Tom Van Goethem
Katholieke Universiteit Leuven
H-index: 17
Europe-Belgium
Top articles of Tom Van Goethem
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers | Vik Vanderlinden Tom Van Goethem Mathy Vanhoef | 2023/9/25 | |
Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection | Tom Van Goethem Iskander Sanchez-Rola Wouter Joosen | 2023/5/25 | |
Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web | Proceedings on Privacy Enhancing Technologies | Yana Dimova Tom Van Goethem Wouter Joosen | 2023 |
A bug's life: analyzing the lifecycle and mitigation process of content security policy bugs | Gertjan Franken Tom Van Goethem Lieven Desmet Wouter Joosen | 2023 | |
Helping hands: Measuring the impact of a large threat intelligence sharing community | Xander Bouwman Victor Le Pochat Pawel Foremski Tom Van Goethem Carlos H Gañán | 2022 | |
Poster: Exploiting timing side-channel leaks in web applications that tell on themselves | Vik Vanderlinden Tom Van Goethem Wouter Joosen Mathy Vanhoef | 2022/6/7 | |
Sok: Exploring current and future research directions on xs-leaks through an extended formal model | Tom Van Goethem Gertjan Franken Iskander Sanchez-Rola David Dworken Wouter Joosen | 2022/5/30 | |
Characterizing Deceptive Affiliate Marketing Offers | Victor Le Pochat Cameron Ballard Tom Van Goethem Wouter Joosen Damon McCoy | 2022/5/23 | |
Towards Improving the Deprecation Process of Web Features through Progressive Web Security | Tom Van Goethem Wouter Joosen | 2022/5/22 | |
An audit of Facebook's political ad policy enforcement | Victor Le Pochat Laura Edelson Tom Van Goethem Wouter Joosen Damon McCoy | 2022 | |
Trace oddity: Methodologies for data-driven traffic analysis on Tor | Proceedings on Privacy Enhancing Technologies | Vera Rimmer Theodor Schnitzler Tom Van Goethem Abel Rodríguez Romero Wouter Joosen | 2022 |
Reading between the lines: An extensive evaluation of the security and privacy implications of epub reading systems | Gertjan Franken Tom Van Goethem Wouter Joosen | 2021/5/24 | |
The cname of the game: Large-scale analysis of dns-based tracking evasion | Proceedings on Privacy Enhancing Technologies | Yana Dimova Gunes Acar Lukasz Olejnik Wouter Joosen Tom Van Goethem | 2021/2/18 |
Timeless timing attacks: Exploiting concurrency to leak secrets over remote connections | Tom Van Goethem Christina Pöpper Wouter Joosen Mathy Vanhoef | 2020 | |
A practical approach for taking down avalanche botnets under real-world constraints | Proceedings of the 27th Annual Network and Distributed System Security Symposium | Victor Le Pochat Tim Van hamme Sourena Maroofi Tom Van Goethem Davy Preuveneers | 2020 |