Marco Squarcina

According to our database1, Marco Squarcina authored at least 15 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Cookie Crumbles: Breaking and Fixing Web Session Integrity.
Proceedings of the 32nd USENIX Security Symposium, 2023

WebSpec: Towards Machine-Checked Analysis of Browser Security Mechanisms.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
WebSpec: Towards Machine-Checked Analysis of Browser Security Mechanisms.
CoRR, 2022

2021
Can I Take Your Subdomain? Exploring Same-Site Attacks in the Modern Web.
Proceedings of the 30th USENIX Security Symposium, 2021

The Remote on the Local: Exacerbating Web Attacks Via Service Workers Caches.
Proceedings of the IEEE Security and Privacy Workshops, 2021

2020
Can I Take Your Subdomain? Exploring Related-Domain Attacks in the Modern Web.
CoRR, 2020

2019
Gathering of robots in a ring with mobile faults.
Theor. Comput. Sci., 2019

Postcards from the Post-HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring.
Proceedings of the 27th USENIX Security Symposium, 2018

Mind Your Keys? A Security Evaluation of Java Keystores.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Analysis and prevention of security threats in web and cryptographic applications.
PhD thesis, 2017

Surviving the Web: A Journey into Web Session Security.
ACM Comput. Surv., 2017

Run-Time Attack Detection in Cryptographic APIs.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
Gathering of Robots in a Ring with Mobile Faults.
Proceedings of the 17th Italian Conference on Theoretical Computer Science, 2016

2012
Gran: Model Checking Grsecurity RBAC Policies.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012


  Loading...