Certified lies: Detecting and defeating government interception attacks against SSL (short paper) C Soghoian, S Stamm International Conference on Financial Cryptography and Data Security, 250-259, 2011 | 336 | 2011 |
Reining in the web with content security policy S Stamm, B Sterne, G Markham Proceedings of the 19th international conference on World wide web, 921-930, 2010 | 305 | 2010 |
Invasive browser sniffing and countermeasures M Jakobsson, S Stamm Proceedings of the 15th international conference on World Wide Web, 523-532, 2006 | 134 | 2006 |
Drive-by pharming S Stamm, Z Ramzan, M Jakobsson Indiana University Technical Report TR641, http://www. symantec. com …, 2006 | 130 | 2006 |
Combating click fraud via premium clicks A Juels, S Stamm, M Jakobsson Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, 1-10, 2007 | 69 | 2007 |
Fighting unicode-obfuscated spam C Liu, S Stamm Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007 | 54 | 2007 |
Web camouflage: Protecting your clients from browser-sniffing attacks M Jakobsson, S Stamm IEEE Security and Privacy 5 (6), 16-24, 2007 | 33 | 2007 |
Implementing Trusted Terminals with a and SITDRM S Stamm, NP Sheppard, R Safavi-Naini Electronic Notes in Theoretical Computer Science 197 (1), 73-85, 2008 | 22 | 2008 |
Injecting csp for fun and security C Kerschbaumer, S Stamm, S Brunthaler Proceedings of the 2nd International Conference on Information Systems …, 2016 | 15 | 2016 |
Mixed nuts: atypical classroom techniques for computer science courses S Stamm Crossroads 10 (4), 3-3, 2004 | 14 | 2004 |
Phishing for clues: Inferring context using cascading style sheets and browser history M Jakobsson, T Jagatic, S Stamm www. browser-recon. info, 2007 | 12 | 2007 |
Handbook of Financial Cryptography and Security M Belenkiy, F Brandt, A Kiayias, J Zhou, MT Dashti, S Mauw, ... | 11* | |
Contextual Identity: Freedom to be All Your Selves M Chew, S Stamm | 8 | 2013 |
Practice & prevention of home-router mid-stream injection attacks S Myers, S Stamm 2008 eCrime Researchers Summit, 1-14, 2008 | 6 | 2008 |
Phishing for clues M Jakobsson, TN Jagatic, S Stamm www. browser-recon. info, 2008 | 6 | 2008 |
Anticipating and hardening the web against socio-technical security attacks SL Stamm Indiana University, 2009 | 5 | 2009 |
Phishing for clues: Inferring context using cascading style sheets and browser history, 2005 M Jakobsson, T Jagatic, S Stamm Referenced, 2005 | 5 | 2005 |
How things Work and Fail M Jakobsson, J Hodges, A Steingruebl, J Caballero, A Barth, D Song, ... The Death of the Internet, 57-168, 2012 | 4 | 2012 |
Privacy-Preserving Polling using Playing Cards. S Stamm, M Jakobsson IACR Cryptology ePrint Archive 2005, 444, 2005 | 4 | 2005 |
JavaScript Breaks Free M Jakobsson, Z Ramzan, S Stamm | 4* | |