Tom van Goethem
Orcid: 0000-0001-6846-9081
According to our database1,
Tom van Goethem
authored at least 36 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 8th Network Traffic Measurement and Analysis Conference, 2024
2023
Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web.
Proc. Priv. Enhancing Technol., October, 2023
A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
Proc. Priv. Enhancing Technol., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Helping hands: Measuring the impact of a large threat intelligence sharing community.
Proceedings of the 31st USENIX Security Symposium, 2022
Towards Improving the Deprecation Process of Web Features through Progressive Web Security.
Proceedings of the 43rd IEEE Security and Privacy, 2022
SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Proc. Priv. Enhancing Technol., 2021
Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
2020
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2019
Exposing Cookie Policy Flaws Through an Extensive Evaluation of Browsers and Their Extensions.
IEEE Secur. Priv., 2019
Evaluating the Long-term Effects of Parameters on the Characteristics of the Tranco Top Sites Ranking.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first Websites.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the Engineering Secure Software and Systems - 10th International Symposium, 2018
2017
CoRR, 2017
One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016
2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014