Peter Snyder

Orcid: 0000-0001-7880-2503

According to our database1, Peter Snyder authored at least 34 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Pool-Party: Exploiting Browser Resource Pools for Web Tracking.
Proceedings of the 32nd USENIX Security Symposium, 2023

Detecting IP-tracking proof interfaces by looking for NATs.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

A First Look at the Privacy Harms of the Public Suffix List.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Understanding the Privacy Risks of Popular Search Engine Advertising Systems.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

2022
Blocked or Broken? Automatically Detecting When Privacy Interventions Break Websites.
Proc. Priv. Enhancing Technol., 2022

Trackers Bounce Back: Measuring Evasion of Partitioned Storage in the Wild.
CoRR, 2022

Measuring the Privacy vs. Compatibility Trade-off in Preventing Third-Party Stateful Tracking.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Measuring UID smuggling in the wild.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

STAR: Secret Sharing for Private Threshold Aggregation Reporting.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web Tracking.
CoRR, 2021

STAR: Distributed Secret Sharing for Private Threshold Aggregation Reporting.
CoRR, 2021

What's in Your Wallet? Privacy and Security Issues in Web 3.0.
CoRR, 2021

Towards Realistic and ReproducibleWeb Crawl Measurements.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

SugarCoat: Programmatically Generating Privacy-Preserving, Web-Compatible Resource Replacements for Content Blocking.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking.
Proc. ACM Meas. Anal. Comput. Syst., 2020

There's No Trick, Its Just a Simple Trick: A Web-Compat and Privacy Improving Approach to Third-party Web Storage.
CoRR, 2020

Improving Web Content Blocking With Event-Loop-Turn Granularity JavaScript Signatures.
CoRR, 2020

Filter List Generation for Underserved Regions.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Keeping out the Masses: Understanding the Popularity and Implications of Internet Paywalls.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

AdGraph: A Graph-Based Approach to Ad and Tracker Blocking.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
The Blind Men and the Internet: Multi-Vantage Point Web Measurements.
CoRR, 2019

Another Brick in the Paywall: The Popularity and Privacy Implications of Paywalls.
CoRR, 2019

SpeedReader: Reader Mode Made Fast and Private.
Proceedings of the World Wide Web Conference, 2019

2018
AdGraph: A Machine Learning Approach to Automatic and Effective Adblocking.
CoRR, 2018

2017
Fifteen minutes of unwanted fame: detecting and characterizing doxing.
Proceedings of the 2017 Internet Measurement Conference, 2017

Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Characterizing fraud and its ramifications in affiliate marketing networks.
J. Cybersecur., 2016

Browser Feature Usage on the Modern Web.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

2015
No Please, After You: Detecting Fraud in Affiliate Marketing Networks.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

One Thing Leads to Another: Credential Based Privilege Escalation.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

"I Saw Images I Didn't Even Know I Had": Understanding User Perceptions of Cloud Storage Privacy.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Cloudsweeper and data-centric security.
SIGCAS Comput. Soc., 2014

2013
CloudSweeper: enabling data-centric document management for secure cloud archives.
Proceedings of the CCSW'13, 2013


  Loading...