Simon Koch

Orcid: 0000-0002-7638-4982

According to our database1, Simon Koch authored at least 14 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
The Impact of Default Mobile SDK Usage on Privacy and Data Protection.
Proc. Priv. Enhancing Technol., 2025

2024
A Black-Box Privacy Analysis of Messaging Service Providers' Chat Message Processing.
Proc. Priv. Enhancing Technol., 2024

SSRF vs. Developers: A Study of SSRF-Defenses in PHP Applications.
Proceedings of the 33rd USENIX Security Symposium, 2024

Leveraging Information Retrieval Pipelines for Inventive Design: Application in Efficient Lattice Structures Manufacturing.
Proceedings of the World Conference of AI-Powered Innovation and Inventive Design, 2024

2023
The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications.
Proceedings of the 32nd USENIX Security Symposium, 2023

FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Poster: The Risk of Insufficient Isolation of Database Transactions in Web Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Keeping Privacy Labels Honest.
Proc. Priv. Enhancing Technol., 2022

2021
Contract design with socially attentive preferences.
Games Econ. Behav., 2021

Shooter Localization Based on TDOA and N-Shape Length Measurements of Distributed Microphones.
Proceedings of the 24th IEEE International Conference on Information Fusion, 2021

2020
Raccoon: automated verification of guarded race conditions in web applications.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2019
Using Algorithm Selection for Adaptive Vehicle Perception Aboard UAV.
Proceedings of the 16th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2019

2017
Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2015
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015


  Loading...