Tom Van Goethem
Tom Van Goethem
Email verificata su cs.kuleuven.be - Home page
TitoloCitata daAnno
Automated Website Fingerprinting through Deep Learning
V Rimmer, D Preuveneers, M Juarez, T Van Goethem, W Joosen
Proceedings of the 25th Network and Distributed System Security Symposiumá…, 2018
58*2018
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation
V Le Pochat, T Van Goethem, S Tajalizadehkhoob, M Korczyński, ...
Proceedings of the 26th Network and Distributed System Security Symposiumá…, 2019
49*2019
The clock is still ticking: Timing attacks in the modern web
T Van Goethem, W Joosen, N Nikiforakis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communicationsá…, 2015
492015
Large-scale security analysis of the web: Challenges and findings
T Van Goethem, P Chen, N Nikiforakis, L Desmet, W Joosen
Proceedings of the 7th International Conference on Trust & Trustworthyá…, 2014
452014
Maneuvering around clouds: Bypassing cloud-based security providers
T Vissers, T Van Goethem, W Joosen, N Nikiforakis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communicationsá…, 2015
392015
Accelerometer-based device fingerprinting for multi-factor mobile authentication
T Van Goethem, W Scheepers, D Preuveneers, W Joosen
International Symposium on Engineering Secure Software and Systems, 106-121, 2016
342016
It's free for a reason: Exploring the ecosystem of free live streaming services
MZ Rafique, T Van Goethem, W Joosen, C Huygens, N Nikiforakis
Proceedings of the 23rd Network and Distributed System Security Symposiumá…, 2016
232016
Request and conquer: Exposing cross-origin resource size
T Van Goethem, M Vanhoef, F Piessens, W Joosen
25th USENIX Security Symposium (USENIX Security 16), 447-462, 2016
152016
Herding vulnerable cats: a statistical approach to disentangle joint responsibility for web security in shared hosting
S Tajalizadehkhoob, T Van Goethem, M Korczyński, A Noroozian, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communicationsá…, 2017
142017
The wolf of name street: Hijacking domains through their nameservers
T Vissers, T Barron, T Van Goethem, W Joosen, N Nikiforakis
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communicationsá…, 2017
142017
Who left open the cookie jar? A comprehensive evaluation of third-party cookie policies
G Franken, T Van Goethem, W Joosen
27th USENIX Security Symposium (USENIX Security 18), 151-168, 2018
132018
Clubbing seals: Exploring the ecosystem of third-party security seals
T Van Goethem, F Piessens, W Joosen, N Nikiforakis
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communicationsá…, 2014
132014
HEIST: HTTP Encrypted Information can be Stolen through TCP-windows
M Vanhoef, T Van Goethem
Black Hat USA, 2016
92016
Funny accents: Exploring genuine interest in internationalized domain names
V Le Pochat, T Van Goethem, W Joosen
International Conference on Passive and Active Network Measurement, 178-194, 2019
62019
One side-channel to bring them all and in the darkness bind them: Associating isolated browsing sessions
T Van Goethem, W Joosen
11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017
32017
Towards visual analytics for web security data
V Le Pochat, T Van Goethem, W Joosen
Passive and Active Measurement (PAM), 2018
22018
Mobile Friendly or Attacker Friendly? A Large-scale Security Evaluation of Mobile-first Websites
T Van Goethem, V Le Pochat, W Joosen
Proceedings of the 2019 ACM Asia Conference on Computer and Communicationsá…, 2019
12019
A Sm÷rgňsbord of Typos: Exploring International Keyboard Layout Typosquatting
V Le Pochat, T Van Goethem, W Joosen
2019 IEEE Security and Privacy Workshops (SPW), 187-192, 2019
12019
Evaluating the long-term effects of parameters on the characteristics of the Tranco top sites ranking
V Le Pochat, T Van Goethem, W Joosen
12th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 19), 2019
12019
A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints
V Le Pochat, S Maroofi, T Van Goethem, D Preuveneers, A Duda, ...
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2020
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20