Steven Van Acker
Steven Van Acker
Chalmers University of Technology
Verified email at singularity.be - Homepage
Title
Cited by
Cited by
Year
You are what you include: large-scale evaluation of remote javascript inclusions
N Nikiforakis, L Invernizzi, A Kapravelos, S Van Acker, W Joosen, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3202012
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications
P Agten, S Van Acker, Y Brondsema, PH Phung, L Desmet, F Piessens
Proceedings of the 28th Annual Computer Security Applications Conference, 1-10, 2012
1172012
Webjail: Least-privilege integration of third-party components in web mashups
S Van Acker, P De Ryck, L Desmet, F Piessens, W Joosen
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
852011
Bitsquatting: Exploiting bit-flips for fun, or profit?
N Nikiforakis, S Van Acker, W Meert, L Desmet, F Piessens, W Joosen
Proceedings of the 22nd international conference on World Wide Web, 989-998, 2013
762013
FlashOver: Automated discovery of cross-site scripting vulnerabilities in rich internet applications
S Van Acker, N Nikiforakis, L Desmet, W Joosen, F Piessens
Proceedings of the 7th ACM symposium on information, computer and …, 2012
472012
Discovering browser extensions via web accessible resources
A Sjösten, S Van Acker, A Sabelfeld
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
412017
Exposing the lack of privacy in file hosting services
N Nikiforakis, M Balduzzi, S Van Acker, W Joosen, D Balzarotti
Proceedings of the 4th USENIX conference on Large-scale exploits and …, 2011
342011
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets
S Van Acker, N Nikiforakis, L Desmet, F Piessens, W Joosen
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
282014
Measuring login webpage security
S Van Acker, D Hausknecht, A Sabelfeld
Proceedings of the Symposium on Applied Computing, 1753-1760, 2017
262017
ValueGuard: Protection of native applications against data-only buffer overflows
S Van Acker, N Nikiforakis, P Philippaerts, Y Younan, F Piessens
International Conference on Information Systems Security, 156-170, 2010
262010
Data Exfiltration in the Face of CSP
S Van Acker, D Hausknecht, A Sabelfeld
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
202016
Password meters and generators on the web: From large-scale empirical study to getting it right
S Van Acker, D Hausknecht, W Joosen, A Sabelfeld
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
182015
Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks.
A Sjösten, S Van Acker, P Picazo-Sanchez, A Sabelfeld
NDSS, 2019
102019
JavaScript sandboxing: isolating and restricting client-side JavaScript
S Van Acker, A Sabelfeld
Foundations of Security Analysis and Design VIII, 32-86, 2016
82016
Exploring the ecosystem of referrer-anonymizing services
N Nikiforakis, S Van Acker, F Piessens, W Joosen
International Symposium on Privacy Enhancing Technologies Symposium, 259-278, 2012
72012
Case study 2 Report: Secure Web Architectures
S Van Acker, L Desmet, S Farrell, M Johns, F Piessens, P De Ryck, ...
52015
Raising the Bar: Evaluating Origin-wide Security Manifests
S Van Acker, D Hausknecht, A Sabelfeld
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
32018
Isolating and Restricting Client-Side JavaScript
S Van Acker
22015
Using SSL/TLS
T Herlea
2013
Protection of native applications against data-only buffer overflows
S Van Acker
The system can't perform the operation now. Try again later.
Articles 1–20