Computer security paper
Paper list
Paper list
272
HARPO: Learning to Subvert Online Behavioral Advertising
Behavioral advertising
Web
357
Cached and Confused: Web Cache Deception in the Wild
Web
Cache
544
AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads
VR
Ad
Web
WebVR
545
Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS
DNS
Web
568
What's in a Name? Exploring CA Certificate Control
CA
TLS
PKI
Web
569
ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication
TLS
Web
572
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses
Web
JavaScript
Web Browser
573
Swivel: Hardening WebAssembly against Spectre
Spectre
WemAssembly
Web
627
Rendering Contention Channel Made Practical in Web Browsers
Web Browser
634
Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World
Web
Web browser
Fingerprinting
Website fingerprinting
Tor
In the wild
WF
1584
A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification
Web Browser
1705
Surakav: Generating Realistic Traces for a Strong Website Fingerprinting Defense
Web
Website Fingerprinting
1709
The State of the SameSite: Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies
Web Browser
1711
Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation
Web Browser
1721
Wobfuscator: Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly
Web Browser