Tobias Lauinger

Orcid: 0000-0002-5779-0643

According to our database1, Tobias Lauinger authored at least 27 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Understanding the (In)Effectiveness of Content Moderation: A Case Study of Facebook in the Context of the U.S. Capitol Riot.
CoRR, 2023

Propaganda Política Pagada: Exploring U.S. Political Facebook Ads en Español.
Proceedings of the ACM Web Conference 2023, 2023

2022
Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

An Audit of Facebook's Political Ad Policy Enforcement.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards.
Proceedings of the 30th USENIX Security Symposium, 2021

Understanding engagement with U.S. (mis)information news sources on Facebook.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

A large-scale characterization of online incitements to harassment across platforms.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

2020
Empirical Analysis of Indirect Internal Conversions in Cryptocurrency Exchanges.
CoRR, 2020

A Security Analysis of the Facebook Ad Library.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Understanding Incentivized Mobile App Installs on Google Play Store.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

2019
Clustering and the Weekend Effect: Recommendations for the Use of Top Domain Lists in Security Research.
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019

Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists.
Proceedings of the Information Security - 22nd International Conference, 2019

It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Thou shalt not depend on me.
Commun. ACM, 2018

Large-Scale Analysis of Style Injection by Relative Path Overwrite.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop.
Proceedings of the Internet Measurement Conference 2018, 2018

2017
Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers.
Proceedings of the 26th USENIX Security Symposium, 2017

Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

2014
Why Is CSP Failing? Trends and Challenges in CSP Adoption.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

2013
Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
Privacy risks in named data networking: what is the cost of performance?
Comput. Commun. Rev., 2012

Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

2010
Honeybot, Your Man in the Middle for Automated Social Engineering.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010

2008
Embracing the Peer Next Door: Proximity in Kademlia.
Proceedings of the Proceedings P2P'08, 2008


  Loading...