Tom van Goethem

Orcid: 0000-0001-6846-9081

According to our database1, Tom van Goethem authored at least 35 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web.
Proc. Priv. Enhancing Technol., October, 2023

A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs.
Proceedings of the 32nd USENIX Security Symposium, 2023

Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor.
Proc. Priv. Enhancing Technol., 2022

An Audit of Facebook's Political Ad Policy Enforcement.
Proceedings of the 31st USENIX Security Symposium, 2022

Helping hands: Measuring the impact of a large threat intelligence sharing community.
Proceedings of the 31st USENIX Security Symposium, 2022

Towards Improving the Deprecation Process of Web Features through Progressive Web Security.
Proceedings of the 43rd IEEE Security and Privacy, 2022

SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion.
Proc. Priv. Enhancing Technol., 2021

Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections.
Proceedings of the 29th USENIX Security Symposium, 2020

A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Exposing Cookie Policy Flaws Through an Extensive Evaluation of Browsers and Their Extensions.
IEEE Secur. Priv., 2019

Evaluating the Long-term Effects of Parameters on the Characteristics of the Tranco Top Sites Ranking.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

A Smörgåsbord of Typos: Exploring International Keyboard Layout Typosquatting.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Funny Accents: Exploring Genuine Interest in Internationalized Domain Names.
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019

Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first Websites.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Purchased Fame: Exploring the Ecosystem of Private Blog Networks.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Rigging Research Results by Manipulating Top Websites Rankings.
CoRR, 2018

Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies.
Proceedings of the 27th USENIX Security Symposium, 2018

Automated Website Fingerprinting through Deep Learning.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Idea: Visual Analytics for Web Security.
Proceedings of the Engineering Secure Software and Systems - 10th International Symposium, 2018

2017
Automated Feature Extraction for Website Fingerprinting through Deep Learning.
CoRR, 2017

One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

The Wolf of Name Street: Hijacking Domains Through Their Nameservers.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Request and Conquer: Exposing Cross-Origin Resource Size.
Proceedings of the 25th USENIX Security Symposium, 2016

It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

2015
Maneuvering Around Clouds: Bypassing Cloud-based Security Providers.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

The Clock is Still Ticking: Timing Attacks in the Modern Web.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Large-Scale Security Analysis of the Web: Challenges and Findings.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014


  Loading...