You are what you include: large-scale evaluation of remote javascript inclusions N Nikiforakis, L Invernizzi, A Kapravelos, S Van Acker, W Joosen, ... Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 392 | 2012 |
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications P Agten, S Van Acker, Y Brondsema, PH Phung, L Desmet, F Piessens Proceedings of the 28th Annual Computer Security Applications Conference, 1-10, 2012 | 140 | 2012 |
Bitsquatting: Exploiting bit-flips for fun, or profit? N Nikiforakis, S Van Acker, W Meert, L Desmet, F Piessens, W Joosen Proceedings of the 22nd international conference on World Wide Web, 989-998, 2013 | 101 | 2013 |
Webjail: Least-privilege integration of third-party components in web mashups S Van Acker, P De Ryck, L Desmet, F Piessens, W Joosen Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 95 | 2011 |
Discovering browser extensions via web accessible resources A Sjösten, S Van Acker, A Sabelfeld Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 80 | 2017 |
FlashOver: Automated discovery of cross-site scripting vulnerabilities in rich internet applications S Van Acker, N Nikiforakis, L Desmet, W Joosen, F Piessens Proceedings of the 7th ACM symposium on information, computer and …, 2012 | 56 | 2012 |
Measuring login webpage security S Van Acker, D Hausknecht, A Sabelfeld Proceedings of the Symposium on Applied Computing, 1753-1760, 2017 | 42 | 2017 |
Exposing the lack of privacy in file hosting services N Nikiforakis, M Balduzzi, S Van Acker, W Joosen, D Balzarotti Proceedings of the 4th USENIX conference on Large-scale exploits and …, 2011 | 39 | 2011 |
ValueGuard: Protection of native applications against data-only buffer overflows S Van Acker, N Nikiforakis, P Philippaerts, Y Younan, F Piessens Information Systems Security: 6th International Conference, ICISS 2010 …, 2010 | 31 | 2010 |
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets S Van Acker, N Nikiforakis, L Desmet, F Piessens, W Joosen Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 30 | 2014 |
Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks. A Sjösten, S Van Acker, P Picazo-Sanchez, A Sabelfeld NDSS, 2019 | 27 | 2019 |
Data Exfiltration in the Face of CSP S Van Acker, D Hausknecht, A Sabelfeld Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 24 | 2016 |
Password meters and generators on the web: From large-scale empirical study to getting it right S Van Acker, D Hausknecht, W Joosen, A Sabelfeld Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 21 | 2015 |
Javascript sandboxing: Isolating and restricting client-side javascript S Van Acker, A Sabelfeld Foundations of Security Analysis and Design VIII: FOSAD 2014/2015/2016 …, 2016 | 13 | 2016 |
Exploring the ecosystem of referrer-anonymizing services N Nikiforakis, S Van Acker, F Piessens, W Joosen Privacy Enhancing Technologies: 12th International Symposium, PETS 2012 …, 2012 | 8 | 2012 |
Raising the bar: Evaluating origin-wide security manifests S Van Acker, D Hausknecht, A Sabelfeld Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 6 | 2018 |
Case study 2 Report: Secure Web Architectures S Van Acker, L Desmet, S Farrell, M Johns, F Piessens, P De Ryck, ... | 4 | 2015 |
Isolating and Restricting Client-Side JavaScript S Van Acker PhD thesis, KU Leuven, 2015 | 2 | 2015 |
You are what you include N Nikiforakis, L Invernizzi, A Kapravelos, S Van Acker, W Joosen, ... Proceedings of the 2012 ACM conference on Computer and communications security, 2012 | 2 | 2012 |
Bitsquatting N Nikiforakis, S Van Acker, W Meert, L Desmet, F Piessens, W Joosen Proceedings of the 22nd international conference on World Wide Web, 2013 | 1 | 2013 |