Seguir
Tom Van Goethem
Tom Van Goethem
KU Leuven & Google
Dirección de correo verificada de cs.kuleuven.be - Página principal
Título
Citado por
Citado por
Año
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation
V Le Pochat, T Van Goethem, S Tajalizadehkhoob, M Korczyński, ...
Proceedings of the 26th Network and Distributed System Security Symposium …, 2019
6202019
Automated Website Fingerprinting through Deep Learning
V Rimmer, D Preuveneers, M Juarez, T Van Goethem, W Joosen
Proceedings of the 25th Network and Distributed System Security Symposium …, 2018
3712018
The clock is still ticking: Timing attacks in the modern web
T Van Goethem, W Joosen, N Nikiforakis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1152015
Large-scale security analysis of the web: Challenges and findings
T Van Goethem, P Chen, N Nikiforakis, L Desmet, W Joosen
Proceedings of the 7th International Conference on Trust & Trustworthy …, 2014
762014
It's free for a reason: Exploring the ecosystem of free live streaming services
MZ Rafique, T Van Goethem, W Joosen, C Huygens, N Nikiforakis
Proceedings of the 23rd Network and Distributed System Security Symposium …, 2016
742016
Accelerometer-based device fingerprinting for multi-factor mobile authentication
T Van Goethem, W Scheepers, D Preuveneers, W Joosen
Engineering Secure Software and Systems: 8th International Symposium, ESSoS …, 2016
722016
Maneuvering around clouds: Bypassing cloud-based security providers
T Vissers, T Van Goethem, W Joosen, N Nikiforakis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
722015
Who left open the cookie jar? A comprehensive evaluation of third-party cookie policies
G Franken, T Van Goethem, W Joosen
27th USENIX Security Symposium (USENIX Security 18), 151-168, 2018
592018
The wolf of name street: Hijacking domains through their nameservers
T Vissers, T Barron, T Van Goethem, W Joosen, N Nikiforakis
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
462017
Herding vulnerable cats: a statistical approach to disentangle joint responsibility for web security in shared hosting
S Tajalizadehkhoob, T Van Goethem, M Korczyński, A Noroozian, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
422017
Request and conquer: Exposing cross-origin resource size
T Van Goethem, M Vanhoef, F Piessens, W Joosen
25th USENIX Security Symposium (USENIX Security 16), 447-462, 2016
422016
The cname of the game: Large-scale analysis of dns-based tracking evasion
Y Dimova, G Acar, L Olejnik, W Joosen, T Van Goethem
arXiv preprint arXiv:2102.09301, 2021
392021
Timeless timing attacks: Exploiting concurrency to leak secrets over remote connections
T Van Goethem, C Pöpper, W Joosen, M Vanhoef
29th USENIX Security Symposium (USENIX Security 20), 1985-2002, 2020
352020
HEIST: HTTP Encrypted Information can be Stolen through TCP-windows
M Vanhoef, T Van Goethem
Black Hat USA, 2016
302016
An audit of Facebook's political ad policy enforcement
V Le Pochat, L Edelson, T Van Goethem, W Joosen, D McCoy, T Lauinger
31st USENIX Security Symposium (USENIX Security 22), 607-624, 2022
272022
Funny accents: Exploring genuine interest in internationalized domain names
V Le Pochat, T Van Goethem, W Joosen
Passive and Active Measurement: 20th International Conference, PAM 2019 …, 2019
232019
A practical approach for taking down avalanche botnets under real-world constraints
V Le Pochat, S Maroofi, T Van Goethem, D Preuveneers, A Duda, ...
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
182020
Helping hands: Measuring the impact of a large threat intelligence sharing community
X Bouwman, V Le Pochat, P Foremski, T Van Goethem, CH Gañán, ...
31st USENIX Security Symposium (USENIX Security 22), 1149-1165, 2022
172022
Exposing cookie policy flaws through an extensive evaluation of browsers and their extensions
G Franken, T Van Goethem, W Joosen
IEEE Security & Privacy 17 (4), 25-34, 2019
172019
Clubbing seals: Exploring the ecosystem of third-party security seals
T Van Goethem, F Piessens, W Joosen, N Nikiforakis
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
172014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20