Van Goethem, W Joosen Proceedings of the 25th Network and Distributed System Security Symposium …, 2018 | 402 | 2018 |
The clock is still ticking: Timing attacks in the modern web T Van Goethem, W Joosen, N Nikiforakis Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 115 | 2015 |
It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services. MZ Rafique, T Van Goethem, W Joosen, C Huygens, N Nikiforakis NDSS, 2016 | 80 | 2016 |
Accelerometer-based device fingerprinting for multi-factor mobile authentication T Van Goethem, W Scheepers, D Preuveneers, W Joosen Engineering Secure Software and Systems: 8th International Symposium, ESSoS …, 2016 | 78 | 2016 |
Large-scale security analysis of the web: Challenges and findings T Van Goethem, P Chen, N Nikiforakis, L Desmet, W Joosen Proceedings of the 7th International Conference on Trust & Trustworthy …, 2014 | 78 | 2014 |
Maneuvering around clouds: Bypassing cloud-based security providers T Vissers, T Van Goethem, W Joosen, N Nikiforakis Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 74 | 2015 |
Who left open the cookie jar? A comprehensive evaluation of third-party cookie policies G Franken, T Van Goethem, W Joosen 27th USENIX Security Symposium (USENIX Security 18), 151-168, 2018 | 61 | 2018 |
The wolf of name street: Hijacking domains through their nameservers T Vissers, T Barron, T Van Goethem, W Joosen, N Nikiforakis Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 54 | 2017 |
Herding vulnerable cats: a statistical approach to disentangle joint responsibility for web security in shared hosting S Tajalizadehkhoob, T Van Goethem, M Korczyński, A Noroozian, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 47 | 2017 |
The cname of the game: Large-scale analysis of dns-based tracking evasion Y Dimova, G Acar, L Olejnik, W Joosen, T Van Goethem arXiv preprint arXiv:2102.09301, 2021 | 44 | 2021 |
Request and conquer: Exposing cross-origin resource size T Van Goethem, M Vanhoef, F Piessens, W Joosen 25th USENIX Security Symposium (USENIX Security 16), 447-462, 2016 | 42 | 2016 |
Timeless timing attacks: Exploiting concurrency to leak secrets over remote connections T Van Goethem, C Pöpper, W Joosen, M Vanhoef 29th USENIX Security Symposium (USENIX Security 20), 1985-2002, 2020 | 37 | 2020 |
An audit of Facebook's political ad policy enforcement V Le Pochat, L Edelson, T Van Goethem, W Joosen, D McCoy, T Lauinger 31st USENIX Security Symposium (USENIX Security 22), 607-624, 2022 | 36 | 2022 |
HEIST: HTTP Encrypted Information can be Stolen through TCP-windows M Vanhoef, T Van Goethem Black Hat USA, 2016 | 33 | 2016 |
Funny accents: Exploring genuine interest in internationalized domain names V Le Pochat, T Van Goethem, W Joosen Passive and Active Measurement: 20th International Conference, PAM 2019 …, 2019 | 27 | 2019 |
Helping hands: Measuring the impact of a large threat intelligence sharing community X Bouwman, V Le Pochat, P Foremski, T Van Goethem, CH Gañán, ... 31st USENIX Security Symposium (USENIX Security 22), 1149-1165, 2022 | 21 | 2022 |
A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints. V Le Pochat, Tim Van hamme, S Maroofi, T Van Goethem, D Preuveneers, ... NDSS, 2020 | 21 | 2020 |
Evaluating the long-term effects of parameters on the characteristics of the tranco top sites ranking V Le Pochat, T Van Goethem, W Joosen 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19), 2019 | 19 | 2019 |
Clubbing seals: Exploring the ecosystem of third-party security seals T Van Goethem, F Piessens, W Joosen, N Nikiforakis Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 18 | 2014 |