Follow
Steven Van Acker
Steven Van Acker
Chalmers University of Technology
Verified email at singularity.be - Homepage
Title
Cited by
Cited by
Year
You are what you include: large-scale evaluation of remote javascript inclusions
N Nikiforakis, L Invernizzi, A Kapravelos, S Van Acker, W Joosen, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3942012
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications
P Agten, S Van Acker, Y Brondsema, PH Phung, L Desmet, F Piessens
Proceedings of the 28th Annual Computer Security Applications Conference, 1-10, 2012
1422012
Bitsquatting: Exploiting bit-flips for fun, or profit?
N Nikiforakis, S Van Acker, W Meert, L Desmet, F Piessens, W Joosen
Proceedings of the 22nd international conference on World Wide Web, 989-998, 2013
1042013
Webjail: Least-privilege integration of third-party components in web mashups
S Van Acker, P De Ryck, L Desmet, F Piessens, W Joosen
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
952011
Discovering browser extensions via web accessible resources
A Sjösten, S Van Acker, A Sabelfeld
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
812017
FlashOver: Automated discovery of cross-site scripting vulnerabilities in rich internet applications
S Van Acker, N Nikiforakis, L Desmet, W Joosen, F Piessens
Proceedings of the 7th ACM symposium on information, computer and …, 2012
562012
Measuring login webpage security
S Van Acker, D Hausknecht, A Sabelfeld
Proceedings of the Symposium on Applied Computing, 1753-1760, 2017
422017
Exposing the lack of privacy in file hosting services
N Nikiforakis, M Balduzzi, S Van Acker, W Joosen, D Balzarotti
Proceedings of the 4th USENIX conference on Large-scale exploits and …, 2011
392011
ValueGuard: Protection of native applications against data-only buffer overflows
S Van Acker, N Nikiforakis, P Philippaerts, Y Younan, F Piessens
Information Systems Security: 6th International Conference, ICISS 2010 …, 2010
312010
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets
S Van Acker, N Nikiforakis, L Desmet, F Piessens, W Joosen
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
302014
Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks.
A Sjösten, S Van Acker, P Picazo-Sanchez, A Sabelfeld
NDSS, 2019
272019
Data Exfiltration in the Face of CSP
S Van Acker, D Hausknecht, A Sabelfeld
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
242016
Password meters and generators on the web: From large-scale empirical study to getting it right
S Van Acker, D Hausknecht, W Joosen, A Sabelfeld
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
222015
Javascript sandboxing: Isolating and restricting client-side javascript
S Van Acker, A Sabelfeld
Foundations of Security Analysis and Design VIII: FOSAD 2014/2015/2016 …, 2016
132016
Exploring the ecosystem of referrer-anonymizing services
N Nikiforakis, S Van Acker, F Piessens, W Joosen
Privacy Enhancing Technologies: 12th International Symposium, PETS 2012 …, 2012
82012
Raising the bar: Evaluating origin-wide security manifests
S Van Acker, D Hausknecht, A Sabelfeld
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
62018
Case study 2 Report: Secure Web Architectures
S Van Acker, L Desmet, S Farrell, M Johns, F Piessens, P De Ryck, ...
42015
Isolating and Restricting Client-Side JavaScript
S Van Acker
PhD thesis, KU Leuven, 2015
22015
You are what you include
N Nikiforakis, L Invernizzi, A Kapravelos, S Van Acker, W Joosen, ...
Proceedings of the 2012 ACM conference on Computer and communications security, 2012
22012
Bitsquatting
N Nikiforakis, S Van Acker, W Meert, L Desmet, F Piessens, W Joosen
Proceedings of the 22nd international conference on World Wide Web, 2013
12013
The system can't perform the operation now. Try again later.
Articles 1–20