Nataliia Bielova

Orcid: 0009-0005-0616-8394

Affiliations:
  • Cóte d'Azur University, France
  • INRIA, France


According to our database1, Nataliia Bielova authored at least 46 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Feedback to the European Data Protection Board's Guidelines 2/2023 on Technical Scope of Art. 5(3) of ePrivacy Directive.
CoRR, 2024

2023
Google Tag Manager: Hidden Data Leaks and its Potential Violations under EU Data Protection Law.
CoRR, 2023

An Ontology of Dark Patterns Knowledge: Foundations, Definitions, and a Pathway for Shared Knowledge-Building.
CoRR, 2023

Temporal Analysis of Dark Patterns: A Case Study of a User's Odyssey to Conquer Prime Membership Cancellation through the "Iliad Flow".
CoRR, 2023

Towards a Preliminary Ontology of Dark Patterns Knowledge.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
On dark patterns and manipulation of website publishers by CMPs.
Proc. Priv. Enhancing Technol., 2022

My Cookie is a phoenix: detection, measurement, and lawfulness of cookie respawning with browser fingerprinting.
Proc. Priv. Enhancing Technol., 2022

2021
Did I delete my cookies? Cookies respawning with browser fingerprinting.
CoRR, 2021

In-Depth Technical and Legal Analysis of Tracking on Health Related Websites with ERNIE Extension.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

Dark Patterns and the Legal Requirements of Consent Banners: An Interaction Criticism Perspective.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Consent Management Platforms Under the GDPR: Processors and/or Controllers?
Proceedings of the Privacy Technologies and Policy - 9th Annual Privacy Forum, 2021

Protecting Privacy of Web Users. (Protection de la vie privée des internautes).
, 2021

2020
Browser Fingerprinting: A Survey.
ACM Trans. Web, 2020

Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels.
Proc. Priv. Enhancing Technol., 2020

DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems.
CoRR, 2020

Do Cookie Banners Respect my Choice? : Measuring Legal Compliance of Banners from IAB Europe's Transparency and Consent Framework.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

On Compliance of Cookie Purposes with the Purpose Specification Principle.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Purposes in IAB Europe's TCF: Which Legal Basis and How Are They Used by Advertisers?
Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020

2019
Are cookie banners indeed compliant with the law? Deciphering EU legal requirements on consent and technical means to verify compliance of cookie banners.
CoRR, 2019

Security Analysis of Subject Access Request Procedures - How to Authenticate Data Subjects Safely When They Request for Their Data.
Proceedings of the Privacy Technologies and Policy - 7th Annual Privacy Forum, 2019

2018
Tracking the Pixels: Detecting Web Trackers via Analyzing Invisible Pixels.
CoRR, 2018

A Better Facet of Dynamic Information Flow Control.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

To Extend or not to Extend: On the Uniqueness of Browser Extensions and Web Logins.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

2017
Online Privacy and Web Transparency (Dagstuhl Seminar 17162).
Dagstuhl Reports, 2017

On the Content Security Policy Violations due to the Same-Origin Policy.
Proceedings of the 26th International Conference on World Wide Web, 2017

Control What You Include! - Server-Side Protection Against Third Party Web Tracking.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

PLAS 2017: ACM SIGSAC Workshop on Programming Languages and Analysis for Security.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Web Tracking Technologies and Protection Mechanisms.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Using JavaScript Monitoring to Prevent Device Fingerprinting.
ERCIM News, 2016

A Taxonomy of Information Flow Monitors.
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016

Spot the Difference: Secure Multi-execution and Multiple Facets.
Proceedings of the Computer Security - ESORICS 2016, 2016

Hybrid Monitoring of Attacker Knowledge.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

Short Paper: Dynamic leakage: A Need for a New Quantitative Information Flow Measure.
Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, 2016

2014
Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014

2013
Survey on JavaScript security policies and their enforcement mechanisms in a web browser.
J. Log. Algebraic Methods Program., 2013

Hybrid Information Flow Monitoring against Web Tracking.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

2012
Iterative enforcement by suppression: Towards practical enforcement theories.
J. Comput. Secur., 2012

2011
A theory of constructive and predictable runtime enforcement mechanisms.
PhD thesis, 2011

Do you really mean what you actually enforced? - Edited automata revisited.
Int. J. Inf. Sec., 2011

Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies.
Proceedings of the POLICY 2011, 2011

Reactive non-interference for a browser model.
Proceedings of the 5th International Conference on Network and System Security, 2011

Predictability of Enforcement.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

2009
Matching in security-by-contract for mobile code.
J. Log. Algebraic Methods Program., 2009

Towards Practical Enforcement Theories.
Proceedings of the Identity and Privacy in the Internet Age, 2009

2008
Do You Really Mean What You Actually Enforced?.
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008

Matching Policies with Security Claims of Mobile Applications.
Proceedings of the The Third International Conference on Availability, 2008


  Loading...