Steven Van Acker
Steven Van Acker
Chalmers University of Technology
Email verificata su singularity.be - Home page
TitoloCitata daAnno
You are what you include: large-scale evaluation of remote javascript inclusions
N Nikiforakis, L Invernizzi, A Kapravelos, S Van Acker, W Joosen, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2412012
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications
P Agten, S Van Acker, Y Brondsema, PH Phung, L Desmet, F Piessens
Proceedings of the 28th Annual Computer Security Applications Conference, 1-10, 2012
902012
Webjail: Least-privilege integration of third-party components in web mashups
S Van Acker, P De Ryck, L Desmet, F Piessens, W Joosen
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
712011
FlashOver: Automated discovery of cross-site scripting vulnerabilities in rich internet applications
S Van Acker, N Nikiforakis, L Desmet, W Joosen, F Piessens
Proceedings of the 7th ACM symposium on information, computer and …, 2012
422012
Bitsquatting: Exploiting bit-flips for fun, or profit?
N Nikiforakis, S Van Acker, W Meert, L Desmet, F Piessens, W Joosen
Proceedings of the 22nd international conference on World Wide Web, 989-998, 2013
402013
Exposing the lack of privacy in file hosting services
N Nikiforakis, M Balduzzi, S Van Acker, W Joosen, D Balzarotti
Proceedings of the 4th USENIX conference on Large-scale exploits and …, 2011
292011
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets
S Van Acker, N Nikiforakis, L Desmet, F Piessens, W Joosen
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
282014
Discovering browser extensions via web accessible resources
A Sjösten, S Van Acker, A Sabelfeld
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
202017
ValueGuard: Protection of native applications against data-only buffer overflows
S Van Acker, N Nikiforakis, P Philippaerts, Y Younan, F Piessens
International Conference on Information Systems Security, 156-170, 2010
202010
Password meters and generators on the web: From large-scale empirical study to getting it right
S Van Acker, D Hausknecht, W Joosen, A Sabelfeld
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
142015
Measuring login webpage security
S Van Acker, D Hausknecht, A Sabelfeld
Proceedings of the Symposium on Applied Computing, 1753-1760, 2017
102017
Data Exfiltration in the Face of CSP
S Van Acker, D Hausknecht, A Sabelfeld
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
102016
Exploring the ecosystem of referrer-anonymizing services
N Nikiforakis, S Van Acker, F Piessens, W Joosen
International Symposium on Privacy Enhancing Technologies Symposium, 259-278, 2012
62012
Case study 2 Report: Secure Web Architectures
S Van Acker, L Desmet, S Farrell, M Johns, F Piessens, P De Ryck, ...
52015
LATEX GLOVES: Protecting browser extensions from probing and revelation attacks
A Sjösten, S Van Acker, P Picazo-Sanchez, A Sabelfeld
Power, 57, 2018
32018
JavaScript sandboxing: isolating and restricting client-side JavaScript
S Van Acker, A Sabelfeld
Foundations of Security Analysis and Design VIII, 32-86, 2016
32016
Isolating and Restricting Client-Side JavaScript
S Van Acker
32015
Raising the Bar: Evaluating Origin-wide Security Manifests
S Van Acker, D Hausknecht, A Sabelfeld
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
12018
Using SSL/TLS
T Herlea
2013
Protection of native applications against data-only buffer overflows
S Van Acker
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20