Steven Van Acker
Affiliations:- Chalmers University of Technology, Gothenburg, Sweden
According to our database1,
Steven Van Acker
authored at least 17 papers
between 2010 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
0
1
2
3
4
5
1
1
2
2
1
1
1
4
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on dl.acm.org
On csauthors.net:
Bibliography
2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
2016
Proceedings of the Foundations of Security Analysis and Design VIII, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Isolating and Restricting Client-Side JavaScript ; Isoleren en beperken van JavaScript aan de cliëntzijde.
PhD thesis, 2015
Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2014
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Proceedings of the 22nd International World Wide Web Conference, 2013
2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the Information Systems Security - 6th International Conference, 2010